<?xml version="1.0" encoding="UTF-8"?>
	<oval_definitions
		xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd"
		xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5"
		xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
		xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5"
		xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5">
	  <generator>
	      <oval:product_name>Marcus Updateinfo to OVAL Converter</oval:product_name>
	      <oval:schema_version>5.5</oval:schema_version>
	      <oval:timestamp>2017-03-20T11:00:16</oval:timestamp>
	  </generator>
<definitions>
<definition id="oval:org.opensuse.security:def:20022443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2002-2443</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2002-2443" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2443" source="CVE"/>
    <description>
    schpw.c in the kpasswd service in kadmind in MIT Kerberos 5 (aka krb5) before 1.11.3 does not properly validate UDP packets before sending responses, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged packet that triggers a communication loop, as demonstrated by krb_pingpong.nasl, a related issue to CVE-1999-0103.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137331" comment="krb5-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137332" comment="krb5-32bit-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137333" comment="krb5-client-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137334" comment="krb5-devel-1.12.2-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0801</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2004-0801" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0801" source="CVE"/>
    <description>
    Unknown vulnerability in foomatic-rip in Foomatic before 3.0.2 allows local users or remote attackers with access to CUPS to execute arbitrary commands.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137268" comment="hplip-3.14.6-2.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137269" comment="hplip-hpijs-3.14.6-2.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137270" comment="hplip-sane-3.14.6-2.2.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20042771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-2771</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2004-2771" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2771" source="CVE"/>
    <description>
    The expand function in fio.c in Heirloom mailx 12.5 and earlier and BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in an email address.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103229" comment="mailx-12.5-20.4.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0743</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2006-0743" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0743" source="CVE"/>
    <description>
    Format string vulnerability in LocalSyslogAppender in Apache log4net 1.2.9 might allow remote attackers to cause a denial of service (memory corruption and termination) via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137798" comment="log4net-1.2.10-74.1.8 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0855</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2006-0855" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0855" source="CVE"/>
    <description>
    Stack-based buffer overflow in the fullpath function in misc.c for zoo 2.10 and earlier, as used in products such as Barracuda Spam Firewall, allows user-assisted attackers to execute arbitrary code via a crafted ZOO file that causes the combine function to return a longer string than expected.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137926" comment="zoo-2.10-1022.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2607</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2006-2607" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2607" source="CVE"/>
    <description>
    do_command.c in Vixie cron (vixie-cron) 4.1 does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits, as originally demonstrated by a program that exceeds the process limits as defined in /etc/security/limits.conf.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137096" comment="cron-4.2-56.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137097" comment="cronie-1.4.12-56.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4197</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2006-4197" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4197" source="CVE"/>
    <description>
    Multiple buffer overflows in libmusicbrainz (aka mb_client or MusicBrainz Client Library) 2.1.2 and earlier, and SVN 8406 and earlier, allow remote attackers to cause a denial of service (crash) or execute arbitrary code via (1) a long Location header by the HTTP server, which triggers an overflow in the MBHttp::Download function in lib/http.cpp; and (2) a long URL in RDF data, as demonstrated by a URL in an rdf:resource field in an RDF XML document, which triggers overflows in many functions in lib/rdfparse.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137545" comment="libmusicbrainz-devel-2.1.5-28.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137546" comment="libmusicbrainz4-2.1.5-28.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20067243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-7243</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2006-7243" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7243" source="CVE"/>
    <description>
    PHP before 5.3.4 accepts the \0 character in a pathname, which might allow context-dependent attackers to bypass intended access restrictions by placing a safe file extension after this character, as demonstrated by .php\0.jpg at the end of the argument to the file_exists function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20067250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-7250</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2006-7250" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7250" source="CVE"/>
    <description>
    The mime_hdr_cmp function in crypto/asn1/asn_mime.c in OpenSSL 0.9.8t and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted S/MIME message.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1669</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2007-1669" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1669" source="CVE"/>
    <description>
    zoo decoder 2.10 (zoo-2.10), as used in multiple products including (1) Barracuda Spam Firewall 3.4 and later with virusdef before 2.0.6399, (2) Spam Firewall before 3.4 20070319 with virusdef before 2.0.6399o, and (3) AMaViS 2.4.1 and earlier, allows remote attackers to cause a denial of service (infinite loop) via a ZOO archive with a direntry structure that points to a previous file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137926" comment="zoo-2.10-1022.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4460</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2007-4460" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4460" source="CVE"/>
    <description>
    The RenderV2ToFile function in tag_file.cpp in id3lib (aka libid3) 3.8.3 allows local users to overwrite arbitrary files via a symlink attack on a temporary file whose name is constructed from the name of a file being tagged.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137277" comment="id3lib-3.8.3-264.1.5 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4772</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2007-4772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4772" source="CVE"/>
    <description>
    The regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows context-dependent attackers to cause a denial of service (infinite loop) via a crafted regular expression.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123516" comment="libecpg6-9.3.11-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123517" comment="libecpg6-32bit-9.3.11-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123518" comment="libpq5-9.3.11-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123519" comment="libpq5-32bit-9.3.11-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123520" comment="postgresql93-9.3.11-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123521" comment="postgresql93-contrib-9.3.11-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123522" comment="postgresql93-devel-9.3.11-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123523" comment="postgresql93-docs-9.3.11-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123524" comment="postgresql93-libs-9.3.11-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123525" comment="postgresql93-plperl-9.3.11-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123526" comment="postgresql93-plpython-9.3.11-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123527" comment="postgresql93-pltcl-9.3.11-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123528" comment="postgresql93-server-9.3.11-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123529" comment="postgresql93-test-9.3.11-2.10.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5970</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2007-5970" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5970" source="CVE"/>
    <description>
    MySQL 5.1.x before 5.1.23 and 6.0.x before 6.0.4 allows remote authenticated users to gain privileges on arbitrary tables via unspecified vectors involving use of table-level DATA DIRECTORY and INDEX DIRECTORY options when creating a partitioned table with the same name as a table on which the user lacks privileges.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137547" comment="libmysqlclient-devel-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137548" comment="libmysqlclient18-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137549" comment="libmysqlclient18-32bit-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137550" comment="libmysqlclient_r18-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137551" comment="libmysqld18-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137552" comment="mariadb-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137553" comment="mariadb-client-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137554" comment="mariadb-errormessages-10.0.13-2.3.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6600</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2007-6600" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6600" source="CVE"/>
    <description>
    PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, 7.4 before 7.4.19, and 7.3 before 7.3.21 uses superuser privileges instead of table owner privileges for (1) VACUUM and (2) ANALYZE operations within index functions, and supports (3) SET ROLE and (4) SET SESSION AUTHORIZATION within index functions, which allows remote authenticated users to gain privileges.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137474" comment="libecpg6-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137475" comment="libpq5-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137476" comment="libpq5-32bit-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137477" comment="postgresql93-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137478" comment="postgresql93-contrib-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137479" comment="postgresql93-devel-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137480" comment="postgresql93-docs-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137481" comment="postgresql93-server-9.3.5-2.1.14 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6720</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2007-6720" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6720" source="CVE"/>
    <description>
    libmikmod 3.1.9 through 3.2.0, as used by MikMod, SDL-mixer, and possibly other products, relies on the channel count of the last loaded song, rather than the currently playing song, for certain playback calculations, which allows user-assisted attackers to cause a denial of service (application crash) by loading multiple songs (aka MOD files) with different numbers of channels.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137539" comment="libmikmod3-3.3.6-3.1.3 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6746</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2007-6746" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6746" source="CVE"/>
    <description>
    telepathy-idle before 0.1.15 does not verify (1) that the issuer is a trusted CA, (2) that the server hostname matches a domain name in the subject's Common Name (CN), or (3) the expiration date of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137889" comment="telepathy-idle-0.2.0-2.1.4 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0553</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2008-0553" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0553" source="CVE"/>
    <description>
    Stack-based buffer overflow in the ReadImage function in tkImgGIF.c in Tk (Tcl/Tk) before 8.5.1 allows remote attackers to execute arbitrary code via a crafted GIF image, a similar issue to CVE-2006-4484.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137893" comment="tkimg-1.4-4.1.3 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0928</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2008-0928" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0928" source="CVE"/>
    <description>
    Qemu 0.9.1 and earlier does not perform range checks for block device read or write requests, which allows guest host users with root privileges to access arbitrary memory and escape the virtual machine.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137408" comment="libcacard0-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137409" comment="qemu-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137410" comment="qemu-arm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137411" comment="qemu-block-curl-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137412" comment="qemu-extra-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137413" comment="qemu-ipxe-1.0.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137414" comment="qemu-ksm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137415" comment="qemu-kvm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137416" comment="qemu-lang-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137859" comment="qemu-linux-user-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137417" comment="qemu-ppc-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137418" comment="qemu-s390-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137419" comment="qemu-seabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137420" comment="qemu-sgabios-8-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137421" comment="qemu-tools-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137422" comment="qemu-vgabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137423" comment="qemu-x86-2.1.0-2.9 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1142</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2008-1142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1142" source="CVE"/>
    <description>
    rxvt 2.6.4 opens a terminal window on :0 if the DISPLAY environment variable is not set, which might allow local users to hijack X11 connections.  NOTE: it was later reported that rxvt-unicode, mrxvt, aterm, multi-aterm, and wterm are also affected.  NOTE: realistic attack scenarios require that the victim enters a command on the wrong machine.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137867" comment="rxvt-unicode-9.20-2.1.4 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1227</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2008-1227" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1227" source="CVE"/>
    <description>
    Stack-based buffer overflow in the silc_fingerprint function in lib/silcutil/silcutil.c in Secure Internet Live Conferencing (SILC) Toolkit 1.1.5, and unspecified earlier versions, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via long input data.  NOTE: some of these details are obtained from third party information.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137676" comment="libsilc-1_1-2-1.1.10-25.1.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137677" comment="libsilcclient-1_1-3-1.1.10-25.1.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137678" comment="silc-toolkit-1.1.10-25.1.6 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1420</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2008-1420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1420" source="CVE"/>
    <description>
    Integer overflow in residue partition value (aka partvals) evaluation in Xiph.org libvorbis 1.2.0 and earlier allows remote attackers to execute arbitrary code via a crafted OGG file, which triggers a heap overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137745" comment="libvorbis-devel-1.3.4-3.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137746" comment="libvorbis0-1.3.4-3.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137747" comment="libvorbis0-32bit-1.3.4-3.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137748" comment="libvorbisenc2-1.3.4-3.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137749" comment="libvorbisenc2-32bit-1.3.4-3.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137750" comment="libvorbisfile3-1.3.4-3.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137751" comment="libvorbisfile3-32bit-1.3.4-3.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1686</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2008-1686" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1686" source="CVE"/>
    <description>
    Array index vulnerability in Speex 1.1.12 and earlier, as used in libfishsound 0.9.0 and earlier, including Illiminable DirectShow Filters and Annodex Plugins for Firefox, xine-lib before 1.1.12, and many other products, allows remote attackers to execute arbitrary code via a header structure containing a negative offset, which is used to dereference a function pointer.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137342" comment="libSDL_sound-1_0-1-1.0.3-91.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137343" comment="vorbis-tools-1.4.0-17.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1945</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2008-1945" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1945" source="CVE"/>
    <description>
    QEMU 0.9.0 does not properly handle changes to removable media, which allows guest OS users to read arbitrary files on the host OS by using the diskformat: parameter in the -usbdevice option to modify the disk-image header to identify a different format, a related issue to CVE-2008-2004.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137408" comment="libcacard0-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137409" comment="qemu-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137410" comment="qemu-arm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137411" comment="qemu-block-curl-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137412" comment="qemu-extra-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137413" comment="qemu-ipxe-1.0.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137414" comment="qemu-ksm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137415" comment="qemu-kvm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137416" comment="qemu-lang-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137859" comment="qemu-linux-user-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137417" comment="qemu-ppc-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137418" comment="qemu-s390-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137419" comment="qemu-seabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137420" comment="qemu-sgabios-8-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137421" comment="qemu-tools-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137422" comment="qemu-vgabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137423" comment="qemu-x86-2.1.0-2.9 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2109</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2008-2109" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2109" source="CVE"/>
    <description>
    field.c in the libid3tag 0.15.0b library allows context-dependent attackers to cause a denial of service (CPU consumption) via an ID3_FIELD_TYPE_STRINGLIST field that ends in '\0', which triggers an infinite loop.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137514" comment="libid3tag0-0.15.1b-183.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2374</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2008-2374" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2374" source="CVE"/>
    <description>
    src/sdp.c in bluez-libs 3.30 in BlueZ, and other bluez-libs before 3.34 and bluez-utils before 3.34 versions, does not validate string length fields in SDP packets, which allows remote SDP servers to cause a denial of service or possibly have unspecified other impact via a crafted length field that triggers excessive memory allocation or a buffer over-read.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137810" comment="obex-data-server-0.4.6-14.1.4 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2382</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2008-2382" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2382" source="CVE"/>
    <description>
    The protocol_client_msg function in vnc.c in the VNC server in (1) Qemu 0.9.1 and earlier and (2) KVM kvm-79 and earlier allows remote attackers to cause a denial of service (infinite loop) via a certain message.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137408" comment="libcacard0-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137409" comment="qemu-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137410" comment="qemu-arm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137411" comment="qemu-block-curl-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137412" comment="qemu-extra-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137413" comment="qemu-ipxe-1.0.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137414" comment="qemu-ksm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137415" comment="qemu-kvm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137416" comment="qemu-lang-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137859" comment="qemu-linux-user-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137417" comment="qemu-ppc-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137418" comment="qemu-s390-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137419" comment="qemu-seabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137420" comment="qemu-sgabios-8-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137421" comment="qemu-tools-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137422" comment="qemu-vgabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137423" comment="qemu-x86-2.1.0-2.9 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3522</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2008-3522" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3522" source="CVE"/>
    <description>
    Buffer overflow in the jas_stream_printf function in libjasper/base/jas_stream.c in JasPer 1.900.1 might allow context-dependent attackers to have an unknown impact via vectors related to the mif_hdr_put function and use of vsprintf.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135287" comment="jasper-1.900.14-163.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135288" comment="libjasper-devel-1.900.14-163.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135289" comment="libjasper1-1.900.14-163.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135290" comment="libjasper1-32bit-1.900.14-163.24.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3825</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2008-3825" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3825" source="CVE"/>
    <description>
    pam_krb5 2.2.14 in Red Hat Enterprise Linux (RHEL) 5 and earlier, when the existing_ticket option is enabled, uses incorrect privileges when reading a Kerberos credential cache, which allows local users to gain privileges by setting the KRB5CCNAME environment variable to an arbitrary cache filename and running the (1) su or (2) sudo program. NOTE: there may be a related vector involving sshd that has limited relevance.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137825" comment="pam_krb5-2.4.4-5.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137826" comment="pam_krb5-32bit-2.4.4-5.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4225</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2008-4225" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4225" source="CVE"/>
    <description>
    Integer overflow in the xmlBufferResize function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (infinite loop) via a large XML document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137790" comment="libxml2-2-2.9.1-7.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137791" comment="libxml2-2-32bit-2.9.1-7.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137792" comment="libxml2-devel-2.9.1-7.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137793" comment="libxml2-tools-2.9.1-7.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137854" comment="python-libxml2-2.9.1-7.2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4226</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2008-4226" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4226" source="CVE"/>
    <description>
    Integer overflow in the xmlSAX2Characters function in libxml2 2.7.2 allows context-dependent attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a large XML document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137790" comment="libxml2-2-2.9.1-7.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137791" comment="libxml2-2-32bit-2.9.1-7.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137792" comment="libxml2-devel-2.9.1-7.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137793" comment="libxml2-tools-2.9.1-7.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137854" comment="python-libxml2-2.9.1-7.2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4316</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2008-4316" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4316" source="CVE"/>
    <description>
    Multiple integer overflows in glib/gbase64.c in GLib before 2.20 allow context-dependent attackers to execute arbitrary code via a long string that is converted either (1) from or (2) to a base64 representation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137214" comment="glib2-devel-2.42.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137215" comment="glib2-tools-2.42.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137216" comment="libgio-2_0-0-2.42.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137217" comment="libgio-2_0-0-32bit-2.42.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137218" comment="libglib-2_0-0-2.42.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137219" comment="libglib-2_0-0-32bit-2.42.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137220" comment="libgmodule-2_0-0-2.42.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137221" comment="libgmodule-2_0-0-32bit-2.42.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137222" comment="libgobject-2_0-0-2.42.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137223" comment="libgobject-2_0-0-32bit-2.42.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137224" comment="libgthread-2_0-0-2.42.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137225" comment="libgthread-2_0-0-32bit-2.42.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4409</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2008-4409" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4409" source="CVE"/>
    <description>
    libxml2 2.7.0 and 2.7.1 does not properly handle "predefined entities definitions" in entities, which allows context-dependent attackers to cause a denial of service (memory consumption and application crash), as demonstrated by use of xmllint on a certain XML document, a different vulnerability than CVE-2003-1564 and CVE-2008-3281.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137790" comment="libxml2-2-2.9.1-7.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137791" comment="libxml2-2-32bit-2.9.1-7.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137792" comment="libxml2-devel-2.9.1-7.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137793" comment="libxml2-tools-2.9.1-7.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137854" comment="python-libxml2-2.9.1-7.2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4539</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2008-4539" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4539" source="CVE"/>
    <description>
    Heap-based buffer overflow in the Cirrus VGA implementation in (1) KVM before kvm-82 and (2) QEMU on Debian GNU/Linux and Ubuntu might allow local users to gain privileges by using the VNC console for a connection, aka the LGD-54XX "bitblt" heap overflow.  NOTE: this issue exists because of an incorrect fix for CVE-2007-1320.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137408" comment="libcacard0-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137409" comment="qemu-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137410" comment="qemu-arm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137411" comment="qemu-block-curl-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137412" comment="qemu-extra-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137413" comment="qemu-ipxe-1.0.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137414" comment="qemu-ksm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137415" comment="qemu-kvm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137416" comment="qemu-lang-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137859" comment="qemu-linux-user-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137417" comment="qemu-ppc-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137418" comment="qemu-s390-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137419" comment="qemu-seabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137420" comment="qemu-sgabios-8-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137421" comment="qemu-tools-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137422" comment="qemu-vgabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137423" comment="qemu-x86-2.1.0-2.9 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4575</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2008-4575" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4575" source="CVE"/>
    <description>
    Buffer overflow in the DoCommand function in jhead before 2.84 might allow context-dependent attackers to cause a denial of service (crash) via (1) a long -cmd argument and (2) unspecified vectors related to "a bunch of potential string overflows."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137284" comment="jhead-2.97-4.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4641</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2008-4641" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4641" source="CVE"/>
    <description>
    The DoCommand function in jhead.c in Matthias Wandel jhead 2.84 and earlier allows attackers to execute arbitrary commands via shell metacharacters in unspecified input.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137284" comment="jhead-2.97-4.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4690</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2008-4690" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4690" source="CVE"/>
    <description>
    lynx 2.8.6dev.15 and earlier, when advanced mode is enabled and lynx is configured as a URL handler, allows remote attackers to execute arbitrary commands via a crafted lynxcgi: URL, a related issue to CVE-2005-2929.  NOTE: this might only be a vulnerability in limited deployments that have defined a lynxcgi: handler.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137800" comment="lynx-2.8.8rel.2-2.1.3 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4936</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2008-4936" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4936" source="CVE"/>
    <description>
    faxspool in mgetty 1.1.36 allows local users to overwrite arbitrary files via a symlink attack on a /tmp/faxsp.##### temporary file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137179" comment="g3utils-1.1.36-55.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137180" comment="mgetty-1.1.36-55.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137181" comment="sendfax-1.1.36-55.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4989</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2008-4989" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4989" source="CVE"/>
    <description>
    The _gnutls_x509_verify_certificate function in lib/x509/verify.c in libgnutls in GnuTLS before 2.6.1 trusts certificate chains in which the last certificate is an arbitrary trusted, self-signed certificate, which allows man-in-the-middle attackers to insert a spoofed certificate for any Distinguished Name (DN).
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137248" comment="gnutls-3.2.18-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137249" comment="libgnutls-devel-3.2.18-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137250" comment="libgnutls-openssl27-3.2.18-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137251" comment="libgnutls28-3.2.18-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137252" comment="libgnutls28-32bit-3.2.18-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5077</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2008-5077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077" source="CVE"/>
    <description>
    OpenSSL 0.9.8i and earlier does not properly check the return value from the EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5913</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2008-5913" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5913" source="CVE"/>
    <description>
    The Math.random function in the JavaScript implementation in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, uses a random number generator that is seeded only once per browser session, which makes it easier for remote attackers to track a user, or trick a user into acting upon a spoofed pop-up message, by calculating the seed value, related to a "temporary footprint" and an "in-session phishing attack."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5984</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2008-5984" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5984" source="CVE"/>
    <description>
    Untrusted search path vulnerability in the Python plugin in Dia 0.96.1, and possibly other versions, allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983).
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137136" comment="dia-0.97.3-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137137" comment="dia-lang-0.97.3-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20087247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-7247</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2008-7247" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7247" source="CVE"/>
    <description>
    sql/sql_table.cc in MySQL 5.0.x through 5.0.88, 5.1.x through 5.1.41, and 6.0 before 6.0.9-alpha, when the data home directory contains a symlink to a different filesystem, allows remote authenticated users to bypass intended access restrictions by calling CREATE TABLE with a (1) DATA DIRECTORY or (2) INDEX DIRECTORY argument referring to a subdirectory that requires following this symlink.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137547" comment="libmysqlclient-devel-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137548" comment="libmysqlclient18-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137549" comment="libmysqlclient18-32bit-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137550" comment="libmysqlclient_r18-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137551" comment="libmysqld18-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137552" comment="mariadb-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137553" comment="mariadb-client-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137554" comment="mariadb-errormessages-10.0.13-2.3.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0023</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-0023" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0023" source="CVE"/>
    <description>
    The apr_strmatch_precompile function in strmatch/apr_strmatch.c in Apache APR-util before 1.3.5 allows remote attackers to cause a denial of service (daemon crash) via crafted input involving (1) a .htaccess file used with the Apache HTTP Server, (2) the SVNMasterURI directive in the mod_dav_svn module in the Apache HTTP Server, (3) the mod_apreq2 module for the Apache HTTP Server, or (4) an application that uses the libapreq2 library, which triggers a heap-based buffer underflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136944" comment="apache2-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136945" comment="apache2-devel-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136946" comment="apache2-doc-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136947" comment="apache2-example-pages-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136948" comment="apache2-prefork-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136949" comment="apache2-utils-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137392" comment="libapr-util1-1.5.3-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137393" comment="libapr-util1-devel-1.5.3-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0035</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-0035" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0035" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136931" comment="alsa-1.0.28-6.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136932" comment="alsa-devel-1.0.28-6.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136933" comment="libasound2-1.0.28-6.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136934" comment="libasound2-32bit-1.0.28-6.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0037</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-0037" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0037" source="CVE"/>
    <description>
    The redirect implementation in curl and libcurl 5.11 through 7.19.3, when CURLOPT_FOLLOWLOCATION is enabled, accepts arbitrary Location values, which might allow remote HTTP servers to (1) trigger arbitrary requests to intranet servers, (2) read or overwrite arbitrary files via a redirect to a file: URL, or (3) execute arbitrary commands via a redirect to an scp: URL.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137106" comment="curl-7.38.0-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137107" comment="libcurl-devel-7.38.0-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137108" comment="libcurl4-7.38.0-1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0040</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-0040" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0040" source="CVE"/>
    <description>
    The PNG reference library (aka libpng) before 1.0.43, and 1.2.x before 1.2.35, as used in pngcrush and other applications, allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file that triggers a free of an uninitialized pointer in (1) the png_read_png function, (2) pCAL chunk handling, or (3) setup of 16-bit gamma tables.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0159</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-0159" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0159" source="CVE"/>
    <description>
    Stack-based buffer overflow in the cookedprint function in ntpq/ntpq.c in ntpq in NTP before 4.2.4p7-RC2 allows remote NTP servers to execute arbitrary code via a crafted response.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137808" comment="ntp-4.2.6p5-25.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137809" comment="ntp-doc-4.2.6p5-25.2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0163</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-0163" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0163" source="CVE"/>
    <description>
    Integer overflow in the TIFF image decoding routines in CUPS 1.3.9 and earlier allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via a crafted TIFF image, which is not properly handled by the (1) _cupsImageReadTIFF function in the imagetops filter and (2) imagetoraster filter, leading to a heap-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137098" comment="cups-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137099" comment="cups-client-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137100" comment="cups-devel-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137101" comment="cups-libs-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137102" comment="cups-libs-32bit-1.5.4-21.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0179</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-0179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0179" source="CVE"/>
    <description>
    libmikmod 3.1.11 through 3.2.0, as used by MikMod and possibly other products, allows user-assisted attackers to cause a denial of service (application crash) by loading an XM file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137539" comment="libmikmod3-3.3.6-3.1.3 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0186</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-0186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0186" source="CVE"/>
    <description>
    Integer overflow in libsndfile 1.0.18, as used in Winamp and other products, allows context-dependent attackers to execute arbitrary code via crafted description chunks in a CAF audio file, leading to a heap-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137681" comment="libsndfile-devel-1.0.25-19.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137682" comment="libsndfile1-1.0.25-19.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137683" comment="libsndfile1-32bit-1.0.25-19.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0316</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-0316" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0316" source="CVE"/>
    <description>
    Untrusted search path vulnerability in src/if_python.c in the Python interface in Vim before 7.2.045 allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to a vulnerability in the PySys_SetArgv function (CVE-2008-5983), as demonstrated by an erroneous search path for plugin/bike.vim in bicyclerepair.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137263" comment="gvim-7.4.461.hg.6253-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137264" comment="vim-7.4.461.hg.6253-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137265" comment="vim-data-7.4.461.hg.6253-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0590</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-0590" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0590" source="CVE"/>
    <description>
    The ASN1_STRING_print_ex function in OpenSSL before 0.9.8k allows remote attackers to cause a denial of service (invalid memory access and application crash) via vectors that trigger printing of a (1) BMPString or (2) UniversalString with an invalid encoded length.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0591</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-0591" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0591" source="CVE"/>
    <description>
    The CMS_verify function in OpenSSL 0.9.8h through 0.9.8j, when CMS is enabled, does not properly handle errors associated with malformed signed attributes, which allows remote attackers to repudiate a signature that originally appeared to be valid but was actually invalid.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0652</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-0652" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0652" source="CVE"/>
    <description>
    The Internationalized Domain Names (IDN) blacklist in Mozilla Firefox 3.0.6 and other versions before 3.0.9; Thunderbird before 2.0.0.21; and SeaMonkey before 1.1.15 does not include box-drawing characters, which allows remote attackers to spoof URLs and conduct phishing attacks, as demonstrated by homoglyphs of the / (slash) and ? (question mark) characters in a subdomain of a .cn domain name, a different vulnerability than CVE-2005-0233.  NOTE: some third parties claim that 3.0.6 is not affected, but much older versions perhaps are affected.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0688</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-0688" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0688" source="CVE"/>
    <description>
    Multiple buffer overflows in the CMU Cyrus SASL library before 2.1.23 might allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via strings that are used as input to the sasl_encode64 function in lib/saslutil.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137114" comment="cyrus-sasl-2.1.26-7.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137115" comment="cyrus-sasl-crammd5-2.1.26-7.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137116" comment="cyrus-sasl-devel-2.1.26-7.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137117" comment="cyrus-sasl-digestmd5-2.1.26-7.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137118" comment="cyrus-sasl-gssapi-2.1.26-7.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137119" comment="cyrus-sasl-plain-2.1.26-7.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137120" comment="libsasl2-3-2.1.26-7.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137121" comment="libsasl2-3-32bit-2.1.26-7.2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0696</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-0696" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0696" source="CVE"/>
    <description>
    The dns_db_findrdataset function in db.c in named in ISC BIND 9.4 before 9.4.3-P3, 9.5 before 9.5.1-P3, and 9.6 before 9.6.1-P1, when configured as a master server, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via an ANY record in the prerequisite section of a crafted dynamic update message, as exploited in the wild in July 2009.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137045" comment="bind-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137046" comment="bind-chrootenv-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137047" comment="bind-doc-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137048" comment="bind-libs-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137049" comment="bind-utils-9.9.5P1-2.2.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0758</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-0758" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0758" source="CVE"/>
    <description>
    The originates_from_local_legacy_unicast_socket function in avahi-core/server.c in avahi-daemon 0.6.23 does not account for the network byte order of a port number when processing incoming multicast packets, which allows remote attackers to cause a denial of service (network bandwidth and CPU consumption) via a crafted legacy unicast mDNS query packet that triggers a multicast packet storm.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137022" comment="avahi-0.6.31-23.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137023" comment="avahi-autoipd-0.6.31-23.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137024" comment="avahi-compat-mDNSResponder-devel-0.6.31-23.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137025" comment="libavahi-client3-0.6.31-23.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137026" comment="libavahi-common3-0.6.31-23.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137027" comment="libavahi-core7-0.6.31-23.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137028" comment="libavahi-devel-0.6.31-23.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137029" comment="libdns_sd-0.6.31-23.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0771</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-0771" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0771" source="CVE"/>
    <description>
    The layout engine in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via certain vectors that trigger memory corruption and assertion failures.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0772</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-0772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0772" source="CVE"/>
    <description>
    The layout engine in Mozilla Firefox 2 and 3 before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to nsCSSStyleSheet::GetOwnerNode, events, and garbage collection, which triggers memory corruption.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0773</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-0773" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0773" source="CVE"/>
    <description>
    The JavaScript engine in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via (1) a splice of an array that contains "some non-set elements," which causes jsarray.cpp to pass an incorrect argument to the ResizeSlots function, which triggers memory corruption; (2) vectors related to js_DecompileValueGenerator, jsopcode.cpp, __defineSetter__, and watch, which triggers an assertion failure or a segmentation fault; and (3) vectors related to gczeal, __defineSetter__, and watch, which triggers a hang.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0774</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-0774" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0774" source="CVE"/>
    <description>
    The layout engine in Mozilla Firefox 2 and 3 before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey 1.1.15 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to gczeal, a different vulnerability than CVE-2009-0773.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0775</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-0775" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0775" source="CVE"/>
    <description>
    Double free vulnerability in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 allows remote attackers to execute arbitrary code via "cloned XUL DOM elements which were linked as a parent and child," which are not properly handled during garbage collection.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0776</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-0776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0776" source="CVE"/>
    <description>
    nsIRDFService in Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 allows remote attackers to bypass the same-origin policy and read XML data from another domain via a cross-domain redirect.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0777</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-0777" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0777" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.7, Thunderbird before 2.0.0.21, and SeaMonkey before 1.1.15 decode invisible characters when they are displayed in the location bar, which causes an incorrect address to be displayed and makes it easier for remote attackers to spoof URLs and conduct phishing attacks.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0789</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-0789" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0789" source="CVE"/>
    <description>
    OpenSSL before 0.9.8k on WIN64 and certain other platforms does not properly handle a malformed ASN.1 structure, which allows remote attackers to cause a denial of service (invalid memory access and application crash) by placing this structure in the public key of a certificate, as demonstrated by an RSA public key.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0793</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-0793" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0793" source="CVE"/>
    <description>
    cmsxform.c in LittleCMS (aka lcms or liblcms) 1.18, as used in OpenJDK and other products, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted image that triggers execution of incorrect code for "transformations of monochrome profiles."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137530" comment="liblcms1-1.19-18.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137531" comment="python-lcms-1.19-18.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0799</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-0799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0799" source="CVE"/>
    <description>
    The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (crash) via a crafted PDF file that triggers an out-of-bounds read.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137580" comment="libpoppler-cpp0-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137581" comment="libpoppler-devel-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137582" comment="libpoppler-glib8-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137583" comment="libpoppler-qt4-4-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137584" comment="libpoppler-qt4-devel-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137585" comment="libpoppler46-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137586" comment="poppler-tools-0.26.5-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0800</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-0800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0800" source="CVE"/>
    <description>
    Multiple "input validation flaws" in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allow remote attackers to execute arbitrary code via a crafted PDF file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137580" comment="libpoppler-cpp0-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137581" comment="libpoppler-devel-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137582" comment="libpoppler-glib8-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137583" comment="libpoppler-qt4-4-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137584" comment="libpoppler-qt4-devel-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137585" comment="libpoppler46-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137586" comment="poppler-tools-0.26.5-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0844</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-0844" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0844" source="CVE"/>
    <description>
    The get_input_token function in the SPNEGO implementation in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote attackers to cause a denial of service (daemon crash) and possibly obtain sensitive information via a crafted length value that triggers a buffer over-read.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137331" comment="krb5-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137332" comment="krb5-32bit-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137333" comment="krb5-client-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137334" comment="krb5-devel-1.12.2-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0845</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-0845" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0845" source="CVE"/>
    <description>
    The spnego_gss_accept_sec_context function in lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3, when SPNEGO is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via invalid ContextFlags data in the reqFlags field in a negTokenInit token.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137331" comment="krb5-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137332" comment="krb5-32bit-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137333" comment="krb5-client-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137334" comment="krb5-devel-1.12.2-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0846</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-0846" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0846" source="CVE"/>
    <description>
    The asn1_decode_generaltime function in lib/krb5/asn.1/asn1_decode.c in the ASN.1 GeneralizedTime decoder in MIT Kerberos 5 (aka krb5) before 1.6.4 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via vectors involving an invalid DER encoding that triggers a free of an uninitialized pointer.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137331" comment="krb5-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137332" comment="krb5-32bit-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137333" comment="krb5-client-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137334" comment="krb5-devel-1.12.2-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0847</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-0847" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0847" source="CVE"/>
    <description>
    The asn1buf_imbed function in the ASN.1 decoder in MIT Kerberos 5 (aka krb5) 1.6.3, when PK-INIT is used, allows remote attackers to cause a denial of service (application crash) via a crafted length value that triggers an erroneous malloc call, related to incorrect calculations with pointer arithmetic.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137331" comment="krb5-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137332" comment="krb5-32bit-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137333" comment="krb5-client-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137334" comment="krb5-devel-1.12.2-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0945</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-0945" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0945" source="CVE"/>
    <description>
    Array index error in the insertItemBefore method in WebKit, as used in Apple Safari before 3.2.3 and 4 Public Beta, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Google Chrome Stable before 1.0.154.65, and possibly other products allows remote attackers to execute arbitrary code via a document with a SVGPathList data structure containing a negative index in the (1) SVGTransformList, (2) SVGStringList, (3) SVGNumberList, (4) SVGPathSegList, (5) SVGPointList, or (6) SVGLengthList SVGList object, which triggers memory corruption.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137616" comment="libqt4-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137617" comment="libqt4-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137618" comment="libqt4-devel-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137619" comment="libqt4-linguist-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137620" comment="libqt4-qt3support-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137621" comment="libqt4-qt3support-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137622" comment="libqt4-sql-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137623" comment="libqt4-sql-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137624" comment="libqt4-sql-mysql-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137625" comment="libqt4-sql-mysql-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137626" comment="libqt4-sql-postgresql-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137627" comment="libqt4-sql-postgresql-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137628" comment="libqt4-sql-sqlite-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137629" comment="libqt4-sql-sqlite-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137630" comment="libqt4-sql-unixODBC-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137631" comment="libqt4-sql-unixODBC-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137632" comment="libqt4-x11-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137633" comment="libqt4-x11-32bit-4.8.6-4.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0946</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-0946" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0946" source="CVE"/>
    <description>
    Multiple integer overflows in FreeType 2.3.9 and earlier allow remote attackers to execute arbitrary code via vectors related to large values in certain inputs in (1) smooth/ftsmooth.c, (2) sfnt/ttcmap.c, and (3) cff/cffload.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137173" comment="freetype2-devel-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137176" comment="ft2demos-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137174" comment="libfreetype6-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137175" comment="libfreetype6-32bit-2.5.3-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1044</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1044" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1044" source="CVE"/>
    <description>
    Mozilla Firefox 3.0.7 on Windows 7 allows remote attackers to execute arbitrary code via unknown vectors related to the _moveToEdgeShift XUL tree method, which triggers garbage collection on objects that are still in use, as demonstrated by Nils during a PWN2OWN competition at CanSecWest 2009.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1169</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1169" source="CVE"/>
    <description>
    The txMozillaXSLTProcessor::TransformToDoc function in Mozilla Firefox before 3.0.8 and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XML file with a crafted XSLT transform.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1179</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1179" source="CVE"/>
    <description>
    Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137580" comment="libpoppler-cpp0-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137581" comment="libpoppler-devel-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137582" comment="libpoppler-glib8-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137583" comment="libpoppler-qt4-4-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137584" comment="libpoppler-qt4-devel-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137585" comment="libpoppler46-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137586" comment="poppler-tools-0.26.5-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1180</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1180" source="CVE"/>
    <description>
    The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file that triggers a free of invalid data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137580" comment="libpoppler-cpp0-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137581" comment="libpoppler-devel-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137582" comment="libpoppler-glib8-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137583" comment="libpoppler-qt4-4-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137584" comment="libpoppler-qt4-devel-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137585" comment="libpoppler46-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137586" comment="poppler-tools-0.26.5-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1181</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1181" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1181" source="CVE"/>
    <description>
    The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (crash) via a crafted PDF file that triggers a NULL pointer dereference.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137580" comment="libpoppler-cpp0-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137581" comment="libpoppler-devel-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137582" comment="libpoppler-glib8-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137583" comment="libpoppler-qt4-4-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137584" comment="libpoppler-qt4-devel-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137585" comment="libpoppler46-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137586" comment="poppler-tools-0.26.5-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1182</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1182" source="CVE"/>
    <description>
    Multiple buffer overflows in the JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allow remote attackers to execute arbitrary code via a crafted PDF file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137580" comment="libpoppler-cpp0-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137581" comment="libpoppler-devel-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137582" comment="libpoppler-glib8-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137583" comment="libpoppler-qt4-4-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137584" comment="libpoppler-qt4-devel-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137585" comment="libpoppler46-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137586" comment="poppler-tools-0.26.5-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1183</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1183" source="CVE"/>
    <description>
    The JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (infinite loop and hang) via a crafted PDF file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137580" comment="libpoppler-cpp0-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137581" comment="libpoppler-devel-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137582" comment="libpoppler-glib8-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137583" comment="libpoppler-qt4-4-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137584" comment="libpoppler-qt4-devel-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137585" comment="libpoppler46-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137586" comment="poppler-tools-0.26.5-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1187</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1187" source="CVE"/>
    <description>
    Integer overflow in the JBIG2 decoding feature in Poppler before 0.10.6 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to CairoOutputDev (CairoOutputDev.cc).
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137580" comment="libpoppler-cpp0-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137581" comment="libpoppler-devel-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137582" comment="libpoppler-glib8-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137583" comment="libpoppler-qt4-4-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137584" comment="libpoppler-qt4-devel-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137585" comment="libpoppler46-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137586" comment="poppler-tools-0.26.5-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1188</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1188" source="CVE"/>
    <description>
    Integer overflow in the JBIG2 decoding feature in the SplashBitmap::SplashBitmap function in SplashBitmap.cc in Xpdf 3.x before 3.02pl4 and Poppler before 0.10.6, as used in GPdf and kdegraphics KPDF, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted PDF document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137580" comment="libpoppler-cpp0-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137581" comment="libpoppler-devel-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137582" comment="libpoppler-glib8-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137583" comment="libpoppler-qt4-4-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137584" comment="libpoppler-qt4-devel-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137585" comment="libpoppler46-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137586" comment="poppler-tools-0.26.5-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1191</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1191" source="CVE"/>
    <description>
    mod_proxy_ajp.c in the mod_proxy_ajp module in the Apache HTTP Server 2.2.11 allows remote attackers to obtain sensitive response data, intended for a client that sent an earlier POST request with no request body, via an HTTP request.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136944" comment="apache2-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136945" comment="apache2-devel-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136946" comment="apache2-doc-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136947" comment="apache2-example-pages-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136948" comment="apache2-prefork-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136949" comment="apache2-utils-2.4.10-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1195</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1195" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1195" source="CVE"/>
    <description>
    The Apache HTTP Server 2.2.11 and earlier 2.2 versions does not properly handle Options=IncludesNOEXEC in the AllowOverride directive, which allows local users to gain privileges by configuring (1) Options Includes, (2) Options +Includes, or (3) Options +IncludesNOEXEC in a .htaccess file, and then inserting an exec element in a .shtml file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136944" comment="apache2-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136945" comment="apache2-devel-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136946" comment="apache2-doc-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136947" comment="apache2-example-pages-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136948" comment="apache2-prefork-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136949" comment="apache2-utils-2.4.10-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1210</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1210" source="CVE"/>
    <description>
    Format string vulnerability in the PROFINET/DCP (PN-DCP) dissector in Wireshark 1.0.6 and earlier allows remote attackers to execute arbitrary code via a PN-DCP packet with format string specifiers in the station name.  NOTE: some of these details are obtained from third party information.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1252</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1252" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1252" source="CVE"/>
    <description>
    Stack-based buffer overflow in the crypto_recv function in ntp_crypto.c in ntpd in NTP before 4.2.4p7 and 4.2.5 before 4.2.5p74, when OpenSSL and autokey are enabled, allows remote attackers to execute arbitrary code via a crafted packet containing an extension field.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137808" comment="ntp-4.2.6p5-25.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137809" comment="ntp-doc-4.2.6p5-25.2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1267</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1267" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1267" source="CVE"/>
    <description>
    Unspecified vulnerability in the LDAP dissector in Wireshark 0.99.2 through 1.0.6, when running on Windows, allows remote attackers to cause a denial of service (crash) via unknown attack vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1268</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1268" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1268" source="CVE"/>
    <description>
    The Check Point High-Availability Protocol (CPHAP) dissector in Wireshark 0.9.6 through 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted FWHA_MY_STATE packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1269</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1269" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1269" source="CVE"/>
    <description>
    Unspecified vulnerability in Wireshark 0.99.6 through 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted Tektronix .rf5 file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1273</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1273" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1273" source="CVE"/>
    <description>
    pam_ssh 1.92 and possibly other versions, as used when PAM is compiled with USE=ssh, generates different error messages depending on whether the username is valid or invalid, which makes it easier for remote attackers to enumerate usernames.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137827" comment="pam_ssh-2.0-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137828" comment="pam_ssh-32bit-2.0-2.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1302</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1302" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1302" source="CVE"/>
    <description>
    The browser engine in Mozilla Firefox 3.x before 3.0.9, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (application crash) and possibly trigger memory corruption via vectors related to (1) nsAsyncInstantiateEvent::Run, (2) nsStyleContext::Destroy, (3) nsComputedDOMStyle::GetWidth, (4) the xslt_attributeset_ImportSameName.html test case for the XSLT stylesheet compiler, (5) nsXULDocument::SynchronizeBroadcastListener, (6) IsBindingAncestor, (7) PL_DHashTableOperate and nsEditor::EndUpdateViewBatch, and (8) gfxSkipCharsIterator::SetOffsets, and other vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1303</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1303" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1303" source="CVE"/>
    <description>
    The browser engine in Mozilla Firefox before 3.0.9, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (application crash) and possibly trigger memory corruption via vectors related to nsSVGElement::BindToTree.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1304</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1304" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1304" source="CVE"/>
    <description>
    The JavaScript engine in Mozilla Firefox 3.x before 3.0.9, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (application crash) and possibly trigger memory corruption via vectors involving (1) js_FindPropertyHelper, related to the definitions of Math and Date; and (2) js_CheckRedeclaration.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1305</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1305" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1305" source="CVE"/>
    <description>
    The JavaScript engine in Mozilla Firefox before 3.0.9, Thunderbird before 2.0.0.22, and SeaMonkey before 1.1.16 allows remote attackers to cause a denial of service (application crash) and possibly trigger memory corruption via vectors involving JSOP_DEFVAR and properties that lack the JSPROP_PERMANENT attribute.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1306</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1306" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1306" source="CVE"/>
    <description>
    The jar: URI implementation in Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey does not follow the Content-Disposition header of the inner URI, which allows remote attackers to conduct cross-site scripting (XSS) attacks and possibly other attacks via an uploaded .jar file with a "Content-Disposition: attachment" designation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1307</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1307" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1307" source="CVE"/>
    <description>
    The view-source: URI implementation in Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey does not properly implement the Same Origin Policy, which allows remote attackers to (1) bypass crossdomain.xml restrictions and connect to arbitrary web sites via a Flash file; (2) read, create, or modify Local Shared Objects via a Flash file; or (3) bypass unspecified restrictions and render content via vectors involving a jar: URI.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1308</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1308" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1308" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey allows remote attackers to inject arbitrary web script or HTML via vectors involving XBL JavaScript bindings and remote stylesheets, as exploited in the wild by a March 2009 eBay listing.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1309</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1309" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1309" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.9, Thunderbird, and SeaMonkey do not properly implement the Same Origin Policy for (1) XMLHttpRequest, involving a mismatch for a document's principal, and (2) XPCNativeWrapper.toString, involving an incorrect __proto__ scope, which allows remote attackers to conduct cross-site scripting (XSS) attacks and possibly other attacks via a crafted document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1310</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1310" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1310" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the MozSearch plugin implementation in Mozilla Firefox before 3.0.9 allows user-assisted remote attackers to inject arbitrary web script or HTML via a javascript: URI in the SearchForm element.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1311</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1311" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1311" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.9 and SeaMonkey before 1.1.17 allow user-assisted remote attackers to obtain sensitive information via a web page with an embedded frame, which causes POST data from an outer page to be sent to the inner frame's URL during a SAVEMODE_FILEONLY save of the inner frame.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1312</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1312" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1312" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.9 and SeaMonkey 1.1.17 do not block javascript: URIs in Refresh headers in HTTP responses, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors related to (1) injecting a Refresh header or (2) specifying the content of a Refresh header. NOTE: it was later reported that Firefox 3.6 a1 pre and Mozilla 1.7.x and earlier are also affected.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1313</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1313" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1313" source="CVE"/>
    <description>
    The nsTextFrame::ClearTextRun function in layout/generic/nsTextFrameThebes.cpp in Mozilla Firefox 3.0.9 allows remote attackers to cause a denial of service (memory corruption) and probably execute arbitrary code via unspecified vectors.  NOTE: this vulnerability reportedly exists because of an incorrect fix for CVE-2009-1302.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1377</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1377" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1377" source="CVE"/>
    <description>
    The dtls1_buffer_record function in ssl/d1_pkt.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allows remote attackers to cause a denial of service (memory consumption) via a large series of "future epoch" DTLS records that are buffered in a queue, aka "DTLS record buffer limitation bug."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1378</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1378" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1378" source="CVE"/>
    <description>
    Multiple memory leaks in the dtls1_process_out_of_seq_message function in ssl/d1_both.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allow remote attackers to cause a denial of service (memory consumption) via DTLS records that (1) are duplicates or (2) have sequence numbers much greater than current sequence numbers, aka "DTLS fragment handling memory leak."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1379</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1379" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1379" source="CVE"/>
    <description>
    Use-after-free vulnerability in the dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL 1.0.0 Beta 2 allows remote attackers to cause a denial of service (openssl s_client crash) and possibly have unspecified other impact via a DTLS packet, as demonstrated by a packet from a server that uses a crafted server certificate.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1384</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1384" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1384" source="CVE"/>
    <description>
    pam_krb5 2.2.14 through 2.3.4, as used in Red Hat Enterprise Linux (RHEL) 5, generates different password prompts depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137825" comment="pam_krb5-2.4.4-5.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137826" comment="pam_krb5-32bit-2.4.4-5.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1386</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1386" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1386" source="CVE"/>
    <description>
    ssl/s3_pkt.c in OpenSSL before 0.9.8i allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a DTLS ChangeCipherSpec packet that occurs before ClientHello.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1387</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1387" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1387" source="CVE"/>
    <description>
    The dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL before 1.0.0 Beta 2 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence DTLS handshake message, related to a "fragment bug."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1563</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1563" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2009-0689.  Reason: This candidate is a duplicate of CVE-2009-0689.  Certain codebase relationships were not originally clear.  Notes: All CVE users should reference CVE-2009-0689 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1571</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1571" source="CVE"/>
    <description>
    Use-after-free vulnerability in the HTML parser in Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, Thunderbird before 3.0.2, and SeaMonkey before 2.0.3 allows remote attackers to execute arbitrary code via unspecified method calls that attempt to access freed objects in low-memory situations.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1720</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1720" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1720" source="CVE"/>
    <description>
    Multiple integer overflows in OpenEXR 1.2.2 and 1.6.1 allow context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unspecified vectors that trigger heap-based buffer overflows, related to (1) the Imf::PreviewImage::PreviewImage function and (2) compressor constructors.  NOTE: some of these details are obtained from third party information.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137339" comment="libIlmImf-Imf_2_1-21-2.1.0-5.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137340" comment="openexr-devel-2.1.0-5.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1721</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1721" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1721" source="CVE"/>
    <description>
    The decompression implementation in the Imf::hufUncompress function in OpenEXR 1.2.2 and 1.6.1 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger a free of an uninitialized pointer.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137339" comment="libIlmImf-Imf_2_1-21-2.1.0-5.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137340" comment="openexr-devel-2.1.0-5.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1882</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1882" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1882" source="CVE"/>
    <description>
    Integer overflow in the XMakeImage function in magick/xwindow.c in ImageMagick 6.5.2-8, and GraphicsMagick, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF file, which triggers a buffer overflow.  NOTE: some of these details are obtained from third party information.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136909" comment="GraphicsMagick-devel-1.3.20-1.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136910" comment="libGraphicsMagick-Q16-3-1.3.20-1.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136911" comment="libGraphicsMagick3-config-1.3.20-1.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136912" comment="libGraphicsMagickWand-Q16-2-1.3.20-1.6 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1885</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1885" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1885" source="CVE"/>
    <description>
    Stack consumption vulnerability in validators/DTD/DTDScanner.cpp in Apache Xerces C++ 2.7.0 and 2.8.0 allows context-dependent attackers to cause a denial of service (application crash) via vectors involving nested parentheses and invalid byte values in "simply nested DTD structures," as demonstrated by the Codenomicon XML fuzzing framework.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137789" comment="libxerces-c-3_1-3.1.1-13.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1886</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1886" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1886" source="CVE"/>
    <description>
    Multiple format string vulnerabilities in client/client.c in smbclient in Samba 3.2.0 through 3.2.12 might allow context-dependent attackers to execute arbitrary code via format string specifiers in a filename.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137055" comment="cifs-utils-6.4-3.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137424" comment="libdcerpc-binding0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137425" comment="libdcerpc-binding0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137426" comment="libdcerpc0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137427" comment="libdcerpc0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137428" comment="libgensec0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137429" comment="libgensec0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137430" comment="libndr-krb5pac0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137431" comment="libndr-krb5pac0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137432" comment="libndr-nbt0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137433" comment="libndr-nbt0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137434" comment="libndr-standard0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137435" comment="libndr-standard0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137436" comment="libndr0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137437" comment="libndr0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137438" comment="libnetapi0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137439" comment="libnetapi0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137440" comment="libpdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137441" comment="libpdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137442" comment="libregistry0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137443" comment="libsamba-credentials0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137444" comment="libsamba-credentials0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137445" comment="libsamba-hostconfig0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137446" comment="libsamba-hostconfig0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137447" comment="libsamba-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137448" comment="libsamba-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137449" comment="libsamdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137450" comment="libsamdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137451" comment="libsmbclient-devel-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137452" comment="libsmbclient-raw0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137453" comment="libsmbclient-raw0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137454" comment="libsmbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137455" comment="libsmbconf0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137456" comment="libsmbconf0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137457" comment="libsmbldap0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137458" comment="libsmbldap0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137459" comment="libtevent-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137460" comment="libtevent-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137461" comment="libwbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137462" comment="libwbclient0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137463" comment="samba-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137464" comment="samba-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137465" comment="samba-client-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137466" comment="samba-client-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137467" comment="samba-doc-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137468" comment="samba-libs-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137469" comment="samba-libs-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137470" comment="samba-winbind-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137471" comment="samba-winbind-32bit-4.1.12-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1888</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1888" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1888" source="CVE"/>
    <description>
    The acl_group_override function in smbd/posix_acls.c in smbd in Samba 3.0.x before 3.0.35, 3.1.x and 3.2.x before 3.2.13, and 3.3.x before 3.3.6, when dos filemode is enabled, allows remote attackers to modify access control lists for files via vectors related to read access to uninitialized memory.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137055" comment="cifs-utils-6.4-3.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137424" comment="libdcerpc-binding0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137425" comment="libdcerpc-binding0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137426" comment="libdcerpc0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137427" comment="libdcerpc0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137428" comment="libgensec0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137429" comment="libgensec0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137430" comment="libndr-krb5pac0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137431" comment="libndr-krb5pac0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137432" comment="libndr-nbt0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137433" comment="libndr-nbt0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137434" comment="libndr-standard0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137435" comment="libndr-standard0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137436" comment="libndr0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137437" comment="libndr0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137438" comment="libnetapi0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137439" comment="libnetapi0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137440" comment="libpdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137441" comment="libpdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137442" comment="libregistry0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137443" comment="libsamba-credentials0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137444" comment="libsamba-credentials0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137445" comment="libsamba-hostconfig0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137446" comment="libsamba-hostconfig0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137447" comment="libsamba-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137448" comment="libsamba-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137449" comment="libsamdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137450" comment="libsamdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137451" comment="libsmbclient-devel-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137452" comment="libsmbclient-raw0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137453" comment="libsmbclient-raw0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137454" comment="libsmbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137455" comment="libsmbconf0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137456" comment="libsmbconf0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137457" comment="libsmbldap0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137458" comment="libsmbldap0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137459" comment="libtevent-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137460" comment="libtevent-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137461" comment="libwbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137462" comment="libwbclient0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137463" comment="samba-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137464" comment="samba-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137465" comment="samba-client-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137466" comment="samba-client-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137467" comment="samba-doc-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137468" comment="samba-libs-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137469" comment="samba-libs-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137470" comment="samba-winbind-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137471" comment="samba-winbind-32bit-4.1.12-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1890</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1890" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1890" source="CVE"/>
    <description>
    The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server before 2.3.3, when a reverse proxy is configured, does not properly handle an amount of streamed data that exceeds the Content-Length value, which allows remote attackers to cause a denial of service (CPU consumption) via crafted requests.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136944" comment="apache2-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136945" comment="apache2-devel-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136946" comment="apache2-doc-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136947" comment="apache2-example-pages-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136948" comment="apache2-prefork-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136949" comment="apache2-utils-2.4.10-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1891</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1891" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1891" source="CVE"/>
    <description>
    The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136944" comment="apache2-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136945" comment="apache2-devel-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136946" comment="apache2-doc-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136947" comment="apache2-example-pages-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136948" comment="apache2-prefork-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136949" comment="apache2-utils-2.4.10-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1892</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1892" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1892" source="CVE"/>
    <description>
    dhcpd in ISC DHCP 3.0.4 and 3.1.1, when the dhcp-client-identifier and hardware ethernet configuration settings are both used, allows remote attackers to cause a denial of service (daemon crash) via unspecified requests.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137130" comment="dhcp-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137131" comment="dhcp-client-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137132" comment="dhcp-doc-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137133" comment="dhcp-relay-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137134" comment="dhcp-server-4.2.6-9.2.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1955</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1955" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1955" source="CVE"/>
    <description>
    The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in Apache APR-util before 1.3.7, as used in the mod_dav and mod_dav_svn modules in the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document containing a large number of nested entity references, as demonstrated by a PROPFIND request, a similar issue to CVE-2003-1564.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136944" comment="apache2-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136945" comment="apache2-devel-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136946" comment="apache2-doc-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136947" comment="apache2-example-pages-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136948" comment="apache2-prefork-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136949" comment="apache2-utils-2.4.10-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1956</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1956" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1956" source="CVE"/>
    <description>
    Off-by-one error in the apr_brigade_vprintf function in Apache APR-util before 1.3.5 on big-endian platforms allows remote attackers to obtain sensitive information or cause a denial of service (application crash) via crafted input.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136944" comment="apache2-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136945" comment="apache2-devel-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136946" comment="apache2-doc-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136947" comment="apache2-example-pages-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136948" comment="apache2-prefork-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136949" comment="apache2-utils-2.4.10-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1959</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-1959" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1959" source="CVE"/>
    <description>
    Off-by-one error in the event_wallops function in fe-common/irc/fe-events.c in irssi 0.8.13 allows remote IRC servers to cause a denial of service (crash) via an empty command, which triggers a one-byte buffer under-read and a one-byte buffer underflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137279" comment="irssi-0.8.16-3.2.3 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2285</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-2285" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2285" source="CVE"/>
    <description>
    Buffer underflow in the LZWDecodeCompat function in libtiff 3.8.2 allows context-dependent attackers to cause a denial of service (crash) via a crafted TIFF image, a different vulnerability than CVE-2008-2327.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137719" comment="libtiff-devel-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137720" comment="libtiff5-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137721" comment="libtiff5-32bit-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137722" comment="tiff-4.0.3-10.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2347</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-2347" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2347" source="CVE"/>
    <description>
    Multiple integer overflows in inter-color spaces conversion tools in libtiff 3.8 through 3.8.2, 3.9, and 4.0 allow context-dependent attackers to execute arbitrary code via a TIFF image with large (1) width and (2) height values, which triggers a heap-based buffer overflow in the (a) cvt_whole_image function in tiff2rgba and (b) tiffcvt function in rgb2ycbcr.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137719" comment="libtiff-devel-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137720" comment="libtiff5-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137721" comment="libtiff5-32bit-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137722" comment="tiff-4.0.3-10.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2411</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-2411" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2411" source="CVE"/>
    <description>
    Multiple integer overflows in the libsvn_delta library in Subversion before 1.5.7, and 1.6.x before 1.6.4, allow remote authenticated users and remote Subversion servers to execute arbitrary code via an svndiff stream with large windows that trigger a heap-based buffer overflow, a related issue to CVE-2009-2412.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137877" comment="subversion-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137878" comment="subversion-devel-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137879" comment="subversion-perl-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137880" comment="subversion-python-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137881" comment="subversion-server-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137882" comment="subversion-tools-1.8.10-2.4.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2412</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-2412" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2412" source="CVE"/>
    <description>
    Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows.  NOTE: some of these details are obtained from third party information.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136944" comment="apache2-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136945" comment="apache2-devel-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136946" comment="apache2-doc-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136947" comment="apache2-example-pages-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136948" comment="apache2-prefork-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136949" comment="apache2-utils-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137392" comment="libapr-util1-1.5.3-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137393" comment="libapr-util1-devel-1.5.3-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137394" comment="libapr1-1.5.1-4.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137395" comment="libapr1-devel-1.5.1-4.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2417</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-2417" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2417" source="CVE"/>
    <description>
    lib/ssluse.c in cURL and libcurl 7.4 through 7.19.5, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137106" comment="curl-7.38.0-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137107" comment="libcurl-devel-7.38.0-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137108" comment="libcurl4-7.38.0-1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2470</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-2470" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2470" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.12, and 3.5.x before 3.5.2, allows remote SOCKS5 proxy servers to cause a denial of service (data stream corruption) via a long domain name in a reply.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2473</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-2473" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2473" source="CVE"/>
    <description>
    neon before 0.28.6, when expat is used, does not properly detect recursion during entity expansion, which allows context-dependent attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document containing a large number of nested entity references, a similar issue to CVE-2003-1564.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137555" comment="libneon27-0.30.0-4.1.3 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2474</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-2474" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2474" source="CVE"/>
    <description>
    neon before 0.28.6, when OpenSSL or GnuTLS is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137555" comment="libneon27-0.30.0-4.1.3 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2624</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-2624" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2624" source="CVE"/>
    <description>
    The huft_build function in inflate.c in gzip before 1.3.13 creates a hufts (aka huffman) table that is too small, which allows remote attackers to cause a denial of service (application crash or infinite loop) or possibly execute arbitrary code via a crafted archive.  NOTE: this issue is caused by a CVE-2006-4334 regression.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137266" comment="gzip-1.6-8.1.8 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2625</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-2625" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2625" source="CVE"/>
    <description>
    XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137160" comment="expat-2.1.0-14.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137161" comment="libexpat-devel-2.1.0-14.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137162" comment="libexpat1-2.1.0-14.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137163" comment="libexpat1-32bit-2.1.0-14.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2654</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-2654" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2654" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.13, and 3.5.x before 3.5.2, allows remote attackers to spoof the address bar, and possibly conduct phishing attacks, via a crafted web page that calls window.open with an invalid character in the URL, makes document.write calls to the resulting object, and then calls the stop method during the loading of the error page.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2666</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-2666" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2666" source="CVE"/>
    <description>
    socket.c in fetchmail before 6.3.11 does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137164" comment="fetchmail-6.3.26-6.1.4 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2694</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-2694" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2694" source="CVE"/>
    <description>
    The msn_slplink_process_msg function in libpurple/protocols/msn/slplink.c in libpurple, as used in Pidgin (formerly Gaim) before 2.5.9 and Adium 1.3.5 and earlier, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) by sending multiple crafted SLP (aka MSNSLP) messages to trigger an overwrite of an arbitrary memory location.  NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-1376.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137605" comment="libpurple-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137606" comment="libpurple-meanwhile-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137607" comment="libpurple-tcl-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137608" comment="pidgin-2.10.9-5.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2699</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-2699" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2699" source="CVE"/>
    <description>
    The Solaris pollset feature in the Event Port backend in poll/unix/port.c in the Apache Portable Runtime (APR) library before 1.3.9, as used in the Apache HTTP Server before 2.2.14 and other products, does not properly handle errors, which allows remote attackers to cause a denial of service (daemon hang) via unspecified HTTP requests, related to the prefork and event MPMs.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136944" comment="apache2-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136945" comment="apache2-devel-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136946" comment="apache2-doc-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136947" comment="apache2-example-pages-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136948" comment="apache2-prefork-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136949" comment="apache2-utils-2.4.10-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2703</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-2703" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2703" source="CVE"/>
    <description>
    libpurple/protocols/irc/msgs.c in the IRC protocol plugin in libpurple in Pidgin before 2.6.2 allows remote IRC servers to cause a denial of service (NULL pointer dereference and application crash) via a TOPIC message that lacks a topic string.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137605" comment="libpurple-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137606" comment="libpurple-meanwhile-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137607" comment="libpurple-tcl-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137608" comment="pidgin-2.10.9-5.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2813</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-2813" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2813" source="CVE"/>
    <description>
    Samba 3.4 before 3.4.2, 3.3 before 3.3.8, 3.2 before 3.2.15, and 3.0.12 through 3.0.36, as used in the SMB subsystem in Apple Mac OS X 10.5.8 when Windows File Sharing is enabled, Fedora 11, and other operating systems, does not properly handle errors in resolving pathnames, which allows remote authenticated users to bypass intended sharing restrictions, and read, create, or modify files, in certain circumstances involving user accounts that lack home directories.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137055" comment="cifs-utils-6.4-3.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137424" comment="libdcerpc-binding0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137425" comment="libdcerpc-binding0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137426" comment="libdcerpc0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137427" comment="libdcerpc0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137428" comment="libgensec0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137429" comment="libgensec0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137430" comment="libndr-krb5pac0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137431" comment="libndr-krb5pac0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137432" comment="libndr-nbt0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137433" comment="libndr-nbt0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137434" comment="libndr-standard0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137435" comment="libndr-standard0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137436" comment="libndr0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137437" comment="libndr0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137438" comment="libnetapi0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137439" comment="libnetapi0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137440" comment="libpdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137441" comment="libpdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137442" comment="libregistry0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137443" comment="libsamba-credentials0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137444" comment="libsamba-credentials0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137445" comment="libsamba-hostconfig0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137446" comment="libsamba-hostconfig0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137447" comment="libsamba-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137448" comment="libsamba-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137449" comment="libsamdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137450" comment="libsamdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137451" comment="libsmbclient-devel-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137452" comment="libsmbclient-raw0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137453" comment="libsmbclient-raw0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137454" comment="libsmbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137455" comment="libsmbconf0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137456" comment="libsmbconf0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137457" comment="libsmbldap0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137458" comment="libsmbldap0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137459" comment="libtevent-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137460" comment="libtevent-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137461" comment="libwbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137462" comment="libwbclient0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137463" comment="samba-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137464" comment="samba-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137465" comment="samba-client-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137466" comment="samba-client-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137467" comment="samba-doc-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137468" comment="samba-libs-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137469" comment="samba-libs-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137470" comment="samba-winbind-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137471" comment="samba-winbind-32bit-4.1.12-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2820</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-2820" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2820" source="CVE"/>
    <description>
    The web interface in CUPS before 1.4.2, as used on Apple Mac OS X before 10.6.2 and other platforms, does not properly handle (1) HTTP headers and (2) HTML templates, which allows remote attackers to conduct cross-site scripting (XSS) attacks and HTTP response splitting attacks via vectors related to (a) the product's web interface, (b) the configuration of the print system, and (c) the titles of printed jobs, as demonstrated by an XSS attack that uses the kerberos parameter to the admin program, and leverages attribute injection and HTTP Parameter Pollution (HPP) issues.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137098" comment="cups-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137099" comment="cups-client-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137100" comment="cups-devel-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137101" comment="cups-libs-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137102" comment="cups-libs-32bit-1.5.4-21.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2905</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-2905" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2905" source="CVE"/>
    <description>
    Heap-based buffer overflow in textbox.c in newt 0.51.5, 0.51.6, and 0.52.2 allows local users to cause a denial of service (application crash) or possibly execute arbitrary code via a request to display a crafted text dialog box.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137556" comment="libnewt0_52-0.52.16-2.1.3 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2906</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-2906" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2906" source="CVE"/>
    <description>
    smbd in Samba 3.0 before 3.0.37, 3.2 before 3.2.15, 3.3 before 3.3.8, and 3.4 before 3.4.2 allows remote authenticated users to cause a denial of service (infinite loop) via an unanticipated oplock break notification reply packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137055" comment="cifs-utils-6.4-3.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137424" comment="libdcerpc-binding0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137425" comment="libdcerpc-binding0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137426" comment="libdcerpc0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137427" comment="libdcerpc0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137428" comment="libgensec0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137429" comment="libgensec0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137430" comment="libndr-krb5pac0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137431" comment="libndr-krb5pac0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137432" comment="libndr-nbt0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137433" comment="libndr-nbt0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137434" comment="libndr-standard0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137435" comment="libndr-standard0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137436" comment="libndr0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137437" comment="libndr0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137438" comment="libnetapi0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137439" comment="libnetapi0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137440" comment="libpdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137441" comment="libpdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137442" comment="libregistry0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137443" comment="libsamba-credentials0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137444" comment="libsamba-credentials0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137445" comment="libsamba-hostconfig0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137446" comment="libsamba-hostconfig0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137447" comment="libsamba-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137448" comment="libsamba-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137449" comment="libsamdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137450" comment="libsamdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137451" comment="libsmbclient-devel-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137452" comment="libsmbclient-raw0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137453" comment="libsmbclient-raw0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137454" comment="libsmbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137455" comment="libsmbconf0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137456" comment="libsmbconf0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137457" comment="libsmbldap0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137458" comment="libsmbldap0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137459" comment="libtevent-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137460" comment="libtevent-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137461" comment="libwbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137462" comment="libwbclient0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137463" comment="samba-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137464" comment="samba-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137465" comment="samba-client-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137466" comment="samba-client-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137467" comment="samba-doc-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137468" comment="samba-libs-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137469" comment="samba-libs-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137470" comment="samba-winbind-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137471" comment="samba-winbind-32bit-4.1.12-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2948</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-2948" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2948" source="CVE"/>
    <description>
    mount.cifs in Samba 3.0 before 3.0.37, 3.2 before 3.2.15, 3.3 before 3.3.8 and 3.4 before 3.4.2, when mount.cifs is installed suid root, does not properly enforce permissions, which allows local users to read part of the credentials file and obtain the password by specifying the path to the credentials file and using the --verbose or -v option.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137055" comment="cifs-utils-6.4-3.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137424" comment="libdcerpc-binding0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137425" comment="libdcerpc-binding0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137426" comment="libdcerpc0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137427" comment="libdcerpc0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137428" comment="libgensec0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137429" comment="libgensec0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137430" comment="libndr-krb5pac0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137431" comment="libndr-krb5pac0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137432" comment="libndr-nbt0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137433" comment="libndr-nbt0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137434" comment="libndr-standard0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137435" comment="libndr-standard0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137436" comment="libndr0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137437" comment="libndr0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137438" comment="libnetapi0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137439" comment="libnetapi0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137440" comment="libpdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137441" comment="libpdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137442" comment="libregistry0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137443" comment="libsamba-credentials0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137444" comment="libsamba-credentials0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137445" comment="libsamba-hostconfig0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137446" comment="libsamba-hostconfig0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137447" comment="libsamba-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137448" comment="libsamba-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137449" comment="libsamdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137450" comment="libsamdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137451" comment="libsmbclient-devel-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137452" comment="libsmbclient-raw0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137453" comment="libsmbclient-raw0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137454" comment="libsmbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137455" comment="libsmbconf0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137456" comment="libsmbconf0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137457" comment="libsmbldap0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137458" comment="libsmbldap0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137459" comment="libtevent-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137460" comment="libtevent-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137461" comment="libwbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137462" comment="libwbclient0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137463" comment="samba-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137464" comment="samba-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137465" comment="samba-client-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137466" comment="samba-client-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137467" comment="samba-doc-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137468" comment="samba-libs-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137469" comment="samba-libs-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137470" comment="samba-winbind-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137471" comment="samba-winbind-32bit-4.1.12-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3026</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3026" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3026" source="CVE"/>
    <description>
    protocols/jabber/auth.c in libpurple in Pidgin 2.6.0, and possibly other versions, does not follow the "require TLS/SSL" preference when connecting to older Jabber servers that do not follow the XMPP specification, which causes libpurple to connect to the server without the expected encryption and allows remote attackers to sniff sessions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137605" comment="libpurple-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137606" comment="libpurple-meanwhile-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137607" comment="libpurple-tcl-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137608" comment="pidgin-2.10.9-5.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3050</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3050" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3050" source="CVE"/>
    <description>
    Buffer overflow in the set_page_size function in util.cxx in HTMLDOC 1.8.27 and earlier allows context-dependent attackers to execute arbitrary code via a long MEDIA SIZE comment.  NOTE: it was later reported that there were additional vectors in htmllib.cxx and ps-pdf.cxx using an AFM font file with a long glyph name, but these vectors do not cross privilege boundaries.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137271" comment="htmldoc-1.8.27-196.1.8 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3069</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3069" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3069" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.3 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3070</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3070" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3070" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3071</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3071" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3071" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.14, and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3072</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3072" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3072" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.14 and 3.5.x before 3.5.3, Thunderbird before 2.0.0.24, and SeaMonkey before 1.1.19 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the BinHex decoder in netwerk/streamconv/converters/nsBinHexDecoder.cpp, and unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3073</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3073" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3073" source="CVE"/>
    <description>
    Unspecified vulnerability in the JavaScript engine in Mozilla Firefox 3.5.x before 3.5.3 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3074</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3074" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3074" source="CVE"/>
    <description>
    Unspecified vulnerability in the JavaScript engine in Mozilla Firefox before 3.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3075</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3075" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3075" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox before 3.0.14 and 3.5.x before 3.5.2, Thunderbird before 2.0.0.24, and SeaMonkey before 1.1.19 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to use of mutable strings in the js_StringReplaceHelper function in js/src/jsstr.cpp, and unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3077</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3077" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.14, and 3.5.x before 3.5.3, does not properly manage pointers for the columns (aka TreeColumns) of a XUL tree element, which allows remote attackers to execute arbitrary code via a crafted HTML document, related to a "dangling pointer vulnerability."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3078</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3078" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3078" source="CVE"/>
    <description>
    Visual truncation vulnerability in Mozilla Firefox before 3.0.14, and 3.5.x before 3.5.3, allows remote attackers to trigger a vertical scroll and spoof URLs via unspecified Unicode characters with a tall line-height property.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3079</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3079" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3079" source="CVE"/>
    <description>
    Unspecified vulnerability in Mozilla Firefox before 3.0.14, and 3.5.x before 3.5.3, allows remote attackers to execute arbitrary JavaScript with chrome privileges via vectors involving an object, the FeedWriter, and the BrowserFeedWriter.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3083</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3083" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3083" source="CVE"/>
    <description>
    The msn_slp_sip_recv function in libpurple/protocols/msn/slp.c in the MSN protocol plugin in libpurple in Pidgin before 2.6.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an SLP invite message that lacks certain required fields, as demonstrated by a malformed message from a KMess client.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137605" comment="libpurple-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137606" comment="libpurple-meanwhile-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137607" comment="libpurple-tcl-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137608" comment="pidgin-2.10.9-5.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3084</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3084" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3084" source="CVE"/>
    <description>
    The msn_slp_process_msg function in libpurple/protocols/msn/slpcall.c in the MSN protocol plugin in libpurple 2.6.0 and 2.6.1, as used in Pidgin before 2.6.2, allows remote attackers to cause a denial of service (application crash) via a handwritten (aka Ink) message, related to an uninitialized variable and the incorrect "UTF16-LE" charset name.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137605" comment="libpurple-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137606" comment="libpurple-meanwhile-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137607" comment="libpurple-tcl-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137608" comment="pidgin-2.10.9-5.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3085</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3085" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3085" source="CVE"/>
    <description>
    The XMPP protocol plugin in libpurple in Pidgin before 2.6.2 does not properly handle an error IQ stanza during an attempted fetch of a custom smiley, which allows remote attackers to cause a denial of service (application crash) via XHTML-IM content with cid: images.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137605" comment="libpurple-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137606" comment="libpurple-meanwhile-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137607" comment="libpurple-tcl-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137608" comment="pidgin-2.10.9-5.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3094</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3094" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3094" source="CVE"/>
    <description>
    The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136944" comment="apache2-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136945" comment="apache2-devel-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136946" comment="apache2-doc-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136947" comment="apache2-example-pages-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136948" comment="apache2-prefork-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136949" comment="apache2-utils-2.4.10-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3095</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3095" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3095" source="CVE"/>
    <description>
    The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass intended access restrictions and send arbitrary commands to an FTP server via vectors related to the embedding of these commands in the Authorization HTTP header, as demonstrated by a certain module in VulnDisco Pack Professional 8.11.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136944" comment="apache2-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136945" comment="apache2-devel-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136946" comment="apache2-doc-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136947" comment="apache2-example-pages-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136948" comment="apache2-prefork-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136949" comment="apache2-utils-2.4.10-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3235</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3235" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3235" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in the Sieve plugin in Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, as derived from Cyrus libsieve, allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SIEVE script, as demonstrated by forwarding an e-mail message to a large number of recipients, a different vulnerability than CVE-2009-2632.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137110" comment="cyradm-2.4.17-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137111" comment="cyrus-imapd-2.4.17-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137112" comment="perl-Cyrus-IMAP-2.4.17-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137113" comment="perl-Cyrus-SIEVE-managesieve-2.4.17-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3241</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3241" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3241" source="CVE"/>
    <description>
    Unspecified vulnerability in the OpcUa (OPC UA) dissector in Wireshark 0.99.6 through 1.0.8 and 1.2.0 through 1.2.1 allows remote attackers to cause a denial of service (memory and CPU consumption) via malformed OPCUA Service CallRequest packets.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3242</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3242" source="CVE"/>
    <description>
    Unspecified vulnerability in packet.c in the GSM A RR dissector in Wireshark 1.2.0 and 1.2.1 allows remote attackers to cause a denial of service (application crash) via unknown vectors related to "an uninitialized dissector handle," which triggers an assertion failure.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3243</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3243" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3243" source="CVE"/>
    <description>
    Unspecified vulnerability in the TLS dissector in Wireshark 1.2.0 and 1.2.1, when running on Windows, allows remote attackers to cause a denial of service (application crash) via unknown vectors related to TLS 1.2 conversations.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3274</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3274" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3274" source="CVE"/>
    <description>
    Mozilla Firefox 3.6a1, 3.5.3, 3.5.2, and earlier 3.5.x versions, and 3.0.14 and earlier 2.x and 3.x versions, on Linux uses a predictable /tmp pathname for files selected from the Downloads window, which allows local users to replace an arbitrary downloaded file by placing a file in a /tmp location before the download occurs, related to the Download Manager component. NOTE: some of these details are obtained from third party information.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3295</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3295" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3295" source="CVE"/>
    <description>
    The prep_reprocess_req function in kdc/do_tgs_req.c in the cross-realm referral implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 before 1.7.1 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a ticket request.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137331" comment="krb5-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137332" comment="krb5-32bit-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137333" comment="krb5-client-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137334" comment="krb5-devel-1.12.2-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3297</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3297" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3297" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2010-0787, CVE-2010-0788, CVE-2010-0789.  Reason: this candidate was intended for one issue in Samba, but it was used for multiple distinct issues, including one in FUSE and one in ncpfs.  Notes: All CVE users should consult CVE-2010-0787 (Samba), CVE-2010-0788 (ncpfs), and CVE-2010-0789 (FUSE) to determine which ID is appropriate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137177" comment="fuse-2.9.3-4.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137178" comment="libfuse2-2.9.3-4.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3370</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3370" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3370" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.15, and 3.5.x before 3.5.4, allows remote attackers to read form history by forging mouse and keyboard events that leverage the auto-fill feature to populate form fields, in an attacker-readable form, with history entries.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3371</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3371" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3371" source="CVE"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox 3.5.x before 3.5.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code by creating JavaScript web-workers recursively.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3372</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3372" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3372" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.15 and 3.5.x before 3.5.4, and SeaMonkey before 2.0, allows remote attackers to execute arbitrary code via a crafted regular expression in a Proxy Auto-configuration (PAC) file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3373</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3373" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3373" source="CVE"/>
    <description>
    Heap-based buffer overflow in the GIF image parser in Mozilla Firefox before 3.0.15 and 3.5.x before 3.5.4, and SeaMonkey before 2.0, allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3374</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3374" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3374" source="CVE"/>
    <description>
    The XPCVariant::VariantDataToJS function in the XPCOM implementation in Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4 does not enforce intended restrictions on interaction between chrome privileged code and objects obtained from remote web sites, which allows remote attackers to execute arbitrary JavaScript with chrome privileges via unspecified method calls, related to "doubly-wrapped objects."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3375</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3375" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3375" source="CVE"/>
    <description>
    content/html/document/src/nsHTMLDocument.cpp in Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4 allows user-assisted remote attackers to bypass the Same Origin Policy and read an arbitrary content selection via the document.getSelection function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3376</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3376" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3376" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.15 and 3.5.x before 3.5.4, and SeaMonkey before 2.0, does not properly handle a right-to-left override (aka RLO or U+202E) Unicode character in a download filename, which allows remote attackers to spoof file extensions via a crafted filename, as demonstrated by displaying a non-executable extension for an executable file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3377</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3377" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3377" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in liboggz before cf5feeaab69b05e24, as used in Mozilla Firefox 3.5.x before 3.5.4, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3378</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3378" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3378" source="CVE"/>
    <description>
    The oggplay_data_handle_theora_frame function in media/liboggplay/src/liboggplay/oggplay_data.c in liboggplay, as used in Mozilla Firefox 3.5.x before 3.5.4, attempts to reuse an earlier frame data structure upon encountering a decoding error for the first frame, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly execute arbitrary code via a crafted .ogg video file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3379</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3379" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3379" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in libvorbis, as used in Mozilla Firefox 3.5.x before 3.5.4, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.  NOTE: this might overlap CVE-2009-2663.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137745" comment="libvorbis-devel-1.3.4-3.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137746" comment="libvorbis0-1.3.4-3.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137747" comment="libvorbis0-32bit-1.3.4-3.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137748" comment="libvorbisenc2-1.3.4-3.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137749" comment="libvorbisenc2-32bit-1.3.4-3.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137750" comment="libvorbisfile3-1.3.4-3.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137751" comment="libvorbisfile3-32bit-1.3.4-3.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3380</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3380" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3380" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3381</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3381" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3381" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3383</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3383" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3383" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox 3.5.x before 3.5.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3388</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3388" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3388" source="CVE"/>
    <description>
    liboggplay in Mozilla Firefox 3.5.x before 3.5.6 and SeaMonkey before 2.0.1 might allow context-dependent attackers to cause a denial of service (application crash) or execute arbitrary code via unspecified vectors, related to "memory safety issues."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3389</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3389" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3389" source="CVE"/>
    <description>
    Integer overflow in libtheora in Xiph.Org Theora before 1.1, as used in Mozilla Firefox 3.5 before 3.5.6 and SeaMonkey before 2.0.1, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a video with large dimensions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3553</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3553" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3553" source="CVE"/>
    <description>
    Use-after-free vulnerability in the abstract file-descriptor handling interface in the cupsdDoSelect function in scheduler/select.c in the scheduler in cupsd in CUPS 1.3.7 and 1.3.10 allows remote attackers to cause a denial of service (daemon crash or hang) via a client disconnection during listing of a large number of print jobs, related to improperly maintaining a reference count.  NOTE: some of these details are obtained from third party information.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137098" comment="cups-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137099" comment="cups-client-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137100" comment="cups-devel-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137101" comment="cups-libs-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137102" comment="cups-libs-32bit-1.5.4-21.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3555</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555" source="CVE"/>
    <description>
    The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136944" comment="apache2-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136945" comment="apache2-devel-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136946" comment="apache2-doc-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136947" comment="apache2-example-pages-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136948" comment="apache2-prefork-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136949" comment="apache2-utils-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3560</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3560" source="CVE"/>
    <description>
    The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136944" comment="apache2-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136945" comment="apache2-devel-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136946" comment="apache2-doc-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136947" comment="apache2-example-pages-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136948" comment="apache2-prefork-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136949" comment="apache2-utils-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137160" comment="expat-2.1.0-14.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137392" comment="libapr-util1-1.5.3-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137393" comment="libapr-util1-devel-1.5.3-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137161" comment="libexpat-devel-2.1.0-14.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137162" comment="libexpat1-2.1.0-14.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137163" comment="libexpat1-32bit-2.1.0-14.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3607</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3607" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3607" source="CVE"/>
    <description>
    Integer overflow in the create_surface_from_thumbnail_data function in glib/poppler-page.cc in Poppler 0.x allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.  NOTE: some of these details are obtained from third party information.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137580" comment="libpoppler-cpp0-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137581" comment="libpoppler-devel-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137582" comment="libpoppler-glib8-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137583" comment="libpoppler-qt4-4-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137584" comment="libpoppler-qt4-devel-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137585" comment="libpoppler46-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137586" comment="poppler-tools-0.26.5-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3608</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3608" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3608" source="CVE"/>
    <description>
    Integer overflow in the ObjectStream::ObjectStream function in XRef.cc in Xpdf 3.x before 3.02pl4 and Poppler before 0.12.1, as used in GPdf, kdegraphics KPDF, CUPS pdftops, and teTeX, might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137580" comment="libpoppler-cpp0-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137581" comment="libpoppler-devel-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137582" comment="libpoppler-glib8-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137583" comment="libpoppler-qt4-4-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137584" comment="libpoppler-qt4-devel-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137585" comment="libpoppler46-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137586" comment="poppler-tools-0.26.5-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3615</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3615" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3615" source="CVE"/>
    <description>
    The OSCAR protocol plugin in libpurple in Pidgin before 2.6.3 and Adium before 1.3.7 allows remote attackers to cause a denial of service (application crash) via crafted contact-list data for (1) ICQ and possibly (2) AIM, as demonstrated by the SIM IM client.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137605" comment="libpurple-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137606" comment="libpurple-meanwhile-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137607" comment="libpurple-tcl-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137608" comment="pidgin-2.10.9-5.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3617</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3617" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3617" source="CVE"/>
    <description>
    Format string vulnerability in the AbstractCommand::onAbort function in src/AbstractCommand.cc in aria2 before 1.6.2, when logging is enabled, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via format string specifiers in a download URI.  NOTE: some of these details are obtained from third party information.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137017" comment="aria2-1.18.5-2.1.4 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3627</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3627" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3627" source="CVE"/>
    <description>
    The decode_entities function in util.c in HTML-Parser before 3.63 allows context-dependent attackers to cause a denial of service (infinite loop) via an incomplete SGML numeric character reference, which triggers generation of an invalid UTF-8 character.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137835" comment="perl-HTML-Parser-3.71-2.1.3 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3720</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3720" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3720" source="CVE"/>
    <description>
    The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136944" comment="apache2-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136945" comment="apache2-devel-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136946" comment="apache2-doc-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136947" comment="apache2-example-pages-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136948" comment="apache2-prefork-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136949" comment="apache2-utils-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137160" comment="expat-2.1.0-14.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137392" comment="libapr-util1-1.5.3-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137393" comment="libapr-util1-devel-1.5.3-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137161" comment="libexpat-devel-2.1.0-14.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137162" comment="libexpat1-2.1.0-14.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137163" comment="libexpat1-32bit-2.1.0-14.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3736</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3736" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3736" source="CVE"/>
    <description>
    ltdl.c in libltdl in GNU Libtool 1.5.x, and 2.2.6 before 2.2.6b, as used in Ham Radio Control Libraries, Q, and possibly other products, attempts to open a .la file in the current working directory, which allows local users to gain privileges via a Trojan horse file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136909" comment="GraphicsMagick-devel-1.3.20-1.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136910" comment="libGraphicsMagick-Q16-3-1.3.20-1.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136911" comment="libGraphicsMagick3-config-1.3.20-1.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136912" comment="libGraphicsMagickWand-Q16-2-1.3.20-1.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137535" comment="libltdl7-2.4.2-15.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137536" comment="libltdl7-32bit-2.4.2-15.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137537" comment="libtool-2.4.2-15.2.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3939</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3939" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3939" source="CVE"/>
    <description>
    The poll_mode_io file for the megaraid_sas driver in the Linux kernel 2.6.31.6 and earlier has world-writable permissions, which allows local users to change the I/O mode of the driver by modifying this file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137315" comment="kernel-default-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137316" comment="kernel-default-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137317" comment="kernel-desktop-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137318" comment="kernel-desktop-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137319" comment="kernel-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137320" comment="kernel-docs-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137321" comment="kernel-macros-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137322" comment="kernel-pae-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137323" comment="kernel-pae-base-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137324" comment="kernel-pae-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137325" comment="kernel-source-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137326" comment="kernel-syms-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137327" comment="kernel-xen-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137328" comment="kernel-xen-devel-3.16.6-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3979</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3979" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3979" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, SeaMonkey before 2.0.1, and Thunderbird allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3980</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3980" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3980" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.6, SeaMonkey before 2.0.1, and Thunderbird allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3982</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3982" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3982" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox 3.5.x before 3.5.6, SeaMonkey before 2.0.1, and Thunderbird allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3983</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3983" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3983" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to send authenticated requests to arbitrary applications by replaying the NTLM credentials of a browser user.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3984</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3984" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3984" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to spoof an SSL indicator for an http URL or a file URL by setting document.location to an https URL corresponding to a site that responds with a No Content (aka 204) status code and an empty body.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3985</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3985" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3985" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to associate spoofed content with an invalid URL by setting document.location to this URL, and then writing arbitrary web script or HTML to the associated blank document, a related issue to CVE-2009-2654.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3988</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3988" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3988" source="CVE"/>
    <description>
    Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, and SeaMonkey before 2.0.3, does not properly restrict read access to object properties in showModalDialog, which allows remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via crafted dialogArguments values.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3995</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3995" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3995" source="CVE"/>
    <description>
    Multiple heap-based buffer overflows in IN_MOD.DLL (aka the Module Decoder Plug-in) in Winamp before 5.57, and libmikmod 3.1.12, might allow remote attackers to execute arbitrary code via (1) crafted samples or (2) crafted instrument definitions in an Impulse Tracker file.  NOTE: some of these details are obtained from third party information.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137539" comment="libmikmod3-3.3.6-3.1.3 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3996</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-3996" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3996" source="CVE"/>
    <description>
    Heap-based buffer overflow in IN_MOD.DLL (aka the Module Decoder Plug-in) in Winamp before 5.57, and libmikmod 3.1.12, might allow remote attackers to execute arbitrary code via an Ultratracker file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137539" comment="libmikmod3-3.3.6-3.1.3 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4019</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-4019" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4019" source="CVE"/>
    <description>
    mysqld in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41 does not (1) properly handle errors during execution of certain SELECT statements with subqueries, and does not (2) preserve certain null_value flags during execution of statements that use the GeomFromWKB function, which allows remote authenticated users to cause a denial of service (daemon crash) via a crafted statement.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137547" comment="libmysqlclient-devel-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137548" comment="libmysqlclient18-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137549" comment="libmysqlclient18-32bit-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137550" comment="libmysqlclient_r18-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137551" comment="libmysqld18-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137552" comment="mariadb-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137553" comment="mariadb-client-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137554" comment="mariadb-errormessages-10.0.13-2.3.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4022</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-4022" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4022" source="CVE"/>
    <description>
    Unspecified vulnerability in ISC BIND 9.0.x through 9.3.x, 9.4 before 9.4.3-P4, 9.5 before 9.5.2-P1, 9.6 before 9.6.1-P2, and 9.7 beta before 9.7.0b3, with DNSSEC validation enabled and checking disabled (CD), allows remote attackers to conduct DNS cache poisoning attacks by receiving a recursive client query and sending a response that contains an Additional section with crafted data, which is not properly handled when the response is processed "at the same time as requesting DNSSEC records (DO)," aka Bug 20438.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137045" comment="bind-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137046" comment="bind-chrootenv-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137047" comment="bind-doc-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137048" comment="bind-libs-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137049" comment="bind-utils-9.9.5P1-2.2.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4026</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-4026" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4026" source="CVE"/>
    <description>
    The mac80211 subsystem in the Linux kernel before 2.6.32-rc8-next-20091201 allows remote attackers to cause a denial of service (panic) via a crafted Delete Block ACK (aka DELBA) packet, related to an erroneous "code shuffling patch."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137315" comment="kernel-default-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137316" comment="kernel-default-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137317" comment="kernel-desktop-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137318" comment="kernel-desktop-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137319" comment="kernel-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137320" comment="kernel-docs-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137321" comment="kernel-macros-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137322" comment="kernel-pae-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137323" comment="kernel-pae-base-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137324" comment="kernel-pae-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137325" comment="kernel-source-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137326" comment="kernel-syms-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137327" comment="kernel-xen-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137328" comment="kernel-xen-devel-3.16.6-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4027</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-4027" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4027" source="CVE"/>
    <description>
    Race condition in the mac80211 subsystem in the Linux kernel before 2.6.32-rc8-next-20091201 allows remote attackers to cause a denial of service (system crash) via a Delete Block ACK (aka DELBA) packet that triggers a certain state change in the absence of an aggregation session.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137315" comment="kernel-default-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137316" comment="kernel-default-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137317" comment="kernel-desktop-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137318" comment="kernel-desktop-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137319" comment="kernel-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137320" comment="kernel-docs-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137321" comment="kernel-macros-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137322" comment="kernel-pae-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137323" comment="kernel-pae-base-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137324" comment="kernel-pae-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137325" comment="kernel-source-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137326" comment="kernel-syms-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137327" comment="kernel-xen-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137328" comment="kernel-xen-devel-3.16.6-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4028</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-4028" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4028" source="CVE"/>
    <description>
    The vio_verify_callback function in viosslfactories.c in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41, when OpenSSL is used, accepts a value of zero for the depth of X.509 certificates, which allows man-in-the-middle attackers to spoof arbitrary SSL-based MySQL servers via a crafted certificate, as demonstrated by a certificate presented by a server linked against the yaSSL library.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137547" comment="libmysqlclient-devel-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137548" comment="libmysqlclient18-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137549" comment="libmysqlclient18-32bit-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137550" comment="libmysqlclient_r18-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137551" comment="libmysqld18-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137552" comment="mariadb-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137553" comment="mariadb-client-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137554" comment="mariadb-errormessages-10.0.13-2.3.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4029</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-4029" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4029" source="CVE"/>
    <description>
    The (1) dist or (2) distcheck rules in GNU Automake 1.11.1, 1.10.3, and release branches branch-1-4 through branch-1-9, when producing a distribution tarball for a package that uses Automake, assign insecure permissions (777) to directories in the build tree, which introduces a race condition that allows local users to modify the contents of package files, introduce Trojan horse programs, or conduct other attacks before the build is complete.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137020" comment="automake-1.13.4-5.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137021" comment="m4-1.4.17-2.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4030</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-4030" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4030" source="CVE"/>
    <description>
    MySQL 5.1.x before 5.1.41 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are originally associated with pathnames without symlinks, and that can point to tables created at a future time at which a pathname is modified to contain a symlink to a subdirectory of the MySQL data home directory, related to incorrect calculation of the mysql_unpacked_real_data_home value.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4098 and CVE-2008-2079.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137547" comment="libmysqlclient-devel-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137548" comment="libmysqlclient18-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137549" comment="libmysqlclient18-32bit-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137550" comment="libmysqlclient_r18-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137551" comment="libmysqld18-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137552" comment="mariadb-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137553" comment="mariadb-client-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137554" comment="mariadb-errormessages-10.0.13-2.3.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4034</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-4034" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4034" source="CVE"/>
    <description>
    PostgreSQL 7.4.x before 7.4.27, 8.0.x before 8.0.23, 8.1.x before 8.1.19, 8.2.x before 8.2.15, 8.3.x before 8.3.9, and 8.4.x before 8.4.2 does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which (1) allows man-in-the-middle attackers to spoof arbitrary SSL-based PostgreSQL servers via a crafted server certificate issued by a legitimate Certification Authority, and (2) allows remote attackers to bypass intended client-hostname restrictions via a crafted client certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137474" comment="libecpg6-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137475" comment="libpq5-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137476" comment="libpq5-32bit-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137477" comment="postgresql93-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137478" comment="postgresql93-contrib-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137479" comment="postgresql93-devel-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137480" comment="postgresql93-docs-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137481" comment="postgresql93-server-9.3.5-2.1.14 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4131</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-4131" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4131" source="CVE"/>
    <description>
    The EXT4_IOC_MOVE_EXT (aka move extents) ioctl implementation in the ext4 filesystem in the Linux kernel before 2.6.32-git6 allows local users to overwrite arbitrary files via a crafted request, related to insufficient checks for file permissions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137315" comment="kernel-default-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137316" comment="kernel-default-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137317" comment="kernel-desktop-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137318" comment="kernel-desktop-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137319" comment="kernel-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137320" comment="kernel-docs-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137321" comment="kernel-macros-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137322" comment="kernel-pae-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137323" comment="kernel-pae-base-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137324" comment="kernel-pae-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137325" comment="kernel-source-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137326" comment="kernel-syms-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137327" comment="kernel-xen-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137328" comment="kernel-xen-devel-3.16.6-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4136</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-4136" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4136" source="CVE"/>
    <description>
    PostgreSQL 7.4.x before 7.4.27, 8.0.x before 8.0.23, 8.1.x before 8.1.19, 8.2.x before 8.2.15, 8.3.x before 8.3.9, and 8.4.x before 8.4.2 does not properly manage session-local state during execution of an index function by a database superuser, which allows remote authenticated users to gain privileges via a table with crafted index functions, as demonstrated by functions that modify (1) search_path or (2) a prepared statement, a related issue to CVE-2007-6600 and CVE-2009-3230.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137474" comment="libecpg6-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137475" comment="libpq5-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137476" comment="libpq5-32bit-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137477" comment="postgresql93-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137478" comment="postgresql93-contrib-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137479" comment="postgresql93-devel-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137480" comment="postgresql93-docs-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137481" comment="postgresql93-server-9.3.5-2.1.14 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4138</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-4138" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4138" source="CVE"/>
    <description>
    drivers/firewire/ohci.c in the Linux kernel before 2.6.32-git9, when packet-per-buffer mode is used, allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unknown other impact via an unspecified ioctl associated with receiving an ISO packet that contains zero in the payload-length field.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137315" comment="kernel-default-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137316" comment="kernel-default-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137317" comment="kernel-desktop-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137318" comment="kernel-desktop-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137319" comment="kernel-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137320" comment="kernel-docs-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137321" comment="kernel-macros-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137322" comment="kernel-pae-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137323" comment="kernel-pae-base-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137324" comment="kernel-pae-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137325" comment="kernel-source-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137326" comment="kernel-syms-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137327" comment="kernel-xen-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137328" comment="kernel-xen-devel-3.16.6-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4212</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-4212" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4212" source="CVE"/>
    <description>
    Multiple integer underflows in the (1) AES and (2) RC4 decryption functionality in the crypto library in MIT Kerberos 5 (aka krb5) 1.3 through 1.6.3, and 1.7 before 1.7.1, allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code by providing ciphertext with a length that is too short to be valid.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137331" comment="krb5-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137332" comment="krb5-32bit-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137333" comment="krb5-client-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137334" comment="krb5-devel-1.12.2-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4536</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-4536" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4536" source="CVE"/>
    <description>
    drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137315" comment="kernel-default-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137316" comment="kernel-default-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137317" comment="kernel-desktop-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137318" comment="kernel-desktop-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137319" comment="kernel-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137320" comment="kernel-docs-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137321" comment="kernel-macros-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137322" comment="kernel-pae-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137323" comment="kernel-pae-base-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137324" comment="kernel-pae-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137325" comment="kernel-source-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137326" comment="kernel-syms-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137327" comment="kernel-xen-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137328" comment="kernel-xen-devel-3.16.6-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4538</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-4538" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4538" source="CVE"/>
    <description>
    drivers/net/e1000e/netdev.c in the e1000e driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to have an unspecified impact via crafted packets, a related issue to CVE-2009-4537.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137315" comment="kernel-default-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137316" comment="kernel-default-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137317" comment="kernel-desktop-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137318" comment="kernel-desktop-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137319" comment="kernel-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137320" comment="kernel-docs-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137321" comment="kernel-macros-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137322" comment="kernel-pae-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137323" comment="kernel-pae-base-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137324" comment="kernel-pae-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137325" comment="kernel-source-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137326" comment="kernel-syms-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137327" comment="kernel-xen-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137328" comment="kernel-xen-devel-3.16.6-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20095029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-5029</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-5029" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5029" source="CVE"/>
    <description>
    Integer overflow in the __tzfile_read function in glibc before 2.15 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted timezone (TZ) file, as demonstrated using vsftpd.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137226" comment="glibc-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137227" comment="glibc-32bit-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137228" comment="glibc-devel-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137229" comment="glibc-extra-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137230" comment="glibc-info-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137231" comment="glibc-locale-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137232" comment="glibc-locale-32bit-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137233" comment="nscd-2.19-16.2.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20095030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-5030</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-5030" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5030" source="CVE"/>
    <description>
    The tcd_free_encode function in tcd.c in OpenJPEG 1.3 through 1.5 allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via crafted tile information in a Gray16 TIFF image, which causes insufficient memory to be allocated and leads to an "invalid free."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137557" comment="libopenjpeg1-1.5.2-2.1.8 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20095044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-5044</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-5044" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5044" source="CVE"/>
    <description>
    contrib/pdfmark/pdfroff.sh in GNU troff (aka groff) before 1.21 allows local users to overwrite arbitrary files via a symlink attack on a pdf#####.tmp temporary file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137257" comment="groff-1.22.2-6.1.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137258" comment="groff-full-1.22.2-6.1.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137259" comment="gxditview-1.22.2-6.1.10 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20095080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-5080</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-5080" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5080" source="CVE"/>
    <description>
    The (1) contrib/eqn2graph/eqn2graph.sh, (2) contrib/grap2graph/grap2graph.sh, and (3) contrib/pic2graph/pic2graph.sh scripts in GNU troff (aka groff) 1.21 and earlier do not properly handle certain failed attempts to create temporary directories, which might allow local users to overwrite arbitrary files via a symlink attack on a file in a temporary directory, a different vulnerability than CVE-2004-1296.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137257" comment="groff-1.22.2-6.1.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137258" comment="groff-full-1.22.2-6.1.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137259" comment="gxditview-1.22.2-6.1.10 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20095081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-5081</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2009-5081" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5081" source="CVE"/>
    <description>
    The (1) config.guess, (2) contrib/groffer/perl/groffer.pl, and (3) contrib/groffer/perl/roff2.pl scripts in GNU troff (aka groff) 1.21 and earlier use an insufficient number of X characters in the template argument to the tempfile function, which makes it easier for local users to overwrite arbitrary files via a symlink attack on a temporary file, a different vulnerability than CVE-2004-0969.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137257" comment="groff-1.22.2-6.1.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137258" comment="groff-full-1.22.2-6.1.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137259" comment="gxditview-1.22.2-6.1.10 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0001</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0001" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0001" source="CVE"/>
    <description>
    Integer underflow in the unlzw function in unlzw.c in gzip before 1.4 on 64-bit platforms, as used in ncompress and probably others, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted archive that uses LZW compression, leading to an array index error.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137266" comment="gzip-1.6-8.1.8 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0013</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0013" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0013" source="CVE"/>
    <description>
    Directory traversal vulnerability in slp.c in the MSN protocol plugin in libpurple in Pidgin 2.6.4 and Adium 1.3.8 allows remote attackers to read arbitrary files via a .. (dot dot) in an application/x-msnmsgrp2p MSN emoticon (aka custom smiley) request, a related issue to CVE-2004-0122.  NOTE: it could be argued that this is resultant from a vulnerability in which an emoticon download request is processed even without a preceding text/x-mms-emoticon message that announced availability of the emoticon.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137605" comment="libpurple-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137606" comment="libpurple-meanwhile-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137607" comment="libpurple-tcl-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137608" comment="pidgin-2.10.9-5.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0159</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0159" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0159" source="CVE"/>
    <description>
    The browser engine in Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, Thunderbird before 3.0.2, and SeaMonkey before 2.0.3 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the nsBlockFrame::StealFrame function in layout/generic/nsBlockFrame.cpp, and unspecified other vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0160</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0160" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0160" source="CVE"/>
    <description>
    The Web Worker functionality in Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, and SeaMonkey before 2.0.3, does not properly handle array data types for posted messages, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0162</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0162" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0162" source="CVE"/>
    <description>
    Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, and SeaMonkey before 2.0.3, does not properly support the application/octet-stream content type as a protection mechanism against execution of web script in certain circumstances involving SVG and the EMBED element, which allows remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via an embedded SVG document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0164</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0164" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0164" source="CVE"/>
    <description>
    Use-after-free vulnerability in the imgContainer::InternalAddFrameHelper function in src/imgContainer.cpp in libpr0n in Mozilla Firefox 3.6 before 3.6.2 allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via a multipart/x-mixed-replace animation in which the frames have different bits-per-pixel (bpp) values.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0165</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0165" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0165" source="CVE"/>
    <description>
    The TraceRecorder::traverseScopeChain function in js/src/jstracer.cpp in the browser engine in Mozilla Firefox 3.6 before 3.6.2 allows remote attackers to cause a denial of service (memory corruption and application crash) and possibly execute arbitrary code via vectors involving certain indirect calls to the JavaScript eval function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0166</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0166" source="CVE"/>
    <description>
    The gfxTextRun::SanitizeGlyphRuns function in gfx/thebes/src/gfxFont.cpp in the browser engine in Mozilla Firefox 3.6 before 3.6.2 on Mac OS X, when the Core Text API is used, does not properly perform certain deletions, which allows remote attackers to cause a denial of service (memory corruption and application crash) and possibly execute arbitrary code via an HTML document containing invisible Unicode characters, as demonstrated by the U+FEFF, U+FFF9, U+FFFA, and U+FFFB characters.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0167</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0167" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0167" source="CVE"/>
    <description>
    The browser engine in Mozilla Firefox 3.0.x before 3.0.18, 3.5.x before 3.5.8, and 3.6.x before 3.6.2; Thunderbird before 3.0.2; and SeaMonkey before 2.0.3 allows remote attackers to cause a denial of service (memory corruption and application crash) and possibly execute arbitrary code via vectors related to (1) layout/generic/nsBlockFrame.cpp and (2) the _evaluate function in modules/plugin/base/src/nsNPAPIPlugin.cpp.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0168</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0168" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0168" source="CVE"/>
    <description>
    The nsDocument::MaybePreLoadImage function in content/base/src/nsDocument.cpp in the image-preloading implementation in Mozilla Firefox 3.6 before 3.6.2 does not apply scheme restrictions and policy restrictions to the image's URL, which might allow remote attackers to cause a denial of service (application crash or hang) or hijack the functionality of the browser's add-ons via a crafted SRC attribute of an IMG element, as demonstrated by remote command execution through an ssh: URL in a configuration that supports gnome-vfs with a nonstandard network.gnomevfs.supported-protocols setting.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0169</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0169" source="CVE"/>
    <description>
    The CSSLoaderImpl::DoSheetComplete function in layout/style/nsCSSLoader.cpp in Mozilla Firefox 3.0.x before 3.0.18, 3.5.x before 3.5.8, and 3.6.x before 3.6.2; Thunderbird before 3.0.2; and SeaMonkey before 2.0.3 changes the case of certain strings in a stylesheet before adding this stylesheet to the XUL cache, which might allow remote attackers to modify the browser's font and other CSS attributes, and potentially disrupt rendering of a web page, by forcing the browser to perform this erroneous stylesheet caching.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0170</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0170" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0170" source="CVE"/>
    <description>
    Mozilla Firefox 3.6 before 3.6.2 does not offer plugins the expected window.location protection mechanism, which might allow remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via vectors that are specific to each affected plugin.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0171</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0171" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0171" source="CVE"/>
    <description>
    Mozilla Firefox 3.0.x before 3.0.18, 3.5.x before 3.5.8, and 3.6.x before 3.6.2; Thunderbird before 3.0.2; and SeaMonkey before 2.0.3 allow remote attackers to perform cross-origin keystroke capture, and possibly conduct cross-site scripting (XSS) attacks, by using the addEventListener and setTimeout functions in conjunction with a wrapped object.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2007-3736.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0172</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0172" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0172" source="CVE"/>
    <description>
    toolkit/components/passwordmgr/src/nsLoginManagerPrompter.js in the asynchronous Authorization Prompt implementation in Mozilla Firefox 3.6 before 3.6.2 does not properly handle concurrent authorization requests from multiple web sites, which might allow remote web servers to spoof an authorization dialog and capture credentials by demanding HTTP authentication in opportunistic circumstances.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0173</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0173" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0173" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.5.9 and 3.6.x before 3.6.2, Thunderbird before 3.0.4, and SeaMonkey before 2.0.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0174</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0174" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2; Thunderbird before 3.0.4; and SeaMonkey before 2.0.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0175</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0175" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0175" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsTreeSelection implementation in Mozilla Firefox before 3.0.19 and 3.5.x before 3.5.9, Thunderbird before 3.0.4, and SeaMonkey before 2.0.4 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors that trigger a call to the handler for the select event for XUL tree items.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0176</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0176" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0176" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2; Thunderbird before 3.0.4; and SeaMonkey before 2.0.4 do not properly manage reference counts for option elements in a XUL tree optgroup, which might allow remote attackers to execute arbitrary code via unspecified vectors that trigger access to deleted elements, related to a "dangling pointer vulnerability."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0177</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0177" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0177" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2, and SeaMonkey before 2.0.4, frees the contents of the window.navigator.plugins array while a reference to an array element is still active, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors, related to a "dangling pointer vulnerability."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0178</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0178" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0178" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2, and SeaMonkey before 2.0.4, does not prevent applets from interpreting mouse clicks as drag-and-drop actions, which allows remote attackers to execute arbitrary JavaScript with Chrome privileges by loading a chrome: URL and then loading a javascript: URL.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0179</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0179" source="CVE"/>
    <description>
    Mozilla Firefox before 3.0.19 and 3.5.x before 3.5.8, and SeaMonkey before 2.0.3, when the XMLHttpRequestSpy module in the Firebug add-on is used, does not properly handle interaction between the XMLHttpRequestSpy object and chrome privileged objects, which allows remote attackers to execute arbitrary JavaScript via a crafted HTTP response.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0181</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0181" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0181" source="CVE"/>
    <description>
    Mozilla Firefox before 3.5.9 and 3.6.x before 3.6.2, and SeaMonkey before 2.0.4, executes a mail application in situations where an IMG element has a SRC attribute that is a redirect to a mailto: URL, which allows remote attackers to cause a denial of service (excessive application launches) via an HTML document with many images.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0182</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0182" source="CVE"/>
    <description>
    The XMLDocument::load function in Mozilla Firefox before 3.5.9 and 3.6.x before 3.6.2, Thunderbird before 3.0.4, and SeaMonkey before 2.0.4 does not perform the expected nsIContentPolicy checks during loading of content by XML documents, which allows attackers to bypass intended access restrictions via crafted content.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0183</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0183" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsCycleCollector::MarkRoots function in Mozilla Firefox 3.5.x before 3.5.10 and SeaMonkey before 2.0.5 allows remote attackers to execute arbitrary code via a crafted HTML document, related to an improper frame construction process for menus.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0277</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0277" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0277" source="CVE"/>
    <description>
    slp.c in the MSN protocol plugin in libpurple in Pidgin before 2.6.6, including 2.6.4, and Adium 1.3.8 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a malformed MSNSLP INVITE request in an SLP message, a different issue than CVE-2010-0013.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137605" comment="libpurple-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137606" comment="libpurple-meanwhile-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137607" comment="libpurple-tcl-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137608" comment="pidgin-2.10.9-5.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0283</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0283" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0283" source="CVE"/>
    <description>
    The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 before 1.7.2, and 1.8 alpha, allows remote attackers to cause a denial of service (assertion failure and daemon crash) via an invalid (1) AS-REQ or (2) TGS-REQ request.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137331" comment="krb5-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137332" comment="krb5-32bit-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137333" comment="krb5-client-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137334" comment="krb5-devel-1.12.2-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0393</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0393" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0393" source="CVE"/>
    <description>
    The _cupsGetlang function, as used by lppasswd.c in lppasswd in CUPS 1.2.2, 1.3.7, 1.3.9, and 1.4.1, relies on an environment variable to determine the file that provides localized message strings, which allows local users to gain privileges via a file that contains crafted localization data with format string specifiers.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137098" comment="cups-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137099" comment="cups-client-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137100" comment="cups-devel-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137101" comment="cups-libs-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137102" comment="cups-libs-32bit-1.5.4-21.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0405</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0405" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0405" source="CVE"/>
    <description>
    Integer overflow in the BZ2_decompress function in decompress.c in bzip2 and libbzip2 before 1.0.6 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted compressed file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137051" comment="bzip2-1.0.6-29.2.7 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137056" comment="clamav-0.98.4-2.1.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137052" comment="libbz2-1-1.0.6-29.2.7 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137053" comment="libbz2-1-32bit-1.0.6-29.2.7 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137054" comment="libbz2-devel-1.0.6-29.2.7 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0407</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0407" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0407" source="CVE"/>
    <description>
    Multiple buffer overflows in the MSGFunctionDemarshall function in winscard_svc.c in the PC/SC Smart Card daemon (aka PCSCD) in MUSCLE PCSC-Lite before 1.5.4 allow local users to gain privileges via crafted message data, which is improperly demarshalled.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137568" comment="libpcsclite1-1.8.11-4.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137569" comment="pcsc-lite-1.8.11-4.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0408</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0408" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0408" source="CVE"/>
    <description>
    The ap_proxy_ajp_request function in mod_proxy_ajp.c in mod_proxy_ajp in the Apache HTTP Server 2.2.x before 2.2.15 does not properly handle certain situations in which a client sends no request body, which allows remote attackers to cause a denial of service (backend server outage) via a crafted request, related to use of a 500 error code instead of the appropriate 400 error code.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136944" comment="apache2-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136945" comment="apache2-devel-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136946" comment="apache2-doc-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136947" comment="apache2-example-pages-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136948" comment="apache2-prefork-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136949" comment="apache2-utils-2.4.10-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0420</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0420" source="CVE"/>
    <description>
    libpurple in Finch in Pidgin before 2.6.6, when an XMPP multi-user chat (MUC) room is used, does not properly parse nicknames containing &lt;br&gt; sequences, which allows remote attackers to cause a denial of service (application crash) via a crafted nickname.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137605" comment="libpurple-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137606" comment="libpurple-meanwhile-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137607" comment="libpurple-tcl-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137608" comment="pidgin-2.10.9-5.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0423</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0423" source="CVE"/>
    <description>
    gtkimhtml.c in Pidgin before 2.6.6 allows remote attackers to cause a denial of service (CPU consumption and application hang) by sending many smileys in a (1) IM or (2) chat.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137605" comment="libpurple-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137606" comment="libpurple-meanwhile-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137607" comment="libpurple-tcl-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137608" comment="pidgin-2.10.9-5.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0424</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0424" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0424" source="CVE"/>
    <description>
    The edit_cmd function in crontab.c in (1) cronie before 1.4.4 and (2) Vixie cron (vixie-cron) allows local users to change the modification times of arbitrary files, and consequently cause a denial of service, via a symlink attack on a temporary file in the /tmp directory.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137096" comment="cron-4.2-56.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137097" comment="cronie-1.4.12-56.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0425</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0425" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0425" source="CVE"/>
    <description>
    modules/arch/win32/mod_isapi.c in mod_isapi in the Apache HTTP Server 2.0.37 through 2.0.63, 2.2.0 through 2.2.14, and 2.3.x before 2.3.7, when running on Windows, does not ensure that request processing is complete before calling isapi_unload for an ISAPI .dll module, which allows remote attackers to execute arbitrary code via unspecified vectors related to a crafted request, a reset packet, and "orphaned callback pointers."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136944" comment="apache2-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136945" comment="apache2-devel-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136946" comment="apache2-doc-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136947" comment="apache2-example-pages-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136948" comment="apache2-prefork-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136949" comment="apache2-utils-2.4.10-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0434</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0434" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0434" source="CVE"/>
    <description>
    The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136944" comment="apache2-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136945" comment="apache2-devel-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136946" comment="apache2-doc-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136947" comment="apache2-example-pages-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136948" comment="apache2-prefork-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136949" comment="apache2-utils-2.4.10-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0436</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0436" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0436" source="CVE"/>
    <description>
    Race condition in backend/ctrl.c in KDM in KDE Software Compilation (SC) 2.2.0 through 4.4.2 allows local users to change the permissions of arbitrary files, and consequently gain privileges, by blocking the removal of a certain directory that contains a control socket, related to improper interaction with ksm.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137286" comment="kde4-kgreeter-plugins-4.11.12-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137287" comment="kdebase4-wallpaper-default-4.14.2-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137288" comment="kdebase4-wallpapers-4.14.2-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137289" comment="kdebase4-workspace-4.11.12-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137290" comment="kdebase4-workspace-addons-4.11.12-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137291" comment="kdebase4-workspace-devel-4.11.12-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137292" comment="kdebase4-workspace-ksysguardd-4.11.12-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137293" comment="kdebase4-workspace-liboxygenstyle-4.11.12-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137294" comment="kdebase4-workspace-libs-4.11.12-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137295" comment="kdm-4.11.12-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137296" comment="kwin-4.11.12-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137297" comment="oxygen-cursors4-4.11.12-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137298" comment="python-kdebase4-4.11.12-2.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0540</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0540" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0540" source="CVE"/>
    <description>
    Cross-site request forgery (CSRF) vulnerability in the web interface in CUPS before 1.4.4, as used on Apple Mac OS X 10.5.8, Mac OS X 10.6 before 10.6.4, and other platforms, allows remote attackers to hijack the authentication of administrators for requests that change settings.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137098" comment="cups-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137099" comment="cups-client-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137100" comment="cups-devel-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137101" comment="cups-libs-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137102" comment="cups-libs-32bit-1.5.4-21.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0542</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0542" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0542" source="CVE"/>
    <description>
    The _WriteProlog function in texttops.c in texttops in the Text Filter subsystem in CUPS before 1.4.4 does not check the return values of certain calloc calls, which allows remote attackers to cause a denial of service (NULL pointer dereference or heap memory corruption) or possibly execute arbitrary code via a crafted file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137098" comment="cups-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137099" comment="cups-client-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137100" comment="cups-devel-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137101" comment="cups-libs-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137102" comment="cups-libs-32bit-1.5.4-21.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0547</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0547" source="CVE"/>
    <description>
    client/mount.cifs.c in mount.cifs in smbfs in Samba 3.4.5 and earlier does not verify that the (1) device name and (2) mountpoint strings are composed of valid characters, which allows local users to cause a denial of service (mtab corruption) via a crafted string.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137055" comment="cifs-utils-6.4-3.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137424" comment="libdcerpc-binding0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137425" comment="libdcerpc-binding0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137426" comment="libdcerpc0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137427" comment="libdcerpc0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137428" comment="libgensec0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137429" comment="libgensec0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137430" comment="libndr-krb5pac0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137431" comment="libndr-krb5pac0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137432" comment="libndr-nbt0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137433" comment="libndr-nbt0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137434" comment="libndr-standard0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137435" comment="libndr-standard0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137436" comment="libndr0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137437" comment="libndr0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137438" comment="libnetapi0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137439" comment="libnetapi0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137440" comment="libpdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137441" comment="libpdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137442" comment="libregistry0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137443" comment="libsamba-credentials0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137444" comment="libsamba-credentials0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137445" comment="libsamba-hostconfig0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137446" comment="libsamba-hostconfig0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137447" comment="libsamba-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137448" comment="libsamba-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137449" comment="libsamdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137450" comment="libsamdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137451" comment="libsmbclient-devel-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137452" comment="libsmbclient-raw0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137453" comment="libsmbclient-raw0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137454" comment="libsmbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137455" comment="libsmbconf0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137456" comment="libsmbconf0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137457" comment="libsmbldap0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137458" comment="libsmbldap0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137459" comment="libtevent-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137460" comment="libtevent-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137461" comment="libwbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137462" comment="libwbclient0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137463" comment="samba-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137464" comment="samba-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137465" comment="samba-client-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137466" comment="samba-client-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137467" comment="samba-doc-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137468" comment="samba-libs-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137469" comment="samba-libs-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137470" comment="samba-winbind-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137471" comment="samba-winbind-32bit-4.1.12-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0624</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0624" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0624" source="CVE"/>
    <description>
    Heap-based buffer overflow in the rmt_read__ function in lib/rtapelib.c in the rmt client functionality in GNU tar before 1.23 and GNU cpio before 2.11 allows remote rmt servers to cause a denial of service (memory corruption) or possibly execute arbitrary code by sending more data than was requested, related to archive filenames that contain a : (colon) character.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137064" comment="cpio-2.11-29.2.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137065" comment="tar-1.28-2.2.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0628</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0628" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0628" source="CVE"/>
    <description>
    The spnego_gss_accept_sec_context function in lib/gssapi/spnego/spnego_mech.c in the SPNEGO GSS-API functionality in MIT Kerberos 5 (aka krb5) 1.7 before 1.7.2 and 1.8 before 1.8.1 allows remote attackers to cause a denial of service (assertion failure and daemon crash) via an invalid packet that triggers incorrect preparation of an error token.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137331" comment="krb5-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137332" comment="krb5-32bit-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137333" comment="krb5-client-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137334" comment="krb5-devel-1.12.2-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0654</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0654" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0654" source="CVE"/>
    <description>
    Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 permit cross-origin loading of CSS stylesheets even when the stylesheet download has an incorrect MIME type and the stylesheet document is malformed, which allows remote attackers to obtain sensitive information via a crafted document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0728</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0728" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0728" source="CVE"/>
    <description>
    smbd in Samba 3.3.11, 3.4.6, and 3.5.0, when libcap support is enabled, runs with the CAP_DAC_OVERRIDE capability, which allows remote authenticated users to bypass intended file permissions via standard filesystem operations with any client.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137055" comment="cifs-utils-6.4-3.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137424" comment="libdcerpc-binding0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137425" comment="libdcerpc-binding0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137426" comment="libdcerpc0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137427" comment="libdcerpc0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137428" comment="libgensec0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137429" comment="libgensec0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137430" comment="libndr-krb5pac0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137431" comment="libndr-krb5pac0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137432" comment="libndr-nbt0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137433" comment="libndr-nbt0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137434" comment="libndr-standard0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137435" comment="libndr-standard0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137436" comment="libndr0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137437" comment="libndr0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137438" comment="libnetapi0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137439" comment="libnetapi0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137440" comment="libpdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137441" comment="libpdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137442" comment="libregistry0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137443" comment="libsamba-credentials0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137444" comment="libsamba-credentials0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137445" comment="libsamba-hostconfig0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137446" comment="libsamba-hostconfig0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137447" comment="libsamba-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137448" comment="libsamba-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137449" comment="libsamdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137450" comment="libsamdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137451" comment="libsmbclient-devel-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137452" comment="libsmbclient-raw0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137453" comment="libsmbclient-raw0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137454" comment="libsmbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137455" comment="libsmbconf0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137456" comment="libsmbconf0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137457" comment="libsmbldap0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137458" comment="libsmbldap0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137459" comment="libtevent-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137460" comment="libtevent-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137461" comment="libwbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137462" comment="libwbclient0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137463" comment="samba-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137464" comment="samba-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137465" comment="samba-client-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137466" comment="samba-client-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137467" comment="samba-doc-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137468" comment="samba-libs-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137469" comment="samba-libs-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137470" comment="samba-winbind-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137471" comment="samba-winbind-32bit-4.1.12-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0740</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0740" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0740" source="CVE"/>
    <description>
    The ssl3_get_record function in ssl/s3_pkt.c in OpenSSL 0.9.8f through 0.9.8m allows remote attackers to cause a denial of service (crash) via a malformed record in a TLS connection that triggers a NULL pointer dereference, related to the minor version number.  NOTE: some of these details are obtained from third party information.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0742</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0742" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0742" source="CVE"/>
    <description>
    The Cryptographic Message Syntax (CMS) implementation in crypto/cms/cms_asn1.c in OpenSSL before 0.9.8o and 1.x before 1.0.0a does not properly handle structures that contain OriginatorInfo, which allows context-dependent attackers to modify invalid memory locations or conduct double-free attacks, and possibly execute arbitrary code, via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0750</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0750" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0750" source="CVE"/>
    <description>
    pkexec.c in pkexec in libpolkit in PolicyKit 0.96 allows local users to determine the existence of arbitrary files via the argument.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137577" comment="libpolkit0-0.112-3.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137578" comment="polkit-0.112-3.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137579" comment="typelib-1_0-Polkit-1_0-0.112-3.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0787</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0787" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0787" source="CVE"/>
    <description>
    client/mount.cifs.c in mount.cifs in smbfs in Samba 3.0.22, 3.0.28a, 3.2.3, 3.3.2, 3.4.0, and 3.4.5 allows local users to mount a CIFS share on an arbitrary mountpoint, and gain privileges, via a symlink attack on the mountpoint directory file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137055" comment="cifs-utils-6.4-3.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137424" comment="libdcerpc-binding0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137425" comment="libdcerpc-binding0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137426" comment="libdcerpc0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137427" comment="libdcerpc0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137428" comment="libgensec0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137429" comment="libgensec0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137430" comment="libndr-krb5pac0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137431" comment="libndr-krb5pac0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137432" comment="libndr-nbt0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137433" comment="libndr-nbt0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137434" comment="libndr-standard0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137435" comment="libndr-standard0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137436" comment="libndr0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137437" comment="libndr0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137438" comment="libnetapi0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137439" comment="libnetapi0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137440" comment="libpdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137441" comment="libpdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137442" comment="libregistry0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137443" comment="libsamba-credentials0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137444" comment="libsamba-credentials0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137445" comment="libsamba-hostconfig0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137446" comment="libsamba-hostconfig0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137447" comment="libsamba-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137448" comment="libsamba-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137449" comment="libsamdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137450" comment="libsamdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137451" comment="libsmbclient-devel-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137452" comment="libsmbclient-raw0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137453" comment="libsmbclient-raw0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137454" comment="libsmbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137455" comment="libsmbconf0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137456" comment="libsmbconf0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137457" comment="libsmbldap0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137458" comment="libsmbldap0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137459" comment="libtevent-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137460" comment="libtevent-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137461" comment="libwbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137462" comment="libwbclient0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137463" comment="samba-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137464" comment="samba-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137465" comment="samba-client-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137466" comment="samba-client-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137467" comment="samba-doc-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137468" comment="samba-libs-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137469" comment="samba-libs-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137470" comment="samba-winbind-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137471" comment="samba-winbind-32bit-4.1.12-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0926</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0926" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0926" source="CVE"/>
    <description>
    The default configuration of smbd in Samba before 3.3.11, 3.4.x before 3.4.6, and 3.5.x before 3.5.0rc3, when a writable share exists, allows remote authenticated users to leverage a directory traversal vulnerability, and access arbitrary files, by using the symlink command in smbclient to create a symlink containing .. (dot dot) sequences, related to the combination of the unix extensions and wide links options.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137424" comment="libdcerpc-binding0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137425" comment="libdcerpc-binding0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137426" comment="libdcerpc0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137427" comment="libdcerpc0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137428" comment="libgensec0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137429" comment="libgensec0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137430" comment="libndr-krb5pac0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137431" comment="libndr-krb5pac0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137432" comment="libndr-nbt0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137433" comment="libndr-nbt0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137434" comment="libndr-standard0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137435" comment="libndr-standard0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137436" comment="libndr0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137437" comment="libndr0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137438" comment="libnetapi0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137439" comment="libnetapi0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137440" comment="libpdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137441" comment="libpdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137442" comment="libregistry0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137443" comment="libsamba-credentials0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137444" comment="libsamba-credentials0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137445" comment="libsamba-hostconfig0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137446" comment="libsamba-hostconfig0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137447" comment="libsamba-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137448" comment="libsamba-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137449" comment="libsamdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137450" comment="libsamdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137451" comment="libsmbclient-devel-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137452" comment="libsmbclient-raw0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137453" comment="libsmbclient-raw0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137454" comment="libsmbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137455" comment="libsmbconf0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137456" comment="libsmbconf0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137457" comment="libsmbldap0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137458" comment="libsmbldap0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137459" comment="libtevent-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137460" comment="libtevent-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137461" comment="libwbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137462" comment="libwbclient0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137463" comment="samba-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137464" comment="samba-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137465" comment="samba-client-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137466" comment="samba-client-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137467" comment="samba-doc-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137468" comment="samba-libs-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137469" comment="samba-libs-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137470" comment="samba-winbind-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137471" comment="samba-winbind-32bit-4.1.12-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0991</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-0991" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0991" source="CVE"/>
    <description>
    Multiple heap-based buffer overflows in imlib2 1.4.3 allow context-dependent attackers to execute arbitrary code via a crafted (1) ARGB, (2) XPM, or (3) BMP file, related to the IMAGE_DIMENSIONS_OK macro in lib/image.h.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137341" comment="libImlib2-1-1.4.5-17.2.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1000</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1000" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1000" source="CVE"/>
    <description>
    Directory traversal vulnerability in KGet in KDE SC 4.0.0 through 4.4.3 allows remote attackers to create arbitrary files via directory traversal sequences in the name attribute of a file element in a metalink file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137308" comment="kdenetwork4-filesharing-4.14.2-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137309" comment="kdnssd-4.14.2-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137310" comment="kget-4.14.2-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137311" comment="kopete-4.14.2-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137312" comment="kppp-4.14.2-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137313" comment="krdc-4.14.2-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137314" comment="krfb-4.14.2-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1028</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1028" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1028" source="CVE"/>
    <description>
    Integer overflow in the decompression functionality in the Web Open Fonts Format (WOFF) decoder in Mozilla Firefox 3.6 before 3.6.2 and 3.7 before 3.7 alpha 3 allows remote attackers to execute arbitrary code via a crafted WOFF file that triggers a buffer overflow, as demonstrated by the vd_ff module in VulnDisco 9.0.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1121</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1121" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1121" source="CVE"/>
    <description>
    Mozilla Firefox 3.6.x before 3.6.3 does not properly manage the scopes of DOM nodes that are moved from one document to another, which allows remote attackers to conduct use-after-free attacks and execute arbitrary code via unspecified vectors involving improper interaction with garbage collection, as demonstrated by Nils during a Pwn2Own competition at CanSecWest 2010.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1125</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1125" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1125" source="CVE"/>
    <description>
    The JavaScript implementation in Mozilla Firefox 3.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, allows remote attackers to send selected keystrokes to a form field in a hidden frame, instead of the intended form field in a visible frame, via certain calls to the focus method.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1146</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1146" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1146" source="CVE"/>
    <description>
    The Linux kernel 2.6.33.2 and earlier, when a ReiserFS filesystem exists, does not restrict read or write access to the .reiserfs_priv directory, which allows local users to gain privileges by modifying (1) extended attributes or (2) ACLs, as demonstrated by deleting a file under .reiserfs_priv/xattrs/.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137315" comment="kernel-default-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137316" comment="kernel-default-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137317" comment="kernel-desktop-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137318" comment="kernel-desktop-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137319" comment="kernel-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137320" comment="kernel-docs-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137321" comment="kernel-macros-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137322" comment="kernel-pae-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137323" comment="kernel-pae-base-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137324" comment="kernel-pae-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137325" comment="kernel-source-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137326" comment="kernel-syms-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137327" comment="kernel-xen-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137328" comment="kernel-xen-devel-3.16.6-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1154</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1154" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1154" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137279" comment="irssi-0.8.16-3.2.3 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1155</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1155" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1155" source="CVE"/>
    <description>
    Irssi before 0.8.15, when SSL is used, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) field or a Subject Alternative Name field of the X.509 certificate, which allows man-in-the-middle attackers to spoof IRC servers via an arbitrary certificate.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137279" comment="irssi-0.8.16-3.2.3 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1160</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1160" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1160" source="CVE"/>
    <description>
    GNU nano before 2.2.4 does not verify whether a file has been changed before it is overwritten in a file-save operation, which allows local user-assisted attackers to overwrite arbitrary files via a symlink attack on an attacker-owned file that is being edited by the victim.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137805" comment="nano-2.3.6-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137806" comment="nano-lang-2.3.6-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1161</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1161" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1161" source="CVE"/>
    <description>
    Race condition in GNU nano before 2.2.4, when run by root to edit a file that is not owned by root, allows local user-assisted attackers to change the ownership of arbitrary files via vectors related to the creation of backup files.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137805" comment="nano-2.3.6-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137806" comment="nano-lang-2.3.6-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1163</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1163" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1163" source="CVE"/>
    <description>
    The command matching functionality in sudo 1.6.8 through 1.7.2p5 does not properly handle when a file in the current working directory has the same name as a pseudo-command in the sudoers file and the PATH contains an entry for ".", which allows local users to execute arbitrary commands via a Trojan horse executable, as demonstrated using sudoedit, a different vulnerability than CVE-2010-0426.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137883" comment="sudo-1.8.10p3-2.1.6 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1167</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1167" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1167" source="CVE"/>
    <description>
    fetchmail 4.6.3 through 6.3.16, when debug mode is enabled, does not properly handle invalid characters in a multi-character locale, which allows remote attackers to cause a denial of service (memory consumption and application crash) via a crafted (1) message header or (2) POP3 UIDL list.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137164" comment="fetchmail-6.3.26-6.1.4 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1169</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1169" source="CVE"/>
    <description>
    PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2 does not properly restrict PL/perl procedures, which allows remote authenticated users, with database-creation privileges, to execute arbitrary Perl code via a crafted script, related to the Safe module (aka Safe.pm) for Perl. NOTE: some sources report that this issue is the same as CVE-2010-1447.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137474" comment="libecpg6-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137475" comment="libpq5-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137476" comment="libpq5-32bit-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137477" comment="postgresql93-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137478" comment="postgresql93-contrib-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137479" comment="postgresql93-devel-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137480" comment="postgresql93-docs-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137481" comment="postgresql93-server-9.3.5-2.1.14 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1170</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1170" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1170" source="CVE"/>
    <description>
    The PL/Tcl implementation in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2 loads Tcl code from the pltcl_modules table regardless of the table's ownership and permissions, which allows remote authenticated users, with database-creation privileges, to execute arbitrary Tcl code by creating this table and inserting a crafted Tcl script.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137474" comment="libecpg6-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137475" comment="libpq5-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137476" comment="libpq5-32bit-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137477" comment="postgresql93-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137478" comment="postgresql93-contrib-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137479" comment="postgresql93-devel-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137480" comment="postgresql93-docs-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137481" comment="postgresql93-server-9.3.5-2.1.14 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1172</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1172" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1172" source="CVE"/>
    <description>
    DBus-GLib 0.73 disregards the access flag of exported GObject properties, which allows local users to bypass intended access restrictions and possibly cause a denial of service by modifying properties, as demonstrated by properties of the (1) DeviceKit-Power, (2) NetworkManager, and (3) ModemManager services.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137127" comment="dbus-1-glib-0.102-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137128" comment="dbus-1-glib-32bit-0.102-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137129" comment="dbus-1-glib-devel-0.102-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1196</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1196" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1196" source="CVE"/>
    <description>
    Integer overflow in the nsGenericDOMDataNode::SetTextInternal function in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allows remote attackers to execute arbitrary code via a DOM node with a long text value that triggers a heap-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1197</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1197" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1197" source="CVE"/>
    <description>
    Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, does not properly handle situations in which both "Content-Disposition: attachment" and "Content-Type: multipart" are present in HTTP headers, which allows remote attackers to conduct cross-site scripting (XSS) attacks via an uploaded HTML document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1198</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1198" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1198" source="CVE"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, allows remote attackers to execute arbitrary code via vectors involving multiple plugin instances.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1199</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1199" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1199" source="CVE"/>
    <description>
    Integer overflow in the XSLT node sorting implementation in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allows remote attackers to execute arbitrary code via a large text value for a node.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1200</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1200" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1200" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1201</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1201" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1201" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.10, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1202</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1202" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1202" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1203</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1203" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1203" source="CVE"/>
    <description>
    The JavaScript engine in Mozilla Firefox 3.6.x before 3.6.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors that trigger an assertion failure in jstracer.cpp.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1205</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1205" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1205" source="CVE"/>
    <description>
    Buffer overflow in pngpread.c in libpng before 1.2.44 and 1.4.x before 1.4.3, as used in progressive applications, might allow remote attackers to execute arbitrary code via a PNG image that triggers an additional data row.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137570" comment="libpng12-0-1.2.51-3.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137571" comment="libpng12-0-32bit-1.2.51-3.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137572" comment="libpng12-compat-devel-1.2.51-3.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137573" comment="libpng12-devel-1.2.51-3.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137574" comment="libpng16-16-1.6.13-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137575" comment="libpng16-16-32bit-1.6.13-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137576" comment="libpng16-devel-1.6.13-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1206</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1206" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1206" source="CVE"/>
    <description>
    The startDocumentLoad function in browser/base/content/browser.js in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, does not properly implement the Same Origin Policy in certain circumstances related to the about:blank document and a document that is currently loading, which allows (1) remote web servers to conduct spoofing attacks via vectors involving a 204 (aka No Content) status code, and allows (2) remote attackers to conduct spoofing attacks via vectors involving a window.stop call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1207</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1207" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1207" source="CVE"/>
    <description>
    Mozilla Firefox before 3.6.7 and Thunderbird before 3.1.1 do not properly implement read restrictions for CANVAS elements, which allows remote attackers to obtain sensitive cross-origin information via vectors involving reference retention and node deletion.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1208</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1208" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1208" source="CVE"/>
    <description>
    Use-after-free vulnerability in the attribute-cloning functionality in the DOM implementation in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to execute arbitrary code via vectors related to deletion of an event attribute node with a nonzero reference count.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1209</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1209" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1209" source="CVE"/>
    <description>
    Use-after-free vulnerability in the NodeIterator implementation in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to execute arbitrary code via a crafted NodeFilter that detaches DOM nodes, related to the NodeIterator interface and a javascript callback.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1210</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1210" source="CVE"/>
    <description>
    intl/uconv/util/nsUnicodeDecodeHelper.cpp in Mozilla Firefox before 3.6.7 and Thunderbird before 3.1.1 inserts a U+FFFD sequence into text in certain circumstances involving undefined positions, which might make it easier for remote attackers to conduct cross-site scripting (XSS) attacks via crafted 8-bit text.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1211</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1211" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1211" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1212</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1212" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1212" source="CVE"/>
    <description>
    js/src/jstracer.cpp in the browser engine in Mozilla Firefox 3.6.x before 3.6.7 and Thunderbird 3.1.x before 3.1.1 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) propagation of deep aborts in the TraceRecorder::record_JSOP_BINDNAME function, (2) depth handling in the TraceRecorder::record_JSOP_GETELEM function, and (3) tracing of out-of-range arguments in the TraceRecorder::record_JSOP_ARGSUB function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1213</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1213" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1213" source="CVE"/>
    <description>
    The importScripts Web Worker method in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 does not verify that content is valid JavaScript code, which allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted HTML document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1214</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1214" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1214" source="CVE"/>
    <description>
    Integer overflow in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to execute arbitrary code via plugin content with many parameter elements.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1215</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1215" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1215" source="CVE"/>
    <description>
    Mozilla Firefox 3.6.x before 3.6.7 and Thunderbird 3.1.x before 3.1.1 do not properly implement access to a content object through a SafeJSObjectWrapper (aka SJOW) wrapper, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging "access to an object from the chrome scope."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101320" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1320</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1320" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1320" source="CVE"/>
    <description>
    Double free vulnerability in do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7.x and 1.8.x before 1.8.2 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a request associated with (1) renewal or (2) validation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137331" comment="krb5-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137332" comment="krb5-32bit-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137333" comment="krb5-client-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137334" comment="krb5-devel-1.12.2-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1321</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1321" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1321" source="CVE"/>
    <description>
    The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library in MIT Kerberos 5 (aka krb5) through 1.7.1 and 1.8 before 1.8.2, as used in kadmind and other applications, does not properly check for invalid GSS-API tokens, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an AP-REQ message in which the authenticator's checksum field is missing.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137331" comment="krb5-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137332" comment="krb5-32bit-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137333" comment="krb5-client-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137334" comment="krb5-devel-1.12.2-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1322</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1322" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1322" source="CVE"/>
    <description>
    The merge_authdata function in kdc_authdata.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8.x before 1.8.4 does not properly manage an index into an authorization-data list, which allows remote attackers to cause a denial of service (daemon crash), or possibly obtain sensitive information, spoof authorization, or execute arbitrary code, via a TGS request that triggers an uninitialized pointer dereference, as demonstrated by a request from a Windows Active Directory client.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137331" comment="krb5-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137332" comment="krb5-32bit-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137333" comment="krb5-client-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137334" comment="krb5-devel-1.12.2-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1323</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1323" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1323" source="CVE"/>
    <description>
    MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to modify user-visible prompt text, modify a response to a Key Distribution Center (KDC), or forge a KRB-SAFE message via certain checksums that (1) are unkeyed or (2) use RC4 keys.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137331" comment="krb5-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137332" comment="krb5-32bit-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137333" comment="krb5-client-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137334" comment="krb5-devel-1.12.2-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1324</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1324" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1324" source="CVE"/>
    <description>
    MIT Kerberos 5 (aka krb5) 1.7.x and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to forge GSS tokens, gain privileges, or have unspecified other impact via (1) an unkeyed checksum, (2) an unkeyed PAC checksum, or (3) a KrbFastArmoredReq checksum based on an RC4 key.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137331" comment="krb5-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137332" comment="krb5-32bit-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137333" comment="krb5-client-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137334" comment="krb5-devel-1.12.2-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1436</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1436" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1436" source="CVE"/>
    <description>
    gfs2 in the Linux kernel 2.6.18, and possibly other versions, does not properly handle when the gfs2_quota struct occupies two separate pages, which allows local users to cause a denial of service (kernel panic) via certain manipulations that cause an out-of-bounds write, as demonstrated by writing from an ext3 file system to a gfs2 file system.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137315" comment="kernel-default-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137316" comment="kernel-default-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137317" comment="kernel-desktop-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137318" comment="kernel-desktop-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137319" comment="kernel-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137320" comment="kernel-docs-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137321" comment="kernel-macros-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137322" comment="kernel-pae-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137323" comment="kernel-pae-base-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137324" comment="kernel-pae-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137325" comment="kernel-source-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137326" comment="kernel-syms-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137327" comment="kernel-xen-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137328" comment="kernel-xen-devel-3.16.6-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1452</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1452" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1452" source="CVE"/>
    <description>
    The (1) mod_cache and (2) mod_dav modules in the Apache HTTP Server 2.2.x before 2.2.16 allow remote attackers to cause a denial of service (process crash) via a request that lacks a path.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136944" comment="apache2-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136945" comment="apache2-devel-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136946" comment="apache2-doc-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136947" comment="apache2-example-pages-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136948" comment="apache2-prefork-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136949" comment="apache2-utils-2.4.10-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1455</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1455" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1455" source="CVE"/>
    <description>
    The DOCSIS dissector in Wireshark 0.9.6 through 1.0.12 and 1.2.0 through 1.2.7 allows user-assisted remote attackers to cause a denial of service (application crash) via a malformed packet trace file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1585</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1585" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1585" source="CVE"/>
    <description>
    The nsIScriptableUnescapeHTML.parseFragment method in the ParanoidFragmentSink protection mechanism in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, Thunderbird before 3.1.8, and SeaMonkey before 2.0.12 does not properly sanitize HTML in a chrome document, which makes it easier for remote attackers to execute arbitrary JavaScript with chrome privileges via a javascript: URI in input to an extension, as demonstrated by a javascript:alert sequence in (1) the HREF attribute of an A element or (2) the ACTION attribute of a FORM element.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1623</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1623" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1623" source="CVE"/>
    <description>
    Memory leak in the apr_brigade_split_line function in buckets/apr_brigade.c in the Apache Portable Runtime Utility library (aka APR-util) before 1.3.10, as used in the mod_reqtimeout module in the Apache HTTP Server and other software, allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors related to the destruction of an APR bucket.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136944" comment="apache2-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136945" comment="apache2-devel-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136946" comment="apache2-doc-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136947" comment="apache2-example-pages-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136948" comment="apache2-prefork-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136949" comment="apache2-utils-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137392" comment="libapr-util1-1.5.3-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137393" comment="libapr-util1-devel-1.5.3-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1624</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1624" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1624" source="CVE"/>
    <description>
    The msn_emoticon_msg function in slp.c in the MSN protocol plugin in libpurple in Pidgin before 2.7.0 allows remote authenticated users to cause a denial of service (NULL pointer dereference and application crash) via a custom emoticon in a malformed SLP message.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137605" comment="libpurple-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137606" comment="libpurple-meanwhile-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137607" comment="libpurple-tcl-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137608" comment="pidgin-2.10.9-5.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1633</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1633" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1633" source="CVE"/>
    <description>
    RSA verification recovery in the EVP_PKEY_verify_recover function in OpenSSL 1.x before 1.0.0a, as used by pkeyutl and possibly other applications, returns uninitialized memory upon failure, which might allow context-dependent attackers to bypass intended key requirements or obtain sensitive information via unspecified vectors.  NOTE: some of these details are obtained from third party information.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1635</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1635" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1635" source="CVE"/>
    <description>
    The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 field value.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137424" comment="libdcerpc-binding0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137425" comment="libdcerpc-binding0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137426" comment="libdcerpc0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137427" comment="libdcerpc0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137428" comment="libgensec0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137429" comment="libgensec0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137430" comment="libndr-krb5pac0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137431" comment="libndr-krb5pac0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137432" comment="libndr-nbt0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137433" comment="libndr-nbt0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137434" comment="libndr-standard0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137435" comment="libndr-standard0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137436" comment="libndr0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137437" comment="libndr0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137438" comment="libnetapi0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137439" comment="libnetapi0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137440" comment="libpdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137441" comment="libpdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137442" comment="libregistry0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137443" comment="libsamba-credentials0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137444" comment="libsamba-credentials0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137445" comment="libsamba-hostconfig0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137446" comment="libsamba-hostconfig0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137447" comment="libsamba-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137448" comment="libsamba-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137449" comment="libsamdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137450" comment="libsamdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137451" comment="libsmbclient-devel-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137452" comment="libsmbclient-raw0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137453" comment="libsmbclient-raw0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137454" comment="libsmbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137455" comment="libsmbconf0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137456" comment="libsmbconf0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137457" comment="libsmbldap0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137458" comment="libsmbldap0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137459" comment="libtevent-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137460" comment="libtevent-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137461" comment="libwbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137462" comment="libwbclient0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137463" comment="samba-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137464" comment="samba-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137465" comment="samba-client-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137466" comment="samba-client-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137467" comment="samba-doc-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137468" comment="samba-libs-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137469" comment="samba-libs-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137470" comment="samba-winbind-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137471" comment="samba-winbind-32bit-4.1.12-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1641</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1641" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1641" source="CVE"/>
    <description>
    The do_gfs2_set_flags function in fs/gfs2/file.c in the Linux kernel before 2.6.34-git10 does not verify the ownership of a file, which allows local users to bypass intended access restrictions via a SETFLAGS ioctl request.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137315" comment="kernel-default-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137316" comment="kernel-default-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137317" comment="kernel-desktop-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137318" comment="kernel-desktop-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137319" comment="kernel-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137320" comment="kernel-docs-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137321" comment="kernel-macros-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137322" comment="kernel-pae-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137323" comment="kernel-pae-base-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137324" comment="kernel-pae-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137325" comment="kernel-source-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137326" comment="kernel-syms-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137327" comment="kernel-xen-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137328" comment="kernel-xen-devel-3.16.6-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1642</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1642" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1642" source="CVE"/>
    <description>
    The reply_sesssetup_and_X_spnego function in sesssetup.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to trigger an out-of-bounds read, and cause a denial of service (process crash), via a \xff\xff security blob length in a Session Setup AndX request.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137424" comment="libdcerpc-binding0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137425" comment="libdcerpc-binding0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137426" comment="libdcerpc0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137427" comment="libdcerpc0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137428" comment="libgensec0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137429" comment="libgensec0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137430" comment="libndr-krb5pac0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137431" comment="libndr-krb5pac0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137432" comment="libndr-nbt0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137433" comment="libndr-nbt0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137434" comment="libndr-standard0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137435" comment="libndr-standard0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137436" comment="libndr0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137437" comment="libndr0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137438" comment="libnetapi0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137439" comment="libnetapi0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137440" comment="libpdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137441" comment="libpdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137442" comment="libregistry0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137443" comment="libsamba-credentials0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137444" comment="libsamba-credentials0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137445" comment="libsamba-hostconfig0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137446" comment="libsamba-hostconfig0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137447" comment="libsamba-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137448" comment="libsamba-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137449" comment="libsamdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137450" comment="libsamdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137451" comment="libsmbclient-devel-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137452" comment="libsmbclient-raw0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137453" comment="libsmbclient-raw0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137454" comment="libsmbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137455" comment="libsmbconf0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137456" comment="libsmbconf0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137457" comment="libsmbldap0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137458" comment="libsmbldap0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137459" comment="libtevent-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137460" comment="libtevent-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137461" comment="libwbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137462" comment="libwbclient0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137463" comment="samba-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137464" comment="samba-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137465" comment="samba-client-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137466" comment="samba-client-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137467" comment="samba-doc-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137468" comment="samba-libs-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137469" comment="samba-libs-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137470" comment="samba-winbind-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137471" comment="samba-winbind-32bit-4.1.12-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1646</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1646" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1646" source="CVE"/>
    <description>
    The secure path feature in env.c in sudo 1.3.1 through 1.6.9p22 and 1.7.0 through 1.7.2p6 does not properly handle an environment that contains multiple PATH variables, which might allow local users to gain privileges via a crafted value of the last PATH variable.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137883" comment="sudo-1.8.10p3-2.1.6 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1674</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1674" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1674" source="CVE"/>
    <description>
    The extended-community parser in bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed Extended Communities attribute.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137860" comment="quagga-0.99.23-2.1.7 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1675</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1675" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1675" source="CVE"/>
    <description>
    bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (session reset) via a malformed AS_PATHLIMIT path attribute.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137860" comment="quagga-0.99.23-2.1.7 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1748</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-1748" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1748" source="CVE"/>
    <description>
    The cgi_initialize_string function in cgi-bin/var.c in the web interface in CUPS before 1.4.4, as used on Apple Mac OS X 10.5.8, Mac OS X 10.6 before 10.6.4, and other platforms, does not properly handle parameter values containing a % (percent) character without two subsequent hex characters, which allows context-dependent attackers to obtain sensitive information from cupsd process memory via a crafted request, as demonstrated by the (1) /admin?OP=redirect&amp;URL=% and (2) /admin?URL=/admin/&amp;OP=% URIs.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137098" comment="cups-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137099" comment="cups-client-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137100" comment="cups-devel-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137101" comment="cups-libs-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137102" comment="cups-libs-32bit-1.5.4-21.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2023</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2023" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2023" source="CVE"/>
    <description>
    transports/appendfile.c in Exim before 4.72, when a world-writable sticky-bit mail directory is used, does not verify the st_nlink field of mailbox files, which allows local users to cause a denial of service or possibly gain privileges by creating a hard link to another user's file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137159" comment="exim-4.83-3.1.8 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2024</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2024" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2024" source="CVE"/>
    <description>
    transports/appendfile.c in Exim before 4.72, when MBX locking is enabled, allows local users to change permissions of arbitrary files or create arbitrary files, and cause a denial of service or possibly gain privileges, via a symlink attack on a lockfile in /tmp/.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137159" comment="exim-4.83-3.1.8 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2063</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2063" source="CVE"/>
    <description>
    Buffer overflow in the SMB1 packet chaining implementation in the chain_reply function in process.c in smbd in Samba 3.0.x before 3.3.13 allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted field in a packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137424" comment="libdcerpc-binding0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137425" comment="libdcerpc-binding0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137426" comment="libdcerpc0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137427" comment="libdcerpc0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137428" comment="libgensec0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137429" comment="libgensec0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137430" comment="libndr-krb5pac0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137431" comment="libndr-krb5pac0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137432" comment="libndr-nbt0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137433" comment="libndr-nbt0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137434" comment="libndr-standard0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137435" comment="libndr-standard0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137436" comment="libndr0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137437" comment="libndr0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137438" comment="libnetapi0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137439" comment="libnetapi0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137440" comment="libpdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137441" comment="libpdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137442" comment="libregistry0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137443" comment="libsamba-credentials0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137444" comment="libsamba-credentials0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137445" comment="libsamba-hostconfig0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137446" comment="libsamba-hostconfig0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137447" comment="libsamba-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137448" comment="libsamba-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137449" comment="libsamdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137450" comment="libsamdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137451" comment="libsmbclient-devel-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137452" comment="libsmbclient-raw0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137453" comment="libsmbclient-raw0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137454" comment="libsmbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137455" comment="libsmbconf0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137456" comment="libsmbconf0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137457" comment="libsmbldap0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137458" comment="libsmbldap0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137459" comment="libtevent-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137460" comment="libtevent-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137461" comment="libwbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137462" comment="libwbclient0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137463" comment="samba-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137464" comment="samba-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137465" comment="samba-client-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137466" comment="samba-client-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137467" comment="samba-doc-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137468" comment="samba-libs-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137469" comment="samba-libs-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137470" comment="samba-winbind-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137471" comment="samba-winbind-32bit-4.1.12-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2065</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2065" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2065" source="CVE"/>
    <description>
    Integer overflow in the TIFFroundup macro in LibTIFF before 3.9.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted TIFF file that triggers a buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137719" comment="libtiff-devel-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137720" comment="libtiff5-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137721" comment="libtiff5-32bit-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137722" comment="tiff-4.0.3-10.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2066</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2066" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2066" source="CVE"/>
    <description>
    The mext_check_arguments function in fs/ext4/move_extent.c in the Linux kernel before 2.6.35 allows local users to overwrite an append-only file via a MOVE_EXT ioctl call that specifies this file as a donor.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137315" comment="kernel-default-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137316" comment="kernel-default-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137317" comment="kernel-desktop-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137318" comment="kernel-desktop-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137319" comment="kernel-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137320" comment="kernel-docs-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137321" comment="kernel-macros-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137322" comment="kernel-pae-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137323" comment="kernel-pae-base-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137324" comment="kernel-pae-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137325" comment="kernel-source-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137326" comment="kernel-syms-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137327" comment="kernel-xen-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137328" comment="kernel-xen-devel-3.16.6-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2067</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2067" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2067" source="CVE"/>
    <description>
    Stack-based buffer overflow in the TIFFFetchSubjectDistance function in tif_dirread.c in LibTIFF before 3.9.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long EXIF SubjectDistance field in a TIFF file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137719" comment="libtiff-devel-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137720" comment="libtiff5-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137721" comment="libtiff5-32bit-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137722" comment="tiff-4.0.3-10.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2068</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2068" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2068" source="CVE"/>
    <description>
    mod_proxy_http.c in mod_proxy_http in the Apache HTTP Server 2.2.9 through 2.2.15, 2.3.4-alpha, and 2.3.5-alpha on Windows, NetWare, and OS/2, in certain configurations involving proxy worker pools, does not properly detect timeouts, which allows remote attackers to obtain a potentially sensitive response intended for a different client in opportunistic circumstances via a normal HTTP request.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136944" comment="apache2-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136945" comment="apache2-devel-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136946" comment="apache2-doc-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136947" comment="apache2-example-pages-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136948" comment="apache2-prefork-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136949" comment="apache2-utils-2.4.10-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2074</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2074" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2074" source="CVE"/>
    <description>
    istream.c in w3m 0.5.2 and possibly other versions, when ssl_verify_server is enabled, does not properly handle a '\0' character in a domain name in the (1) subject's Common Name or (2) Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137900" comment="w3m-0.5.3-155.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2156</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2156" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2156" source="CVE"/>
    <description>
    ISC DHCP 4.1 before 4.1.1-P1 and 4.0 before 4.0.2-P1 allows remote attackers to cause a denial of service (server exit) via a zero-length client ID.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137130" comment="dhcp-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137131" comment="dhcp-client-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137132" comment="dhcp-doc-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137133" comment="dhcp-relay-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137134" comment="dhcp-server-4.2.6-9.2.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2225</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2225" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2225" source="CVE"/>
    <description>
    Use-after-free vulnerability in the SplObjectStorage unserializer in PHP 5.2.x and 5.3.x through 5.3.2 allows remote attackers to execute arbitrary code or obtain sensitive information via serialized data, related to the PHP unserialize function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2233</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2233" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2233" source="CVE"/>
    <description>
    tif_getimage.c in LibTIFF 3.9.0 and 3.9.2 on 64-bit platforms, as used in ImageMagick, does not properly perform vertical flips, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted TIFF image, related to "downsampled OJPEG input."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137719" comment="libtiff-devel-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137720" comment="libtiff5-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137721" comment="libtiff5-32bit-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137722" comment="tiff-4.0.3-10.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2240</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2240" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2240" source="CVE"/>
    <description>
    The do_anonymous_page function in mm/memory.c in the Linux kernel before 2.6.27.52, 2.6.32.x before 2.6.32.19, 2.6.34.x before 2.6.34.4, and 2.6.35.x before 2.6.35.2 does not properly separate the stack and the heap, which allows context-dependent attackers to execute arbitrary code by writing to the bottom page of a shared memory segment, as demonstrated by a memory-exhaustion attack against the X.Org X server.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137919" comment="xorg-x11-server-7.6_1.16.1-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137920" comment="xorg-x11-server-extra-7.6_1.16.1-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137921" comment="xorg-x11-server-sdk-7.6_1.16.1-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2242</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2242" source="CVE"/>
    <description>
    Red Hat libvirt 0.2.0 through 0.8.2 creates iptables rules with improper mappings of privileged source ports, which allows guest OS users to bypass intended access restrictions by leveraging IP address and source-port values, as demonstrated by copying and deleting an NFS directory tree.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137726" comment="libvirt-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137727" comment="libvirt-client-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137728" comment="libvirt-daemon-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137729" comment="libvirt-daemon-config-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137730" comment="libvirt-daemon-config-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137731" comment="libvirt-daemon-driver-interface-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137732" comment="libvirt-daemon-driver-libxl-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137733" comment="libvirt-daemon-driver-lxc-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137734" comment="libvirt-daemon-driver-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137735" comment="libvirt-daemon-driver-nodedev-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137736" comment="libvirt-daemon-driver-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137737" comment="libvirt-daemon-driver-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137738" comment="libvirt-daemon-driver-secret-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137739" comment="libvirt-daemon-driver-storage-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137740" comment="libvirt-daemon-driver-uml-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137741" comment="libvirt-daemon-driver-vbox-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137742" comment="libvirt-daemon-driver-xen-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137743" comment="libvirt-daemon-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137744" comment="libvirt-daemon-xen-1.2.9-1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2244</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2244" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2244" source="CVE"/>
    <description>
    The AvahiDnsPacket function in avahi-core/socket.c in avahi-daemon in Avahi 0.6.16 and 0.6.25 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a DNS packet with an invalid checksum followed by a DNS packet with a valid checksum, a different vulnerability than CVE-2008-5081.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137022" comment="avahi-0.6.31-23.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137023" comment="avahi-autoipd-0.6.31-23.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137024" comment="avahi-compat-mDNSResponder-devel-0.6.31-23.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137025" comment="libavahi-client3-0.6.31-23.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137026" comment="libavahi-common3-0.6.31-23.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137027" comment="libavahi-core7-0.6.31-23.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137028" comment="libavahi-devel-0.6.31-23.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137029" comment="libdns_sd-0.6.31-23.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2252</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2252" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2252" source="CVE"/>
    <description>
    GNU Wget 1.12 and earlier uses a server-provided filename instead of the original URL to determine the destination filename of a download, which allows remote servers to create or overwrite arbitrary files via a 3xx redirect to a URL with a .wgetrc filename followed by a 3xx redirect to a URL with a crafted filename, and possibly execute arbitrary code as a consequence of writing to a dotfile in a home directory.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137901" comment="wget-1.15-4.1.3 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2494</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2494" source="CVE"/>
    <description>
    Multiple buffer underflows in the base64 decoder in base64.c in (1) bogofilter and (2) bogolexer in bogofilter before 1.2.2 allow remote attackers to cause a denial of service (heap memory corruption and application crash) via an e-mail message with invalid base64 data that begins with an = (equals) character.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137050" comment="bogofilter-1.2.4-4.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2497</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2497" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2497" source="CVE"/>
    <description>
    Integer underflow in glyph handling in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137173" comment="freetype2-devel-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137176" comment="ft2demos-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137174" comment="libfreetype6-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137175" comment="libfreetype6-32bit-2.5.3-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2528</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2528" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2528" source="CVE"/>
    <description>
    The clientautoresp function in family_icbm.c in the oscar protocol plugin in libpurple in Pidgin before 2.7.2 allows remote authenticated users to cause a denial of service (NULL pointer dereference and application crash) via an X-Status message that lacks the expected end tag for a (1) desc or (2) title element.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137605" comment="libpurple-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137606" comment="libpurple-meanwhile-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137607" comment="libpurple-tcl-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137608" comment="pidgin-2.10.9-5.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2529</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2529" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2529" source="CVE"/>
    <description>
    Unspecified vulnerability in ping.c in iputils 20020927, 20070202, 20071127, and 20100214 on Mandriva Linux allows remote attackers to cause a denial of service (hang) via a crafted echo response.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137278" comment="iputils-s20121221-2.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2546</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2546" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2546" source="CVE"/>
    <description>
    Multiple heap-based buffer overflows in loaders/load_it.c in libmikmod, possibly 3.1.12, might allow remote attackers to execute arbitrary code via (1) crafted samples or (2) crafted instrument definitions in an Impulse Tracker file, related to panpts, pitpts, and IT_ProcessEnvelope.  NOTE: some of these details are obtained from third party information.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-3995.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137539" comment="libmikmod3-3.3.6-3.1.3 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2547</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2547" source="CVE"/>
    <description>
    Use-after-free vulnerability in kbx/keybox-blob.c in GPGSM in GnuPG 2.x through 2.0.16 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a certificate with a large number of Subject Alternate Names, which is not properly handled in a realloc operation when importing the certificate or verifying its signature.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137253" comment="gpg2-2.0.26-2.1.3 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2640</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2640" source="CVE"/>
    <description>
    Array index error in the PK font parser in the dvi-backend component in Evince 2.32 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font in conjunction with a DVI file that is processed by the thumbnailer.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137151" comment="evince-3.14.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137152" comment="evince-browser-plugin-3.14.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137153" comment="libevdocument3-4-3.14.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137154" comment="libevview3-3-3.14.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137155" comment="nautilus-evince-3.14.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137156" comment="typelib-1_0-EvinceDocument-3_0-3.14.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137157" comment="typelib-1_0-EvinceView-3_0-3.14.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2641</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2641" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2641" source="CVE"/>
    <description>
    Array index error in the VF font parser in the dvi-backend component in Evince 2.32 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font in conjunction with a DVI file that is processed by the thumbnailer.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137151" comment="evince-3.14.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137152" comment="evince-browser-plugin-3.14.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137153" comment="libevdocument3-4-3.14.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137154" comment="libevview3-3-3.14.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137155" comment="nautilus-evince-3.14.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137156" comment="typelib-1_0-EvinceDocument-3_0-3.14.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137157" comment="typelib-1_0-EvinceView-3_0-3.14.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2642</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2642" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2642" source="CVE"/>
    <description>
    Heap-based buffer overflow in the AFM font parser in the dvi-backend component in Evince 2.32 and earlier, teTeX 3.0, t1lib 5.1.2, and possibly other products allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font in conjunction with a DVI file that is processed by the thumbnailer.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137151" comment="evince-3.14.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137152" comment="evince-browser-plugin-3.14.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137153" comment="libevdocument3-4-3.14.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137154" comment="libevview3-3-3.14.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137155" comment="nautilus-evince-3.14.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137156" comment="typelib-1_0-EvinceDocument-3_0-3.14.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137157" comment="typelib-1_0-EvinceView-3_0-3.14.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2643</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2643" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2643" source="CVE"/>
    <description>
    Integer overflow in the TFM font parser in the dvi-backend component in Evince 2.32 and earlier allows remote attackers to execute arbitrary code via a crafted font in conjunction with a DVI file that is processed by the thumbnailer.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137151" comment="evince-3.14.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137152" comment="evince-browser-plugin-3.14.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137153" comment="libevdocument3-4-3.14.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137154" comment="libevview3-3-3.14.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137155" comment="nautilus-evince-3.14.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137156" comment="typelib-1_0-EvinceDocument-3_0-3.14.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137157" comment="typelib-1_0-EvinceView-3_0-3.14.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2751</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2751" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2751" source="CVE"/>
    <description>
    The nsDocShell::OnRedirectStateChange function in docshell/base/nsDocShell.cpp in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to spoof the SSL security status of a document via vectors involving multiple requests, a redirect, and the history.back and history.forward JavaScript functions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2752</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2752" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2752" source="CVE"/>
    <description>
    Integer overflow in an array class in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 allows remote attackers to execute arbitrary code by placing many Cascading Style Sheets (CSS) values in an array, related to references to external font resources and an inconsistency between 16-bit and 32-bit integers.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2753</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2753" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2753" source="CVE"/>
    <description>
    Integer overflow in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 allows remote attackers to execute arbitrary code via a large selection attribute in a XUL tree element, which triggers a use-after-free.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2754</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2754" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2754" source="CVE"/>
    <description>
    dom/base/nsJSEnvironment.cpp in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 does not properly suppress a script's URL in certain circumstances involving a redirect and an error message, which allows remote attackers to obtain sensitive information about script parameters via a crafted HTML document, related to the window.onerror handler.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2755</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2755" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2755" source="CVE"/>
    <description>
    layout/generic/nsObjectFrame.cpp in Mozilla Firefox 3.6.7 does not properly free memory in the parameter array of a plugin instance, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a crafted HTML document, related to the DATA and SRC attributes of an OBJECT element. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-1214.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2760</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2760" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2760" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsTreeSelection function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 might allow remote attackers to execute arbitrary code via vectors involving a XUL tree selection, related to a "dangling pointer vulnerability." NOTE: this issue exists because of an incomplete fix for CVE-2010-2753.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2761</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2761" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2761" source="CVE"/>
    <description>
    The multipart_init function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier uses a hardcoded value of the MIME boundary string in multipart/x-mixed-replace content, which allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted input that contains this value, a different vulnerability than CVE-2010-3172.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137830" comment="perl-5.20.1-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137831" comment="perl-32bit-5.20.1-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137832" comment="perl-base-5.20.1-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137833" comment="perl-doc-5.20.1-1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2762</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2762" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2762" source="CVE"/>
    <description>
    The XPCSafeJSObjectWrapper class in the SafeJSObjectWrapper (aka SJOW) implementation in Mozilla Firefox 3.6.x before 3.6.9 and Thunderbird 3.1.x before 3.1.3 does not properly restrict objects at the end of scope chains, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via vectors related to a chrome privileged object and a chain ending in an outer object.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2763</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2763" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2763" source="CVE"/>
    <description>
    The XPCSafeJSObjectWrapper class in the SafeJSObjectWrapper (aka SJOW) implementation in Mozilla Firefox before 3.5.12, Thunderbird before 3.0.7, and SeaMonkey before 2.0.7 does not properly restrict scripted functions, which allows remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via a crafted function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2764</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2764" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2764" source="CVE"/>
    <description>
    Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 do not properly restrict read access to the statusText property of XMLHttpRequest objects, which allows remote attackers to discover the existence of intranet web servers via cross-origin requests.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2765</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2765" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2765" source="CVE"/>
    <description>
    Integer overflow in the FRAMESET element implementation in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 might allow remote attackers to execute arbitrary code via a large number of values in the cols (aka columns) attribute, leading to a heap-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2766</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2766" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2766" source="CVE"/>
    <description>
    The normalizeDocument function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 does not properly handle the removal of DOM nodes during normalization, which might allow remote attackers to execute arbitrary code via vectors involving access to a deleted object.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2767</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2767" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2767" source="CVE"/>
    <description>
    The navigator.plugins implementation in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 does not properly handle destruction of the DOM plugin array, which might allow remote attackers to cause a denial of service (application crash) or execute arbitrary code via crafted access to the navigator object, related to a "dangling pointer vulnerability."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2768</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2768" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2768" source="CVE"/>
    <description>
    Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 do not properly restrict use of the type attribute of an OBJECT element to set a document's charset, which allows remote attackers to bypass cross-site scripting (XSS) protection mechanisms via UTF-7 encoding.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2769</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2769" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2769" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 allows user-assisted remote attackers to inject arbitrary web script or HTML via a selection that is added to a document in which the designMode property is enabled.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2800</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2800" source="CVE"/>
    <description>
    The MS-ZIP decompressor in cabextract before 1.3 allows remote attackers to cause a denial of service (infinite loop) via a malformed MSZIP archive in a .cab file during a (1) test or (2) extract action, related to the libmspack library.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137544" comment="libmspack0-0.4-5.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2801</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2801" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2801" source="CVE"/>
    <description>
    Integer signedness error in the Quantum decompressor in cabextract before 1.3, when archive test mode is used, allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Quantum archive in a .cab file, related to the libmspack library.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137544" comment="libmspack0-0.4-5.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2805</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2805" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2805" source="CVE"/>
    <description>
    The FT_Stream_EnterFrame function in base/ftstream.c in FreeType before 2.4.2 does not properly validate certain position values, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137173" comment="freetype2-devel-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137176" comment="ft2demos-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137174" comment="libfreetype6-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137175" comment="libfreetype6-32bit-2.5.3-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2891</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2891" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2891" source="CVE"/>
    <description>
    Buffer overflow in the smiGetNode function in lib/smi.c in libsmi 0.4.8 allows context-dependent attackers to execute arbitrary code via an Object Identifier (aka OID) represented as a numerical string containing many components separated by . (dot) characters.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137679" comment="libsmi-0.4.8-19.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137680" comment="libsmi2-0.4.8-19.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2935</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2935" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2935" source="CVE"/>
    <description>
    simpress.bin in the Impress module in OpenOffice.org (OOo) 2.x and 3.x before 3.3 does not properly handle integer values associated with dictionary property items, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PowerPoint document that triggers a heap-based buffer overflow, related to an "integer truncation error."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137639" comment="libreoffice-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137640" comment="libreoffice-base-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137641" comment="libreoffice-base-drivers-mysql-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137642" comment="libreoffice-calc-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137643" comment="libreoffice-calc-extensions-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137644" comment="libreoffice-draw-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137645" comment="libreoffice-filters-optional-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137646" comment="libreoffice-gnome-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137647" comment="libreoffice-icon-theme-galaxy-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137648" comment="libreoffice-icon-theme-hicontrast-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137649" comment="libreoffice-icon-theme-oxygen-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137650" comment="libreoffice-icon-theme-sifr-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137651" comment="libreoffice-icon-theme-tango-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137652" comment="libreoffice-impress-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137653" comment="libreoffice-kde4-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137654" comment="libreoffice-l10n-cs-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137655" comment="libreoffice-l10n-da-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137656" comment="libreoffice-l10n-de-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137657" comment="libreoffice-l10n-el-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137658" comment="libreoffice-l10n-en-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137659" comment="libreoffice-l10n-es-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137660" comment="libreoffice-l10n-fr-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137661" comment="libreoffice-l10n-hu-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137662" comment="libreoffice-l10n-it-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137663" comment="libreoffice-l10n-ja-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137664" comment="libreoffice-l10n-pl-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137665" comment="libreoffice-l10n-ru-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137666" comment="libreoffice-mailmerge-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137667" comment="libreoffice-math-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137668" comment="libreoffice-pyuno-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137669" comment="libreoffice-writer-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137670" comment="libreoffice-writer-extensions-4.3.2.2-1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2936</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2936" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2936" source="CVE"/>
    <description>
    Integer overflow in simpress.bin in the Impress module in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted polygons in a PowerPoint document that triggers a heap-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137639" comment="libreoffice-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137640" comment="libreoffice-base-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137641" comment="libreoffice-base-drivers-mysql-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137642" comment="libreoffice-calc-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137643" comment="libreoffice-calc-extensions-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137644" comment="libreoffice-draw-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137645" comment="libreoffice-filters-optional-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137646" comment="libreoffice-gnome-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137647" comment="libreoffice-icon-theme-galaxy-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137648" comment="libreoffice-icon-theme-hicontrast-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137649" comment="libreoffice-icon-theme-oxygen-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137650" comment="libreoffice-icon-theme-sifr-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137651" comment="libreoffice-icon-theme-tango-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137652" comment="libreoffice-impress-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137653" comment="libreoffice-kde4-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137654" comment="libreoffice-l10n-cs-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137655" comment="libreoffice-l10n-da-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137656" comment="libreoffice-l10n-de-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137657" comment="libreoffice-l10n-el-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137658" comment="libreoffice-l10n-en-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137659" comment="libreoffice-l10n-es-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137660" comment="libreoffice-l10n-fr-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137661" comment="libreoffice-l10n-hu-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137662" comment="libreoffice-l10n-it-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137663" comment="libreoffice-l10n-ja-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137664" comment="libreoffice-l10n-pl-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137665" comment="libreoffice-l10n-ru-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137666" comment="libreoffice-mailmerge-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137667" comment="libreoffice-math-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137668" comment="libreoffice-pyuno-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137669" comment="libreoffice-writer-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137670" comment="libreoffice-writer-extensions-4.3.2.2-1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2939</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2939" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2939" source="CVE"/>
    <description>
    Double free vulnerability in the ssl3_get_key_exchange function in the OpenSSL client (ssl/s3_clnt.c) in OpenSSL 1.0.0a, 0.9.8, 0.9.7, and possibly other versions, when using ECDH, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted private key with an invalid prime.  NOTE: some sources refer to this as a use-after-free issue.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2941</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2941" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2941" source="CVE"/>
    <description>
    ipp.c in cupsd in CUPS 1.4.4 and earlier does not properly allocate memory for attribute values with invalid string data types, which allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly execute arbitrary code via a crafted IPP request.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137098" comment="cups-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137099" comment="cups-client-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137100" comment="cups-devel-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137101" comment="cups-libs-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137102" comment="cups-libs-32bit-1.5.4-21.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2942</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2942" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2942" source="CVE"/>
    <description>
    The actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc2 does not properly initialize certain structure members when performing dump operations, which allows local users to obtain potentially sensitive information from kernel memory via vectors related to (1) the tcf_gact_dump function in net/sched/act_gact.c, (2) the tcf_mirred_dump function in net/sched/act_mirred.c, (3) the tcf_nat_dump function in net/sched/act_nat.c, (4) the tcf_simp_dump function in net/sched/act_simple.c, and (5) the tcf_skbedit_dump function in net/sched/act_skbedit.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137315" comment="kernel-default-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137316" comment="kernel-default-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137317" comment="kernel-desktop-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137318" comment="kernel-desktop-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137319" comment="kernel-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137320" comment="kernel-docs-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137321" comment="kernel-macros-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137322" comment="kernel-pae-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137323" comment="kernel-pae-base-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137324" comment="kernel-pae-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137325" comment="kernel-source-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137326" comment="kernel-syms-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137327" comment="kernel-xen-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137328" comment="kernel-xen-devel-3.16.6-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2947</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2947" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2947" source="CVE"/>
    <description>
    Heap-based buffer overflow in the HX_split function in string.c in libHX before 3.6 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a string that is inconsistent with the expected number of fields.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137337" comment="libHX28-3.22-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137338" comment="libHX28-32bit-3.22-1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2950</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2950" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2950" source="CVE"/>
    <description>
    Format string vulnerability in stream.c in the phar extension in PHP 5.3.x through 5.3.3 allows context-dependent attackers to obtain sensitive information (memory contents) and possibly execute arbitrary code via a crafted phar:// URI that is not properly handled by the phar_stream_flush function, leading to errors in the php_stream_wrapper_log_error function.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-2094.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2954</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2954" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2954" source="CVE"/>
    <description>
    The irda_bind function in net/irda/af_irda.c in the Linux kernel before 2.6.36-rc3-next-20100901 does not properly handle failure of the irda_open_tsap function, which allows local users to cause a denial of service (NULL pointer dereference and panic) and possibly have unspecified other impact via multiple unsuccessful calls to bind on an AF_IRDA (aka PF_IRDA) socket.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137315" comment="kernel-default-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137316" comment="kernel-default-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137317" comment="kernel-desktop-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137318" comment="kernel-desktop-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137319" comment="kernel-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137320" comment="kernel-docs-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137321" comment="kernel-macros-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137322" comment="kernel-pae-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137323" comment="kernel-pae-base-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137324" comment="kernel-pae-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137325" comment="kernel-source-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137326" comment="kernel-syms-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137327" comment="kernel-xen-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137328" comment="kernel-xen-devel-3.16.6-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2955</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2955" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2955" source="CVE"/>
    <description>
    The cfg80211_wext_giwessid function in net/wireless/wext-compat.c in the Linux kernel before 2.6.36-rc3-next-20100831 does not properly initialize certain structure members, which allows local users to leverage an off-by-one error in the ioctl_standard_iw_point function in net/wireless/wext-core.c, and obtain potentially sensitive information from kernel heap memory, via vectors involving an SIOCGIWESSID ioctl call that specifies a large buffer size.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137315" comment="kernel-default-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137316" comment="kernel-default-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137317" comment="kernel-desktop-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137318" comment="kernel-desktop-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137319" comment="kernel-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137320" comment="kernel-docs-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137321" comment="kernel-macros-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137322" comment="kernel-pae-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137323" comment="kernel-pae-base-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137324" comment="kernel-pae-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137325" comment="kernel-source-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137326" comment="kernel-syms-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137327" comment="kernel-xen-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137328" comment="kernel-xen-devel-3.16.6-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2993</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-2993" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2993" source="CVE"/>
    <description>
    The IPMI dissector in Wireshark 1.2.0 through 1.2.9 allows remote attackers to cause a denial of service (infinite loop) via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3053</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3053" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3053" source="CVE"/>
    <description>
    bdf/bdflib.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (application crash) via a crafted BDF font file, related to an attempted modification of a value in a static string.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137173" comment="freetype2-devel-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137176" comment="ft2demos-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137174" comment="libfreetype6-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137175" comment="libfreetype6-32bit-2.5.3-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3054</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3054" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3054" source="CVE"/>
    <description>
    Unspecified vulnerability in FreeType 2.3.9, and other versions before 2.4.2, allows remote attackers to cause a denial of service via vectors involving nested Standard Encoding Accented Character (aka seac) calls, related to psaux.h, cffgload.c, cffgload.h, and t1decode.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137173" comment="freetype2-devel-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137176" comment="ft2demos-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137174" comment="libfreetype6-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137175" comment="libfreetype6-32bit-2.5.3-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3069</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3069" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3069" source="CVE"/>
    <description>
    Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137424" comment="libdcerpc-binding0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137425" comment="libdcerpc-binding0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137426" comment="libdcerpc0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137427" comment="libdcerpc0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137428" comment="libgensec0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137429" comment="libgensec0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137430" comment="libndr-krb5pac0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137431" comment="libndr-krb5pac0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137432" comment="libndr-nbt0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137433" comment="libndr-nbt0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137434" comment="libndr-standard0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137435" comment="libndr-standard0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137436" comment="libndr0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137437" comment="libndr0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137438" comment="libnetapi0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137439" comment="libnetapi0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137440" comment="libpdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137441" comment="libpdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137442" comment="libregistry0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137443" comment="libsamba-credentials0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137444" comment="libsamba-credentials0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137445" comment="libsamba-hostconfig0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137446" comment="libsamba-hostconfig0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137447" comment="libsamba-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137448" comment="libsamba-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137449" comment="libsamdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137450" comment="libsamdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137451" comment="libsmbclient-devel-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137452" comment="libsmbclient-raw0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137453" comment="libsmbclient-raw0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137454" comment="libsmbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137455" comment="libsmbconf0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137456" comment="libsmbconf0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137457" comment="libsmbldap0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137458" comment="libsmbldap0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137459" comment="libtevent-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137460" comment="libtevent-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137461" comment="libwbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137462" comment="libwbclient0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137463" comment="samba-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137464" comment="samba-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137465" comment="samba-client-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137466" comment="samba-client-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137467" comment="samba-doc-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137468" comment="samba-libs-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137469" comment="samba-libs-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137470" comment="samba-winbind-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137471" comment="samba-winbind-32bit-4.1.12-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3081</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3081" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3081" source="CVE"/>
    <description>
    The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a "stack pointer underflow" issue, as exploited in the wild in September 2010.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137315" comment="kernel-default-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137316" comment="kernel-default-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137317" comment="kernel-desktop-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137318" comment="kernel-desktop-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137319" comment="kernel-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137320" comment="kernel-docs-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137321" comment="kernel-macros-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137322" comment="kernel-pae-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137323" comment="kernel-pae-base-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137324" comment="kernel-pae-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137325" comment="kernel-source-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137326" comment="kernel-syms-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137327" comment="kernel-xen-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137328" comment="kernel-xen-devel-3.16.6-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3166</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3166" source="CVE"/>
    <description>
    Heap-based buffer overflow in the nsTextFrameUtils::TransformText function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 might allow remote attackers to execute arbitrary code via a bidirectional text run.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3167</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3167" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3167" source="CVE"/>
    <description>
    The nsTreeContentView function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 does not properly handle node removal in XUL trees, which allows remote attackers to execute arbitrary code via vectors involving access to deleted memory, related to a "dangling pointer vulnerability."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3168</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3168" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3168" source="CVE"/>
    <description>
    Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 do not properly restrict the role of property changes in triggering XUL tree removal, which allows remote attackers to cause a denial of service (deleted memory access and application crash) or possibly execute arbitrary code by setting unspecified properties.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3169</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3169" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3170</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3170" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3170" source="CVE"/>
    <description>
    Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 recognize a wildcard IP address in the subject's Common Name field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137486" comment="libfreebl3-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137487" comment="libsoftokn3-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137488" comment="mozilla-nss-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137489" comment="mozilla-nss-certs-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137490" comment="mozilla-nss-devel-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137491" comment="mozilla-nss-tools-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3173</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3173" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3173" source="CVE"/>
    <description>
    The SSL implementation in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 does not properly set the minimum key length for Diffie-Hellman Ephemeral (DHE) mode, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3174</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3174" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.14, Thunderbird before 3.0.9, and SeaMonkey before 2.0.9 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3175</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3175" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3175" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.6.x before 3.6.11 and Thunderbird 3.1.x before 3.1.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3176</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3176" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3176" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3177</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3177" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3177" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in the Gopher parser in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, and SeaMonkey before 2.0.9, allow remote attackers to inject arbitrary web script or HTML via a crafted name of a (1) file or (2) directory on a Gopher server.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3178</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3178" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3178" source="CVE"/>
    <description>
    Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 do not properly handle certain modal calls made by javascript: URLs in circumstances related to opening a new window and performing cross-domain navigation, which allows remote attackers to bypass the Same Origin Policy via a crafted HTML document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3179</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3179" source="CVE"/>
    <description>
    Stack-based buffer overflow in the text-rendering functionality in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a long argument to the document.write method.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3180</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3180" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsBarProp function in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 allows remote attackers to execute arbitrary code by accessing the locationbar property of a closed window.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3182</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3182" source="CVE"/>
    <description>
    A certain application-launch script in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 on Linux places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3183</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3183" source="CVE"/>
    <description>
    The LookupGetterOrSetter function in js3250.dll in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 does not properly support window.__lookupGetter__ function calls that lack arguments, which allows remote attackers to execute arbitrary code or cause a denial of service (incorrect pointer dereference and application crash) via vectors involving a "dangling pointer" and the JS_ValueToId function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3296</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3296" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3296" source="CVE"/>
    <description>
    The cxgb_extension_ioctl function in drivers/net/cxgb3/cxgb3_main.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a CHELSIO_GET_QSET_NUM ioctl call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137315" comment="kernel-default-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137316" comment="kernel-default-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137317" comment="kernel-desktop-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137318" comment="kernel-desktop-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137319" comment="kernel-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137320" comment="kernel-docs-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137321" comment="kernel-macros-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137322" comment="kernel-pae-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137323" comment="kernel-pae-base-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137324" comment="kernel-pae-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137325" comment="kernel-source-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137326" comment="kernel-syms-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137327" comment="kernel-xen-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137328" comment="kernel-xen-devel-3.16.6-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3297</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3297" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3297" source="CVE"/>
    <description>
    The eql_g_master_cfg function in drivers/net/eql.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an EQL_GETMASTRCFG ioctl call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137315" comment="kernel-default-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137316" comment="kernel-default-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137317" comment="kernel-desktop-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137318" comment="kernel-desktop-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137319" comment="kernel-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137320" comment="kernel-docs-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137321" comment="kernel-macros-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137322" comment="kernel-pae-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137323" comment="kernel-pae-base-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137324" comment="kernel-pae-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137325" comment="kernel-source-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137326" comment="kernel-syms-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137327" comment="kernel-xen-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137328" comment="kernel-xen-devel-3.16.6-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3298</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3298" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3298" source="CVE"/>
    <description>
    The hso_get_count function in drivers/net/usb/hso.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137315" comment="kernel-default-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137316" comment="kernel-default-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137317" comment="kernel-desktop-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137318" comment="kernel-desktop-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137319" comment="kernel-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137320" comment="kernel-docs-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137321" comment="kernel-macros-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137322" comment="kernel-pae-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137323" comment="kernel-pae-base-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137324" comment="kernel-pae-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137325" comment="kernel-source-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137326" comment="kernel-syms-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137327" comment="kernel-xen-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137328" comment="kernel-xen-devel-3.16.6-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3301</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3301" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3301" source="CVE"/>
    <description>
    The IA32 system call emulation functionality in arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.36-rc4-git2 on the x86_64 platform does not zero extend the %eax register after the 32-bit entry path to ptrace is used, which allows local users to gain privileges by triggering an out-of-bounds access to the system call table using the %rax register.  NOTE: this vulnerability exists because of a CVE-2007-4573 regression.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137315" comment="kernel-default-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137316" comment="kernel-default-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137317" comment="kernel-desktop-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137318" comment="kernel-desktop-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137319" comment="kernel-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137320" comment="kernel-docs-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137321" comment="kernel-macros-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137322" comment="kernel-pae-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137323" comment="kernel-pae-base-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137324" comment="kernel-pae-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137325" comment="kernel-source-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137326" comment="kernel-syms-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137327" comment="kernel-xen-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137328" comment="kernel-xen-devel-3.16.6-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3310</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3310" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3310" source="CVE"/>
    <description>
    Multiple integer signedness errors in net/rose/af_rose.c in the Linux kernel before 2.6.36-rc5-next-20100923 allow local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a rose_getname function call, related to the rose_bind and rose_connect functions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137315" comment="kernel-default-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137316" comment="kernel-default-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137317" comment="kernel-desktop-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137318" comment="kernel-desktop-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137319" comment="kernel-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137320" comment="kernel-docs-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137321" comment="kernel-macros-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137322" comment="kernel-pae-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137323" comment="kernel-pae-base-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137324" comment="kernel-pae-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137325" comment="kernel-source-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137326" comment="kernel-syms-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137327" comment="kernel-xen-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137328" comment="kernel-xen-devel-3.16.6-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3311</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3311" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3311" source="CVE"/>
    <description>
    Integer overflow in base/ftstream.c in libXft (aka the X FreeType library) in FreeType before 2.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Compact Font Format (CFF) font file that triggers a heap-based buffer overflow, related to an "input stream position error" issue, a different vulnerability than CVE-2010-1797.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137173" comment="freetype2-devel-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137176" comment="ft2demos-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137174" comment="libfreetype6-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137175" comment="libfreetype6-32bit-2.5.3-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3315</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3315" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3315" source="CVE"/>
    <description>
    authz.c in the mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x before 1.5.8 and 1.6.x before 1.6.13, when SVNPathAuthz short_circuit is enabled, does not properly handle a named repository as a rule scope, which allows remote authenticated users to bypass intended access restrictions via svn commands.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137877" comment="subversion-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137878" comment="subversion-devel-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137879" comment="subversion-perl-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137880" comment="subversion-python-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137881" comment="subversion-server-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137882" comment="subversion-tools-1.8.10-2.4.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3430</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3430" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3430" source="CVE"/>
    <description>
    The privilege-dropping implementation in the (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) 1.1.2 does not perform the required setfsgid and setgroups system calls, which might allow local users to obtain sensitive information by leveraging unintended group permissions, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-3435.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137820" comment="pam-1.1.8-11.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137821" comment="pam-32bit-1.1.8-11.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137822" comment="pam-devel-1.1.8-11.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3431</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3431" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3431" source="CVE"/>
    <description>
    The privilege-dropping implementation in the (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) 1.1.2 does not check the return value of the setfsuid system call, which might allow local users to obtain sensitive information by leveraging an unintended uid, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-3435.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137820" comment="pam-1.1.8-11.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137821" comment="pam-32bit-1.1.8-11.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137822" comment="pam-devel-1.1.8-11.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3433</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3433" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3433" source="CVE"/>
    <description>
    The PL/perl and PL/Tcl implementations in PostgreSQL 7.4 before 7.4.30, 8.0 before 8.0.26, 8.1 before 8.1.22, 8.2 before 8.2.18, 8.3 before 8.3.12, 8.4 before 8.4.5, and 9.0 before 9.0.1 do not properly protect script execution by a different SQL user identity within the same session, which allows remote authenticated users to gain privileges via crafted script code in a SECURITY DEFINER function, as demonstrated by (1) redefining standard functions or (2) redefining operators, a different vulnerability than CVE-2010-1168, CVE-2010-1169, CVE-2010-1170, and CVE-2010-1447.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137474" comment="libecpg6-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137475" comment="libpq5-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137476" comment="libpq5-32bit-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137477" comment="postgresql93-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137478" comment="postgresql93-contrib-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137479" comment="postgresql93-devel-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137480" comment="postgresql93-docs-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137481" comment="postgresql93-server-9.3.5-2.1.14 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3436</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3436" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3436" source="CVE"/>
    <description>
    fopen_wrappers.c in PHP 5.3.x through 5.3.3 might allow remote attackers to bypass open_basedir restrictions via vectors related to the length of a filename.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3445</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3445" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3445" source="CVE"/>
    <description>
    Stack consumption vulnerability in the dissect_ber_unknown function in epan/dissectors/packet-ber.c in the BER dissector in Wireshark 1.4.x before 1.4.1 and 1.2.x before 1.2.12 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a long string in an unknown ASN.1/BER encoded packet, as demonstrated using SNMP.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3609</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3609" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3609" source="CVE"/>
    <description>
    The extension parser in slp_v2message.c in OpenSLP 1.2.1, and other versions before SVN revision 1647, as used in Service Location Protocol daemon (SLPD) in VMware ESX 4.0 and 4.1 and ESXi 4.0 and 4.1, allows remote attackers to cause a denial of service (infinite loop) via a packet with a "next extension offset" that references this extension or a previous extension.  NOTE: some of these details are obtained from third party information.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137814" comment="openslp-2.0.0-3.2.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137815" comment="openslp-devel-2.0.0-3.2.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137816" comment="openslp-server-2.0.0-3.2.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3611</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3611" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3611" source="CVE"/>
    <description>
    ISC DHCP server 4.0 before 4.0.2, 4.1 before 4.1.2, and 4.2 before 4.2.0-P1 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a DHCPv6 packet containing a Relay-Forward message without an address in the Relay-Forward link-address field.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137130" comment="dhcp-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137131" comment="dhcp-client-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137132" comment="dhcp-doc-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137133" comment="dhcp-relay-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137134" comment="dhcp-server-4.2.6-9.2.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3613</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3613" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3613" source="CVE"/>
    <description>
    named in ISC BIND 9.6.2 before 9.6.2-P3, 9.6-ESV before 9.6-ESV-R3, and 9.7.x before 9.7.2-P3 does not properly handle the combination of signed negative responses and corresponding RRSIG records in the cache, which allows remote attackers to cause a denial of service (daemon crash) via a query for cached data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137045" comment="bind-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137046" comment="bind-chrootenv-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137047" comment="bind-doc-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137048" comment="bind-libs-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137049" comment="bind-utils-9.9.5P1-2.2.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3614</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3614" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3614" source="CVE"/>
    <description>
    named in ISC BIND 9.x before 9.6.2-P3, 9.7.x before 9.7.2-P3, 9.4-ESV before 9.4-ESV-R4, and 9.6-ESV before 9.6-ESV-R3 does not properly determine the security status of an NS RRset during a DNSKEY algorithm rollover, which might allow remote attackers to cause a denial of service (DNSSEC validation error) by triggering a rollover.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137045" comment="bind-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137046" comment="bind-chrootenv-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137047" comment="bind-doc-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137048" comment="bind-libs-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137049" comment="bind-utils-9.9.5P1-2.2.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3615</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3615" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3615" source="CVE"/>
    <description>
    named in ISC BIND 9.7.2-P2 does not check all intended locations for allow-query ACLs, which might allow remote attackers to make successful requests for private DNS records via the standard DNS query mechanism.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137045" comment="bind-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137046" comment="bind-chrootenv-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137047" comment="bind-doc-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137048" comment="bind-libs-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137049" comment="bind-utils-9.9.5P1-2.2.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3616</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3616" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3616" source="CVE"/>
    <description>
    ISC DHCP server 4.2 before 4.2.0-P2, when configured to use failover partnerships, allows remote attackers to cause a denial of service (communications-interrupted state and DHCP client service loss) by connecting to a port that is only intended for a failover peer, as demonstrated by a Nagios check_tcp process check to TCP port 520.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137130" comment="dhcp-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137131" comment="dhcp-client-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137132" comment="dhcp-doc-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137133" comment="dhcp-relay-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137134" comment="dhcp-server-4.2.6-9.2.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3709</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3709" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3709" source="CVE"/>
    <description>
    The ZipArchive::getArchiveComment function in PHP 5.2.x through 5.2.14 and 5.3.x through 5.3.3 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted ZIP archive.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3710</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3710" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3710" source="CVE"/>
    <description>
    Stack consumption vulnerability in the filter_var function in PHP 5.2.x through 5.2.14 and 5.3.x through 5.3.3, when FILTER_VALIDATE_EMAIL mode is used, allows remote attackers to cause a denial of service (memory consumption and application crash) via a long e-mail address string.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3711</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3711" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3711" source="CVE"/>
    <description>
    libpurple in Pidgin before 2.7.4 does not properly validate the return value of the purple_base64_decode function, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and application crash) via a crafted message, related to the plugins for MSN, MySpaceIM, XMPP, and Yahoo! and the NTLM authentication support.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137605" comment="libpurple-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137606" comment="libpurple-meanwhile-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137607" comment="libpurple-tcl-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137608" comment="pidgin-2.10.9-5.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3765</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3765" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3765" source="CVE"/>
    <description>
    Mozilla Firefox 3.5.x through 3.5.14 and 3.6.x through 3.6.11, Thunderbird 3.1.6 before 3.1.6 and 3.0.x before 3.0.10, and SeaMonkey 2.x before 2.0.10, when JavaScript is enabled, allows remote attackers to execute arbitrary code via vectors related to nsCSSFrameConstructor::ContentAppended, the appendChild method, incorrect index tracking, and the creation of multiple frames, which triggers memory corruption, as exploited in the wild in October 2010 by the Belmoo malware.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3766</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3766" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3766" source="CVE"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, and SeaMonkey before 2.0.11, allows remote attackers to execute arbitrary code via vectors involving a change to an nsDOMAttribute node.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3767</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3767" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3767" source="CVE"/>
    <description>
    Integer overflow in the NewIdArray function in Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, and SeaMonkey before 2.0.11, allows remote attackers to execute arbitrary code via a JavaScript array with many elements.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3768</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3768" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3768" source="CVE"/>
    <description>
    Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, Thunderbird before 3.0.11 and 3.1.x before 3.1.7, and SeaMonkey before 2.0.11 do not properly validate downloadable fonts before use within an operating system's font implementation, which allows remote attackers to execute arbitrary code via vectors related to @font-face Cascading Style Sheets (CSS) rules.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3769</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3769" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3769" source="CVE"/>
    <description>
    The line-breaking implementation in Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, Thunderbird before 3.0.11 and 3.1.x before 3.1.7, and SeaMonkey before 2.0.11 on Windows does not properly handle long strings, which allows remote attackers to execute arbitrary code via a crafted document.write call that triggers a buffer over-read.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3770</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3770" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3770" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in the rendering engine in Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, and SeaMonkey before 2.0.11, allow remote attackers to inject arbitrary web script or HTML via (1) x-mac-arabic, (2) x-mac-farsi, or (3) x-mac-hebrew characters that may be converted to angle brackets during rendering.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3771</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3771" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3771" source="CVE"/>
    <description>
    Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, and SeaMonkey before 2.0.11, does not properly handle injection of an ISINDEX element into an about:blank page, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via vectors related to redirection to a chrome: URI.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3772</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3772" source="CVE"/>
    <description>
    Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, and SeaMonkey before 2.0.11, does not properly calculate index values for certain child content in a XUL tree, which allows remote attackers to execute arbitrary code via vectors involving a DIV element within a treechildren element.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3773</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3773" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3773" source="CVE"/>
    <description>
    Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, and SeaMonkey before 2.0.11, when the XMLHttpRequestSpy module in the Firebug add-on is used, does not properly handle interaction between the XMLHttpRequestSpy object and chrome privileged objects, which allows remote attackers to execute arbitrary JavaScript via a crafted HTTP response.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-0179.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3775</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3775" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3775" source="CVE"/>
    <description>
    Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, and SeaMonkey before 2.0.11, does not properly handle certain redirections involving data: URLs and Java LiveConnect scripts, which allows remote attackers to start processes, read arbitrary local files, and establish network connections via vectors involving a refresh value in the http-equiv attribute of a META element, which causes the wrong security principal to be used.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3776</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3776" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, Thunderbird before 3.0.11 and 3.1.x before 3.1.7, and SeaMonkey before 2.0.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3777</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3777" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3777" source="CVE"/>
    <description>
    Unspecified vulnerability in Mozilla Firefox 3.6.x before 3.6.13 and Thunderbird 3.1.x before 3.1.7 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3778</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3778" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3778" source="CVE"/>
    <description>
    Unspecified vulnerability in Mozilla Firefox 3.5.x before 3.5.16, Thunderbird before 3.0.11, and SeaMonkey before 2.0.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3814</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3814" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3814" source="CVE"/>
    <description>
    Heap-based buffer overflow in the Ins_SHZ function in ttinterp.c in FreeType 2.4.3 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted SHZ bytecode instruction, related to TrueType opcodes, as demonstrated by a PDF document with a crafted embedded font.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137173" comment="freetype2-devel-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137176" comment="ft2demos-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137174" comment="libfreetype6-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137175" comment="libfreetype6-32bit-2.5.3-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3853</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3853" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3853" source="CVE"/>
    <description>
    pam_namespace.c in the pam_namespace module in Linux-PAM (aka pam) before 1.1.3 uses the environment of the invoking application or service during execution of the namespace.init script, which might allow local users to gain privileges by running a setuid program that relies on the pam_namespace PAM check, as demonstrated by the sudo program.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137820" comment="pam-1.1.8-11.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137821" comment="pam-32bit-1.1.8-11.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137822" comment="pam-devel-1.1.8-11.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3855</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3855" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3855" source="CVE"/>
    <description>
    Buffer overflow in the ft_var_readpackedpoints function in truetype/ttgxvar.c in FreeType 2.4.3 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted TrueType GX font.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137173" comment="freetype2-devel-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137174" comment="libfreetype6-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137175" comment="libfreetype6-32bit-2.5.3-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3864</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3864" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3864" source="CVE"/>
    <description>
    Multiple race conditions in ssl/t1_lib.c in OpenSSL 0.9.8f through 0.9.8o, 1.0.0, and 1.0.0a, when multi-threading and internal caching are enabled on a TLS server, might allow remote attackers to execute arbitrary code via client data that triggers a heap-based buffer overflow, related to (1) the TLS server name extension and (2) elliptic curve cryptography.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3998</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-3998" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3998" source="CVE"/>
    <description>
    The (1) banshee-1 and (2) muinshee scripts in Banshee 1.8.0 and earlier place a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.  NOTE: Banshee might also be affected using GST_PLUGIN_PATH.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137030" comment="banshee-2.6.2-2.1.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137031" comment="banshee-backend-engine-gstreamer-2.6.2-2.1.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137032" comment="banshee-backend-io-gio-2.6.2-2.1.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137033" comment="banshee-backend-platform-gnome-2.6.2-2.1.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137034" comment="banshee-backend-platform-unix-2.6.2-2.1.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137035" comment="banshee-core-2.6.2-2.1.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137036" comment="banshee-dmp-2.6.2-2.1.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137037" comment="banshee-dmp-apple-devices-2.6.2-2.1.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137038" comment="banshee-dmp-mtp-2.6.2-2.1.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137039" comment="banshee-extensions-default-2.6.2-2.1.9 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4000</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-4000" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4000" source="CVE"/>
    <description>
    gnome-shell in GNOME Shell 2.31.5 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137246" comment="gnome-shell-3.14.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137247" comment="gnome-shell-browser-plugin-3.14.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4003</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-4003" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4003" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137234" comment="gnome-games-3.10.0-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137235" comment="gnome-games-recommended-3.10.0-2.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4020</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-4020" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4020" source="CVE"/>
    <description>
    MIT Kerberos 5 (aka krb5) 1.8.x through 1.8.3 does not reject RC4 key-derivation checksums, which might allow remote authenticated users to forge a (1) AD-SIGNEDPATH or (2) AD-KDC-ISSUED signature, and possibly gain privileges, by leveraging the small key space that results from certain one-byte stream-cipher operations.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137331" comment="krb5-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137332" comment="krb5-32bit-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137333" comment="krb5-client-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137334" comment="krb5-devel-1.12.2-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4021</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-4021" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4021" source="CVE"/>
    <description>
    The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 does not properly restrict the use of TGT credentials for armoring TGS requests, which might allow remote authenticated users to impersonate a client by rewriting an inner request, aka a "KrbFastReq forgery issue."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137331" comment="krb5-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137332" comment="krb5-32bit-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137333" comment="krb5-client-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137334" comment="krb5-devel-1.12.2-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4022</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-4022" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4022" source="CVE"/>
    <description>
    The do_standalone function in the MIT krb5 KDC database propagation daemon (kpropd) in Kerberos 1.7, 1.8, and 1.9, when running in standalone mode, does not properly handle when a worker child process "exits abnormally," which allows remote attackers to cause a denial of service (listening process termination, no new connections, and lack of updates in slave KVC) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137331" comment="krb5-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137332" comment="krb5-32bit-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137333" comment="krb5-client-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137334" comment="krb5-devel-1.12.2-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4150</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-4150" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4150" source="CVE"/>
    <description>
    Double free vulnerability in the imap_do_open function in the IMAP extension (ext/imap/php_imap.c) in PHP 5.2 before 5.2.15 and 5.3 before 5.3.4 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4225</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-4225" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4225" source="CVE"/>
    <description>
    Unspecified vulnerability in the mod_mono module for XSP in Mono 2.8.x before 2.8.2 allows remote attackers to obtain the source code for .aspx (ASP.NET) applications via unknown vectors related to an "unloading bug."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136950" comment="apache2-mod_mono-2.10-16.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136951" comment="libmono-2_0-1-3.8.0-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136952" comment="libmono-2_0-devel-3.8.0-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136953" comment="libmonoboehm-2_0-1-3.8.0-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136954" comment="libmonoboehm-2_0-devel-3.8.0-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136955" comment="libmonosgen-2_0-1-3.8.0-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136956" comment="mono-core-3.8.0-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136957" comment="mono-data-3.8.0-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136958" comment="mono-data-oracle-3.8.0-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136959" comment="mono-data-postgresql-3.8.0-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136960" comment="mono-data-sqlite-3.8.0-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136961" comment="mono-devel-3.8.0-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136962" comment="mono-extras-3.8.0-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136963" comment="mono-locale-extras-3.8.0-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136964" comment="mono-mvc-3.8.0-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136965" comment="mono-nunit-3.8.0-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136966" comment="mono-wcf-3.8.0-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136967" comment="mono-web-3.8.0-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136968" comment="mono-winforms-3.8.0-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136969" comment="mono-winfxcore-3.8.0-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136970" comment="monodoc-core-3.8.0-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136971" comment="xsp-2.10.2-15.1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4267</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-4267" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4267" source="CVE"/>
    <description>
    Stack-based buffer overflow in the hpmud_get_pml function in io/hpmud/pml.c in Hewlett-Packard Linux Imaging and Printing (HPLIP) 1.6.7, 3.9.8, 3.10.9, and probably other versions allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SNMP response with a large length value.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137268" comment="hplip-3.14.6-2.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137269" comment="hplip-hpijs-3.14.6-2.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137270" comment="hplip-sane-3.14.6-2.2.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4300</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-4300" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4300" source="CVE"/>
    <description>
    Heap-based buffer overflow in the dissect_ldss_transfer function (epan/dissectors/packet-ldss.c) in the LDSS dissector in Wireshark 1.2.0 through 1.2.12 and 1.4.0 through 1.4.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an LDSS packet with a long digest line that triggers memory corruption.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4301</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-4301" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4301" source="CVE"/>
    <description>
    epan/dissectors/packet-zbee-zcl.c in the ZigBee ZCL dissector in Wireshark 1.4.0 through 1.4.1 allows remote attackers to cause a denial of service (infinite loop) via a crafted ZCL packet, related to Discover Attributes.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4341</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-4341" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4341" source="CVE"/>
    <description>
    The pam_parse_in_data_v2 function in src/responder/pam/pamsrv_cmd.c in the PAM responder in SSSD 1.5.0, 1.4.x, and 1.3 allows local users to cause a denial of service (infinite loop, crash, and login prevention) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137702" comment="libsss_idmap0-1.12.0-3.1.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137703" comment="libsss_nss_idmap0-1.12.0-3.1.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137704" comment="sssd-1.12.0-3.1.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137705" comment="sssd-32bit-1.12.0-3.1.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137706" comment="sssd-krb5-common-1.12.0-3.1.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137707" comment="sssd-ldap-1.12.0-3.1.10 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4344</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-4344" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4344" source="CVE"/>
    <description>
    Heap-based buffer overflow in the string_vformat function in string.c in Exim before 4.70 allows remote attackers to execute arbitrary code via an SMTP session that includes two MAIL commands in conjunction with a large message containing crafted headers, leading to improper rejection logging.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137159" comment="exim-4.83-3.1.8 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4345</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-4345" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4345" source="CVE"/>
    <description>
    Exim 4.72 and earlier allows local users to gain privileges by leveraging the ability of the exim user account to specify an alternate configuration file with a directive that contains arbitrary commands, as demonstrated by the spool_directory directive.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137159" comment="exim-4.83-3.1.8 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4352</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-4352" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4352" source="CVE"/>
    <description>
    Stack consumption vulnerability in D-Bus (aka DBus) before 1.4.1 allows local users to cause a denial of service (daemon crash) via a message containing many nested variants.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137122" comment="dbus-1-1.8.8-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137123" comment="dbus-1-devel-1.8.8-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137124" comment="dbus-1-x11-1.8.8-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137125" comment="libdbus-1-3-1.8.8-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137126" comment="libdbus-1-3-32bit-1.8.8-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4410</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-4410" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4410" source="CVE"/>
    <description>
    CRLF injection vulnerability in the header function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via vectors related to non-whitespace characters preceded by newline characters, a different vulnerability than CVE-2010-2761 and CVE-2010-3172.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137830" comment="perl-5.20.1-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137831" comment="perl-32bit-5.20.1-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137832" comment="perl-base-5.20.1-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137833" comment="perl-doc-5.20.1-1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4411</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-4411" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4411" source="CVE"/>
    <description>
    Unspecified vulnerability in CGI.pm 3.50 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unknown vectors.  NOTE: this issue exists because of an incomplete fix for CVE-2010-2761.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137830" comment="perl-5.20.1-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137831" comment="perl-32bit-5.20.1-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137832" comment="perl-base-5.20.1-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137833" comment="perl-doc-5.20.1-1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4494</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-4494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4494" source="CVE"/>
    <description>
    Double free vulnerability in libxml2 2.7.8 and other versions, as used in Google Chrome before 8.0.552.215 and other products, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XPath handling.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137790" comment="libxml2-2-2.9.1-7.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137791" comment="libxml2-2-32bit-2.9.1-7.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137792" comment="libxml2-devel-2.9.1-7.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137793" comment="libxml2-tools-2.9.1-7.2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4531</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-4531" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4531" source="CVE"/>
    <description>
    Stack-based buffer overflow in the ATRDecodeAtr function in the Answer-to-Reset (ATR) Handler (atrhandler.c) for pcscd in PCSC-Lite 1.5.3, and possibly other 1.5.x and 1.6.x versions, allows physically proximate attackers to cause a denial of service (crash) and possibly execute arbitrary code via a smart card with an ATR message containing a long attribute value.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137568" comment="libpcsclite1-1.8.11-4.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137569" comment="pcsc-lite-1.8.11-4.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4538</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-4538" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4538" source="CVE"/>
    <description>
    Buffer overflow in the sect_enttec_dmx_da function in epan/dissectors/packet-enttec.c in Wireshark 1.4.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted ENTTEC DMX packet with Run Length Encoding (RLE) compression.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4539</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-4539" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4539" source="CVE"/>
    <description>
    The walk function in repos.c in the mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.15, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger the walking of SVNParentPath collections.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137877" comment="subversion-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137878" comment="subversion-devel-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137879" comment="subversion-perl-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137880" comment="subversion-python-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137881" comment="subversion-server-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137882" comment="subversion-tools-1.8.10-2.4.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4540</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-4540" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4540" source="CVE"/>
    <description>
    Stack-based buffer overflow in the load_preset_response function in plug-ins/lighting/lighting-ui.c in the "LIGHTING EFFECTS &gt; LIGHT" plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long Position field in a plugin configuration file.  NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself.  NOTE: some of these details are obtained from third party information.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137199" comment="gimp-2.8.14-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137200" comment="gimp-help-browser-2.8.14-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137201" comment="gimp-plugin-aa-2.8.14-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137202" comment="gimp-plugins-python-2.8.14-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137203" comment="libgimp-2_0-0-2.8.14-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137204" comment="libgimpui-2_0-0-2.8.14-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4541</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-4541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4541" source="CVE"/>
    <description>
    Stack-based buffer overflow in the loadit function in plug-ins/common/sphere-designer.c in the SPHERE DESIGNER plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long "Number of lights" field in a plugin configuration file.  NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137199" comment="gimp-2.8.14-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137200" comment="gimp-help-browser-2.8.14-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137201" comment="gimp-plugin-aa-2.8.14-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137202" comment="gimp-plugins-python-2.8.14-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137203" comment="libgimp-2_0-0-2.8.14-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137204" comment="libgimpui-2_0-0-2.8.14-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4542</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-4542" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4542" source="CVE"/>
    <description>
    Stack-based buffer overflow in the gfig_read_parameter_gimp_rgb function in plug-ins/gfig/gfig-style.c in the GFIG plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long Foreground field in a plugin configuration file.  NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself. NOTE: some of these details are obtained from third party information.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137199" comment="gimp-2.8.14-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137200" comment="gimp-help-browser-2.8.14-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137201" comment="gimp-plugin-aa-2.8.14-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137202" comment="gimp-plugins-python-2.8.14-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137203" comment="libgimp-2_0-0-2.8.14-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137204" comment="libgimpui-2_0-0-2.8.14-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4543</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-4543" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4543" source="CVE"/>
    <description>
    Heap-based buffer overflow in the read_channel_data function in file-psp.c in the Paint Shop Pro (PSP) plugin in GIMP 2.6.11 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a PSP_COMP_RLE (aka RLE compression) image file that begins a long run count at the end of the image.  NOTE: some of these details are obtained from third party information.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137199" comment="gimp-2.8.14-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137200" comment="gimp-help-browser-2.8.14-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137201" comment="gimp-plugin-aa-2.8.14-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137202" comment="gimp-plugins-python-2.8.14-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137203" comment="libgimp-2_0-0-2.8.14-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137204" comment="libgimpui-2_0-0-2.8.14-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4644</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-4644" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4644" source="CVE"/>
    <description>
    Multiple memory leaks in rev_hunt.c in Apache Subversion before 1.6.15 allow remote authenticated users to cause a denial of service (memory consumption and daemon crash) via the -g option to the blame command.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137877" comment="subversion-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137878" comment="subversion-devel-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137879" comment="subversion-perl-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137880" comment="subversion-python-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137881" comment="subversion-server-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137882" comment="subversion-tools-1.8.10-2.4.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4645</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-4645" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4645" source="CVE"/>
    <description>
    strtod.c, as used in the zend_strtod function in PHP 5.2 before 5.2.17 and 5.3 before 5.3.5, and other products, allows context-dependent attackers to cause a denial of service (infinite loop) via a certain floating-point value in scientific notation, which is not properly handled in x87 FPU registers, as demonstrated using 2.2250738585072011e-308.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4651</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-4651" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4651" source="CVE"/>
    <description>
    Directory traversal vulnerability in util.c in GNU patch 2.6.1 and earlier allows user-assisted remote attackers to create or overwrite arbitrary files via a filename that is specified with a .. (dot dot) or full pathname, a related issue to CVE-2010-1679.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137829" comment="patch-2.7.1-7.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4665</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-4665" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4665" source="CVE"/>
    <description>
    Integer overflow in the ReadDirectory function in tiffdump.c in tiffdump in LibTIFF before 3.9.5 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF file containing a directory data structure with many directory entries.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137719" comment="libtiff-devel-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137720" comment="libtiff5-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137721" comment="libtiff5-32bit-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137722" comment="tiff-4.0.3-10.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4777</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-4777" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4777" source="CVE"/>
    <description>
    The Perl_reg_numbered_buff_fetch function in Perl 5.10.0, 5.12.0, 5.14.0, and other versions, when running with debugging enabled, allows context-dependent attackers to cause a denial of service (assertion failure and application exit) via crafted input that is not properly handled when using certain regular expressions, as demonstrated by causing SpamAssassin and OCSInventory to crash.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137830" comment="perl-5.20.1-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137831" comment="perl-32bit-5.20.1-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137832" comment="perl-base-5.20.1-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137833" comment="perl-doc-5.20.1-1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20105298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-5298</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2010-5298" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5298" source="CVE"/>
    <description>
    Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote attackers to inject data across sessions or cause a denial of service (use-after-free and parsing error) via an SSL connection in a multithreaded environment.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0010</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0010" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0010" source="CVE"/>
    <description>
    check.c in sudo 1.7.x before 1.7.4p5, when a Runas group is configured, does not require a password for command execution that involves a gid change but no uid change, which allows local users to bypass an intended authentication requirement via the -g option to a sudo command.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137883" comment="sudo-1.8.10p3-2.1.6 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0014</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0014" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0014" source="CVE"/>
    <description>
    ssl/t1_lib.c in OpenSSL 0.9.8h through 0.9.8q and 1.0.0 through 1.0.0c allows remote attackers to cause a denial of service (crash), and possibly obtain sensitive information in applications that use OpenSSL, via a malformed ClientHello handshake message that triggers an out-of-bounds memory access, aka "OCSP stapling vulnerability."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0017</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0017" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0017" source="CVE"/>
    <description>
    The open_log function in log.c in Exim 4.72 and earlier does not check the return value from (1) setuid or (2) setgid system calls, which allows local users to append log data to arbitrary files via a symlink attack.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137159" comment="exim-4.83-3.1.8 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0020</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0020" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0020" source="CVE"/>
    <description>
    Heap-based buffer overflow in the pango_ft2_font_render_box_glyph function in pango/pangoft2-render.c in libpango in Pango 1.28.3 and earlier, when the FreeType2 backend is enabled, allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file, related to the glyph box for an FT_Bitmap object.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137562" comment="libpango-1_0-0-1.36.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137563" comment="libpango-1_0-0-32bit-1.36.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137564" comment="pango-devel-1.36.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137565" comment="pango-tools-1.36.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137566" comment="pango-tools-32bit-1.36.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137567" comment="typelib-1_0-Pango-1_0-1.36.8-1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0024</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0024" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0024" source="CVE"/>
    <description>
    Heap-based buffer overflow in wiretap/pcapng.c in Wireshark before 1.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted capture file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0051</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0051" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0051" source="CVE"/>
    <description>
    Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, does not properly handle certain recursive eval calls, which makes it easier for remote attackers to force a user to respond positively to a dialog question, as demonstrated by a question about granting privileges.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0053</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0053" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0053" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, Thunderbird before 3.1.8, and SeaMonkey before 2.0.12 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0054</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0054" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0054" source="CVE"/>
    <description>
    Buffer overflow in the JavaScript engine in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, might allow remote attackers to execute arbitrary code via vectors involving non-local JavaScript variables, aka an "upvarMap" issue.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0055</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0055" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0055" source="CVE"/>
    <description>
    Use-after-free vulnerability in the JSON.stringify method in js3250.dll in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, might allow remote attackers to execute arbitrary code via unspecified vectors related to the js_HasOwnProperty function and garbage collection.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0056</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0056" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0056" source="CVE"/>
    <description>
    Buffer overflow in the JavaScript engine in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, might allow remote attackers to execute arbitrary code via vectors involving exception timing and a large number of string values, aka an "atom map" issue.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0057</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0057" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0057" source="CVE"/>
    <description>
    Use-after-free vulnerability in the Web Workers implementation in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, allows remote attackers to execute arbitrary code via vectors related to a JavaScript Worker and garbage collection.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0059</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0059" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0059" source="CVE"/>
    <description>
    Cross-site request forgery (CSRF) vulnerability in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, allows remote attackers to hijack the authentication of arbitrary users for requests that were initiated by a plugin and received a 307 redirect to a page on a different web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0061</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0061" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0061" source="CVE"/>
    <description>
    Buffer overflow in Mozilla Firefox 3.6.x before 3.6.14, Thunderbird before 3.1.8, and SeaMonkey before 2.0.12 might allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted JPEG image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0062</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0062" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0062" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.6.x before 3.6.14 and Thunderbird 3.1.x before 3.1.8 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0064</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0064" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0064" source="CVE"/>
    <description>
    The hb_buffer_ensure function in hb-buffer.c in HarfBuzz, as used in Pango 1.28.3, Firefox, and other products, does not verify that memory reallocations succeed, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly execute arbitrary code via crafted OpenType font data that triggers use of an incorrect index.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137562" comment="libpango-1_0-0-1.36.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137563" comment="libpango-1_0-0-32bit-1.36.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137564" comment="pango-devel-1.36.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137565" comment="pango-tools-1.36.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137566" comment="pango-tools-32bit-1.36.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137567" comment="typelib-1_0-Pango-1_0-1.36.8-1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0068</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0068" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0068" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0069</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0069" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0069" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19, 3.6.x before 3.6.17, and 4.x before 4.0.1; Thunderbird before 3.1.10; and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0070.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0070</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0070" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0070" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19, 3.6.x before 3.6.17, and 4.x before 4.0.1; Thunderbird before 3.1.10; and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0069.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0072</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0072" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0072" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19 and 3.6.x before 3.6.17, Thunderbird before 3.1.10, and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0074, CVE-2011-0075, CVE-2011-0077, and CVE-2011-0078.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0074</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0074" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0074" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19 and 3.6.x before 3.6.17, Thunderbird before 3.1.10, and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0072, CVE-2011-0075, CVE-2011-0077, and CVE-2011-0078.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0075</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0075" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0075" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19 and 3.6.x before 3.6.17, Thunderbird before 3.1.10, and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0072, CVE-2011-0074, CVE-2011-0077, and CVE-2011-0078.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0077</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0077" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19 and 3.6.x before 3.6.17, Thunderbird before 3.1.10, and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0072, CVE-2011-0074, CVE-2011-0075, and CVE-2011-0078.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0078</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0078" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0078" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19 and 3.6.x before 3.6.17, Thunderbird before 3.1.10, and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0072, CVE-2011-0074, CVE-2011-0075, and CVE-2011-0077.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0079</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0079" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0079" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x before 4.0.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to gfx/layers/d3d10/ReadbackManagerD3D10.cpp and unknown other vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0080</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0080" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0080" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.19 and 3.6.x before 3.6.17, Thunderbird before 3.1.10, and SeaMonkey before 2.0.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0081</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0081" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0081" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.17 and 4.x before 4.0.1, and Thunderbird 3.1.x before 3.1.10, allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0083</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0083" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0083" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsSVGPathSegList::ReplaceItem function in the implementation of SVG element lists in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a user-supplied callback.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0084</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0084" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0084" source="CVE"/>
    <description>
    The SVGTextElement.getCharNumAtPosition function in Mozilla Firefox before 3.6.20, and 4.x through 5; Thunderbird 3.x before 3.1.12 and other versions before 6; SeaMonkey 2.x before 2.3; and possibly other products does not properly handle SVG text, which allows remote attackers to execute arbitrary code via unspecified vectors that lead to a "dangling pointer."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0085</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0085" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0085" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsXULCommandDispatcher function in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via a crafted XUL document that dequeues the current command updater.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0192</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0192" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0192" source="CVE"/>
    <description>
    Buffer overflow in Fax4Decode in LibTIFF 3.9.4 and possibly other versions, as used in ImageIO in Apple iTunes before 10.2 on Windows and other products, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted TIFF Internet Fax image file that has been compressed using CCITT Group 4 encoding, related to the EXPAND2D macro in libtiff/tif_fax3.h.  NOTE: some of these details are obtained from third party information.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137719" comment="libtiff-devel-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137720" comment="libtiff5-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137721" comment="libtiff5-32bit-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137722" comment="tiff-4.0.3-10.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0226</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0226" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0226" source="CVE"/>
    <description>
    Integer signedness error in psaux/t1decode.c in FreeType before 2.4.6, as used in CoreGraphics in Apple iOS before 4.2.9 and 4.3.x before 4.3.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Type 1 font in a PDF document, as exploited in the wild in July 2011.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137173" comment="freetype2-devel-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137176" comment="ft2demos-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137174" comment="libfreetype6-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137175" comment="libfreetype6-32bit-2.5.3-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0281</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0281" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0281" source="CVE"/>
    <description>
    The unparse implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.6.x through 1.9, when an LDAP backend is used, allows remote attackers to cause a denial of service (file descriptor exhaustion and daemon hang) via a principal name that triggers use of a backslash escape sequence, as demonstrated by a \n sequence.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137331" comment="krb5-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137332" comment="krb5-32bit-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137333" comment="krb5-client-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137334" comment="krb5-devel-1.12.2-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0282</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0282" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0282" source="CVE"/>
    <description>
    The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.6.x through 1.9, when an LDAP backend is used, allows remote attackers to cause a denial of service (NULL pointer dereference or buffer over-read, and daemon crash) via a crafted principal name.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137331" comment="krb5-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137332" comment="krb5-32bit-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137333" comment="krb5-client-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137334" comment="krb5-devel-1.12.2-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0284</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0284" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0284" source="CVE"/>
    <description>
    Double free vulnerability in the prepare_error_as function in do_as_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 through 1.9, when the PKINIT feature is enabled, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via an e_data field containing typed data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137331" comment="krb5-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137332" comment="krb5-32bit-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137333" comment="krb5-client-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137334" comment="krb5-devel-1.12.2-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0285</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0285" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0285" source="CVE"/>
    <description>
    The process_chpw_request function in schpw.c in the password-changing functionality in kadmind in MIT Kerberos 5 (aka krb5) 1.7 through 1.9 frees an invalid pointer, which allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a crafted request that triggers an error condition.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137331" comment="krb5-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137332" comment="krb5-32bit-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137333" comment="krb5-client-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137334" comment="krb5-devel-1.12.2-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110413" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0413</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0413" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0413" source="CVE"/>
    <description>
    The DHCPv6 server in ISC DHCP 4.0.x and 4.1.x before 4.1.2-P1, 4.0-ESV and 4.1-ESV before 4.1-ESV-R1, and 4.2.x before 4.2.1b1 allows remote attackers to cause a denial of service (assertion failure and daemon crash) by sending a message over IPv6 for a declined and abandoned address.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137130" comment="dhcp-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137131" comment="dhcp-client-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137132" comment="dhcp-doc-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137133" comment="dhcp-relay-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137134" comment="dhcp-server-4.2.6-9.2.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0414</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0414" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0414" source="CVE"/>
    <description>
    ISC BIND 9.7.1 through 9.7.2-P3, when configured as an authoritative server, allows remote attackers to cause a denial of service (deadlock and daemon hang) by sending a query at the time of (1) an IXFR transfer or (2) a DDNS update.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137045" comment="bind-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137046" comment="bind-chrootenv-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137047" comment="bind-doc-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137048" comment="bind-libs-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137049" comment="bind-utils-9.9.5P1-2.2.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0419</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0419" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0419" source="CVE"/>
    <description>
    Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137394" comment="libapr1-1.5.1-4.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137395" comment="libapr1-devel-1.5.1-4.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0420</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0420" source="CVE"/>
    <description>
    The grapheme_extract function in the Internationalization extension (Intl) for ICU for PHP 5.3.5 allows context-dependent attackers to cause a denial of service (crash) via an invalid size argument, which triggers a NULL pointer dereference.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0421</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0421" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0421" source="CVE"/>
    <description>
    The _zip_name_locate function in zip_name_locate.c in the Zip extension in PHP before 5.3.6 does not properly handle a ZIPARCHIVE::FL_UNCHANGED argument, which might allow context-dependent attackers to cause a denial of service (NULL pointer dereference) via an empty ZIP archive that is processed with a (1) locateName or (2) statName operation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137795" comment="libzip-devel-0.11.2-3.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137796" comment="libzip2-0.11.2-3.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0460</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0460" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0460" source="CVE"/>
    <description>
    The init script in kbd, possibly 1.14.1 and earlier, allows local users to overwrite arbitrary files via a symlink attack on /dev/shm/defkeymap.map.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137285" comment="kbd-2.0.2-2.3.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0461</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0461" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0461" source="CVE"/>
    <description>
    /etc/init.d/boot.localfs in the aaa_base package before 11.2-43.48.1 in SUSE openSUSE 11.2, and before 11.3-8.7.1 in openSUSE 11.3, allows local users to overwrite arbitrary files via a symlink attack on /dev/shm/mtab.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136926" comment="aaa_base-13.2+git20140911.61c1681-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136927" comment="aaa_base-extras-13.2+git20140911.61c1681-1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0465</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0465" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0465" source="CVE"/>
    <description>
    xrdb.c in xrdb before 1.0.9 in X.Org X11R7.6 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a (1) DHCP or (2) XDMCP message.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137915" comment="xorg-x11-7.6_1-15.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137916" comment="xorg-x11-essentials-7.6_1-15.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137917" comment="xrdb-1.1.0-4.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0538</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0538" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0538" source="CVE"/>
    <description>
    Wireshark 1.2.0 through 1.2.14, 1.4.0 through 1.4.3, and 1.5.0 frees an uninitialized pointer during processing of a .pcap file in the pcap-ng format, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a malformed file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0541</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0541" source="CVE"/>
    <description>
    fuse 2.8.5 and earlier does not properly handle when /etc/mtab cannot be updated, which allows local users to unmount arbitrary directories via a symlink attack.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137177" comment="fuse-2.9.3-4.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137178" comment="libfuse2-2.9.3-4.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0707</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0707" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0707" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in Cgi/confirm.py in GNU Mailman 2.1.14 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) full name or (2) username field in a confirmation message.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137801" comment="mailman-2.1.17-2.1.7 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0708</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0708" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0708" source="CVE"/>
    <description>
    exif.c in the Exif extension in PHP before 5.3.6 on 64-bit platforms performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) via an image with a crafted Image File Directory (IFD) that triggers a buffer over-read.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0711</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0711" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0711" source="CVE"/>
    <description>
    The xfs_fs_geometry function in fs/xfs/xfs_fsops.c in the Linux kernel before 2.6.38-rc6-git3 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an FSGEOMETRY_V1 ioctl call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137315" comment="kernel-default-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137316" comment="kernel-default-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137317" comment="kernel-desktop-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137318" comment="kernel-desktop-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137319" comment="kernel-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137320" comment="kernel-docs-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137321" comment="kernel-macros-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137322" comment="kernel-pae-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137323" comment="kernel-pae-base-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137324" comment="kernel-pae-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137325" comment="kernel-source-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137326" comment="kernel-syms-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137327" comment="kernel-xen-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137328" comment="kernel-xen-devel-3.16.6-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0712</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0712" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0712" source="CVE"/>
    <description>
    Multiple buffer overflows in the caiaq Native Instruments USB audio functionality in the Linux kernel before 2.6.38-rc4-next-20110215 might allow attackers to cause a denial of service or possibly have unspecified other impact via a long USB device name, related to (1) the snd_usb_caiaq_audio_init function in sound/usb/caiaq/audio.c and (2) the snd_usb_caiaq_midi_init function in sound/usb/caiaq/midi.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137315" comment="kernel-default-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137316" comment="kernel-default-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137317" comment="kernel-desktop-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137318" comment="kernel-desktop-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137319" comment="kernel-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137320" comment="kernel-docs-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137321" comment="kernel-macros-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137322" comment="kernel-pae-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137323" comment="kernel-pae-base-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137324" comment="kernel-pae-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137325" comment="kernel-source-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137326" comment="kernel-syms-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137327" comment="kernel-xen-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137328" comment="kernel-xen-devel-3.16.6-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0713</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0713" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0713" source="CVE"/>
    <description>
    Heap-based buffer overflow in wiretap/dct3trace.c in Wireshark 1.2.0 through 1.2.14 and 1.4.0 through 1.4.3 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a long record in a Nokia DCT3 trace file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0715</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0715" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0715" source="CVE"/>
    <description>
    The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.16, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request that contains a lock token.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137877" comment="subversion-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137878" comment="subversion-devel-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137879" comment="subversion-perl-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137880" comment="subversion-python-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137881" comment="subversion-server-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137882" comment="subversion-tools-1.8.10-2.4.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0719</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0719" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0719" source="CVE"/>
    <description>
    Samba 3.x before 3.3.15, 3.4.x before 3.4.12, and 3.5.x before 3.5.7 does not perform range checks for file descriptors before use of the FD_SET macro, which allows remote attackers to cause a denial of service (stack memory corruption, and infinite loop or daemon crash) by opening a large number of files, related to (1) Winbind or (2) smbd.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137424" comment="libdcerpc-binding0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137425" comment="libdcerpc-binding0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137426" comment="libdcerpc0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137427" comment="libdcerpc0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137428" comment="libgensec0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137429" comment="libgensec0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137430" comment="libndr-krb5pac0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137431" comment="libndr-krb5pac0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137432" comment="libndr-nbt0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137433" comment="libndr-nbt0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137434" comment="libndr-standard0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137435" comment="libndr-standard0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137436" comment="libndr0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137437" comment="libndr0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137438" comment="libnetapi0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137439" comment="libnetapi0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137440" comment="libpdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137441" comment="libpdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137442" comment="libregistry0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137443" comment="libsamba-credentials0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137444" comment="libsamba-credentials0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137445" comment="libsamba-hostconfig0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137446" comment="libsamba-hostconfig0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137447" comment="libsamba-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137448" comment="libsamba-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137449" comment="libsamdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137450" comment="libsamdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137451" comment="libsmbclient-devel-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137452" comment="libsmbclient-raw0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137453" comment="libsmbclient-raw0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137454" comment="libsmbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137455" comment="libsmbconf0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137456" comment="libsmbconf0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137457" comment="libsmbldap0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137458" comment="libsmbldap0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137459" comment="libtevent-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137460" comment="libtevent-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137461" comment="libwbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137462" comment="libwbclient0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137463" comment="samba-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137464" comment="samba-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137465" comment="samba-client-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137466" comment="samba-client-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137467" comment="samba-doc-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137468" comment="samba-libs-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137469" comment="samba-libs-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137470" comment="samba-winbind-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137471" comment="samba-winbind-32bit-4.1.12-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0904</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0904" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0904" source="CVE"/>
    <description>
    The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when raw encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via a large (1) X position or (2) Y position value in a framebuffer update request that triggers an out-of-bounds memory access, related to the rfbTranslateNone and rfbSendRectEncodingRaw functions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137899" comment="vino-3.14.0-1.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0905</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0905" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0905" source="CVE"/>
    <description>
    The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when tight encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via crafted dimensions in a framebuffer update request that triggers an out-of-bounds read operation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137899" comment="vino-3.14.0-1.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0997</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-0997" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0997" source="CVE"/>
    <description>
    dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137130" comment="dhcp-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137131" comment="dhcp-client-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137132" comment="dhcp-doc-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137133" comment="dhcp-relay-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137134" comment="dhcp-server-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137135" comment="dhcpcd-3.2.3-47.80.6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1000</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1000" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1000" source="CVE"/>
    <description>
    jingle-factory.c in Telepathy Gabble 0.11 before 0.11.7, 0.10 before 0.10.5, and 0.8 before 0.8.15 allows remote attackers to sniff audio and video calls via a crafted google:jingleinfo stanza that specifies an alternate server for streamed media.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137888" comment="telepathy-gabble-0.18.3-1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1002</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1002" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1002" source="CVE"/>
    <description>
    avahi-core/socket.c in avahi-daemon in Avahi before 0.6.29 allows remote attackers to cause a denial of service (infinite loop) via an empty mDNS (1) IPv4 or (2) IPv6 UDP packet to port 5353.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-2244.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137022" comment="avahi-0.6.31-23.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137023" comment="avahi-autoipd-0.6.31-23.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137024" comment="avahi-compat-mDNSResponder-devel-0.6.31-23.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137025" comment="libavahi-client3-0.6.31-23.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137026" comment="libavahi-common3-0.6.31-23.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137027" comment="libavahi-core7-0.6.31-23.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137028" comment="libavahi-devel-0.6.31-23.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137029" comment="libdns_sd-0.6.31-23.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1020</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1020" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1020" source="CVE"/>
    <description>
    The proc filesystem implementation in the Linux kernel 2.6.37 and earlier does not restrict access to the /proc directory tree of a process after this process performs an exec of a setuid program, which allows local users to obtain sensitive information or cause a denial of service via open, lseek, read, and write system calls.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137315" comment="kernel-default-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137316" comment="kernel-default-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137317" comment="kernel-desktop-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137318" comment="kernel-desktop-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137319" comment="kernel-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137320" comment="kernel-docs-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137321" comment="kernel-macros-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137322" comment="kernel-pae-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137323" comment="kernel-pae-base-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137324" comment="kernel-pae-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137325" comment="kernel-source-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137326" comment="kernel-syms-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137327" comment="kernel-xen-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137328" comment="kernel-xen-devel-3.16.6-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1091</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1091" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1091" source="CVE"/>
    <description>
    libymsg.c in the Yahoo! protocol plugin in libpurple in Pidgin 2.6.0 through 2.7.10 allows (1) remote authenticated users to cause a denial of service (NULL pointer dereference and application crash) via a malformed YMSG notification packet, and allows (2) remote Yahoo! servers to cause a denial of service (NULL pointer dereference and application crash) via a malformed YMSG SMS message.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137605" comment="libpurple-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137606" comment="libpurple-meanwhile-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137607" comment="libpurple-tcl-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137608" comment="pidgin-2.10.9-5.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1092</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1092" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1092" source="CVE"/>
    <description>
    Integer overflow in ext/shmop/shmop.c in PHP before 5.3.6 allows context-dependent attackers to cause a denial of service (crash) and possibly read sensitive memory via a large third argument to the shmop_read function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1097</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1097" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1097" source="CVE"/>
    <description>
    rsync 3.x before 3.0.8, when certain recursion, deletion, and ownership options are used, allows remote rsync servers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via malformed data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137864" comment="rsync-3.1.1-2.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1098</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1098" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1098" source="CVE"/>
    <description>
    Race condition in the createOutputFile function in logrotate.c in logrotate 3.7.9 and earlier allows local users to read log data by opening a file before the intended permissions are in place.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137799" comment="logrotate-3.8.7-6.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1138</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1138" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1138" source="CVE"/>
    <description>
    Off-by-one error in the dissect_6lowpan_iphc function in packet-6lowpan.c in Wireshark 1.4.0 through 1.4.3 on 32-bit platforms allows remote attackers to cause a denial of service (application crash) via a malformed 6LoWPAN IPv6 packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1139</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1139" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1139" source="CVE"/>
    <description>
    wiretap/pcapng.c in Wireshark 1.2.0 through 1.2.14 and 1.4.0 through 1.4.3 allows remote attackers to cause a denial of service (application crash) via a pcap-ng file that contains a large packet-length field.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1140</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1140" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1140" source="CVE"/>
    <description>
    Multiple stack consumption vulnerabilities in the dissect_ms_compressed_string and dissect_mscldap_string functions in Wireshark 1.0.x, 1.2.0 through 1.2.14, and 1.4.0 through 1.4.3 allow remote attackers to cause a denial of service (infinite recursion) via a crafted (1) SMB or (2) Connection-less LDAP (CLDAP) packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1143</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1143" source="CVE"/>
    <description>
    epan/dissectors/packet-ntlmssp.c in the NTLMSSP dissector in Wireshark before 1.4.4 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted .pcap file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1145</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1145" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1145" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137896" comment="unixODBC-2.3.2-2.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137897" comment="unixODBC-32bit-2.3.2-2.2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1146</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1146" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1146" source="CVE"/>
    <description>
    libvirt.c in the API in Red Hat libvirt 0.8.8 does not properly restrict operations in a read-only connection, which allows remote attackers to cause a denial of service (host OS crash) or possibly execute arbitrary code via a (1) virNodeDeviceDettach, (2) virNodeDeviceReset, (3) virDomainRevertToSnapshot, (4) virDomainSnapshotDelete, (5) virNodeDeviceReAttach, or (6) virConnectDomainXMLToNative call, a different vulnerability than CVE-2008-5086.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137726" comment="libvirt-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137727" comment="libvirt-client-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137728" comment="libvirt-daemon-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137729" comment="libvirt-daemon-config-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137730" comment="libvirt-daemon-config-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137731" comment="libvirt-daemon-driver-interface-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137732" comment="libvirt-daemon-driver-libxl-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137733" comment="libvirt-daemon-driver-lxc-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137734" comment="libvirt-daemon-driver-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137735" comment="libvirt-daemon-driver-nodedev-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137736" comment="libvirt-daemon-driver-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137737" comment="libvirt-daemon-driver-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137738" comment="libvirt-daemon-driver-secret-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137739" comment="libvirt-daemon-driver-storage-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137740" comment="libvirt-daemon-driver-uml-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137741" comment="libvirt-daemon-driver-vbox-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137742" comment="libvirt-daemon-driver-xen-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137743" comment="libvirt-daemon-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137744" comment="libvirt-daemon-xen-1.2.9-1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1153</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1153" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1153" source="CVE"/>
    <description>
    Multiple format string vulnerabilities in phar_object.c in the phar extension in PHP 5.3.5 and earlier allow context-dependent attackers to obtain sensitive information from process memory, cause a denial of service (memory corruption), or possibly execute arbitrary code via format string specifiers in an argument to a class method, leading to an incorrect zend_throw_exception_ex call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1154</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1154" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1154" source="CVE"/>
    <description>
    The shred_file function in logrotate.c in logrotate 3.7.9 and earlier might allow context-dependent attackers to execute arbitrary commands via shell metacharacters in a log filename, as demonstrated by a filename that is automatically constructed on the basis of a hostname or virtual machine name.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137799" comment="logrotate-3.8.7-6.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1155</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1155" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1155" source="CVE"/>
    <description>
    The writeState function in logrotate.c in logrotate 3.7.9 and earlier might allow context-dependent attackers to cause a denial of service (rotation outage) via a (1) \n (newline) or (2) \ (backslash) character in a log filename, as demonstrated by a filename that is automatically constructed on the basis of a hostname or virtual machine name.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137799" comment="logrotate-3.8.7-6.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1164</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1164" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1164" source="CVE"/>
    <description>
    Vino before 2.99.4 can connect external networks contrary to the statement in the vino-preferences dialog box, which might make it easier for remote attackers to perform attacks.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137899" comment="vino-3.14.0-1.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1167</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1167" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1167" source="CVE"/>
    <description>
    Heap-based buffer overflow in the thunder (aka ThunderScan) decoder in tif_thunder.c in LibTIFF 3.9.4 and earlier allows remote attackers to execute arbitrary code via crafted THUNDER_2BITDELTAS data in a .tiff file that has an unexpected BitsPerSample value.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137719" comment="libtiff-devel-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137720" comment="libtiff5-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137721" comment="libtiff5-32bit-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137722" comment="tiff-4.0.3-10.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1176</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1176" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1176" source="CVE"/>
    <description>
    The configuration merger in itk.c in the Steinar H. Gunderson mpm-itk Multi-Processing Module 2.2.11-01 and 2.2.11-02 for the Apache HTTP Server does not properly handle certain configuration sections that specify NiceValue but not AssignUserID, which might allow remote attackers to gain privileges by leveraging the root uid and root gid of an mpm-itk process.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136944" comment="apache2-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136945" comment="apache2-devel-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136946" comment="apache2-doc-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136947" comment="apache2-example-pages-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136948" comment="apache2-prefork-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136949" comment="apache2-utils-2.4.10-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1180</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1180" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in the iriap_getvaluebyclass_indication function in net/irda/iriap.c in the Linux kernel before 2.6.39 allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging connectivity to an IrDA infrared network and sending a large integer value for a (1) name length or (2) attribute length.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137315" comment="kernel-default-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137316" comment="kernel-default-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137317" comment="kernel-desktop-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137318" comment="kernel-desktop-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137319" comment="kernel-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137320" comment="kernel-docs-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137321" comment="kernel-macros-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137322" comment="kernel-pae-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137323" comment="kernel-pae-base-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137324" comment="kernel-pae-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137325" comment="kernel-source-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137326" comment="kernel-syms-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137327" comment="kernel-xen-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137328" comment="kernel-xen-devel-3.16.6-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1187</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1187" source="CVE"/>
    <description>
    Google Chrome before 10.0.648.127 allows remote attackers to bypass the Same Origin Policy via unspecified vectors, related to an "error message leak."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1202</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1202" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1202" source="CVE"/>
    <description>
    The xsltGenerateIdFunction function in functions.c in libxslt 1.1.26 and earlier, as used in Google Chrome before 10.0.648.127 and other products, allows remote attackers to obtain potentially sensitive information about heap memory addresses via an XML document containing a call to the XSLT generate-id XPath function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1407</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1407" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1407" source="CVE"/>
    <description>
    The DKIM implementation in Exim 4.7x before 4.76 permits matching for DKIM identities to apply to lookup items, instead of only strings, which allows remote attackers to execute arbitrary code or access a filesystem via a crafted identity.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137159" comment="exim-4.83-3.1.8 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1466</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1466" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1466" source="CVE"/>
    <description>
    Integer overflow in the SdnToJulian function in the Calendar extension in PHP before 5.3.6 allows context-dependent attackers to cause a denial of service (application crash) via a large integer in the first argument to the cal_from_jd function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1485</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1485" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1485" source="CVE"/>
    <description>
    Race condition in the pkexec utility and polkitd daemon in PolicyKit (aka polkit) 0.96 allows local users to gain privileges by executing a setuid program from pkexec, related to the use of the effective user ID instead of the real user ID.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137577" comment="libpolkit0-0.112-3.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137578" comment="polkit-0.112-3.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137579" comment="typelib-1_0-Polkit-1_0-0.112-3.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1521</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1521" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1521" source="CVE"/>
    <description>
    The urllib and urllib2 modules in Python 2.x before 2.7.2 and 3.x before 3.2.1 process Location headers that specify redirection to file: URLs, which makes it easier for remote attackers to obtain sensitive information or cause a denial of service (resource consumption) via a crafted URL, as demonstrated by the file:///etc/passwd and file:///dev/zero URLs.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137609" comment="libpython2_7-1_0-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137610" comment="libpython2_7-1_0-32bit-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137611" comment="python-base-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137612" comment="python-devel-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137613" comment="python-xml-2.7.8-1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1527</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1527" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1527" source="CVE"/>
    <description>
    The kdb_ldap plugin in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.9 through 1.9.1, when the LDAP back end is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a kinit operation with incorrect string case for the realm, related to the is_principal_in_realm, krb5_set_error_message, krb5_ldap_get_principal, and process_as_req functions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137331" comment="krb5-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137332" comment="krb5-32bit-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137333" comment="krb5-client-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137334" comment="krb5-devel-1.12.2-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1528</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1528" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1528" source="CVE"/>
    <description>
    The krb5_ldap_lockout_audit function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8 through 1.8.4 and 1.9 through 1.9.1, when the LDAP back end is used, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via unspecified vectors, related to the locked_check_p function.  NOTE: the Berkeley DB vector is covered by CVE-2011-4151.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137331" comment="krb5-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137332" comment="krb5-32bit-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137333" comment="krb5-client-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137334" comment="krb5-devel-1.12.2-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1529</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1529" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1529" source="CVE"/>
    <description>
    The lookup_lockout_policy function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8 through 1.8.4 and 1.9 through 1.9.1, when the db2 (aka Berkeley DB) or LDAP back end is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger certain process_as_req errors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137331" comment="krb5-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137332" comment="krb5-32bit-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137333" comment="krb5-client-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137334" comment="krb5-devel-1.12.2-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1530</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1530" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1530" source="CVE"/>
    <description>
    The process_tgs_req function in do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.9 through 1.9.2 allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted TGS request that triggers an error other than the KRB5_KDB_NOENTRY error.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137331" comment="krb5-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137332" comment="krb5-32bit-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137333" comment="krb5-client-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137334" comment="krb5-devel-1.12.2-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1577</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1577" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1577" source="CVE"/>
    <description>
    Heap-based buffer overflow in the is_gpt_valid function in fs/partitions/efi.c in the Linux kernel 2.6.38 and earlier allows physically proximate attackers to cause a denial of service (OOPS) or possibly have unspecified other impact via a crafted size of the EFI GUID partition-table header on removable media.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137315" comment="kernel-default-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137316" comment="kernel-default-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137317" comment="kernel-desktop-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137318" comment="kernel-desktop-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137319" comment="kernel-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137320" comment="kernel-docs-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137321" comment="kernel-macros-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137322" comment="kernel-pae-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137323" comment="kernel-pae-base-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137324" comment="kernel-pae-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137325" comment="kernel-source-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137326" comment="kernel-syms-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137327" comment="kernel-xen-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137328" comment="kernel-xen-devel-3.16.6-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1581</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1581" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1581" source="CVE"/>
    <description>
    The bond_select_queue function in drivers/net/bonding/bond_main.c in the Linux kernel before 2.6.39, when a network device with a large number of receive queues is installed but the default tx_queues setting is used, does not properly restrict queue indexes, which allows remote attackers to cause a denial of service (BUG and system crash) or possibly have unspecified other impact by sending network traffic.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137315" comment="kernel-default-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137316" comment="kernel-default-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137317" comment="kernel-desktop-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137318" comment="kernel-desktop-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137319" comment="kernel-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137320" comment="kernel-docs-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137321" comment="kernel-macros-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137322" comment="kernel-pae-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137323" comment="kernel-pae-base-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137324" comment="kernel-pae-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137325" comment="kernel-source-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137326" comment="kernel-syms-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137327" comment="kernel-xen-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137328" comment="kernel-xen-devel-3.16.6-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1588</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1588" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1588" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137716" comment="libthunarx-2-0-1.6.3-4.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137717" comment="thunar-1.6.3-4.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137718" comment="thunar-lang-1.6.3-4.2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1590</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1590" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1590" source="CVE"/>
    <description>
    The X.509if dissector in Wireshark 1.2.x before 1.2.16 and 1.4.x before 1.4.5 does not properly initialize certain global variables, which allows remote attackers to cause a denial of service (application crash) via a crafted .pcap file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1591</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1591" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1591" source="CVE"/>
    <description>
    Stack-based buffer overflow in the DECT dissector in epan/dissectors/packet-dect.c in Wireshark 1.4.x before 1.4.5 allows remote attackers to execute arbitrary code via a crafted .pcap file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1592</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1592" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1592" source="CVE"/>
    <description>
    The NFS dissector in epan/dissectors/packet-nfs.c in Wireshark 1.4.x before 1.4.5 on Windows uses an incorrect integer data type during decoding of SETCLIENTID calls, which allows remote attackers to cause a denial of service (application crash) via a crafted .pcap file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1709</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1709" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1709" source="CVE"/>
    <description>
    GNOME Display Manager (gdm) before 2.32.2, when glib 2.28 is used, enables execution of a web browser with the uid of the gdm account, which allows local users to gain privileges via vectors involving the x-scheme-handler/http MIME type.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137195" comment="gdm-3.14.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137196" comment="gdmflexiserver-3.14.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137197" comment="libgdm1-3.14.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137198" comment="typelib-1_0-Gdm-1_0-3.14.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1752</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1752" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1752" source="CVE"/>
    <description>
    The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.17, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request for a baselined WebDAV resource, as exploited in the wild in May 2011.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137877" comment="subversion-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137878" comment="subversion-devel-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137879" comment="subversion-perl-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137880" comment="subversion-python-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137881" comment="subversion-server-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137882" comment="subversion-tools-1.8.10-2.4.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1758</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1758" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1758" source="CVE"/>
    <description>
    The krb5_save_ccname_done function in providers/krb5/krb5_auth.c in System Security Services Daemon (SSSD) 1.5.x before 1.5.7, when automatic ticket renewal and offline authentication are configured, uses a pathname string as a password, which allows local users to bypass Kerberos authentication by listing the /tmp directory to obtain the pathname.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137702" comment="libsss_idmap0-1.12.0-3.1.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137703" comment="libsss_nss_idmap0-1.12.0-3.1.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137704" comment="sssd-1.12.0-3.1.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137705" comment="sssd-32bit-1.12.0-3.1.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137706" comment="sssd-krb5-common-1.12.0-3.1.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137707" comment="sssd-ldap-1.12.0-3.1.10 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1761</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1761" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1761" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in the (1) abc_new_macro and (2) abc_new_umacro functions in src/load_abc.cpp in libmodplug before 0.8.8.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted ABC file.  NOTE: some of these details are obtained from third party information.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137543" comment="libmodplug1-0.8.8.5-3.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1764</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1764" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1764" source="CVE"/>
    <description>
    Format string vulnerability in the dkim_exim_verify_finish function in src/dkim.c in Exim before 4.76 might allow remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via format string specifiers in data used in DKIM logging, as demonstrated by an identity field containing a % (percent) character.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137159" comment="exim-4.83-3.1.8 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1783</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1783" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1783" source="CVE"/>
    <description>
    The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is enabled, allows remote attackers to cause a denial of service (infinite loop and memory consumption) in opportunistic circumstances by requesting data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137877" comment="subversion-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137878" comment="subversion-devel-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137879" comment="subversion-perl-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137880" comment="subversion-python-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137881" comment="subversion-server-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137882" comment="subversion-tools-1.8.10-2.4.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1898</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1898" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1898" source="CVE"/>
    <description>
    Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1907</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1907" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1907" source="CVE"/>
    <description>
    ISC BIND 9.8.x before 9.8.0-P1, when Response Policy Zones (RPZ) RRset replacement is enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via an RRSIG query.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137045" comment="bind-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137046" comment="bind-chrootenv-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137047" comment="bind-doc-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137048" comment="bind-libs-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137049" comment="bind-utils-9.9.5P1-2.2.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1910</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1910" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1910" source="CVE"/>
    <description>
    Off-by-one error in named in ISC BIND 9.x before 9.7.3-P1, 9.8.x before 9.8.0-P2, 9.4-ESV before 9.4-ESV-R4-P1, and 9.6-ESV before 9.6-ESV-R4-P1 allows remote DNS servers to cause a denial of service (assertion failure and daemon exit) via a negative response containing large RRSIG RRsets.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137045" comment="bind-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137046" comment="bind-chrootenv-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137047" comment="bind-doc-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137048" comment="bind-libs-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137049" comment="bind-utils-9.9.5P1-2.2.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1921</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1921" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1921" source="CVE"/>
    <description>
    The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is disabled, does not properly enforce permissions for files that had been publicly readable in the past, which allows remote attackers to obtain sensitive information via a replay REPORT operation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137877" comment="subversion-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137878" comment="subversion-devel-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137879" comment="subversion-perl-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137880" comment="subversion-python-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137881" comment="subversion-server-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137882" comment="subversion-tools-1.8.10-2.4.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1928</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1928" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1928" source="CVE"/>
    <description>
    The fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library 1.4.3 and 1.4.4, and the Apache HTTP Server 2.2.18, allows remote attackers to cause a denial of service (infinite loop) via a URI that does not match unspecified types of wildcard patterns, as demonstrated by attacks against mod_autoindex in httpd when a /*/WEB-INF/ configuration pattern is used.  NOTE: this issue exists because of an incorrect fix for CVE-2011-0419.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137394" comment="libapr1-1.5.1-4.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137395" comment="libapr1-devel-1.5.1-4.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1944</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1944" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1944" source="CVE"/>
    <description>
    Integer overflow in xpath.c in libxml2 2.6.x through 2.6.32 and 2.7.x through 2.7.8, and libxml 1.8.16 and earlier, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted XML file that triggers a heap-based buffer overflow when adding a new namespace node, related to handling of XPath expressions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137790" comment="libxml2-2-2.9.1-7.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137791" comment="libxml2-2-32bit-2.9.1-7.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137792" comment="libxml2-devel-2.9.1-7.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137793" comment="libxml2-tools-2.9.1-7.2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1946</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1946" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1946" source="CVE"/>
    <description>
    gnomesu-pam-backend in libgnomesu 1.0.0 prints an error message but proceeds with the non-error code path upon failure of the setgid or setuid function, which allows local users to gain privileges by leveraging access to two unprivileged user accounts, and running many processes under one of these accounts.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137498" comment="libgnomesu-1.0.0-353.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137499" comment="libgnomesu0-1.0.0-353.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1947</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1947" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1947" source="CVE"/>
    <description>
    fetchmail 5.9.9 through 6.3.19 does not properly limit the wait time after issuing a (1) STARTTLS or (2) STLS request, which allows remote servers to cause a denial of service (application hang) by acknowledging the request but not sending additional packets.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137164" comment="fetchmail-6.3.26-6.1.4 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1957</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1957" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1957" source="CVE"/>
    <description>
    The dissect_dcm_main function in epan/dissectors/packet-dcm.c in the DICOM dissector in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 allows remote attackers to cause a denial of service (infinite loop) via an invalid PDU length.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1958</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1958" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1958" source="CVE"/>
    <description>
    Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 allows user-assisted remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Diameter dictionary file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1959</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-1959" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1959" source="CVE"/>
    <description>
    The snoop_read function in wiretap/snoop.c in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 does not properly handle certain virtualizable buffers, which allows remote attackers to cause a denial of service (application crash) via a large length value in a snoop file that triggers a stack-based buffer over-read.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2054</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2054" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2054" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137690" comment="libsoup-2_4-1-2.48.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137691" comment="libsoup-devel-2.48.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137692" comment="typelib-1_0-Soup-2_4-2.48.0-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2174</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2174" source="CVE"/>
    <description>
    Double free vulnerability in the tvb_uncompress function in epan/tvbuff.c in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 allows remote attackers to cause a denial of service (application crash) via a packet with malformed data that uses zlib compression.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2175</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2175" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2175" source="CVE"/>
    <description>
    Integer underflow in the visual_read function in wiretap/visual.c in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 allows remote attackers to cause a denial of service (application crash) via a malformed Visual Networks file that triggers a heap-based buffer over-read.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2186</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2186" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137205" comment="git-2.1.2-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137206" comment="git-core-2.1.2-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137207" comment="git-cvs-2.1.2-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137208" comment="git-daemon-2.1.2-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137209" comment="git-email-2.1.2-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137210" comment="git-gui-2.1.2-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137211" comment="git-svn-2.1.2-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137212" comment="git-web-2.1.2-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137213" comment="gitk-2.1.2-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2199</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2199" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2199" source="CVE"/>
    <description>
    Buffer overflow in tftp-hpa before 5.1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via the utimeout option.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137890" comment="tftp-5.2-10.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2202</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2202" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2202" source="CVE"/>
    <description>
    The rfc1867_post_handler function in main/rfc1867.c in PHP before 5.3.7 does not properly restrict filenames in multipart/form-data POST requests, which allows remote attackers to conduct absolute path traversal attacks, and possibly create or overwrite arbitrary files, via a crafted upload request, related to a "file path injection vulnerability."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2203</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2203" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2203" source="CVE"/>
    <description>
    The hfs_find_init function in the Linux kernel 2.6 allows local users to cause a denial of service (NULL pointer dereference and Oops) by mounting an HFS file system with a malformed MDB extent record.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137315" comment="kernel-default-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137316" comment="kernel-default-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137317" comment="kernel-desktop-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137318" comment="kernel-desktop-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137319" comment="kernel-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137320" comment="kernel-docs-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137321" comment="kernel-macros-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137322" comment="kernel-pae-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137323" comment="kernel-pae-base-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137324" comment="kernel-pae-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137325" comment="kernel-source-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137326" comment="kernel-syms-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137327" comment="kernel-xen-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137328" comment="kernel-xen-devel-3.16.6-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2362</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2362" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2362" source="CVE"/>
    <description>
    Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 do not distinguish between cookies for two domain names that differ only in a trailing dot, which allows remote web servers to bypass the Same Origin Policy via Set-Cookie headers.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2363</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2363" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2363" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsSVGPointList::AppendElement function in the implementation of SVG element lists in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a user-supplied callback.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2364</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2364" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2364" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.18 and Thunderbird before 3.1.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-2365.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2365</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2365" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2365" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.18 and Thunderbird before 3.1.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-2364.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112366" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2366</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2366" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2366" source="CVE"/>
    <description>
    Mozilla Gecko before 5.0, as used in Firefox before 5.0 and Thunderbird before 5.0, does not block use of a cross-domain image as a WebGL texture, which allows remote attackers to obtain approximate copies of arbitrary images via a timing attack involving a crafted WebGL fragment shader.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2367</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2367" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2367" source="CVE"/>
    <description>
    The WebGL implementation in Mozilla Firefox 4.x through 4.0.1 does not properly restrict read operations, which allows remote attackers to obtain sensitive information from GPU memory associated with an arbitrary process, or cause a denial of service (application crash), via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2368</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2368" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2368" source="CVE"/>
    <description>
    The WebGL implementation in Mozilla Firefox 4.x through 4.0.1 does not properly restrict write operations, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2369</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2369" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2369" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Mozilla Firefox 4.x through 4.0.1 allows remote attackers to inject arbitrary web script or HTML via an SVG element containing an HTML-encoded entity.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2370</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2370" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2370" source="CVE"/>
    <description>
    Mozilla Firefox before 5.0 does not properly enforce the whitelist for the xpinstall functionality, which allows remote attackers to trigger an installation dialog for a (1) add-on or (2) theme via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2371</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2371" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2371" source="CVE"/>
    <description>
    Integer overflow in the Array.reduceRight method in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via vectors involving a long JavaScript Array object.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2372</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2372" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2372" source="CVE"/>
    <description>
    Mozilla Firefox before 3.6.23 and 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 do not prevent the starting of a download in response to the holding of the Enter key, which allows user-assisted remote attackers to bypass intended access restrictions via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2373</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2373" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2373" source="CVE"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14, when JavaScript is disabled, allows remote attackers to execute arbitrary code via a crafted XUL document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2374</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2374" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2374" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2375</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2375" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2375" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 5.0 and Thunderbird through 3.1.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2376</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2376" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2376" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.18 and Thunderbird before 3.1.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2377</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2377" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2377" source="CVE"/>
    <description>
    Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a multipart/x-mixed-replace image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2464</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2464" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2464" source="CVE"/>
    <description>
    Unspecified vulnerability in ISC BIND 9 9.6.x before 9.6-ESV-R4-P3, 9.7.x before 9.7.3-P3, and 9.8.x before 9.8.0-P4 allows remote attackers to cause a denial of service (named daemon crash) via a crafted UPDATE request.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137045" comment="bind-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137046" comment="bind-chrootenv-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137047" comment="bind-doc-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137048" comment="bind-libs-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137049" comment="bind-utils-9.9.5P1-2.2.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2483</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2483" source="CVE"/>
    <description>
    crypt_blowfish before 1.1, as used in PHP before 5.3.7 on certain platforms, PostgreSQL before 8.4.9, and other products, does not properly handle 8-bit characters, which makes it easier for context-dependent attackers to determine a cleartext password by leveraging knowledge of a password hash.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137886" comment="sysvinit-tools-2.88+-96.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137887" comment="whois-5.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137924" comment="yast2-core-3.1.12-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137925" comment="yast2-core-devel-3.1.12-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2485</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2485" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2485" source="CVE"/>
    <description>
    The gdk_pixbuf__gif_image_load function in gdk-pixbuf/io-gif.c in gdk-pixbuf before 2.23.5 does not properly handle certain return values, which allows remote attackers to cause a denial of service (memory consumption) via a crafted GIF image file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137185" comment="gdk-pixbuf-devel-2.31.1-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137186" comment="gdk-pixbuf-query-loaders-2.31.1-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137187" comment="gdk-pixbuf-query-loaders-32bit-2.31.1-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137188" comment="libgdk_pixbuf-2_0-0-2.31.1-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137189" comment="libgdk_pixbuf-2_0-0-32bit-2.31.1-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137190" comment="typelib-1_0-GdkPixbuf-2_0-2.31.1-1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2486</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2486" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2486" source="CVE"/>
    <description>
    nspluginwrapper before 1.4.4 does not properly provide access to NPNVprivateModeBool variable settings, which could prevent Firefox plugins from determining if they should run in Private Browsing mode and allow remote attackers to bypass intended access restrictions, as demonstrated using Flash.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137807" comment="nspluginwrapper-1.4.4-13.1.3 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2489</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2489" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2489" source="CVE"/>
    <description>
    Multiple off-by-one errors in opiesu.c in opiesu in OPIE 2.4.1-test1 and earlier might allow local users to gain privileges via a crafted command line.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137817" comment="opie-2.4-725.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137818" comment="opie-32bit-2.4-725.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2490</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2490" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2490" source="CVE"/>
    <description>
    opielogin.c in opielogin in OPIE 2.4.1-test1 and earlier does not check the return value of the setuid system call, which allows local users to gain privileges by arranging for an account to already be running its maximum number of processes.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137817" comment="opie-2.4-725.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137818" comment="opie-32bit-2.4-725.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2501</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2501" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2501" source="CVE"/>
    <description>
    The png_format_buffer function in pngerror.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 allows remote attackers to cause a denial of service (application crash) via a crafted PNG image that triggers an out-of-bounds read during the copying of error-message data.  NOTE: this vulnerability exists because of a CVE-2004-0421 regression. NOTE: this is called an off-by-one error by some sources.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137570" comment="libpng12-0-1.2.51-3.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137571" comment="libpng12-0-32bit-1.2.51-3.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137572" comment="libpng12-compat-devel-1.2.51-3.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137573" comment="libpng12-devel-1.2.51-3.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137574" comment="libpng16-16-1.6.13-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137575" comment="libpng16-16-32bit-1.6.13-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137576" comment="libpng16-devel-1.6.13-2.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2511</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2511" source="CVE"/>
    <description>
    Integer overflow in libvirt before 0.9.3 allows remote authenticated users to cause a denial of service (libvirtd crash) and possibly execute arbitrary code via a crafted VirDomainGetVcpus RPC call that triggers memory corruption.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137726" comment="libvirt-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137727" comment="libvirt-client-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137728" comment="libvirt-daemon-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137729" comment="libvirt-daemon-config-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137730" comment="libvirt-daemon-config-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137731" comment="libvirt-daemon-driver-interface-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137732" comment="libvirt-daemon-driver-libxl-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137733" comment="libvirt-daemon-driver-lxc-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137734" comment="libvirt-daemon-driver-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137735" comment="libvirt-daemon-driver-nodedev-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137736" comment="libvirt-daemon-driver-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137737" comment="libvirt-daemon-driver-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137738" comment="libvirt-daemon-driver-secret-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137739" comment="libvirt-daemon-driver-storage-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137740" comment="libvirt-daemon-driver-uml-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137741" comment="libvirt-daemon-driver-vbox-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137742" comment="libvirt-daemon-driver-xen-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137743" comment="libvirt-daemon-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137744" comment="libvirt-daemon-xen-1.2.9-1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2513</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2513" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2513" source="CVE"/>
    <description>
    The Java Network Launching Protocol (JNLP) implementation in IcedTea6 1.9.x before 1.9.9 and before 1.8.9, and IcedTea-Web 1.1.x before 1.1.1 and before 1.0.4, allows remote attackers to obtain the username and full path of the home and cache directories by accessing properties of the ClassLoader.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137274" comment="icedtea-web-javadoc-1.5.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137275" comment="java-1_7_0-openjdk-plugin-1.5.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137276" comment="java-1_8_0-openjdk-plugin-1.5.1-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2514</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2514" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2514" source="CVE"/>
    <description>
    The Java Network Launching Protocol (JNLP) implementation in IcedTea6 1.9.x before 1.9.9 and before 1.8.9, and IcedTea-Web 1.1.x before 1.1.1 and before 1.0.4, allows remote attackers to trick victims into granting access to local files by modifying the content of the Java Web Start Security Warning dialog box to represent a different filename than the file for which access will be granted.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137274" comment="icedtea-web-javadoc-1.5.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137275" comment="java-1_7_0-openjdk-plugin-1.5.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137276" comment="java-1_8_0-openjdk-plugin-1.5.1-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2522</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2522" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2522" source="CVE"/>
    <description>
    Multiple cross-site request forgery (CSRF) vulnerabilities in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.10 allow remote attackers to hijack the authentication of administrators for requests that (1) shut down daemons, (2) start daemons, (3) add shares, (4) remove shares, (5) add printers, (6) remove printers, (7) add user accounts, or (8) remove user accounts, as demonstrated by certain start, stop, and restart parameters to the status program.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137424" comment="libdcerpc-binding0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137425" comment="libdcerpc-binding0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137426" comment="libdcerpc0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137427" comment="libdcerpc0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137428" comment="libgensec0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137429" comment="libgensec0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137430" comment="libndr-krb5pac0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137431" comment="libndr-krb5pac0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137432" comment="libndr-nbt0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137433" comment="libndr-nbt0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137434" comment="libndr-standard0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137435" comment="libndr-standard0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137436" comment="libndr0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137437" comment="libndr0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137438" comment="libnetapi0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137439" comment="libnetapi0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137440" comment="libpdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137441" comment="libpdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137442" comment="libregistry0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137443" comment="libsamba-credentials0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137444" comment="libsamba-credentials0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137445" comment="libsamba-hostconfig0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137446" comment="libsamba-hostconfig0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137447" comment="libsamba-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137448" comment="libsamba-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137449" comment="libsamdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137450" comment="libsamdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137451" comment="libsmbclient-devel-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137452" comment="libsmbclient-raw0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137453" comment="libsmbclient-raw0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137454" comment="libsmbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137455" comment="libsmbconf0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137456" comment="libsmbconf0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137457" comment="libsmbldap0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137458" comment="libsmbldap0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137459" comment="libtevent-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137460" comment="libtevent-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137461" comment="libwbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137462" comment="libwbclient0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137463" comment="samba-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137464" comment="samba-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137465" comment="samba-client-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137466" comment="samba-client-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137467" comment="samba-doc-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137468" comment="samba-libs-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137469" comment="samba-libs-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137470" comment="samba-winbind-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137471" comment="samba-winbind-32bit-4.1.12-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2597</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2597" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2597" source="CVE"/>
    <description>
    The Lucent/Ascend file parser in Wireshark 1.2.x before 1.2.18, 1.4.x through 1.4.7, and 1.6.0 allows remote attackers to cause a denial of service (infinite loop) via malformed packets.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2690</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2690" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2690" source="CVE"/>
    <description>
    Buffer overflow in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4, when used by an application that calls the png_rgb_to_gray function but not the png_set_expand function, allows remote attackers to overwrite memory with an arbitrary amount of data, and possibly have unspecified other impact, via a crafted PNG image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137574" comment="libpng16-16-1.6.13-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137575" comment="libpng16-16-32bit-1.6.13-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137576" comment="libpng16-devel-1.6.13-2.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2691</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2691" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2691" source="CVE"/>
    <description>
    The png_err function in pngerror.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 makes a function call using a NULL pointer argument instead of an empty-string argument, which allows remote attackers to cause a denial of service (application crash) via a crafted PNG image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137574" comment="libpng16-16-1.6.13-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137575" comment="libpng16-16-32bit-1.6.13-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137576" comment="libpng16-devel-1.6.13-2.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2692</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2692" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2692" source="CVE"/>
    <description>
    The png_handle_sCAL function in pngrutil.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 does not properly handle invalid sCAL chunks, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a crafted PNG image that triggers the reading of uninitialized memory.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137574" comment="libpng16-16-1.6.13-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137575" comment="libpng16-16-32bit-1.6.13-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137576" comment="libpng16-devel-1.6.13-2.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2694</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2694" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2694" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the chg_passwd function in web/swat.c in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.10 allows remote authenticated administrators to inject arbitrary web script or HTML via the username parameter to the passwd program (aka the user field to the Change Password page).
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137424" comment="libdcerpc-binding0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137425" comment="libdcerpc-binding0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137426" comment="libdcerpc0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137427" comment="libdcerpc0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137428" comment="libgensec0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137429" comment="libgensec0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137430" comment="libndr-krb5pac0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137431" comment="libndr-krb5pac0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137432" comment="libndr-nbt0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137433" comment="libndr-nbt0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137434" comment="libndr-standard0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137435" comment="libndr-standard0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137436" comment="libndr0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137437" comment="libndr0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137438" comment="libnetapi0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137439" comment="libnetapi0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137440" comment="libpdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137441" comment="libpdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137442" comment="libregistry0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137443" comment="libsamba-credentials0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137444" comment="libsamba-credentials0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137445" comment="libsamba-hostconfig0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137446" comment="libsamba-hostconfig0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137447" comment="libsamba-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137448" comment="libsamba-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137449" comment="libsamdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137450" comment="libsamdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137451" comment="libsmbclient-devel-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137452" comment="libsmbclient-raw0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137453" comment="libsmbclient-raw0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137454" comment="libsmbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137455" comment="libsmbconf0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137456" comment="libsmbconf0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137457" comment="libsmbldap0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137458" comment="libsmbldap0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137459" comment="libtevent-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137460" comment="libtevent-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137461" comment="libwbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137462" comment="libwbclient0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137463" comment="samba-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137464" comment="samba-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137465" comment="samba-client-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137466" comment="samba-client-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137467" comment="samba-doc-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137468" comment="samba-libs-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137469" comment="samba-libs-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137470" comment="samba-winbind-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137471" comment="samba-winbind-32bit-4.1.12-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2696</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2696" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2696" source="CVE"/>
    <description>
    Integer overflow in libsndfile before 1.0.25 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PARIS Audio Format (PAF) file that triggers a heap-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137681" comment="libsndfile-devel-1.0.25-19.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137682" comment="libsndfile1-1.0.25-19.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137683" comment="libsndfile1-32bit-1.0.25-19.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2697</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2697" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2697" source="CVE"/>
    <description>
    foomatic-rip-hplip in HP Linux Imaging and Printing (HPLIP) 3.11.5 allows remote attackers to execute arbitrary code via a crafted *FoomaticRIPCommandLine field in a .ppd file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137268" comment="hplip-3.14.6-2.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137269" comment="hplip-hpijs-3.14.6-2.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137270" comment="hplip-sane-3.14.6-2.2.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2698</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2698" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2698" source="CVE"/>
    <description>
    Off-by-one error in the elem_cell_id_aux function in epan/dissectors/packet-ansi_a.c in the ANSI MAP dissector in Wireshark 1.4.x before 1.4.8 and 1.6.x before 1.6.1 allows remote attackers to cause a denial of service (infinite loop) via an invalid packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2709</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2709" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2709" source="CVE"/>
    <description>
    libgssapi and libgssglue before 0.4 do not properly check privileges, which allows local users to load untrusted configuration files and execute arbitrary code via the GSSAPI_MECH_CONF environment variable, as demonstrated using mount.nfs.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137500" comment="libgssglue-devel-0.4-4.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137501" comment="libgssglue1-0.4-4.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2721</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2721" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2721" source="CVE"/>
    <description>
    Off-by-one error in the cli_hm_scan function in matcher-hash.c in libclamav in ClamAV before 0.97.2 allows remote attackers to cause a denial of service (daemon crash) via an e-mail message that is not properly handled during certain hash calculations.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137056" comment="clamav-0.98.4-2.1.10 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2722</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2722" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2722" source="CVE"/>
    <description>
    The send_data_to_stdout function in prnt/hpijs/hpcupsfax.cpp in HP Linux Imaging and Printing (HPLIP) 3.x before 3.11.10 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/hpcupsfax.out temporary file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137268" comment="hplip-3.14.6-2.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137269" comment="hplip-hpijs-3.14.6-2.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137270" comment="hplip-sane-3.14.6-2.2.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2729</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2729" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2729" source="CVE"/>
    <description>
    native/unix/native/jsvc-unix.c in jsvc in the Daemon component 1.0.3 through 1.0.6 in Apache Commons, as used in Apache Tomcat 5.5.32 through 5.5.33, 6.0.30 through 6.0.32, and 7.0.x before 7.0.20 on Linux, does not drop capabilities, which allows remote attackers to bypass read permissions for files via a request to an application.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136942" comment="apache-commons-daemon-1.0.15-5.1.12 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2748</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2748" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2748" source="CVE"/>
    <description>
    The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted DHCP packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137130" comment="dhcp-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137131" comment="dhcp-client-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137132" comment="dhcp-doc-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137133" comment="dhcp-relay-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137134" comment="dhcp-server-4.2.6-9.2.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2749</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2749" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2749" source="CVE"/>
    <description>
    The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted BOOTP packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137130" comment="dhcp-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137131" comment="dhcp-client-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137132" comment="dhcp-doc-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137133" comment="dhcp-relay-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137134" comment="dhcp-server-4.2.6-9.2.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2766</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2766" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2766" source="CVE"/>
    <description>
    The FCGI (aka Fast CGI) module 0.70 through 0.73 for Perl, as used by CGI::Fast, uses environment variable values from one request during processing of a later request, which allows remote attackers to bypass authentication via crafted HTTP headers.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136908" comment="FastCGI-2.4.0-167.2.4 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2895</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2895" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2895" source="CVE"/>
    <description>
    The LZW decompressor in (1) the BufCompressedFill function in fontfile/decompress.c in X.Org libXfont before 1.4.4 and (2) compress/compress.c in 4.3BSD, as used in zopen.c in OpenBSD before 3.8, FreeBSD, NetBSD 4.0.x and 5.0.x before 5.0.3 and 5.1.x before 5.1.1, FreeType 2.1.9, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows context-dependent attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2896.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137361" comment="libXfont-devel-1.5.0-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137362" comment="libXfont1-1.5.0-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137918" comment="xorg-x11-devel-7.6-46.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2896</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2896" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2896" source="CVE"/>
    <description>
    The LZW decompressor in the LWZReadByte function in giftoppm.c in the David Koblas GIF decoder in PBMPLUS, as used in the gif_read_lzw function in filter/image-gif.c in CUPS before 1.4.7, the LZWReadByte function in plug-ins/common/file-gif-load.c in GIMP 2.6.11 and earlier, the LZWReadByte function in img/gifread.c in XPCE in SWI-Prolog 5.10.4 and earlier, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows remote attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2895.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137199" comment="gimp-2.8.14-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137200" comment="gimp-help-browser-2.8.14-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137201" comment="gimp-plugin-aa-2.8.14-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137202" comment="gimp-plugins-python-2.8.14-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137203" comment="libgimp-2_0-0-2.8.14-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137204" comment="libgimpui-2_0-0-2.8.14-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2985</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2985" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2985" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 5, Thunderbird before 6, SeaMonkey 2.x before 2.3, and possibly other products allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2986</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2986" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2986" source="CVE"/>
    <description>
    Mozilla Firefox 4.x through 5, Thunderbird before 6, SeaMonkey 2.x before 2.3, and possibly other products, when the Direct2D (aka D2D) API is used on Windows, allows remote attackers to bypass the Same Origin Policy, and obtain sensitive image data from a different domain, by inserting this data into a canvas.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2987</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2987" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2987" source="CVE"/>
    <description>
    Heap-based buffer overflow in Almost Native Graphics Layer Engine (ANGLE), as used in the WebGL implementation in Mozilla Firefox 4.x through 5, Thunderbird before 6, SeaMonkey 2.x before 2.3, and possibly other products might allow remote attackers to execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2988</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2988" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2988" source="CVE"/>
    <description>
    Buffer overflow in an unspecified string class in the WebGL shader implementation in Mozilla Firefox 4.x through 5, Thunderbird before 6, SeaMonkey 2.x before 2.3, and possibly other products allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a long source-code block for a shader.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2989</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2989" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2989" source="CVE"/>
    <description>
    The browser engine in Mozilla Firefox 4.x through 5, SeaMonkey 2.x before 2.3, Thunderbird before 6, and possibly other products does not properly implement WebGL, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2990</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2990" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2990" source="CVE"/>
    <description>
    The implementation of Content Security Policy (CSP) violation reports in Mozilla Firefox 4.x through 5, SeaMonkey 2.x before 2.3, and possibly other products does not remove proxy-authorization credentials from the listed request headers, which allows attackers to obtain sensitive information by reading a report, related to incorrect host resolution that occurs with certain redirects.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2991</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2991" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2991" source="CVE"/>
    <description>
    The browser engine in Mozilla Firefox 4.x through 5, SeaMonkey 2.x before 2.3, Thunderbird before 6, and possibly other products does not properly implement JavaScript, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2992</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2992" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2992" source="CVE"/>
    <description>
    The Ogg reader in the browser engine in Mozilla Firefox 4.x through 5, SeaMonkey 2.x before 2.3, Thunderbird before 6, and possibly other products allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2993</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2993" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2993" source="CVE"/>
    <description>
    The implementation of digital signatures for JAR files in Mozilla Firefox 4.x through 5, SeaMonkey 2.x before 2.3, and possibly other products does not prevent calls from unsigned JavaScript code to signed code, which allows remote attackers to bypass the Same Origin Policy and gain privileges via a crafted web site, a different vulnerability than CVE-2008-2801.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2995</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2995" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2995" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.23 and 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2996</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2996" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2996" source="CVE"/>
    <description>
    Unspecified vulnerability in the plugin API in Mozilla Firefox 3.6.x before 3.6.23 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2997</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-2997" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2997" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 6, Thunderbird before 7.0, and SeaMonkey before 2.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3000</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3000" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3000" source="CVE"/>
    <description>
    Mozilla Firefox before 3.6.23 and 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 do not properly handle HTTP responses that contain multiple Location, Content-Length, or Content-Disposition headers, which makes it easier for remote attackers to conduct HTTP response splitting attacks via crafted header values.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3001</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3001" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3001" source="CVE"/>
    <description>
    Mozilla Firefox 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 do not prevent manual add-on installation in response to the holding of the Enter key, which allows user-assisted remote attackers to bypass intended access restrictions via a crafted web site that triggers an unspecified internal error.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3002</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3002" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3002" source="CVE"/>
    <description>
    Almost Native Graphics Layer Engine (ANGLE), as used in Mozilla Firefox before 7.0 and SeaMonkey before 2.4, does not validate the return value of a GrowAtomTable function call, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger a memory-allocation error and a resulting buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3003</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3003" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3003" source="CVE"/>
    <description>
    Mozilla Firefox before 7.0 and SeaMonkey before 2.4 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unspecified WebGL test case that triggers a memory-allocation error and a resulting out-of-bounds write operation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3004</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3004" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3004" source="CVE"/>
    <description>
    The JSSubScriptLoader in Mozilla Firefox 4.x through 6 and SeaMonkey before 2.4 does not properly handle XPCNativeWrappers during calls to the loadSubScript method in an add-on, which makes it easier for remote attackers to gain privileges via a crafted web site that leverages certain unwrapping behavior.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3005</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3005" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3005" source="CVE"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OGG headers in a .ogg file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3026</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3026" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3026" source="CVE"/>
    <description>
    Integer overflow in libpng, as used in Google Chrome before 17.0.963.56, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that trigger an integer truncation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137570" comment="libpng12-0-1.2.51-3.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137571" comment="libpng12-0-32bit-1.2.51-3.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137572" comment="libpng12-compat-devel-1.2.51-3.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137573" comment="libpng12-devel-1.2.51-3.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3045</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3045" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3045" source="CVE"/>
    <description>
    Integer signedness error in the png_inflate function in pngrutil.c in libpng before 1.4.10beta01, as used in Google Chrome before 17.0.963.83 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file, a different vulnerability than CVE-2011-3026.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137570" comment="libpng12-0-1.2.51-3.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137571" comment="libpng12-0-32bit-1.2.51-3.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137572" comment="libpng12-compat-devel-1.2.51-3.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137573" comment="libpng12-devel-1.2.51-3.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3048</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3048" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3048" source="CVE"/>
    <description>
    The png_set_text_2 function in pngset.c in libpng 1.0.x before 1.0.59, 1.2.x before 1.2.49, 1.4.x before 1.4.11, and 1.5.x before 1.5.10 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted text chunk in a PNG image file, which triggers a memory allocation failure that is not properly handled, leading to a heap-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137570" comment="libpng12-0-1.2.51-3.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137571" comment="libpng12-0-32bit-1.2.51-3.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137572" comment="libpng12-compat-devel-1.2.51-3.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137573" comment="libpng12-devel-1.2.51-3.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3062</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3062" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3062" source="CVE"/>
    <description>
    Off-by-one error in the OpenType Sanitizer in Google Chrome before 18.0.1025.142 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted OpenType file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3079</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3079" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3079" source="CVE"/>
    <description>
    The Inter-process Communication (IPC) implementation in Google Chrome before 18.0.1025.168, as used in Mozilla Firefox before 38.0 and other products, does not properly validate messages, which has unspecified impact and attack vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109791" comment="MozillaFirefox-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109792" comment="MozillaFirefox-branding-upstream-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109793" comment="MozillaFirefox-buildsymbols-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109794" comment="MozillaFirefox-devel-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109795" comment="MozillaFirefox-translations-common-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109796" comment="MozillaFirefox-translations-other-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109786" comment="MozillaThunderbird-31.7.0-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109787" comment="MozillaThunderbird-buildsymbols-31.7.0-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109788" comment="MozillaThunderbird-devel-31.7.0-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109789" comment="MozillaThunderbird-translations-common-31.7.0-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109790" comment="MozillaThunderbird-translations-other-31.7.0-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109797" comment="libfreebl3-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109798" comment="libfreebl3-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109799" comment="libsoftokn3-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109800" comment="libsoftokn3-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109801" comment="mozilla-nss-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109802" comment="mozilla-nss-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109803" comment="mozilla-nss-certs-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109804" comment="mozilla-nss-certs-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109805" comment="mozilla-nss-devel-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109806" comment="mozilla-nss-sysinit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109807" comment="mozilla-nss-sysinit-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109808" comment="mozilla-nss-tools-3.18.1-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3101</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3101" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3101" source="CVE"/>
    <description>
    Google Chrome before 19.0.1084.46 on Linux does not properly mitigate an unspecified flaw in an NVIDIA driver, which has unknown impact and attack vectors.  NOTE: see CVE-2012-3105 for the related MFSA 2012-34 issue in Mozilla products.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3146</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3146" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3146" source="CVE"/>
    <description>
    librsvg before 2.34.1 uses the node name to identify the type of node, which allows context-dependent attackers to cause a denial of service (NULL pointer dereference) and possibly execute arbitrary code via a SVG file with a node with the element name starting with "fe," which is misidentified as a RsvgFilterPrimitive.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137191" comment="gdk-pixbuf-loader-rsvg-2.40.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137192" comment="librsvg-2-2-2.40.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137193" comment="librsvg-devel-2.40.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137194" comment="typelib-1_0-Rsvg-2_0-2.40.5-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3148</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3148" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3148" source="CVE"/>
    <description>
    Stack-based buffer overflow in the _assemble_line function in modules/pam_env/pam_env.c in Linux-PAM (aka pam) before 1.1.5 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long string of white spaces at the beginning of the ~/.pam_environment file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137820" comment="pam-1.1.8-11.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137821" comment="pam-32bit-1.1.8-11.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137822" comment="pam-devel-1.1.8-11.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3149</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3149" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3149" source="CVE"/>
    <description>
    The _expand_arg function in the pam_env module (modules/pam_env/pam_env.c) in Linux-PAM (aka pam) before 1.1.5 does not properly handle when environment variable expansion can overflow, which allows local users to cause a denial of service (CPU consumption).
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137820" comment="pam-1.1.8-11.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137821" comment="pam-32bit-1.1.8-11.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137822" comment="pam-devel-1.1.8-11.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3153</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3153" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3153" source="CVE"/>
    <description>
    dmrc.c in Light Display Manager (aka LightDM) before 1.1.1 allows local users to read arbitrary files via a symlink attack on ~/.dmrc.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137532" comment="liblightdm-gobject-1-0-1.12.1-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137533" comment="lightdm-1.12.1-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137534" comment="lightdm-lang-1.12.1-1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3172</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3172" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3172" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137823" comment="pam-modules-12.1-24.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137824" comment="pam-modules-32bit-12.1-24.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3177</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3177" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3177" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137922" comment="yast2-3.1.108-1.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137924" comment="yast2-core-3.1.12-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137925" comment="yast2-core-devel-3.1.12-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137923" comment="yast2-devel-doc-3.1.108-1.6 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3192</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3192" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3192" source="CVE"/>
    <description>
    The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136944" comment="apache2-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136945" comment="apache2-devel-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136946" comment="apache2-doc-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136947" comment="apache2-example-pages-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136948" comment="apache2-prefork-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136949" comment="apache2-utils-2.4.10-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3193</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3193" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3193" source="CVE"/>
    <description>
    Heap-based buffer overflow in the Lookup_MarkMarkPos function in the HarfBuzz module (harfbuzz-gpos.c), as used by Qt before 4.7.4 and Pango, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137616" comment="libqt4-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137617" comment="libqt4-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137618" comment="libqt4-devel-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137619" comment="libqt4-linguist-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137620" comment="libqt4-qt3support-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137621" comment="libqt4-qt3support-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137622" comment="libqt4-sql-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137623" comment="libqt4-sql-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137624" comment="libqt4-sql-mysql-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137625" comment="libqt4-sql-mysql-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137626" comment="libqt4-sql-postgresql-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137627" comment="libqt4-sql-postgresql-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137628" comment="libqt4-sql-sqlite-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137629" comment="libqt4-sql-sqlite-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137630" comment="libqt4-sql-unixODBC-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137631" comment="libqt4-sql-unixODBC-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137632" comment="libqt4-x11-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137633" comment="libqt4-x11-32bit-4.8.6-4.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3200</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3200" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3200" source="CVE"/>
    <description>
    Stack-based buffer overflow in the parseLegacySyslogMsg function in tools/syslogd.c in rsyslogd in rsyslog 4.6.x before 4.6.8 and 5.2.0 through 5.8.4 might allow remote attackers to cause a denial of service (application exit) via a long TAG in a legacy syslog message.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137865" comment="rsyslog-8.4.2-1.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3207</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3207" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3207" source="CVE"/>
    <description>
    crypto/x509/x509_vfy.c in OpenSSL 1.0.x before 1.0.0e does not initialize certain structure members, which makes it easier for remote attackers to bypass CRL validation by using a nextUpdate value corresponding to a time in the past.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3210</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3210" source="CVE"/>
    <description>
    The ephemeral ECDH ciphersuite functionality in OpenSSL 0.9.8 through 0.9.8r and 1.0.x before 1.0.0e does not ensure thread safety during processing of handshake messages from clients, which allows remote attackers to cause a denial of service (daemon crash) via out-of-order messages that violate the TLS protocol.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3232</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3232" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3232" source="CVE"/>
    <description>
    YARR, as used in Mozilla Firefox before 7.0, Thunderbird before 7.0, and SeaMonkey before 2.4, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted JavaScript.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3256</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3256" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3256" source="CVE"/>
    <description>
    FreeType 2 before 2.4.7, as used in CoreGraphics in Apple iOS before 5, Mandriva Enterprise Server 5, and possibly other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font, a different vulnerability than CVE-2011-0226.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137173" comment="freetype2-devel-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137174" comment="libfreetype6-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137175" comment="libfreetype6-32bit-2.5.3-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3266</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3266" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3266" source="CVE"/>
    <description>
    The proto_tree_add_item function in Wireshark 1.6.0 through 1.6.1 and 1.4.0 through 1.4.8, when the IKEv1 protocol dissector is used, allows user-assisted remote attackers to cause a denial of service (infinite loop) via vectors involving a malformed IKE packet and many items in a tree.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3328</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3328" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3328" source="CVE"/>
    <description>
    The png_handle_cHRM function in pngrutil.c in libpng 1.5.4, when color-correction support is enabled, allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a malformed PNG image containing a cHRM chunk associated with a certain zero value.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137574" comment="libpng16-16-1.6.13-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137575" comment="libpng16-16-32bit-1.6.13-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137576" comment="libpng16-devel-1.6.13-2.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3349</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3349" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3349" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137532" comment="liblightdm-gobject-1-0-1.12.1-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137533" comment="lightdm-1.12.1-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137534" comment="lightdm-lang-1.12.1-1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3360</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3360" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3360" source="CVE"/>
    <description>
    Untrusted search path vulnerability in Wireshark 1.4.x before 1.4.9 and 1.6.x before 1.6.2 allows local users to gain privileges via a Trojan horse Lua script in an unspecified directory.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3368</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3368" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3368" source="CVE"/>
    <description>
    The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136944" comment="apache2-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136945" comment="apache2-devel-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136946" comment="apache2-doc-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136947" comment="apache2-example-pages-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136948" comment="apache2-prefork-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136949" comment="apache2-utils-2.4.10-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3372</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3372" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3372" source="CVE"/>
    <description>
    imap/nntpd.c in the NNTP server (nntpd) for Cyrus IMAPd 2.4.x before 2.4.12 allows remote attackers to bypass authentication by sending an AUTHINFO USER command without sending an additional AUTHINFO PASS command.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137110" comment="cyradm-2.4.17-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137111" comment="cyrus-imapd-2.4.17-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137112" comment="perl-Cyrus-IMAP-2.4.17-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137113" comment="perl-Cyrus-SIEVE-managesieve-2.4.17-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3377</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3377" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3377" source="CVE"/>
    <description>
    The web browser plug-in in IcedTea-Web 1.0.x before 1.0.6 and 1.1.x before 1.1.4 allows remote attackers to bypass the Same Origin Policy (SOP) and execute arbitrary script or establish network connections to unintended hosts via an applet whose origin has the same second-level domain, but a different sub-domain than the targeted domain.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137274" comment="icedtea-web-javadoc-1.5.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137275" comment="java-1_7_0-openjdk-plugin-1.5.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137276" comment="java-1_8_0-openjdk-plugin-1.5.1-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3379</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3379" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3379" source="CVE"/>
    <description>
    The is_a function in PHP 5.3.7 and 5.3.8 triggers a call to the __autoload function, which makes it easier for remote attackers to execute arbitrary code by providing a crafted URL and leveraging potentially unsafe behavior in certain PEAR packages and custom autoloaders.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3389</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3389" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389" source="CVE"/>
    <description>
    The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137164" comment="fetchmail-6.3.26-6.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137486" comment="libfreebl3-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137609" comment="libpython2_7-1_0-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137610" comment="libpython2_7-1_0-32bit-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137614" comment="libpython3_4m1_0-3.4.1-4.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137487" comment="libsoftokn3-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137488" comment="mozilla-nss-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137489" comment="mozilla-nss-certs-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137490" comment="mozilla-nss-devel-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137491" comment="mozilla-nss-tools-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137611" comment="python-base-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137612" comment="python-devel-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137613" comment="python-xml-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137615" comment="python3-base-3.4.1-4.2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3439</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3439" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3439" source="CVE"/>
    <description>
    FreeType in CoreGraphics in Apple iOS before 5.0.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font in a document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137173" comment="freetype2-devel-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137174" comment="libfreetype6-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137175" comment="libfreetype6-32bit-2.5.3-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3483</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3483" source="CVE"/>
    <description>
    Wireshark 1.6.x before 1.6.2 allows remote attackers to cause a denial of service (application crash) via a malformed capture file that leads to an invalid root tvbuff, related to a "buffer exception handling vulnerability."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3563</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3563" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote attackers to affect confidentiality and availability via unknown vectors related to Sound.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3571</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3571" source="CVE"/>
    <description>
    Unspecified vulnerability in the Virtual Desktop Infrastructure (VDI) component in Oracle Virtualization 3.2 allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Session.  NOTE: this CVE identifier was accidentally used for a Concurrency issue in Java Runtime Environment, but that issue has been reassigned to CVE-2012-0507.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3594</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3594" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3594" source="CVE"/>
    <description>
    The g_markup_escape_text function in the SILC protocol plug-in in libpurple 2.10.0 and earlier, as used in Pidgin and possibly other products, allows remote attackers to cause a denial of service (crash) via invalid UTF-8 sequences that trigger use of invalid pointers and an out-of-bounds read, related to interactions with certain versions of glib2.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137605" comment="libpurple-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137606" comment="libpurple-meanwhile-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137607" comment="libpurple-tcl-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137608" comment="pidgin-2.10.9-5.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3602</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3602" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3602" source="CVE"/>
    <description>
    Directory traversal vulnerability in device-linux.c in the router advertisement daemon (radvd) before 1.8.2 allows local users to overwrite arbitrary files, and remote attackers to overwrite certain files, via a .. (dot dot) in an interface name.  NOTE: this can be leveraged with a symlink to overwrite arbitrary files.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137861" comment="radvd-2.2-2.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3607</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3607" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3607" source="CVE"/>
    <description>
    Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136944" comment="apache2-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136945" comment="apache2-devel-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136946" comment="apache2-doc-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136947" comment="apache2-example-pages-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136948" comment="apache2-prefork-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136949" comment="apache2-utils-2.4.10-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3627</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3627" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3627" source="CVE"/>
    <description>
    The bytecode engine in ClamAV before 0.97.3 allows remote attackers to cause a denial of service (crash) via vectors related to "recursion level" and (1) libclamav/bytecode.c and (2) libclamav/bytecode_api.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137056" comment="clamav-0.98.4-2.1.10 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3630</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3630" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3630" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137267" comment="hardlink-1.0-7.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3631</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3631" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3631" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137267" comment="hardlink-1.0-7.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3632</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3632" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3632" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137267" comment="hardlink-1.0-7.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3635</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3635" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3635" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the theme_adium_append_message function in empathy-theme-adium.c in the Adium theme in libempathy-gtk in Empathy 3.2.1 and earlier allows remote attackers to inject arbitrary web script or HTML via a crafted alias (aka nickname).
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137149" comment="empathy-3.12.7-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137150" comment="telepathy-mission-control-plugin-goa-3.12.7-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3640</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3640" source="CVE"/>
    <description>
    ** DISPUTED ** Untrusted search path vulnerability in Mozilla Network Security Services (NSS), as used in Google Chrome before 17 on Windows and Mac OS X, might allow local users to gain privileges via a Trojan horse pkcs11.txt file in a top-level directory.  NOTE: the vendor's response was "Strange behavior, but we're not treating this as a security bug."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137486" comment="libfreebl3-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137487" comment="libsoftokn3-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137488" comment="mozilla-nss-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137489" comment="mozilla-nss-certs-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137490" comment="mozilla-nss-devel-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137491" comment="mozilla-nss-tools-3.17.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3648</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3648" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3648" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 3.6.24 and 4.x through 7.0 and Thunderbird before 3.1.6 and 5.0 through 7.0 allows remote attackers to inject arbitrary web script or HTML via crafted text with Shift JIS encoding.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3650</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3650" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3650" source="CVE"/>
    <description>
    Mozilla Firefox before 3.6.24 and 4.x through 7.0 and Thunderbird before 3.1.6 and 5.0 through 7.0 do not properly handle JavaScript files that contain many functions, which allows user-assisted remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a crafted file that is accessed by debugging APIs, as demonstrated by Firebug.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3651</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3651" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3651" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 7.0 and Thunderbird 7.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3652</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3652" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3652" source="CVE"/>
    <description>
    The browser engine in Mozilla Firefox before 8.0 and Thunderbird before 8.0 does not properly allocate memory, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3654</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3654" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3654" source="CVE"/>
    <description>
    The browser engine in Mozilla Firefox before 8.0 and Thunderbird before 8.0 does not properly handle links from SVG mpath elements to non-SVG elements, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3655</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3655" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3655" source="CVE"/>
    <description>
    Mozilla Firefox 4.x through 7.0 and Thunderbird 5.0 through 7.0 perform access control without checking for use of the NoWaiverWrapper wrapper, which allows remote attackers to gain privileges via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3658</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3658" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3658" source="CVE"/>
    <description>
    The SVG implementation in Mozilla Firefox 8.0, Thunderbird 8.0, and SeaMonkey 2.5 does not properly interact with DOMAttrModified event handlers, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via vectors involving removal of SVG elements.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3659</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3659" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3659" source="CVE"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 3.6.26 and 4.x through 9.0, Thunderbird before 3.1.18 and 5.0 through 9.0, and SeaMonkey before 2.7 might allow remote attackers to execute arbitrary code via vectors related to incorrect AttributeChildRemoved notifications that affect access to removed nsDOMAttribute child nodes.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3660</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3660" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3660" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 8.0, Thunderbird 5.0 through 8.0, and SeaMonkey before 2.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors that trigger a compartment mismatch associated with the nsDOMMessageEvent::GetData function, and unknown other vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3661</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3661" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3661" source="CVE"/>
    <description>
    YARR, as used in Mozilla Firefox 4.x through 8.0, Thunderbird 5.0 through 8.0, and SeaMonkey before 2.6, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted JavaScript.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3663</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3663" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3663" source="CVE"/>
    <description>
    Mozilla Firefox 4.x through 8.0, Thunderbird 5.0 through 8.0, and SeaMonkey before 2.6 allow remote attackers to capture keystrokes entered on a web page, even when JavaScript is disabled, by using SVG animation accessKey events within that web page.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3922</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-3922" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3922" source="CVE"/>
    <description>
    Stack-based buffer overflow in Google Chrome before 16.0.912.75 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to glyph handling.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137616" comment="libqt4-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137617" comment="libqt4-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137618" comment="libqt4-devel-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137619" comment="libqt4-linguist-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137620" comment="libqt4-qt3support-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137621" comment="libqt4-qt3support-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137622" comment="libqt4-sql-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137623" comment="libqt4-sql-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137624" comment="libqt4-sql-mysql-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137625" comment="libqt4-sql-mysql-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137626" comment="libqt4-sql-postgresql-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137627" comment="libqt4-sql-postgresql-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137628" comment="libqt4-sql-sqlite-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137629" comment="libqt4-sql-sqlite-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137630" comment="libqt4-sql-unixODBC-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137631" comment="libqt4-sql-unixODBC-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137632" comment="libqt4-x11-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137633" comment="libqt4-x11-32bit-4.8.6-4.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4105</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-4105" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4105" source="CVE"/>
    <description>
    LightDM before 1.0.6 allows local users to change ownership of arbitrary files via a symlink attack on ~/.Xauthority.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137532" comment="liblightdm-gobject-1-0-1.12.1-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137533" comment="lightdm-1.12.1-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137534" comment="lightdm-lang-1.12.1-1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4108</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-4108" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4108" source="CVE"/>
    <description>
    The DTLS implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f performs a MAC check only if certain padding is valid, which makes it easier for remote attackers to recover plaintext via a padding oracle attack.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4128</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-4128" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4128" source="CVE"/>
    <description>
    Buffer overflow in the gnutls_session_get_data function in lib/gnutls_session.c in GnuTLS 2.12.x before 2.12.14 and 3.x before 3.0.7, when used on a client that performs nonstandard session resumption, allows remote TLS servers to cause a denial of service (application crash) via a large SessionTicket.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137248" comment="gnutls-3.2.18-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137249" comment="libgnutls-devel-3.2.18-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137250" comment="libgnutls-openssl27-3.2.18-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137251" comment="libgnutls28-3.2.18-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137252" comment="libgnutls28-32bit-3.2.18-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4153</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-4153" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4153" source="CVE"/>
    <description>
    PHP 5.3.8 does not always check the return value of the zend_strndup function, which might allow remote attackers to cause a denial of service (NULL pointer dereference and application crash) via crafted input to an application that performs strndup operations on untrusted string data, as demonstrated by the define function in zend_builtin_functions.c, and unspecified functions in ext/soap/php_sdl.c, ext/standard/syslog.c, ext/standard/browscap.c, ext/oci8/oci8.c, ext/com_dotnet/com_typeinfo.c, and main/php_open_temporary_file.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4182</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-4182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4182" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137884" comment="sysconfig-0.83.7-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137885" comment="sysconfig-netconfig-0.83.7-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4313</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-4313" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4313" source="CVE"/>
    <description>
    query.c in ISC BIND 9.0.x through 9.6.x, 9.4-ESV through 9.4-ESV-R5, 9.6-ESV through 9.6-ESV-R5, 9.7.0 through 9.7.4, 9.8.0 through 9.8.1, and 9.9.0a1 through 9.9.0b1 allows remote attackers to cause a denial of service (assertion failure and named exit) via unknown vectors related to recursive DNS queries, error logging, and the caching of an invalid record by the resolver.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137045" comment="bind-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137046" comment="bind-chrootenv-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137047" comment="bind-doc-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137048" comment="bind-libs-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137049" comment="bind-utils-9.9.5P1-2.2.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4317</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-4317" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4317" source="CVE"/>
    <description>
    The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an @ (at sign) character and a : (colon) character in invalid positions.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136944" comment="apache2-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136945" comment="apache2-devel-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136946" comment="apache2-doc-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136947" comment="apache2-example-pages-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136948" comment="apache2-prefork-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136949" comment="apache2-utils-2.4.10-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4349</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-4349" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4349" source="CVE"/>
    <description>
    Multiple SQL injection vulnerabilities in (1) cd-mapping-db.c and (2) cd-device-db.c in colord before 0.1.15 allow local users to execute arbitrary SQL commands via vectors related to color devices and (a) device id, (b) property, or (c) profile id.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137059" comment="colord-1.2.3-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137060" comment="libcolord-gtk1-0.1.25-4.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137061" comment="libcolord2-1.2.3-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137062" comment="libcolorhug2-1.2.3-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4405</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-4405" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4405" source="CVE"/>
    <description>
    The cupshelpers scripts in system-config-printer in Ubuntu 11.04 and 11.10, as used by the automatic printer driver download service, uses an "insecure connection" for queries to the OpenPrinting database, which allows remote attackers to execute arbitrary code via a man-in-the-middle (MITM) attack that modifies packages or repositories.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137848" comment="python-cupshelpers-1.4.5-2.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137849" comment="system-config-printer-1.4.5-2.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137850" comment="system-config-printer-applet-1.4.5-2.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137851" comment="system-config-printer-common-1.4.5-2.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137852" comment="system-config-printer-dbus-service-1.4.5-2.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137853" comment="udev-configure-printer-1.4.5-2.2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4539</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-4539" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4539" source="CVE"/>
    <description>
    dhcpd in ISC DHCP 4.x before 4.2.3-P1 and 4.1-ESV before 4.1-ESV-R4 does not properly handle regular expressions in dhcpd.conf, which allows remote attackers to cause a denial of service (daemon crash) via a crafted request packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137130" comment="dhcp-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137131" comment="dhcp-client-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137132" comment="dhcp-doc-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137133" comment="dhcp-relay-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137134" comment="dhcp-server-4.2.6-9.2.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4566</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-4566" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4566" source="CVE"/>
    <description>
    Integer overflow in the exif_process_IFD_TAG function in exif.c in the exif extension in PHP 5.4.0beta2 on 32-bit platforms allows remote attackers to read the contents of arbitrary memory locations or cause a denial of service via a crafted offset_val value in an EXIF header in a JPEG file, a different vulnerability than CVE-2011-0708.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4576</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-4576" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4576" source="CVE"/>
    <description>
    The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly initialize data structures for block cipher padding, which might allow remote attackers to obtain sensitive information by decrypting the padding data sent by an SSL peer.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4577</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-4577" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4577" source="CVE"/>
    <description>
    OpenSSL before 0.9.8s and 1.x before 1.0.0f, when RFC 3779 support is enabled, allows remote attackers to cause a denial of service (assertion failure) via an X.509 certificate containing certificate-extension data associated with (1) IP address blocks or (2) Autonomous System (AS) identifiers.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4600</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-4600" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4600" source="CVE"/>
    <description>
    The networkReloadIptablesRules function in network/bridge_driver.c in libvirt before 0.9.9 does not properly handle firewall rules on bridge networks when libvirtd is restarted, which might allow remote attackers to bypass intended access restrictions via a (1) DNS or (2) DHCP query.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137726" comment="libvirt-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137727" comment="libvirt-client-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137728" comment="libvirt-daemon-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137729" comment="libvirt-daemon-config-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137730" comment="libvirt-daemon-config-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137731" comment="libvirt-daemon-driver-interface-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137732" comment="libvirt-daemon-driver-libxl-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137733" comment="libvirt-daemon-driver-lxc-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137734" comment="libvirt-daemon-driver-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137735" comment="libvirt-daemon-driver-nodedev-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137736" comment="libvirt-daemon-driver-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137737" comment="libvirt-daemon-driver-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137738" comment="libvirt-daemon-driver-secret-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137739" comment="libvirt-daemon-driver-storage-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137740" comment="libvirt-daemon-driver-uml-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137741" comment="libvirt-daemon-driver-vbox-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137742" comment="libvirt-daemon-driver-xen-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137743" comment="libvirt-daemon-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137744" comment="libvirt-daemon-xen-1.2.9-1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4604</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-4604" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4604" source="CVE"/>
    <description>
    The bat_socket_read function in net/batman-adv/icmp_socket.c in the Linux kernel before 3.3 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted batman-adv ICMP packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137315" comment="kernel-default-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137316" comment="kernel-default-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137317" comment="kernel-desktop-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137318" comment="kernel-desktop-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137319" comment="kernel-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137320" comment="kernel-docs-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137321" comment="kernel-macros-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137322" comment="kernel-pae-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137323" comment="kernel-pae-base-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137324" comment="kernel-pae-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137325" comment="kernel-source-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137326" comment="kernel-syms-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137327" comment="kernel-xen-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137328" comment="kernel-xen-devel-3.16.6-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4619</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-4619" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4619" source="CVE"/>
    <description>
    The Server Gated Cryptography (SGC) implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly handle handshake restarts, which allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4718</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-4718" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4718" source="CVE"/>
    <description>
    Session fixation vulnerability in the Sessions subsystem in PHP before 5.5.2 allows remote attackers to hijack web sessions by specifying a session ID.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4868</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-4868" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4868" source="CVE"/>
    <description>
    The logging functionality in dhcpd in ISC DHCP before 4.2.3-P2, when using Dynamic DNS (DDNS) and issuing IPv6 addresses, does not properly handle the DHCPv6 lease structure, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via crafted packets related to a lease-status update.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137130" comment="dhcp-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137131" comment="dhcp-client-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137132" comment="dhcp-doc-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137133" comment="dhcp-relay-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137134" comment="dhcp-server-4.2.6-9.2.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4885</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-4885" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4885" source="CVE"/>
    <description>
    PHP before 5.3.9 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4944</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-4944" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4944" source="CVE"/>
    <description>
    Python 2.6 through 3.2 creates ~/.pypirc with world-readable permissions before changing them after data has been written, which introduces a race condition that allows local users to obtain a username and password by reading this file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137609" comment="libpython2_7-1_0-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137610" comment="libpython2_7-1_0-32bit-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137614" comment="libpython3_4m1_0-3.4.1-4.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137611" comment="python-base-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137612" comment="python-devel-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137613" comment="python-xml-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137615" comment="python3-base-3.4.1-4.2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20115035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-5035</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-5035" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5035" source="CVE"/>
    <description>
    Oracle Glassfish 2.1.1, 3.0.1, and 3.1.1, as used in Communications Server 2.0, Sun Java System Application Server 8.1 and 8.2, and possibly other products, computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, aka Oracle security ticket S0104869.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20115326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-5326</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2011-5326" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5326" source="CVE"/>
    <description>
    imlib2 before 1.4.9 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) by drawing a 2x1 ellipse.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127747" comment="imlib2-1.4.9-17.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127748" comment="imlib2-devel-1.4.9-17.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127749" comment="imlib2-filters-1.4.9-17.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127750" comment="imlib2-loaders-1.4.9-17.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127751" comment="libImlib2-1-1.4.9-17.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0021</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0021" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0021" source="CVE"/>
    <description>
    The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server 2.2.17 through 2.2.21, when a threaded MPM is used, does not properly handle a %{}C format string, which allows remote attackers to cause a denial of service (daemon crash) via a cookie that lacks both a name and a value.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136944" comment="apache2-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136945" comment="apache2-devel-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136946" comment="apache2-doc-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136947" comment="apache2-example-pages-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136948" comment="apache2-prefork-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136949" comment="apache2-utils-2.4.10-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0027</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0027" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0027" source="CVE"/>
    <description>
    The GOST ENGINE in OpenSSL before 1.0.0f does not properly handle invalid parameters for the GOST block cipher, which allows remote attackers to cause a denial of service (daemon crash) via crafted data from a TLS client.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0029</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0029" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0029" source="CVE"/>
    <description>
    Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0031</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0031" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0031" source="CVE"/>
    <description>
    scoreboard.c in the Apache HTTP Server 2.2.21 and earlier might allow local users to cause a denial of service (daemon crash during shutdown) or possibly have unspecified other impact by modifying a certain type field within a scoreboard shared memory segment, leading to an invalid call to the free function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136944" comment="apache2-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136945" comment="apache2-devel-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136946" comment="apache2-doc-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136947" comment="apache2-example-pages-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136948" comment="apache2-prefork-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136949" comment="apache2-utils-2.4.10-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0035</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0035" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0035" source="CVE"/>
    <description>
    Untrusted search path vulnerability in EDE in CEDET before 1.0.1, as used in GNU Emacs before 23.4 and other products, allows local users to gain privileges via a crafted Lisp expression in a Project.ede file in the directory, or a parent directory, of an opened file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137144" comment="emacs-24.3-17.2.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137145" comment="emacs-info-24.3-17.2.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137146" comment="emacs-nox-24.3-17.2.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137147" comment="emacs-x11-24.3-17.2.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137148" comment="etags-24.3-17.2.10 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0037</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0037" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0037" source="CVE"/>
    <description>
    Redland Raptor (aka libraptor) before 2.0.7, as used by OpenOffice 3.3 and 3.4 Beta, LibreOffice before 3.4.6 and 3.5.x before 3.5.1, and other products, allows user-assisted remote attackers to read arbitrary files via a crafted XML external entity (XXE) declaration and reference in an RDF document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137634" comment="libraptor-devel-2.0.10-4.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137635" comment="libraptor2-0-2.0.10-4.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137636" comment="raptor-2.0.10-4.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0050</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0050" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0050" source="CVE"/>
    <description>
    OpenSSL 0.9.8s and 1.0.0f does not properly support DTLS applications, which allows remote attackers to cause a denial of service (crash) via unspecified vectors related to an out-of-bounds read.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-4108.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0053</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0053" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0053" source="CVE"/>
    <description>
    protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400) error documents, which allows remote attackers to obtain the values of HTTPOnly cookies via vectors involving a (1) long or (2) malformed header in conjunction with crafted web script.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136944" comment="apache2-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136945" comment="apache2-devel-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136946" comment="apache2-doc-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136947" comment="apache2-example-pages-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136948" comment="apache2-prefork-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136949" comment="apache2-utils-2.4.10-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0056</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0056" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0056" source="CVE"/>
    <description>
    The mem_write function in the Linux kernel before 3.2.2, when ASLR is disabled, does not properly check permissions when writing to /proc/&lt;pid&gt;/mem, which allows local users to gain privileges by modifying process memory, as demonstrated by Mempodipper.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137315" comment="kernel-default-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137316" comment="kernel-default-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137317" comment="kernel-desktop-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137318" comment="kernel-desktop-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137319" comment="kernel-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137320" comment="kernel-docs-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137321" comment="kernel-macros-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137322" comment="kernel-pae-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137323" comment="kernel-pae-base-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137324" comment="kernel-pae-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137325" comment="kernel-source-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137326" comment="kernel-syms-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137327" comment="kernel-xen-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137328" comment="kernel-xen-devel-3.16.6-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0217</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0217" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0217" source="CVE"/>
    <description>
    The x86-64 kernel system-call functionality in Xen 4.1.2 and earlier, as used in Citrix XenServer 6.0.2 and earlier and other products; Oracle Solaris 11 and earlier; illumos before r13724; Joyent SmartOS before 20120614T184600Z; FreeBSD before 9.0-RELEASE-p3; NetBSD 6.0 Beta and earlier; Microsoft Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1; and possibly other operating systems, when running on an Intel processor, incorrectly uses the sysret path in cases where a certain address is not a canonical address, which allows local users to gain privileges via a crafted application.  NOTE: because this issue is due to incorrect use of the Intel specification, it should have been split into separate identifiers; however, there was some value in preserving the original mapping of the multi-codebase coordinated-disclosure effort to a single identifier.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0247</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0247" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0247" source="CVE"/>
    <description>
    ImageMagick 6.7.5-7 and earlier allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via crafted offset and count values in the ResolutionUnit tag in the EXIF IFD0 of an image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136913" comment="ImageMagick-6.8.9.8-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136914" comment="ImageMagick-devel-6.8.9.8-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136915" comment="ImageMagick-doc-6.8.9.8-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136916" comment="ImageMagick-extra-6.8.9.8-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136917" comment="libMagick++-6_Q16-5-6.8.9.8-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136918" comment="libMagickCore-6_Q16-2-6.8.9.8-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136919" comment="libMagickWand-6_Q16-2-6.8.9.8-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136920" comment="perl-PerlMagick-6.8.9.8-1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0248</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0248" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0248" source="CVE"/>
    <description>
    ImageMagick 6.7.5-7 and earlier allows remote attackers to cause a denial of service (infinite loop and hang) via a crafted image whose IFD contains IOP tags that all reference the beginning of the IDF.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136913" comment="ImageMagick-6.8.9.8-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136914" comment="ImageMagick-devel-6.8.9.8-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136915" comment="ImageMagick-doc-6.8.9.8-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136916" comment="ImageMagick-extra-6.8.9.8-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136917" comment="libMagick++-6_Q16-5-6.8.9.8-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136918" comment="libMagickCore-6_Q16-2-6.8.9.8-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136919" comment="libMagickWand-6_Q16-2-6.8.9.8-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136920" comment="perl-PerlMagick-6.8.9.8-1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0390</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0390" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0390" source="CVE"/>
    <description>
    The DTLS implementation in GnuTLS 3.0.10 and earlier executes certain error-handling code only if there is a specific relationship between a padding length and the ciphertext size, which makes it easier for remote attackers to recover partial plaintext via a timing side-channel attack, a related issue to CVE-2011-4108.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137248" comment="gnutls-3.2.18-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137249" comment="libgnutls-devel-3.2.18-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137250" comment="libgnutls-openssl27-3.2.18-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137251" comment="libgnutls28-3.2.18-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137252" comment="libgnutls28-32bit-3.2.18-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0441</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0441" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0441" source="CVE"/>
    <description>
    The ASN.1 decoder in the QuickDER decoder in Mozilla Network Security Services (NSS) before 3.13.4, as used in Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10, allows remote attackers to cause a denial of service (application crash) via a zero-length item, as demonstrated by (1) a zero-length basic constraint or (2) a zero-length field in an OCSP response.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0442</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0442" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0442" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.26 and 4.x through 9.0, Thunderbird before 3.1.18 and 5.0 through 9.0, and SeaMonkey before 2.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0443</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0443" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0443" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 9.0, Thunderbird 5.0 through 9.0, and SeaMonkey before 2.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0444</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0444" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0444" source="CVE"/>
    <description>
    Mozilla Firefox before 3.6.26 and 4.x through 9.0, Thunderbird before 3.1.18 and 5.0 through 9.0, and SeaMonkey before 2.7 do not properly initialize nsChildView data structures, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted Ogg Vorbis file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137745" comment="libvorbis-devel-1.3.4-3.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137746" comment="libvorbis0-1.3.4-3.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137747" comment="libvorbis0-32bit-1.3.4-3.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137748" comment="libvorbisenc2-1.3.4-3.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137749" comment="libvorbisenc2-32bit-1.3.4-3.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137750" comment="libvorbisfile3-1.3.4-3.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137751" comment="libvorbisfile3-32bit-1.3.4-3.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0445</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0445" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0445" source="CVE"/>
    <description>
    Mozilla Firefox 4.x through 9.0, Thunderbird 5.0 through 9.0, and SeaMonkey before 2.7 allow remote attackers to bypass the HTML5 frame-navigation policy and replace arbitrary sub-frames by creating a form submission target with a sub-frame's name attribute.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0446</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0446" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0446" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in Mozilla Firefox 4.x through 9.0, Thunderbird 5.0 through 9.0, and SeaMonkey before 2.7 allow remote attackers to inject arbitrary web script or HTML via a (1) web page or (2) Firefox extension, related to improper enforcement of XPConnect security restrictions for frame scripts that call untrusted objects.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0447</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0447" source="CVE"/>
    <description>
    Mozilla Firefox 4.x through 9.0, Thunderbird 5.0 through 9.0, and SeaMonkey before 2.7 do not properly initialize data for image/vnd.microsoft.icon images, which allows remote attackers to obtain potentially sensitive information by reading a PNG image that was created through conversion from an ICO image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0449</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0449" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0449" source="CVE"/>
    <description>
    Mozilla Firefox before 3.6.26 and 4.x through 9.0, Thunderbird before 3.1.18 and 5.0 through 9.0, and SeaMonkey before 2.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a malformed XSLT stylesheet that is embedded in a document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0451</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0451" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0451" source="CVE"/>
    <description>
    CRLF injection vulnerability in Mozilla Firefox 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allows remote web servers to bypass intended Content Security Policy (CSP) restrictions and possibly conduct cross-site scripting (XSS) attacks via crafted HTTP headers.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0452</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0452" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0452" source="CVE"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox 10.x before 10.0.1, Thunderbird 10.x before 10.0.1, and SeaMonkey 2.7 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger failure of an nsXBLDocumentInfo::ReadPrototypeBindings function call, related to the cycle collector's access to a hash table containing a stale XBL binding.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0455</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0455" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0455" source="CVE"/>
    <description>
    Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 do not properly restrict drag-and-drop operations on javascript: URLs, which allows user-assisted remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web page, related to a "DragAndDropJacking" issue.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0456</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0456" source="CVE"/>
    <description>
    The SVG Filters implementation in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 might allow remote attackers to obtain sensitive information from process memory via vectors that trigger an out-of-bounds read.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0457</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0457" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0457" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsSMILTimeValueSpec::ConvertBetweenTimeContainer function in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 might allow remote attackers to execute arbitrary code via an SVG animation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0458</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0458" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0458" source="CVE"/>
    <description>
    Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 do not properly restrict setting the home page through the dragging of a URL to the home button, which allows user-assisted remote attackers to execute arbitrary JavaScript code with chrome privileges via a javascript: URL that is later interpreted in the about:sessionrestore context.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0459</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0459" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0459" source="CVE"/>
    <description>
    The Cascading Style Sheets (CSS) implementation in Mozilla Firefox 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via dynamic modification of a keyframe followed by access to the cssText of the keyframe.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0460</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0460" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0460" source="CVE"/>
    <description>
    Mozilla Firefox 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 do not properly restrict write access to the window.fullScreen object, which allows remote attackers to spoof the user interface via a crafted web page.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0461</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0461" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0461" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0462</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0462" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0462" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0463</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0463" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0463" source="CVE"/>
    <description>
    The nsWindow implementation in the browser engine in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 does not check the validity of an instance after event dispatching, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, as demonstrated by Mobile Firefox on Android.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0464</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0464" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0464" source="CVE"/>
    <description>
    Use-after-free vulnerability in the browser engine in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allows remote attackers to execute arbitrary code via vectors involving an empty argument to the array.join function in conjunction with the triggering of garbage collection.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0467</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0467" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0467" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0468</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0468" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0468" source="CVE"/>
    <description>
    The browser engine in Mozilla Firefox 4.x through 11.0, Thunderbird 5.0 through 11.0, and SeaMonkey before 2.9 allows remote attackers to cause a denial of service (assertion failure and memory corruption) or possibly execute arbitrary code via vectors related to jsval.h and the js::array_shift function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0469</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0469" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0469" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::dom::indexedDB::IDBKeyRange::cycleCollection::Trace function in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allows remote attackers to execute arbitrary code via vectors related to crafted IndexedDB data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0470</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0470" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0470" source="CVE"/>
    <description>
    Heap-based buffer overflow in the nsSVGFEDiffuseLightingElement::LightPixel function in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allows remote attackers to cause a denial of service (invalid gfxImageSurface free operation) or possibly execute arbitrary code by leveraging the use of "different number systems."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0471</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0471" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0471" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allows remote attackers to inject arbitrary web script or HTML via a multibyte character set.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0472</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0472" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0472" source="CVE"/>
    <description>
    The cairo-dwrite implementation in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9, when certain Windows Vista and Windows 7 configurations are used, does not properly restrict font-rendering attempts, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0473</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0473" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0473" source="CVE"/>
    <description>
    The WebGLBuffer::FindMaxUshortElement function in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 calls the FindMaxElementInSubArray function with incorrect template arguments, which allows remote attackers to obtain sensitive information from video memory via a crafted WebGL.drawElements call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0474</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0474" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0474" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the docshell implementation in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allows remote attackers to inject arbitrary web script or HTML via vectors related to short-circuited page loads, aka "Universal XSS (UXSS)."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0475</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0475" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0475" source="CVE"/>
    <description>
    Mozilla Firefox 4.x through 11.0, Thunderbird 5.0 through 11.0, and SeaMonkey before 2.9 do not properly construct the Origin and Sec-WebSocket-Origin HTTP headers, which might allow remote attackers to bypass an IPv6 literal ACL via a cross-site (1) XMLHttpRequest or (2) WebSocket operation involving a nonstandard port number and an IPv6 address that contains certain zero fields.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0477</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0477" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0477" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allow remote attackers to inject arbitrary web script or HTML via the (1) ISO-2022-KR or (2) ISO-2022-CN character set.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0478</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0478" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0478" source="CVE"/>
    <description>
    The texImage2D implementation in the WebGL subsystem in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 does not properly restrict JSVAL_TO_OBJECT casts, which might allow remote attackers to execute arbitrary code via a crafted web page.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0479</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0479" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0479" source="CVE"/>
    <description>
    Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allow remote attackers to spoof the address bar via an https URL for invalid (1) RSS or (2) Atom XML content.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0497</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0497" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0497" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, and 6 Update 30 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0501</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0501" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0501" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect availability via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0502</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0502" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0502" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and availability, related to AWT.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0503</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0503" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0503" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to I18n.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0505</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0505" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0505" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Serialization.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0506</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0506" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0506" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect integrity via unknown vectors related to CORBA.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0547</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0547" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier, and 6 Update 34 and earlier, has no impact and remote attack vectors involving AWT and "a security-in-depth issue that is not directly exploitable but which can be used to aggravate security vulnerabilities that can be directly exploited." NOTE: this identifier was assigned by the Oracle CNA, but CVE is not intended to cover defense-in-depth issues that are only exposed by the presence of other vulnerabilities.  NOTE: Oracle has not commented on claims from a downstream vendor that this issue is related to "toolkit internals references."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0759</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0759" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0759" source="CVE"/>
    <description>
    Adobe Shockwave Player before 11.6.4.634 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0786</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0786" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0786" source="CVE"/>
    <description>
    The transform_save function in transform.c in Augeas before 1.0.0 allows local users to overwrite arbitrary files and obtain sensitive information via a symlink attack on a .augnew file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137018" comment="augeas-lenses-1.2.0-4.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137019" comment="libaugeas0-1.2.0-4.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0804</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0804" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0804" source="CVE"/>
    <description>
    Heap-based buffer overflow in the proxy_connect function in src/client.c in CVS 1.11 and 1.12 allows remote HTTP proxy servers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTTP response.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137109" comment="cvs-1.12.12-182.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0817</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0817" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0817" source="CVE"/>
    <description>
    Memory leak in smbd in Samba 3.6.x before 3.6.3 allows remote attackers to cause a denial of service (memory and CPU consumption) by making many connection requests.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137424" comment="libdcerpc-binding0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137425" comment="libdcerpc-binding0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137426" comment="libdcerpc0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137427" comment="libdcerpc0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137428" comment="libgensec0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137429" comment="libgensec0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137430" comment="libndr-krb5pac0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137431" comment="libndr-krb5pac0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137432" comment="libndr-nbt0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137433" comment="libndr-nbt0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137434" comment="libndr-standard0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137435" comment="libndr-standard0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137436" comment="libndr0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137437" comment="libndr0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137438" comment="libnetapi0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137439" comment="libnetapi0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137440" comment="libpdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137441" comment="libpdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137442" comment="libregistry0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137443" comment="libsamba-credentials0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137444" comment="libsamba-credentials0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137445" comment="libsamba-hostconfig0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137446" comment="libsamba-hostconfig0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137447" comment="libsamba-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137448" comment="libsamba-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137449" comment="libsamdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137450" comment="libsamdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137451" comment="libsmbclient-devel-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137452" comment="libsmbclient-raw0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137453" comment="libsmbclient-raw0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137454" comment="libsmbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137455" comment="libsmbconf0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137456" comment="libsmbconf0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137457" comment="libsmbldap0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137458" comment="libsmbldap0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137459" comment="libtevent-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137460" comment="libtevent-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137461" comment="libwbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137462" comment="libwbclient0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137463" comment="samba-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137464" comment="samba-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137465" comment="samba-client-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137466" comment="samba-client-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137467" comment="samba-doc-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137468" comment="samba-libs-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137469" comment="samba-libs-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137470" comment="samba-winbind-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137471" comment="samba-winbind-32bit-4.1.12-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0830</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0830" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0830" source="CVE"/>
    <description>
    The php_register_variable_ex function in php_variables.c in PHP 5.3.9 allows remote attackers to execute arbitrary code via a request containing a large number of variables, related to improper handling of array variables.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-4885.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0845</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0845" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0845" source="CVE"/>
    <description>
    SimpleXMLRPCServer.py in SimpleXMLRPCServer in Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an XML-RPC POST request that contains a smaller amount of data than specified by the Content-Length header.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137609" comment="libpython2_7-1_0-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137610" comment="libpython2_7-1_0-32bit-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137614" comment="libpython3_4m1_0-3.4.1-4.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137611" comment="python-base-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137612" comment="python-devel-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137613" comment="python-xml-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137615" comment="python3-base-3.4.1-4.2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0862</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0862" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0862" source="CVE"/>
    <description>
    builtins.c in Xinetd before 2.3.15 does not check the service type when the tcpmux-server service is enabled, which exposes all enabled services and allows remote attackers to bypass intended access restrictions via a request to tcpmux port 1.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137913" comment="xinetd-2.3.15-7.2.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0866</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0866" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0866" source="CVE"/>
    <description>
    CREATE TRIGGER in PostgreSQL 8.3.x before 8.3.18, 8.4.x before 8.4.11, 9.0.x before 9.0.7, and 9.1.x before 9.1.3 does not properly check the execute permission for trigger functions marked SECURITY DEFINER, which allows remote authenticated users to execute otherwise restricted triggers on arbitrary data by installing the trigger on an attacker-owned table.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137474" comment="libecpg6-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137475" comment="libpq5-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137476" comment="libpq5-32bit-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137477" comment="postgresql93-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137478" comment="postgresql93-contrib-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137479" comment="postgresql93-devel-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137480" comment="postgresql93-docs-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137481" comment="postgresql93-server-9.3.5-2.1.14 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0867</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0867" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0867" source="CVE"/>
    <description>
    PostgreSQL 8.4.x before 8.4.11, 9.0.x before 9.0.7, and 9.1.x before 9.1.3 truncates the common name to only 32 characters when verifying SSL certificates, which allows remote attackers to spoof connections when the host name is exactly 32 characters.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137474" comment="libecpg6-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137475" comment="libpq5-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137476" comment="libpq5-32bit-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137477" comment="postgresql93-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137478" comment="postgresql93-contrib-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137479" comment="postgresql93-devel-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137480" comment="postgresql93-docs-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137481" comment="postgresql93-server-9.3.5-2.1.14 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0868</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0868" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0868" source="CVE"/>
    <description>
    CRLF injection vulnerability in pg_dump in PostgreSQL 8.3.x before 8.3.18, 8.4.x before 8.4.11, 9.0.x before 9.0.7, and 9.1.x before 9.1.3 allows user-assisted remote attackers to execute arbitrary SQL commands via a crafted file containing object names with newlines, which are inserted into an SQL script that is used when the database is restored.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137474" comment="libecpg6-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137475" comment="libpq5-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137476" comment="libpq5-32bit-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137477" comment="postgresql93-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137478" comment="postgresql93-contrib-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137479" comment="postgresql93-devel-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137480" comment="postgresql93-docs-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137481" comment="postgresql93-server-9.3.5-2.1.14 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0870</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0870" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0870" source="CVE"/>
    <description>
    Heap-based buffer overflow in process.c in smbd in Samba 3.0, as used in the file-sharing service on the BlackBerry PlayBook tablet before 2.0.0.7971 and other products, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a Batched (aka AndX) request that triggers infinite recursion.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137424" comment="libdcerpc-binding0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137425" comment="libdcerpc-binding0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137426" comment="libdcerpc0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137427" comment="libdcerpc0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137428" comment="libgensec0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137429" comment="libgensec0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137430" comment="libndr-krb5pac0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137431" comment="libndr-krb5pac0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137432" comment="libndr-nbt0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137433" comment="libndr-nbt0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137434" comment="libndr-standard0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137435" comment="libndr-standard0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137436" comment="libndr0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137437" comment="libndr0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137438" comment="libnetapi0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137439" comment="libnetapi0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137440" comment="libpdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137441" comment="libpdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137442" comment="libregistry0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137443" comment="libsamba-credentials0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137444" comment="libsamba-credentials0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137445" comment="libsamba-hostconfig0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137446" comment="libsamba-hostconfig0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137447" comment="libsamba-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137448" comment="libsamba-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137449" comment="libsamdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137450" comment="libsamdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137451" comment="libsmbclient-devel-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137452" comment="libsmbclient-raw0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137453" comment="libsmbclient-raw0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137454" comment="libsmbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137455" comment="libsmbconf0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137456" comment="libsmbconf0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137457" comment="libsmbldap0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137458" comment="libsmbldap0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137459" comment="libtevent-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137460" comment="libtevent-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137461" comment="libwbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137462" comment="libwbclient0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137463" comment="samba-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137464" comment="samba-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137465" comment="samba-client-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137466" comment="samba-client-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137467" comment="samba-doc-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137468" comment="samba-libs-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137469" comment="samba-libs-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137470" comment="samba-winbind-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137471" comment="samba-winbind-32bit-4.1.12-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0876</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0876" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0876" source="CVE"/>
    <description>
    The XML parser (xmlparse.c) in expat before 2.1.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML file with many identifiers with the same value.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137160" comment="expat-2.1.0-14.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137161" comment="libexpat-devel-2.1.0-14.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137162" comment="libexpat1-2.1.0-14.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137163" comment="libexpat1-32bit-2.1.0-14.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0884</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-0884" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0884" source="CVE"/>
    <description>
    The implementation of Cryptographic Message Syntax (CMS) and PKCS #7 in OpenSSL before 0.9.8u and 1.x before 1.0.0h does not properly restrict certain oracle behavior, which makes it easier for context-dependent attackers to decrypt data via a Million Message Attack (MMA) adaptive chosen ciphertext attack.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1012</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1012" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1012" source="CVE"/>
    <description>
    server/server_stubs.c in the kadmin protocol implementation in MIT Kerberos 5 (aka krb5) 1.10 before 1.10.1 does not properly restrict access to (1) SET_STRING and (2) GET_STRINGS operations, which might allow remote authenticated administrators to modify or read string attributes by leveraging the global list privilege.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137331" comment="krb5-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137332" comment="krb5-32bit-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137333" comment="krb5-client-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137334" comment="krb5-devel-1.12.2-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1013</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1013" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1013" source="CVE"/>
    <description>
    The check_1_6_dummy function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.8.x, 1.9.x, and 1.10.x before 1.10.2 allows remote authenticated administrators to cause a denial of service (NULL pointer dereference and daemon crash) via a KRB5_KDB_DISALLOW_ALL_TIX create request that lacks a password.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137331" comment="krb5-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137332" comment="krb5-32bit-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137333" comment="krb5-client-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137334" comment="krb5-devel-1.12.2-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1016</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1016" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1016" source="CVE"/>
    <description>
    The pkinit_server_return_padata function in plugins/preauth/pkinit/pkinit_srv.c in the PKINIT implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.4 attempts to find an agility KDF identifier in inappropriate circumstances, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted Draft 9 request.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137331" comment="krb5-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137332" comment="krb5-32bit-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137333" comment="krb5-client-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137334" comment="krb5-devel-1.12.2-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1095</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1095" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1095" source="CVE"/>
    <description>
    osc before 0.134 might allow remote OBS repository servers or package maintainers to execute arbitrary commands via a crafted (1) build log or (2) build status that contains an escape sequence for a terminal emulator.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137819" comment="osc-0.148.2-1.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1111</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1111" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1111" source="CVE"/>
    <description>
    lightdm before 1.0.9 does not properly close file descriptors before opening a child process, which allows local users to write to the lightdm log or have other unspecified impact.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137532" comment="liblightdm-gobject-1-0-1.12.1-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137533" comment="lightdm-1.12.1-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137534" comment="lightdm-lang-1.12.1-1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1126</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1126" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1126" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted property data in a BDF font.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137173" comment="freetype2-devel-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137174" comment="libfreetype6-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137175" comment="libfreetype6-32bit-2.5.3-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1127</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1127" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1127" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted glyph or bitmap data in a BDF font.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137173" comment="freetype2-devel-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137174" comment="libfreetype6-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137175" comment="libfreetype6-32bit-2.5.3-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1128</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1128" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1128" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (NULL pointer dereference and memory corruption) or possibly execute arbitrary code via a crafted TrueType font.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137173" comment="freetype2-devel-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137174" comment="libfreetype6-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137175" comment="libfreetype6-32bit-2.5.3-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1129</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1129" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1129" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted SFNT string in a Type 42 font.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137173" comment="freetype2-devel-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137174" comment="libfreetype6-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137175" comment="libfreetype6-32bit-2.5.3-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1130</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1130" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1130" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted property data in a PCF font.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137173" comment="freetype2-devel-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137174" comment="libfreetype6-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137175" comment="libfreetype6-32bit-2.5.3-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1131</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1131" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1131" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, on 64-bit platforms allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via vectors related to the cell table of a font.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137173" comment="freetype2-devel-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137174" comment="libfreetype6-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137175" comment="libfreetype6-32bit-2.5.3-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1132</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1132" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1132" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted dictionary data in a Type 1 font.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137173" comment="freetype2-devel-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137174" comment="libfreetype6-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137175" comment="libfreetype6-32bit-2.5.3-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1133</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1133" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1133" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted glyph or bitmap data in a BDF font.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137173" comment="freetype2-devel-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137174" comment="libfreetype6-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137175" comment="libfreetype6-32bit-2.5.3-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1134</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1134" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1134" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted private-dictionary data in a Type 1 font.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137173" comment="freetype2-devel-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137174" comment="libfreetype6-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137175" comment="libfreetype6-32bit-2.5.3-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1135</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1135" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1135" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via vectors involving the NPUSHB and NPUSHW instructions in a TrueType font.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137173" comment="freetype2-devel-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137174" comment="libfreetype6-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137175" comment="libfreetype6-32bit-2.5.3-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1136</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1136" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1136" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted glyph or bitmap data in a BDF font that lacks an ENCODING field.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137173" comment="freetype2-devel-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137174" comment="libfreetype6-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137175" comment="libfreetype6-32bit-2.5.3-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1137</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1137" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1137" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted header in a BDF font.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137173" comment="freetype2-devel-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137174" comment="libfreetype6-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137175" comment="libfreetype6-32bit-2.5.3-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1138</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1138" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1138" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via vectors involving the MIRP instruction in a TrueType font.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137173" comment="freetype2-devel-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137174" comment="libfreetype6-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137175" comment="libfreetype6-32bit-2.5.3-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1139</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1139" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1139" source="CVE"/>
    <description>
    Array index error in FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid stack read operation and memory corruption) or possibly execute arbitrary code via crafted glyph data in a BDF font.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137173" comment="freetype2-devel-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137174" comment="libfreetype6-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137175" comment="libfreetype6-32bit-2.5.3-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1140</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1140" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1140" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted PostScript font object.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137173" comment="freetype2-devel-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137174" comment="libfreetype6-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137175" comment="libfreetype6-32bit-2.5.3-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1141</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1141" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1141" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted ASCII string in a BDF font.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137173" comment="freetype2-devel-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137174" comment="libfreetype6-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137175" comment="libfreetype6-32bit-2.5.3-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1142</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1142" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted glyph-outline data in a font.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137173" comment="freetype2-devel-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137174" comment="libfreetype6-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137175" comment="libfreetype6-32bit-2.5.3-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1143</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1143" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted font.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137173" comment="freetype2-devel-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137174" comment="libfreetype6-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137175" comment="libfreetype6-32bit-2.5.3-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1144</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1144" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1144" source="CVE"/>
    <description>
    FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via a crafted TrueType font.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137173" comment="freetype2-devel-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137174" comment="libfreetype6-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137175" comment="libfreetype6-32bit-2.5.3-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1147</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1147" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1147" source="CVE"/>
    <description>
    readfilemap.c in expat before 2.1.0 allows context-dependent attackers to cause a denial of service (file descriptor consumption) via a large number of crafted XML files.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137160" comment="expat-2.1.0-14.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137161" comment="libexpat-devel-2.1.0-14.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137162" comment="libexpat1-2.1.0-14.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137163" comment="libexpat1-32bit-2.1.0-14.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1148</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1148" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1148" source="CVE"/>
    <description>
    Memory leak in the poolGrow function in expat/lib/xmlparse.c in expat before 2.1.0 allows context-dependent attackers to cause a denial of service (memory consumption) via a large number of crafted XML files that cause improperly-handled reallocation failures when expanding entities.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137160" comment="expat-2.1.0-14.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137161" comment="libexpat-devel-2.1.0-14.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137162" comment="libexpat1-2.1.0-14.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137163" comment="libexpat1-32bit-2.1.0-14.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1150</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1150" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1150" source="CVE"/>
    <description>
    Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137609" comment="libpython2_7-1_0-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137610" comment="libpython2_7-1_0-32bit-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137614" comment="libpython3_4m1_0-3.4.1-4.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137611" comment="python-base-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137612" comment="python-devel-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137613" comment="python-xml-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137615" comment="python3-base-3.4.1-4.2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1152</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1152" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1152" source="CVE"/>
    <description>
    Multiple format string vulnerabilities in the error reporting functionality in the YAML::LibYAML (aka YAML-LibYAML and perl-YAML-LibYAML) module 0.38 for Perl allow remote attackers to cause a denial of service (process crash) via format string specifiers in a (1) YAML stream to the Load function, (2) YAML node to the load_node function, (3) YAML mapping to the load_mapping function, or (4) YAML sequence to the load_sequence function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137837" comment="perl-YAML-LibYAML-0.44-2.1.3 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1162</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1162" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1162" source="CVE"/>
    <description>
    Heap-based buffer overflow in the _zip_readcdir function in zip_open.c in libzip 0.10 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a zip archive with the number of directories set to 0, related to an "incorrect loop construct."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137795" comment="libzip-devel-0.11.2-3.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137796" comment="libzip2-0.11.2-3.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1163</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1163" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1163" source="CVE"/>
    <description>
    Integer overflow in the _zip_readcdir function in zip_open.c in libzip 0.10 allows remote attackers to execute arbitrary code via the size and offset values for the central directory in a zip archive, which triggers "improper restrictions of operations within the bounds of a memory buffer" and an information leak.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137795" comment="libzip-devel-0.11.2-3.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137796" comment="libzip2-0.11.2-3.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1165</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1165" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1165" source="CVE"/>
    <description>
    The mime_param_cmp function in crypto/asn1/asn_mime.c in OpenSSL before 0.9.8u and 1.x before 1.0.0h allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted S/MIME message, a different vulnerability than CVE-2006-7250.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1173</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1173" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1173" source="CVE"/>
    <description>
    Multiple integer overflows in tiff_getimage.c in LibTIFF 3.9.4 allow remote attackers to execute arbitrary code via a crafted tile size in a TIFF file, which is not properly handled by the (1) gtTileSeparate or (2) gtStripSeparate function, leading to a heap-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137719" comment="libtiff-devel-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137720" comment="libtiff5-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137721" comment="libtiff5-32bit-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137722" comment="tiff-4.0.3-10.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1174</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1174" source="CVE"/>
    <description>
    The rm_rf_children function in util.c in the systemd-logind login manager in systemd before 44, when logging out, allows local users to delete arbitrary files via a symlink attack on unspecified files, related to "particular records related with user session."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137502" comment="libgudev-1_0-0-210-25.5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137503" comment="libgudev-1_0-devel-210-25.5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137504" comment="libudev-devel-210-25.5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137505" comment="libudev1-210-25.5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137506" comment="libudev1-32bit-210-25.5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137507" comment="systemd-210-25.5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137508" comment="systemd-32bit-210-25.5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137509" comment="systemd-bash-completion-210-25.5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137510" comment="systemd-logger-210-25.5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137511" comment="systemd-sysvinit-210-25.5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137512" comment="typelib-1_0-GUdev-1_0-210-25.5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137513" comment="udev-210-25.5.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1182</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1182" source="CVE"/>
    <description>
    The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137424" comment="libdcerpc-binding0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137425" comment="libdcerpc-binding0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137426" comment="libdcerpc0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137427" comment="libdcerpc0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137428" comment="libgensec0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137429" comment="libgensec0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137430" comment="libndr-krb5pac0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137431" comment="libndr-krb5pac0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137432" comment="libndr-nbt0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137433" comment="libndr-nbt0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137434" comment="libndr-standard0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137435" comment="libndr-standard0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137436" comment="libndr0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137437" comment="libndr0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137438" comment="libnetapi0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137439" comment="libnetapi0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137440" comment="libpdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137441" comment="libpdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137442" comment="libregistry0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137443" comment="libsamba-credentials0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137444" comment="libsamba-credentials0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137445" comment="libsamba-hostconfig0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137446" comment="libsamba-hostconfig0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137447" comment="libsamba-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137448" comment="libsamba-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137449" comment="libsamdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137450" comment="libsamdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137451" comment="libsmbclient-devel-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137452" comment="libsmbclient-raw0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137453" comment="libsmbclient-raw0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137454" comment="libsmbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137455" comment="libsmbconf0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137456" comment="libsmbconf0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137457" comment="libsmbldap0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137458" comment="libsmbldap0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137459" comment="libtevent-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137460" comment="libtevent-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137461" comment="libwbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137462" comment="libwbclient0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137463" comment="samba-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137464" comment="samba-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137465" comment="samba-client-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137466" comment="samba-client-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137467" comment="samba-doc-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137468" comment="samba-libs-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137469" comment="samba-libs-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137470" comment="samba-winbind-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137471" comment="samba-winbind-32bit-4.1.12-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1185</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1185" source="CVE"/>
    <description>
    Multiple integer overflows in (1) magick/profile.c or (2) magick/property.c in ImageMagick 6.7.5 and earlier allow remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via crafted offset value in the ResolutionUnit tag in the EXIF IFD0 of an image.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0247.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136913" comment="ImageMagick-6.8.9.8-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136914" comment="ImageMagick-devel-6.8.9.8-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136915" comment="ImageMagick-doc-6.8.9.8-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136916" comment="ImageMagick-extra-6.8.9.8-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136917" comment="libMagick++-6_Q16-5-6.8.9.8-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136918" comment="libMagickCore-6_Q16-2-6.8.9.8-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136919" comment="libMagickWand-6_Q16-2-6.8.9.8-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136920" comment="perl-PerlMagick-6.8.9.8-1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1186</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1186" source="CVE"/>
    <description>
    Integer overflow in the SyncImageProfiles function in profile.c in ImageMagick 6.7.5-8 and earlier allows remote attackers to cause a denial of service (infinite loop) via crafted IOP tag offsets in the IFD in an image.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0248.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136913" comment="ImageMagick-6.8.9.8-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136914" comment="ImageMagick-devel-6.8.9.8-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136915" comment="ImageMagick-doc-6.8.9.8-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136916" comment="ImageMagick-extra-6.8.9.8-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136917" comment="libMagick++-6_Q16-5-6.8.9.8-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136918" comment="libMagickCore-6_Q16-2-6.8.9.8-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136919" comment="libMagickWand-6_Q16-2-6.8.9.8-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136920" comment="perl-PerlMagick-6.8.9.8-1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1457</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1457" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1457" source="CVE"/>
    <description>
    The TAR file parser in Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field that exceeds the total TAR file size.  NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137056" comment="clamav-0.98.4-2.1.10 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1458</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1458" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1458" source="CVE"/>
    <description>
    The Microsoft CHM file parser in ClamAV 0.96.4 and Sophos Anti-Virus 4.61.0 allows remote attackers to bypass malware detection via a crafted reset interval in the LZXC header of a CHM file.  NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different CHM parser implementations.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137056" comment="clamav-0.98.4-2.1.10 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1459</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1459" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1459" source="CVE"/>
    <description>
    The TAR file parser in AhnLab V3 Internet Security 2011.01.18.00, Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, Fortinet Antivirus 4.2.254.0, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, nProtect Anti-Virus 2011-01-17.01, Panda Antivirus 10.0.2.7, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field corresponding to that entire entry, plus part of the header of the next entry.  NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137056" comment="clamav-0.98.4-2.1.10 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1569</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1569" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1569" source="CVE"/>
    <description>
    The asn1_get_length_der function in decoding.c in GNU Libtasn1 before 2.12, as used in GnuTLS before 3.0.16 and other products, does not properly handle certain large length values, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly have unspecified other impact via a crafted ASN.1 structure.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137248" comment="gnutls-3.2.18-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137249" comment="libgnutls-devel-3.2.18-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137250" comment="libgnutls-openssl27-3.2.18-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137251" comment="libgnutls28-3.2.18-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137252" comment="libgnutls28-32bit-3.2.18-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1571</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1571" source="CVE"/>
    <description>
    file before 5.11 and libmagic allow remote attackers to cause a denial of service (crash) via a crafted Composite Document File (CDF) file that triggers (1) an out-of-bounds read or (2) an invalid pointer dereference.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137165" comment="file-5.19-3.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137166" comment="file-devel-5.19-3.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137167" comment="file-magic-5.19-3.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137168" comment="libmagic1-5.19-3.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137169" comment="libmagic1-32bit-5.19-3.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1573</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1573" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1573" source="CVE"/>
    <description>
    gnutls_cipher.c in libgnutls in GnuTLS before 2.12.17 and 3.x before 3.0.15 does not properly handle data encrypted with a block cipher, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) via a crafted record, as demonstrated by a crafted GenericBlockCipher structure.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137248" comment="gnutls-3.2.18-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137249" comment="libgnutls-devel-3.2.18-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137250" comment="libgnutls-openssl27-3.2.18-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137251" comment="libgnutls28-3.2.18-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137252" comment="libgnutls28-32bit-3.2.18-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1586</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1586" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1586" source="CVE"/>
    <description>
    mount.cifs in cifs-utils 2.6 allows local users to determine the existence of arbitrary files or directories via the file path in the second argument, which reveals their existence in an error message.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137055" comment="cifs-utils-6.4-3.2.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1616</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1616" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1616" source="CVE"/>
    <description>
    Use-after-free vulnerability in icclib before 2.13, as used by Argyll CMS before 1.4 and possibly other programs, allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted ICC profile file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137016" comment="argyllcms-1.6.3-2.1.9 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1667</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1667" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1667" source="CVE"/>
    <description>
    ISC BIND 9.x before 9.7.6-P1, 9.8.x before 9.8.3-P1, 9.9.x before 9.9.1-P1, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P1 does not properly handle resource records with a zero-length RDATA section, which allows remote DNS servers to cause a denial of service (daemon crash or data corruption) or obtain sensitive information from process memory via a crafted record.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137045" comment="bind-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137046" comment="bind-chrootenv-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137047" comment="bind-doc-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137048" comment="bind-libs-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137049" comment="bind-utils-9.9.5P1-2.2.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1682</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1682" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1682" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans, a different vulnerability than CVE-2012-3136.  NOTE: Oracle has not commented on claims from a downstream vendor that this issue is related to "XMLDecoder security issue via ClassFinder."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1711</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1711" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1711" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to CORBA.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1713</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1713" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1713" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, 1.4.2_37 and earlier, and JavaFX 2.1 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1716</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1716" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1716" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, and 5 update 35 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1717</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1717" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1717" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows local users to affect confidentiality via unknown vectors related to printing on Solaris or Linux.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1718</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1718" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1718" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect availability via unknown vectors related to Security.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1719</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1719" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1719" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect integrity, related to CORBA.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1723</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1723" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1723" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1724</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1724" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1724" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, and 6 update 32 and earlier, allows remote attackers to affect availability, related to JAXP.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1725</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1725" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1725" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, and 5 update 35 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1726</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1726" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1726" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1823</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1823" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1823" source="CVE"/>
    <description>
    sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1937</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1937" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1937" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1938</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1938" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1938" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 13.0, Thunderbird before 13.0, and SeaMonkey before 2.10 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) methodjit/ImmutableSync.cpp, (2) the JSObject::makeDenseArraySlow function in js/src/jsarray.cpp, and unknown other components.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1940</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1940" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1940" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsFrameList::FirstChild function in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and application crash) by changing the size of a container of absolutely positioned elements in a column.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1941</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1941" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1941" source="CVE"/>
    <description>
    Heap-based buffer overflow in the nsHTMLReflowState::CalculateHypotheticalBox function in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allows remote attackers to execute arbitrary code by resizing a window displaying absolutely positioned and relatively positioned elements in nested columns.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1944</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1944" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1944" source="CVE"/>
    <description>
    The Content Security Policy (CSP) implementation in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 does not block inline event handlers, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted HTML document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1945</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1945" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1945" source="CVE"/>
    <description>
    Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allow local users to obtain sensitive information via an HTML document that loads a shortcut (aka .lnk) file for display within an IFRAME element, as demonstrated by a network share implemented by (1) Microsoft Windows or (2) Samba.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1946</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1946" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1946" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsINode::ReplaceOrInsertBefore function in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 might allow remote attackers to execute arbitrary code via document changes involving replacement or insertion of a node.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1947</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1947" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1947" source="CVE"/>
    <description>
    Heap-based buffer overflow in the utf16_to_isolatin1 function in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allows remote attackers to execute arbitrary code via vectors that trigger a character-set conversion failure.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1948</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1948" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1948" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1949</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1949" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1949" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 13.0, Thunderbird 5.0 through 13.0, and SeaMonkey before 2.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1950</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1950" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1950" source="CVE"/>
    <description>
    The drag-and-drop implementation in Mozilla Firefox 4.x through 13.0 and Firefox ESR 10.x before 10.0.6 allows remote attackers to spoof the address bar by canceling a page load.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1951</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1951" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1951" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsSMILTimeValueSpec::IsEventBased function in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 allows remote attackers to cause a denial of service (heap memory corruption) or possibly execute arbitrary code by interacting with objects used for SMIL Timing.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1952</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1952" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1952" source="CVE"/>
    <description>
    The nsTableFrame::InsertFrames function in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 does not properly perform a cast of a frame variable during processing of mixed row-group and column-group frames, which might allow remote attackers to execute arbitrary code via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1953</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1953" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1953" source="CVE"/>
    <description>
    The ElementAnimations::EnsureStyleRuleFor function in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 allows remote attackers to cause a denial of service (buffer over-read, incorrect pointer dereference, and heap-based buffer overflow) or possibly execute arbitrary code via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1954</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1954" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1954" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsDocument::AdoptNode function in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 allows remote attackers to cause a denial of service (heap memory corruption) or possibly execute arbitrary code via vectors involving multiple adoptions and empty documents.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1955</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1955" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1955" source="CVE"/>
    <description>
    Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 allow remote attackers to spoof the address bar via vectors involving history.forward and history.back calls.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1956</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1956" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1956" source="CVE"/>
    <description>
    Mozilla Firefox before 15.0, Thunderbird before 15.0, and SeaMonkey before 2.12 do not prevent use of the Object.defineProperty method to shadow the location object (aka window.location), which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving a plugin.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1957</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1957" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1957" source="CVE"/>
    <description>
    An unspecified parser-utility class in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 does not properly handle EMBED elements within description elements in RSS feeds, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a feed.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1958</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1958" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1958" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsGlobalWindow::PageHidden function in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 might allow remote attackers to execute arbitrary code via vectors related to focused content.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1959</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1959" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1959" source="CVE"/>
    <description>
    Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 do not consider the presence of same-compartment security wrappers (SCSW) during the cross-compartment wrapping of objects, which allows remote attackers to bypass intended XBL access restrictions via crafted content.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1960</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1960" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1960" source="CVE"/>
    <description>
    The qcms_transform_data_rgb_out_lut_sse2 function in the QCMS implementation in Mozilla Firefox 4.x through 13.0, Thunderbird 5.0 through 13.0, and SeaMonkey before 2.11 might allow remote attackers to obtain sensitive information from process memory via a crafted color profile that triggers an out-of-bounds read operation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1961</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1961" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1961" source="CVE"/>
    <description>
    Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 do not properly handle duplicate values in X-Frame-Options headers, which makes it easier for remote attackers to conduct clickjacking attacks via a FRAME element referencing a web site that produces these duplicate values.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1962</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1962" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1962" source="CVE"/>
    <description>
    Use-after-free vulnerability in the JSDependentString::undepend function in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via vectors involving strings with multiple dependencies.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1963</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1963" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1963" source="CVE"/>
    <description>
    The Content Security Policy (CSP) functionality in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 does not properly restrict the strings placed into the blocked-uri parameter of a violation report, which allows remote web servers to capture OpenID credentials and OAuth 2.0 access tokens by triggering a violation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1965</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1965" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1965" source="CVE"/>
    <description>
    Mozilla Firefox 4.x through 13.0 and Firefox ESR 10.x before 10.0.6 do not properly establish the security context of a feed: URL, which allows remote attackers to bypass unspecified cross-site scripting (XSS) protection mechanisms via a feed:javascript: URL.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1966</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1966" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1966" source="CVE"/>
    <description>
    Mozilla Firefox 4.x through 13.0 and Firefox ESR 10.x before 10.0.6 do not have the same context-menu restrictions for data: URLs as for javascript: URLs, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1967</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1967" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1967" source="CVE"/>
    <description>
    Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 do not properly implement the JavaScript sandbox utility, which allows remote attackers to execute arbitrary JavaScript code with improper privileges via a javascript: URL.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1970</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1970" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1970" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1972</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1972" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1972" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsHTMLEditor::CollapseAdjacentTextNodes function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1973</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1973" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1973" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsObjectLoadingContent::LoadObject function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1974</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1974" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1974" source="CVE"/>
    <description>
    Use-after-free vulnerability in the gfxTextRun::CanBreakLineBefore function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1975</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1975" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1975" source="CVE"/>
    <description>
    Use-after-free vulnerability in the PresShell::CompleteMove function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1976</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-1976" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1976" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsHTMLSelectElement::SubmitNamesValues function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2110</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2110" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2110" source="CVE"/>
    <description>
    The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in OpenSSL before 0.9.8v, 1.0.0 before 1.0.0i, and 1.0.1 before 1.0.1a does not properly interpret integer data, which allows remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2111</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2111" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2111" source="CVE"/>
    <description>
    The (1) CreateAccount, (2) OpenAccount, (3) AddAccountRights, and (4) RemoveAccountRights LSA RPC procedures in smbd in Samba 3.4.x before 3.4.17, 3.5.x before 3.5.15, and 3.6.x before 3.6.5 do not properly restrict modifications to the privileges database, which allows remote authenticated users to obtain the "take ownership" privilege via an LSA connection.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137424" comment="libdcerpc-binding0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137425" comment="libdcerpc-binding0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137426" comment="libdcerpc0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137427" comment="libdcerpc0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137428" comment="libgensec0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137429" comment="libgensec0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137430" comment="libndr-krb5pac0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137431" comment="libndr-krb5pac0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137432" comment="libndr-nbt0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137433" comment="libndr-nbt0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137434" comment="libndr-standard0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137435" comment="libndr-standard0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137436" comment="libndr0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137437" comment="libndr0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137438" comment="libnetapi0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137439" comment="libnetapi0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137440" comment="libpdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137441" comment="libpdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137442" comment="libregistry0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137443" comment="libsamba-credentials0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137444" comment="libsamba-credentials0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137445" comment="libsamba-hostconfig0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137446" comment="libsamba-hostconfig0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137447" comment="libsamba-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137448" comment="libsamba-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137449" comment="libsamdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137450" comment="libsamdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137451" comment="libsmbclient-devel-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137452" comment="libsmbclient-raw0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137453" comment="libsmbclient-raw0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137454" comment="libsmbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137455" comment="libsmbconf0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137456" comment="libsmbconf0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137457" comment="libsmbldap0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137458" comment="libsmbldap0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137459" comment="libtevent-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137460" comment="libtevent-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137461" comment="libwbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137462" comment="libwbclient0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137463" comment="samba-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137464" comment="samba-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137465" comment="samba-client-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137466" comment="samba-client-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137467" comment="samba-doc-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137468" comment="samba-libs-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137469" comment="samba-libs-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137470" comment="samba-winbind-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137471" comment="samba-winbind-32bit-4.1.12-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2113</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2113" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2113" source="CVE"/>
    <description>
    Multiple integer overflows in tiff2pdf in libtiff before 4.0.2 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137719" comment="libtiff-devel-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137720" comment="libtiff5-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137721" comment="libtiff5-32bit-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137722" comment="tiff-4.0.3-10.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2141</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2141" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2141" source="CVE"/>
    <description>
    Array index error in the handle_nsExtendOutput2Table function in agent/mibgroup/agent/extend.c in Net-SNMP 5.7.1 allows remote authenticated users to cause a denial of service (out-of-bounds read and snmpd crash) via an SNMP GET request for an entry not in the extension table.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137684" comment="libsnmp30-5.7.3-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137685" comment="libsnmp30-32bit-5.7.3-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137686" comment="net-snmp-5.7.3-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137687" comment="net-snmp-devel-5.7.3-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137688" comment="perl-SNMP-5.7.3-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137689" comment="snmp-mibs-5.7.3-1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2143</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2143" source="CVE"/>
    <description>
    The crypt_des (aka DES-based crypt) function in FreeBSD before 9.0-RELEASE-p2, as used in PHP, PostgreSQL, and other products, does not process the complete cleartext password if this password contains a 0x80 character, which makes it easier for context-dependent attackers to obtain access via an authentication attempt with an initial substring of the intended password, as demonstrated by a Unicode password.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137474" comment="libecpg6-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137475" comment="libpq5-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137476" comment="libpq5-32bit-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137477" comment="postgresql93-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137478" comment="postgresql93-contrib-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137479" comment="postgresql93-devel-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137480" comment="postgresql93-docs-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137481" comment="postgresql93-server-9.3.5-2.1.14 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2150</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2150" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2150" source="CVE"/>
    <description>
    xfs_metadump in xfsprogs before 3.2.4 does not properly obfuscate file data, which allows remote attackers to obtain sensitive information by reading a generated image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113956" comment="xfsprogs-3.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113957" comment="xfsprogs-devel-3.2.1-2.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2214</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2214" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2214" source="CVE"/>
    <description>
    proxy.c in libpurple in Pidgin before 2.10.4 does not properly handle canceled SOCKS5 connection attempts, which allows user-assisted remote authenticated users to cause a denial of service (application crash) via a sequence of XMPP file-transfer requests.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137605" comment="libpurple-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137606" comment="libpurple-meanwhile-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137607" comment="libpurple-tcl-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137608" comment="pidgin-2.10.9-5.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2311</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2311" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2311" source="CVE"/>
    <description>
    sapi/cgi/cgi_main.c in PHP before 5.3.13 and 5.4.x before 5.4.3, when configured as a CGI script (aka php-cgi), does not properly handle query strings that contain a %3D sequence but no = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1823.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2335</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2335" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2335" source="CVE"/>
    <description>
    php-wrapper.fcgi does not properly handle command-line arguments, which allows remote attackers to bypass a protection mechanism in PHP 5.3.12 and 5.4.2 and execute arbitrary code by leveraging improper interaction between the PHP sapi/cgi/cgi_main.c component and a query string beginning with a +- sequence.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2336</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2336" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2336" source="CVE"/>
    <description>
    sapi/cgi/cgi_main.c in PHP before 5.3.13 and 5.4.x before 5.4.3, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to cause a denial of service (resource consumption) by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'T' case.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1823.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2337</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2337" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2337" source="CVE"/>
    <description>
    sudo 1.6.x and 1.7.x before 1.7.9p1, and 1.8.x before 1.8.4p5, does not properly support configurations that use a netmask syntax, which allows local users to bypass intended command restrictions in opportunistic circumstances by executing a command on a host that has an IPv4 address.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137883" comment="sudo-1.8.10p3-2.1.6 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2392</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2392" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2392" source="CVE"/>
    <description>
    Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 allows remote attackers to cause a denial of service (infinite loop) via vectors related to the (1) ANSI MAP, (2) ASF, (3) IEEE 802.11, (4) IEEE 802.3, and (5) LTP dissectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2393</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2393" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2393" source="CVE"/>
    <description>
    epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 does not properly construct certain array data structures, which allows remote attackers to cause a denial of service (application crash) via a crafted packet that triggers incorrect memory allocation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2394</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2394" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2394" source="CVE"/>
    <description>
    Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 on the SPARC and Itanium platforms does not properly perform data alignment for a certain structure member, which allows remote attackers to cause a denial of service (application crash) via a (1) ICMP or (2) ICMPv6 Echo Request packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2396</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2396" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2396" source="CVE"/>
    <description>
    VideoLAN VLC media player 2.0.1 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted MP4 file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137708" comment="libtag-devel-1.9.1-3.1.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137709" comment="libtag1-1.9.1-3.1.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137710" comment="libtag_c0-1.9.1-3.1.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137711" comment="taglib-1.9.1-3.1.9 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2417</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2417" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2417" source="CVE"/>
    <description>
    PyCrypto before 2.6 does not produce appropriate prime numbers when using an ElGamal scheme to generate a key, which reduces the signature space or public key space and makes it easier for attackers to conduct brute force attacks to obtain the private key.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137856" comment="python-pycrypto-2.6.1-3.1.4 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2451</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2451" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2451" source="CVE"/>
    <description>
    The Config::IniFiles module before 2.71 for Perl creates temporary files with predictable names, which allows local users to overwrite arbitrary files via a symlink attack.  NOTE: some of these details are obtained from third party information.  NOTE: it has been reported that this might only be exploitable by writing in the same directory as the .ini file. If this is the case, then this issue might not cross privilege boundaries.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137834" comment="perl-Config-IniFiles-2.83-2.1.3 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2625</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2625" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2625" source="CVE"/>
    <description>
    The PyGrub boot loader in Xen unstable before changeset 25589:60f09d1ab1fe, 4.2.x, and 4.1.x allows local para-virtualized guest users to cause a denial of service (memory consumption) via a large (1) bzip2 or (2) lzma compressed kernel image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2655</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2655" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2655" source="CVE"/>
    <description>
    PostgreSQL 8.3.x before 8.3.19, 8.4.x before 8.4.12, 9.0.x before 9.0.8, and 9.1.x before 9.1.4 allows remote authenticated users to cause a denial of service (server crash) by adding the (1) SECURITY DEFINER or (2) SET attributes to a procedural language's call handler.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137474" comment="libecpg6-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137475" comment="libpq5-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137476" comment="libpq5-32bit-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137477" comment="postgresql93-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137478" comment="postgresql93-contrib-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137479" comment="postgresql93-devel-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137480" comment="postgresql93-docs-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137481" comment="postgresql93-server-9.3.5-2.1.14 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2669</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2669" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2669" source="CVE"/>
    <description>
    The main function in tools/hv/hv_kvp_daemon.c in hypervkvpd, as distributed in the Linux kernel before 3.4.5, does not validate the origin of Netlink messages, which allows local users to spoof Netlink communication via a crafted connector message.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137272" comment="hyper-v-6-8.2.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2673</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2673" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2673" source="CVE"/>
    <description>
    Multiple integer overflows in the (1) GC_generic_malloc and (2) calloc functions in malloc.c, and the (3) GC_generic_malloc_ignore_off_page function in mallocx.c in Boehm-Demers-Weiser GC (libgc) before 7.2 make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size value, which causes less memory to be allocated than expected.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137494" comment="libgc1-7.2d-4.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2686</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2686" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2686" source="CVE"/>
    <description>
    crypto/evp/e_aes_cbc_hmac_sha1.c in the AES-NI functionality in the TLS 1.1 and 1.2 implementations in OpenSSL 1.0.1 before 1.0.1d allows remote attackers to cause a denial of service (application crash) via crafted CBC data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2687</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2687" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2687" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in the make_variant_list function in mod_negotiation.c in the mod_negotiation module in the Apache HTTP Server 2.4.x before 2.4.3, when the MultiViews option is enabled, allow remote attackers to inject arbitrary web script or HTML via a crafted filename that is not properly handled during construction of a variant list.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136944" comment="apache2-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136945" comment="apache2-devel-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136946" comment="apache2-doc-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136947" comment="apache2-example-pages-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136948" comment="apache2-prefork-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136949" comment="apache2-utils-2.4.10-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2688</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2688" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2688" source="CVE"/>
    <description>
    Unspecified vulnerability in the _php_stream_scandir function in the stream implementation in PHP before 5.3.15 and 5.4.x before 5.4.5 has unknown impact and remote attack vectors, related to an "overflow."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2737</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2737" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2737" source="CVE"/>
    <description>
    The user_change_icon_file_authorized_cb function in /usr/libexec/accounts-daemon in AccountsService before 0.6.22 does not properly check the UID when copying an icon file to the system cache directory, which allows local users to read arbitrary files via a race condition.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136928" comment="accountsservice-0.6.38-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136929" comment="libaccountsservice0-0.6.38-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136930" comment="typelib-1_0-AccountsService-1_0-0.6.38-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2738</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2738" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2738" source="CVE"/>
    <description>
    The VteTerminal in gnome-terminal (vte) before 0.32.2 allows remote authenticated users to cause a denial of service (long loop and CPU consumption) via an escape sequence with a large repeat count value.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137752" comment="libvte9-0.28.2-18.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137753" comment="vte2-lang-0.28.2-18.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2771</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2771" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2771" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137396" comment="libavutil52-2.1.4-2.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2772</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2772" source="CVE"/>
    <description>
    Unspecified vulnerability in the ff_rv34_decode_frame function in libavcodec/rv34.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to "width/height changing with frame threading."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137396" comment="libavutil52-2.1.4-2.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2774</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2774" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2774" source="CVE"/>
    <description>
    The ff_MPV_frame_start function in libavcodec/mpegvideo.c in FFmpeg before 0.11 allows remote attackers to cause a denial of service (memory corruption) via unspecified vectors, related to starting "a frame outside SETUP state."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137396" comment="libavutil52-2.1.4-2.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2775</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2775" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2775" source="CVE"/>
    <description>
    Unspecified vulnerability in the read_var_block_data function in libavcodec/alsdec.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to a large order and an "out of array write in quant_cof."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137396" comment="libavutil52-2.1.4-2.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2776</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2776" source="CVE"/>
    <description>
    Unspecified vulnerability in the decode_cell_data function in libavcodec/indeo3.c in FFmpeg before 0.11 and Libav 0.8.x before 0.8.4 has unknown impact and attack vectors, related to an "out of picture write."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137396" comment="libavutil52-2.1.4-2.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2777</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2777" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2777" source="CVE"/>
    <description>
    Unspecified vulnerability in the decode_pic function in libavcodec/cavsdec.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to "width/height changing in CAVS," a different vulnerability than CVE-2012-2784.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137396" comment="libavutil52-2.1.4-2.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2779</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2779" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2779" source="CVE"/>
    <description>
    Unspecified vulnerability in the decode_frame function in libavcodec/indeo5.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to an invalid "gop header" and decoding in a "half initialized context."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137396" comment="libavutil52-2.1.4-2.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2782</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2782" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2782" source="CVE"/>
    <description>
    Unspecified vulnerability in the decode_slice_header function in libavcodec/h264.c in FFmpeg before 0.11 has unknown impact and attack vectors, related to a "rejected resolution change."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137396" comment="libavutil52-2.1.4-2.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2783</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2783" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2783" source="CVE"/>
    <description>
    Unspecified vulnerability in libavcodec/vp56.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.5, has unknown impact and attack vectors, related to "freeing the returned frame."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137396" comment="libavutil52-2.1.4-2.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2784</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2784" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2784" source="CVE"/>
    <description>
    Unspecified vulnerability in the decode_pic function in libavcodec/cavsdec.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to "width/height changing in CAVS," a different vulnerability than CVE-2012-2777.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137396" comment="libavutil52-2.1.4-2.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2785</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2785" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2785" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in libavcodec/wmalosslessdec.c in FFmpeg before 0.11 have unknown impact and attack vectors, related to (1) "some subframes only encode some channels" or (2) a large order value.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137396" comment="libavutil52-2.1.4-2.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2786</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2786" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2786" source="CVE"/>
    <description>
    Unspecified vulnerability in the decode_wdlt function in libavcodec/dfa.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to an "out of array write."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137396" comment="libavutil52-2.1.4-2.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2787</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2787" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2787" source="CVE"/>
    <description>
    Unspecified vulnerability in the decode_frame function in libavcodec/indeo4.c in FFmpeg before 0.11 and Libav 0.8.x before 0.8.4 has unknown impact and attack vectors, related to the "setup width/height."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137396" comment="libavutil52-2.1.4-2.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2788</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2788" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2788" source="CVE"/>
    <description>
    Unspecified vulnerability in the avi_read_packet function in libavformat/avidec.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to an "out of array read" when a "packet is shrunk."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137396" comment="libavutil52-2.1.4-2.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2789</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2789" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2789" source="CVE"/>
    <description>
    Unspecified vulnerability in the avi_read_packet function in libavformat/avidec.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to a large number of vector coded coefficients (num_vec_coeffs).
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137396" comment="libavutil52-2.1.4-2.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2790</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2790" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2790" source="CVE"/>
    <description>
    Unspecified vulnerability in the read_var_block_data function in libavcodec/alsdec.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to the "number of decoded samples in first sub-block in BGMC mode."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137396" comment="libavutil52-2.1.4-2.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2791</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2791" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2791" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the (1) decode_band_hdr function in indeo4.c and (2) ff_ivi_decode_blocks function in ivi_common.c in libavcodec/ in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.5, have unknown impact and attack vectors, related to the "transform size."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137396" comment="libavutil52-2.1.4-2.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2792</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2792" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2792" source="CVE"/>
    <description>
    Unspecified vulnerability in the decode_init function in libavcodec/wmalosslessdec.c in FFmpeg before 0.11 has unknown impact and attack vectors, related to the samples per frame.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137396" comment="libavutil52-2.1.4-2.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2793</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2793" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2793" source="CVE"/>
    <description>
    Unspecified vulnerability in the lag_decode_zero_run_line function in libavcodec/lagarith.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors related to "too many zeros."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137396" comment="libavutil52-2.1.4-2.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2794</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2794" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2794" source="CVE"/>
    <description>
    Unspecified vulnerability in the decode_mb_info function in libavcodec/indeo5.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors in which the "allocated tile size ... mismatches parameters."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137396" comment="libavutil52-2.1.4-2.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2795</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2795" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2795" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in libavcodec/wmalosslessdec.c in FFmpeg before 0.11 have unknown impact and attack vectors related to (1) size of "mclms arrays," (2) "a get_bits(0) in decode_ac_filter," and (3) "too many bits in decode_channel_residues()."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137396" comment="libavutil52-2.1.4-2.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2796</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2796" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2796" source="CVE"/>
    <description>
    Unspecified vulnerability in the vc1_decode_frame function in libavcodec/vc1dec.c in FFmpeg before 0.11 and Libav 0.8.x before 0.8.4 has unknown impact and attack vectors, related to inconsistencies in "coded slice positions and interlacing" that trigger "out of array writes."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137396" comment="libavutil52-2.1.4-2.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2797</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2797" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2797" source="CVE"/>
    <description>
    Unspecified vulnerability in the decode_frame_mp3on4 function in libavcodec/mpegaudiodec.c in FFmpeg before 0.11 and Libav 0.8.x before 0.8.5 has unknown impact and attack vectors related to a calculation that prevents a frame from being "large enough."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137396" comment="libavutil52-2.1.4-2.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2798</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2798" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2798" source="CVE"/>
    <description>
    Unspecified vulnerability in the decode_dds1 function in libavcodec/dfa.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to an "out of array write."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137396" comment="libavutil52-2.1.4-2.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2799</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2799" source="CVE"/>
    <description>
    Unspecified vulnerability in libavcodec/wmalosslessdec.c in FFmpeg before 0.11 has unknown impact and attack vectors, related to the "put bit buffer when num_saved_bits is reset."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137396" comment="libavutil52-2.1.4-2.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2800</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2800" source="CVE"/>
    <description>
    Unspecified vulnerability in the ff_ivi_process_empty_tile function in libavcodec/ivi_common.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors in which the "tile size ... mismatches parameters" and triggers "writing into a too small array."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137396" comment="libavutil52-2.1.4-2.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2801</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2801" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2801" source="CVE"/>
    <description>
    Unspecified vulnerability in libavcodec/avs.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.4, has unknown impact and attack vectors, related to dimensions and "out of array writes."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137396" comment="libavutil52-2.1.4-2.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2802</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2802" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2802" source="CVE"/>
    <description>
    Unspecified vulnerability in the ac3_decode_frame function in libavcodec/ac3dec.c in FFmpeg before 0.11 and Libav 0.8.x before 0.8.4 has unknown impact and attack vectors, related to the "number of output channels" and "out of array writes."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137396" comment="libavutil52-2.1.4-2.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2803</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2803" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2803" source="CVE"/>
    <description>
    Double free vulnerability in the mpeg_decode_frame function in libavcodec/mpeg12.c in FFmpeg before 0.11, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.5, has unknown impact and attack vectors, related to resetting the data size value.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137396" comment="libavutil52-2.1.4-2.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2804</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2804" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2804" source="CVE"/>
    <description>
    Unspecified vulnerability in libavcodec/indeo3.c in FFmpeg before 0.11 and Libav 0.8.x before 0.8.5 has unknown impact and attack vectors, related to "reallocation code" and the luma height and width.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137396" comment="libavutil52-2.1.4-2.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2812</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2812" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2812" source="CVE"/>
    <description>
    The exif_entry_get_value function in exif-entry.c in the EXIF Tag Parsing Library (aka libexif) before 0.6.21 allows remote attackers to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from process memory via crafted EXIF tags in an image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137482" comment="libexif-devel-0.6.21-9.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137483" comment="libexif12-0.6.21-9.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137484" comment="libexif12-32bit-0.6.21-9.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2813</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2813" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2813" source="CVE"/>
    <description>
    The exif_convert_utf16_to_utf8 function in exif-entry.c in the EXIF Tag Parsing Library (aka libexif) before 0.6.21 allows remote attackers to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from process memory via crafted EXIF tags in an image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137482" comment="libexif-devel-0.6.21-9.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137483" comment="libexif12-0.6.21-9.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137484" comment="libexif12-32bit-0.6.21-9.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2814</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2814" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2814" source="CVE"/>
    <description>
    Buffer overflow in the exif_entry_format_value function in exif-entry.c in the EXIF Tag Parsing Library (aka libexif) 0.6.20 allows remote attackers to cause a denial of service or possibly execute arbitrary code via crafted EXIF tags in an image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137482" comment="libexif-devel-0.6.21-9.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137483" comment="libexif12-0.6.21-9.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137484" comment="libexif12-32bit-0.6.21-9.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2836</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2836" source="CVE"/>
    <description>
    The exif_data_load_data function in exif-data.c in the EXIF Tag Parsing Library (aka libexif) before 0.6.21 allows remote attackers to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from process memory via crafted EXIF tags in an image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137482" comment="libexif-devel-0.6.21-9.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137483" comment="libexif12-0.6.21-9.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137484" comment="libexif12-32bit-0.6.21-9.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2837</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2837" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2837" source="CVE"/>
    <description>
    The mnote_olympus_entry_get_value function in olympus/mnote-olympus-entry.c in the EXIF Tag Parsing Library (aka libexif) before 0.6.21 allows remote attackers to cause a denial of service (divide-by-zero error) via an image with crafted EXIF tags that are not properly handled during the formatting of EXIF maker note tags.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137482" comment="libexif-devel-0.6.21-9.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137483" comment="libexif12-0.6.21-9.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137484" comment="libexif12-32bit-0.6.21-9.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2840</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2840" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2840" source="CVE"/>
    <description>
    Off-by-one error in the exif_convert_utf16_to_utf8 function in exif-entry.c in the EXIF Tag Parsing Library (aka libexif) before 0.6.21 allows remote attackers to cause a denial of service or possibly execute arbitrary code via crafted EXIF tags in an image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137482" comment="libexif-devel-0.6.21-9.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137483" comment="libexif12-0.6.21-9.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137484" comment="libexif12-32bit-0.6.21-9.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2841</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2841" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2841" source="CVE"/>
    <description>
    Integer underflow in the exif_entry_get_value function in exif-entry.c in the EXIF Tag Parsing Library (aka libexif) 0.6.20 might allow remote attackers to execute arbitrary code via vectors involving a crafted buffer-size parameter during the formatting of an EXIF tag, leading to a heap-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137482" comment="libexif-devel-0.6.21-9.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137483" comment="libexif12-0.6.21-9.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137484" comment="libexif12-32bit-0.6.21-9.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2845</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-2845" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2845" source="CVE"/>
    <description>
    Integer overflow in the jpeg_data_load_data function in jpeg-data.c in libjpeg in exif 0.6.20 allows remote attackers to cause a denial of service (buffer over-read and application crash) or obtain potentially sensitive information via a crafted JPEG file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137158" comment="exif-0.6.21-6.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3136</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3136" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3136" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans, a different vulnerability than CVE-2012-1682.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3174</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3174" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java 7 before Update 11 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2013-0422.  NOTE: some parties have mapped CVE-2012-3174 to an issue involving recursive use of the Reflection API, but that issue is already covered as part of CVE-2013-0422.  This identifier is for a different vulnerability whose details are not public as of 20130114.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3216</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3216" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3216" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Libraries.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3236</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3236" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3236" source="CVE"/>
    <description>
    fits-io.c in GIMP before 2.8.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed XTENSION header of a .fit file, as demonstrated using a long string.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137199" comment="gimp-2.8.14-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137200" comment="gimp-help-browser-2.8.14-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137201" comment="gimp-plugin-aa-2.8.14-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137202" comment="gimp-plugins-python-2.8.14-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137203" comment="libgimp-2_0-0-2.8.14-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137204" comment="libgimpui-2_0-0-2.8.14-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3291</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3291" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3291" source="CVE"/>
    <description>
    Heap-based buffer overflow in OpenConnect 3.18 allows remote servers to cause a denial of service via a crafted greeting banner.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137812" comment="openconnect-6.00-3.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137813" comment="openconnect-devel-6.00-3.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3355</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3355" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3355" source="CVE"/>
    <description>
    (1) AlbumTab.py, (2) ArtistTab.py, (3) LinksTab.py, and (4) LyricsTab.py in the Context module in GNOME Rhythmbox 0.13.3 and earlier allows local users to execute arbitrary code via a symlink attack on a temporary HTML template file in the /tmp/context directory.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137862" comment="rhythmbox-3.1-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137863" comment="rhythmbox-lang-3.1-1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3356</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3356" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3356" source="CVE"/>
    <description>
    The remote SVN views functionality (lib/vclib/svn/svn_ra.py) in ViewVC before 1.1.15 does not properly perform authorization, which allows remote attackers to bypass intended access restrictions via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137898" comment="viewvc-1.1.22-2.1.4 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3357</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3357" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3357" source="CVE"/>
    <description>
    The SVN revision view (lib/vclib/svn/svn_repos.py) in ViewVC before 1.1.15 does not properly handle log messages when a readable path is copied from an unreadable path, which allows remote attackers to obtain sensitive information, related to a "log msg leak."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137898" comment="viewvc-1.1.22-2.1.4 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3358</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3358" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3358" source="CVE"/>
    <description>
    Multiple heap-based buffer overflows in the j2k_read_sot function in j2k.c in OpenJPEG 1.5 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted (1) tile number or (2) tile length in a JPEG 2000 image file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137557" comment="libopenjpeg1-1.5.2-2.1.8 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3365</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3365" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3365" source="CVE"/>
    <description>
    The SQLite functionality in PHP before 5.3.15 allows remote attackers to bypass the open_basedir protection mechanism via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3374</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3374" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3374" source="CVE"/>
    <description>
    Buffer overflow in markup.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.5 allows remote attackers to execute arbitrary code via a crafted inline image in a message.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137605" comment="libpurple-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137606" comment="libpurple-meanwhile-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137607" comment="libpurple-tcl-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137608" comment="pidgin-2.10.9-5.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3386</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3386" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3386" source="CVE"/>
    <description>
    The "make distcheck" rule in GNU Automake before 1.11.6 and 1.12.x before 1.12.2 grants world-writable permissions to the extraction directory, which introduces a race condition that allows local users to execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137260" comment="gv-3.7.4-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137570" comment="libpng12-0-1.2.51-3.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137571" comment="libpng12-0-32bit-1.2.51-3.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137572" comment="libpng12-compat-devel-1.2.51-3.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137573" comment="libpng12-devel-1.2.51-3.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137261" comment="wdiff-1.2.2-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137262" comment="wdiff-lang-1.2.2-2.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3401</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3401" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3401" source="CVE"/>
    <description>
    The t2p_read_tiff_init function in tiff2pdf (tools/tiff2pdf.c) in LibTIFF 4.0.2 and earlier does not properly initialize the T2P context struct pointer in certain error conditions, which allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image that triggers a heap-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137719" comment="libtiff-devel-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137720" comment="libtiff5-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137721" comment="libtiff5-32bit-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137722" comment="tiff-4.0.3-10.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3412</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3412" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3412" source="CVE"/>
    <description>
    The sfc (aka Solarflare Solarstorm) driver in the Linux kernel before 3.2.30 allows remote attackers to cause a denial of service (DMA descriptor consumption and network-controller outage) via crafted TCP packets that trigger a small MSS value.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137315" comment="kernel-default-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137316" comment="kernel-default-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137317" comment="kernel-desktop-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137318" comment="kernel-desktop-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137319" comment="kernel-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137320" comment="kernel-docs-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137321" comment="kernel-macros-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137322" comment="kernel-pae-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137323" comment="kernel-pae-base-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137324" comment="kernel-pae-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137325" comment="kernel-source-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137326" comment="kernel-syms-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137327" comment="kernel-xen-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137328" comment="kernel-xen-devel-3.16.6-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3422</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3422" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3422" source="CVE"/>
    <description>
    The getFirstInTableInstance function in the IcedTea-Web plugin before 1.2.1 returns an uninitialized pointer when the instance_to_id_map hash is empty, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted web page, which causes an uninitialized memory location to be read.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137274" comment="icedtea-web-javadoc-1.5.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137275" comment="java-1_7_0-openjdk-plugin-1.5.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137276" comment="java-1_8_0-openjdk-plugin-1.5.1-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3423</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3423" source="CVE"/>
    <description>
    The IcedTea-Web plugin before 1.2.1 does not properly handle NPVariant NPStrings without NUL terminators, which allows remote attackers to cause a denial of service (crash), obtain sensitive information from memory, or execute arbitrary code via a crafted Java applet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137274" comment="icedtea-web-javadoc-1.5.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137275" comment="java-1_7_0-openjdk-plugin-1.5.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137276" comment="java-1_8_0-openjdk-plugin-1.5.1-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3432</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3432" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3432" source="CVE"/>
    <description>
    The handle_mmio function in arch/x86/hvm/io.c in the MMIO operations emulator for Xen 3.3 and 4.x, when running an HVM guest, does not properly reset certain state information between emulation cycles, which allows local guest OS users to cause a denial of service (guest OS crash) via unspecified operations on MMIO regions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3433</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3433" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3433" source="CVE"/>
    <description>
    Xen 4.0 and 4.1 allows local HVM guest OS kernels to cause a denial of service (domain 0 VCPU hang and kernel panic) by modifying the physical address space in a way that triggers excessive shared page search time during the p2m teardown.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3438</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3438" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3438" source="CVE"/>
    <description>
    The Magick_png_malloc function in coders/png.c in GraphicsMagick 6.7.8-6 does not use the proper variable type for the allocation size, which might allow remote attackers to cause a denial of service (crash) via a crafted PNG file that triggers incorrect memory allocation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136909" comment="GraphicsMagick-devel-1.3.20-1.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136910" comment="libGraphicsMagick-Q16-3-1.3.20-1.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136911" comment="libGraphicsMagick3-config-1.3.20-1.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136912" comment="libGraphicsMagickWand-Q16-2-1.3.20-1.6 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3445</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3445" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3445" source="CVE"/>
    <description>
    The virTypedParameterArrayClear function in libvirt 0.9.13 does not properly handle virDomain* API calls with typed parameters, which might allow remote authenticated users to cause a denial of service (libvirtd crash) via an RPC command with nparams set to zero, which triggers an out-of-bounds read or a free of an invalid pointer.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137726" comment="libvirt-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137727" comment="libvirt-client-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137728" comment="libvirt-daemon-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137729" comment="libvirt-daemon-config-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137730" comment="libvirt-daemon-config-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137731" comment="libvirt-daemon-driver-interface-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137732" comment="libvirt-daemon-driver-libxl-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137733" comment="libvirt-daemon-driver-lxc-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137734" comment="libvirt-daemon-driver-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137735" comment="libvirt-daemon-driver-nodedev-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137736" comment="libvirt-daemon-driver-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137737" comment="libvirt-daemon-driver-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137738" comment="libvirt-daemon-driver-secret-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137739" comment="libvirt-daemon-driver-storage-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137740" comment="libvirt-daemon-driver-uml-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137741" comment="libvirt-daemon-driver-vbox-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137742" comment="libvirt-daemon-driver-xen-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137743" comment="libvirt-daemon-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137744" comment="libvirt-daemon-xen-1.2.9-1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3466</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3466" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3466" source="CVE"/>
    <description>
    GNOME gnome-keyring 3.4.0 through 3.4.1, when gpg-cache-method is set to "idle" or "timeout," does not properly limit the amount of time a passphrase is cached, which allows attackers to have an unspecified impact via unknown attack vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137236" comment="gnome-keyring-3.14.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137237" comment="gnome-keyring-32bit-3.14.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137238" comment="gnome-keyring-pam-3.14.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137239" comment="gnome-keyring-pam-32bit-3.14.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137240" comment="libgck-modules-gnome-keyring-3.14.0-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3482</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3482" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3482" source="CVE"/>
    <description>
    Fetchmail 5.0.8 through 6.3.21, when using NTLM authentication in debug mode, allows remote NTLM servers to (1) cause a denial of service (crash and delayed delivery of inbound mail) via a crafted NTLM response that triggers an out-of-bounds read in the base64 decoder, or (2) obtain sensitive information from memory via an NTLM Type 2 message with a crafted Target Name structure, which triggers an out-of-bounds read.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137164" comment="fetchmail-6.3.26-6.1.4 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3488</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3488" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3488" source="CVE"/>
    <description>
    The libxslt support in contrib/xml2 in PostgreSQL 8.3 before 8.3.20, 8.4 before 8.4.13, 9.0 before 9.0.9, and 9.1 before 9.1.5 does not properly restrict access to files and URLs, which allows remote authenticated users to modify data, obtain sensitive information, or trigger outbound traffic to arbitrary external hosts by leveraging (1) stylesheet commands that are permitted by the libxslt security options or (2) an xslt_process feature, related to an XML External Entity (aka XXE) issue.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137474" comment="libecpg6-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137475" comment="libpq5-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137476" comment="libpq5-32bit-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137477" comment="postgresql93-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137478" comment="postgresql93-contrib-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137479" comment="postgresql93-devel-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137480" comment="postgresql93-docs-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137481" comment="postgresql93-server-9.3.5-2.1.14 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3489</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3489" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3489" source="CVE"/>
    <description>
    The xml_parse function in the libxml2 support in the core server component in PostgreSQL 8.3 before 8.3.20, 8.4 before 8.4.13, 9.0 before 9.0.9, and 9.1 before 9.1.5 allows remote authenticated users to determine the existence of arbitrary files or URLs, and possibly obtain file or URL content that triggers a parsing error, via an XML value that refers to (1) a DTD or (2) an entity, related to an XML External Entity (aka XXE) issue.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137474" comment="libecpg6-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137475" comment="libpq5-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137476" comment="libpq5-32bit-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137477" comment="postgresql93-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137478" comment="postgresql93-contrib-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137479" comment="postgresql93-devel-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137480" comment="postgresql93-docs-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137481" comment="postgresql93-server-9.3.5-2.1.14 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3499</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3499" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3499" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via vectors involving hostnames and URIs in the (1) mod_imagemap, (2) mod_info, (3) mod_ldap, (4) mod_proxy_ftp, and (5) mod_status modules.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136944" comment="apache2-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136945" comment="apache2-devel-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136946" comment="apache2-doc-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136947" comment="apache2-example-pages-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136948" comment="apache2-prefork-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136949" comment="apache2-utils-2.4.10-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3502</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3502" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3502" source="CVE"/>
    <description>
    The proxy functionality in (1) mod_proxy_ajp.c in the mod_proxy_ajp module and (2) mod_proxy_http.c in the mod_proxy_http module in the Apache HTTP Server 2.4.x before 2.4.3 does not properly determine the situations that require closing a back-end connection, which allows remote attackers to obtain sensitive information in opportunistic circumstances by reading a response that was intended for a different client.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136944" comment="apache2-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136945" comment="apache2-devel-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136946" comment="apache2-doc-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136947" comment="apache2-example-pages-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136948" comment="apache2-prefork-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136949" comment="apache2-utils-2.4.10-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3515</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3515" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3515" source="CVE"/>
    <description>
    Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137408" comment="libcacard0-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137409" comment="qemu-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137410" comment="qemu-arm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137411" comment="qemu-block-curl-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137412" comment="qemu-extra-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137413" comment="qemu-ipxe-1.0.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137414" comment="qemu-ksm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137415" comment="qemu-kvm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137416" comment="qemu-lang-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137859" comment="qemu-linux-user-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137417" comment="qemu-ppc-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137418" comment="qemu-s390-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137419" comment="qemu-seabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137420" comment="qemu-sgabios-8-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137421" comment="qemu-tools-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137422" comment="qemu-vgabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137423" comment="qemu-x86-2.1.0-2.9 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3520</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3520" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3520" source="CVE"/>
    <description>
    The Netlink implementation in the Linux kernel before 3.2.30 does not properly handle messages that lack SCM_CREDENTIALS data, which might allow local users to spoof Netlink communication via a crafted message, as demonstrated by a message to (1) Avahi or (2) NetworkManager.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137315" comment="kernel-default-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137316" comment="kernel-default-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137317" comment="kernel-desktop-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137318" comment="kernel-desktop-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137319" comment="kernel-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137320" comment="kernel-docs-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137321" comment="kernel-macros-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137322" comment="kernel-pae-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137323" comment="kernel-pae-base-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137324" comment="kernel-pae-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137325" comment="kernel-source-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137326" comment="kernel-syms-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137327" comment="kernel-xen-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137328" comment="kernel-xen-devel-3.16.6-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3524</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3524" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3524" source="CVE"/>
    <description>
    libdbus 1.5.x and earlier, when used in setuid or other privileged programs in X.org and possibly other products, allows local users to gain privileges and execute arbitrary code via the DBUS_SYSTEM_BUS_ADDRESS environment variable.  NOTE: libdbus maintainers state that this is a vulnerability in the applications that do not cleanse environment variables, not in libdbus itself: "we do not support use of libdbus in setuid binaries that do not sanitize their environment before their first call into libdbus."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137122" comment="dbus-1-1.8.8-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137123" comment="dbus-1-devel-1.8.8-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105261" comment="dbus-1-devel-32bit-1.8.14-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105257" comment="dbus-1-devel-doc-1.8.14-12.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137124" comment="dbus-1-x11-1.8.8-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137214" comment="glib2-devel-2.42.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137215" comment="glib2-tools-2.42.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137125" comment="libdbus-1-3-1.8.8-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137126" comment="libdbus-1-3-32bit-1.8.8-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137216" comment="libgio-2_0-0-2.42.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137217" comment="libgio-2_0-0-32bit-2.42.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137218" comment="libglib-2_0-0-2.42.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137219" comment="libglib-2_0-0-32bit-2.42.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137220" comment="libgmodule-2_0-0-2.42.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137221" comment="libgmodule-2_0-0-32bit-2.42.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137222" comment="libgobject-2_0-0-2.42.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137223" comment="libgobject-2_0-0-32bit-2.42.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137224" comment="libgthread-2_0-0-2.42.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137225" comment="libgthread-2_0-0-32bit-2.42.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3534</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3534" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3534" source="CVE"/>
    <description>
    GNU Gatekeeper before 3.1 does not limit the number of connections to the status port, which allows remote attackers to cause a denial of service (connection and thread consumption) via a large number of connections.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130658" comment="gnugk-4.2-139.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130655" comment="h323plus-1.26.5-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130656" comment="h323plus-devel-1.26.5-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130657" comment="libh323-1_26_5-1.26.5-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3535</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3535" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3535" source="CVE"/>
    <description>
    Heap-based buffer overflow in OpenJPEG 1.5.0 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted JPEG2000 file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137557" comment="libopenjpeg1-1.5.2-2.1.8 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3548</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3548" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3548" source="CVE"/>
    <description>
    The dissect_drda function in epan/dissectors/packet-drda.c in Wireshark 1.6.x through 1.6.10 and 1.8.x through 1.8.2 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a small value for a certain length field in a capture file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3570</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3570" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3570" source="CVE"/>
    <description>
    Buffer overflow in ISC DHCP 4.2.x before 4.2.4-P1, when DHCPv6 mode is enabled, allows remote attackers to cause a denial of service (segmentation fault and daemon exit) via a crafted client identifier parameter.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137130" comment="dhcp-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137131" comment="dhcp-client-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137132" comment="dhcp-doc-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137133" comment="dhcp-relay-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137134" comment="dhcp-server-4.2.6-9.2.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3571</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3571" source="CVE"/>
    <description>
    ISC DHCP 4.1.2 through 4.2.4 and 4.1-ESV before 4.1-ESV-R6 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a malformed client identifier.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137130" comment="dhcp-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137131" comment="dhcp-client-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137132" comment="dhcp-doc-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137133" comment="dhcp-relay-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137134" comment="dhcp-server-4.2.6-9.2.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3817</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3817" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3817" source="CVE"/>
    <description>
    ISC BIND 9.4.x, 9.5.x, 9.6.x, and 9.7.x before 9.7.6-P2; 9.8.x before 9.8.3-P2; 9.9.x before 9.9.1-P2; and 9.6-ESV before 9.6-ESV-R7-P2, when DNSSEC validation is enabled, does not properly initialize the failing-query cache, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) by sending many queries.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137045" comment="bind-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137046" comment="bind-chrootenv-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137047" comment="bind-doc-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137048" comment="bind-libs-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137049" comment="bind-utils-9.9.5P1-2.2.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3868</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3868" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3868" source="CVE"/>
    <description>
    Race condition in the ns_client structure management in ISC BIND 9.9.x before 9.9.1-P2 allows remote attackers to cause a denial of service (memory consumption or process exit) via a large volume of TCP queries.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137045" comment="bind-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137046" comment="bind-chrootenv-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137047" comment="bind-doc-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137048" comment="bind-libs-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137049" comment="bind-utils-9.9.5P1-2.2.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3954</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3954" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3954" source="CVE"/>
    <description>
    Multiple memory leaks in ISC DHCP 4.1.x and 4.2.x before 4.2.4-P1 and 4.1-ESV before 4.1-ESV-R6 allow remote attackers to cause a denial of service (memory consumption) by sending many requests.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137130" comment="dhcp-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137131" comment="dhcp-client-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137132" comment="dhcp-doc-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137133" comment="dhcp-relay-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137134" comment="dhcp-server-4.2.6-9.2.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3955</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3955" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3955" source="CVE"/>
    <description>
    ISC DHCP 4.1.x before 4.1-ESV-R7 and 4.2.x before 4.2.4-P2 allows remote attackers to cause a denial of service (daemon crash) in opportunistic circumstances by establishing an IPv6 lease in an environment where the lease expiration time is later reduced.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137130" comment="dhcp-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137131" comment="dhcp-client-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137132" comment="dhcp-doc-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137133" comment="dhcp-relay-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137134" comment="dhcp-server-4.2.6-9.2.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3956</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3956" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3956" source="CVE"/>
    <description>
    Use-after-free vulnerability in the MediaStreamGraphThreadRunnable::Run function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3957</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3957" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3957" source="CVE"/>
    <description>
    Heap-based buffer overflow in the nsBlockFrame::MarkLineDirty function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3958</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3958" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3958" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsHTMLEditRules::DeleteNonTableElements function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3959</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3959" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3959" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsRangeUpdater::SelAdjDeleteNode function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3960</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3960" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3960" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozSpellChecker::SetCurrentDictionary function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3961</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3961" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3961" source="CVE"/>
    <description>
    Use-after-free vulnerability in the RangeData implementation in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3962</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3962" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3962" source="CVE"/>
    <description>
    Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 do not properly iterate through the characters in a text run, which allows remote attackers to execute arbitrary code via a crafted document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3963</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3963" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3963" source="CVE"/>
    <description>
    Use-after-free vulnerability in the js::gc::MapAllocToTraceKind function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3964</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3964" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3964" source="CVE"/>
    <description>
    Use-after-free vulnerability in the gfxTextRun::GetUserData function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3965</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3965" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3965" source="CVE"/>
    <description>
    Mozilla Firefox before 15.0 does not properly restrict navigation to the about:newtab page, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site that triggers creation of a new tab and then a new window.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3966</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3966" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3966" source="CVE"/>
    <description>
    Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a negative height value in a BMP image within a .ICO file, related to (1) improper handling of the transparency bitmask by the nsICODecoder component and (2) improper processing of the alpha channel by the nsBMPDecoder component.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3967</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3967" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3967" source="CVE"/>
    <description>
    The WebGL implementation in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 on Linux, when a large number of sampler uniforms are used, does not properly interact with Mesa drivers, which allows remote attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3968</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3968" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3968" source="CVE"/>
    <description>
    Use-after-free vulnerability in the WebGL implementation in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code via vectors related to deletion of a fragment shader by its accessor.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3969</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3969" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3969" source="CVE"/>
    <description>
    Integer overflow in the nsSVGFEMorphologyElement::Filter function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code via a crafted SVG filter that triggers an incorrect sum calculation, leading to a heap-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3970</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3970" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3970" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsTArray_base::Length function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving movement of a requiredFeatures attribute from one SVG document to another.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3971</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3971" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3971" source="CVE"/>
    <description>
    Summer Institute of Linguistics (SIL) Graphite 2, as used in Mozilla Firefox before 15.0, Thunderbird before 15.0, and SeaMonkey before 2.12, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to the (1) Silf::readClassMap and (2) Pass::readPass functions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3972</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3972" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3972" source="CVE"/>
    <description>
    The format-number functionality in the XSLT implementation in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to obtain sensitive information via unspecified vectors that trigger a heap-based buffer over-read.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3973</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3973" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3973" source="CVE"/>
    <description>
    The debugger in the developer-tools subsystem in Mozilla Firefox before 15.0, when remote debugging is disabled, does not properly restrict access to the remote-debugging service, which allows remote attackers to execute arbitrary code by leveraging the presence of the HTTPMonitor extension and connecting to that service through the HTTPMonitor port.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3975</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3975" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3975" source="CVE"/>
    <description>
    The DOMParser component in Mozilla Firefox before 15.0, Thunderbird before 15.0, and SeaMonkey before 2.12 loads subresources during parsing of text/html data within an extension, which allows remote attackers to obtain sensitive information by providing crafted data to privileged extension code.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3976</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3976" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3976" source="CVE"/>
    <description>
    Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, and SeaMonkey before 2.12 do not properly handle onLocationChange events during navigation between different https sites, which allows remote attackers to spoof the X.509 certificate information in the address bar via a crafted web page.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3978</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3978" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3978" source="CVE"/>
    <description>
    The nsLocation::CheckURL function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 does not properly follow the security model of the location object, which allows remote attackers to bypass intended content-loading restrictions or possibly have unspecified other impact via vectors involving chrome code.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3980</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3980" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3980" source="CVE"/>
    <description>
    The web console in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, and Thunderbird ESR 10.x before 10.0.7 allows user-assisted remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site that injects this code and triggers an eval operation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3982</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3982" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3982" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3983</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3983" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3983" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 16.0, Thunderbird before 16.0, and SeaMonkey before 2.13 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3984</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3984" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3984" source="CVE"/>
    <description>
    Mozilla Firefox before 16.0, Thunderbird before 16.0, and SeaMonkey before 2.13 do not properly handle navigation away from a web page that has a SELECT element's menu active, which allows remote attackers to spoof page content via vectors involving absolute positioning and scrolling.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3985</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3985" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3985" source="CVE"/>
    <description>
    Mozilla Firefox before 16.0, Thunderbird before 16.0, and SeaMonkey before 2.13 do not properly implement the HTML5 Same Origin Policy, which allows remote attackers to conduct cross-site scripting (XSS) attacks by leveraging initial-origin access after document.domain has been set.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3986</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3986" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3986" source="CVE"/>
    <description>
    Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 do not properly restrict calls to DOMWindowUtils (aka nsDOMWindowUtils) methods, which allows remote attackers to bypass intended access restrictions via crafted JavaScript code.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3988</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3988" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3988" source="CVE"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 might allow user-assisted remote attackers to execute arbitrary code via vectors involving use of mozRequestFullScreen to enter full-screen mode, and use of the history.back method for backwards history navigation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3989</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3989" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3989" source="CVE"/>
    <description>
    Mozilla Firefox before 16.0, Thunderbird before 16.0, and SeaMonkey before 2.13 do not properly perform a cast of an unspecified variable during use of the instanceof operator on a JavaScript object, which allows remote attackers to execute arbitrary code or cause a denial of service (assertion failure) via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3990</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3990" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3990" source="CVE"/>
    <description>
    Use-after-free vulnerability in the IME State Manager implementation in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code via unspecified vectors, related to the nsIContent::GetNameSpaceID function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3991</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3991" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3991" source="CVE"/>
    <description>
    Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 do not properly restrict JSAPI access to the GetProperty function, which allows remote attackers to bypass the Same Origin Policy and possibly have unspecified other impact via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3992</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3992" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3992" source="CVE"/>
    <description>
    Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 do not properly manage history data, which allows remote attackers to conduct cross-site scripting (XSS) attacks or obtain sensitive POST content via vectors involving a location.hash write operation and history navigation that triggers the loading of a URL into the history object.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3993</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3993" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3993" source="CVE"/>
    <description>
    The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 does not properly interact with failures of InstallTrigger methods, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site, related to an "XrayWrapper pollution" issue.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3994</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3994" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3994" source="CVE"/>
    <description>
    Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allow remote attackers to conduct cross-site scripting (XSS) attacks via a binary plugin that uses Object.defineProperty to shadow the top object, and leverages the relationship between top.location and the location property.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3995</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-3995" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3995" source="CVE"/>
    <description>
    The IsCSSWordSpacingSpace function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4024</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4024" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4024" source="CVE"/>
    <description>
    Stack-based buffer overflow in the get_component function in unsquashfs.c in unsquashfs in Squashfs 4.2 and earlier allows remote attackers to execute arbitrary code via a crafted list file (aka a crafted file for the -ef option).  NOTE: probably in most cases, the list file is a trusted file constructed by the program's user; however, there are some realistic situations in which a list file would be obtained from an untrusted remote source.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137875" comment="squashfs-4.3-3.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4025</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4025" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4025" source="CVE"/>
    <description>
    Integer overflow in the queue_init function in unsquashfs.c in unsquashfs in Squashfs 4.2 and earlier allows remote attackers to execute arbitrary code via a crafted block_log field in the superblock of a .sqsh file, leading to a heap-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137875" comment="squashfs-4.3-3.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4048</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4048" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4048" source="CVE"/>
    <description>
    The PPP dissector in Wireshark 1.4.x before 1.4.14, 1.6.x before 1.6.9, and 1.8.x before 1.8.1 allows remote attackers to cause a denial of service (invalid pointer dereference and application crash) via a crafted packet, as demonstrated by a usbmon dump.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4049</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4049" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4049" source="CVE"/>
    <description>
    epan/dissectors/packet-nfs.c in the NFS dissector in Wireshark 1.4.x before 1.4.14, 1.6.x before 1.6.9, and 1.8.x before 1.8.1 allows remote attackers to cause a denial of service (loop and CPU consumption) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4179</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4179" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsHTMLCSSUtils::CreateCSSPropertyTxn function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4180</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4180" source="CVE"/>
    <description>
    Heap-based buffer overflow in the nsHTMLEditor::IsPrevCharInNodeWhitespace function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4181</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4181" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4181" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsSMILAnimationController::DoSample function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4182</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4182" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsTextEditRules::WillInsert function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4183</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4183" source="CVE"/>
    <description>
    Use-after-free vulnerability in the DOMSVGTests::GetRequiredFeatures function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4184</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4184" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4184" source="CVE"/>
    <description>
    The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 does not prevent access to properties of a prototype for a standard class, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4185</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4185" source="CVE"/>
    <description>
    Buffer overflow in the nsCharTraits::length function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4186</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4186" source="CVE"/>
    <description>
    Heap-based buffer overflow in the nsWaveReader::DecodeAudioData function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4187</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4187" source="CVE"/>
    <description>
    Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 do not properly manage a certain insPos variable, which allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and assertion failure) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4188</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4188" source="CVE"/>
    <description>
    Heap-based buffer overflow in the Convolve3x3 function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4191</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4191" source="CVE"/>
    <description>
    The mozilla::net::FailDelayManager::Lookup function in the WebSockets implementation in Mozilla Firefox before 16.0.1, Thunderbird before 16.0.1, and SeaMonkey before 2.13.1 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4192</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4192" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4192" source="CVE"/>
    <description>
    Mozilla Firefox 16.0, Thunderbird 16.0, and SeaMonkey 2.13 allow remote attackers to bypass the Same Origin Policy and read the properties of a Location object via a crafted web site, a related issue to CVE-2012-4193.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4193</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4193" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4193" source="CVE"/>
    <description>
    Mozilla Firefox before 16.0.1, Firefox ESR 10.x before 10.0.9, Thunderbird before 16.0.1, Thunderbird ESR 10.x before 10.0.9, and SeaMonkey before 2.13.1 omit a security check in the defaultValue function during the unwrapping of security wrappers, which allows remote attackers to bypass the Same Origin Policy and read the properties of a Location object, or execute arbitrary JavaScript code, via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4194</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4194" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4194" source="CVE"/>
    <description>
    Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2, Thunderbird ESR 10.x before 10.0.10, and SeaMonkey before 2.13.2 do not prevent use of the valueOf method to shadow the location object (aka window.location), which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving a plugin.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4195</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4195" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4195" source="CVE"/>
    <description>
    The nsLocation::CheckURL function in Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2, Thunderbird ESR 10.x before 10.0.10, and SeaMonkey before 2.13.2 does not properly determine the calling document and principal in its return value, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web site, and makes it easier for remote attackers to execute arbitrary JavaScript code by leveraging certain add-on behavior.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4196</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4196" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4196" source="CVE"/>
    <description>
    Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2, Thunderbird ESR 10.x before 10.0.10, and SeaMonkey before 2.13.2 allow remote attackers to bypass the Same Origin Policy and read the Location object via a prototype property-injection attack that defeats certain protection mechanisms for this object.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4201</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4201" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4201" source="CVE"/>
    <description>
    The evalInSandbox implementation in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 uses an incorrect context during the handling of JavaScript code that sets the location.href property, which allows remote attackers to conduct cross-site scripting (XSS) attacks or read arbitrary files by leveraging a sandboxed add-on.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4202</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4202" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4202" source="CVE"/>
    <description>
    Heap-based buffer overflow in the image::RasterImage::DrawFrameTo function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code via a crafted GIF image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4203</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4203" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4203" source="CVE"/>
    <description>
    The New Tab page in Mozilla Firefox before 17.0 uses a privileged context for execution of JavaScript code by bookmarklets, which allows user-assisted remote attackers to run arbitrary programs by leveraging a javascript: URL in a bookmark.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4204</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4204" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4204" source="CVE"/>
    <description>
    The str_unescape function in the JavaScript engine in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4205</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4205" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4205" source="CVE"/>
    <description>
    Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 assign the system principal, rather than the sandbox principal, to XMLHttpRequest objects created in sandboxes, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks or obtain sensitive information by leveraging a sandboxed add-on.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4207</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4207" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4207" source="CVE"/>
    <description>
    The HZ-GB-2312 character-set implementation in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 does not properly handle a ~ (tilde) character in proximity to a chunk delimiter, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4208</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4208" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4208" source="CVE"/>
    <description>
    The XrayWrapper implementation in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 does not consider the compartment during property filtering, which allows remote attackers to bypass intended chrome-only restrictions on reading DOM object properties via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4209</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4209" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4209" source="CVE"/>
    <description>
    Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 do not prevent use of a "top" frame name-attribute value to access the location property, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving a binary plugin.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4210</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4210" source="CVE"/>
    <description>
    The Style Inspector in Mozilla Firefox before 17.0 and Firefox ESR 10.x before 10.0.11 does not properly restrict the context of HTML markup and Cascading Style Sheets (CSS) token sequences, which allows user-assisted remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted stylesheet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4212</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4212" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4212" source="CVE"/>
    <description>
    Use-after-free vulnerability in the XPCWrappedNative::Mark function in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4213</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4213" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4213" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsEditor::FindNextLeafNode function in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4214</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4214" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4214" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsTextEditorState::PrepareEditor function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-5840.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4215</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4215" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4215" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsPlaintextEditor::FireClipboardEvent function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4216</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4216" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4216" source="CVE"/>
    <description>
    Use-after-free vulnerability in the gfxFont::GetFontEntry function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4217</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4217" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4217" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsViewManager::ProcessPendingUpdates function in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4218</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4218" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4218" source="CVE"/>
    <description>
    Use-after-free vulnerability in the BuildTextRunsScanner::BreakSink::SetBreaks function in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4244</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4244" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4244" source="CVE"/>
    <description>
    ISC BIND 9.x before 9.7.6-P3, 9.8.x before 9.8.3-P3, 9.9.x before 9.9.1-P3, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P3 allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for a long resource record.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137045" comment="bind-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137046" comment="bind-chrootenv-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137047" comment="bind-doc-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137048" comment="bind-libs-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137049" comment="bind-utils-9.9.5P1-2.2.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4285</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4285" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4285" source="CVE"/>
    <description>
    The dissect_pft function in epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a zero-length message.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4286</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4286" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4286" source="CVE"/>
    <description>
    The pcapng_read_packet_block function in wiretap/pcapng.c in the pcap-ng file parser in Wireshark 1.8.x before 1.8.2 allows user-assisted remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted pcap-ng file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4287</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4287" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4287" source="CVE"/>
    <description>
    epan/dissectors/packet-mongo.c in the MongoDB dissector in Wireshark 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop and CPU consumption) via a small value for a BSON document length.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4288</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4288" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4288" source="CVE"/>
    <description>
    Integer overflow in the dissect_xtp_ecntl function in epan/dissectors/packet-xtp.c in the XTP dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop or application crash) via a large value for a span length.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4289</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4289" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4289" source="CVE"/>
    <description>
    epan/dissectors/packet-afp.c in the AFP dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop and CPU consumption) via a large number of ACL entries.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4290</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4290" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4290" source="CVE"/>
    <description>
    The CTDB dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop and CPU consumption) via a malformed packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4291</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4291" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4291" source="CVE"/>
    <description>
    The CIP dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (memory consumption) via a malformed packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4292</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4292" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4292" source="CVE"/>
    <description>
    The dissect_stun_message function in epan/dissectors/packet-stun.c in the STUN dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 does not properly interact with key-destruction behavior in a certain tree library, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4293</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4293" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4293" source="CVE"/>
    <description>
    plugins/ethercat/packet-ecatmb.c in the EtherCAT Mailbox dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 does not properly handle certain integer fields, which allows remote attackers to cause a denial of service (application exit) via a malformed packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4294</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4294" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4294" source="CVE"/>
    <description>
    Buffer overflow in the channelised_fill_sdh_g707_format function in epan/dissectors/packet-erf.c in the ERF dissector in Wireshark 1.8.x before 1.8.2 allows remote attackers to execute arbitrary code via a large speed (aka rate) value.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4295</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4295" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4295" source="CVE"/>
    <description>
    Array index error in the channelised_fill_sdh_g707_format function in epan/dissectors/packet-erf.c in the ERF dissector in Wireshark 1.8.x before 1.8.2 might allow remote attackers to cause a denial of service (application crash) via a crafted speed (aka rate) value.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4296</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4296" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4296" source="CVE"/>
    <description>
    Buffer overflow in epan/dissectors/packet-rtps2.c in the RTPS2 dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (CPU consumption) via a malformed packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4297</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4297" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4297" source="CVE"/>
    <description>
    Buffer overflow in the dissect_gsm_rlcmac_downlink function in epan/dissectors/packet-gsm_rlcmac.c in the GSM RLC MAC dissector in Wireshark 1.6.x before 1.6.10 and 1.8.x before 1.8.2 allows remote attackers to execute arbitrary code via a malformed packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4298</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4298" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4298" source="CVE"/>
    <description>
    Integer signedness error in the vwr_read_rec_data_ethernet function in wiretap/vwr.c in the Ixia IxVeriWave file parser in Wireshark 1.8.x before 1.8.2 allows user-assisted remote attackers to execute arbitrary code via a crafted packet-trace file that triggers a buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4411</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4411" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4411" source="CVE"/>
    <description>
    The graphical console in Xen 4.0, 4.1 and 4.2 allows local OS guest administrators to obtain sensitive host resource information via the qemu monitor.  NOTE: this might be a duplicate of CVE-2007-0998.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4412</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4412" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4412" source="CVE"/>
    <description>
    Integer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a heap-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137226" comment="glibc-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137227" comment="glibc-32bit-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137228" comment="glibc-devel-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137229" comment="glibc-extra-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137230" comment="glibc-info-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137231" comment="glibc-locale-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137232" comment="glibc-locale-32bit-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137233" comment="nscd-2.19-16.2.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4414</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4414" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4414" source="CVE"/>
    <description>
    Multiple SQL injection vulnerabilities in the replication code in Oracle MySQL possibly before 5.5.29, and MariaDB 5.1.x through 5.1.62, 5.2.x through 5.2.12, 5.3.x through 5.3.7, and 5.5.x through 5.5.25, allow remote authenticated users to execute arbitrary SQL commands via vectors related to the binary log.  NOTE: as of 20130116, Oracle has not commented on claims from a downstream vendor that the fix in MySQL 5.5.29 is incomplete.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137547" comment="libmysqlclient-devel-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137548" comment="libmysqlclient18-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137549" comment="libmysqlclient18-32bit-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137550" comment="libmysqlclient_r18-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137551" comment="libmysqld18-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137552" comment="mariadb-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137553" comment="mariadb-client-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137554" comment="mariadb-errormessages-10.0.13-2.3.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4416</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4416" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4416" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Hotspot.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4425</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4425" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4425" source="CVE"/>
    <description>
    libgio, when used in setuid or other privileged programs in spice-gtk and possibly other products, allows local users to gain privileges and execute arbitrary code via the DBUS_SYSTEM_BUS_ADDRESS environment variable.  NOTE: it could be argued that this is a vulnerability in the applications that do not cleanse environment variables, not in libgio itself.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137693" comment="libspice-client-glib-2_0-8-0.25-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137694" comment="libspice-client-gtk-2_0-4-0.25-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137695" comment="libspice-client-gtk-3_0-4-0.25-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137696" comment="libspice-controller0-0.25-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137697" comment="python-SpiceClientGtk-0.25-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137698" comment="typelib-1_0-SpiceClientGlib-2_0-0.25-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137699" comment="typelib-1_0-SpiceClientGtk-2_0-0.25-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4453</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4453" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4453" source="CVE"/>
    <description>
    dracut.sh in dracut, as used in Red Hat Enterprise Linux 6, Fedora 16 and 17, and possibly other products, creates initramfs images with world-readable permissions, which might allow local users to obtain sensitive information.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137138" comment="dracut-037-17.6.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4504</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4504" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4504" source="CVE"/>
    <description>
    Stack-based buffer overflow in the url::get_pac function in url.cpp in libproxy 0.4.x before 0.4.9 allows remote servers to have an unspecified impact via a large proxy.pac file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137587" comment="libproxy-devel-0.4.11-12.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137588" comment="libproxy1-0.4.11-12.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137589" comment="libproxy1-config-gnome3-0.4.11-12.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137590" comment="libproxy1-config-kde4-0.4.11-12.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137591" comment="libproxy1-networkmanager-0.4.11-12.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137592" comment="libproxy1-pacrunner-webkit-0.4.11-12.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4507</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4507" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4507" source="CVE"/>
    <description>
    The strchr function in procmime.c in Claws Mail (aka claws-mail) 3.8.1 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted email.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137057" comment="claws-mail-3.10.1-2.1.11 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137058" comment="claws-mail-lang-3.10.1-2.1.11 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4510</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4510" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4510" source="CVE"/>
    <description>
    cups-pk-helper before 0.2.3 does not properly wrap the (1) cupsGetFile and (2) cupsPutFile function calls, which allows user-assisted remote attackers to read or overwrite sensitive files using CUPS resources.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137105" comment="cups-pk-helper-0.2.5-4.1.4 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4535</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4535" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4535" source="CVE"/>
    <description>
    Xen 3.4 through 4.2, and possibly earlier versions, allows local guest OS administrators to cause a denial of service (Xen infinite loop and physical CPU consumption) by setting a VCPU with an "inappropriate deadline."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4536</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4536" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4536" source="CVE"/>
    <description>
    The (1) domain_pirq_to_emuirq and (2) physdev_unmap_pirq functions in Xen 2.2 allows local guest OS administrators to cause a denial of service (Xen crash) via a crafted pirq value that triggers an out-of-bounds read.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4537</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4537" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4537" source="CVE"/>
    <description>
    Xen 3.4 through 4.2, and possibly earlier versions, does not properly synchronize the p2m and m2p tables when the set_p2m_entry function fails, which allows local HVM guest OS administrators to cause a denial of service (memory consumption and assertion failure), aka "Memory mapping failure DoS vulnerability."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4538</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4538" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4538" source="CVE"/>
    <description>
    The HVMOP_pagetable_dying hypercall in Xen 4.0, 4.1, and 4.2 does not properly check the pagetable state when running on shadow pagetables, which allows a local HVM guest OS to cause a denial of service (hypervisor crash) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4539</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4539" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4539" source="CVE"/>
    <description>
    Xen 4.0 through 4.2, when running 32-bit x86 PV guests on 64-bit hypervisors, allows local guest OS administrators to cause a denial of service (infinite loop and hang or crash) via invalid arguments to GNTTABOP_get_status_frames, aka "Grant table hypercall infinite loop DoS vulnerability."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4540</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4540" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4540" source="CVE"/>
    <description>
    Off-by-one error in the invoke function in IcedTeaScriptablePluginObject.cc in IcedTea-Web 1.1.x before 1.1.7, 1.2.x before 1.2.2, 1.3.x before 1.3.1, and 1.4.x before 1.4.1 allows remote attackers to obtain sensitive information, cause a denial of service (crash), or possibly execute arbitrary code via a crafted webpage that triggers a heap-based buffer overflow, related to an error message and a "triggering event attached to applet." NOTE: the 1.4.x versions were originally associated with CVE-2013-4349, but that entry has been MERGED with this one.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114419" comment="icedtea-web-1.6.1-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137274" comment="icedtea-web-javadoc-1.5.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137275" comment="java-1_7_0-openjdk-plugin-1.5.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137276" comment="java-1_8_0-openjdk-plugin-1.5.1-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4544</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4544" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4544" source="CVE"/>
    <description>
    The PV domain builder in Xen 4.2 and earlier does not validate the size of the kernel or ramdisk (1) before or (2) after decompression, which allows local guest administrators to cause a denial of service (domain 0 memory consumption) via a crafted (a) kernel or (b) ramdisk.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4559</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4559" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4559" source="CVE"/>
    <description>
    Multiple double free vulnerabilities in the (1) agent_sign_data function in agent.c, (2) channel_request function in channels.c, (3) ssh_userauth_pubkey function in auth.c, (4) sftp_parse_attr_3 function in sftp.c, and (5) try_publickey_from_file function in keyfiles.c in libssh before 0.5.3 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137700" comment="libssh-devel-0.6.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137701" comment="libssh4-0.6.3-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4560</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4560" source="CVE"/>
    <description>
    Multiple buffer overflows in libssh before 0.5.3 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137700" comment="libssh-devel-0.6.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137701" comment="libssh4-0.6.3-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4561</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4561" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4561" source="CVE"/>
    <description>
    The (1) publickey_make_dss, (2) publickey_make_rsa, (3) signature_from_string, (4) ssh_do_sign, and (5) ssh_sign_session_id functions in keys.c in libssh before 0.5.3 free "an invalid pointer on an error path," which might allow remote attackers to cause a denial of service (crash) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137700" comment="libssh-devel-0.6.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137701" comment="libssh4-0.6.3-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4564</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4564" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4564" source="CVE"/>
    <description>
    ppm2tiff does not check the return value of the TIFFScanlineSize function, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PPM image that triggers an integer overflow, a zero-memory allocation, and a heap-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137719" comment="libtiff-devel-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137720" comment="libtiff5-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137721" comment="libtiff5-32bit-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137722" comment="tiff-4.0.3-10.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4681</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4681" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4681" source="CVE"/>
    <description>
    Multiple vulnerabilities in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier allow remote attackers to execute arbitrary code via a crafted applet that bypasses SecurityManager restrictions by (1) using com.sun.beans.finder.ClassFinder.findClass and leveraging an exception with the forName method to access restricted classes from arbitrary packages such as sun.awt.SunToolkit, then (2) using "reflection with a trusted immediate caller" to leverage the getField method to access and modify private fields, as exploited in the wild in August 2012 using Gondzz.class and Gondvv.class.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4929</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-4929" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4929" source="CVE"/>
    <description>
    The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137616" comment="libqt4-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137617" comment="libqt4-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137618" comment="libqt4-devel-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137619" comment="libqt4-linguist-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137620" comment="libqt4-qt3support-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137621" comment="libqt4-qt3support-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137622" comment="libqt4-sql-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137623" comment="libqt4-sql-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137624" comment="libqt4-sql-mysql-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137625" comment="libqt4-sql-mysql-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137626" comment="libqt4-sql-postgresql-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137627" comment="libqt4-sql-postgresql-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137628" comment="libqt4-sql-sqlite-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137629" comment="libqt4-sql-sqlite-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137630" comment="libqt4-sql-unixODBC-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137631" comment="libqt4-sql-unixODBC-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137632" comment="libqt4-x11-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137633" comment="libqt4-x11-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137797" comment="links-2.8-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137800" comment="lynx-2.8.8rel.2-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137900" comment="w3m-0.5.3-155.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137901" comment="wget-1.15-4.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5068</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5068" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5068" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5069</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5069" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5069" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Concurrency.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5070</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5070" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5070" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier allows remote attackers to affect confidentiality, related to JMX.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5071</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5071" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5071" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality and integrity, related to JMX.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5072</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5072" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5072" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality via unknown vectors related to Security.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5073</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5073" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5073" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect integrity via unknown vectors related to Libraries, a different vulnerability than CVE-2012-5079.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5074</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5074" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5074" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier allows remote attackers to affect confidentiality and integrity, related to JAX-WS.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5075</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5075" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5075" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality, related to JMX.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5076</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5076" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5076" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to JAX-WS.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5077</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5077" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Security.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5079</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5079" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5079" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect integrity via unknown vectors related to Libraries, a different vulnerability than CVE-2012-5073.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5081</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5081" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5081" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect availability, related to JSSE.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5084</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5084" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5084" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5085</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5085" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5085" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote authenticated users to have an unspecified impact via unknown vectors related to Networking.  NOTE: the Oracle CPU states that this issue has a 0.0 CVSS score. If so, then this is not a vulnerability and this issue should not be included in CVE.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5086</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5086" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5086" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5087</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5087" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5087" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5088</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5088" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5088" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5089</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5089" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5089" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to JMX, a different vulnerability than CVE-2012-3143.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5112</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5112" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5112" source="CVE"/>
    <description>
    Use-after-free vulnerability in the SVG implementation in WebKit, as used in Google Chrome before 22.0.1229.94, allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137517" comment="libjavascriptcoregtk-1_0-0-2.4.6-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137518" comment="libjavascriptcoregtk-3_0-0-2.4.6-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137519" comment="libwebkitgtk-1_0-0-2.4.6-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137520" comment="libwebkitgtk-3_0-0-2.4.6-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137521" comment="libwebkitgtk-devel-2.4.6-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137522" comment="typelib-1_0-JavaScriptCore-1_0-2.4.6-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137523" comment="typelib-1_0-JavaScriptCore-3_0-2.4.6-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137524" comment="typelib-1_0-WebKit-1_0-2.4.6-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137525" comment="typelib-1_0-WebKit-3_0-2.4.6-1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5133</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5133" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5133" source="CVE"/>
    <description>
    Use-after-free vulnerability in Google Chrome before 23.0.1271.91 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to SVG filters.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137517" comment="libjavascriptcoregtk-1_0-0-2.4.6-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137518" comment="libjavascriptcoregtk-3_0-0-2.4.6-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137519" comment="libwebkitgtk-1_0-0-2.4.6-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137520" comment="libwebkitgtk-3_0-0-2.4.6-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137521" comment="libwebkitgtk-devel-2.4.6-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137522" comment="typelib-1_0-JavaScriptCore-1_0-2.4.6-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137523" comment="typelib-1_0-JavaScriptCore-3_0-2.4.6-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137524" comment="typelib-1_0-WebKit-1_0-2.4.6-1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137525" comment="typelib-1_0-WebKit-3_0-2.4.6-1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5134</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5134" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5134" source="CVE"/>
    <description>
    Heap-based buffer underflow in the xmlParseAttValueComplex function in parser.c in libxml2 2.9.0 and earlier, as used in Google Chrome before 23.0.1271.91 and other products, allows remote attackers to cause a denial of service or possibly execute arbitrary code via crafted entities in an XML document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137790" comment="libxml2-2-2.9.1-7.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137791" comment="libxml2-2-32bit-2.9.1-7.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137792" comment="libxml2-devel-2.9.1-7.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137793" comment="libxml2-tools-2.9.1-7.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137854" comment="python-libxml2-2.9.1-7.2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5166</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5166" source="CVE"/>
    <description>
    ISC BIND 9.x before 9.7.6-P4, 9.8.x before 9.8.3-P4, 9.9.x before 9.9.1-P4, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P4 allows remote attackers to cause a denial of service (named daemon hang) via unspecified combinations of resource records.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137045" comment="bind-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137046" comment="bind-chrootenv-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137047" comment="bind-doc-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137048" comment="bind-libs-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137049" comment="bind-utils-9.9.5P1-2.2.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5237</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5237" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5237" source="CVE"/>
    <description>
    The dissect_hsrp function in epan/dissectors/packet-hsrp.c in the HSRP dissector in Wireshark 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5238</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5238" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5238" source="CVE"/>
    <description>
    epan/dissectors/packet-ppp.c in the PPP dissector in Wireshark 1.8.x before 1.8.3 uses incorrect OUI data structures during the decoding of (1) PPP and (2) LCP data, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a malformed packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5239</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5239" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5239" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-3548.  Reason: This candidate is a reservation duplicate of CVE-2012-3548.  Notes: All CVE users should reference CVE-2012-3548 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5240</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5240" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5240" source="CVE"/>
    <description>
    Buffer overflow in the dissect_tlv function in epan/dissectors/packet-ldp.c in the LDP dissector in Wireshark 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a malformed packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5468</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5468" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5468" source="CVE"/>
    <description>
    Heap-based buffer overflow in iconvert.c in the bogolexer component in Bogofilter before 1.2.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an email containing a base64 string that is decoded to incomplete multibyte characters.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137050" comment="bogofilter-1.2.4-4.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5510</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5510" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5510" source="CVE"/>
    <description>
    Xen 4.x, when downgrading the grant table version, does not properly remove the status page from the tracking list when freeing the page, which allows local guest OS administrators to cause a denial of service (hypervisor crash) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5511</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5511" source="CVE"/>
    <description>
    Stack-based buffer overflow in the dirty video RAM tracking functionality in Xen 3.4 through 4.1 allows local HVM guest OS administrators to cause a denial of service (crash) via a large bitmap image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5513</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5513" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5513" source="CVE"/>
    <description>
    The XENMEM_exchange handler in Xen 4.2 and earlier does not properly check the memory address, which allows local PV guest OS administrators to cause a denial of service (crash) or possibly gain privileges via unspecified vectors that overwrite memory in the hypervisor reserved range.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5514</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5514" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5514" source="CVE"/>
    <description>
    The guest_physmap_mark_populate_on_demand function in Xen 4.2 and earlier does not properly unlock the subject GFNs when checking if they are in use, which allows local guest HVM administrators to cause a denial of service (hang) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5515</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5515" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5515" source="CVE"/>
    <description>
    The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 4.2 and earlier allow local guest administrators to cause a denial of service (long loop and hang) via a crafted extent_order value.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5519</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5519" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5519" source="CVE"/>
    <description>
    CUPS 1.4.4, when running in certain Linux distributions such as Debian GNU/Linux, stores the web interface administrator key in /var/run/cups/certs/0 using certain permissions, which allows local users in the lpadmin group to read or write arbitrary files as root by leveraging the web interface.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137098" comment="cups-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137099" comment="cups-client-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110484" comment="cups-ddk-1.5.4-21.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137100" comment="cups-devel-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137101" comment="cups-libs-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137102" comment="cups-libs-32bit-1.5.4-21.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5525</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5525" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5525" source="CVE"/>
    <description>
    The get_page_from_gfn hypercall function in Xen 4.2 allows local PV guest OS administrators to cause a denial of service (crash) via a crafted GFN that triggers a buffer over-read.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5532</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5532" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5532" source="CVE"/>
    <description>
    The main function in tools/hv/hv_kvp_daemon.c in hypervkvpd, as distributed in the Linux kernel before 3.8-rc1, allows local users to cause a denial of service (daemon exit) via a crafted application that sends a Netlink message.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2012-2669.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137272" comment="hyper-v-6-8.2.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5576</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5576" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5576" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in file-xwd.c in the X Window Dump (XWD) plug-in in GIMP 2.8.2 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large (1) red, (2) green, or (3) blue color mask in an XWD file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137199" comment="gimp-2.8.14-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137200" comment="gimp-help-browser-2.8.14-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137201" comment="gimp-plugin-aa-2.8.14-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137202" comment="gimp-plugins-python-2.8.14-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137203" comment="libgimp-2_0-0-2.8.14-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137204" comment="libgimpui-2_0-0-2.8.14-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5592</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5592" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5592" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6052.  Reason: This candidate is a reservation duplicate of CVE-2012-6052.  Notes: All CVE users should reference CVE-2012-6052 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5593</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5593" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5593" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6053.  Reason: This candidate is a reservation duplicate of CVE-2012-6053.  Notes: All CVE users should reference CVE-2012-6053 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5594</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5594" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5594" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6054.  Reason: This candidate is a reservation duplicate of CVE-2012-6054.  Notes: All CVE users should reference CVE-2012-6054 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5595</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5595" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5595" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6056.  Reason: This candidate is a reservation duplicate of CVE-2012-6056.  Notes: All CVE users should reference CVE-2012-6056 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5596</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5596" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5596" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6057.  Reason: This candidate is a reservation duplicate of CVE-2012-6057.  Notes: All CVE users should reference CVE-2012-6057 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5597</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5597" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5597" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6059.  Reason: This candidate is a reservation duplicate of CVE-2012-6059.  Notes: All CVE users should reference CVE-2012-6059 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5598</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5598" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5598" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6060.  Reason: This candidate is a reservation duplicate of CVE-2012-6060.  Notes: All CVE users should reference CVE-2012-6060 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5599</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5599" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5599" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6061.  Reason: This candidate is a reservation duplicate of CVE-2012-6061.  Notes: All CVE users should reference CVE-2012-6061 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5600</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5600" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5600" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6062.  Reason: This candidate is a reservation duplicate of CVE-2012-6062.  Notes: All CVE users should reference CVE-2012-6062 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5601</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5601" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5601" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6055.  Reason: This candidate is a reservation duplicate of CVE-2012-6055.  Notes: All CVE users should reference CVE-2012-6055 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5602</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5602" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5602" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6058.  Reason: This candidate is a reservation duplicate of CVE-2012-6058.  Notes: All CVE users should reference CVE-2012-6058 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5611</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5611" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5611" source="CVE"/>
    <description>
    Stack-based buffer overflow in the acl_get function in Oracle MySQL 5.5.19 and other versions through 5.5.28, and 5.1.53 and other versions through 5.1.66, and MariaDB 5.5.2.x before 5.5.28a, 5.3.x before 5.3.11, 5.2.x before 5.2.13 and 5.1.x before 5.1.66, allows remote authenticated users to execute arbitrary code via a long argument to the GRANT FILE command.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137547" comment="libmysqlclient-devel-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137548" comment="libmysqlclient18-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137549" comment="libmysqlclient18-32bit-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137550" comment="libmysqlclient_r18-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137551" comment="libmysqld18-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137552" comment="mariadb-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137553" comment="mariadb-client-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137554" comment="mariadb-errormessages-10.0.13-2.3.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5612</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5612" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5612" source="CVE"/>
    <description>
    Heap-based buffer overflow in Oracle MySQL 5.5.19 and other versions through 5.5.28, and MariaDB 5.5.28a and possibly other versions, allows remote authenticated users to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code, as demonstrated using certain variations of the (1) USE, (2) SHOW TABLES, (3) DESCRIBE, (4) SHOW FIELDS FROM, (5) SHOW COLUMNS FROM, (6) SHOW INDEX FROM, (7) CREATE TABLE, (8) DROP TABLE, (9) ALTER TABLE, (10) DELETE FROM, (11) UPDATE, and (12) SET PASSWORD commands.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137547" comment="libmysqlclient-devel-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137548" comment="libmysqlclient18-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137549" comment="libmysqlclient18-32bit-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137550" comment="libmysqlclient_r18-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137551" comment="libmysqld18-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137552" comment="mariadb-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137553" comment="mariadb-client-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137554" comment="mariadb-errormessages-10.0.13-2.3.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5615</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5615" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5615" source="CVE"/>
    <description>
    Oracle MySQL 5.5.38 and earlier, 5.6.19 and earlier, and MariaDB 5.5.28a, 5.3.11, 5.2.13, 5.1.66, and possibly other versions, generates different error messages with different time delays depending on whether a user name exists, which allows remote attackers to enumerate valid usernames.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137547" comment="libmysqlclient-devel-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137548" comment="libmysqlclient18-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137549" comment="libmysqlclient18-32bit-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137550" comment="libmysqlclient_r18-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137551" comment="libmysqld18-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137552" comment="mariadb-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137553" comment="mariadb-client-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137554" comment="mariadb-errormessages-10.0.13-2.3.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5627</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5627" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5627" source="CVE"/>
    <description>
    Oracle MySQL and MariaDB 5.5.x before 5.5.29, 5.3.x before 5.3.12, and 5.2.x before 5.2.14 does not modify the salt during multiple executions of the change_user command within the same connection which makes it easier for remote authenticated users to conduct brute force password guessing attacks.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137547" comment="libmysqlclient-devel-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137548" comment="libmysqlclient18-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137549" comment="libmysqlclient18-32bit-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137550" comment="libmysqlclient_r18-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137551" comment="libmysqld18-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137552" comment="mariadb-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137553" comment="mariadb-client-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137554" comment="mariadb-errormessages-10.0.13-2.3.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5634</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5634" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5634" source="CVE"/>
    <description>
    Xen 4.2.x, 4.1.x, and 4.0, when using Intel VT-d for PCI passthrough, does not properly configure VT-d when supporting a device that is behind a legacy PCI Bridge, which allows local guests to cause a denial of service to other guests by injecting an interrupt.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5643</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5643" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5643" source="CVE"/>
    <description>
    Multiple memory leaks in tools/cachemgr.cc in cachemgr.cgi in Squid 2.x and 3.x before 3.1.22, 3.2.x before 3.2.4, and 3.3.x before 3.3.0.2 allow remote attackers to cause a denial of service (memory consumption) via (1) invalid Content-Length headers, (2) long POST requests, or (3) crafted authentication credentials.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137876" comment="squid-3.4.4-3.1.14 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5668</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5668" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5668" source="CVE"/>
    <description>
    FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to BDF fonts and the improper handling of an "allocation error" in the bdf_free_font function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137173" comment="freetype2-devel-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137176" comment="ft2demos-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137174" comment="libfreetype6-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137175" comment="libfreetype6-32bit-2.5.3-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5669</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5669" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5669" source="CVE"/>
    <description>
    The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to BDF fonts and an incorrect calculation that triggers an out-of-bounds read.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137173" comment="freetype2-devel-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137176" comment="ft2demos-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137174" comment="libfreetype6-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137175" comment="libfreetype6-32bit-2.5.3-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5670</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5670" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5670" source="CVE"/>
    <description>
    The _bdf_parse_glyphs function in FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) via vectors related to BDF fonts and an ENCODING field with a negative value.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137173" comment="freetype2-devel-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137176" comment="ft2demos-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137174" comment="libfreetype6-2.5.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137175" comment="libfreetype6-32bit-2.5.3-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5671</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5671" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5671" source="CVE"/>
    <description>
    Heap-based buffer overflow in the dkim_exim_query_dns_txt function in dkim.c in Exim 4.70 through 4.80, when DKIM support is enabled and acl_smtp_connect and acl_smtp_rcpt are not set to "warn control = dkim_disable_verify," allows remote attackers to execute arbitrary code via an email from a malicious DNS server.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137159" comment="exim-4.83-3.1.8 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5688</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5688" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5688" source="CVE"/>
    <description>
    ISC BIND 9.8.x before 9.8.4-P1 and 9.9.x before 9.9.2-P1, when DNS64 is enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted query.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137045" comment="bind-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137046" comment="bind-chrootenv-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137047" comment="bind-doc-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137048" comment="bind-libs-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137049" comment="bind-utils-9.9.5P1-2.2.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5689</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5689" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5689" source="CVE"/>
    <description>
    ISC BIND 9.8.x through 9.8.4-P1 and 9.9.x through 9.9.2-P1, in certain configurations involving DNS64 with a Response Policy Zone that lacks an AAAA rewrite rule, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for an AAAA record.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137045" comment="bind-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137046" comment="bind-chrootenv-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137047" comment="bind-doc-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137048" comment="bind-libs-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137049" comment="bind-utils-9.9.5P1-2.2.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5783</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5783" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5783" source="CVE"/>
    <description>
    Apache Commons HttpClient 3.x, as used in Amazon Flexible Payments Service (FPS) merchant Java SDK and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136943" comment="apache-commons-httpclient-3.1-7.1.10 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5829</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5829" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5829" source="CVE"/>
    <description>
    Heap-based buffer overflow in the nsWindow::OnExposeEvent function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5830</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5830" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5830" source="CVE"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 on Mac OS X allows remote attackers to execute arbitrary code via an HTML document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5833</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5833" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5833" source="CVE"/>
    <description>
    The texImage2D implementation in the WebGL subsystem in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 does not properly interact with Mesa drivers, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via function calls involving certain values of the level parameter.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5835</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5835" source="CVE"/>
    <description>
    Integer overflow in the WebGL subsystem in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (invalid write operation) via crafted data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5836</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5836" source="CVE"/>
    <description>
    Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving the setting of Cascading Style Sheets (CSS) properties in conjunction with SVG text.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5837</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5837" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5837" source="CVE"/>
    <description>
    The Web Developer Toolbar in Mozilla Firefox before 17.0 executes script with chrome privileges, which allows user-assisted remote attackers to conduct cross-site scripting (XSS) attacks via a crafted string.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5838</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5838" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5838" source="CVE"/>
    <description>
    The copyTexImage2D implementation in the WebGL subsystem in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via large image dimensions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5839</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5839" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5839" source="CVE"/>
    <description>
    Heap-based buffer overflow in the gfxShapedWord::CompressedGlyph::IsClusterStart function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5840</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5840" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5840" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsTextEditorState::PrepareEditor function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-4214.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5841</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5841" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5841" source="CVE"/>
    <description>
    Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 implement cross-origin wrappers with a filtering behavior that does not properly restrict write actions, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5842</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5842" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5842" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5843</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5843" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5843" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5958</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5958" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5958" source="CVE"/>
    <description>
    Stack-based buffer overflow in the unique_service_name function in ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices (aka libupnp, formerly the Intel SDK for UPnP devices) before 1.6.18 allows remote attackers to execute arbitrary code via a UDP packet with a crafted string that is not properly handled after a certain pointer subtraction.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137725" comment="libupnp6-1.6.18-4.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5959</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5959" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5959" source="CVE"/>
    <description>
    Stack-based buffer overflow in the unique_service_name function in ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices (aka libupnp, formerly the Intel SDK for UPnP devices) before 1.6.18 allows remote attackers to execute arbitrary code via a long UDN (aka uuid) field within a string that contains a :: (colon colon) in a UDP packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137725" comment="libupnp6-1.6.18-4.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5960</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5960" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5960" source="CVE"/>
    <description>
    Stack-based buffer overflow in the unique_service_name function in ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices (aka libupnp, formerly the Intel SDK for UPnP devices) before 1.6.18 allows remote attackers to execute arbitrary code via a long UDN (aka upnp:rootdevice) field in a UDP packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137725" comment="libupnp6-1.6.18-4.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5961</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5961" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5961" source="CVE"/>
    <description>
    Stack-based buffer overflow in the unique_service_name function in ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices (aka libupnp, formerly the Intel SDK for UPnP devices) 1.3.1 allows remote attackers to execute arbitrary code via a long UDN (aka device) field in a UDP packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137725" comment="libupnp6-1.6.18-4.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5962</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5962" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5962" source="CVE"/>
    <description>
    Stack-based buffer overflow in the unique_service_name function in ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices (aka libupnp, formerly the Intel SDK for UPnP devices) 1.3.1 allows remote attackers to execute arbitrary code via a long DeviceType (aka urn) field in a UDP packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137725" comment="libupnp6-1.6.18-4.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5963</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5963" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5963" source="CVE"/>
    <description>
    Stack-based buffer overflow in the unique_service_name function in ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices (aka libupnp, formerly the Intel SDK for UPnP devices) 1.3.1 allows remote attackers to execute arbitrary code via a long UDN (aka uuid) field within a string that lacks a :: (colon colon) in a UDP packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137725" comment="libupnp6-1.6.18-4.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5964</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5964" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5964" source="CVE"/>
    <description>
    Stack-based buffer overflow in the unique_service_name function in ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices (aka libupnp, formerly the Intel SDK for UPnP devices) 1.3.1 allows remote attackers to execute arbitrary code via a long ServiceType (aka urn service) field in a UDP packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137725" comment="libupnp6-1.6.18-4.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5965</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-5965" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5965" source="CVE"/>
    <description>
    Stack-based buffer overflow in the unique_service_name function in ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices (aka libupnp, formerly the Intel SDK for UPnP devices) 1.3.1 allows remote attackers to execute arbitrary code via a long DeviceType (aka urn device) field in a UDP packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137725" comment="libupnp6-1.6.18-4.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6075</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-6075" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6075" source="CVE"/>
    <description>
    Buffer overflow in the e1000_receive function in the e1000 device driver (hw/e1000.c) in QEMU 1.3.0-rc2 and other versions, when the SBP and LPE flags are disabled, allows remote attackers to cause a denial of service (guest OS crash) and possibly execute arbitrary guest code via a large packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6093</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-6093" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6093" source="CVE"/>
    <description>
    The QSslSocket::sslErrors function in Qt before 4.6.5, 4.7.x before 4.7.6, 4.8.x before 4.8.5, when using certain versions of openSSL, uses an "incompatible structure layout" that can read memory from the wrong location, which causes Qt to report an incorrect error when certificate validation fails and might cause users to make unsafe security decisions to accept a certificate.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137616" comment="libqt4-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137617" comment="libqt4-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137618" comment="libqt4-devel-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137619" comment="libqt4-linguist-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137620" comment="libqt4-qt3support-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137621" comment="libqt4-qt3support-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137622" comment="libqt4-sql-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137623" comment="libqt4-sql-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137624" comment="libqt4-sql-mysql-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137625" comment="libqt4-sql-mysql-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137626" comment="libqt4-sql-postgresql-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137627" comment="libqt4-sql-postgresql-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137628" comment="libqt4-sql-sqlite-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137629" comment="libqt4-sql-sqlite-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137630" comment="libqt4-sql-unixODBC-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137631" comment="libqt4-sql-unixODBC-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137632" comment="libqt4-x11-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137633" comment="libqt4-x11-32bit-4.8.6-4.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6128</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-6128" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6128" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in http.c in OpenConnect before 4.08 allow remote VPN gateways to cause a denial of service (application crash) via a long (1) hostname, (2) path, or (3) cookie list in a response.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137812" comment="openconnect-6.00-3.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137813" comment="openconnect-devel-6.00-3.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6150</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-6150" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6150" source="CVE"/>
    <description>
    The winbind_name_list_to_sid_string_list function in nsswitch/pam_winbind.c in Samba through 4.1.2 handles invalid require_membership_of group names by accepting authentication by any user, which allows remote authenticated users to bypass intended access restrictions in opportunistic circumstances by leveraging an administrator's pam_winbind configuration-file mistake.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137424" comment="libdcerpc-binding0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137425" comment="libdcerpc-binding0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137426" comment="libdcerpc0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137427" comment="libdcerpc0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137428" comment="libgensec0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137429" comment="libgensec0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137430" comment="libndr-krb5pac0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137431" comment="libndr-krb5pac0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137432" comment="libndr-nbt0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137433" comment="libndr-nbt0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137434" comment="libndr-standard0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137435" comment="libndr-standard0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137436" comment="libndr0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137437" comment="libndr0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137438" comment="libnetapi0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137439" comment="libnetapi0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137440" comment="libpdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137441" comment="libpdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137442" comment="libregistry0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137443" comment="libsamba-credentials0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137444" comment="libsamba-credentials0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137445" comment="libsamba-hostconfig0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137446" comment="libsamba-hostconfig0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137447" comment="libsamba-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137448" comment="libsamba-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137449" comment="libsamdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137450" comment="libsamdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137451" comment="libsmbclient-devel-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137452" comment="libsmbclient-raw0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137453" comment="libsmbclient-raw0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137454" comment="libsmbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137455" comment="libsmbconf0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137456" comment="libsmbconf0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137457" comment="libsmbldap0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137458" comment="libsmbldap0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137459" comment="libtevent-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137460" comment="libtevent-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137461" comment="libwbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137462" comment="libwbclient0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137463" comment="samba-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137464" comment="samba-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137465" comment="samba-client-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137466" comment="samba-client-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137467" comment="samba-doc-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137468" comment="samba-libs-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137469" comment="samba-libs-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137470" comment="samba-winbind-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137471" comment="samba-winbind-32bit-4.1.12-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6152</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-6152" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6152" source="CVE"/>
    <description>
    The Yahoo! protocol plugin in libpurple in Pidgin before 2.10.8 does not properly validate UTF-8 data, which allows remote attackers to cause a denial of service (application crash) via crafted byte sequences.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137605" comment="libpurple-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137606" comment="libpurple-meanwhile-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137607" comment="libpurple-tcl-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137608" comment="pidgin-2.10.9-5.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6303</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-6303" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6303" source="CVE"/>
    <description>
    Heap-based buffer overflow in the GetWavHeader function in generic/jkSoundFile.c in the Snack Sound Toolkit, as used in WaveSurfer 1.8.8p4, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large chunk size in a WAV file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106849" comment="snack-2.2.10-212.4.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6684</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-6684" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6684" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the RedCloth library 4.2.9 for Ruby and earlier allows remote attackers to inject arbitrary web script or HTML via a javascript: URI.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110801" comment="rubygem-RedCloth-4.2.9-7.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110802" comment="rubygem-RedCloth-doc-4.2.9-7.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110803" comment="rubygem-RedCloth-testsuite-4.2.9-7.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6701</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2012-6701" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6701" source="CVE"/>
    <description>
    Integer overflow in fs/aio.c in the Linux kernel before 3.4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large AIO iovec.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0151</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0151" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0151" source="CVE"/>
    <description>
    The do_hvm_op function in xen/arch/x86/hvm/hvm.c in Xen 4.2.x on the x86_32 platform does not prevent HVM_PARAM_NESTEDHVM (aka nested virtualization) operations, which allows guest OS users to cause a denial of service (long-duration page mappings and host OS crash) by leveraging administrative access to an HVM guest in a domain with a large number of VCPUs.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0152</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0152" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0152" source="CVE"/>
    <description>
    Memory leak in Xen 4.2 and unstable allows local HVM guests to cause a denial of service (host memory consumption) by performing nested virtualization in a way that triggers errors that are not properly handled.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0153</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0153" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0153" source="CVE"/>
    <description>
    The AMD IOMMU support in Xen 4.2.x, 4.1.x, 3.3, and other versions, when using AMD-Vi for PCI passthrough, uses the same interrupt remapping table for the host and all guests, which allows guests to cause a denial of service by injecting an interrupt into other guests.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0157</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0157" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0157" source="CVE"/>
    <description>
    (a) mount and (b) umount in util-linux 2.14.1, 2.17.2, and probably other versions allow local users to determine the existence of restricted directories by (1) using the --guess-fstype command-line option or (2) attempting to mount a non-existent device, which generates different error messages depending on whether the directory exists.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137397" comment="libblkid-devel-2.25.1-2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137398" comment="libblkid1-2.25.1-2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137399" comment="libblkid1-32bit-2.25.1-2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137400" comment="libmount1-2.25.1-2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137401" comment="libmount1-32bit-2.25.1-2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137402" comment="libsmartcols1-2.25.1-2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137403" comment="libuuid-devel-2.25.1-2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137404" comment="libuuid1-2.25.1-2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137405" comment="libuuid1-32bit-2.25.1-2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137406" comment="util-linux-2.25.1-2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137407" comment="util-linux-systemd-2.25.1-2.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0160</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0160" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0160" source="CVE"/>
    <description>
    The Linux kernel through 3.7.9 allows local users to obtain sensitive information about keystroke timing by using the inotify API on the /dev/ptmx device.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137315" comment="kernel-default-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137316" comment="kernel-default-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137317" comment="kernel-desktop-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137318" comment="kernel-desktop-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137319" comment="kernel-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137320" comment="kernel-docs-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137321" comment="kernel-macros-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137322" comment="kernel-pae-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137323" comment="kernel-pae-base-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137324" comment="kernel-pae-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137325" comment="kernel-source-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137326" comment="kernel-syms-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137327" comment="kernel-xen-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137328" comment="kernel-xen-devel-3.16.6-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0166</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0166" source="CVE"/>
    <description>
    OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124418" comment="libopenssl0_9_8-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124419" comment="libopenssl0_9_8-32bit-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0169</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0169" source="CVE"/>
    <description>
    The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124418" comment="libopenssl0_9_8-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124419" comment="libopenssl0_9_8-32bit-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0170</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0170" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0170" source="CVE"/>
    <description>
    Use-after-free vulnerability in the virNetMessageFree function in rpc/virnetserverclient.c in libvirt 1.0.x before 1.0.2, 0.10.2 before 0.10.2.3, 0.9.11 before 0.9.11.9, and 0.9.6 before 0.9.6.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by triggering certain errors during an RPC connection, which causes a message to be freed without being removed from the message queue.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137726" comment="libvirt-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137727" comment="libvirt-client-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137728" comment="libvirt-daemon-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137729" comment="libvirt-daemon-config-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137730" comment="libvirt-daemon-config-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137731" comment="libvirt-daemon-driver-interface-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137732" comment="libvirt-daemon-driver-libxl-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137733" comment="libvirt-daemon-driver-lxc-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137734" comment="libvirt-daemon-driver-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137735" comment="libvirt-daemon-driver-nodedev-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137736" comment="libvirt-daemon-driver-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137737" comment="libvirt-daemon-driver-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137738" comment="libvirt-daemon-driver-secret-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137739" comment="libvirt-daemon-driver-storage-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137740" comment="libvirt-daemon-driver-uml-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137741" comment="libvirt-daemon-driver-vbox-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137742" comment="libvirt-daemon-driver-xen-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137743" comment="libvirt-daemon-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137744" comment="libvirt-daemon-xen-1.2.9-1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0172</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0172" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0172" source="CVE"/>
    <description>
    Samba 4.0.x before 4.0.1, in certain Active Directory domain-controller configurations, does not properly interpret Access Control Entries that are based on an objectClass, which allows remote authenticated users to bypass intended restrictions on modifying LDAP directory objects by leveraging (1) objectClass access by a user, (2) objectClass access by a group, or (3) write access to an attribute.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137424" comment="libdcerpc-binding0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137425" comment="libdcerpc-binding0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137426" comment="libdcerpc0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137427" comment="libdcerpc0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137428" comment="libgensec0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137429" comment="libgensec0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137430" comment="libndr-krb5pac0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137431" comment="libndr-krb5pac0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137432" comment="libndr-nbt0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137433" comment="libndr-nbt0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137434" comment="libndr-standard0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137435" comment="libndr-standard0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137436" comment="libndr0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137437" comment="libndr0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137438" comment="libnetapi0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137439" comment="libnetapi0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137440" comment="libpdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137441" comment="libpdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137442" comment="libregistry0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137443" comment="libsamba-credentials0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137444" comment="libsamba-credentials0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137445" comment="libsamba-hostconfig0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137446" comment="libsamba-hostconfig0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137447" comment="libsamba-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137448" comment="libsamba-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137449" comment="libsamdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137450" comment="libsamdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137451" comment="libsmbclient-devel-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137452" comment="libsmbclient-raw0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137453" comment="libsmbclient-raw0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137454" comment="libsmbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137455" comment="libsmbconf0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137456" comment="libsmbconf0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137457" comment="libsmbldap0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137458" comment="libsmbldap0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137459" comment="libtevent-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137460" comment="libtevent-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137461" comment="libwbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137462" comment="libwbclient0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137463" comment="samba-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137464" comment="samba-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137465" comment="samba-client-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137466" comment="samba-client-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137467" comment="samba-doc-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137468" comment="samba-libs-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137469" comment="samba-libs-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137470" comment="samba-winbind-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137471" comment="samba-winbind-32bit-4.1.12-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0176</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0176" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0176" source="CVE"/>
    <description>
    The publickey_from_privatekey function in libssh before 0.5.4, when no algorithm is matched during negotiations, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a "Client: Diffie-Hellman Key Exchange Init" packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137700" comment="libssh-devel-0.6.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137701" comment="libssh4-0.6.3-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0211</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0211" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0211" source="CVE"/>
    <description>
    Integer signedness error in the archive_write_zip_data function in archive_write_set_format_zip.c in libarchive 3.1.2 and earlier, when running on 64-bit machines, allows context-dependent attackers to cause a denial of service (crash) via unspecified vectors, which triggers an improper conversion between unsigned and signed types, leading to a buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107977" comment="bsdtar-3.1.2-7.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107978" comment="libarchive-3.1.2-7.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107979" comment="libarchive-devel-3.1.2-7.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107980" comment="libarchive13-3.1.2-7.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107981" comment="libarchive13-32bit-3.1.2-7.5.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0213</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0213" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0213" source="CVE"/>
    <description>
    The Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.21, 3.6.x before 3.6.12, and 4.x before 4.0.2 allows remote attackers to conduct clickjacking attacks via a (1) FRAME or (2) IFRAME element.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137424" comment="libdcerpc-binding0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137425" comment="libdcerpc-binding0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137426" comment="libdcerpc0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137427" comment="libdcerpc0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137428" comment="libgensec0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137429" comment="libgensec0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137430" comment="libndr-krb5pac0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137431" comment="libndr-krb5pac0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137432" comment="libndr-nbt0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137433" comment="libndr-nbt0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137434" comment="libndr-standard0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137435" comment="libndr-standard0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137436" comment="libndr0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137437" comment="libndr0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137438" comment="libnetapi0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137439" comment="libnetapi0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137440" comment="libpdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137441" comment="libpdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137442" comment="libregistry0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137443" comment="libsamba-credentials0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137444" comment="libsamba-credentials0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137445" comment="libsamba-hostconfig0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137446" comment="libsamba-hostconfig0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137447" comment="libsamba-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137448" comment="libsamba-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137449" comment="libsamdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137450" comment="libsamdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137451" comment="libsmbclient-devel-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137452" comment="libsmbclient-raw0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137453" comment="libsmbclient-raw0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137454" comment="libsmbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137455" comment="libsmbconf0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137456" comment="libsmbconf0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137457" comment="libsmbldap0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137458" comment="libsmbldap0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137459" comment="libtevent-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137460" comment="libtevent-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137461" comment="libwbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137462" comment="libwbclient0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137463" comment="samba-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137464" comment="samba-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137465" comment="samba-client-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137466" comment="samba-client-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137467" comment="samba-doc-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137468" comment="samba-libs-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137469" comment="samba-libs-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137470" comment="samba-winbind-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137471" comment="samba-winbind-32bit-4.1.12-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0214</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0214" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0214" source="CVE"/>
    <description>
    Cross-site request forgery (CSRF) vulnerability in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.21, 3.6.x before 3.6.12, and 4.x before 4.0.2 allows remote attackers to hijack the authentication of arbitrary users by leveraging knowledge of a password and composing requests that perform SWAT actions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137424" comment="libdcerpc-binding0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137425" comment="libdcerpc-binding0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137426" comment="libdcerpc0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137427" comment="libdcerpc0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137428" comment="libgensec0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137429" comment="libgensec0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137430" comment="libndr-krb5pac0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137431" comment="libndr-krb5pac0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137432" comment="libndr-nbt0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137433" comment="libndr-nbt0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137434" comment="libndr-standard0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137435" comment="libndr-standard0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137436" comment="libndr0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137437" comment="libndr0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137438" comment="libnetapi0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137439" comment="libnetapi0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137440" comment="libpdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137441" comment="libpdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137442" comment="libregistry0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137443" comment="libsamba-credentials0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137444" comment="libsamba-credentials0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137445" comment="libsamba-hostconfig0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137446" comment="libsamba-hostconfig0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137447" comment="libsamba-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137448" comment="libsamba-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137449" comment="libsamdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137450" comment="libsamdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137451" comment="libsmbclient-devel-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137452" comment="libsmbclient-raw0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137453" comment="libsmbclient-raw0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137454" comment="libsmbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137455" comment="libsmbconf0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137456" comment="libsmbconf0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137457" comment="libsmbldap0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137458" comment="libsmbldap0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137459" comment="libtevent-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137460" comment="libtevent-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137461" comment="libwbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137462" comment="libwbclient0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137463" comment="samba-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137464" comment="samba-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137465" comment="samba-client-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137466" comment="samba-client-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137467" comment="samba-doc-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137468" comment="samba-libs-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137469" comment="samba-libs-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137470" comment="samba-winbind-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137471" comment="samba-winbind-32bit-4.1.12-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0219</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0219" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0219" source="CVE"/>
    <description>
    System Security Services Daemon (SSSD) before 1.9.4, when (1) creating, (2) copying, or (3) removing a user home directory tree, allows local users to create, modify, or delete arbitrary files via a symlink attack on another user's files.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137702" comment="libsss_idmap0-1.12.0-3.1.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137703" comment="libsss_nss_idmap0-1.12.0-3.1.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137704" comment="sssd-1.12.0-3.1.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137705" comment="sssd-32bit-1.12.0-3.1.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137706" comment="sssd-krb5-common-1.12.0-3.1.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137707" comment="sssd-ldap-1.12.0-3.1.10 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0220</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0220" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0220" source="CVE"/>
    <description>
    The (1) sss_autofs_cmd_getautomntent and (2) sss_autofs_cmd_getautomntbyname function in responder/autofs/autofssrv_cmd.c and the (3) ssh_cmd_parse_request function in responder/ssh/sshsrv_cmd.c in System Security Services Daemon (SSSD) before 1.9.4 allow remote attackers to cause a denial of service (out-of-bounds read, crash, and restart) via a crafted SSSD packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137702" comment="libsss_idmap0-1.12.0-3.1.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137703" comment="libsss_nss_idmap0-1.12.0-3.1.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137704" comment="sssd-1.12.0-3.1.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137705" comment="sssd-32bit-1.12.0-3.1.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137706" comment="sssd-krb5-common-1.12.0-3.1.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137707" comment="sssd-ldap-1.12.0-3.1.10 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0221</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0221" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0221" source="CVE"/>
    <description>
    The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the sort command, when using the (1) -d or (2) -M switch, which triggers a stack-based buffer overflow in the alloca function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137063" comment="coreutils-8.23-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109776" comment="coreutils-lang-8.23-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109774" comment="coreutils-testsuite-8.23-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0222</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0222" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0222" source="CVE"/>
    <description>
    The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the uniq command, which triggers a stack-based buffer overflow in the alloca function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137063" comment="coreutils-8.23-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109776" comment="coreutils-lang-8.23-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109774" comment="coreutils-testsuite-8.23-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0223</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0223" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0223" source="CVE"/>
    <description>
    The SUSE coreutils-i18n.patch for GNU coreutils allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a long string to the join command, when using the -i switch, which triggers a stack-based buffer overflow in the alloca function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137063" comment="coreutils-8.23-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109776" comment="coreutils-lang-8.23-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109774" comment="coreutils-testsuite-8.23-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0231</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0231" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0231" source="CVE"/>
    <description>
    The pciback_enable_msi function in the PCI backend driver (drivers/xen/pciback/conf_space_capability_msi.c) in Xen for the Linux kernel 2.6.18 and 3.8 allows guest OS users with PCI device access to cause a denial of service via a large number of kernel log messages. NOTE: some of these details are obtained from third party information.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137315" comment="kernel-default-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137316" comment="kernel-default-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137317" comment="kernel-desktop-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137318" comment="kernel-desktop-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137319" comment="kernel-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137320" comment="kernel-docs-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137321" comment="kernel-macros-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137322" comment="kernel-pae-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137323" comment="kernel-pae-base-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137324" comment="kernel-pae-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137325" comment="kernel-source-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137326" comment="kernel-syms-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137327" comment="kernel-xen-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137328" comment="kernel-xen-devel-3.16.6-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0240</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0240" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0240" source="CVE"/>
    <description>
    Gnome Online Accounts (GOA) 3.4.x, 3.6.x before 3.6.3, and 3.7.x before 3.7.5, does not properly validate SSL certificates when creating accounts such as Windows Live and Facebook accounts, which allows man-in-the-middle attackers to obtain sensitive information such as credentials by sniffing the network.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137241" comment="gnome-online-accounts-3.14.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137242" comment="gnome-online-accounts-devel-3.14.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137243" comment="libgoa-1_0-0-3.14.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137244" comment="libgoa-backend-1_0-1-3.14.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137245" comment="typelib-1_0-Goa-1_0-3.14.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0242</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242" source="CVE"/>
    <description>
    Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows context-dependent attackers to cause a denial of service (memory corruption and crash) via crafted multibyte characters.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137226" comment="glibc-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137227" comment="glibc-32bit-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137228" comment="glibc-devel-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137229" comment="glibc-extra-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137230" comment="glibc-info-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137231" comment="glibc-locale-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137232" comment="glibc-locale-32bit-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137233" comment="nscd-2.19-16.2.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0249</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0249" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0249" source="CVE"/>
    <description>
    Stack-based buffer overflow in the Curl_sasl_create_digest_md5_message function in lib/curl_sasl.c in curl and libcurl 7.26.0 through 7.28.1, when negotiating SASL DIGEST-MD5 authentication, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string in the realm parameter in a (1) POP3, (2) SMTP or (3) IMAP message.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137106" comment="curl-7.38.0-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137107" comment="libcurl-devel-7.38.0-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137108" comment="libcurl4-7.38.0-1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0254</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0254" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0254" source="CVE"/>
    <description>
    The QSharedMemory class in Qt 5.0.0, 4.8.x before 4.8.5, 4.7.x before 4.7.6, and other versions including 4.4.0 uses weak permissions (world-readable and world-writable) for shared memory segments, which allows local users to read sensitive information or modify critical program data, as demonstrated by reading a pixmap being sent to an X server.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137616" comment="libqt4-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137617" comment="libqt4-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137618" comment="libqt4-devel-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137619" comment="libqt4-linguist-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137620" comment="libqt4-qt3support-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137621" comment="libqt4-qt3support-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137622" comment="libqt4-sql-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137623" comment="libqt4-sql-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137624" comment="libqt4-sql-mysql-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137625" comment="libqt4-sql-mysql-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137626" comment="libqt4-sql-postgresql-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137627" comment="libqt4-sql-postgresql-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137628" comment="libqt4-sql-sqlite-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137629" comment="libqt4-sql-sqlite-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137630" comment="libqt4-sql-unixODBC-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137631" comment="libqt4-sql-unixODBC-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137632" comment="libqt4-x11-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137633" comment="libqt4-x11-32bit-4.8.6-4.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0255</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0255" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0255" source="CVE"/>
    <description>
    PostgreSQL 9.2.x before 9.2.3, 9.1.x before 9.1.8, 9.0.x before 9.0.12, 8.4.x before 8.4.16, and 8.3.x before 8.3.23 does not properly declare the enum_recv function in backend/utils/adt/enum.c, which causes it to be invoked with incorrect arguments and allows remote authenticated users to cause a denial of service (server crash) or read sensitive process memory via a crafted SQL command, which triggers an array index error and an out-of-bounds read.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137474" comment="libecpg6-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137475" comment="libpq5-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137476" comment="libpq5-32bit-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137477" comment="postgresql93-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137478" comment="postgresql93-contrib-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137479" comment="postgresql93-devel-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137480" comment="postgresql93-docs-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137481" comment="postgresql93-server-9.3.5-2.1.14 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0271</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0271" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0271" source="CVE"/>
    <description>
    The MXit protocol plugin in libpurple in Pidgin before 2.10.7 might allow remote attackers to create or overwrite files via a crafted (1) mxit or (2) mxit/imagestrips pathname.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137605" comment="libpurple-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137606" comment="libpurple-meanwhile-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137607" comment="libpurple-tcl-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137608" comment="pidgin-2.10.9-5.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0272</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0272" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0272" source="CVE"/>
    <description>
    Buffer overflow in http.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.7 allows remote servers to execute arbitrary code via a long HTTP header.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137605" comment="libpurple-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137606" comment="libpurple-meanwhile-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137607" comment="libpurple-tcl-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137608" comment="pidgin-2.10.9-5.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0273</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0273" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0273" source="CVE"/>
    <description>
    sametime.c in the Sametime protocol plugin in libpurple in Pidgin before 2.10.7 does not properly terminate long user IDs, which allows remote servers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137605" comment="libpurple-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137606" comment="libpurple-meanwhile-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137607" comment="libpurple-tcl-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137608" comment="pidgin-2.10.9-5.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0274</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0274" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0274" source="CVE"/>
    <description>
    upnp.c in libpurple in Pidgin before 2.10.7 does not properly terminate long strings in UPnP responses, which allows remote attackers to cause a denial of service (application crash) by leveraging access to the local network.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137605" comment="libpurple-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137606" comment="libpurple-meanwhile-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137607" comment="libpurple-tcl-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137608" comment="pidgin-2.10.9-5.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0287</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0287" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0287" source="CVE"/>
    <description>
    The Simple Access Provider in System Security Services Daemon (SSSD) 1.9.0 through 1.9.4, when the Active Directory provider is used, does not properly enforce the simple_deny_groups option, which allows remote authenticated users to bypass intended access restrictions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137702" comment="libsss_idmap0-1.12.0-3.1.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137703" comment="libsss_nss_idmap0-1.12.0-3.1.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137704" comment="sssd-1.12.0-3.1.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137705" comment="sssd-32bit-1.12.0-3.1.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137706" comment="sssd-krb5-common-1.12.0-3.1.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137707" comment="sssd-ldap-1.12.0-3.1.10 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0292</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0292" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0292" source="CVE"/>
    <description>
    The dbus_g_proxy_manager_filter function in dbus-gproxy in Dbus-glib before 0.100.1 does not properly verify the sender of NameOwnerChanged signals, which allows local users to gain privileges via a spoofed signal.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137127" comment="dbus-1-glib-0.102-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137128" comment="dbus-1-glib-32bit-0.102-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137129" comment="dbus-1-glib-devel-0.102-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130334" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0334</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0334" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0334" source="CVE"/>
    <description>
    Bundler before 1.7, when multiple top-level source lines are used, allows remote attackers to install arbitrary gems by creating a gem with the same name as another gem in a different source.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108195" comment="rubygem-bundler-1.8.4-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108196" comment="rubygem-bundler-doc-1.8.4-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0338</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0338" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0338" source="CVE"/>
    <description>
    libxml2 2.9.0 and earlier allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via an XML file containing an entity declaration with long replacement text and many references to this entity, aka "internal entity expansion" with linear complexity.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137790" comment="libxml2-2-2.9.1-7.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137791" comment="libxml2-2-32bit-2.9.1-7.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137792" comment="libxml2-devel-2.9.1-7.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137793" comment="libxml2-tools-2.9.1-7.2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0401</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0401" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0401" source="CVE"/>
    <description>
    The Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to execute arbitrary code via vectors related to AWT, as demonstrated by Ben Murphy during a Pwn2Own competition at CanSecWest 2013.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to invocation of the system class loader by the sun.awt.datatransfer.ClassLoaderObjectInputStream class, which allows remote attackers to bypass Java sandbox restrictions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0422</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0422" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0422" source="CVE"/>
    <description>
    Multiple vulnerabilities in Oracle Java 7 before Update 11 allow remote attackers to execute arbitrary code by (1) using the public getMBeanInstantiator method in the JmxMBeanServer class to obtain a reference to a private MBeanInstantiator object, then retrieving arbitrary Class references using the findClass method, and (2) using the Reflection API with recursion in a way that bypasses a security check by the java.lang.invoke.MethodHandles.Lookup.checkSecurityManager method due to the inability of the sun.reflect.Reflection.getCallerClass method to skip frames related to the new reflection API, as exploited in the wild in January 2013, as demonstrated by Blackhole and Nuclear Pack, and a different vulnerability than CVE-2012-4681 and CVE-2012-3174. NOTE: some parties have mapped the recursive Reflection API issue to CVE-2012-3174, but CVE-2012-3174 is for a different vulnerability whose details are not public as of 20130114.  CVE-2013-0422 covers both the JMX/MBean and Reflection API issues.  NOTE: it was originally reported that Java 6 was also vulnerable, but the reporter has retracted this claim, stating that Java 6 is not exploitable because the relevant code is called in a way that does not bypass security checks.  NOTE: as of 20130114, a reliable third party has claimed that the findClass/MBeanInstantiator vector was not fixed in Oracle Java 7 Update 11.  If there is still a vulnerable condition, then a separate CVE identifier might be created for the unfixed issue.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0424</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0424" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0424" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via vectors related to RMI. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to cross-site scripting (XSS) in the sun.rmi.transport.proxy CGIHandler class that does not properly handle error messages in a (1) command or (2) port number.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0425</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0425" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0425" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0428 and CVE-2013-0426.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect "access control checks" in the logging API that allow remote attackers to bypass Java sandbox restrictions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0426</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0426" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0426" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0425 and CVE-2013-0428.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect "access control checks" in the logging API that allow remote attackers to bypass Java sandbox restrictions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0427</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0427" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Libraries.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to interrupt certain threads that should not be interrupted.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0428</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0428" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0428" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0425 and CVE-2013-0426.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "incorrect checks for proxy classes" in the Reflection API.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0429</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0429" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0429" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue involves the creation of a single PresentationManager that is shared across multiple thread groups, which allows remote attackers to bypass Java sandbox restrictions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0431</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0431" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0431" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, and OpenJDK 7, allows user-assisted remote attackers to bypass the Java security sandbox via unspecified vectors related to JMX, aka "Issue 52," a different vulnerability than CVE-2013-1490.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0432</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0432" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0432" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality and integrity via vectors related to AWT.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "insufficient clipboard access premission checks."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0433</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0433" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0433" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Networking.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to avoid triggering an exception during the deserialization of invalid InetSocketAddress data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0434</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0434" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0434" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAXP.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to the public declaration of the loadPropertyFile method in the JAXP FuncSystemProperty class, which allows remote attackers to obtain sensitive information.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0435</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0435" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0435" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAX-WS.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper restriction of com.sun.xml.internal packages and "Better handling of UI elements."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0440</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0440" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0440" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect availability via vectors related to JSSE. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to CPU consumption in the the SSL/TLS implementation via a large number of ClientHello packets that are not properly handled by (1) ClientHandshaker.java and (2) ServerHandshaker.java.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0441</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0441" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0441" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2013-1476 and CVE-2013-1475.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass Java sandbox restrictions via certain methods that should not be serialized, aka "missing serialization restriction."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0442</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0442" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0442" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an improper check of "privileges of the code" that bypasses the sandbox.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0443</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0443" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0443" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality and integrity via vectors related to JSSE.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect validation of Diffie-Hellman keys, which allows remote attackers to conduct a "small subgroup attack" to force the use of weak session keys or obtain sensitive information about the private key.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0444</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0444" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0444" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "insufficient checks for cached results" by the Java Beans MethodFinder, which might allow attackers to access methods that should only be accessible to privileged code.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0450</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0450" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0450" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper checks of "access control context" in the JMX RequiredModelMBean class.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0454</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0454" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0454" source="CVE"/>
    <description>
    The SMB2 implementation in Samba 3.6.x before 3.6.6, as used on the IBM Storwize V7000 Unified 1.3 before 1.3.2.3 and 1.4 before 1.4.0.1 and possibly other products, does not properly enforce CIFS share attributes, which allows remote authenticated users to (1) write to a read-only share; (2) trigger data-integrity problems related to the oplock, locking, coherency, or leases attribute; or (3) have an unspecified impact by leveraging incorrect handling of the browseable or "hide unreadable" parameter.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137424" comment="libdcerpc-binding0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137425" comment="libdcerpc-binding0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137426" comment="libdcerpc0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137427" comment="libdcerpc0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137428" comment="libgensec0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137429" comment="libgensec0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137430" comment="libndr-krb5pac0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137431" comment="libndr-krb5pac0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137432" comment="libndr-nbt0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137433" comment="libndr-nbt0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137434" comment="libndr-standard0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137435" comment="libndr-standard0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137436" comment="libndr0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137437" comment="libndr0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137438" comment="libnetapi0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137439" comment="libnetapi0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137440" comment="libpdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137441" comment="libpdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137442" comment="libregistry0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137443" comment="libsamba-credentials0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137444" comment="libsamba-credentials0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137445" comment="libsamba-hostconfig0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137446" comment="libsamba-hostconfig0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137447" comment="libsamba-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137448" comment="libsamba-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137449" comment="libsamdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137450" comment="libsamdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137451" comment="libsmbclient-devel-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137452" comment="libsmbclient-raw0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137453" comment="libsmbclient-raw0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137454" comment="libsmbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137455" comment="libsmbconf0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137456" comment="libsmbconf0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137457" comment="libsmbldap0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137458" comment="libsmbldap0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137459" comment="libtevent-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137460" comment="libtevent-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137461" comment="libwbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137462" comment="libwbclient0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137463" comment="samba-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137464" comment="samba-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137465" comment="samba-client-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137466" comment="samba-client-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137467" comment="samba-doc-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137468" comment="samba-libs-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137469" comment="samba-libs-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137470" comment="samba-winbind-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137471" comment="samba-winbind-32bit-4.1.12-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0743</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0743" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0743" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA at the suggestion of the CVE project team.  The candidate had been associated with a correct report of a security problem, but not a problem that is categorized as a vulnerability within CVE.  Compromised or unauthorized SSL certificates are not within CVE's scope.  Notes: none.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137486" comment="libfreebl3-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137487" comment="libsoftokn3-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137488" comment="mozilla-nss-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137489" comment="mozilla-nss-certs-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137490" comment="mozilla-nss-devel-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137491" comment="mozilla-nss-tools-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0744</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0744" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0744" source="CVE"/>
    <description>
    Use-after-free vulnerability in the TableBackgroundPainter::TableBackgroundData::Destroy function in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via an HTML document with a table containing many columns and column groups.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0745</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0745" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0745" source="CVE"/>
    <description>
    The AutoWrapperChanger class in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 does not properly interact with garbage collection, which allows remote attackers to execute arbitrary code via a crafted HTML document referencing JavaScript objects.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0746</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0746" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0746" source="CVE"/>
    <description>
    Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 do not properly implement quickstubs that use the jsval data type for their return values, which allows remote attackers to execute arbitrary code or cause a denial of service (compartment mismatch and application crash) via crafted JavaScript code that is not properly handled during garbage collection.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0747</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0747" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0747" source="CVE"/>
    <description>
    The gPluginHandler.handleEvent function in the plugin handler in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 does not properly enforce the Same Origin Policy, which allows remote attackers to conduct clickjacking attacks via crafted JavaScript code that listens for a mutation event.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0748</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0748" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0748" source="CVE"/>
    <description>
    The XBL.__proto__.toString implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 makes it easier for remote attackers to bypass the ASLR protection mechanism by calling the toString function of an XBL object.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0749</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0749" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0749" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.1, and SeaMonkey before 2.15 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0750</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0750" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0750" source="CVE"/>
    <description>
    Integer overflow in the JavaScript implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted string concatenation, leading to improper memory allocation and a heap-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0751</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0751" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0751" source="CVE"/>
    <description>
    Mozilla Firefox before 18.0 on Android and SeaMonkey before 2.15 do not restrict a touch event to a single IFRAME element, which allows remote attackers to obtain sensitive information or possibly conduct cross-site scripting (XSS) attacks via a crafted HTML document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0752</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0752" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0752" source="CVE"/>
    <description>
    Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XBL file with multiple bindings that have SVG content.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0753</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0753" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0753" source="CVE"/>
    <description>
    Use-after-free vulnerability in the serializeToStream implementation in the XMLSerializer component in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via crafted web content.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0754</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0754" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0754" source="CVE"/>
    <description>
    Use-after-free vulnerability in the ListenerManager implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via vectors involving the triggering of garbage collection after memory allocation for listener objects.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0755</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0755" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0755" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozVibrate implementation in the Vibrate library in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via vectors related to the domDoc pointer.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0756</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0756" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0756" source="CVE"/>
    <description>
    Use-after-free vulnerability in the obj_toSource function in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted web page referencing JavaScript Proxy objects that are not properly handled during garbage collection.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0757</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0757" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0757" source="CVE"/>
    <description>
    The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 does not prevent modifications to the prototype of an object, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges by referencing Object.prototype.__proto__ in a crafted HTML document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0758</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0758" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0758" source="CVE"/>
    <description>
    Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allow remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging improper interaction between plugin objects and SVG elements.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0760</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0760" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0760" source="CVE"/>
    <description>
    Buffer overflow in the CharDistributionAnalysis::HandleOneChar function in Mozilla Firefox before 18.0, Thunderbird before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0761</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0761" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0761" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::TrackUnionStream::EndTrack implementation in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0762</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0762" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0762" source="CVE"/>
    <description>
    Use-after-free vulnerability in the imgRequest::OnStopFrame function in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0763</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0763" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0763" source="CVE"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors related to Mesa drivers and a resized WebGL canvas.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0764</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0764" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0764" source="CVE"/>
    <description>
    The nsSOCKSSocketInfo::ConnectToProxy function in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 does not ensure thread safety for SSL sessions, which allows remote attackers to execute arbitrary code via crafted data, as demonstrated by e-mail message data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0765</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0765" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0765" source="CVE"/>
    <description>
    Mozilla Firefox before 19.0, Thunderbird before 17.0.3, and SeaMonkey before 2.16 do not prevent multiple wrapping of WebIDL objects, which allows remote attackers to bypass intended access restrictions via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0766</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0766" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0766" source="CVE"/>
    <description>
    Use-after-free vulnerability in the ~nsHTMLEditRules implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0767</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0767" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0767" source="CVE"/>
    <description>
    The nsSVGPathElement::GetPathLengthScale function in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0768</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0768" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0768" source="CVE"/>
    <description>
    Stack-based buffer overflow in the Canvas implementation in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via an HTML document that specifies invalid width and height values.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0769</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0769" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0769" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.1, and SeaMonkey before 2.15 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0770</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0770" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0770" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 18.0, Thunderbird before 17.0.2, and SeaMonkey before 2.15 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0771</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0771" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0771" source="CVE"/>
    <description>
    Heap-based buffer overflow in the gfxTextRun::ShrinkToLigatureBoundaries function in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0772</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0772" source="CVE"/>
    <description>
    The RasterImage::DrawFrameTo function in Mozilla Firefox before 19.0, Thunderbird before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read and application crash) via a crafted GIF image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0773</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0773" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0773" source="CVE"/>
    <description>
    The Chrome Object Wrapper (COW) and System Only Wrapper (SOW) implementations in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 do not prevent modifications to a prototype, which allows remote attackers to obtain sensitive information from chrome objects or possibly execute arbitrary JavaScript code with chrome privileges via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0774</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0774" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0774" source="CVE"/>
    <description>
    Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 do not prevent JavaScript workers from reading the browser-profile directory name, which has unspecified impact and remote attack vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0775</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0775" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0775" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsImageLoadingContent::OnStopContainer function in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code via crafted web script.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0776</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0776" source="CVE"/>
    <description>
    Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allow man-in-the-middle attackers to spoof the address bar by operating a proxy server that provides a 407 HTTP status code accompanied by web script, as demonstrated by a phishing attack on an HTTPS site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0777</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0777" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0777" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsDisplayBoxShadowOuter::Paint function in Mozilla Firefox before 19.0, Thunderbird before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0778</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0778" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0778" source="CVE"/>
    <description>
    The ClusterIterator::NextCluster function in Mozilla Firefox before 19.0, Thunderbird before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0779</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0779" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0779" source="CVE"/>
    <description>
    The nsCodingStateMachine::NextState function in Mozilla Firefox before 19.0, Thunderbird before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0780</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0780" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0780" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsOverflowContinuationTracker::Finish function in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted document that uses Cascading Style Sheets (CSS) -moz-column-* properties.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0781</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0781" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0781" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsPrintEngine::CommonPrint function in Mozilla Firefox before 19.0, Thunderbird before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0782</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0782" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0782" source="CVE"/>
    <description>
    Heap-based buffer overflow in the nsSaveAsCharset::DoCharsetConversion function in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0783</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0783" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0783" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0787</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0787" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0787" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsEditor::IsPreformatted function in editor/libeditor/base/nsEditor.cpp in Mozilla Firefox before 19.0.2, Firefox ESR 17.x before 17.0.4, Thunderbird before 17.0.4, Thunderbird ESR 17.x before 17.0.4, and SeaMonkey before 2.16.1 allows remote attackers to execute arbitrary code via vectors involving an execCommand call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0788</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0788" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0788" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0789</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0789" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0789" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 20.0 and SeaMonkey before 2.17 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the nsContentUtils::HoldJSObjects function and the nsAutoPtr class, and other vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0791</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0791" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0791" source="CVE"/>
    <description>
    The CERT_DecodeCertPackage function in Mozilla Network Security Services (NSS), as used in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, SeaMonkey before 2.17, and other products, allows remote attackers to cause a denial of service (out-of-bounds read and memory corruption) via a crafted certificate.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137486" comment="libfreebl3-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137487" comment="libsoftokn3-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137488" comment="mozilla-nss-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137489" comment="mozilla-nss-certs-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137490" comment="mozilla-nss-devel-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137491" comment="mozilla-nss-tools-3.17.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0792</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0792" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0792" source="CVE"/>
    <description>
    Mozilla Firefox before 20.0 and SeaMonkey before 2.17, when gfx.color_management.enablev4 is used, do not properly handle color profiles during PNG rendering, which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (memory corruption) via a grayscale PNG image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0793</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0793" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0793" source="CVE"/>
    <description>
    Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 do not ensure the correctness of the address bar during history navigation, which allows remote attackers to conduct cross-site scripting (XSS) attacks or phishing attacks by leveraging control over navigation timing.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0794</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0794" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0794" source="CVE"/>
    <description>
    Mozilla Firefox before 20.0 and SeaMonkey before 2.17 do not prevent origin spoofing of tab-modal dialogs, which allows remote attackers to conduct phishing attacks via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0795</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0795" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0795" source="CVE"/>
    <description>
    The System Only Wrapper (SOW) implementation in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 does not prevent use of the cloneNode method for cloning a protected node, which allows remote attackers to bypass the Same Origin Policy or possibly execute arbitrary JavaScript code with chrome privileges via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0796</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0796" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0796" source="CVE"/>
    <description>
    The WebGL subsystem in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 on Linux does not properly interact with Mesa drivers, which allows remote attackers to execute arbitrary code or cause a denial of service (free of unallocated memory) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0800</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0800" source="CVE"/>
    <description>
    Integer signedness error in the pixman_fill_sse2 function in pixman-sse2.c in Pixman, as distributed with Cairo and used in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, SeaMonkey before 2.17, and other products, allows remote attackers to execute arbitrary code via crafted values that trigger attempted use of a (1) negative box boundary or (2) negative box size, leading to an out-of-bounds write operation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0801</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0801" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0801" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0809</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0809" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0809" source="CVE"/>
    <description>
    Unspecified vulnerability in the 2D component in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code via unknown vectors, a different vulnerability than CVE-2013-1493.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0913</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-0913" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0913" source="CVE"/>
    <description>
    Integer overflow in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the i915 driver in the Direct Rendering Manager (DRM) subsystem in the Linux kernel through 3.8.3, as used in Google Chrome OS before 25.0.1364.173 and other products, allows local users to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted application that triggers many relocation copies, and potentially leads to a race condition.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137315" comment="kernel-default-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137316" comment="kernel-default-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137317" comment="kernel-desktop-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137318" comment="kernel-desktop-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137319" comment="kernel-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137320" comment="kernel-docs-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137321" comment="kernel-macros-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137322" comment="kernel-pae-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137323" comment="kernel-pae-base-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137324" comment="kernel-pae-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137325" comment="kernel-source-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137326" comment="kernel-syms-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137327" comment="kernel-xen-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137328" comment="kernel-xen-devel-3.16.6-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1415</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1415" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1415" source="CVE"/>
    <description>
    The pkinit_check_kdc_pkid function in plugins/preauth/pkinit/pkinit_crypto_openssl.c in the PKINIT implementation in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.4 and 1.11.x before 1.11.1 does not properly handle errors during extraction of fields from an X.509 certificate, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a malformed KRB5_PADATA_PK_AS_REQ AS-REQ request.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137331" comment="krb5-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137332" comment="krb5-32bit-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137333" comment="krb5-client-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137334" comment="krb5-devel-1.12.2-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1417</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1417" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1417" source="CVE"/>
    <description>
    do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.11 before 1.11.4, when a single-component realm name is used, allows remote authenticated users to cause a denial of service (daemon crash) via a TGS-REQ request that triggers an attempted cross-realm referral for a host-based service principal.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137331" comment="krb5-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137332" comment="krb5-32bit-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137333" comment="krb5-client-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137334" comment="krb5-devel-1.12.2-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1418</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1418" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1418" source="CVE"/>
    <description>
    The setup_server_realm function in main.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.7, when multiple realms are configured, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted request.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137331" comment="krb5-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137332" comment="krb5-32bit-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137333" comment="krb5-client-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137334" comment="krb5-devel-1.12.2-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1431</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1431" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1431" source="CVE"/>
    <description>
    The Wocky module in Telepathy Gabble before 0.16.6 and 0.17.x before 0.17.4, when connecting to a "legacy Jabber server," does not properly enforce the WockyConnector:tls-required flag, which allows remote attackers to bypass TLS verification and perform a man-in-the-middle attacks.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137888" comment="telepathy-gabble-0.18.3-1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1442</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1442" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1442" source="CVE"/>
    <description>
    Xen 4.0 through 4.3.x, when using AVX or LWP capable CPUs, does not properly clear previous data from registers when using an XSAVE or XRSTOR to extend the state components of a saved or restored vCPU after touching other restored extended registers, which allows local guest OSes to obtain sensitive information by reading the registers.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1445</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1445" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1445" source="CVE"/>
    <description>
    The Crypto.Random.atfork function in PyCrypto before 2.6.1 does not properly reseed the pseudo-random number generator (PRNG) before allowing a child process to access it, which makes it easier for context-dependent attackers to obtain sensitive information by leveraging a race condition in which a child process is created and accesses the PRNG within the same rate-limit period as another process.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137856" comment="python-pycrypto-2.6.1-3.1.4 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1447</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1447" source="CVE"/>
    <description>
    OpenJPEG 1.3 and earlier allows remote attackers to cause a denial of service (memory consumption or crash) via unspecified vectors related to NULL pointer dereferences, division-by-zero, and other errors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137557" comment="libopenjpeg1-1.5.2-2.1.8 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1475</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1475" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1475" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "IIOP type reuse management" in ObjectStreamClass.java.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1476</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1476" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1476" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2013-0441 and CVE-2013-1475.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass Java sandbox restrictions via "certain value handler constructors."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1478</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1478" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1478" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "insufficient validation of raster parameters" that can trigger an integer overflow and memory corruption.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1480</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1480" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1480" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "insufficient validation of raster parameters" in awt_parseImage.c, which triggers memory corruption.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1484</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1484" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1484" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 13 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1485</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1485" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1485" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 13 and earlier allows remote attackers to affect integrity via unknown vectors related to Libraries.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1486</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1486" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1486" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 13 and earlier, 6 Update 39 and earlier, and 5.0 Update 39 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1488</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1488" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1488" source="CVE"/>
    <description>
    The Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 6 and 7, allows remote attackers to execute arbitrary code via unspecified vectors involving reflection, Libraries, "improper toString calls," and the JDBC driver manager, as demonstrated by James Forshaw during a Pwn2Own competition at CanSecWest 2013.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1493</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1493" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1493" source="CVE"/>
    <description>
    The color management (CMM) functionality in the 2D component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (crash) via an image with crafted raster parameters, which triggers (1) an out-of-bounds read or (2) memory corruption in the JVM, as exploited in the wild in February 2013.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1500</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1500" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows local users to affect confidentiality and integrity via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to weak permissions for shared memory.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1518</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1518" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1518" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAXP.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "missing security restrictions."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1537</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1537" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1537" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to the default java.rmi.server.useCodebaseOnly setting of false, which allows remote attackers to perform "dynamic class downloading" and execute arbitrary code.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1557</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1557" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1557" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "missing security restrictions" in the LogStream.setDefaultStream method.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1569</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1569" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1569" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "checking of [a] glyph table" in the International Components for Unicode (ICU) Layout Engine before 51.2.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1571</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1571" source="CVE"/>
    <description>
    Unspecified vulnerability in the Javadoc component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier; JavaFX 2.2.21 and earlier; and OpenJDK 7 allows remote attackers to affect integrity via unknown vectors related to Javadoc. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to frame injection in HTML that is generated by Javadoc.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136936" comment="ant-1.9.4-2.2.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136937" comment="ant-jmf-1.9.4-2.2.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136938" comment="ant-junit-1.9.4-2.2.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136939" comment="ant-scripts-1.9.4-2.2.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136940" comment="ant-swing-1.9.4-2.2.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1572</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1572" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1572" source="CVE"/>
    <description>
    The dissect_oampdu_event_notification function in epan/dissectors/packet-slowprotocols.c in the IEEE 802.3 Slow Protocols dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle certain short lengths, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1573</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1573" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1573" source="CVE"/>
    <description>
    The csnStreamDissector function in epan/dissectors/packet-csn1.c in the CSN.1 dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle a large number of padding bits, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1574</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1574" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1574" source="CVE"/>
    <description>
    The dissect_bthci_eir_ad_data function in epan/dissectors/packet-bthci_cmd.c in the Bluetooth HCI dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 uses an incorrect data type for a counter variable, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1575</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1575" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1575" source="CVE"/>
    <description>
    The dissect_r3_cmd_alarmconfigure function in epan/dissectors/packet-assa_r3.c in the R3 dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle a certain alarm length, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1576</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1576" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1576" source="CVE"/>
    <description>
    The dissect_sdp_media_attribute function in epan/dissectors/packet-sdp.c in the SDP dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly process crypto-suite parameters, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1577</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1577" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1577" source="CVE"/>
    <description>
    The dissect_sip_p_charging_func_addresses function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle offset data associated with a quoted string, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1578</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1578" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1578" source="CVE"/>
    <description>
    The dissect_pw_eth_heuristic function in epan/dissectors/packet-pw-eth.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle apparent Ethernet address values at the beginning of MPLS data, which allows remote attackers to cause a denial of service (loop) via a malformed packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1579</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1579" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1579" source="CVE"/>
    <description>
    The rtps_util_add_bitmap function in epan/dissectors/packet-rtps.c in the RTPS dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly implement certain nested loops for processing bitmap data, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1580</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1580" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1580" source="CVE"/>
    <description>
    The dissect_cmstatus_tlv function in plugins/docsis/packet-cmstatus.c in the DOCSIS CM-STATUS dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 uses an incorrect data type for a position variable, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1581</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1581" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1581" source="CVE"/>
    <description>
    The dissect_pft_fec_detailed function in epan/dissectors/packet-dcp-etsi.c in the DCP-ETSI dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle fragment gaps, which allows remote attackers to cause a denial of service (loop) via a malformed packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1582</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1582" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1582" source="CVE"/>
    <description>
    The dissect_clnp function in epan/dissectors/packet-clnp.c in the CLNP dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly manage an offset variable, which allows remote attackers to cause a denial of service (infinite loop or application crash) via a malformed packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1583</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1583" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1583" source="CVE"/>
    <description>
    The dissect_version_4_primary_header function in epan/dissectors/packet-dtn.c in the DTN dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 accesses an inappropriate pointer, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1584</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1584" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1584" source="CVE"/>
    <description>
    The dissect_version_5_and_6_primary_header function in epan/dissectors/packet-dtn.c in the DTN dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 accesses an inappropriate pointer, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1585</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1585" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1585" source="CVE"/>
    <description>
    epan/tvbuff.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly validate certain length values for the MS-MMC dissector, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1586</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1586" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1586" source="CVE"/>
    <description>
    The fragment_set_tot_len function in epan/reassemble.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly determine the length of a reassembled packet for the DTLS dissector, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1587</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1587" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1587" source="CVE"/>
    <description>
    The dissect_rohc_ir_packet function in epan/dissectors/packet-rohc.c in the ROHC dissector in Wireshark 1.8.x before 1.8.5 does not properly handle unknown profiles, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1588</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1588" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1588" source="CVE"/>
    <description>
    Multiple buffer overflows in the dissect_pft_fec_detailed function in the DCP-ETSI dissector in epan/dissectors/packet-dcp-etsi.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 allow remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1589</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1589" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1589" source="CVE"/>
    <description>
    Double free vulnerability in epan/proto.c in the dissection engine in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1590</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1590" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1590" source="CVE"/>
    <description>
    Buffer overflow in the NTLMSSP dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1620</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1620" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1620" source="CVE"/>
    <description>
    The TLS implementation in Mozilla Network Security Services (NSS) does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137486" comment="libfreebl3-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137487" comment="libsoftokn3-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137488" comment="mozilla-nss-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137489" comment="mozilla-nss-certs-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137490" comment="mozilla-nss-devel-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137491" comment="mozilla-nss-tools-3.17.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1635</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1635" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1635" source="CVE"/>
    <description>
    ext/soap/soap.c in PHP before 5.3.22 and 5.4.x before 5.4.13 does not validate the relationship between the soap.wsdl_cache_dir directive and the open_basedir directive, which allows remote attackers to bypass intended access restrictions by triggering the creation of cached SOAP WSDL files in an arbitrary directory.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1643</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1643" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1643" source="CVE"/>
    <description>
    The SOAP parser in PHP before 5.3.23 and 5.4.x before 5.4.13 allows remote attackers to read arbitrary files via a SOAP WSDL file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue in the soap_xmlParseFile and soap_xmlParseMemory functions.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-1824.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1667</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1667" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1667" source="CVE"/>
    <description>
    The rehash mechanism in Perl 5.8.2 through 5.16.x allows context-dependent attackers to cause a denial of service (memory consumption and crash) via a crafted hash key.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136972" comment="apache2-mod_perl-2.0.8-7.2.6 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1669</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1669" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1669" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 21.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1670</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1670" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1670" source="CVE"/>
    <description>
    The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 does not prevent acquisition of chrome privileges during calls to content level constructors, which allows remote attackers to bypass certain read-only restrictions and conduct cross-site scripting (XSS) attacks via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1671</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1671" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1671" source="CVE"/>
    <description>
    Mozilla Firefox before 21.0 does not properly implement the INPUT element, which allows remote attackers to obtain the full pathname via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1674</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1674" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1674" source="CVE"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allows remote attackers to execute arbitrary code via vectors involving an onresize event during the playing of a video.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1675</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1675" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1675" source="CVE"/>
    <description>
    Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 do not properly initialize data structures for the nsDOMSVGZoomEvent::mPreviousScale and nsDOMSVGZoomEvent::mNewScale functions, which allows remote attackers to obtain sensitive information from process memory via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1676</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1676" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1676" source="CVE"/>
    <description>
    The SelectionIterator::GetNextSegment function in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1677</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1677" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1677" source="CVE"/>
    <description>
    The gfxSkipCharsIterator::SetOffsets function in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1678</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1678" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1678" source="CVE"/>
    <description>
    The _cairo_xlib_surface_add_glyph function in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allows remote attackers to execute arbitrary code or cause a denial of service (invalid write operation) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1679</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1679" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1679" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::plugins::child::_geturlnotify function in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1680</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1680" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1680" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsFrameList::FirstChild function in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1681</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1681" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1681" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsContentUtils::RemoveScriptBlocker function in Mozilla Firefox before 21.0, Firefox ESR 17.x before 17.0.6, Thunderbird before 17.0.6, and Thunderbird ESR 17.x before 17.0.6 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1682</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1682" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1682" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1683</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1683" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1683" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 22.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1684</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1684" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1684" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::dom::HTMLMediaElement::LookupMediaElementURITable function in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1685</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1685" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1685" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsIDocument::GetRootElement function in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1686</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1686" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1686" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::ResetDir function in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1687</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1687" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1687" source="CVE"/>
    <description>
    The System Only Wrapper (SOW) and Chrome Object Wrapper (COW) implementations in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not properly restrict XBL user-defined functions, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges, or conduct cross-site scripting (XSS) attacks, via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1688</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1688" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1688" source="CVE"/>
    <description>
    The Profiler implementation in Mozilla Firefox before 22.0 parses untrusted data during UI rendering, which allows user-assisted remote attackers to execute arbitrary JavaScript code via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1690</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1690" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1690" source="CVE"/>
    <description>
    Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not properly handle onreadystatechange events in conjunction with page reloading, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted web site that triggers an attempt to execute data at an unmapped memory location.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1692</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1692" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1692" source="CVE"/>
    <description>
    Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not prevent the inclusion of body data in an XMLHttpRequest HEAD request, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1693</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1693" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1693" source="CVE"/>
    <description>
    The SVG filter implementation in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to read pixel values, and possibly bypass the Same Origin Policy and read text from a different domain, by observing timing differences in execution of filter code.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1694</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1694" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1694" source="CVE"/>
    <description>
    The PreserveWrapper implementation in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 does not properly handle the lack of a wrapper, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code by leveraging unintended clearing of the wrapper cache's preserved-wrapper flag.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1695</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1695" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1695" source="CVE"/>
    <description>
    Mozilla Firefox before 22.0 does not properly implement certain DocShell inheritance behavior for the sandbox attribute of an IFRAME element, which allows remote attackers to bypass intended access restrictions via a FRAME element within an IFRAME element.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1696</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1696" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1696" source="CVE"/>
    <description>
    Mozilla Firefox before 22.0 does not properly enforce the X-Frame-Options protection mechanism, which allows remote attackers to conduct clickjacking attacks via a crafted web site that uses the HTTP server push feature with multipart responses.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1697</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1697" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1697" source="CVE"/>
    <description>
    The XrayWrapper implementation in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 does not properly restrict use of DefaultValue for method calls, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site that triggers use of a user-defined (1) toString or (2) valueOf method.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1698</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1698" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1698" source="CVE"/>
    <description>
    The getUserMedia permission implementation in Mozilla Firefox before 22.0 references the URL of a top-level document instead of the URL of a specific page, which makes it easier for remote attackers to trick users into permitting camera or microphone access via a crafted web site that uses IFRAME elements.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1699</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1699" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1699" source="CVE"/>
    <description>
    The Internationalized Domain Name (IDN) display algorithm in Mozilla Firefox before 22.0 does not properly handle the .com, .name, and .net top-level domains, which allows remote attackers to spoof the address bar via unspecified homograph characters.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1701</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1701" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1701" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1702</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1702" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1702" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 23.0 and SeaMonkey before 2.20 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1704</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1704" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1704" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsINode::GetParentNode function in Mozilla Firefox before 23.0 and SeaMonkey before 2.20 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and application crash) via vectors involving a DOM modification at the time of a SetBody mutation event.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1705</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1705" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1705" source="CVE"/>
    <description>
    Heap-based buffer underflow in the cryptojs_interpret_key_gen_type function in Mozilla Firefox before 23.0 and SeaMonkey before 2.20 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted Certificate Request Message Format (CRMF) request.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1708</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1708" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1708" source="CVE"/>
    <description>
    Mozilla Firefox before 23.0 and SeaMonkey before 2.20 allow remote attackers to cause a denial of service (application crash) via a crafted WAV file that is not properly handled by the nsCString::CharAt function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1709</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1709" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1709" source="CVE"/>
    <description>
    Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 do not properly handle the interaction between FRAME elements and history, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving spoofing a relative location in a previously visited document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1710</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1710" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1710" source="CVE"/>
    <description>
    The crypto.generateCRMFRequest function in Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 allows remote attackers to execute arbitrary JavaScript code or conduct cross-site scripting (XSS) attacks via vectors related to Certificate Request Message Format (CRMF) request generation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1711</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1711" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1711" source="CVE"/>
    <description>
    The XrayWrapper implementation in Mozilla Firefox before 23.0 and SeaMonkey before 2.20 does not properly address the possibility of an XBL scope bypass resulting from non-native arguments in XBL function calls, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks by leveraging access to an unprivileged object.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1713</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1713" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1713" source="CVE"/>
    <description>
    Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 use an incorrect URI within unspecified comparisons during enforcement of the Same Origin Policy, which allows remote attackers to conduct cross-site scripting (XSS) attacks or install arbitrary add-ons via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1714</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1714" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1714" source="CVE"/>
    <description>
    The Web Workers implementation in Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 does not properly restrict XMLHttpRequest calls, which allows remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1717</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1717" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1717" source="CVE"/>
    <description>
    Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 do not properly restrict local-filesystem access by Java applets, which allows user-assisted remote attackers to read arbitrary files by leveraging a download to a fixed pathname or other predictable pathname.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1718</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1718" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1718" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1719</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1719" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1719" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1720</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1720" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1720" source="CVE"/>
    <description>
    The nsHtml5TreeBuilder::resetTheInsertionMode function in the HTML5 Tree Builder in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21 does not properly maintain the state of the insertion-mode stack for template elements, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer over-read) by triggering use of this stack in its empty state.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1721</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1721" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1721" source="CVE"/>
    <description>
    Integer overflow in the drawLineLoop function in the libGLESv2 library in Almost Native Graphics Layer Engine (ANGLE), as used in Mozilla Firefox before 24.0 and SeaMonkey before 2.21, allows remote attackers to execute arbitrary code via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1722</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1722" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1722" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsAnimationManager::BuildAnimations function in the Animation Manager in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving stylesheet cloning.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1723</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1723" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1723" source="CVE"/>
    <description>
    The NativeKey widget in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21 processes key messages after destruction by a dispatched event listener, which allows remote attackers to cause a denial of service (application crash) by leveraging incorrect event usage after widget-memory reallocation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1724</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1724" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1724" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::dom::HTMLFormElement::IsDefaultSubmitElement function in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving a destroyed SELECT element.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1725</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1725" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1725" source="CVE"/>
    <description>
    Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 do not ensure that initialization occurs for JavaScript objects with compartments, which allows remote attackers to execute arbitrary code by leveraging incorrect scope handling.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1728</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1728" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1728" source="CVE"/>
    <description>
    The IonMonkey JavaScript engine in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21, when Valgrind mode is used, does not properly initialize memory, which makes it easier for remote attackers to obtain sensitive information via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1730</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1730" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1730" source="CVE"/>
    <description>
    Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 do not properly handle movement of XBL-backed nodes between documents, which allows remote attackers to execute arbitrary code or cause a denial of service (JavaScript compartment mismatch, or assertion failure and application exit) via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1732</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1732" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1732" source="CVE"/>
    <description>
    Buffer overflow in the nsFloatManager::GetFlowArea function in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code via crafted use of lists and floats within a multi-column layout.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1735</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1735" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1735" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::layout::ScrollbarActivity function in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code via vectors related to image-document scrolling.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1736</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1736" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1736" source="CVE"/>
    <description>
    The nsGfxScrollFrameInner::IsLTR function in Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to improperly establishing parent-child relationships of range-request nodes.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1737</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1737" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1737" source="CVE"/>
    <description>
    Mozilla Firefox before 24.0, Firefox ESR 17.x before 17.0.9, Thunderbird before 24.0, Thunderbird ESR 17.x before 17.0.9, and SeaMonkey before 2.21 do not properly identify the "this" object during use of user-defined getter methods on DOM proxies, which might allow remote attackers to bypass intended access restrictions via vectors involving an expando object.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1738</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1738" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1738" source="CVE"/>
    <description>
    Use-after-free vulnerability in the JS_GetGlobalForScopeChain function in Mozilla Firefox before 24.0, Thunderbird before 24.0, and SeaMonkey before 2.21 allows remote attackers to execute arbitrary code by leveraging incorrect garbage collection in situations involving default compartments and frame-chain restoration.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1739</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1739" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1739" source="CVE"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.15.2 does not ensure that data structures are initialized before read operations, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a decryption failure.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137486" comment="libfreebl3-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137487" comment="libsoftokn3-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137488" comment="mozilla-nss-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137489" comment="mozilla-nss-certs-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137490" comment="mozilla-nss-devel-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137491" comment="mozilla-nss-tools-3.17.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1740</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1740" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1740" source="CVE"/>
    <description>
    The ssl_Do1stHandshake function in sslsecur.c in libssl in Mozilla Network Security Services (NSS) before 3.15.4, when the TLS False Start feature is enabled, allows man-in-the-middle attackers to spoof SSL servers by using an arbitrary X.509 certificate during certain handshake traffic.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137486" comment="libfreebl3-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137487" comment="libsoftokn3-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137488" comment="mozilla-nss-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137489" comment="mozilla-nss-certs-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137490" comment="mozilla-nss-devel-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137491" comment="mozilla-nss-tools-3.17.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1752</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1752" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1752" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137609" comment="libpython2_7-1_0-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137610" comment="libpython2_7-1_0-32bit-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137614" comment="libpython3_4m1_0-3.4.1-4.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137611" comment="python-base-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137612" comment="python-devel-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137613" comment="python-xml-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137615" comment="python3-base-3.4.1-4.2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1753</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1753" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1753" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137609" comment="libpython2_7-1_0-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137610" comment="libpython2_7-1_0-32bit-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137611" comment="python-base-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137612" comment="python-devel-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137613" comment="python-xml-2.7.8-1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1775</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1775" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1775" source="CVE"/>
    <description>
    sudo 1.6.0 through 1.7.10p6 and sudo 1.8.0 through 1.8.6p6 allows local users or physically proximate attackers to bypass intended time restrictions and retain privileges without re-authenticating by setting the system clock and sudo user timestamp to the epoch.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137883" comment="sudo-1.8.10p3-2.1.6 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1776</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1776" source="CVE"/>
    <description>
    sudo 1.3.5 through 1.7.10 and 1.8.0 through 1.8.5, when the tty_tickets option is enabled, does not properly validate the controlling terminal device, which allows local users with sudo permissions to hijack the authorization of another terminal via vectors related to connecting to the standard input, output, and error file descriptors of another terminal.  NOTE: this is one of three closely-related vulnerabilities that were originally assigned CVE-2013-1776, but they have been SPLIT because of different affected versions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137883" comment="sudo-1.8.10p3-2.1.6 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1788</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1788" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1788" source="CVE"/>
    <description>
    poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors that trigger an "invalid memory access" in (1) splash/Splash.cc, (2) poppler/Function.cc, and (3) poppler/Stream.cc.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137580" comment="libpoppler-cpp0-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137581" comment="libpoppler-devel-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137582" comment="libpoppler-glib8-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137583" comment="libpoppler-qt4-4-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137584" comment="libpoppler-qt4-devel-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137585" comment="libpoppler46-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137586" comment="poppler-tools-0.26.5-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1789</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1789" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1789" source="CVE"/>
    <description>
    splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137580" comment="libpoppler-cpp0-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137581" comment="libpoppler-devel-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137582" comment="libpoppler-glib8-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137583" comment="libpoppler-qt4-4-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137584" comment="libpoppler-qt4-devel-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137585" comment="libpoppler46-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137586" comment="poppler-tools-0.26.5-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1790</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1790" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1790" source="CVE"/>
    <description>
    poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137580" comment="libpoppler-cpp0-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137581" comment="libpoppler-devel-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137582" comment="libpoppler-glib8-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137583" comment="libpoppler-qt4-4-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137584" comment="libpoppler-qt4-devel-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137585" comment="libpoppler46-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137586" comment="poppler-tools-0.26.5-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1799</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1799" source="CVE"/>
    <description>
    Gnome Online Accounts (GOA) 3.6.x before 3.6.3 and 3.7.x before 3.7.91, does not properly validate SSL certificates when creating accounts for providers who use the libsoup library, which allows man-in-the-middle attackers to obtain sensitive information such as credentials by sniffing the network.  NOTE: this issue exists because of an incomplete fix for CVE-2013-0240.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137241" comment="gnome-online-accounts-3.14.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137242" comment="gnome-online-accounts-devel-3.14.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137243" comment="libgoa-1_0-0-3.14.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137244" comment="libgoa-backend-1_0-1-3.14.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137245" comment="typelib-1_0-Goa-1_0-3.14.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1824</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1824" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1824" source="CVE"/>
    <description>
    The SOAP parser in PHP before 5.3.22 and 5.4.x before 5.4.12 allows remote attackers to read arbitrary files via a SOAP WSDL file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue in the soap_xmlParseFile and soap_xmlParseMemory functions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1845</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1845" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1845" source="CVE"/>
    <description>
    The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x before 1.6.21 and 1.7.0 through 1.7.8 allows remote authenticated users to cause a denial of service (memory consumption) by (1) setting or (2) deleting a large number of properties for a file or directory.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137877" comment="subversion-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137878" comment="subversion-devel-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137879" comment="subversion-perl-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137880" comment="subversion-python-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137881" comment="subversion-server-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137882" comment="subversion-tools-1.8.10-2.4.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1846</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1846" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1846" source="CVE"/>
    <description>
    The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x before 1.6.21 and 1.7.0 through 1.7.8 allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) via a LOCK on an activity URL.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137877" comment="subversion-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137878" comment="subversion-devel-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137879" comment="subversion-perl-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137880" comment="subversion-python-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137881" comment="subversion-server-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137882" comment="subversion-tools-1.8.10-2.4.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1847</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1847" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1847" source="CVE"/>
    <description>
    The mod_dav_svn Apache HTTPD server module in Subversion 1.6.0 through 1.6.20 and 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an anonymous LOCK for a URL that does not exist.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137877" comment="subversion-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137878" comment="subversion-devel-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137879" comment="subversion-perl-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137880" comment="subversion-python-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137881" comment="subversion-server-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137882" comment="subversion-tools-1.8.10-2.4.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1849</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1849" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1849" source="CVE"/>
    <description>
    The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x through 1.6.20 and 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a PROPFIND request for an activity URL.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137877" comment="subversion-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137878" comment="subversion-devel-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137879" comment="subversion-perl-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137880" comment="subversion-python-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137881" comment="subversion-server-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137882" comment="subversion-tools-1.8.10-2.4.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1863</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1863" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1863" source="CVE"/>
    <description>
    Samba 4.x before 4.0.4, when configured as an Active Directory domain controller, uses world-writable permissions on non-default CIFS shares, which allows remote authenticated users to read, modify, create, or delete arbitrary files via standard filesystem operations.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137424" comment="libdcerpc-binding0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137425" comment="libdcerpc-binding0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137426" comment="libdcerpc0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137427" comment="libdcerpc0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137428" comment="libgensec0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137429" comment="libgensec0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137430" comment="libndr-krb5pac0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137431" comment="libndr-krb5pac0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137432" comment="libndr-nbt0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137433" comment="libndr-nbt0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137434" comment="libndr-standard0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137435" comment="libndr-standard0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137436" comment="libndr0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137437" comment="libndr0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137438" comment="libnetapi0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137439" comment="libnetapi0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137440" comment="libpdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137441" comment="libpdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137442" comment="libregistry0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137443" comment="libsamba-credentials0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137444" comment="libsamba-credentials0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137445" comment="libsamba-hostconfig0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137446" comment="libsamba-hostconfig0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137447" comment="libsamba-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137448" comment="libsamba-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137449" comment="libsamdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137450" comment="libsamdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137451" comment="libsmbclient-devel-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137452" comment="libsmbclient-raw0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137453" comment="libsmbclient-raw0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137454" comment="libsmbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137455" comment="libsmbconf0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137456" comment="libsmbconf0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137457" comment="libsmbldap0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137458" comment="libsmbldap0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137459" comment="libtevent-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137460" comment="libtevent-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137461" comment="libwbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137462" comment="libwbclient0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137463" comment="samba-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137464" comment="samba-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137465" comment="samba-client-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137466" comment="samba-client-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137467" comment="samba-doc-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137468" comment="samba-libs-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137469" comment="samba-libs-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137470" comment="samba-winbind-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137471" comment="samba-winbind-32bit-4.1.12-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1881</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1881" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1881" source="CVE"/>
    <description>
    GNOME libsvg before 2.39.0 allows remote attackers to read arbitrary files via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137191" comment="gdk-pixbuf-loader-rsvg-2.40.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137192" comment="librsvg-2-2-2.40.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137193" comment="librsvg-devel-2.40.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137194" comment="typelib-1_0-Rsvg-2_0-2.40.5-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1884</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1884" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1884" source="CVE"/>
    <description>
    The mod_dav_svn Apache HTTPD server module in Subversion 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (segmentation fault and crash) via a log REPORT request with an invalid limit, which triggers an access of an uninitialized variable.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137877" comment="subversion-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137878" comment="subversion-devel-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137879" comment="subversion-perl-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137880" comment="subversion-python-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137881" comment="subversion-server-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137882" comment="subversion-tools-1.8.10-2.4.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1896</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1896" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1896" source="CVE"/>
    <description>
    mod_dav.c in the Apache HTTP Server before 2.2.25 does not properly determine whether DAV is enabled for a URI, which allows remote attackers to cause a denial of service (segmentation fault) via a MERGE request in which the URI is configured for handling by the mod_dav_svn module, but a certain href attribute in XML data refers to a non-DAV URI.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136944" comment="apache2-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136945" comment="apache2-devel-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136946" comment="apache2-doc-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136947" comment="apache2-example-pages-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136948" comment="apache2-prefork-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136949" comment="apache2-utils-2.4.10-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1899</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1899" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1899" source="CVE"/>
    <description>
    Argument injection vulnerability in PostgreSQL 9.2.x before 9.2.4, 9.1.x before 9.1.9, and 9.0.x before 9.0.13 allows remote attackers to cause a denial of service (file corruption), and allows remote authenticated users to modify configuration settings and execute arbitrary code, via a connection request using a database name that begins with a "-" (hyphen).
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137474" comment="libecpg6-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137475" comment="libpq5-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137476" comment="libpq5-32bit-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137477" comment="postgresql93-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137478" comment="postgresql93-contrib-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137479" comment="postgresql93-devel-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137480" comment="postgresql93-docs-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137481" comment="postgresql93-server-9.3.5-2.1.14 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1900</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1900" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1900" source="CVE"/>
    <description>
    PostgreSQL 9.2.x before 9.2.4, 9.1.x before 9.1.9, 9.0.x before 9.0.13, and 8.4.x before 8.4.17, when using OpenSSL, generates insufficiently random numbers, which might allow remote authenticated users to have an unspecified impact via vectors related to the "contrib/pgcrypto functions."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137474" comment="libecpg6-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137475" comment="libpq5-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137476" comment="libpq5-32bit-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137477" comment="postgresql93-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137478" comment="postgresql93-contrib-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137479" comment="postgresql93-devel-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137480" comment="postgresql93-docs-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137481" comment="postgresql93-server-9.3.5-2.1.14 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1901</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1901" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1901" source="CVE"/>
    <description>
    PostgreSQL 9.2.x before 9.2.4 and 9.1.x before 9.1.9 does not properly check REPLICATION privileges, which allows remote authenticated users to bypass intended backup restrictions by calling the (1) pg_start_backup or (2) pg_stop_backup functions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137474" comment="libecpg6-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137475" comment="libpq5-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137476" comment="libpq5-32bit-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137477" comment="postgresql93-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137478" comment="postgresql93-contrib-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137479" comment="postgresql93-devel-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137480" comment="postgresql93-docs-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137481" comment="postgresql93-server-9.3.5-2.1.14 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1914</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1914" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914" source="CVE"/>
    <description>
    Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.17 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of domain conversion results.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137226" comment="glibc-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137227" comment="glibc-32bit-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137228" comment="glibc-devel-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137229" comment="glibc-extra-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137230" comment="glibc-info-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137231" comment="glibc-locale-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137232" comment="glibc-locale-32bit-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137233" comment="nscd-2.19-16.2.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1917</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1917" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1917" source="CVE"/>
    <description>
    Xen 3.1 through 4.x, when running 64-bit hosts on Intel CPUs, does not clear the NT flag when using an IRET after a SYSENTER instruction, which allows PV guest users to cause a denial of service (hypervisor crash) by triggering a #GP fault, which is not properly handled by another IRET instruction.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1918</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1918" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1918" source="CVE"/>
    <description>
    Certain page table manipulation operations in Xen 4.1.x, 4.2.x, and earlier are not preemptible, which allows local PV kernels to cause a denial of service via vectors related to "deep page table traversal."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1919</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1919" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1919" source="CVE"/>
    <description>
    Xen 4.2.x and 4.1.x does not properly restrict access to IRQs, which allows local stub domain clients to gain access to IRQs and cause a denial of service via vectors related to "passed-through IRQs or PCI devices."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1922</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1922" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1922" source="CVE"/>
    <description>
    qemu-nbd in QEMU, as used in Xen 4.2.x, determines the format of a raw disk image based on the header, which allows local guest OS administrators to read arbitrary files on the host by modifying the header to identify a different format, which is used when the guest is restarted, a different vulnerability than CVE-2008-2004.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1926</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1926" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1926" source="CVE"/>
    <description>
    The IcedTea-Web plugin before 1.2.3 and 1.3.x before 1.3.2 uses the same class loader for applets with the same codebase path but from different domains, which allows remote attackers to obtain sensitive information or possibly alter other applets via a crafted applet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137274" comment="icedtea-web-javadoc-1.5.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137275" comment="java-1_7_0-openjdk-plugin-1.5.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137276" comment="java-1_8_0-openjdk-plugin-1.5.1-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1927</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1927" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1927" source="CVE"/>
    <description>
    The IcedTea-Web plugin before 1.2.3 and 1.3.x before 1.3.2 allows remote attackers to execute arbitrary code via a crafted file that validates as both a GIF and a Java JAR file, aka "GIFAR."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137274" comment="icedtea-web-javadoc-1.5.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137275" comment="java-1_7_0-openjdk-plugin-1.5.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137276" comment="java-1_8_0-openjdk-plugin-1.5.1-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1940</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1940" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1940" source="CVE"/>
    <description>
    X.Org X server before 1.13.4 and 1.4.x before 1.14.1 does not properly restrict access to input events when adding a new hot-plug device, which might allow physically proximate attackers to obtain sensitive information, as demonstrated by reading passwords from a tty.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137919" comment="xorg-x11-server-7.6_1.16.1-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137920" comment="xorg-x11-server-extra-7.6_1.16.1-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137921" comment="xorg-x11-server-sdk-7.6_1.16.1-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1944</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1944" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1944" source="CVE"/>
    <description>
    The tailMatch function in cookie.c in cURL and libcurl before 7.30.0 does not properly match the path domain when sending cookies, which allows remote attackers to steal cookies via a matching suffix in the domain of a URL.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137106" comment="curl-7.38.0-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137107" comment="libcurl-devel-7.38.0-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137108" comment="libcurl4-7.38.0-1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1952</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1952" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1952" source="CVE"/>
    <description>
    Xen 4.x, when using Intel VT-d for a bus mastering capable PCI device, does not properly check the source when accessing a bridge device's interrupt remapping table entries for MSI interrupts, which allows local guest domains to cause a denial of service (interrupt injection) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1960</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1960" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1960" source="CVE"/>
    <description>
    Heap-based buffer overflow in the t2p_process_jpeg_strip function in tiff2pdf in libtiff 4.0.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137719" comment="libtiff-devel-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137720" comment="libtiff5-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137721" comment="libtiff5-32bit-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137722" comment="tiff-4.0.3-10.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1961</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1961" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1961" source="CVE"/>
    <description>
    Stack-based buffer overflow in the t2p_write_pdf_page function in tiff2pdf in libtiff before 4.0.3 allows remote attackers to cause a denial of service (application crash) via a crafted image length and resolution in a TIFF image file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137719" comment="libtiff-devel-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137720" comment="libtiff5-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137721" comment="libtiff5-32bit-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137722" comment="tiff-4.0.3-10.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1962</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1962" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1962" source="CVE"/>
    <description>
    The remoteDispatchStoragePoolListAllVolumes function in the storage pool manager in libvirt 1.0.5 allows remote attackers to cause a denial of service (file descriptor consumption) via a large number of requests "to list all volumes for the particular pool."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137726" comment="libvirt-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137727" comment="libvirt-client-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137728" comment="libvirt-daemon-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137729" comment="libvirt-daemon-config-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137730" comment="libvirt-daemon-config-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137731" comment="libvirt-daemon-driver-interface-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137732" comment="libvirt-daemon-driver-libxl-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137733" comment="libvirt-daemon-driver-lxc-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137734" comment="libvirt-daemon-driver-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137735" comment="libvirt-daemon-driver-nodedev-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137736" comment="libvirt-daemon-driver-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137737" comment="libvirt-daemon-driver-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137738" comment="libvirt-daemon-driver-secret-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137739" comment="libvirt-daemon-driver-storage-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137740" comment="libvirt-daemon-driver-uml-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137741" comment="libvirt-daemon-driver-vbox-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137742" comment="libvirt-daemon-driver-xen-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137743" comment="libvirt-daemon-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137744" comment="libvirt-daemon-xen-1.2.9-1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1968</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1968" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1968" source="CVE"/>
    <description>
    Subversion before 1.6.23 and 1.7.x before 1.7.10 allows remote authenticated users to cause a denial of service (FSFS repository corruption) via a newline character in a file name.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137877" comment="subversion-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137878" comment="subversion-devel-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137879" comment="subversion-perl-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137880" comment="subversion-python-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137881" comment="subversion-server-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137882" comment="subversion-tools-1.8.10-2.4.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1969</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1969" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1969" source="CVE"/>
    <description>
    Multiple use-after-free vulnerabilities in libxml2 2.9.0 and possibly other versions might allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to the (1) htmlParseChunk and (2) xmldecl_done functions, as demonstrated by a buffer overflow in the xmlBufGetInputBase function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137790" comment="libxml2-2-2.9.1-7.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137791" comment="libxml2-2-32bit-2.9.1-7.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137792" comment="libxml2-devel-2.9.1-7.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137793" comment="libxml2-tools-2.9.1-7.2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1976</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1976" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1976" source="CVE"/>
    <description>
    The (1) tomcat5, (2) tomcat6, and (3) tomcat7 init scripts, as used in the RPM distribution of Tomcat for JBoss Enterprise Web Server 1.0.2 and 2.0.0, and Red Hat Enterprise Linux 5 and 6, allow local users to change the ownership of arbitrary files via a symlink attack on (a) tomcat5-initd.log, (b) tomcat6-initd.log, (c) catalina.out, or (d) tomcat7-initd.log.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137547" comment="libmysqlclient-devel-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137548" comment="libmysqlclient18-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137549" comment="libmysqlclient18-32bit-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137550" comment="libmysqlclient_r18-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137551" comment="libmysqld18-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137552" comment="mariadb-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137553" comment="mariadb-client-10.0.13-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137554" comment="mariadb-errormessages-10.0.13-2.3.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1981</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1981" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libX11 1.5.99.901 (1.6 RC1) and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XQueryFont, (2) _XF86BigfontQueryFont, (3) XListFontsWithInfo, (4) XGetMotionEvents, (5) XListHosts, (6) XGetModifierMapping, (7) XGetPointerMapping, (8) XGetKeyboardMapping, (9) XGetWindowProperty, (10) XGetImage, (11) LoadColornameDB, (12) XrmGetFileDatabase, (13) _XimParseStringFile, or (14) TransFileName functions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137344" comment="libX11-6-1.6.2-5.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137345" comment="libX11-6-32bit-1.6.2-5.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137346" comment="libX11-data-1.6.2-5.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137347" comment="libX11-devel-1.6.2-5.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137348" comment="libX11-xcb1-1.6.2-5.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137349" comment="libX11-xcb1-32bit-1.6.2-5.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1982</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1982" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1982" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXext 1.3.1 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XcupGetReservedColormapEntries, (2) XcupStoreColors, (3) XdbeGetVisualInfo, (4) XeviGetVisualInfo, (5) XShapeGetRectangles, and (6) XSyncListSystemCounters functions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137355" comment="libXext-devel-1.3.3-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137356" comment="libXext6-1.3.3-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137357" comment="libXext6-32bit-1.3.3-2.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1983</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1983" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1983" source="CVE"/>
    <description>
    Integer overflow in X.org libXfixes 5.0 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the XFixesGetCursorImage function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137358" comment="libXfixes-devel-5.0.1-4.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137359" comment="libXfixes3-5.0.1-4.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137360" comment="libXfixes3-32bit-5.0.1-4.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1984</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1984" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1984" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXi 1.7.1 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XGetDeviceControl, (2) XGetFeedbackControl, (3) XGetDeviceDontPropagateList, (4) XGetDeviceMotionEvents, (5) XIGetProperty, (6) XIGetSelectedEvents, (7) XGetDeviceProperties, and (8) XListInputDevices functions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137363" comment="libXi-devel-1.7.4-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137364" comment="libXi6-1.7.4-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137365" comment="libXi6-32bit-1.7.4-2.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1985</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1985" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1985" source="CVE"/>
    <description>
    Integer overflow in X.org libXinerama 1.1.2 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the XineramaQueryScreens function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137366" comment="libXinerama-devel-1.1.3-4.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137367" comment="libXinerama1-1.1.3-4.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137368" comment="libXinerama1-32bit-1.1.3-4.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1986</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1986" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1986" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXrandr 1.4.0 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XRRQueryOutputProperty and (2) XRRQueryProviderProperty functions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137371" comment="libXrandr-devel-1.4.2-4.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137372" comment="libXrandr2-1.4.2-4.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137373" comment="libXrandr2-32bit-1.4.2-4.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1987</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1987" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1987" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXrender 0.9.7 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XRenderQueryFilters, (2) XRenderQueryFormats, and (3) XRenderQueryPictIndexValues functions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137374" comment="libXrender-devel-0.9.8-4.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137375" comment="libXrender1-0.9.8-4.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137376" comment="libXrender1-32bit-0.9.8-4.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1988</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1988" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1988" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXRes 1.0.6 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XResQueryClients and (2) XResQueryClientResources functions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137350" comment="libXRes1-1.0.7-4.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137351" comment="libXres-devel-1.0.7-4.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1989</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1989" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1989" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXv 1.0.7 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XvQueryPortAttributes, (2) XvListImageFormats, and (3) XvCreateImage function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137382" comment="libXv-devel-1.0.10-4.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137383" comment="libXv1-1.0.10-4.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137384" comment="libXv1-32bit-1.0.10-4.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1990</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1990" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1990" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXvMC 1.0.7 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XvMCListSurfaceTypes and (2) XvMCListSubpictureTypes functions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137385" comment="libXvMC-devel-1.0.8-4.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137386" comment="libXvMC1-1.0.8-4.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1991</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1991" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1991" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXxf86dga 1.1.3 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XDGAQueryModes and (2) XDGASetMode functions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137387" comment="libXxf86dga-devel-1.1.4-4.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137388" comment="libXxf86dga1-1.1.4-4.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1992</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1992" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1992" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libdmx 1.1.2 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) DMXGetScreenAttributes, (2) DMXGetWindowAttributes, and (3) DMXGetInputAttributes functions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137472" comment="libdmx-devel-1.1.3-4.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137473" comment="libdmx1-1.1.3-4.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1995</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1995" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1995" source="CVE"/>
    <description>
    X.org libXi 1.7.1 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to an unexpected sign extension in the XListInputDevices function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137363" comment="libXi-devel-1.7.4-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137364" comment="libXi6-1.7.4-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137365" comment="libXi6-32bit-1.7.4-2.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1996</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1996" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1996" source="CVE"/>
    <description>
    X.org libFS 1.0.4 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to an unexpected sign extension in the FSOpenServer function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137335" comment="libFS-devel-1.0.6-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137336" comment="libFS6-1.0.6-2.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1997</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1997" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997" source="CVE"/>
    <description>
    Multiple buffer overflows in X.org libX11 1.5.99.901 (1.6 RC1) and earlier allow X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the (1) XAllocColorCells, (2) _XkbReadGetDeviceInfoReply, (3) _XkbReadGeomShapes, (4) _XkbReadGetGeometryReply, (5) _XkbReadKeySyms, (6) _XkbReadKeyActions, (7) _XkbReadKeyBehaviors, (8) _XkbReadModifierMap, (9) _XkbReadExplicitComponents, (10) _XkbReadVirtualModMap, (11) _XkbReadGetNamesReply, (12) _XkbReadGetMapReply, (13) _XimXGetReadData, (14) XListFonts, (15) XListExtensions, and (16) XGetFontPath functions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137344" comment="libX11-6-1.6.2-5.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137345" comment="libX11-6-32bit-1.6.2-5.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137346" comment="libX11-data-1.6.2-5.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137347" comment="libX11-devel-1.6.2-5.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137348" comment="libX11-xcb1-1.6.2-5.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137349" comment="libX11-xcb1-32bit-1.6.2-5.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1998</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1998" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1998" source="CVE"/>
    <description>
    Multiple buffer overflows in X.org libXi 1.7.1 and earlier allow X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the (1) XGetDeviceButtonMapping, (2) XIPassiveGrabDevice, and (3) XQueryDeviceState functions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137363" comment="libXi-devel-1.7.4-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137364" comment="libXi6-1.7.4-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137365" comment="libXi6-32bit-1.7.4-2.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1999</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-1999" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1999" source="CVE"/>
    <description>
    Buffer overflow in X.org libXvMC 1.0.7 and earlier allows X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the XvMCGetDRInfo function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137385" comment="libXvMC-devel-1.0.8-4.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137386" comment="libXvMC1-1.0.8-4.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2000</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2000" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2000" source="CVE"/>
    <description>
    Multiple buffer overflows in X.org libXxf86dga 1.1.3 and earlier allow X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the (1) XDGAQueryModes and (2) XDGASetMode functions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137387" comment="libXxf86dga-devel-1.1.4-4.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137388" comment="libXxf86dga1-1.1.4-4.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2001</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2001" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2001" source="CVE"/>
    <description>
    Buffer overflow in X.org libXxf86vm 1.1.2 and earlier allows X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the XF86VidModeGetGammaRamp function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137389" comment="libXxf86vm-devel-1.1.3-4.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137390" comment="libXxf86vm1-1.1.3-4.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137391" comment="libXxf86vm1-32bit-1.1.3-4.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2002</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2002" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2002" source="CVE"/>
    <description>
    Buffer overflow in X.org libXt 1.1.3 and earlier allows X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the _XtResourceConfigurationEH function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137377" comment="libXt-devel-1.1.4-4.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137378" comment="libXt6-1.1.4-4.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137379" comment="libXt6-32bit-1.1.4-4.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2003</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2003" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2003" source="CVE"/>
    <description>
    Integer overflow in X.org libXcursor 1.1.13 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the _XcursorFileHeaderCreate function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137352" comment="libXcursor-devel-1.1.14-5.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137353" comment="libXcursor1-1.1.14-5.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137354" comment="libXcursor1-32bit-1.1.14-5.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2004</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2004" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004" source="CVE"/>
    <description>
    The (1) GetDatabase and (2) _XimParseStringFile functions in X.org libX11 1.5.99.901 (1.6 RC1) and earlier do not restrict the recursion depth when processing directives to include files, which allows X servers to cause a denial of service (stack consumption) via a crafted file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137344" comment="libX11-6-1.6.2-5.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137345" comment="libX11-6-32bit-1.6.2-5.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137346" comment="libX11-data-1.6.2-5.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137347" comment="libX11-devel-1.6.2-5.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137348" comment="libX11-xcb1-1.6.2-5.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137349" comment="libX11-xcb1-32bit-1.6.2-5.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2005</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2005" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2005" source="CVE"/>
    <description>
    X.org libXt 1.1.3 and earlier does not check the return value of the XGetWindowProperty function, which allows X servers to trigger use of an uninitialized pointer and memory corruption via vectors related to the (1) ReqCleanup, (2) HandleSelectionEvents, (3) ReqTimedOut, (4) HandleNormal, and (5) HandleSelectionReplies functions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137377" comment="libXt-devel-1.1.4-4.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137378" comment="libXt6-1.1.4-4.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137379" comment="libXt6-32bit-1.1.4-4.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2007</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2007" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2007" source="CVE"/>
    <description>
    The qemu guest agent in Qemu 1.4.1 and earlier, as used by Xen, when started in daemon mode, uses weak permissions for certain files, which allows local users to read and write to these files.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2027</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2027" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2027" source="CVE"/>
    <description>
    Jython 2.2.1 uses the current umask to set the privileges of the class cache files, which allows local users to bypass intended access restrictions via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009106041" comment="jython-2.2.1-13.4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106042" comment="jython-demo-2.2.1-13.4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106043" comment="jython-javadoc-2.2.1-13.4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106044" comment="jython-manual-2.2.1-13.4.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2062</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2062" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2062" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXp 1.0.1 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XpGetAttributes, (2) XpGetOneAttribute, (3) XpGetPrinterList, and (4) XpQueryScreens functions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137369" comment="libXp-devel-1.0.2-4.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137370" comment="libXp6-1.0.2-4.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2063</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2063" source="CVE"/>
    <description>
    Integer overflow in X.org libXtst 1.2.1 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the XRecordGetContext function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137380" comment="libXtst-devel-1.2.2-4.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137381" comment="libXtst6-1.2.2-4.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2064</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2064" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2064" source="CVE"/>
    <description>
    Integer overflow in X.org libxcb 1.9 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the read_packet function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137754" comment="libxcb-composite0-1.11-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137755" comment="libxcb-damage0-1.11-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137756" comment="libxcb-devel-1.11-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137757" comment="libxcb-dpms0-1.11-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137758" comment="libxcb-dri2-0-1.11-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137759" comment="libxcb-dri2-0-32bit-1.11-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137760" comment="libxcb-dri3-0-1.11-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137761" comment="libxcb-dri3-0-32bit-1.11-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137762" comment="libxcb-glx0-1.11-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137763" comment="libxcb-glx0-32bit-1.11-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137764" comment="libxcb-present0-1.11-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137765" comment="libxcb-present0-32bit-1.11-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137766" comment="libxcb-randr0-1.11-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137767" comment="libxcb-record0-1.11-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137768" comment="libxcb-render0-1.11-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137769" comment="libxcb-render0-32bit-1.11-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137770" comment="libxcb-res0-1.11-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137771" comment="libxcb-screensaver0-1.11-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137772" comment="libxcb-shape0-1.11-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137773" comment="libxcb-shm0-1.11-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137774" comment="libxcb-shm0-32bit-1.11-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137775" comment="libxcb-sync1-1.11-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137776" comment="libxcb-sync1-32bit-1.11-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137777" comment="libxcb-xevie0-1.11-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137778" comment="libxcb-xf86dri0-1.11-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137779" comment="libxcb-xfixes0-1.11-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137780" comment="libxcb-xfixes0-32bit-1.11-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137781" comment="libxcb-xinerama0-1.11-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137782" comment="libxcb-xkb1-1.11-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137783" comment="libxcb-xprint0-1.11-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137784" comment="libxcb-xtest0-1.11-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137785" comment="libxcb-xv0-1.11-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137786" comment="libxcb-xvmc0-1.11-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137787" comment="libxcb1-1.11-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137788" comment="libxcb1-32bit-1.11-2.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2066</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2066" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2066" source="CVE"/>
    <description>
    Buffer overflow in X.org libXv 1.0.7 and earlier allows X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the XvQueryPortAttributes function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137382" comment="libXv-devel-1.0.10-4.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137383" comment="libXv1-1.0.10-4.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137384" comment="libXv1-32bit-1.0.10-4.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2088</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2088" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2088" source="CVE"/>
    <description>
    contrib/hook-scripts/svn-keyword-check.pl in Subversion before 1.6.23 allows remote authenticated users with commit permissions to execute arbitrary commands via shell metacharacters in a filename.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137877" comment="subversion-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137878" comment="subversion-devel-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137879" comment="subversion-perl-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137880" comment="subversion-python-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137881" comment="subversion-server-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137882" comment="subversion-tools-1.8.10-2.4.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2112</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2112" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2112" source="CVE"/>
    <description>
    The svnserve server in Subversion before 1.6.23 and 1.7.x before 1.7.10 allows remote attackers to cause a denial of service (exit) by aborting a connection.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137877" comment="subversion-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137878" comment="subversion-devel-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137879" comment="subversion-perl-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137880" comment="subversion-python-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137881" comment="subversion-server-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137882" comment="subversion-tools-1.8.10-2.4.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2126</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2126" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2126" source="CVE"/>
    <description>
    Multiple double free vulnerabilities in the LibRaw::unpack function in libraw_cxx.cpp in LibRaw before 0.15.2 allow context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a malformed full-color (1) Foveon or (2) sRAW image file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137637" comment="libraw-devel-0.16.0-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137638" comment="libraw10-0.16.0-2.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2127</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2127" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2127" source="CVE"/>
    <description>
    Buffer overflow in the exposure correction code in LibRaw before 0.15.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137637" comment="libraw-devel-0.16.0-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137638" comment="libraw10-0.16.0-2.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2131</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2131" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2131" source="CVE"/>
    <description>
    Format string vulnerability in the rrdtool module 1.4.7 for Python, as used in Zenoss, allows context-dependent attackers to cause a denial of service (crash) via format string specifiers to the rrdtool.graph function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009102837" comment="lua-rrdtool-1.4.7-20.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102838" comment="python-rrdtool-1.4.7-20.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102839" comment="rrdtool-1.4.7-20.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102840" comment="rrdtool-cached-1.4.7-20.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102841" comment="rrdtool-devel-1.4.7-20.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102842" comment="ruby-rrdtool-1.4.7-20.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102843" comment="tcl-rrdtool-1.4.7-20.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2132</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2132" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2132" source="CVE"/>
    <description>
    bson/_cbsonmodule.c in the mongo-python-driver (aka. pymongo) before 2.5.2, as used in MongoDB, allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to decoding of an "invalid DBRef."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137857" comment="python-pymongo-2.7.2-2.1.4 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2142</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2142" source="CVE"/>
    <description>
    userpref.c in libimobiledevice 1.1.4, when $HOME and $XDG_CONFIG_HOME are not set, allows local users to overwrite arbitrary files via a symlink attack on (1) HostCertificate.pem, (2) HostPrivateKey.pem, (3) libimobiledevicerc, (4) RootCertificate.pem, or (5) RootPrivateKey.pem in /tmp/root/.config/libimobiledevice/.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137515" comment="libimobiledevice-devel-1.1.6-2.1.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137516" comment="libimobiledevice4-1.1.6-2.1.6 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2168</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2168" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2168" source="CVE"/>
    <description>
    The _dbus_printf_string_upper_bound function in dbus/dbus-sysdeps-unix.c in D-Bus (aka DBus) 1.4.x before 1.4.26, 1.6.x before 1.6.12, and 1.7.x before 1.7.4 allows local users to cause a denial of service (service crash) via a crafted message.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137122" comment="dbus-1-1.8.8-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137123" comment="dbus-1-devel-1.8.8-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137124" comment="dbus-1-x11-1.8.8-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137125" comment="libdbus-1-3-1.8.8-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137126" comment="libdbus-1-3-32bit-1.8.8-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2174</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2174" source="CVE"/>
    <description>
    Heap-based buffer overflow in the curl_easy_unescape function in lib/escape.c in cURL and libcurl 7.7 through 7.30.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted string ending in a "%" (percent) character.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137106" comment="curl-7.38.0-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137107" comment="libcurl-devel-7.38.0-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137108" comment="libcurl4-7.38.0-1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2186</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2186" source="CVE"/>
    <description>
    The DiskFileItem class in Apache Commons FileUpload, as used in Red Hat JBoss BRMS 5.3.1; JBoss Portal 4.3 CP07, 5.2.2, and 6.0.0; and Red Hat JBoss Web Server 1.0.2 allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137280" comment="jakarta-commons-fileupload-1.1.1-124.1.11 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2207</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2207" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2207" source="CVE"/>
    <description>
    pt_chown in GNU C Library (aka glibc or libc6) before 2.18 does not properly check permissions for tty files, which allows local users to change the permission on the files and obtain access to arbitrary pseudo-terminals by leveraging a FUSE file system.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137226" comment="glibc-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137227" comment="glibc-32bit-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137228" comment="glibc-devel-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137229" comment="glibc-extra-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137230" comment="glibc-info-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137231" comment="glibc-locale-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137232" comment="glibc-locale-32bit-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137233" comment="nscd-2.19-16.2.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2218</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2218" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2218" source="CVE"/>
    <description>
    Double free vulnerability in the virConnectListAllInterfaces method in interface/interface_backend_netcf.c in libvirt 1.0.6 allows remote attackers to cause a denial of service (libvirtd crash) via a filtering flag that causes an interface to be skipped, as demonstrated by the "virsh iface-list --inactive" command.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137726" comment="libvirt-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137727" comment="libvirt-client-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137728" comment="libvirt-daemon-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137729" comment="libvirt-daemon-config-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137730" comment="libvirt-daemon-config-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137731" comment="libvirt-daemon-driver-interface-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137732" comment="libvirt-daemon-driver-libxl-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137733" comment="libvirt-daemon-driver-lxc-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137734" comment="libvirt-daemon-driver-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137735" comment="libvirt-daemon-driver-nodedev-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137736" comment="libvirt-daemon-driver-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137737" comment="libvirt-daemon-driver-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137738" comment="libvirt-daemon-driver-secret-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137739" comment="libvirt-daemon-driver-storage-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137740" comment="libvirt-daemon-driver-uml-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137741" comment="libvirt-daemon-driver-vbox-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137742" comment="libvirt-daemon-driver-xen-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137743" comment="libvirt-daemon-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137744" comment="libvirt-daemon-xen-1.2.9-1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2230</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2230" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2230" source="CVE"/>
    <description>
    The qemu driver (qemu/qemu_driver.c) in libvirt before 1.1.1 allows remote authenticated users to cause a denial of service (daemon crash) via unspecified vectors involving "multiple events registration."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137726" comment="libvirt-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137727" comment="libvirt-client-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137728" comment="libvirt-daemon-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137729" comment="libvirt-daemon-config-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137730" comment="libvirt-daemon-config-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137731" comment="libvirt-daemon-driver-interface-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137732" comment="libvirt-daemon-driver-libxl-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137733" comment="libvirt-daemon-driver-lxc-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137734" comment="libvirt-daemon-driver-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137735" comment="libvirt-daemon-driver-nodedev-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137736" comment="libvirt-daemon-driver-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137737" comment="libvirt-daemon-driver-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137738" comment="libvirt-daemon-driver-secret-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137739" comment="libvirt-daemon-driver-storage-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137740" comment="libvirt-daemon-driver-uml-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137741" comment="libvirt-daemon-driver-vbox-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137742" comment="libvirt-daemon-driver-xen-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137743" comment="libvirt-daemon-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137744" comment="libvirt-daemon-xen-1.2.9-1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2236</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2236" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2236" source="CVE"/>
    <description>
    Stack-based buffer overflow in the new_msg_lsa_change_notify function in the OSPFD API (ospf_api.c) in Quagga before 0.99.22.2, when --enable-opaque-lsa and the -a command line option are used, allows remote attackers to cause a denial of service (crash) via a large LSA.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137860" comment="quagga-0.99.23-2.1.7 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2249</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2249" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2249" source="CVE"/>
    <description>
    mod_session_dbd.c in the mod_session_dbd module in the Apache HTTP Server before 2.4.5 proceeds with save operations for a session without considering the dirty flag and the requirement for a new session ID, which has unspecified impact and remote attack vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136944" comment="apache2-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136945" comment="apache2-devel-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136946" comment="apache2-doc-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136947" comment="apache2-example-pages-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136948" comment="apache2-prefork-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136949" comment="apache2-utils-2.4.10-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2266</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2266" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2266" source="CVE"/>
    <description>
    libdns in ISC BIND 9.7.x and 9.8.x before 9.8.4-P2, 9.8.5 before 9.8.5b2, 9.9.x before 9.9.2-P2, and 9.9.3 before 9.9.3b2 on UNIX platforms allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression, as demonstrated by a memory-exhaustion attack against a machine running a named process.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137045" comment="bind-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137046" comment="bind-chrootenv-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137047" comment="bind-doc-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137048" comment="bind-libs-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137049" comment="bind-utils-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137130" comment="dhcp-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137131" comment="dhcp-client-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137132" comment="dhcp-doc-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137133" comment="dhcp-relay-4.2.6-9.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137134" comment="dhcp-server-4.2.6-9.2.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2383</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2383" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2383" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-1569, CVE-2013-2384, and CVE-2013-2420. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "handling of [a] glyph table" in the International Components for Unicode (ICU) Layout Engine before 51.2.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2384</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2384" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2384" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-1569, CVE-2013-2383, and CVE-2013-2420. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "font layout" in the International Components for Unicode (ICU) Layout Engine before 51.2.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2407</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2407" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2407" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality and availability via unknown vectors related to Libraries.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "XML security and the class loader."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2412</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2412" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2412" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Serviceability.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to insufficient indication of an SSL connection failure by JConsole, related to RMI connection dialog box.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2415</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2415" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2415" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 6 and 7, allows local users to affect confidentiality via vectors related to JAX-WS.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "processing of MTOM attachments" and the creation of temporary files with weak permissions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2417</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2417" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2417" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect availability via unknown vectors related to Networking.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an information leak involving InetAddress serialization. CVE has not investigated the apparent discrepancy between vendor reports regarding the impact of this issue.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2419</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2419" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2419" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect availability via unknown vectors related to 2D.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "font processing errors" in the International Components for Unicode (ICU) Layout Engine before 51.2.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2420</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2420" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to insufficient "validation of images" in share/native/sun/awt/image/awt_ImageRep.c, possibly involving offsets.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2421</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2421" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2421" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to HotSpot.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect MethodHandle lookups, which allows remote attackers to bypass Java sandbox restrictions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2422</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2422" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2422" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper method-invocation restrictions by the MethodUtil trampoline class, which allows remote attackers to bypass the Java sandbox.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2423</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2423" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via unknown vectors related to HotSpot.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from the original researcher that this vulnerability allows remote attackers to bypass permission checks by the MethodHandles method and modify arbitrary public final fields using reflection and type confusion, as demonstrated using integer and double fields to disable the security manager.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2424</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2424" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2424" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality via vectors related to JMX. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "insufficient class access checks" when "creating new instances" using MBeanInstantiator.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2426</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2426" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2426" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect invocation of the defaultReadObject method in the ConcurrentHashMap class, which allows remote attackers to bypass the Java sandbox.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2429</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2429" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2429" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to ImageIO.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "JPEGImageWriter state corruption" when using native code, which triggers memory corruption.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2430</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2430" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2430" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; JavaFX 2.2.7 and earlier; and OpenJDK 6 and 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to ImageIO. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "JPEGImageReader state corruption" when using native code.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2431</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2431" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2431" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to HotSpot.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to bypassing the Java sandbox using "method handle intrinsic frames."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2436</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2436" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2436" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-1488 and CVE-2013-2426.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect "type checks" and "method handle binding" involving Wrapper.convert.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2443</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2443" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2443" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries, a different vulnerability than CVE-2013-2452 and CVE-2013-2455.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to an incorrect "checking order" within the AccessControlContext class.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2444</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2444" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2444" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier; JavaFX 2.2.21 and earlier; and OpenJDK 7 allows remote attackers to affect availability via vectors related to AWT.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue does not "properly manage and restrict certain resources related to the processing of fonts," possibly involving temporary files.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2445</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2445" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2445" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect availability via unknown vectors related to Hotspot.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "handling of memory allocation errors."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2446</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2446" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2446" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via vectors related to CORBA. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue does not properly enforce access restrictions for CORBA output streams.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2447</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2447" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Networking.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to obtain a socket's local address via vectors involving inconsistencies between Socket.getLocalAddress and InetAddress.getLocalHost.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2448</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2448" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2448" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to insufficient "access restrictions" and "robustness of sound classes."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2449</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2449" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2449" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to GnomeFileTypeDetector and a missing check for read permissions for a path.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2450</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2450" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2450" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect availability via unknown vectors related to Serialization.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper handling of circular references in ObjectStreamClass.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2451</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2451" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2451" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Networking.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper enforcement of exclusive port binds when running on Windows, which allows attackers to bind to ports that are already in use.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2452</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2452" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2452" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries, a different vulnerability than CVE-2013-2443 and CVE-2013-2455.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "network address handling in virtual machine identifiers" and the lack of "unique and unpredictable IDs" in the java.rmi.dgc.VMID class.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2453</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2453" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2453" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect integrity via vectors related to JMX.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to a missing check for "package access" by the MBeanServer Introspector.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2454</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2454" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2454" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality and integrity via vectors related to JDBC.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue does not properly restrict access to certain class packages in the SerialJavaObject class, which allows remote attackers to bypass the Java sandbox.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2455</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2455" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2455" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries, a different vulnerability than CVE-2013-2443 and CVE-2013-2452.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect access checks by the (1) getEnclosingClass, (2) getEnclosingMethod, and (3) getEnclosingConstructor methods.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2456</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2456" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Serialization.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper access checks for subclasses in the ObjectOutputStream class.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2457</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2457" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2457" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via vectors related to JMX.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to an incorrect implementation of "certain class checks" that allows remote attackers to bypass intended class restrictions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2458</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2458" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2458" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via "an error related to method handles."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2459</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2459" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2459" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "integer overflow checks."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2460</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2460" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2460" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Serviceability.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "insufficient access checks" in the tracing component.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2461</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2461" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2461" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier; the Oracle JRockit component in Oracle Fusion Middleware R27.7.5 and earlier and R28.2.7 and earlier; and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.  NOTE: the previous information is from the June and July 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass verification of XML signatures via vectors related to a "Missing check for [a] valid DOMCanonicalizationMethod canonicalization algorithm."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2463</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2463" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2463" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect image attribute verification" in 2D.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2465</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2465" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2465" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect image channel verification" in 2D.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2469</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2469" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2469" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect image layout verification" in 2D.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2470</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2470" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2470" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "ImagingLib byte lookup processing."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2471</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2471" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2471" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect IntegerComponentRaster size checks."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2472</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2472" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2472" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect ShortBandedRaster size checks" in 2D.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2473</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2473" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2473" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect ByteBandedRaster size checks" in 2D.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2475</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2475" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2475" source="CVE"/>
    <description>
    The TCP dissector in Wireshark 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2476</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2476" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2476" source="CVE"/>
    <description>
    The dissect_hartip function in epan/dissectors/packet-hartip.c in the HART/IP dissector in Wireshark 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (infinite loop) via a packet with a header that is too short.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2477</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2477" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2477" source="CVE"/>
    <description>
    The CSN.1 dissector in Wireshark 1.8.x before 1.8.6 does not properly manage function pointers, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2478</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2478" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2478" source="CVE"/>
    <description>
    The dissect_server_info function in epan/dissectors/packet-ms-mms.c in the MS-MMS dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 does not properly manage string lengths, which allows remote attackers to cause a denial of service (application crash) via a malformed packet that (1) triggers an integer overflow or (2) has embedded '\0' characters in a string.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2479</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2479" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2479" source="CVE"/>
    <description>
    The dissect_mpls_echo_tlv_dd_map function in epan/dissectors/packet-mpls-echo.c in the MPLS Echo dissector in Wireshark 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (infinite loop) via invalid Sub-tlv data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2480</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2480" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2480" source="CVE"/>
    <description>
    The RTPS and RTPS2 dissectors in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allow remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2481</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2481" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2481" source="CVE"/>
    <description>
    Integer signedness error in the dissect_mount_dirpath_call function in epan/dissectors/packet-mount.c in the Mount dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6, when nfs_file_name_snooping is enabled, allows remote attackers to cause a denial of service (application crash) via a negative length value.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2482</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2482" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2482" source="CVE"/>
    <description>
    The AMPQ dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2483</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2483" source="CVE"/>
    <description>
    The acn_add_dmp_data function in epan/dissectors/packet-acn.c in the ACN dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via an invalid count value in ACN_DMP_ADT_D_RE DMP data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2484</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2484" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2484" source="CVE"/>
    <description>
    The CIMD dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2485</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2485" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2485" source="CVE"/>
    <description>
    The FCSP dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2486</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2486" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2486" source="CVE"/>
    <description>
    The dissect_diagnosticrequest function in epan/dissectors/packet-reload.c in the REsource LOcation And Discovery (aka RELOAD) dissector in Wireshark 1.8.x before 1.8.6 uses an incorrect integer data type, which allows remote attackers to cause a denial of service (infinite loop) via crafted integer values in a packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2487</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2487" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2487" source="CVE"/>
    <description>
    epan/dissectors/packet-reload.c in the REsource LOcation And Discovery (aka RELOAD) dissector in Wireshark 1.8.x before 1.8.6 uses incorrect integer data types, which allows remote attackers to cause a denial of service (infinite loop) via crafted integer values in a packet, related to the (1) dissect_icecandidates, (2) dissect_kinddata, (3) dissect_nodeid_list, (4) dissect_storeans, (5) dissect_storereq, (6) dissect_storeddataspecifier, (7) dissect_fetchreq, (8) dissect_findans, (9) dissect_diagnosticinfo, (10) dissect_diagnosticresponse, (11) dissect_reload_messagecontents, and (12) dissect_reload_message functions, a different vulnerability than CVE-2013-2486.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2488</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2488" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2488" source="CVE"/>
    <description>
    The DTLS dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 does not validate the fragment offset before invoking the reassembly state machine, which allows remote attackers to cause a denial of service (application crash) via a large offset value that triggers write access to an invalid memory location.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2492</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2492" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2492" source="CVE"/>
    <description>
    Stack-based buffer overflow in Firebird 2.1.3 through 2.1.5 before 18514, and 2.5.1 through 2.5.3 before 26623, on Windows allows remote attackers to execute arbitrary code via a crafted packet to TCP port 3050, related to a missing size check during extraction of a group number from CNCT information.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137485" comment="libfbembed2_5-2.5.2.26539-14.1.5 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2850</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-2850" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2850" source="CVE"/>
    <description>
    Heap-based buffer overflow in the iscsi_add_notunderstood_response function in drivers/target/iscsi/iscsi_target_parameters.c in the iSCSI target subsystem in the Linux kernel through 3.9.4 allows remote attackers to cause a denial of service (memory corruption and OOPS) or possibly execute arbitrary code via a long key that is not properly handled during construction of an error-response packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137315" comment="kernel-default-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137316" comment="kernel-default-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137317" comment="kernel-desktop-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137318" comment="kernel-desktop-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137319" comment="kernel-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137320" comment="kernel-docs-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137321" comment="kernel-macros-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137322" comment="kernel-pae-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137323" comment="kernel-pae-base-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137324" comment="kernel-pae-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137325" comment="kernel-source-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137326" comment="kernel-syms-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137327" comment="kernel-xen-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137328" comment="kernel-xen-devel-3.16.6-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3495</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-3495" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3495" source="CVE"/>
    <description>
    The Intel VT-d Interrupt Remapping engine in Xen 3.3.x through 4.3.x allows local guests to cause a denial of service (kernel panic) via a malformed Message Signaled Interrupt (MSI) from a PCI device that is bus mastering capable that triggers a System Error Reporting (SERR) Non-Maskable Interrupt (NMI).
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105984" comment="xen-devel-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105985" comment="xen-libs-32bit-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3555</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-3555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3555" source="CVE"/>
    <description>
    epan/dissectors/packet-gtpv2.c in the GTPv2 dissector in Wireshark 1.8.x before 1.8.7 calls incorrect functions in certain contexts related to ciphers, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3556</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-3556" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3556" source="CVE"/>
    <description>
    The fragment_add_seq_common function in epan/reassemble.c in the ASN.1 BER dissector in Wireshark before r48943 has an incorrect pointer dereference during a comparison, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3557</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-3557" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3557" source="CVE"/>
    <description>
    The dissect_ber_choice function in epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 1.6.x before 1.6.15 and 1.8.x before 1.8.7 does not properly initialize a certain variable, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3558</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-3558" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3558" source="CVE"/>
    <description>
    The dissect_ccp_bsdcomp_opt function in epan/dissectors/packet-ppp.c in the PPP CCP dissector in Wireshark 1.8.x before 1.8.7 does not terminate a bit-field list, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3559</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-3559" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3559" source="CVE"/>
    <description>
    epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.8.x before 1.8.7 uses incorrect integer data types, which allows remote attackers to cause a denial of service (integer overflow, and heap memory corruption or NULL pointer dereference, and application crash) via a malformed packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3560</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-3560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3560" source="CVE"/>
    <description>
    The dissect_dsmcc_un_download function in epan/dissectors/packet-mpeg-dsmcc.c in the MPEG DSM-CC dissector in Wireshark 1.8.x before 1.8.7 uses an incorrect format string, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3561</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-3561" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3561" source="CVE"/>
    <description>
    Multiple integer overflows in Wireshark 1.8.x before 1.8.7 allow remote attackers to cause a denial of service (loop or application crash) via a malformed packet, related to a crash of the Websocket dissector, an infinite loop in the MySQL dissector, and a large loop in the ETCH dissector.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3562</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-3562" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3562" source="CVE"/>
    <description>
    Multiple integer signedness errors in the tvb_unmasked function in epan/dissectors/packet-websocket.c in the Websocket dissector in Wireshark 1.8.x before 1.8.7 allow remote attackers to cause a denial of service (application crash) via a malformed packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3571</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-3571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3571" source="CVE"/>
    <description>
    socat 1.2.0.0 before 1.7.2.2 and 2.0.0-b1 before 2.0.0-b6, when used for a listen type address and the fork option is enabled, allows remote attackers to cause a denial of service (file descriptor consumption) via multiple request that are refused based on the (1) sourceport, (2) lowport, (3) range, or (4) tcpwrap restrictions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137874" comment="socat-1.7.2.4-2.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3829</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-3829" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3829" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java SE, Java SE Embedded component in Oracle Java SE Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4002</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4002" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4002" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java Runtime Environment (JRE) in IBM Java 5.0 before 5.0 SR16-FP3, 6 before 6 SR14, 6.0.1 before 6.0.1 SR6, and 7 before 7 SR5 allows remote attackers to affect availability via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4083</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4083" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4083" source="CVE"/>
    <description>
    The dissect_pft function in epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.6.x before 1.6.16, 1.8.x before 1.8.8, and 1.10.0 does not validate a certain fragment length value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4113</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4113" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4113" source="CVE"/>
    <description>
    ext/xml/xml.c in PHP before 5.3.27 does not properly consider parsing depth, which allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted document that is processed by the xml_parse_into_struct function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4118</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4118" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4118" source="CVE"/>
    <description>
    FreeRDP before 1.1.0-beta1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133604" comment="freerdp-1.0.2-8.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133605" comment="freerdp-devel-1.0.2-8.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133606" comment="libfreerdp-1_0-1.0.2-8.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133607" comment="libfreerdp-1_0-plugins-1.0.2-8.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4124</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4124" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4124" source="CVE"/>
    <description>
    Integer overflow in the read_nttrans_ea_list function in nttrans.c in smbd in Samba 3.x before 3.5.22, 3.6.x before 3.6.17, and 4.x before 4.0.8 allows remote attackers to cause a denial of service (memory consumption) via a malformed packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137424" comment="libdcerpc-binding0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137425" comment="libdcerpc-binding0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137426" comment="libdcerpc0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137427" comment="libdcerpc0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137428" comment="libgensec0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137429" comment="libgensec0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137430" comment="libndr-krb5pac0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137431" comment="libndr-krb5pac0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137432" comment="libndr-nbt0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137433" comment="libndr-nbt0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137434" comment="libndr-standard0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137435" comment="libndr-standard0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137436" comment="libndr0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137437" comment="libndr0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137438" comment="libnetapi0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137439" comment="libnetapi0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137440" comment="libpdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137441" comment="libpdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137442" comment="libregistry0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137443" comment="libsamba-credentials0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137444" comment="libsamba-credentials0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137445" comment="libsamba-hostconfig0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137446" comment="libsamba-hostconfig0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137447" comment="libsamba-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137448" comment="libsamba-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137449" comment="libsamdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137450" comment="libsamdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137451" comment="libsmbclient-devel-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137452" comment="libsmbclient-raw0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137453" comment="libsmbclient-raw0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137454" comment="libsmbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137455" comment="libsmbconf0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137456" comment="libsmbconf0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137457" comment="libsmbldap0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137458" comment="libsmbldap0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137459" comment="libtevent-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137460" comment="libtevent-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137461" comment="libwbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137462" comment="libwbclient0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137463" comment="samba-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137464" comment="samba-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137465" comment="samba-client-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137466" comment="samba-client-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137467" comment="samba-doc-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137468" comment="samba-libs-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137469" comment="samba-libs-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137470" comment="samba-winbind-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137471" comment="samba-winbind-32bit-4.1.12-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4131</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4131" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4131" source="CVE"/>
    <description>
    The mod_dav_svn Apache HTTPD server module in Subversion 1.7.0 through 1.7.10 and 1.8.x before 1.8.1 allows remote authenticated users to cause a denial of service (assertion failure or out-of-bounds read) via a certain (1) COPY, (2) DELETE, or (3) MOVE request against a revision root.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137877" comment="subversion-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137878" comment="subversion-devel-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137879" comment="subversion-perl-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137880" comment="subversion-python-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137881" comment="subversion-server-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137882" comment="subversion-tools-1.8.10-2.4.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4143</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4143" source="CVE"/>
    <description>
    The (1) checkPasswd and (2) checkGroupXlockPasswds functions in xlockmore before 5.43 do not properly handle when a NULL value is returned upon an error by the crypt or dispcrypt function as implemented in glibc 2.17 and later, which allows attackers to bypass the screen lock via vectors related to invalid salts.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137914" comment="xlockmore-5.43-6.1.3 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4148</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4148" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4148" source="CVE"/>
    <description>
    Integer signedness error in the virtio_net_load function in hw/net/virtio-net.c in QEMU 1.x before 1.7.2 allows remote attackers to execute arbitrary code via a crafted savevm image, which triggers a buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137408" comment="libcacard0-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137409" comment="qemu-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137410" comment="qemu-arm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137411" comment="qemu-block-curl-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137412" comment="qemu-extra-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137413" comment="qemu-ipxe-1.0.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137414" comment="qemu-ksm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137415" comment="qemu-kvm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137416" comment="qemu-lang-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137417" comment="qemu-ppc-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137418" comment="qemu-s390-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137419" comment="qemu-seabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137420" comment="qemu-sgabios-8-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137421" comment="qemu-tools-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137422" comment="qemu-vgabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137423" comment="qemu-x86-2.1.0-2.9 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4149</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4149" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4149" source="CVE"/>
    <description>
    Buffer overflow in virtio_net_load function in net/virtio-net.c in QEMU 1.3.0 through 1.7.x before 1.7.2 might allow remote attackers to execute arbitrary code via a large MAC table.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137408" comment="libcacard0-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137409" comment="qemu-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137410" comment="qemu-arm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137411" comment="qemu-block-curl-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137412" comment="qemu-extra-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137413" comment="qemu-ipxe-1.0.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137414" comment="qemu-ksm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137415" comment="qemu-kvm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137416" comment="qemu-lang-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137417" comment="qemu-ppc-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137418" comment="qemu-s390-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137419" comment="qemu-seabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137420" comment="qemu-sgabios-8-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137421" comment="qemu-tools-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137422" comment="qemu-vgabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137423" comment="qemu-x86-2.1.0-2.9 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4150</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4150" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4150" source="CVE"/>
    <description>
    The virtio_net_load function in hw/net/virtio-net.c in QEMU 1.5.0 through 1.7.x before 1.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via vectors in which the value of curr_queues is greater than max_queues, which triggers an out-of-bounds write.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137408" comment="libcacard0-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137409" comment="qemu-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137410" comment="qemu-arm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137411" comment="qemu-block-curl-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137412" comment="qemu-extra-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137413" comment="qemu-ipxe-1.0.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137414" comment="qemu-ksm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137415" comment="qemu-kvm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137416" comment="qemu-lang-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137417" comment="qemu-ppc-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137418" comment="qemu-s390-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137419" comment="qemu-seabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137420" comment="qemu-sgabios-8-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137421" comment="qemu-tools-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137422" comment="qemu-vgabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137423" comment="qemu-x86-2.1.0-2.9 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4151</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4151" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4151" source="CVE"/>
    <description>
    The virtio_load function in virtio/virtio.c in QEMU 1.x before 1.7.2 allows remote attackers to execute arbitrary code via a crafted savevm image, which triggers an out-of-bounds write.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137408" comment="libcacard0-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137409" comment="qemu-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137410" comment="qemu-arm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137411" comment="qemu-block-curl-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137412" comment="qemu-extra-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137413" comment="qemu-ipxe-1.0.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137414" comment="qemu-ksm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137415" comment="qemu-kvm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137416" comment="qemu-lang-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137417" comment="qemu-ppc-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137418" comment="qemu-s390-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137419" comment="qemu-seabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137420" comment="qemu-sgabios-8-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137421" comment="qemu-tools-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137422" comment="qemu-vgabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137423" comment="qemu-x86-2.1.0-2.9 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4153</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4153" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4153" source="CVE"/>
    <description>
    Double free vulnerability in the qemuAgentGetVCPUs function in qemu/qemu_agent.c in libvirt 1.0.6 through 1.1.0 allows remote attackers to cause a denial of service (daemon crash) via a cpu count request, as demonstrated by the "virsh vcpucount dom --guest" command.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137726" comment="libvirt-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137727" comment="libvirt-client-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137728" comment="libvirt-daemon-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137729" comment="libvirt-daemon-config-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137730" comment="libvirt-daemon-config-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137731" comment="libvirt-daemon-driver-interface-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137732" comment="libvirt-daemon-driver-libxl-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137733" comment="libvirt-daemon-driver-lxc-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137734" comment="libvirt-daemon-driver-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137735" comment="libvirt-daemon-driver-nodedev-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137736" comment="libvirt-daemon-driver-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137737" comment="libvirt-daemon-driver-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137738" comment="libvirt-daemon-driver-secret-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137739" comment="libvirt-daemon-driver-storage-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137740" comment="libvirt-daemon-driver-uml-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137741" comment="libvirt-daemon-driver-vbox-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137742" comment="libvirt-daemon-driver-xen-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137743" comment="libvirt-daemon-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137744" comment="libvirt-daemon-xen-1.2.9-1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4154</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4154" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4154" source="CVE"/>
    <description>
    The qemuAgentCommand function in libvirt before 1.1.1, when a guest agent is not configured, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to "agent based cpu (un)plug," as demonstrated by the "virsh vcpucount foobar --guest" command.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137726" comment="libvirt-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137727" comment="libvirt-client-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137728" comment="libvirt-daemon-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137729" comment="libvirt-daemon-config-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137730" comment="libvirt-daemon-config-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137731" comment="libvirt-daemon-driver-interface-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137732" comment="libvirt-daemon-driver-libxl-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137733" comment="libvirt-daemon-driver-lxc-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137734" comment="libvirt-daemon-driver-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137735" comment="libvirt-daemon-driver-nodedev-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137736" comment="libvirt-daemon-driver-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137737" comment="libvirt-daemon-driver-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137738" comment="libvirt-daemon-driver-secret-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137739" comment="libvirt-daemon-driver-storage-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137740" comment="libvirt-daemon-driver-uml-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137741" comment="libvirt-daemon-driver-vbox-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137742" comment="libvirt-daemon-driver-xen-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137743" comment="libvirt-daemon-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137744" comment="libvirt-daemon-xen-1.2.9-1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4231</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4231" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4231" source="CVE"/>
    <description>
    Multiple buffer overflows in libtiff before 4.0.3 allow remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) extension block in a GIF image or (2) GIF raster image to tools/gif2tiff.c or (3) a long filename for a TIFF image to tools/rgb2ycbcr.c.  NOTE: vectors 1 and 3 are disputed by Red Hat, which states that the input cannot exceed the allocated buffer size.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137719" comment="libtiff-devel-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137720" comment="libtiff5-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137721" comment="libtiff5-32bit-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137722" comment="tiff-4.0.3-10.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4232</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4232" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4232" source="CVE"/>
    <description>
    Use-after-free vulnerability in the t2p_readwrite_pdf_image function in tools/tiff2pdf.c in libtiff 4.0.3 allows remote attackers to cause a denial of service (crash) or possible execute arbitrary code via a crafted TIFF image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137719" comment="libtiff-devel-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137720" comment="libtiff5-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137721" comment="libtiff5-32bit-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137722" comment="tiff-4.0.3-10.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4233</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4233" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4233" source="CVE"/>
    <description>
    Integer overflow in the abc_set_parts function in load_abc.cpp in libmodplug 0.8.8.4 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted P header in an ABC file, which triggers a heap-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137543" comment="libmodplug1-0.8.8.5-3.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4234</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4234" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4234" source="CVE"/>
    <description>
    Multiple heap-based buffer overflows in the (1) abc_MIDI_drum and (2) abc_MIDI_gchord functions in load_abc.cpp in libmodplug 0.8.8.4 and earlier allow remote attackers to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via a crafted ABC.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137543" comment="libmodplug1-0.8.8.5-3.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4237</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4237" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4237" source="CVE"/>
    <description>
    sysdeps/posix/readdir_r.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted (1) NTFS or (2) CIFS image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137226" comment="glibc-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137227" comment="glibc-32bit-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137228" comment="glibc-devel-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137229" comment="glibc-extra-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137230" comment="glibc-info-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137231" comment="glibc-locale-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137232" comment="glibc-locale-32bit-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137233" comment="nscd-2.19-16.2.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4238</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4238" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4238" source="CVE"/>
    <description>
    The ssl.match_hostname function in the SSL module in Python 2.6 through 3.4 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137609" comment="libpython2_7-1_0-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137610" comment="libpython2_7-1_0-32bit-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137614" comment="libpython3_4m1_0-3.4.1-4.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137840" comment="python-2.7.8-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137611" comment="python-base-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137841" comment="python-curses-2.7.8-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137612" comment="python-devel-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137842" comment="python-gdbm-2.7.8-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137843" comment="python-tk-2.7.8-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137613" comment="python-xml-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137844" comment="python3-3.4.1-4.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137615" comment="python3-base-3.4.1-4.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137845" comment="python3-curses-3.4.1-4.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137846" comment="python3-dbm-3.4.1-4.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137847" comment="python3-tk-3.4.1-4.2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4239</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4239" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4239" source="CVE"/>
    <description>
    The xenDaemonListDefinedDomains function in xen/xend_internal.c in libvirt 1.1.1 allows remote authenticated users to cause a denial of service (memory corruption and crash) via vectors involving the virConnectListDefinedDomains API function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137726" comment="libvirt-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137727" comment="libvirt-client-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137728" comment="libvirt-daemon-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137729" comment="libvirt-daemon-config-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137730" comment="libvirt-daemon-config-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137731" comment="libvirt-daemon-driver-interface-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137732" comment="libvirt-daemon-driver-libxl-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137733" comment="libvirt-daemon-driver-lxc-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137734" comment="libvirt-daemon-driver-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137735" comment="libvirt-daemon-driver-nodedev-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137736" comment="libvirt-daemon-driver-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137737" comment="libvirt-daemon-driver-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137738" comment="libvirt-daemon-driver-secret-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137739" comment="libvirt-daemon-driver-storage-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137740" comment="libvirt-daemon-driver-uml-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137741" comment="libvirt-daemon-driver-vbox-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137742" comment="libvirt-daemon-driver-xen-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137743" comment="libvirt-daemon-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137744" comment="libvirt-daemon-xen-1.2.9-1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4242</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4242" source="CVE"/>
    <description>
    GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137495" comment="libgcrypt-devel-1.6.1-8.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137496" comment="libgcrypt20-1.6.1-8.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137497" comment="libgcrypt20-32bit-1.6.1-8.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4243</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4243" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4243" source="CVE"/>
    <description>
    Heap-based buffer overflow in the readgifimage function in the gif2tiff tool in libtiff 4.0.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted height and width values in a GIF image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137719" comment="libtiff-devel-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137720" comment="libtiff5-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137721" comment="libtiff5-32bit-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137722" comment="tiff-4.0.3-10.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4244</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4244" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4244" source="CVE"/>
    <description>
    The LZW decompressor in the gif2tiff tool in libtiff 4.0.3 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted GIF image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137719" comment="libtiff-devel-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137720" comment="libtiff5-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137721" comment="libtiff5-32bit-4.0.3-10.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137722" comment="tiff-4.0.3-10.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4246</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4246" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4246" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137877" comment="subversion-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137878" comment="subversion-devel-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137879" comment="subversion-perl-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137880" comment="subversion-python-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137881" comment="subversion-server-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137882" comment="subversion-tools-1.8.10-2.4.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4248</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4248" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4248" source="CVE"/>
    <description>
    The openssl_x509_parse function in openssl.c in the OpenSSL module in PHP before 5.4.18 and 5.5.x before 5.5.2 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4262</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4262" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4262" source="CVE"/>
    <description>
    svnwcsub.py in Subversion 1.8.0 before 1.8.3, when using the --pidfile option and running in foreground mode, allows local users to gain privileges via a symlink attack on the pid file.  NOTE: this issue was SPLIT due to different affected versions (ADT3). The irkerbridge.py issue is covered by CVE-2013-7393.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137877" comment="subversion-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137878" comment="subversion-devel-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137879" comment="subversion-perl-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137880" comment="subversion-python-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137881" comment="subversion-server-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137882" comment="subversion-tools-1.8.10-2.4.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4276</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4276" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4276" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in LittleCMS (aka lcms or liblcms) 1.19 and earlier allow remote attackers to cause a denial of service (crash) via a crafted (1) ICC color profile to the icctrans utility or (2) TIFF image to the tiffdiff utility.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137530" comment="liblcms1-1.19-18.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137531" comment="python-lcms-1.19-18.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4277</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4277" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4277" source="CVE"/>
    <description>
    Svnserve in Apache Subversion 1.4.0 through 1.7.12 and 1.8.0 through 1.8.1 allows local users to overwrite arbitrary files or kill arbitrary processes via a symlink attack on the file specified by the --pid-file option.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137877" comment="subversion-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137878" comment="subversion-devel-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137879" comment="subversion-perl-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137880" comment="subversion-python-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137881" comment="subversion-server-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137882" comment="subversion-tools-1.8.10-2.4.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4282</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4282" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4282" source="CVE"/>
    <description>
    Stack-based buffer overflow in the reds_handle_ticket function in server/reds.c in SPICE 0.12.0 allows remote attackers to cause a denial of service (crash) via a long password in a SPICE ticket.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115042" comment="libspice-server-devel-0.12.4-4.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115043" comment="libspice-server1-0.12.4-4.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115044" comment="spice-0.12.4-4.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115045" comment="spice-client-0.12.4-4.6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4288</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4288" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4288" source="CVE"/>
    <description>
    Race condition in PolicyKit (aka polkit) allows local users to bypass intended PolicyKit restrictions and gain privileges by starting a setuid or pkexec process before the authorization check is performed, related to (1) the polkit_unix_process_new API function, (2) the dbus API, or (3) the --process (unix-process) option for authorization to pkcheck.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137502" comment="libgudev-1_0-0-210-25.5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137503" comment="libgudev-1_0-devel-210-25.5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137577" comment="libpolkit0-0.112-3.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137504" comment="libudev-devel-210-25.5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137505" comment="libudev1-210-25.5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137506" comment="libudev1-32bit-210-25.5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137578" comment="polkit-0.112-3.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137507" comment="systemd-210-25.5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137508" comment="systemd-32bit-210-25.5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137509" comment="systemd-bash-completion-210-25.5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137510" comment="systemd-logger-210-25.5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137511" comment="systemd-sysvinit-210-25.5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137512" comment="typelib-1_0-GUdev-1_0-210-25.5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137579" comment="typelib-1_0-Polkit-1_0-0.112-3.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137513" comment="udev-210-25.5.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4289</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4289" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4289" source="CVE"/>
    <description>
    Multiple integer overflows in lib/openjp3d/jp3d.c in OpenJPEG before 1.5.2 allow remote attackers to have unspecified impact and vectors, which trigger a heap-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137557" comment="libopenjpeg1-1.5.2-2.1.8 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4290</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4290" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4290" source="CVE"/>
    <description>
    Stack-based buffer overflow in OpenJPEG before 1.5.2 allows remote attackers to have unspecified impact via unknown vectors to (1) lib/openjp3d/opj_jp3d_compress.c, (2) bin/jp3d/convert.c, or (3) lib/openjp3d/event.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137557" comment="libopenjpeg1-1.5.2-2.1.8 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4296</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4296" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4296" source="CVE"/>
    <description>
    The remoteDispatchDomainMemoryStats function in daemon/remote.c in libvirt 0.9.1 through 0.10.1.x, 0.10.2.x before 0.10.2.8, 1.0.x before 1.0.5.6, and 1.1.x before 1.1.2 allows remote authenticated users to cause a denial of service (uninitialized pointer dereference and crash) via a crafted RPC call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137726" comment="libvirt-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137727" comment="libvirt-client-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137728" comment="libvirt-daemon-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137729" comment="libvirt-daemon-config-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137730" comment="libvirt-daemon-config-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137731" comment="libvirt-daemon-driver-interface-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137732" comment="libvirt-daemon-driver-libxl-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137733" comment="libvirt-daemon-driver-lxc-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137734" comment="libvirt-daemon-driver-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137735" comment="libvirt-daemon-driver-nodedev-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137736" comment="libvirt-daemon-driver-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137737" comment="libvirt-daemon-driver-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137738" comment="libvirt-daemon-driver-secret-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137739" comment="libvirt-daemon-driver-storage-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137740" comment="libvirt-daemon-driver-uml-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137741" comment="libvirt-daemon-driver-vbox-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137742" comment="libvirt-daemon-driver-xen-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137743" comment="libvirt-daemon-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137744" comment="libvirt-daemon-xen-1.2.9-1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4297</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4297" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4297" source="CVE"/>
    <description>
    The virFileNBDDeviceAssociate function in util/virfile.c in libvirt 1.1.2 and earlier allows remote authenticated users to cause a denial of service (uninitialized pointer dereference and crash) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137726" comment="libvirt-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137727" comment="libvirt-client-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137728" comment="libvirt-daemon-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137729" comment="libvirt-daemon-config-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137730" comment="libvirt-daemon-config-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137731" comment="libvirt-daemon-driver-interface-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137732" comment="libvirt-daemon-driver-libxl-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137733" comment="libvirt-daemon-driver-lxc-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137734" comment="libvirt-daemon-driver-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137735" comment="libvirt-daemon-driver-nodedev-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137736" comment="libvirt-daemon-driver-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137737" comment="libvirt-daemon-driver-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137738" comment="libvirt-daemon-driver-secret-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137739" comment="libvirt-daemon-driver-storage-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137740" comment="libvirt-daemon-driver-uml-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137741" comment="libvirt-daemon-driver-vbox-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137742" comment="libvirt-daemon-driver-xen-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137743" comment="libvirt-daemon-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137744" comment="libvirt-daemon-xen-1.2.9-1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4311</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4311" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4311" source="CVE"/>
    <description>
    libvirt 1.0.5.x before 1.0.5.6, 0.10.2.x before 0.10.2.8, and 0.9.12.x before 0.9.12.2 allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition in pkcheck via a (1) setuid process or (2) pkexec process, a related issue to CVE-2013-4288.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137726" comment="libvirt-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137727" comment="libvirt-client-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137728" comment="libvirt-daemon-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137729" comment="libvirt-daemon-config-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137730" comment="libvirt-daemon-config-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137731" comment="libvirt-daemon-driver-interface-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137732" comment="libvirt-daemon-driver-libxl-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137733" comment="libvirt-daemon-driver-lxc-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137734" comment="libvirt-daemon-driver-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137735" comment="libvirt-daemon-driver-nodedev-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137736" comment="libvirt-daemon-driver-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137737" comment="libvirt-daemon-driver-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137738" comment="libvirt-daemon-driver-secret-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137739" comment="libvirt-daemon-driver-storage-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137740" comment="libvirt-daemon-driver-uml-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137741" comment="libvirt-daemon-driver-vbox-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137742" comment="libvirt-daemon-driver-xen-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137743" comment="libvirt-daemon-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137744" comment="libvirt-daemon-xen-1.2.9-1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4314</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4314" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4314" source="CVE"/>
    <description>
    The X509Extension in pyOpenSSL before 0.13.1 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137855" comment="python-pyOpenSSL-0.13.1-9.1.4 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4325</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4325" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4325" source="CVE"/>
    <description>
    The check_permission_v1 function in base/pkit.py in HP Linux Imaging and Printing (HPLIP) through 3.13.9 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137268" comment="hplip-3.14.6-2.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137269" comment="hplip-hpijs-3.14.6-2.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137270" comment="hplip-sane-3.14.6-2.2.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4326</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4326" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4326" source="CVE"/>
    <description>
    RealtimeKit (aka rtkit) 0.5 does not properly use D-Bus for communication with a polkit authority, which allows local users to bypass intended access restrictions by leveraging a PolkitUnixProcess PolkitSubject race condition via a (1) setuid process or (2) pkexec process, a related issue to CVE-2013-4288.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137866" comment="rtkit-0.11_git201205151338-9.1.3 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4332</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4332" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4332" source="CVE"/>
    <description>
    Multiple integer overflows in malloc/malloc.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allow context-dependent attackers to cause a denial of service (heap corruption) via a large value to the (1) pvalloc, (2) valloc, (3) posix_memalign, (4) memalign, or (5) aligned_alloc functions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137226" comment="glibc-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137227" comment="glibc-32bit-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137228" comment="glibc-devel-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137229" comment="glibc-extra-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137230" comment="glibc-info-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137231" comment="glibc-locale-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137232" comment="glibc-locale-32bit-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137233" comment="nscd-2.19-16.2.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4342</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4342" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4342" source="CVE"/>
    <description>
    xinetd does not enforce the user and group configuration directives for TCPMUX services, which causes these services to be run as root and makes it easier for remote attackers to gain privileges by leveraging another vulnerability in a service.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137913" comment="xinetd-2.3.15-7.2.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4349</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4349" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4349" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-4540.  Reason: This candidate was MERGED into CVE-2012-4540, since it was later discovered that it affected an additional version, but it does not constitute a regression error.  Notes: All CVE users should reference CVE-2012-4540 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137274" comment="icedtea-web-javadoc-1.5.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137275" comment="java-1_7_0-openjdk-plugin-1.5.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137276" comment="java-1_8_0-openjdk-plugin-1.5.1-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4351</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4351" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4351" source="CVE"/>
    <description>
    GnuPG 1.4.x, 2.0.x, and 2.1.x treats a key flags subpacket with all bits cleared (no usage permitted) as if it has all bits set (all usage permitted), which might allow remote attackers to bypass intended cryptographic protection mechanisms by leveraging the subkey.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137253" comment="gpg2-2.0.26-2.1.3 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4353</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4353" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4353" source="CVE"/>
    <description>
    The ssl3_take_mac function in ssl/s3_both.c in OpenSSL 1.0.1 before 1.0.1f allows remote TLS servers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Next Protocol Negotiation record in a TLS handshake.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4355</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4355" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355" source="CVE"/>
    <description>
    Xen 4.3.x and earlier does not properly handle certain errors, which allows local HVM guests to obtain hypervisor stack memory via a (1) port or (2) memory mapped I/O write or (3) other unspecified operations related to addresses without associated memory.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4356</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4356" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4356" source="CVE"/>
    <description>
    Xen 4.3.x writes hypervisor mappings to certain shadow pagetables when live migration is performed on hosts with more than 5TB of RAM, which allows local 64-bit PV guests to read or write to invalid memory and cause a denial of service (crash).
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4359</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4359" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4359" source="CVE"/>
    <description>
    Integer overflow in kbdint.c in mod_sftp in ProFTPD 1.3.4d and 1.3.5r3 allows remote attackers to cause a denial of service (memory consumption) via a large response count value in an authentication request, which triggers a large memory allocation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110302" comment="proftpd-1.3.5a-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110303" comment="proftpd-devel-1.3.5a-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110304" comment="proftpd-doc-1.3.5a-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110305" comment="proftpd-lang-1.3.5a-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110306" comment="proftpd-ldap-1.3.5a-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110307" comment="proftpd-mysql-1.3.5a-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110308" comment="proftpd-pgsql-1.3.5a-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110309" comment="proftpd-radius-1.3.5a-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110310" comment="proftpd-sqlite-1.3.5a-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4361</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4361" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4361" source="CVE"/>
    <description>
    The fbld instruction emulation in Xen 3.3.x through 4.3.x does not use the correct variable for the source effective address, which allows local HVM guests to obtain hypervisor stack information by reading the values used by the instruction.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4375</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4375" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4375" source="CVE"/>
    <description>
    The qdisk PV disk backend in qemu-xen in Xen 4.2.x and 4.3.x before 4.3.1, and qemu 1.1 and other versions, allows local HVM guests to cause a denial of service (domain grant reference consumption) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4396</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4396" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4396" source="CVE"/>
    <description>
    Use-after-free vulnerability in the doImageText function in dix/dixfonts.c in the xorg-server module before 1.14.4 in X.Org X11 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted ImageText request that triggers memory-allocation failure.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137919" comment="xorg-x11-server-7.6_1.16.1-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137920" comment="xorg-x11-server-extra-7.6_1.16.1-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137921" comment="xorg-x11-server-sdk-7.6_1.16.1-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4399</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4399" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4399" source="CVE"/>
    <description>
    The remoteClientFreeFunc function in daemon/remote.c in libvirt before 1.1.3, when ACLs are used, does not set an identity, which causes event handler removal to be denied and remote attackers to cause a denial of service (use-after-free and crash) by registering an event handler and then closing the connection.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137726" comment="libvirt-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137727" comment="libvirt-client-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137728" comment="libvirt-daemon-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137729" comment="libvirt-daemon-config-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137730" comment="libvirt-daemon-config-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137731" comment="libvirt-daemon-driver-interface-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137732" comment="libvirt-daemon-driver-libxl-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137733" comment="libvirt-daemon-driver-lxc-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137734" comment="libvirt-daemon-driver-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137735" comment="libvirt-daemon-driver-nodedev-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137736" comment="libvirt-daemon-driver-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137737" comment="libvirt-daemon-driver-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137738" comment="libvirt-daemon-driver-secret-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137739" comment="libvirt-daemon-driver-storage-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137740" comment="libvirt-daemon-driver-uml-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137741" comment="libvirt-daemon-driver-vbox-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137742" comment="libvirt-daemon-driver-xen-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137743" comment="libvirt-daemon-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137744" comment="libvirt-daemon-xen-1.2.9-1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4400</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4400" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4400" source="CVE"/>
    <description>
    virt-login-shell in libvirt 1.1.2 through 1.1.3 allows local users to overwrite arbitrary files and possibly gain privileges via unspecified environment variables or command-line arguments.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137726" comment="libvirt-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137727" comment="libvirt-client-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137728" comment="libvirt-daemon-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137729" comment="libvirt-daemon-config-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137730" comment="libvirt-daemon-config-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137731" comment="libvirt-daemon-driver-interface-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137732" comment="libvirt-daemon-driver-libxl-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137733" comment="libvirt-daemon-driver-lxc-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137734" comment="libvirt-daemon-driver-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137735" comment="libvirt-daemon-driver-nodedev-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137736" comment="libvirt-daemon-driver-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137737" comment="libvirt-daemon-driver-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137738" comment="libvirt-daemon-driver-secret-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137739" comment="libvirt-daemon-driver-storage-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137740" comment="libvirt-daemon-driver-uml-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137741" comment="libvirt-daemon-driver-vbox-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137742" comment="libvirt-daemon-driver-xen-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137743" comment="libvirt-daemon-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137744" comment="libvirt-daemon-xen-1.2.9-1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4401</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4401" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4401" source="CVE"/>
    <description>
    The virConnectDomainXMLToNative API function in libvirt 1.1.0 through 1.1.3 checks for the connect:read permission instead of the connect:write permission, which allows attackers to gain domain:write privileges and execute Qemu binaries via crafted XML.  NOTE: some of these details are obtained from third party information.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137726" comment="libvirt-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137727" comment="libvirt-client-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137728" comment="libvirt-daemon-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137729" comment="libvirt-daemon-config-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137730" comment="libvirt-daemon-config-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137731" comment="libvirt-daemon-driver-interface-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137732" comment="libvirt-daemon-driver-libxl-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137733" comment="libvirt-daemon-driver-lxc-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137734" comment="libvirt-daemon-driver-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137735" comment="libvirt-daemon-driver-nodedev-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137736" comment="libvirt-daemon-driver-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137737" comment="libvirt-daemon-driver-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137738" comment="libvirt-daemon-driver-secret-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137739" comment="libvirt-daemon-driver-storage-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137740" comment="libvirt-daemon-driver-uml-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137741" comment="libvirt-daemon-driver-vbox-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137742" comment="libvirt-daemon-driver-xen-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137743" comment="libvirt-daemon-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137744" comment="libvirt-daemon-xen-1.2.9-1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4402</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4402" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4402" source="CVE"/>
    <description>
    The compressed packet parser in GnuPG 1.4.x before 1.4.15 and 2.0.x before 2.0.22 allows remote attackers to cause a denial of service (infinite recursion) via a crafted OpenPGP message.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137253" comment="gpg2-2.0.26-2.1.3 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4408</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4408" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4408" source="CVE"/>
    <description>
    Heap-based buffer overflow in the dcerpc_read_ncacn_packet_done function in librpc/rpc/dcerpc_util.c in winbindd in Samba 3.x before 3.6.22, 4.0.x before 4.0.13, and 4.1.x before 4.1.3 allows remote AD domain controllers to execute arbitrary code via an invalid fragment length in a DCE-RPC packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137424" comment="libdcerpc-binding0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137425" comment="libdcerpc-binding0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137426" comment="libdcerpc0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137427" comment="libdcerpc0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137428" comment="libgensec0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137429" comment="libgensec0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137430" comment="libndr-krb5pac0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137431" comment="libndr-krb5pac0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137432" comment="libndr-nbt0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137433" comment="libndr-nbt0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137434" comment="libndr-standard0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137435" comment="libndr-standard0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137436" comment="libndr0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137437" comment="libndr0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137438" comment="libnetapi0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137439" comment="libnetapi0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137440" comment="libpdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137441" comment="libpdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137442" comment="libregistry0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137443" comment="libsamba-credentials0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137444" comment="libsamba-credentials0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137445" comment="libsamba-hostconfig0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137446" comment="libsamba-hostconfig0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137447" comment="libsamba-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137448" comment="libsamba-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137449" comment="libsamdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137450" comment="libsamdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137451" comment="libsmbclient-devel-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137452" comment="libsmbclient-raw0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137453" comment="libsmbclient-raw0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137454" comment="libsmbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137455" comment="libsmbconf0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137456" comment="libsmbconf0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137457" comment="libsmbldap0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137458" comment="libsmbldap0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137459" comment="libtevent-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137460" comment="libtevent-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137461" comment="libwbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137462" comment="libwbclient0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137463" comment="samba-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137464" comment="samba-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137465" comment="samba-client-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137466" comment="samba-client-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137467" comment="samba-doc-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137468" comment="samba-libs-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137469" comment="samba-libs-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137470" comment="samba-winbind-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137471" comment="samba-winbind-32bit-4.1.12-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4416</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4416" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4416" source="CVE"/>
    <description>
    The Ocaml xenstored implementation (oxenstored) in Xen 4.1.x, 4.2.x, and 4.3.x allows local guest domains to cause a denial of service (domain shutdown) via a large message reply.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4458</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4458" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4458" source="CVE"/>
    <description>
    Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.18 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of AF_INET6 address results.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1914.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137226" comment="glibc-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137227" comment="glibc-32bit-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137228" comment="glibc-devel-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137229" comment="glibc-extra-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137230" comment="glibc-info-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137231" comment="glibc-locale-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137232" comment="glibc-locale-32bit-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137233" comment="nscd-2.19-16.2.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4473</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4473" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4473" source="CVE"/>
    <description>
    Stack-based buffer overflow in the extractPages function in utils/pdfseparate.cc in poppler before 0.24.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a source filename.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137580" comment="libpoppler-cpp0-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137581" comment="libpoppler-devel-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137582" comment="libpoppler-glib8-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137583" comment="libpoppler-qt4-4-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137584" comment="libpoppler-qt4-devel-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137585" comment="libpoppler46-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137586" comment="poppler-tools-0.26.5-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4474</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4474" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4474" source="CVE"/>
    <description>
    Format string vulnerability in the extractPages function in utils/pdfseparate.cc in poppler before 0.24.3 allows remote attackers to cause a denial of service (crash) via format string specifiers in a destination filename.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137580" comment="libpoppler-cpp0-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137581" comment="libpoppler-devel-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137582" comment="libpoppler-glib8-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137583" comment="libpoppler-qt4-4-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137584" comment="libpoppler-qt4-devel-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137585" comment="libpoppler46-0.26.5-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137586" comment="poppler-tools-0.26.5-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4475</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4475" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4475" source="CVE"/>
    <description>
    Samba 3.2.x through 3.6.x before 3.6.20, 4.0.x before 4.0.11, and 4.1.x before 4.1.1, when vfs_streams_depot or vfs_streams_xattr is enabled, allows remote attackers to bypass intended file restrictions by leveraging ACL differences between a file and an associated alternate data stream (ADS).
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137424" comment="libdcerpc-binding0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137425" comment="libdcerpc-binding0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137426" comment="libdcerpc0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137427" comment="libdcerpc0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137428" comment="libgensec0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137429" comment="libgensec0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137430" comment="libndr-krb5pac0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137431" comment="libndr-krb5pac0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137432" comment="libndr-nbt0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137433" comment="libndr-nbt0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137434" comment="libndr-standard0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137435" comment="libndr-standard0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137436" comment="libndr0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137437" comment="libndr0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137438" comment="libnetapi0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137439" comment="libnetapi0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137440" comment="libpdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137441" comment="libpdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137442" comment="libregistry0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137443" comment="libsamba-credentials0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137444" comment="libsamba-credentials0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137445" comment="libsamba-hostconfig0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137446" comment="libsamba-hostconfig0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137447" comment="libsamba-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137448" comment="libsamba-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137449" comment="libsamdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137450" comment="libsamdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137451" comment="libsmbclient-devel-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137452" comment="libsmbclient-raw0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137453" comment="libsmbclient-raw0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137454" comment="libsmbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137455" comment="libsmbconf0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137456" comment="libsmbconf0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137457" comment="libsmbldap0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137458" comment="libsmbldap0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137459" comment="libtevent-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137460" comment="libtevent-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137461" comment="libwbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137462" comment="libwbclient0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137463" comment="samba-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137464" comment="samba-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137465" comment="samba-client-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137466" comment="samba-client-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137467" comment="samba-doc-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137468" comment="samba-libs-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137469" comment="samba-libs-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137470" comment="samba-winbind-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137471" comment="samba-winbind-32bit-4.1.12-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4476</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4476" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4476" source="CVE"/>
    <description>
    Samba 4.0.x before 4.0.11 and 4.1.x before 4.1.1, when LDAP or HTTP is provided over SSL, uses world-readable permissions for a private key, which allows local users to obtain sensitive information by reading the key file, as demonstrated by access to the local filesystem on an AD domain controller.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137424" comment="libdcerpc-binding0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137425" comment="libdcerpc-binding0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137426" comment="libdcerpc0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137427" comment="libdcerpc0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137428" comment="libgensec0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137429" comment="libgensec0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137430" comment="libndr-krb5pac0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137431" comment="libndr-krb5pac0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137432" comment="libndr-nbt0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137433" comment="libndr-nbt0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137434" comment="libndr-standard0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137435" comment="libndr-standard0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137436" comment="libndr0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137437" comment="libndr0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137438" comment="libnetapi0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137439" comment="libnetapi0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137440" comment="libpdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137441" comment="libpdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137442" comment="libregistry0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137443" comment="libsamba-credentials0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137444" comment="libsamba-credentials0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137445" comment="libsamba-hostconfig0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137446" comment="libsamba-hostconfig0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137447" comment="libsamba-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137448" comment="libsamba-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137449" comment="libsamdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137450" comment="libsamdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137451" comment="libsmbclient-devel-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137452" comment="libsmbclient-raw0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137453" comment="libsmbclient-raw0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137454" comment="libsmbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137455" comment="libsmbconf0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137456" comment="libsmbconf0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137457" comment="libsmbldap0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137458" comment="libsmbldap0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137459" comment="libtevent-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137460" comment="libtevent-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137461" comment="libwbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137462" comment="libwbclient0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137463" comment="samba-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137464" comment="samba-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137465" comment="samba-client-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137466" comment="samba-client-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137467" comment="samba-doc-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137468" comment="samba-libs-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137469" comment="samba-libs-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137470" comment="samba-winbind-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137471" comment="samba-winbind-32bit-4.1.12-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4494</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494" source="CVE"/>
    <description>
    Xen before 4.1.x, 4.2.x, and 4.3.x does not take the page_alloc_lock and grant_table.lock in the same order, which allows local guest administrators with access to multiple vcpus to cause a denial of service (host deadlock) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4496</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4496" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4496" source="CVE"/>
    <description>
    Samba 3.x before 3.6.23, 4.0.x before 4.0.16, and 4.1.x before 4.1.6 does not enforce the password-guessing protection mechanism for all interfaces, which makes it easier for remote attackers to obtain access via brute-force ChangePasswordUser2 (1) SAMR or (2) RAP attempts.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137424" comment="libdcerpc-binding0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137425" comment="libdcerpc-binding0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137426" comment="libdcerpc0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137427" comment="libdcerpc0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137428" comment="libgensec0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137429" comment="libgensec0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137430" comment="libndr-krb5pac0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137431" comment="libndr-krb5pac0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137432" comment="libndr-nbt0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137433" comment="libndr-nbt0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137434" comment="libndr-standard0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137435" comment="libndr-standard0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137436" comment="libndr0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137437" comment="libndr0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137438" comment="libnetapi0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137439" comment="libnetapi0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137440" comment="libpdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137441" comment="libpdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137442" comment="libregistry0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137443" comment="libsamba-credentials0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137444" comment="libsamba-credentials0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137445" comment="libsamba-hostconfig0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137446" comment="libsamba-hostconfig0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137447" comment="libsamba-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137448" comment="libsamba-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137449" comment="libsamdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137450" comment="libsamdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137451" comment="libsmbclient-devel-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137452" comment="libsmbclient-raw0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137453" comment="libsmbclient-raw0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137454" comment="libsmbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137455" comment="libsmbconf0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137456" comment="libsmbconf0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137457" comment="libsmbldap0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137458" comment="libsmbldap0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137459" comment="libtevent-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137460" comment="libtevent-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137461" comment="libwbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137462" comment="libwbclient0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137463" comment="samba-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137464" comment="samba-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137465" comment="samba-client-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137466" comment="samba-client-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137467" comment="samba-doc-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137468" comment="samba-libs-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137469" comment="samba-libs-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137470" comment="samba-winbind-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137471" comment="samba-winbind-32bit-4.1.12-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4505</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4505" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4505" source="CVE"/>
    <description>
    The is_this_legal function in mod_dontdothat for Apache Subversion 1.4.0 through 1.7.13 and 1.8.0 through 1.8.4 allows remote attackers to bypass intended access restrictions and possibly cause a denial of service (resource consumption) via a relative URL in a REPORT request.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137877" comment="subversion-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137878" comment="subversion-devel-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137879" comment="subversion-perl-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137880" comment="subversion-python-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137881" comment="subversion-server-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137882" comment="subversion-tools-1.8.10-2.4.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4509</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4509" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4509" source="CVE"/>
    <description>
    The default configuration of IBUS 1.5.4, and possibly 1.5.2 and earlier, when IBus.InputPurpose.PASSWORD is not set and used with GNOME 3, does not obscure the entered password characters, which allows physically proximate attackers to obtain a user password by reading the lockscreen.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137273" comment="ibus-pinyin-1.5.0-8.1.4 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4526</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4526" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4526" source="CVE"/>
    <description>
    Buffer overflow in hw/ide/ahci.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via vectors related to migrating ports.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137408" comment="libcacard0-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137409" comment="qemu-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137410" comment="qemu-arm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137411" comment="qemu-block-curl-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137412" comment="qemu-extra-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137413" comment="qemu-ipxe-1.0.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137414" comment="qemu-ksm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137415" comment="qemu-kvm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137416" comment="qemu-lang-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137417" comment="qemu-ppc-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137418" comment="qemu-s390-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137419" comment="qemu-seabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137420" comment="qemu-sgabios-8-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137421" comment="qemu-tools-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137422" comment="qemu-vgabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137423" comment="qemu-x86-2.1.0-2.9 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4527</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4527" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4527" source="CVE"/>
    <description>
    Buffer overflow in hw/timer/hpet.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via vectors related to the number of timers.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137408" comment="libcacard0-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137409" comment="qemu-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137410" comment="qemu-arm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137411" comment="qemu-block-curl-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137412" comment="qemu-extra-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137413" comment="qemu-ipxe-1.0.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137414" comment="qemu-ksm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137415" comment="qemu-kvm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137416" comment="qemu-lang-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137417" comment="qemu-ppc-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137418" comment="qemu-s390-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137419" comment="qemu-seabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137420" comment="qemu-sgabios-8-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137421" comment="qemu-tools-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137422" comment="qemu-vgabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137423" comment="qemu-x86-2.1.0-2.9 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4529</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4529" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4529" source="CVE"/>
    <description>
    Buffer overflow in hw/pci/pcie_aer.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large log_num value in a savevm image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137408" comment="libcacard0-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137409" comment="qemu-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137410" comment="qemu-arm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137411" comment="qemu-block-curl-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137412" comment="qemu-extra-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137413" comment="qemu-ipxe-1.0.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137414" comment="qemu-ksm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137415" comment="qemu-kvm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137416" comment="qemu-lang-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137417" comment="qemu-ppc-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137418" comment="qemu-s390-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137419" comment="qemu-seabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137420" comment="qemu-sgabios-8-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137421" comment="qemu-tools-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137422" comment="qemu-vgabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137423" comment="qemu-x86-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126020" comment="xen-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126021" comment="xen-devel-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126022" comment="xen-doc-html-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126023" comment="xen-kmp-default-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126024" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126025" comment="xen-libs-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126026" comment="xen-libs-32bit-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126027" comment="xen-tools-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126028" comment="xen-tools-domU-4.4.4_02-43.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4530</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4530" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4530" source="CVE"/>
    <description>
    Buffer overflow in hw/ssi/pl022.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via crafted tx_fifo_head and rx_fifo_head values in a savevm image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137408" comment="libcacard0-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137409" comment="qemu-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137410" comment="qemu-arm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137411" comment="qemu-block-curl-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137412" comment="qemu-extra-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137413" comment="qemu-ipxe-1.0.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137414" comment="qemu-ksm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137415" comment="qemu-kvm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137416" comment="qemu-lang-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137417" comment="qemu-ppc-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137418" comment="qemu-s390-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137419" comment="qemu-seabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137420" comment="qemu-sgabios-8-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137421" comment="qemu-tools-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137422" comment="qemu-vgabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137423" comment="qemu-x86-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126020" comment="xen-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126021" comment="xen-devel-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126022" comment="xen-doc-html-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126023" comment="xen-kmp-default-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126024" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126025" comment="xen-libs-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126026" comment="xen-libs-32bit-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126027" comment="xen-tools-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126028" comment="xen-tools-domU-4.4.4_02-43.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4531</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4531" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4531" source="CVE"/>
    <description>
    Buffer overflow in target-arm/machine.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a negative value in cpreg_vmstate_array_len in a savevm image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137408" comment="libcacard0-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137409" comment="qemu-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137410" comment="qemu-arm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137411" comment="qemu-block-curl-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137412" comment="qemu-extra-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137413" comment="qemu-ipxe-1.0.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137414" comment="qemu-ksm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137415" comment="qemu-kvm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137416" comment="qemu-lang-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137417" comment="qemu-ppc-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137418" comment="qemu-s390-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137419" comment="qemu-seabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137420" comment="qemu-sgabios-8-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137421" comment="qemu-tools-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137422" comment="qemu-vgabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137423" comment="qemu-x86-2.1.0-2.9 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4533</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4533" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4533" source="CVE"/>
    <description>
    Buffer overflow in the pxa2xx_ssp_load function in hw/arm/pxa2xx.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted s-&gt;rx_level value in a savevm image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137408" comment="libcacard0-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137409" comment="qemu-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137410" comment="qemu-arm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137411" comment="qemu-block-curl-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137412" comment="qemu-extra-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137413" comment="qemu-ipxe-1.0.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137414" comment="qemu-ksm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137415" comment="qemu-kvm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137416" comment="qemu-lang-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137417" comment="qemu-ppc-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137418" comment="qemu-s390-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137419" comment="qemu-seabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137420" comment="qemu-sgabios-8-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137421" comment="qemu-tools-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137422" comment="qemu-vgabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137423" comment="qemu-x86-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126020" comment="xen-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126021" comment="xen-devel-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126022" comment="xen-doc-html-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126023" comment="xen-kmp-default-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126024" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126025" comment="xen-libs-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126026" comment="xen-libs-32bit-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126027" comment="xen-tools-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126028" comment="xen-tools-domU-4.4.4_02-43.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4534</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4534" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4534" source="CVE"/>
    <description>
    Buffer overflow in hw/intc/openpic.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service or possibly execute arbitrary code via vectors related to IRQDest elements.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137408" comment="libcacard0-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137409" comment="qemu-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137410" comment="qemu-arm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137411" comment="qemu-block-curl-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137412" comment="qemu-extra-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137413" comment="qemu-ipxe-1.0.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137414" comment="qemu-ksm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137415" comment="qemu-kvm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137416" comment="qemu-lang-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137417" comment="qemu-ppc-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137418" comment="qemu-s390-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137419" comment="qemu-seabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137420" comment="qemu-sgabios-8-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137421" comment="qemu-tools-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137422" comment="qemu-vgabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137423" comment="qemu-x86-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126020" comment="xen-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126021" comment="xen-devel-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126022" comment="xen-doc-html-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126023" comment="xen-kmp-default-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126024" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126025" comment="xen-libs-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126026" comment="xen-libs-32bit-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126027" comment="xen-tools-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126028" comment="xen-tools-domU-4.4.4_02-43.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4535</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4535" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4535" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137408" comment="libcacard0-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137409" comment="qemu-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137410" comment="qemu-arm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137411" comment="qemu-block-curl-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137412" comment="qemu-extra-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137413" comment="qemu-ipxe-1.0.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137414" comment="qemu-ksm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137415" comment="qemu-kvm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137416" comment="qemu-lang-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137417" comment="qemu-ppc-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137418" comment="qemu-s390-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137419" comment="qemu-seabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137420" comment="qemu-sgabios-8-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137421" comment="qemu-tools-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137422" comment="qemu-vgabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137423" comment="qemu-x86-2.1.0-2.9 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4536</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4536" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4536" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137408" comment="libcacard0-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137409" comment="qemu-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137410" comment="qemu-arm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137411" comment="qemu-block-curl-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137412" comment="qemu-extra-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137413" comment="qemu-ipxe-1.0.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137414" comment="qemu-ksm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137415" comment="qemu-kvm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137416" comment="qemu-lang-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137417" comment="qemu-ppc-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137418" comment="qemu-s390-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137419" comment="qemu-seabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137420" comment="qemu-sgabios-8-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137421" comment="qemu-tools-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137422" comment="qemu-vgabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137423" comment="qemu-x86-2.1.0-2.9 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4537</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4537" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4537" source="CVE"/>
    <description>
    The ssi_sd_transfer function in hw/sd/ssi-sd.c in QEMU before 1.7.2 allows remote attackers to execute arbitrary code via a crafted arglen value in a savevm image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137408" comment="libcacard0-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137409" comment="qemu-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137410" comment="qemu-arm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137411" comment="qemu-block-curl-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137412" comment="qemu-extra-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137413" comment="qemu-ipxe-1.0.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137414" comment="qemu-ksm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137415" comment="qemu-kvm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137416" comment="qemu-lang-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137417" comment="qemu-ppc-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137418" comment="qemu-s390-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137419" comment="qemu-seabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137420" comment="qemu-sgabios-8-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137421" comment="qemu-tools-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137422" comment="qemu-vgabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137423" comment="qemu-x86-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126020" comment="xen-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126021" comment="xen-devel-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126022" comment="xen-doc-html-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126023" comment="xen-kmp-default-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126024" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126025" comment="xen-libs-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126026" comment="xen-libs-32bit-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126027" comment="xen-tools-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126028" comment="xen-tools-domU-4.4.4_02-43.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4538</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4538" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4538" source="CVE"/>
    <description>
    Multiple buffer overflows in the ssd0323_load function in hw/display/ssd0323.c in QEMU before 1.7.2 allow remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via crafted (1) cmd_len, (2) row, or (3) col values; (4) row_start and row_end values; or (5) col_star and col_end values in a savevm image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137408" comment="libcacard0-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137409" comment="qemu-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137410" comment="qemu-arm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137411" comment="qemu-block-curl-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137412" comment="qemu-extra-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137413" comment="qemu-ipxe-1.0.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137414" comment="qemu-ksm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137415" comment="qemu-kvm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137416" comment="qemu-lang-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137417" comment="qemu-ppc-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137418" comment="qemu-s390-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137419" comment="qemu-seabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137420" comment="qemu-sgabios-8-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137421" comment="qemu-tools-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137422" comment="qemu-vgabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137423" comment="qemu-x86-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126020" comment="xen-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126021" comment="xen-devel-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126022" comment="xen-doc-html-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126023" comment="xen-kmp-default-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126024" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126025" comment="xen-libs-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126026" comment="xen-libs-32bit-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126027" comment="xen-tools-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126028" comment="xen-tools-domU-4.4.4_02-43.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4539</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4539" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4539" source="CVE"/>
    <description>
    Multiple buffer overflows in the tsc210x_load function in hw/input/tsc210x.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted (1) precision, (2) nextprecision, (3) function, or (4) nextfunction value in a savevm image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137408" comment="libcacard0-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137409" comment="qemu-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137410" comment="qemu-arm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137411" comment="qemu-block-curl-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137412" comment="qemu-extra-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137413" comment="qemu-ipxe-1.0.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137414" comment="qemu-ksm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137415" comment="qemu-kvm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137416" comment="qemu-lang-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137417" comment="qemu-ppc-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137418" comment="qemu-s390-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137419" comment="qemu-seabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137420" comment="qemu-sgabios-8-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137421" comment="qemu-tools-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137422" comment="qemu-vgabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137423" comment="qemu-x86-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126020" comment="xen-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126021" comment="xen-devel-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126022" comment="xen-doc-html-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126023" comment="xen-kmp-default-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126024" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126025" comment="xen-libs-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126026" comment="xen-libs-32bit-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126027" comment="xen-tools-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126028" comment="xen-tools-domU-4.4.4_02-43.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4540</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4540" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4540" source="CVE"/>
    <description>
    Buffer overflow in scoop_gpio_handler_update in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a large (1) prev_level, (2) gpio_level, or (3) gpio_dir value in a savevm image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137408" comment="libcacard0-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137409" comment="qemu-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137410" comment="qemu-arm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137411" comment="qemu-block-curl-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137412" comment="qemu-extra-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137413" comment="qemu-ipxe-1.0.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137414" comment="qemu-ksm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137415" comment="qemu-kvm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137416" comment="qemu-lang-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137417" comment="qemu-ppc-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137418" comment="qemu-s390-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137419" comment="qemu-seabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137420" comment="qemu-sgabios-8-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137421" comment="qemu-tools-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137422" comment="qemu-vgabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137423" comment="qemu-x86-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4541</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4541" source="CVE"/>
    <description>
    The usb_device_post_load function in hw/usb/bus.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted savevm image, related to a negative setup_len or setup_index value.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137408" comment="libcacard0-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137409" comment="qemu-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137410" comment="qemu-arm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137411" comment="qemu-block-curl-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137412" comment="qemu-extra-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137413" comment="qemu-ipxe-1.0.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137414" comment="qemu-ksm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137415" comment="qemu-kvm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137416" comment="qemu-lang-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137417" comment="qemu-ppc-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137418" comment="qemu-s390-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137419" comment="qemu-seabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137420" comment="qemu-sgabios-8-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137421" comment="qemu-tools-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137422" comment="qemu-vgabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137423" comment="qemu-x86-2.1.0-2.9 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4542</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4542" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4542" source="CVE"/>
    <description>
    The virtio_scsi_load_request function in hw/scsi/scsi-bus.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted savevm image, which triggers an out-of-bounds array access.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137408" comment="libcacard0-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137409" comment="qemu-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137410" comment="qemu-arm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137411" comment="qemu-block-curl-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137412" comment="qemu-extra-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137413" comment="qemu-ipxe-1.0.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137414" comment="qemu-ksm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137415" comment="qemu-kvm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137416" comment="qemu-lang-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137417" comment="qemu-ppc-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137418" comment="qemu-s390-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137419" comment="qemu-seabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137420" comment="qemu-sgabios-8-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137421" comment="qemu-tools-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137422" comment="qemu-vgabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137423" comment="qemu-x86-2.1.0-2.9 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4544</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4544" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4544" source="CVE"/>
    <description>
    hw/net/vmxnet3.c in QEMU 2.0.0-rc0, 1.7.1, and earlier allows local guest users to cause a denial of service or possibly execute arbitrary code via vectors related to (1) RX or (2) TX queue numbers or (3) interrupt indices.  NOTE: some of these details are obtained from third party information.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137408" comment="libcacard0-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137409" comment="qemu-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137410" comment="qemu-arm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137411" comment="qemu-block-curl-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137412" comment="qemu-extra-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137413" comment="qemu-ipxe-1.0.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137414" comment="qemu-ksm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137415" comment="qemu-kvm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137416" comment="qemu-lang-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137417" comment="qemu-ppc-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137418" comment="qemu-s390-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137419" comment="qemu-seabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137420" comment="qemu-sgabios-8-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137421" comment="qemu-tools-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137422" comment="qemu-vgabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137423" comment="qemu-x86-2.1.0-2.9 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4545</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4545" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4545" source="CVE"/>
    <description>
    cURL and libcurl 7.18.0 through 7.32.0, when built with OpenSSL, disables the certificate CN and SAN name field verification (CURLOPT_SSL_VERIFYHOST) when the digital signature verification (CURLOPT_SSL_VERIFYPEER) is disabled, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137106" comment="curl-7.38.0-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137107" comment="libcurl-devel-7.38.0-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137108" comment="libcurl4-7.38.0-1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4549</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4549" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4549" source="CVE"/>
    <description>
    QXmlSimpleReader in Qt before 5.2 allows context-dependent attackers to cause a denial of service (memory consumption) via an XML Entity Expansion (XEE) attack.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137616" comment="libqt4-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137617" comment="libqt4-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137618" comment="libqt4-devel-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137619" comment="libqt4-linguist-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137620" comment="libqt4-qt3support-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137621" comment="libqt4-qt3support-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137622" comment="libqt4-sql-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137623" comment="libqt4-sql-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137624" comment="libqt4-sql-mysql-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137625" comment="libqt4-sql-mysql-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137626" comment="libqt4-sql-postgresql-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137627" comment="libqt4-sql-postgresql-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137628" comment="libqt4-sql-sqlite-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137629" comment="libqt4-sql-sqlite-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137630" comment="libqt4-sql-unixODBC-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137631" comment="libqt4-sql-unixODBC-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137632" comment="libqt4-x11-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137633" comment="libqt4-x11-32bit-4.8.6-4.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4551</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4551" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4551" source="CVE"/>
    <description>
    Xen 4.2.x and 4.3.x, when nested virtualization is disabled, does not properly check the emulation paths for (1) VMLAUNCH and (2) VMRESUME, which allows local HVM guest users to cause a denial of service (host crash) via unspecified vectors related to "guest VMX instruction execution."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4553</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4553" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4553" source="CVE"/>
    <description>
    The XEN_DOMCTL_getmemlist hypercall in Xen 3.4.x through 4.3.x (possibly 4.3.1) does not always obtain the page_alloc_lock and mm_rwlock in the same order, which allows local guest administrators to cause a denial of service (host deadlock).
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4554</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4554" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4554" source="CVE"/>
    <description>
    Xen 3.0.3 through 4.1.x (possibly 4.1.6.1), 4.2.x (possibly 4.2.3), and 4.3.x (possibly 4.3.1) does not properly prevent access to hypercalls, which allows local guest users to gain privileges via a crafted application running in ring 1 or 2.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4558</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4558" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4558" source="CVE"/>
    <description>
    The get_parent_resource function in repos.c in mod_dav_svn Apache HTTPD server module in Subversion 1.7.11 through 1.7.13 and 1.8.1 through 1.8.4, when built with assertions enabled and SVNAutoversioning is enabled, allows remote attackers to cause a denial of service (assertion failure and Apache process abort) via a non-canonical URL in a request, as demonstrated using a trailing /.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137877" comment="subversion-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137878" comment="subversion-devel-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137879" comment="subversion-perl-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137880" comment="subversion-python-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137881" comment="subversion-server-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137882" comment="subversion-tools-1.8.10-2.4.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4701</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4701" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4701" source="CVE"/>
    <description>
    Auth/Yadis/XML.php in PHP OpenID Library 2.2.2 and earlier allows remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via XRDS data containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134119" comment="typo3-cms-4_7-4.7.20-2.3.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4758</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4758" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4758" source="CVE"/>
    <description>
    Double free vulnerability in the writeDataError function in the ElasticSearch plugin (omelasticsearch) in rsyslog before 7.4.2 and before 7.5.2 devel, when errorfile is set to local logging, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted JSON response.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137865" comment="rsyslog-8.4.2-1.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4854</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4854" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4854" source="CVE"/>
    <description>
    The RFC 5011 implementation in rdata.c in ISC BIND 9.7.x and 9.8.x before 9.8.5-P2, 9.8.6b1, 9.9.x before 9.9.3-P2, and 9.9.4b1, and DNSco BIND 9.9.3-S1 before 9.9.3-S1-P1 and 9.9.4-S1b1, allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query with a malformed RDATA section that is not properly handled during construction of a log message, as exploited in the wild in July 2013.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137045" comment="bind-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137046" comment="bind-chrootenv-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137047" comment="bind-doc-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137048" comment="bind-libs-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137049" comment="bind-utils-9.9.5P1-2.2.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4920</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4920" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4920" source="CVE"/>
    <description>
    The P1 dissector in Wireshark 1.10.x before 1.10.1 does not properly initialize a global variable, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4921</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4921" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4921" source="CVE"/>
    <description>
    Off-by-one error in the dissect_radiotap function in epan/dissectors/packet-ieee80211-radiotap.c in the Radiotap dissector in Wireshark 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4922</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4922" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4922" source="CVE"/>
    <description>
    Double free vulnerability in the dissect_dcom_ActivationProperties function in epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4923</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4923" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4923" source="CVE"/>
    <description>
    Memory leak in the dissect_dcom_ActivationProperties function in epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (memory consumption) via crafted packets.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4924</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4924" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4924" source="CVE"/>
    <description>
    epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 does not properly validate certain index values, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4925</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4925" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4925" source="CVE"/>
    <description>
    Integer signedness error in epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4926</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4926" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4926" source="CVE"/>
    <description>
    epan/dissectors/packet-dcom-sysact.c in the DCOM ISystemActivator dissector in Wireshark 1.10.x before 1.10.1 does not properly determine whether there is remaining packet data to process, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4927</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4927" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4927" source="CVE"/>
    <description>
    Integer signedness error in the get_type_length function in epan/dissectors/packet-btsdp.c in the Bluetooth SDP dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop and CPU consumption) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4928</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4928" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4928" source="CVE"/>
    <description>
    Integer signedness error in the dissect_headers function in epan/dissectors/packet-btobex.c in the Bluetooth OBEX dissector in Wireshark 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4929</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4929" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4929" source="CVE"/>
    <description>
    The parseFields function in epan/dissectors/packet-dis-pdus.c in the DIS dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not terminate packet-data processing after finding zero remaining bytes, which allows remote attackers to cause a denial of service (loop) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4930</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4930" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4930" source="CVE"/>
    <description>
    The dissect_dvbci_tpdu_hdr function in epan/dissectors/packet-dvbci.c in the DVB-CI dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not validate a certain length value before decrementing it, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4931</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4931" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4931" source="CVE"/>
    <description>
    epan/proto.c in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allows remote attackers to cause a denial of service (loop) via a crafted packet that is not properly handled by the GSM RR dissector.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4932</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4932" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4932" source="CVE"/>
    <description>
    Multiple array index errors in epan/dissectors/packet-gsm_a_common.c in the GSM A Common dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 allow remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4933</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4933" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4933" source="CVE"/>
    <description>
    The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4934</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4934" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4934" source="CVE"/>
    <description>
    The netmon_open function in wiretap/netmon.c in the Netmon file parser in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize certain structure members, which allows remote attackers to cause a denial of service (application crash) via a crafted packet-trace file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4935</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4935" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4935" source="CVE"/>
    <description>
    The dissect_per_length_determinant function in epan/dissectors/packet-per.c in the ASN.1 PER dissector in Wireshark 1.8.x before 1.8.9 and 1.10.x before 1.10.1 does not initialize a length field in certain abnormal situations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4936</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-4936" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4936" source="CVE"/>
    <description>
    The IsDFP_Frame function in plugins/profinet/packet-pn-rt.c in the PROFINET Real-Time dissector in Wireshark 1.10.x before 1.10.1 does not validate MAC addresses, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5123</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5123" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5123" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137858" comment="python3-pip-1.5.6-2.1.3 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5211</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5211" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5211" source="CVE"/>
    <description>
    The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137808" comment="ntp-4.2.6p5-25.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137809" comment="ntp-doc-4.2.6p5-25.2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5590</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5590" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5591</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5591" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5591" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox before 25.0, Firefox ESR 24.x before 24.1, Thunderbird before 24.1, and SeaMonkey before 2.22 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5592</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5592" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5592" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 25.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5593</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5593" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5593" source="CVE"/>
    <description>
    The SELECT element implementation in Mozilla Firefox before 25.0, Firefox ESR 24.x before 24.1, Thunderbird before 24.1, and SeaMonkey before 2.22 does not properly restrict the nature or placement of HTML within a dropdown menu, which allows remote attackers to spoof the address bar or conduct clickjacking attacks via vectors that trigger navigation off of a page containing this element.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5595</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5595" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595" source="CVE"/>
    <description>
    The JavaScript engine in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 does not properly allocate memory for unspecified functions, which allows remote attackers to conduct buffer overflow attacks via a crafted web page.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5596</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5596" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5596" source="CVE"/>
    <description>
    The cycle collection (CC) implementation in Mozilla Firefox before 25.0, Firefox ESR 24.x before 24.1, Thunderbird before 24.1, and SeaMonkey before 2.22 does not properly determine the thread for release of an image object, which allows remote attackers to execute arbitrary code or cause a denial of service (race condition and application crash) via a large HTML document containing IMG elements, as demonstrated by the Never-Ending Reddit on reddit.com.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5597</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5597" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsDocLoader::doStopDocumentLoad function in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving a state-change event during an update of the offline cache.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5598</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5598" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5598" source="CVE"/>
    <description>
    PDF.js in Mozilla Firefox before 25.0 and Firefox ESR 24.x before 24.1 does not properly handle the appending of an IFRAME element, which allows remote attackers to read arbitrary files or execute arbitrary JavaScript code with chrome privileges by using this element within an embedded PDF object.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5599</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5599" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsIPresShell::GetPresContext function in the PresShell (aka presentation shell) implementation in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and application crash) via vectors involving a CANVAS element, a mozTextStyle attribute, and an onresize event.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5600</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5600" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsIOService::NewChannelFromURIWithProxyFlags function in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code via vectors involving a blob: URL.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5601</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5601" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsEventListenerManager::SetEventHandler function in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code via vectors related to a memory allocation through the garbage collection (GC) API.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5602</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5602" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602" source="CVE"/>
    <description>
    The Worker::SetEventListener function in the Web workers implementation in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to direct proxies.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5603</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5603" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5603" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsContentUtils::ContentIsHostIncludingDescendantOf function in Mozilla Firefox before 25.0, Firefox ESR 24.x before 24.1, Thunderbird before 24.1, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving HTML document templates.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5604</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5604" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604" source="CVE"/>
    <description>
    The txXPathNodeUtils::getBaseURI function in the XSLT processor in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 does not properly initialize data, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow and application crash) via crafted documents.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5605</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5605" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5605" source="CVE"/>
    <description>
    Mozilla Network Security Services (NSS) 3.14 before 3.14.5 and 3.15 before 3.15.3 allows remote attackers to cause a denial of service or possibly have unspecified other impact via invalid handshake packets.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137486" comment="libfreebl3-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137487" comment="libsoftokn3-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137488" comment="mozilla-nss-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137489" comment="mozilla-nss-certs-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137490" comment="mozilla-nss-devel-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137491" comment="mozilla-nss-tools-3.17.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5609</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5609" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5609" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5610</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5610" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5610" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 26.0 and SeaMonkey before 2.23 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5611</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5611" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5611" source="CVE"/>
    <description>
    Mozilla Firefox before 26.0 does not properly remove the Application Installation doorhanger, which makes it easier for remote attackers to spoof a Web App installation site by controlling the timing of page navigation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5612</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5612" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5612" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 26.0 and SeaMonkey before 2.23 makes it easier for remote attackers to inject arbitrary web script or HTML by leveraging a Same Origin Policy violation triggered by lack of a charset parameter in a Content-Type HTTP header.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5613</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5613" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5613" source="CVE"/>
    <description>
    Use-after-free vulnerability in the PresShell::DispatchSynthMouseMove function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving synthetic mouse movement, related to the RestyleManager::GetHoverGeneration function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5614</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5614" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5614" source="CVE"/>
    <description>
    Mozilla Firefox before 26.0 and SeaMonkey before 2.23 do not properly consider the sandbox attribute of an IFRAME element during processing of a contained OBJECT element, which allows remote attackers to bypass intended sandbox restrictions via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5615</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5615" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5615" source="CVE"/>
    <description>
    The JavaScript implementation in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 does not properly enforce certain typeset restrictions on the generation of GetElementIC typed array stubs, which has unspecified impact and remote attack vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5616</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5616" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5616" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsEventListenerManager::HandleEventSubType function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors related to mListeners event listeners.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5618</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5618" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5618" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsNodeUtils::LastRelease function in the table-editing user interface in the editor component in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code by triggering improper garbage collection.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5619</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5619" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5619" source="CVE"/>
    <description>
    Multiple integer overflows in the binary-search implementation in SpiderMonkey in Mozilla Firefox before 26.0 and SeaMonkey before 2.23 might allow remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted JavaScript code.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5653</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5653" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5653" source="CVE"/>
    <description>
    The getenv and filenameforall functions in Ghostscript 9.10 ignore the "-dSAFER" argument, which allows remote attackers to read data via a crafted postscript file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133984" comment="ghostscript-9.15-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133985" comment="ghostscript-devel-9.15-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125319" comment="ghostscript-mini-9.15-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125320" comment="ghostscript-mini-devel-9.15-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133986" comment="ghostscript-x11-9.15-6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5704</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5704" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5704" source="CVE"/>
    <description>
    The mod_headers module in the Apache HTTP Server 2.2.22 allows remote attackers to bypass "RequestHeader unset" directives by placing a header in the trailer portion of data sent with chunked transfer coding.  NOTE: the vendor states "this is not a security issue in httpd as such."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009103537" comment="apache2-2.4.10-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103538" comment="apache2-devel-2.4.10-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103539" comment="apache2-doc-2.4.10-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103540" comment="apache2-event-2.4.10-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103541" comment="apache2-example-pages-2.4.10-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103259" comment="apache2-itk-2.2.29-10.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103542" comment="apache2-prefork-2.4.10-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103543" comment="apache2-utils-2.4.10-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103544" comment="apache2-worker-2.4.10-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5717</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5717" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5717" source="CVE"/>
    <description>
    The Bluetooth HCI ACL dissector in Wireshark 1.10.x before 1.10.2 does not properly maintain a certain free list, which allows remote attackers to cause a denial of service (application crash) via a crafted packet that is not properly handled by the wmem_block_alloc function in epan/wmem/wmem_allocator_block.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5718</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5718" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5718" source="CVE"/>
    <description>
    The dissect_nbap_T_dCH_ID function in epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x before 1.10.2 does not restrict the dch_id value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5719</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5719" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5719" source="CVE"/>
    <description>
    epan/dissectors/packet-assa_r3.c in the ASSA R3 dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x before 1.10.2 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5720</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5720" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5720" source="CVE"/>
    <description>
    Buffer overflow in the RTPS dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x before 1.10.2 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5721</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5721" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5721" source="CVE"/>
    <description>
    The dissect_mq_rr function in epan/dissectors/packet-mq.c in the MQ dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x before 1.10.2 does not properly determine when to enter a certain loop, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5722</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5722" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5722" source="CVE"/>
    <description>
    Unspecified vulnerability in the LDAP dissector in Wireshark 1.8.x before 1.8.10 and 1.10.x before 1.10.2 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5772</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5772" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java SE component in Oracle Java SE Java SE 7u40 and earlier and Java SE 6u60 and earlier allows remote attackers to affect integrity via unknown vectors related to jhat.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5774</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5774" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5774" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, 6u60 and earlier, 5.0u51 and earlier, and Embedded 7u40 and earlier allows remote attackers to affect integrity via unknown vectors related to Libraries.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5778</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5778" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5778" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, 6u60 and earlier, 5.0u51 and earlier, and Embedded 7u40 and earlier allows remote attackers to affect confidentiality via unknown vectors related to 2D.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5780</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5780" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5780" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Libraries.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5782</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5782" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5782" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5783</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5783" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5783" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Swing.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5784</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5784" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5784" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect integrity via vectors related to SCRIPTING.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5790</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5790" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5790" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via vectors related to BEANS.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5797</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5797" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5797" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and JavaFX 2.2.40 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Javadoc.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5800</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5800" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via vectors related to JGSS.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5802</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5802" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5802" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAXP.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5803</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5803" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5803" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect availability via vectors related to JGSS.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5804</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5804" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5804" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, and JRockit R27.7.6 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Javadoc.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5805</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5805" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5805" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing, a different vulnerability than CVE-2013-5806.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5806</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5806" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5806" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing, a different vulnerability than CVE-2013-5805.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5809</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5809" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5809" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-5829.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5814</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5814" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5814" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5817</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5817" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5817" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JNDI.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5820</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5820" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5820" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect integrity via vectors related to JAX-WS.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5823</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5823" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5823" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect availability via unknown vectors related to Security.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5825</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5825" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5825" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect availability via vectors related to JAXP.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5829</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5829" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5829" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-5809.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5830</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5830" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5830" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5840</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5840" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5840" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Libraries.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5842</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5842" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5842" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-5850.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5849</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5849" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5849" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via vectors related to AWT.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5850</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5850" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5850" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-5842.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5851</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5851" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5851" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u40 and earlier and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via vectors related to JAXP.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5878</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5878" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5878" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u65 and 7u45, Java SE Embedded 7u45, and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Security.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the the Security component does not properly handle null XML namespace (xmlns) attributes during XML document canonicalization, which allows attackers to escape the sandbox.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5884</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5884" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5884" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect confidentiality via vectors related to CORBA.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to an incorrect check for code permissions by CORBA stub factories.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5893</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5893" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5893" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u45 and Java SE Embedded 7u45, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to improper handling of methods in MethodHandles in HotSpot JVM, which allows attackers to escape the sandbox.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5896</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5896" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5896" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect availability via vectors related to CORBA.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that com.sun.corba.se and its sub-packages are not included on the restricted package list.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5907</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5907" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5907" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; JRockit R27.7.7 and R28.2.9; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is due to incorrect input validation in LookupProcessor.cpp in the ICU Layout Engine, which allows attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted font file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5910</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-5910" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5910" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u65 and 7u45, Java SE Embedded 7u45, and OpenJDK 7 allows remote attackers to affect integrity via unknown vectors related to Security.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that CanonicalizerBase.java in the XML canonicalizer allows untrusted code to access mutable byte arrays.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6045</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6045" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6045" source="CVE"/>
    <description>
    Multiple heap-based buffer overflows in OpenJPEG 1.3 and earlier might allow remote attackers to execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137557" comment="libopenjpeg1-1.5.2-2.1.8 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6052</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6052" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6052" source="CVE"/>
    <description>
    OpenJPEG 1.3 and earlier allows remote attackers to obtain sensitive information via unspecified vectors that trigger a heap-based out-of-bounds read.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137557" comment="libopenjpeg1-1.5.2-2.1.8 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6053</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6053" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6053" source="CVE"/>
    <description>
    OpenJPEG 1.5.1 allows remote attackers to obtain sensitive information via unspecified vectors that trigger a heap-based out-of-bounds read.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137557" comment="libopenjpeg1-1.5.2-2.1.8 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6054</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6054" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6054" source="CVE"/>
    <description>
    Heap-based buffer overflow in OpenJPEG 1.3 has unspecified impact and remote vectors, a different vulnerability than CVE-2013-6045.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137557" comment="libopenjpeg1-1.5.2-2.1.8 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6336</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6336" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6336" source="CVE"/>
    <description>
    The ieee802154_map_rec function in epan/dissectors/packet-ieee802154.c in the IEEE 802.15.4 dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 uses an incorrect pointer chain, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6337</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6337" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6337" source="CVE"/>
    <description>
    Unspecified vulnerability in the NBAP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6338</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6338" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6338" source="CVE"/>
    <description>
    The dissect_sip_common function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6339</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6339" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6339" source="CVE"/>
    <description>
    The dissect_openwire_type function in epan/dissectors/packet-openwire.c in the OpenWire dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 allows remote attackers to cause a denial of service (loop) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6340</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6340" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6340" source="CVE"/>
    <description>
    epan/dissectors/packet-tcp.c in the TCP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 does not properly determine the amount of remaining data, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6369</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6369" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6369" source="CVE"/>
    <description>
    Stack-based buffer overflow in the jbg_dec_in function in libjbig/jbig.c in JBIG-KIT before 2.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted image file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137526" comment="libjbig2-2.1-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137527" comment="libjbig2-32bit-2.1-2.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6370</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6370" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6370" source="CVE"/>
    <description>
    Buffer overflow in the printbuf APIs in json-c before 0.12 allows remote attackers to cause a denial of service via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137528" comment="libjson-c2-0.12-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137529" comment="libjson-c2-32bit-0.12-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137865" comment="rsyslog-8.4.2-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6371</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6371" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6371" source="CVE"/>
    <description>
    The hash functionality in json-c before 0.12 allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted JSON data, involving collisions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137528" comment="libjson-c2-0.12-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137529" comment="libjson-c2-32bit-0.12-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137865" comment="rsyslog-8.4.2-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6393</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6393" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6393" source="CVE"/>
    <description>
    The yaml_parser_scan_tag_uri function in scanner.c in LibYAML before 0.1.5 performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted tags in a YAML document, which triggers a heap-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137794" comment="libyaml-0-2-0.1.6-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106165" comment="perl-YAML-LibYAML-0.59-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6399</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6399" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6399" source="CVE"/>
    <description>
    Array index error in the virtio_load function in hw/virtio/virtio.c in QEMU before 1.7.2 allows remote attackers to execute arbitrary code via a crafted savevm image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137408" comment="libcacard0-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137409" comment="qemu-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137410" comment="qemu-arm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137411" comment="qemu-block-curl-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137412" comment="qemu-extra-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137413" comment="qemu-ipxe-1.0.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137414" comment="qemu-ksm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137415" comment="qemu-kvm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137416" comment="qemu-lang-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137417" comment="qemu-ppc-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137418" comment="qemu-s390-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137419" comment="qemu-seabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137420" comment="qemu-sgabios-8-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137421" comment="qemu-tools-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137422" comment="qemu-vgabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137423" comment="qemu-x86-2.1.0-2.9 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6402</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6402" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6402" source="CVE"/>
    <description>
    base/pkit.py in HP Linux Imaging and Printing (HPLIP) through 3.13.11 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/hp-pkservice.log temporary file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137268" comment="hplip-3.14.6-2.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137269" comment="hplip-hpijs-3.14.6-2.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137270" comment="hplip-sane-3.14.6-2.2.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6420</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6420" source="CVE"/>
    <description>
    The asn1_time_to_time_t function in ext/openssl/openssl.c in PHP before 5.3.28, 5.4.x before 5.4.23, and 5.5.x before 5.5.7 does not properly parse (1) notBefore and (2) notAfter timestamps in X.509 certificates, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted certificate that is not properly handled by the openssl_x509_parse function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6424</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6424" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6424" source="CVE"/>
    <description>
    Integer underflow in the xTrapezoidValid macro in render/picture.h in X.Org allows context-dependent attackers to cause a denial of service (crash) via a negative bottom value.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137919" comment="xorg-x11-server-7.6_1.16.1-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137920" comment="xorg-x11-server-extra-7.6_1.16.1-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137921" comment="xorg-x11-server-sdk-7.6_1.16.1-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6427</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6427" source="CVE"/>
    <description>
    upgrade.py in the hp-upgrade service in HP Linux Imaging and Printing (HPLIP) 3.x through 3.13.11 launches a program from an http URL, which allows man-in-the-middle attackers to execute arbitrary code by gaining control over the client-server data stream.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137268" comment="hplip-3.14.6-2.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137269" comment="hplip-hpijs-3.14.6-2.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137270" comment="hplip-sane-3.14.6-2.2.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6435</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6435" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6435" source="CVE"/>
    <description>
    Race condition in RPM 4.11.1 and earlier allows remote attackers to execute arbitrary code via a crafted RPM file whose installation extracts the contents to temporary files before validating the signature, as demonstrated by installing a file in the /etc/cron.d directory.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009103233" comment="python3-rpm-4.11.3-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103236" comment="rpm-4.11.3-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103235" comment="rpm-32bit-4.11.3-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103237" comment="rpm-build-4.11.3-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103238" comment="rpm-devel-4.11.3-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103234" comment="rpm-python-4.11.3-4.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6436</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6436" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6436" source="CVE"/>
    <description>
    The lxcDomainGetMemoryParameters method in lxc/lxc_driver.c in libvirt 1.0.5 through 1.2.0 does not properly check the status of LXC guests when reading memory tunables, which allows local users to cause a denial of service (NULL pointer dereference and libvirtd crash) via a guest in the shutdown status, as demonstrated by the "virsh memtune" command.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137726" comment="libvirt-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137727" comment="libvirt-client-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137728" comment="libvirt-daemon-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137729" comment="libvirt-daemon-config-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137730" comment="libvirt-daemon-config-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137731" comment="libvirt-daemon-driver-interface-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137732" comment="libvirt-daemon-driver-libxl-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137733" comment="libvirt-daemon-driver-lxc-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137734" comment="libvirt-daemon-driver-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137735" comment="libvirt-daemon-driver-nodedev-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137736" comment="libvirt-daemon-driver-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137737" comment="libvirt-daemon-driver-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137738" comment="libvirt-daemon-driver-secret-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137739" comment="libvirt-daemon-driver-storage-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137740" comment="libvirt-daemon-driver-uml-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137741" comment="libvirt-daemon-driver-vbox-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137742" comment="libvirt-daemon-driver-xen-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137743" comment="libvirt-daemon-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137744" comment="libvirt-daemon-xen-1.2.9-1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6438</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6438" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6438" source="CVE"/>
    <description>
    The dav_xml_get_cdata function in main/util.c in the mod_dav module in the Apache HTTP Server before 2.4.8 does not properly remove whitespace characters from CDATA sections, which allows remote attackers to cause a denial of service (daemon crash) via a crafted DAV WRITE request.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136944" comment="apache2-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136945" comment="apache2-devel-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136946" comment="apache2-doc-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136947" comment="apache2-example-pages-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136948" comment="apache2-prefork-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136949" comment="apache2-utils-2.4.10-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6442</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6442" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6442" source="CVE"/>
    <description>
    The owner_set function in smbcacls.c in smbcacls in Samba 4.0.x before 4.0.16 and 4.1.x before 4.1.6 removes an ACL during use of a --chown or --chgrp option, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging an unintended administrative change.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137424" comment="libdcerpc-binding0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137425" comment="libdcerpc-binding0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137426" comment="libdcerpc0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137427" comment="libdcerpc0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137428" comment="libgensec0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137429" comment="libgensec0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137430" comment="libndr-krb5pac0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137431" comment="libndr-krb5pac0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137432" comment="libndr-nbt0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137433" comment="libndr-nbt0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137434" comment="libndr-standard0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137435" comment="libndr-standard0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137436" comment="libndr0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137437" comment="libndr0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137438" comment="libnetapi0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137439" comment="libnetapi0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137440" comment="libpdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137441" comment="libpdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137442" comment="libregistry0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137443" comment="libsamba-credentials0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137444" comment="libsamba-credentials0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137445" comment="libsamba-hostconfig0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137446" comment="libsamba-hostconfig0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137447" comment="libsamba-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137448" comment="libsamba-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137449" comment="libsamdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137450" comment="libsamdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137451" comment="libsmbclient-devel-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137452" comment="libsmbclient-raw0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137453" comment="libsmbclient-raw0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137454" comment="libsmbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137455" comment="libsmbconf0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137456" comment="libsmbconf0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137457" comment="libsmbldap0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137458" comment="libsmbldap0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137459" comment="libtevent-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137460" comment="libtevent-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137461" comment="libwbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137462" comment="libwbclient0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137463" comment="samba-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137464" comment="samba-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137465" comment="samba-client-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137466" comment="samba-client-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137467" comment="samba-doc-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137468" comment="samba-libs-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137469" comment="samba-libs-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137470" comment="samba-winbind-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137471" comment="samba-winbind-32bit-4.1.12-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6449</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6449" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6449" source="CVE"/>
    <description>
    The ssl_get_algorithm2 function in ssl/s3_lib.c in OpenSSL before 1.0.2 obtains a certain version number from an incorrect data structure, which allows remote attackers to cause a denial of service (daemon crash) via crafted traffic from a TLS 1.2 client.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6450</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6450" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6450" source="CVE"/>
    <description>
    The DTLS retransmission implementation in OpenSSL 1.0.0 before 1.0.0l and 1.0.1 before 1.0.1f does not properly maintain data structures for digest and encryption contexts, which might allow man-in-the-middle attackers to trigger the use of a different context and cause a denial of service (application crash) by interfering with packet delivery, related to ssl/d1_both.c and ssl/t1_enc.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6456</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6456" source="CVE"/>
    <description>
    The LXC driver (lxc/lxc_driver.c) in libvirt 1.0.1 through 1.2.1 allows local users to (1) delete arbitrary host devices via the virDomainDeviceDettach API and a symlink attack on /dev in the container; (2) create arbitrary nodes (mknod) via the virDomainDeviceAttach API and a symlink attack on /dev in the container; and cause a denial of service (shutdown or reboot host OS) via the (3) virDomainShutdown or (4) virDomainReboot API and a symlink attack on /dev/initctl in the container, related to "paths under /proc/$PID/root" and the virInitctlSetRunLevel function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137726" comment="libvirt-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137727" comment="libvirt-client-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137728" comment="libvirt-daemon-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137729" comment="libvirt-daemon-config-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137730" comment="libvirt-daemon-config-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137731" comment="libvirt-daemon-driver-interface-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137732" comment="libvirt-daemon-driver-libxl-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137733" comment="libvirt-daemon-driver-lxc-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137734" comment="libvirt-daemon-driver-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137735" comment="libvirt-daemon-driver-nodedev-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137736" comment="libvirt-daemon-driver-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137737" comment="libvirt-daemon-driver-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137738" comment="libvirt-daemon-driver-secret-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137739" comment="libvirt-daemon-driver-storage-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137740" comment="libvirt-daemon-driver-uml-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137741" comment="libvirt-daemon-driver-vbox-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137742" comment="libvirt-daemon-driver-xen-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137743" comment="libvirt-daemon-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137744" comment="libvirt-daemon-xen-1.2.9-1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6457</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6457" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6457" source="CVE"/>
    <description>
    The libxlDomainGetNumaParameters function in the libxl driver (libxl/libxl_driver.c) in libvirt before 1.2.1 does not properly initialize the nodemap, which allows local users to cause a denial of service (invalid free operation and crash) or possibly execute arbitrary code via an inactive domain to the virsh numatune command.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137726" comment="libvirt-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137727" comment="libvirt-client-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137728" comment="libvirt-daemon-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137729" comment="libvirt-daemon-config-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137730" comment="libvirt-daemon-config-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137731" comment="libvirt-daemon-driver-interface-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137732" comment="libvirt-daemon-driver-libxl-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137733" comment="libvirt-daemon-driver-lxc-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137734" comment="libvirt-daemon-driver-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137735" comment="libvirt-daemon-driver-nodedev-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137736" comment="libvirt-daemon-driver-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137737" comment="libvirt-daemon-driver-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137738" comment="libvirt-daemon-driver-secret-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137739" comment="libvirt-daemon-driver-storage-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137740" comment="libvirt-daemon-driver-uml-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137741" comment="libvirt-daemon-driver-vbox-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137742" comment="libvirt-daemon-driver-xen-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137743" comment="libvirt-daemon-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137744" comment="libvirt-daemon-xen-1.2.9-1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6458</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6458" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6458" source="CVE"/>
    <description>
    Multiple race conditions in the (1) virDomainBlockStats, (2) virDomainGetBlockInf, (3) qemuDomainBlockJobImpl, and (4) virDomainGetBlockIoTune functions in libvirt before 1.2.1 do not properly verify that the disk is attached, which allows remote read-only attackers to cause a denial of service (libvirtd crash) via the virDomainDetachDeviceFlags command.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137726" comment="libvirt-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137727" comment="libvirt-client-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137728" comment="libvirt-daemon-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137729" comment="libvirt-daemon-config-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137730" comment="libvirt-daemon-config-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137731" comment="libvirt-daemon-driver-interface-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137732" comment="libvirt-daemon-driver-libxl-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137733" comment="libvirt-daemon-driver-lxc-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137734" comment="libvirt-daemon-driver-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137735" comment="libvirt-daemon-driver-nodedev-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137736" comment="libvirt-daemon-driver-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137737" comment="libvirt-daemon-driver-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137738" comment="libvirt-daemon-driver-secret-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137739" comment="libvirt-daemon-driver-storage-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137740" comment="libvirt-daemon-driver-uml-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137741" comment="libvirt-daemon-driver-vbox-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137742" comment="libvirt-daemon-driver-xen-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137743" comment="libvirt-daemon-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137744" comment="libvirt-daemon-xen-1.2.9-1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6462</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6462" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6462" source="CVE"/>
    <description>
    Stack-based buffer overflow in the bdfReadCharacters function in bitmap/bdfread.c in X.Org libXfont 1.1 through 1.4.6 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string in a character name in a BDF font file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137361" comment="libXfont-devel-1.5.0-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137362" comment="libXfont1-1.5.0-2.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6473</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6473" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6473" source="CVE"/>
    <description>
    Multiple heap-based buffer overflows in the urftopdf filter in cups-filters 1.0.25 before 1.0.47 allow remote attackers to execute arbitrary code via a large (1) page or (2) line in a URF file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137103" comment="cups-filters-foomatic-rip-1.0.58-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137104" comment="cups-filters-ghostscript-1.0.58-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6474</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6474" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6474" source="CVE"/>
    <description>
    Heap-based buffer overflow in the pdftoopvp filter in CUPS and cups-filters before 1.0.47 allows remote attackers to execute arbitrary code via a crafted PDF file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137103" comment="cups-filters-foomatic-rip-1.0.58-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137104" comment="cups-filters-ghostscript-1.0.58-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6475</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6475" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6475" source="CVE"/>
    <description>
    Multiple integer overflows in (1) OPVPOutputDev.cxx and (2) oprs/OPVPSplash.cxx in the pdftoopvp filter in CUPS and cups-filters before 1.0.47 allow remote attackers to execute arbitrary code via a crafted PDF file, which triggers a heap-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137103" comment="cups-filters-foomatic-rip-1.0.58-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137104" comment="cups-filters-ghostscript-1.0.58-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6476</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6476" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6476" source="CVE"/>
    <description>
    The OPVPWrapper::loadDriver function in oprs/OPVPWrapper.cxx in the pdftoopvp filter in CUPS and cups-filters before 1.0.47 allows local users to gain privileges via a Trojan horse driver in the same directory as the PDF file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137103" comment="cups-filters-foomatic-rip-1.0.58-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137104" comment="cups-filters-ghostscript-1.0.58-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6477</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6477" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6477" source="CVE"/>
    <description>
    Multiple integer signedness errors in libpurple in Pidgin before 2.10.8 allow remote attackers to cause a denial of service (application crash) via a crafted timestamp value in an XMPP message.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137605" comment="libpurple-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137606" comment="libpurple-meanwhile-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137607" comment="libpurple-tcl-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137608" comment="pidgin-2.10.9-5.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6478</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6478" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6478" source="CVE"/>
    <description>
    gtkimhtml.c in Pidgin before 2.10.8 does not properly interact with underlying library support for wide Pango layouts, which allows user-assisted remote attackers to cause a denial of service (application crash) via a long URL that is examined with a tooltip.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137605" comment="libpurple-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137606" comment="libpurple-meanwhile-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137607" comment="libpurple-tcl-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137608" comment="pidgin-2.10.9-5.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6479</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6479" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6479" source="CVE"/>
    <description>
    util.c in libpurple in Pidgin before 2.10.8 does not properly allocate memory for HTTP responses that are inconsistent with the Content-Length header, which allows remote HTTP servers to cause a denial of service (application crash) via a crafted response.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137605" comment="libpurple-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137606" comment="libpurple-meanwhile-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137607" comment="libpurple-tcl-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137608" comment="pidgin-2.10.9-5.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6481</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6481" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6481" source="CVE"/>
    <description>
    libpurple/protocols/yahoo/libymsg.c in Pidgin before 2.10.8 allows remote attackers to cause a denial of service (crash) via a Yahoo! P2P message with a crafted length field, which triggers a buffer over-read.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137605" comment="libpurple-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137606" comment="libpurple-meanwhile-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137607" comment="libpurple-tcl-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137608" comment="pidgin-2.10.9-5.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6482</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6482" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6482" source="CVE"/>
    <description>
    Pidgin before 2.10.8 allows remote MSN servers to cause a denial of service (NULL pointer dereference and crash) via a crafted (1) SOAP response, (2) OIM XML response, or (3) Content-Length header.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137605" comment="libpurple-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137606" comment="libpurple-meanwhile-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137607" comment="libpurple-tcl-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137608" comment="pidgin-2.10.9-5.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6483</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6483" source="CVE"/>
    <description>
    The XMPP protocol plugin in libpurple in Pidgin before 2.10.8 does not properly determine whether the from address in an iq reply is consistent with the to address in an iq request, which allows remote attackers to spoof iq traffic or cause a denial of service (NULL pointer dereference and application crash) via a crafted reply.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137605" comment="libpurple-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137606" comment="libpurple-meanwhile-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137607" comment="libpurple-tcl-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137608" comment="pidgin-2.10.9-5.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6484</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6484" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6484" source="CVE"/>
    <description>
    The STUN protocol implementation in libpurple in Pidgin before 2.10.8 allows remote STUN servers to cause a denial of service (out-of-bounds write operation and application crash) by triggering a socket read error.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137605" comment="libpurple-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137606" comment="libpurple-meanwhile-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137607" comment="libpurple-tcl-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137608" comment="pidgin-2.10.9-5.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6485</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6485" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6485" source="CVE"/>
    <description>
    Buffer overflow in util.c in libpurple in Pidgin before 2.10.8 allows remote HTTP servers to cause a denial of service (application crash) or possibly have unspecified other impact via an invalid chunk-size field in chunked transfer-coding data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137605" comment="libpurple-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137606" comment="libpurple-meanwhile-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137607" comment="libpurple-tcl-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137608" comment="pidgin-2.10.9-5.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6486</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6486" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6486" source="CVE"/>
    <description>
    gtkutils.c in Pidgin before 2.10.8 on Windows allows user-assisted remote attackers to execute arbitrary programs via a message containing a file: URL that is improperly handled during construction of an explorer.exe command.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3185.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137605" comment="libpurple-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137606" comment="libpurple-meanwhile-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137607" comment="libpurple-tcl-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137608" comment="pidgin-2.10.9-5.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6487</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6487" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6487" source="CVE"/>
    <description>
    Integer overflow in libpurple/protocols/gg/lib/http.c in the Gadu-Gadu (gg) parser in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a large Content-Length value, which triggers a buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137492" comment="libgadu-devel-1.12.0-2.1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137493" comment="libgadu3-1.12.0-2.1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137605" comment="libpurple-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137606" comment="libpurple-meanwhile-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137607" comment="libpurple-tcl-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137608" comment="pidgin-2.10.9-5.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6497</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6497" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6497" source="CVE"/>
    <description>
    clamscan in ClamAV before 0.98.5, when using -a option, allows remote attackers to cause a denial of service (crash) as demonstrated by the jwplayer.js file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102498" comment="clamav-0.98.5-2.5.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6629</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6629" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6629" source="CVE"/>
    <description>
    The get_sos function in jdmarker.c in (1) libjpeg 6b and (2) libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48, Ghostscript, and other products, does not check for certain duplications of component data during the reading of segments that follow Start Of Scan (SOS) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6630</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6630" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6630" source="CVE"/>
    <description>
    The get_dht function in jdmarker.c in libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48 and other products, does not set all elements of a certain Huffman value array during the reading of segments that follow Define Huffman Table (DHT) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6671</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6671" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6671" source="CVE"/>
    <description>
    The nsGfxScrollFrameInner::IsLTR function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code via crafted use of JavaScript code for ordered list elements.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6672</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6672" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6672" source="CVE"/>
    <description>
    Mozilla Firefox before 26.0 and SeaMonkey before 2.23 on Linux allow user-assisted remote attackers to read clipboard data by leveraging certain middle-click paste operations.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6673</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6673" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6673" source="CVE"/>
    <description>
    Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 do not recognize a user's removal of trust from an EV X.509 certificate, which makes it easier for man-in-the-middle attackers to spoof SSL servers in opportunistic circumstances via a valid certificate that is unacceptable to the user.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6712</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6712" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6712" source="CVE"/>
    <description>
    The scan function in ext/date/lib/parse_iso_intervals.c in PHP through 5.5.6 does not properly restrict creation of DateInterval objects, which might allow remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted interval specification.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6887</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6887" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6887" source="CVE"/>
    <description>
    OpenJPEG 1.5.1 allows remote attackers to cause a denial of service via unspecified vectors that trigger NULL pointer dereferences, division-by-zero, and other errors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137557" comment="libopenjpeg1-1.5.2-2.1.8 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6954</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-6954" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6954" source="CVE"/>
    <description>
    The png_do_expand_palette function in libpng before 1.6.8 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via (1) a PLTE chunk of zero bytes or (2) a NULL palette, related to pngrtran.c and pngset.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137574" comment="libpng16-16-1.6.13-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137575" comment="libpng16-16-32bit-1.6.13-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137576" comment="libpng16-devel-1.6.13-2.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7073</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-7073" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7073" source="CVE"/>
    <description>
    The Content Editing Wizards component in TYPO3 4.5.0 through 4.5.31, 4.7.0 through 4.7.16, 6.0.0 through 6.0.11, and 6.1.0 through 6.1.6 does not check permissions, which allows remote authenticated editors to read arbitrary TYPO3 table columns via unspecified parameters.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134120" comment="typo3-cms-4_5-4.5.40-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134119" comment="typo3-cms-4_7-4.7.20-2.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7098</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-7098" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7098" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137812" comment="openconnect-6.00-3.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137813" comment="openconnect-devel-6.00-3.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7112</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-7112" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7112" source="CVE"/>
    <description>
    The dissect_sip_common function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.8.x before 1.8.12 and 1.10.x before 1.10.4 does not check for empty lines, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7113</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-7113" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7113" source="CVE"/>
    <description>
    epan/dissectors/packet-bssgp.c in the BSSGP dissector in Wireshark 1.10.x before 1.10.4 incorrectly relies on a global variable, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7114</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-7114" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7114" source="CVE"/>
    <description>
    Multiple buffer overflows in the create_ntlmssp_v2_key function in epan/dissectors/packet-ntlmssp.c in the NTLMSSP v2 dissector in Wireshark 1.8.x before 1.8.12 and 1.10.x before 1.10.4 allow remote attackers to cause a denial of service (application crash) via a long domain name in a packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7327</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-7327" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7327" source="CVE"/>
    <description>
    The gdImageCrop function in ext/gd/gd.c in PHP 5.5.x before 5.5.9 does not check return values, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via invalid imagecrop arguments that lead to use of a NULL pointer as a return value, a different vulnerability than CVE-2013-7226.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7345</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-7345" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7345" source="CVE"/>
    <description>
    The BEGIN regular expression in the awk script detector in magic/Magdir/commands in file before 5.15 uses multiple wildcards with unlimited repetitions, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted ASCII file that triggers a large amount of backtracking, as demonstrated via a file with many newline characters.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7353</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-7353" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7353" source="CVE"/>
    <description>
    Integer overflow in the png_set_unknown_chunks function in libpng/pngset.c in libpng before 1.5.14beta08 allows context-dependent attackers to cause a denial of service (segmentation fault and crash) via a crafted image, which triggers a heap-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137570" comment="libpng12-0-1.2.51-3.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137571" comment="libpng12-0-32bit-1.2.51-3.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137572" comment="libpng12-compat-devel-1.2.51-3.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137573" comment="libpng12-devel-1.2.51-3.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7354</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-7354" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7354" source="CVE"/>
    <description>
    Multiple integer overflows in libpng before 1.5.14rc03 allow remote attackers to cause a denial of service (crash) via a crafted image to the (1) png_set_sPLT or (2) png_set_text_2 function, which triggers a heap-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137570" comment="libpng12-0-1.2.51-3.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137571" comment="libpng12-0-32bit-1.2.51-3.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137572" comment="libpng12-compat-devel-1.2.51-3.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137573" comment="libpng12-devel-1.2.51-3.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7423</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-7423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7423" source="CVE"/>
    <description>
    The send_dg function in resolv/res_send.c in GNU C Library (aka glibc or libc6) before 2.20 does not properly reuse file descriptors, which allows remote attackers to send DNS queries to unintended locations via a large number of requests that trigger a call to the getaddrinfo function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009106726" comment="glibc-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106727" comment="glibc-32bit-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106728" comment="glibc-devel-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106729" comment="glibc-devel-32bit-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106730" comment="glibc-devel-static-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106731" comment="glibc-devel-static-32bit-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106736" comment="glibc-extra-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106737" comment="glibc-html-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106738" comment="glibc-i18ndata-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106739" comment="glibc-info-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106732" comment="glibc-locale-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106733" comment="glibc-locale-32bit-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106740" comment="glibc-obsolete-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106734" comment="glibc-profile-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106735" comment="glibc-profile-32bit-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106723" comment="glibc-testsuite-2.19-16.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106724" comment="glibc-utils-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106725" comment="glibc-utils-32bit-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106741" comment="nscd-2.19-16.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7437</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-7437" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7437" source="CVE"/>
    <description>
    Multiple integer overflows in potrace 1.11 allow remote attackers to cause a denial of service (crash) via large dimensions in a BMP image, which triggers a buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115550" comment="libpotrace0-1.13-4.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115551" comment="potrace-1.13-4.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115552" comment="potrace-devel-1.13-4.7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7441</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-7441" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7441" source="CVE"/>
    <description>
    The modern style negotiation in Network Block Device (nbd-server) 2.9.22 through 3.3 allows remote attackers to cause a denial of service (root process termination) by (1) closing the connection during negotiation or (2) specifying a name for a non-existent export.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110102" comment="nbd-3.3-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110103" comment="nbd-doc-3.3-4.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7446</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-7446" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7446" source="CVE"/>
    <description>
    Use-after-free vulnerability in net/unix/af_unix.c in the Linux kernel before 4.3.3 allows local users to bypass intended AF_UNIX socket permissions or cause a denial of service (panic) via crafted epoll_ctl calls.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7447</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-7447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7447" source="CVE"/>
    <description>
    Integer overflow in the gdk_cairo_set_source_pixbuf function in gdk/gdkcairo.c in GTK+ before 3.9.8, as used in eom, gnome-photos, eog, gambas3, thunar, pinpoint, and possibly other applications, allows remote attackers to cause a denial of service (crash) via a large image file, which triggers a large memory allocation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124420" comment="eog-3.14.5-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124421" comment="eog-devel-3.14.5-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124422" comment="eog-lang-3.14.5-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133528" comment="gtk2-2.24.31-4.17.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133529" comment="gtk2-branding-SLED-13.2-14.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133530" comment="gtk2-branding-openSUSE-13.2-14.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133531" comment="gtk2-branding-upstream-2.24.31-4.17.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133532" comment="gtk2-data-2.24.31-4.17.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133533" comment="gtk2-devel-2.24.31-4.17.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133534" comment="gtk2-devel-32bit-2.24.31-4.17.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133535" comment="gtk2-engine-clearlooks-2.20.2-18.14.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133536" comment="gtk2-engine-clearlooks-32bit-2.20.2-18.14.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133537" comment="gtk2-engine-crux-2.20.2-18.14.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133538" comment="gtk2-engine-crux-32bit-2.20.2-18.14.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133539" comment="gtk2-engine-glide-2.20.2-18.14.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133540" comment="gtk2-engine-glide-32bit-2.20.2-18.14.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133541" comment="gtk2-engine-hcengine-2.20.2-18.14.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133542" comment="gtk2-engine-industrial-2.20.2-18.14.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133543" comment="gtk2-engine-industrial-32bit-2.20.2-18.14.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133544" comment="gtk2-engine-mist-2.20.2-18.14.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133545" comment="gtk2-engine-mist-32bit-2.20.2-18.14.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133546" comment="gtk2-engine-redmond95-2.20.2-18.14.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133547" comment="gtk2-engine-redmond95-32bit-2.20.2-18.14.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133548" comment="gtk2-engine-thinice-2.20.2-18.14.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133549" comment="gtk2-engine-thinice-32bit-2.20.2-18.14.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133550" comment="gtk2-engines-2.20.2-18.14.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133551" comment="gtk2-engines-devel-2.20.2-18.14.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133552" comment="gtk2-immodule-amharic-2.24.31-4.17.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133553" comment="gtk2-immodule-amharic-32bit-2.24.31-4.17.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133554" comment="gtk2-immodule-inuktitut-2.24.31-4.17.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133555" comment="gtk2-immodule-inuktitut-32bit-2.24.31-4.17.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133556" comment="gtk2-immodule-multipress-2.24.31-4.17.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133557" comment="gtk2-immodule-multipress-32bit-2.24.31-4.17.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133558" comment="gtk2-immodule-thai-2.24.31-4.17.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133559" comment="gtk2-immodule-thai-32bit-2.24.31-4.17.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133560" comment="gtk2-immodule-vietnamese-2.24.31-4.17.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133561" comment="gtk2-immodule-vietnamese-32bit-2.24.31-4.17.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133562" comment="gtk2-immodule-xim-2.24.31-4.17.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133563" comment="gtk2-immodule-xim-32bit-2.24.31-4.17.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133564" comment="gtk2-immodules-tigrigna-2.24.31-4.17.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133565" comment="gtk2-immodules-tigrigna-32bit-2.24.31-4.17.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133566" comment="gtk2-lang-2.24.31-4.17.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133567" comment="gtk2-theme-clearlooks-2.20.2-18.14.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133568" comment="gtk2-theme-crux-2.20.2-18.14.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133569" comment="gtk2-theme-industrial-2.20.2-18.14.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133570" comment="gtk2-theme-mist-2.20.2-18.14.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133571" comment="gtk2-theme-redmond95-2.20.2-18.14.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133572" comment="gtk2-theme-thinice-2.20.2-18.14.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133573" comment="gtk2-tools-2.24.31-4.17.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133574" comment="gtk2-tools-32bit-2.24.31-4.17.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133575" comment="libgtk-2_0-0-2.24.31-4.17.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133576" comment="libgtk-2_0-0-32bit-2.24.31-4.17.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133577" comment="typelib-1_0-Gtk-2_0-2.24.31-4.17.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7456</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-7456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7456" source="CVE"/>
    <description>
    gd_interpolation.c in the GD Graphics Library (aka libgd) before 2.1.1, as used in PHP before 5.5.36, 5.6.x before 5.6.22, and 7.x before 7.0.7, allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted image that is mishandled by the imagescale function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128692" comment="apache2-mod_php5-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128693" comment="php5-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128694" comment="php5-bcmath-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128695" comment="php5-bz2-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128696" comment="php5-calendar-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128697" comment="php5-ctype-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128698" comment="php5-curl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128699" comment="php5-dba-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128700" comment="php5-devel-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128701" comment="php5-dom-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128702" comment="php5-enchant-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128703" comment="php5-exif-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128704" comment="php5-fastcgi-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128705" comment="php5-fileinfo-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128706" comment="php5-firebird-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128707" comment="php5-fpm-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128708" comment="php5-ftp-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128709" comment="php5-gd-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128710" comment="php5-gettext-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128711" comment="php5-gmp-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128712" comment="php5-iconv-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128713" comment="php5-imap-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128714" comment="php5-intl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128715" comment="php5-json-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128716" comment="php5-ldap-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128717" comment="php5-mbstring-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128718" comment="php5-mcrypt-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128719" comment="php5-mssql-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128720" comment="php5-mysql-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128721" comment="php5-odbc-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128722" comment="php5-opcache-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128723" comment="php5-openssl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128724" comment="php5-pcntl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128725" comment="php5-pdo-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128726" comment="php5-pear-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128727" comment="php5-pgsql-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128728" comment="php5-phar-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128729" comment="php5-posix-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128730" comment="php5-pspell-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128731" comment="php5-readline-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128732" comment="php5-shmop-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128733" comment="php5-snmp-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128734" comment="php5-soap-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128735" comment="php5-sockets-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128736" comment="php5-sqlite-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128737" comment="php5-suhosin-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128738" comment="php5-sysvmsg-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128739" comment="php5-sysvsem-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128740" comment="php5-sysvshm-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128741" comment="php5-tidy-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128742" comment="php5-tokenizer-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128743" comment="php5-wddx-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128744" comment="php5-xmlreader-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128745" comment="php5-xmlrpc-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128746" comment="php5-xmlwriter-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128747" comment="php5-xsl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128748" comment="php5-zip-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128749" comment="php5-zlib-5.6.1-66.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7458</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-7458" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7458" source="CVE"/>
    <description>
    linenoise, as used in Redis before 3.2.3, uses world-readable permissions for .rediscli_history, which allows local users to obtain sensitive information by reading the file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130877" comment="redis-2.8.22-2.12.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7459</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2013-7459" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7459" source="CVE"/>
    <description>
    Heap-based buffer overflow in the ALGnew function in block_templace.c in Python Cryptography Toolkit (aka pycrypto) allows remote attackers to execute arbitrary code as demonstrated by a crafted iv parameter to cryptmsg.py.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147094" comment="python-pycrypto-2.6.1-3.3.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0004</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0004" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0004" source="CVE"/>
    <description>
    Stack-based buffer overflow in udisks before 1.0.5 and 2.x before 2.1.3 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long mount point.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137723" comment="libudisks2-0-2.1.3-2.1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137724" comment="udisks2-2.1.3-2.1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0011</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0011" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0011" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137891" comment="tigervnc-1.3.1-6.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137892" comment="xorg-x11-Xvnc-1.3.1-6.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0012</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0012" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0012" source="CVE"/>
    <description>
    FileSystemBytecodeCache in Jinja2 2.7.2 does not properly create temporary directories, which allows local users to gain privileges by pre-creating a temporary directory with a user's uid.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-1402.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133712" comment="python-Jinja2-2.8-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133713" comment="python-Jinja2-emacs-2.8-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133714" comment="python-Jinja2-vim-2.8-3.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0015</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0015" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0015" source="CVE"/>
    <description>
    cURL and libcurl 7.10.6 through 7.34.0, when more than one authentication method is enabled, re-uses NTLM connections, which might allow context-dependent attackers to authenticate as other users via a request.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137106" comment="curl-7.38.0-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137107" comment="libcurl-devel-7.38.0-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137108" comment="libcurl4-7.38.0-1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0017</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0017" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0017" source="CVE"/>
    <description>
    The RAND_bytes function in libssh before 0.6.3, when forking is enabled, does not properly reset the state of the OpenSSL pseudo-random number generator (PRNG), which causes the state to be shared between children processes and allows local users to obtain sensitive information by leveraging a pid collision.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137700" comment="libssh-devel-0.6.3-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137701" comment="libssh4-0.6.3-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0019</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0019" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0019" source="CVE"/>
    <description>
    Stack-based buffer overflow in socat 1.3.0.0 through 1.7.2.2 and 2.0.0-b1 through 2.0.0-b6 allows local users to cause a denial of service (segmentation fault) via a long server name in the PROXY-CONNECT address in the command line.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137874" comment="socat-1.7.2.4-2.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0020</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0020" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0020" source="CVE"/>
    <description>
    The IRC protocol plugin in libpurple in Pidgin before 2.10.8 does not validate argument counts, which allows remote IRC servers to cause a denial of service (application crash) via a crafted message.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137605" comment="libpurple-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137606" comment="libpurple-meanwhile-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137607" comment="libpurple-tcl-2.10.9-5.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137608" comment="pidgin-2.10.9-5.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0028</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0028" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0028" source="CVE"/>
    <description>
    libvirt 1.1.1 through 1.2.0 allows context-dependent attackers to bypass the domain:getattr and connect:search_domains restrictions in ACLs and obtain sensitive domain object information via a request to the (1) virConnectDomainEventRegister and (2) virConnectDomainEventRegisterAny functions in the event registration API.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137726" comment="libvirt-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137727" comment="libvirt-client-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137728" comment="libvirt-daemon-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137729" comment="libvirt-daemon-config-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137730" comment="libvirt-daemon-config-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137731" comment="libvirt-daemon-driver-interface-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137732" comment="libvirt-daemon-driver-libxl-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137733" comment="libvirt-daemon-driver-lxc-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137734" comment="libvirt-daemon-driver-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137735" comment="libvirt-daemon-driver-nodedev-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137736" comment="libvirt-daemon-driver-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137737" comment="libvirt-daemon-driver-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137738" comment="libvirt-daemon-driver-secret-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137739" comment="libvirt-daemon-driver-storage-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137740" comment="libvirt-daemon-driver-uml-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137741" comment="libvirt-daemon-driver-vbox-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137742" comment="libvirt-daemon-driver-xen-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137743" comment="libvirt-daemon-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137744" comment="libvirt-daemon-xen-1.2.9-1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0032</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0032" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0032" source="CVE"/>
    <description>
    The get_resource function in repos.c in the mod_dav_svn module in Apache Subversion before 1.7.15 and 1.8.x before 1.8.6, when SVNListParentPath is enabled, allows remote attackers to cause a denial of service (crash) via vectors related to the server root and request methods other than GET, as demonstrated by the "svn ls http://svn.example.com" command.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137877" comment="subversion-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137878" comment="subversion-devel-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137879" comment="subversion-perl-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137880" comment="subversion-python-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137881" comment="subversion-server-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137882" comment="subversion-tools-1.8.10-2.4.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0038</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0038" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0038" source="CVE"/>
    <description>
    The compat_sys_recvmmsg function in net/compat.c in the Linux kernel before 3.13.2, when CONFIG_X86_X32 is enabled, allows local users to gain privileges via a recvmmsg system call with a crafted timeout pointer parameter.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137315" comment="kernel-default-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137316" comment="kernel-default-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137317" comment="kernel-desktop-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137318" comment="kernel-desktop-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137319" comment="kernel-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137320" comment="kernel-docs-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137321" comment="kernel-macros-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137322" comment="kernel-pae-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137323" comment="kernel-pae-base-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137324" comment="kernel-pae-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137325" comment="kernel-source-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137326" comment="kernel-syms-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137327" comment="kernel-xen-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137328" comment="kernel-xen-devel-3.16.6-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0050</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0050" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0050" source="CVE"/>
    <description>
    MultipartStream.java in Apache Commons FileUpload before 1.3.1, as used in Apache Tomcat, JBoss Web, and other products, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted Content-Type header that bypasses a loop's intended exit conditions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137280" comment="jakarta-commons-fileupload-1.1.1-124.1.11 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0060</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0060" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0060" source="CVE"/>
    <description>
    PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 does not properly enforce the ADMIN OPTION restriction, which allows remote authenticated members of a role to add or remove arbitrary users to that role by calling the SET ROLE command before the associated GRANT command.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137474" comment="libecpg6-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137475" comment="libpq5-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137476" comment="libpq5-32bit-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137477" comment="postgresql93-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137478" comment="postgresql93-contrib-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137479" comment="postgresql93-devel-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137480" comment="postgresql93-docs-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137481" comment="postgresql93-server-9.3.5-2.1.14 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0061</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0061" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0061" source="CVE"/>
    <description>
    The validator functions for the procedural languages (PLs) in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to gain privileges via a function that is (1) defined in another language or (2) not allowed to be directly called by the user due to permissions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137474" comment="libecpg6-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137475" comment="libpq5-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137476" comment="libpq5-32bit-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137477" comment="postgresql93-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137478" comment="postgresql93-contrib-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137479" comment="postgresql93-devel-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137480" comment="postgresql93-docs-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137481" comment="postgresql93-server-9.3.5-2.1.14 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0062</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0062" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0062" source="CVE"/>
    <description>
    Race condition in the (1) CREATE INDEX and (2) unspecified ALTER TABLE commands in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allows remote authenticated users to create an unauthorized index or read portions of unauthorized tables by creating or deleting a table with the same name during the timing window.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137474" comment="libecpg6-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137475" comment="libpq5-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137476" comment="libpq5-32bit-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137477" comment="postgresql93-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137478" comment="postgresql93-contrib-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137479" comment="postgresql93-devel-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137480" comment="postgresql93-docs-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137481" comment="postgresql93-server-9.3.5-2.1.14 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0063</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0063" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via vectors related to an incorrect MAXDATELEN constant and datetime values involving (1) intervals, (2) timestamps, or (3) timezones, a different vulnerability than CVE-2014-0065.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137474" comment="libecpg6-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137475" comment="libpq5-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137476" comment="libpq5-32bit-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137477" comment="postgresql93-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137478" comment="postgresql93-contrib-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137479" comment="postgresql93-devel-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137480" comment="postgresql93-docs-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137481" comment="postgresql93-server-9.3.5-2.1.14 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0064</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0064" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0064" source="CVE"/>
    <description>
    Multiple integer overflows in the path_in and other unspecified functions in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to have unspecified impact and attack vectors, which trigger a buffer overflow.  NOTE: this identifier has been SPLIT due to different affected versions; use CVE-2014-2669 for the hstore vector.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137474" comment="libecpg6-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137475" comment="libpq5-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137476" comment="libpq5-32bit-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137477" comment="postgresql93-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137478" comment="postgresql93-contrib-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137479" comment="postgresql93-devel-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137480" comment="postgresql93-docs-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137481" comment="postgresql93-server-9.3.5-2.1.14 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0065</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0065" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0065" source="CVE"/>
    <description>
    Multiple buffer overflows in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to have unspecified impact and attack vectors, a different vulnerability than CVE-2014-0063.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137474" comment="libecpg6-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137475" comment="libpq5-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137476" comment="libpq5-32bit-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137477" comment="postgresql93-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137478" comment="postgresql93-contrib-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137479" comment="postgresql93-devel-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137480" comment="postgresql93-docs-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137481" comment="postgresql93-server-9.3.5-2.1.14 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0066</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0066" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0066" source="CVE"/>
    <description>
    The chkpass extension in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 does not properly check the return value of the crypt library function, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137474" comment="libecpg6-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137475" comment="libpq5-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137476" comment="libpq5-32bit-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137477" comment="postgresql93-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137478" comment="postgresql93-contrib-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137479" comment="postgresql93-devel-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137480" comment="postgresql93-docs-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137481" comment="postgresql93-server-9.3.5-2.1.14 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0067</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0067" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0067" source="CVE"/>
    <description>
    The "make check" command for the test suites in PostgreSQL 9.3.3 and earlier does not properly invoke initdb to specify the authentication requirements for a database cluster to be used for the tests, which allows local users to gain privileges by leveraging access to this cluster.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137474" comment="libecpg6-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137475" comment="libpq5-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137476" comment="libpq5-32bit-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137477" comment="postgresql93-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137478" comment="postgresql93-contrib-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137479" comment="postgresql93-devel-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137480" comment="postgresql93-docs-9.3.5-2.1.14 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137481" comment="postgresql93-server-9.3.5-2.1.14 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201400691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-00691</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-00691" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-00691" source="CVE"/>
    <description>
    Unknown.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137315" comment="kernel-default-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137316" comment="kernel-default-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137317" comment="kernel-desktop-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137318" comment="kernel-desktop-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137319" comment="kernel-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137320" comment="kernel-docs-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137321" comment="kernel-macros-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137322" comment="kernel-pae-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137323" comment="kernel-pae-base-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137324" comment="kernel-pae-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137325" comment="kernel-source-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137326" comment="kernel-syms-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137327" comment="kernel-xen-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137328" comment="kernel-xen-devel-3.16.6-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0076</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0076" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0076" source="CVE"/>
    <description>
    The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124418" comment="libopenssl0_9_8-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124419" comment="libopenssl0_9_8-32bit-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0092</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0092" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0092" source="CVE"/>
    <description>
    lib/x509/verify.c in GnuTLS before 3.1.22 and 3.2.x before 3.2.12 does not properly handle unspecified errors when verifying X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137248" comment="gnutls-3.2.18-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137249" comment="libgnutls-devel-3.2.18-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137250" comment="libgnutls-openssl27-3.2.18-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137251" comment="libgnutls28-3.2.18-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137252" comment="libgnutls28-32bit-3.2.18-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0098</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0098" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0098" source="CVE"/>
    <description>
    The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server before 2.4.8 allows remote attackers to cause a denial of service (segmentation fault and daemon crash) via a crafted cookie that is not properly handled during truncation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136944" comment="apache2-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136945" comment="apache2-devel-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136946" comment="apache2-doc-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136947" comment="apache2-example-pages-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136948" comment="apache2-prefork-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136949" comment="apache2-utils-2.4.10-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0107</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0107" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0107" source="CVE"/>
    <description>
    The TransformerFactory in Apache Xalan-Java before 2.7.2 does not properly restrict access to certain properties when FEATURE_SECURE_PROCESSING is enabled, which allows remote attackers to bypass expected restrictions and load arbitrary classes or access external resources via a crafted (1) xalan:content-header, (2) xalan:entities, (3) xslt:content-header, or (4) xslt:entities property, or a Java property that is bound to the XSLT 1.0 system-property function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137904" comment="xalan-j2-2.7.2-3.1.10 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0117</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0117" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0117" source="CVE"/>
    <description>
    The mod_proxy module in the Apache HTTP Server 2.4.x before 2.4.10, when a reverse proxy is enabled, allows remote attackers to cause a denial of service (child-process crash) via a crafted HTTP Connection header.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136944" comment="apache2-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136945" comment="apache2-devel-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136946" comment="apache2-doc-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136947" comment="apache2-example-pages-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136948" comment="apache2-prefork-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136949" comment="apache2-utils-2.4.10-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0118</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0118" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0118" source="CVE"/>
    <description>
    The deflate_in_filter function in mod_deflate.c in the mod_deflate module in the Apache HTTP Server before 2.4.10, when request body decompression is enabled, allows remote attackers to cause a denial of service (resource consumption) via crafted request data that decompresses to a much larger size.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136944" comment="apache2-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136945" comment="apache2-devel-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136946" comment="apache2-doc-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136947" comment="apache2-example-pages-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136948" comment="apache2-prefork-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136949" comment="apache2-utils-2.4.10-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0138</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0138" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138" source="CVE"/>
    <description>
    The default configuration in cURL and libcurl 7.10.6 before 7.36.0 re-uses (1) SCP, (2) SFTP, (3) POP3, (4) POP3S, (5) IMAP, (6) IMAPS, (7) SMTP, (8) SMTPS, (9) LDAP, and (10) LDAPS connections, which might allow context-dependent attackers to connect as other users via a request, a similar issue to CVE-2014-0015.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137106" comment="curl-7.38.0-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137107" comment="libcurl-devel-7.38.0-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137108" comment="libcurl4-7.38.0-1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0139</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0139" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0139" source="CVE"/>
    <description>
    cURL and libcurl 7.1 before 7.36.0, when using the OpenSSL, axtls, qsossl or gskit libraries for TLS, recognize a wildcard IP address in the subject's Common Name (CN) field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137106" comment="curl-7.38.0-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137107" comment="libcurl-devel-7.38.0-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137108" comment="libcurl4-7.38.0-1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0142</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0142" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137408" comment="libcacard0-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137409" comment="qemu-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137410" comment="qemu-arm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137411" comment="qemu-block-curl-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137412" comment="qemu-extra-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137413" comment="qemu-ipxe-1.0.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137414" comment="qemu-ksm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137415" comment="qemu-kvm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137416" comment="qemu-lang-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137417" comment="qemu-ppc-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137418" comment="qemu-s390-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137419" comment="qemu-seabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137420" comment="qemu-sgabios-8-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137421" comment="qemu-tools-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137422" comment="qemu-vgabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137423" comment="qemu-x86-2.1.0-2.9 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0143</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0143" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137408" comment="libcacard0-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137409" comment="qemu-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137410" comment="qemu-arm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137411" comment="qemu-block-curl-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137412" comment="qemu-extra-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137413" comment="qemu-ipxe-1.0.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137414" comment="qemu-ksm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137415" comment="qemu-kvm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137416" comment="qemu-lang-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137417" comment="qemu-ppc-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137418" comment="qemu-s390-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137419" comment="qemu-seabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137420" comment="qemu-sgabios-8-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137421" comment="qemu-tools-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137422" comment="qemu-vgabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137423" comment="qemu-x86-2.1.0-2.9 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0144</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0144" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0144" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137408" comment="libcacard0-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137409" comment="qemu-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137410" comment="qemu-arm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137411" comment="qemu-block-curl-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137412" comment="qemu-extra-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137413" comment="qemu-ipxe-1.0.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137414" comment="qemu-ksm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137415" comment="qemu-kvm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137416" comment="qemu-lang-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137417" comment="qemu-ppc-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137418" comment="qemu-s390-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137419" comment="qemu-seabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137420" comment="qemu-sgabios-8-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137421" comment="qemu-tools-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137422" comment="qemu-vgabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137423" comment="qemu-x86-2.1.0-2.9 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0145</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0145" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0145" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137408" comment="libcacard0-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137409" comment="qemu-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137410" comment="qemu-arm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137411" comment="qemu-block-curl-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137412" comment="qemu-extra-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137413" comment="qemu-ipxe-1.0.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137414" comment="qemu-ksm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137415" comment="qemu-kvm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137416" comment="qemu-lang-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137417" comment="qemu-ppc-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137418" comment="qemu-s390-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137419" comment="qemu-seabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137420" comment="qemu-sgabios-8-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137421" comment="qemu-tools-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137422" comment="qemu-vgabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137423" comment="qemu-x86-2.1.0-2.9 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0146</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0146" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0146" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137408" comment="libcacard0-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137409" comment="qemu-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137410" comment="qemu-arm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137411" comment="qemu-block-curl-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137412" comment="qemu-extra-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137413" comment="qemu-ipxe-1.0.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137414" comment="qemu-ksm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137415" comment="qemu-kvm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137416" comment="qemu-lang-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137417" comment="qemu-ppc-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137418" comment="qemu-s390-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137419" comment="qemu-seabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137420" comment="qemu-sgabios-8-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137421" comment="qemu-tools-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137422" comment="qemu-vgabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137423" comment="qemu-x86-2.1.0-2.9 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0147</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0147" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0147" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137408" comment="libcacard0-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137409" comment="qemu-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137410" comment="qemu-arm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137411" comment="qemu-block-curl-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137412" comment="qemu-extra-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137413" comment="qemu-ipxe-1.0.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137414" comment="qemu-ksm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137415" comment="qemu-kvm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137416" comment="qemu-lang-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137417" comment="qemu-ppc-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137418" comment="qemu-s390-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137419" comment="qemu-seabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137420" comment="qemu-sgabios-8-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137421" comment="qemu-tools-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137422" comment="qemu-vgabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137423" comment="qemu-x86-2.1.0-2.9 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0150</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0150" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0150" source="CVE"/>
    <description>
    Integer overflow in the virtio_net_handle_mac function in hw/net/virtio-net.c in QEMU 2.0 and earlier allows local guest users to execute arbitrary code via a MAC addresses table update request, which triggers a heap-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137408" comment="libcacard0-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137409" comment="qemu-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137410" comment="qemu-arm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137411" comment="qemu-block-curl-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137412" comment="qemu-extra-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137413" comment="qemu-ipxe-1.0.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137414" comment="qemu-ksm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137415" comment="qemu-kvm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137416" comment="qemu-lang-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137417" comment="qemu-ppc-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137418" comment="qemu-s390-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137419" comment="qemu-seabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137420" comment="qemu-sgabios-8-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137421" comment="qemu-tools-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137422" comment="qemu-vgabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137423" comment="qemu-x86-2.1.0-2.9 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0160</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0160" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160" source="CVE"/>
    <description>
    The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0172</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0172" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0172" source="CVE"/>
    <description>
    Integer overflow in the check_section function in dwarf_begin_elf.c in the libdw library, as used in elfutils 0.153 and possibly through 0.158 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed compressed debug section in an ELF file, which triggers a heap-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137139" comment="elfutils-0.158-4.2.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137140" comment="libasm1-0.158-4.2.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137141" comment="libdw1-0.158-4.2.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137142" comment="libelf1-0.158-4.2.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137143" comment="libelf1-32bit-0.158-4.2.6 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0178</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0178" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0178" source="CVE"/>
    <description>
    Samba 3.6.6 through 3.6.23, 4.0.x before 4.0.18, and 4.1.x before 4.1.8, when a certain vfs shadow copy configuration is enabled, does not properly initialize the SRV_SNAPSHOT_ARRAY response field, which allows remote authenticated users to obtain potentially sensitive information from process memory via a (1) FSCTL_GET_SHADOW_COPY_DATA or (2) FSCTL_SRV_ENUMERATE_SNAPSHOTS request.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137424" comment="libdcerpc-binding0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137425" comment="libdcerpc-binding0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137426" comment="libdcerpc0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137427" comment="libdcerpc0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137428" comment="libgensec0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137429" comment="libgensec0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137430" comment="libndr-krb5pac0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137431" comment="libndr-krb5pac0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137432" comment="libndr-nbt0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137433" comment="libndr-nbt0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137434" comment="libndr-standard0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137435" comment="libndr-standard0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137436" comment="libndr0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137437" comment="libndr0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137438" comment="libnetapi0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137439" comment="libnetapi0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137440" comment="libpdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137441" comment="libpdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137442" comment="libregistry0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137443" comment="libsamba-credentials0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137444" comment="libsamba-credentials0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137445" comment="libsamba-hostconfig0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137446" comment="libsamba-hostconfig0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137447" comment="libsamba-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137448" comment="libsamba-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137449" comment="libsamdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137450" comment="libsamdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137451" comment="libsmbclient-devel-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137452" comment="libsmbclient-raw0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137453" comment="libsmbclient-raw0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137454" comment="libsmbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137455" comment="libsmbconf0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137456" comment="libsmbconf0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137457" comment="libsmbldap0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137458" comment="libsmbldap0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137459" comment="libtevent-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137460" comment="libtevent-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137461" comment="libwbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137462" comment="libwbclient0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137463" comment="samba-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137464" comment="samba-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137465" comment="samba-client-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137466" comment="samba-client-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137467" comment="samba-doc-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137468" comment="samba-libs-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137469" comment="samba-libs-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137470" comment="samba-winbind-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137471" comment="samba-winbind-32bit-4.1.12-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0179</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0179" source="CVE"/>
    <description>
    libvirt 0.7.5 through 1.2.x before 1.2.5 allows local users to cause a denial of service (read block and hang) via a crafted XML document containing an XML external entity declaration in conjunction with an entity reference to the (1) virConnectCompareCPU or (2) virConnectBaselineCPU API method, related to an XML External Entity (XXE) issue.  NOTE: this issue was SPLIT per ADT3 due to different affected versions of some vectors. CVE-2014-5177 is used for other API methods.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137726" comment="libvirt-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137727" comment="libvirt-client-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137728" comment="libvirt-daemon-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137729" comment="libvirt-daemon-config-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137730" comment="libvirt-daemon-config-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137731" comment="libvirt-daemon-driver-interface-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137732" comment="libvirt-daemon-driver-libxl-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137733" comment="libvirt-daemon-driver-lxc-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137734" comment="libvirt-daemon-driver-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137735" comment="libvirt-daemon-driver-nodedev-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137736" comment="libvirt-daemon-driver-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137737" comment="libvirt-daemon-driver-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137738" comment="libvirt-daemon-driver-secret-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137739" comment="libvirt-daemon-driver-storage-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137740" comment="libvirt-daemon-driver-uml-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137741" comment="libvirt-daemon-driver-vbox-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137742" comment="libvirt-daemon-driver-xen-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137743" comment="libvirt-daemon-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137744" comment="libvirt-daemon-xen-1.2.9-1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0182</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0182" source="CVE"/>
    <description>
    Heap-based buffer overflow in the virtio_load function in hw/virtio/virtio.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted config length in a savevm image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137408" comment="libcacard0-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137409" comment="qemu-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137410" comment="qemu-arm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137411" comment="qemu-block-curl-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137412" comment="qemu-extra-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137413" comment="qemu-ipxe-1.0.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137414" comment="qemu-ksm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137415" comment="qemu-kvm-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137416" comment="qemu-lang-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137417" comment="qemu-ppc-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137418" comment="qemu-s390-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137419" comment="qemu-seabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137420" comment="qemu-sgabios-8-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137421" comment="qemu-tools-2.1.0-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137422" comment="qemu-vgabios-1.7.5-2.9 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137423" comment="qemu-x86-2.1.0-2.9 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0185</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0185" source="CVE"/>
    <description>
    sapi/fpm/fpm/fpm_unix.c in the FastCGI Process Manager (FPM) in PHP before 5.4.28 and 5.5.x before 5.5.12 uses 0666 permissions for the UNIX socket, which allows local users to gain privileges via a crafted FastCGI client.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114884" comment="froxlor-0.9.34-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0190</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0190" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0190" source="CVE"/>
    <description>
    The GIF decoder in QtGui in Qt before 5.3 allows remote attackers to cause a denial of service (NULL pointer dereference) via invalid width and height values in a GIF image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137616" comment="libqt4-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137617" comment="libqt4-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137618" comment="libqt4-devel-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137619" comment="libqt4-linguist-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137620" comment="libqt4-qt3support-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137621" comment="libqt4-qt3support-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137622" comment="libqt4-sql-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137623" comment="libqt4-sql-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137624" comment="libqt4-sql-mysql-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137625" comment="libqt4-sql-mysql-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137626" comment="libqt4-sql-postgresql-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137627" comment="libqt4-sql-postgresql-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137628" comment="libqt4-sql-sqlite-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137629" comment="libqt4-sql-sqlite-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137630" comment="libqt4-sql-unixODBC-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137631" comment="libqt4-sql-unixODBC-32bit-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137632" comment="libqt4-x11-4.8.6-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137633" comment="libqt4-x11-32bit-4.8.6-4.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0191</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0191" source="CVE"/>
    <description>
    The xmlParserHandlePEReference function in parser.c in libxml2 before 2.9.2, as used in Web Listener in Oracle HTTP Server in Oracle Fusion Middleware 11.1.1.7.0, 12.1.2.0, and 12.1.3.0 and other products, loads external parameter entities regardless of whether entity substitution or validation is enabled, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XML document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009120421" comment="libxml2-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137790" comment="libxml2-2-2.9.1-7.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137791" comment="libxml2-2-32bit-2.9.1-7.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137792" comment="libxml2-devel-2.9.1-7.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120425" comment="libxml2-devel-32bit-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120426" comment="libxml2-doc-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137793" comment="libxml2-tools-2.9.1-7.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120428" comment="python-libxml2-2.9.3-7.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0195</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0195" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0195" source="CVE"/>
    <description>
    The dtls1_reassemble_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly validate fragment lengths in DTLS ClientHello messages, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a long non-initial fragment.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124418" comment="libopenssl0_9_8-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124419" comment="libopenssl0_9_8-32bit-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0196</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0196" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0196" source="CVE"/>
    <description>
    The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO &amp; !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137315" comment="kernel-default-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137316" comment="kernel-default-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137317" comment="kernel-desktop-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137318" comment="kernel-desktop-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137319" comment="kernel-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137320" comment="kernel-docs-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137321" comment="kernel-macros-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137322" comment="kernel-pae-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137323" comment="kernel-pae-base-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137324" comment="kernel-pae-devel-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137325" comment="kernel-source-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137326" comment="kernel-syms-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137327" comment="kernel-xen-3.16.6-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137328" comment="kernel-xen-devel-3.16.6-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0198</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0198" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0198" source="CVE"/>
    <description>
    The do_ssl3_write function in s3_pkt.c in OpenSSL 1.x through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, does not properly manage a buffer pointer during certain recursive calls, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors that trigger an alert condition.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0209</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0209" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0209" source="CVE"/>
    <description>
    Multiple integer overflows in the (1) FontFileAddEntry and (2) lexAlias functions in X.Org libXfont before 1.4.8 and 1.4.9x before 1.4.99.901 might allow local users to gain privileges by adding a directory with a large fonts.dir or fonts.alias file to the font path, which triggers a heap-based buffer overflow, related to metadata.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137361" comment="libXfont-devel-1.5.0-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137362" comment="libXfont1-1.5.0-2.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0210</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0210" source="CVE"/>
    <description>
    Multiple buffer overflows in X.Org libXfont before 1.4.8 and 1.4.9x before 1.4.99.901 allow remote font servers to execute arbitrary code via a crafted xfs protocol reply to the (1) _fs_recv_conn_setup, (2) fs_read_open_font, (3) fs_read_query_info, (4) fs_read_extent_info, (5) fs_read_glyphs, (6) fs_read_list, or (7) fs_read_list_info function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137361" comment="libXfont-devel-1.5.0-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137362" comment="libXfont1-1.5.0-2.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0211</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0211" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0211" source="CVE"/>
    <description>
    Multiple integer overflows in the (1) fs_get_reply, (2) fs_alloc_glyphs, and (3) fs_read_extent_info functions in X.Org libXfont before 1.4.8 and 1.4.9x before 1.4.99.901 allow remote font servers to execute arbitrary code via a crafted xfs reply, which triggers a buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137361" comment="libXfont-devel-1.5.0-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137362" comment="libXfont1-1.5.0-2.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0221</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0221" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221" source="CVE"/>
    <description>
    The dtls1_get_message_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (recursion and client crash) via a DTLS hello message in an invalid DTLS handshake.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124418" comment="libopenssl0_9_8-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124419" comment="libopenssl0_9_8-32bit-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0222</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0222" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222" source="CVE"/>
    <description>
    Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126020" comment="xen-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126021" comment="xen-devel-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126022" comment="xen-doc-html-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126023" comment="xen-kmp-default-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126024" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126025" comment="xen-libs-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126026" comment="xen-libs-32bit-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126027" comment="xen-tools-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126028" comment="xen-tools-domU-4.4.4_02-43.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0224</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0224" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224" source="CVE"/>
    <description>
    OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124418" comment="libopenssl0_9_8-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124419" comment="libopenssl0_9_8-32bit-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105911" comment="python-virtualbox-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105912" comment="virtualbox-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105913" comment="virtualbox-devel-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105914" comment="virtualbox-guest-desktop-icons-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105915" comment="virtualbox-guest-kmp-default-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105916" comment="virtualbox-guest-kmp-desktop-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105917" comment="virtualbox-guest-kmp-pae-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105918" comment="virtualbox-guest-tools-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105919" comment="virtualbox-guest-x11-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105920" comment="virtualbox-host-kmp-default-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105921" comment="virtualbox-host-kmp-desktop-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105922" comment="virtualbox-host-kmp-pae-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105923" comment="virtualbox-qt-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105924" comment="virtualbox-websrv-4.3.20-7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0226</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0226" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0226" source="CVE"/>
    <description>
    Race condition in the mod_status module in the Apache HTTP Server before 2.4.10 allows remote attackers to cause a denial of service (heap-based buffer overflow), or possibly obtain sensitive credential information or execute arbitrary code, via a crafted request that triggers improper scoreboard handling within the status_handler function in modules/generators/mod_status.c and the lua_ap_scoreboard_worker function in modules/lua/lua_request.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136944" comment="apache2-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136945" comment="apache2-devel-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136946" comment="apache2-doc-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136947" comment="apache2-example-pages-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136948" comment="apache2-prefork-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136949" comment="apache2-utils-2.4.10-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0231</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0231" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0231" source="CVE"/>
    <description>
    The mod_cgid module in the Apache HTTP Server before 2.4.10 does not have a timeout mechanism, which allows remote attackers to cause a denial of service (process hang) via a request to a CGI script that does not read from its stdin file descriptor.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136944" comment="apache2-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136945" comment="apache2-devel-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136946" comment="apache2-doc-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136947" comment="apache2-example-pages-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136948" comment="apache2-prefork-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136949" comment="apache2-utils-2.4.10-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0237</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0237" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0237" source="CVE"/>
    <description>
    The cdf_unpack_summary_info function in cdf.c in the Fileinfo component in PHP before 5.4.29 and 5.5.x before 5.5.13 allows remote attackers to cause a denial of service (performance degradation) by triggering many file_printf calls.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0238</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0238" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0238" source="CVE"/>
    <description>
    The cdf_read_property_info function in cdf.c in the Fileinfo component in PHP before 5.4.29 and 5.5.x before 5.5.13 allows remote attackers to cause a denial of service (infinite loop or out-of-bounds memory access) via a vector that (1) has zero length or (2) is too long.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0239</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0239" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0239" source="CVE"/>
    <description>
    The internal DNS server in Samba 4.x before 4.0.18 does not check the QR field in the header section of an incoming DNS message before sending a response, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged response packet that triggers a communication loop, a related issue to CVE-1999-0103.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137424" comment="libdcerpc-binding0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137425" comment="libdcerpc-binding0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137426" comment="libdcerpc0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137427" comment="libdcerpc0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137428" comment="libgensec0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137429" comment="libgensec0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137430" comment="libndr-krb5pac0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137431" comment="libndr-krb5pac0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137432" comment="libndr-nbt0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137433" comment="libndr-nbt0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137434" comment="libndr-standard0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137435" comment="libndr-standard0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137436" comment="libndr0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137437" comment="libndr0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137438" comment="libnetapi0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137439" comment="libnetapi0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137440" comment="libpdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137441" comment="libpdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137442" comment="libregistry0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137443" comment="libsamba-credentials0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137444" comment="libsamba-credentials0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137445" comment="libsamba-hostconfig0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137446" comment="libsamba-hostconfig0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137447" comment="libsamba-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137448" comment="libsamba-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137449" comment="libsamdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137450" comment="libsamdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137451" comment="libsmbclient-devel-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137452" comment="libsmbclient-raw0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137453" comment="libsmbclient-raw0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137454" comment="libsmbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137455" comment="libsmbconf0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137456" comment="libsmbconf0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137457" comment="libsmbldap0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137458" comment="libsmbldap0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137459" comment="libtevent-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137460" comment="libtevent-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137461" comment="libwbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137462" comment="libwbclient0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137463" comment="samba-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137464" comment="samba-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137465" comment="samba-client-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137466" comment="samba-client-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137467" comment="samba-doc-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137468" comment="samba-libs-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137469" comment="samba-libs-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137470" comment="samba-winbind-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137471" comment="samba-winbind-32bit-4.1.12-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0244</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0244" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0244" source="CVE"/>
    <description>
    The sys_recvfrom function in nmbd in Samba 3.6.x before 3.6.24, 4.0.x before 4.0.19, and 4.1.x before 4.1.9 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a malformed UDP packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137424" comment="libdcerpc-binding0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137425" comment="libdcerpc-binding0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137426" comment="libdcerpc0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137427" comment="libdcerpc0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137428" comment="libgensec0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137429" comment="libgensec0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137430" comment="libndr-krb5pac0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137431" comment="libndr-krb5pac0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137432" comment="libndr-nbt0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137433" comment="libndr-nbt0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137434" comment="libndr-standard0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137435" comment="libndr-standard0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137436" comment="libndr0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137437" comment="libndr0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137438" comment="libnetapi0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137439" comment="libnetapi0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137440" comment="libpdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137441" comment="libpdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137442" comment="libregistry0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137443" comment="libsamba-credentials0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137444" comment="libsamba-credentials0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137445" comment="libsamba-hostconfig0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137446" comment="libsamba-hostconfig0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137447" comment="libsamba-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137448" comment="libsamba-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137449" comment="libsamdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137450" comment="libsamdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137451" comment="libsmbclient-devel-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137452" comment="libsmbclient-raw0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137453" comment="libsmbclient-raw0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137454" comment="libsmbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137455" comment="libsmbconf0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137456" comment="libsmbconf0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137457" comment="libsmbldap0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137458" comment="libsmbldap0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137459" comment="libtevent-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137460" comment="libtevent-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137461" comment="libwbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137462" comment="libwbclient0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137463" comment="samba-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137464" comment="samba-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137465" comment="samba-client-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137466" comment="samba-client-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137467" comment="samba-doc-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137468" comment="samba-libs-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137469" comment="samba-libs-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137470" comment="samba-winbind-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137471" comment="samba-winbind-32bit-4.1.12-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0247</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0247" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0247" source="CVE"/>
    <description>
    LibreOffice 4.2.4 executes unspecified VBA macros automatically, which has unspecified impact and attack vectors, possibly related to doc/docmacromode.cxx.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137639" comment="libreoffice-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137640" comment="libreoffice-base-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137641" comment="libreoffice-base-drivers-mysql-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137642" comment="libreoffice-calc-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137643" comment="libreoffice-calc-extensions-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137644" comment="libreoffice-draw-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137645" comment="libreoffice-filters-optional-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137646" comment="libreoffice-gnome-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137647" comment="libreoffice-icon-theme-galaxy-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137648" comment="libreoffice-icon-theme-hicontrast-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137649" comment="libreoffice-icon-theme-oxygen-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137650" comment="libreoffice-icon-theme-sifr-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137651" comment="libreoffice-icon-theme-tango-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137652" comment="libreoffice-impress-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137653" comment="libreoffice-kde4-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137654" comment="libreoffice-l10n-cs-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137655" comment="libreoffice-l10n-da-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137656" comment="libreoffice-l10n-de-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137657" comment="libreoffice-l10n-el-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137658" comment="libreoffice-l10n-en-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137659" comment="libreoffice-l10n-es-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137660" comment="libreoffice-l10n-fr-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137661" comment="libreoffice-l10n-hu-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137662" comment="libreoffice-l10n-it-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137663" comment="libreoffice-l10n-ja-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137664" comment="libreoffice-l10n-pl-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137665" comment="libreoffice-l10n-ru-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137666" comment="libreoffice-mailmerge-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137667" comment="libreoffice-math-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137668" comment="libreoffice-pyuno-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137669" comment="libreoffice-writer-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137670" comment="libreoffice-writer-extensions-4.3.2.2-1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0249</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0249" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0249" source="CVE"/>
    <description>
    The System Security Services Daemon (SSSD) 1.11.6 does not properly identify group membership when a non-POSIX group is in a group membership chain, which allows local users to bypass access restrictions via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009101378" comment="libipa_hbac-devel-1.12.2-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101379" comment="libipa_hbac0-1.12.2-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101380" comment="libnfsidmap-sss-1.12.2-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101381" comment="libsss_idmap-devel-1.12.2-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101382" comment="libsss_idmap0-1.12.2-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101383" comment="libsss_nss_idmap-devel-1.12.2-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101384" comment="libsss_nss_idmap0-1.12.2-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101385" comment="libsss_simpleifp-devel-1.12.2-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101386" comment="libsss_simpleifp0-1.12.2-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101387" comment="libsss_sudo-1.12.2-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101388" comment="python-ipa_hbac-1.12.2-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101389" comment="python-sss_nss_idmap-1.12.2-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101390" comment="python-sssd-config-1.12.2-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101391" comment="sssd-1.12.2-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101392" comment="sssd-32bit-1.12.2-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101393" comment="sssd-ad-1.12.2-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101394" comment="sssd-dbus-1.12.2-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101395" comment="sssd-ipa-1.12.2-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101396" comment="sssd-krb5-1.12.2-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101397" comment="sssd-krb5-common-1.12.2-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101398" comment="sssd-ldap-1.12.2-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101399" comment="sssd-proxy-1.12.2-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101400" comment="sssd-tools-1.12.2-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101401" comment="sssd-wbclient-1.12.2-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101402" comment="sssd-wbclient-devel-1.12.2-3.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0250</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0250" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0250" source="CVE"/>
    <description>
    Multiple integer overflows in client/X11/xf_graphics.c in FreeRDP allow remote attackers to have an unspecified impact via the width and height to the (1) xf_Pointer_New or (2) xf_Bitmap_Decompress function, which causes an incorrect amount of memory to be allocated.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137170" comment="freerdp-1.0.2-8.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137171" comment="libfreerdp-1_0-1.0.2-8.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137172" comment="libfreerdp-1_0-plugins-1.0.2-8.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140333" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0333</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0333" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0333" source="CVE"/>
    <description>
    The png_push_read_chunk function in pngpread.c in the progressive decoder in libpng 1.6.x through 1.6.9 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an IDAT chunk with a length of zero.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137574" comment="libpng16-16-1.6.13-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137575" comment="libpng16-16-32bit-1.6.13-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137576" comment="libpng16-devel-1.6.13-2.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0368</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0368" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0368" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45, and Java SE Embedded 7u45, allows remote attackers to affect confidentiality via unknown vectors related to Networking.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to incorrect permission checks when listening on a socket, which allows attackers to escape the sandbox.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0373</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0373" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0373" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Serviceability.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to throwing of an incorrect exception when SnmpStatusException should have been used in the SNMP implementation, which allows attackers to escape the sandbox.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0376</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0376" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0376" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect integrity via vectors related to JAXP.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to an improper check for "code permissions when creating document builder factories."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0408</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0408" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0408" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u45, when running on OS X, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0411</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0411" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0411" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; JRockit R27.7.7 and R28.2.9; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect confidentiality and integrity via vectors related to JSSE.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that this issue allows remote attackers to obtain sensitive information about encryption keys via a timing discrepancy during the TLS/SSL handshake.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0416</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0416" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0416" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect integrity via vectors related to JAAS.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to how principals are set for the Subject class, which allows attackers to escape the sandbox using deserialization of a crafted Subject instance.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0422</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0422" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0422" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JNDI.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to missing package access checks in the Naming / JNDI component, which allows attackers to escape the sandbox.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0423</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0423" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; JRockit R27.7.7 and R28.2.9; Java SE Embedded 7u45; and OpenJDK 7 allows remote authenticated users to affect confidentiality and availability via unknown vectors related to Beans.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that this issue is an XML External Entity (XXE) vulnerability in DocumentHandler.java, related to Beans decoding.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0428</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0428" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0428" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to "insufficient security checks in IIOP streams," which allows attackers to escape the sandbox.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0429</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0429" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0429" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0446</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0446" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0446" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0451</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0451" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0451" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT, a different vulnerability than CVE-2014-2412.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0452</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0452" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0452" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAX-WS, a different vulnerability than CVE-2014-0458 and CVE-2014-2423.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0453</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0453" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0453" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Security.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0454</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0454" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0454" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u51 and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Security.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0455</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0455" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0455" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u51 and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2014-0432 and CVE-2014-2402.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0456</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0456" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0457</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0457" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0457" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, SE 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0458</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0458" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0458" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAX-WS, a different vulnerability than CVE-2014-0452 and CVE-2014-2423.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0459</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0459" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0459" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u51 and 8, and Java SE Embedded 7u51, allows remote attackers to affect availability via unknown vectors related to 2D.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0460</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0460" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0460" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality and integrity via vectors related to JNDI.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0461</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0461" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0461" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0466</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0466" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0466" source="CVE"/>
    <description>
    The fixps script in a2ps 4.14 does not use the -dSAFER option when executing gs, which allows context-dependent attackers to delete arbitrary files or execute arbitrary commands via a crafted PostScript file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136925" comment="a2ps-4.13-1361.1.9 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0467</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0467" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0467" source="CVE"/>
    <description>
    Buffer overflow in copy.c in Mutt before 1.5.23 allows remote attackers to cause a denial of service (crash) via a crafted RFC2047 header line, related to address expansion.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137804" comment="mutt-1.5.21-44.1.12 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0475</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0475" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0475" source="CVE"/>
    <description>
    Multiple directory traversal vulnerabilities in GNU C Library (aka glibc or libc6) before 2.20 allow context-dependent attackers to bypass ForceCommand restrictions and possibly have other unspecified impact via a .. (dot dot) in a (1) LC_*, (2) LANG, or other locale environment variable.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137226" comment="glibc-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137227" comment="glibc-32bit-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137228" comment="glibc-devel-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137229" comment="glibc-extra-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137230" comment="glibc-info-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137231" comment="glibc-locale-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137232" comment="glibc-locale-32bit-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137233" comment="nscd-2.19-16.2.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0573</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2014-0573" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0573" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-0588 and CVE-2014-8438.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117556" comment="flash-player-11.2.202.418-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117557" comment="flash-player-gnome-11.2.202.418-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117558" comment="flash-player-kde4-11.2.202.418-2.11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0574</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2014-0574" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0574" source="CVE"/>
    <description>
    Double free vulnerability in Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
  <criteria operator="OR">
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009102711" comment="chromedriver-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102712" comment="chromium-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102713" comment="chromium-desktop-gnome-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102714" comment="chromium-desktop-kde-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102715" comment="chromium-ffmpegsumo-39.0.2171.65-4.4 is installed"/>
      </criteria>
    </criteria>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117556" comment="flash-player-11.2.202.418-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117557" comment="flash-player-gnome-11.2.202.418-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117558" comment="flash-player-kde4-11.2.202.418-2.11.1 is installed"/>
      </criteria>
    </criteria>
  </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0576</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2014-0576" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0576" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0581, CVE-2014-8440, and CVE-2014-8441.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117556" comment="flash-player-11.2.202.418-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117557" comment="flash-player-gnome-11.2.202.418-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117558" comment="flash-player-kde4-11.2.202.418-2.11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0577</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2014-0577" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0577" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2014-0584, CVE-2014-0585, CVE-2014-0586, and CVE-2014-0590.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117556" comment="flash-player-11.2.202.418-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117557" comment="flash-player-gnome-11.2.202.418-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117558" comment="flash-player-kde4-11.2.202.418-2.11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0580</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2014-0580" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0580" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.259 and 14.x through 16.x before 16.0.0.235 on Windows and OS X and before 11.2.202.425 on Linux allows remote attackers to bypass the Same Origin Policy via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117562" comment="flash-player-11.2.202.425-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117563" comment="flash-player-gnome-11.2.202.425-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117564" comment="flash-player-kde4-11.2.202.425-2.17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0581</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2014-0581" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0581" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0576, CVE-2014-8440, and CVE-2014-8441.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117556" comment="flash-player-11.2.202.418-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117557" comment="flash-player-gnome-11.2.202.418-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117558" comment="flash-player-kde4-11.2.202.418-2.11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0582</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2014-0582" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0582" source="CVE"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-0589.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117556" comment="flash-player-11.2.202.418-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117557" comment="flash-player-gnome-11.2.202.418-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117558" comment="flash-player-kde4-11.2.202.418-2.11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0583</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2014-0583" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0583" source="CVE"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allows attackers to complete a transition from Low Integrity to Medium Integrity via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117556" comment="flash-player-11.2.202.418-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117557" comment="flash-player-gnome-11.2.202.418-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117558" comment="flash-player-kde4-11.2.202.418-2.11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0584</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2014-0584" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0584" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2014-0577, CVE-2014-0585, CVE-2014-0586, and CVE-2014-0590.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117556" comment="flash-player-11.2.202.418-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117557" comment="flash-player-gnome-11.2.202.418-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117558" comment="flash-player-kde4-11.2.202.418-2.11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0585</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2014-0585" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0585" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2014-0577, CVE-2014-0584, CVE-2014-0586, and CVE-2014-0590.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117556" comment="flash-player-11.2.202.418-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117557" comment="flash-player-gnome-11.2.202.418-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117558" comment="flash-player-kde4-11.2.202.418-2.11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0586</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2014-0586" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0586" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2014-0577, CVE-2014-0584, CVE-2014-0585, and CVE-2014-0590.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117556" comment="flash-player-11.2.202.418-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117557" comment="flash-player-gnome-11.2.202.418-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117558" comment="flash-player-kde4-11.2.202.418-2.11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0587</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2014-0587" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0587" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.259 and 14.x through 16.x before 16.0.0.235 on Windows and OS X and before 11.2.202.425 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-9164.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117562" comment="flash-player-11.2.202.425-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117563" comment="flash-player-gnome-11.2.202.425-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117564" comment="flash-player-kde4-11.2.202.425-2.17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0588</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2014-0588" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0588" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-0573 and CVE-2014-8438.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117556" comment="flash-player-11.2.202.418-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117557" comment="flash-player-gnome-11.2.202.418-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117558" comment="flash-player-kde4-11.2.202.418-2.11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0589</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2014-0589" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0589" source="CVE"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-0582.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117556" comment="flash-player-11.2.202.418-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117557" comment="flash-player-gnome-11.2.202.418-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117558" comment="flash-player-kde4-11.2.202.418-2.11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0590</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2014-0590" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0590" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2014-0577, CVE-2014-0584, CVE-2014-0585, and CVE-2014-0586.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117556" comment="flash-player-11.2.202.418-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117557" comment="flash-player-gnome-11.2.202.418-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117558" comment="flash-player-kde4-11.2.202.418-2.11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0591</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0591" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0591" source="CVE"/>
    <description>
    The query_findclosestnsec3 function in query.c in named in ISC BIND 9.6, 9.7, and 9.8 before 9.8.6-P2 and 9.9 before 9.9.4-P2, and 9.6-ESV before 9.6-ESV-R10-P2, allows remote attackers to cause a denial of service (INSIST assertion failure and daemon exit) via a crafted DNS query to an authoritative nameserver that uses the NSEC3 signing feature.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137045" comment="bind-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137046" comment="bind-chrootenv-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137047" comment="bind-doc-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137048" comment="bind-libs-9.9.5P1-2.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137049" comment="bind-utils-9.9.5P1-2.2.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0593</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0593" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0593" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137811" comment="obs-service-set_version-0.4.2-2.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0791</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-0791" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0791" source="CVE"/>
    <description>
    Integer overflow in the license_read_scope_list function in libfreerdp/core/license.c in FreeRDP through 1.0.2 allows remote RDP servers to cause a denial of service (application crash) or possibly have unspecified other impact via a large ScopeCount value in a Scope List in a Server License Request packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137170" comment="freerdp-1.0.2-8.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133605" comment="freerdp-devel-1.0.2-8.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137171" comment="libfreerdp-1_0-1.0.2-8.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137172" comment="libfreerdp-1_0-plugins-1.0.2-8.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1447</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1447" source="CVE"/>
    <description>
    Race condition in the virNetServerClientStartKeepAlive function in libvirt before 1.2.1 allows remote attackers to cause a denial of service (libvirtd crash) by closing a connection before a keepalive response is sent.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137726" comment="libvirt-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137727" comment="libvirt-client-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137728" comment="libvirt-daemon-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137729" comment="libvirt-daemon-config-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137730" comment="libvirt-daemon-config-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137731" comment="libvirt-daemon-driver-interface-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137732" comment="libvirt-daemon-driver-libxl-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137733" comment="libvirt-daemon-driver-lxc-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137734" comment="libvirt-daemon-driver-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137735" comment="libvirt-daemon-driver-nodedev-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137736" comment="libvirt-daemon-driver-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137737" comment="libvirt-daemon-driver-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137738" comment="libvirt-daemon-driver-secret-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137739" comment="libvirt-daemon-driver-storage-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137740" comment="libvirt-daemon-driver-uml-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137741" comment="libvirt-daemon-driver-vbox-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137742" comment="libvirt-daemon-driver-xen-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137743" comment="libvirt-daemon-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137744" comment="libvirt-daemon-xen-1.2.9-1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1477</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1477" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1478</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1478" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1478" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 27.0 and SeaMonkey before 2.24 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the MPostWriteBarrier class in js/src/jit/MIR.h and stack alignment in js/src/jit/AsmJS.cpp in OdinMonkey, and unknown other vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1479</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1479" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479" source="CVE"/>
    <description>
    The System Only Wrapper (SOW) implementation in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 does not prevent certain cloning operations, which allows remote attackers to bypass intended restrictions on XUL content via vectors involving XBL content scopes.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1480</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1480" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1480" source="CVE"/>
    <description>
    The file-download implementation in Mozilla Firefox before 27.0 and SeaMonkey before 2.24 does not properly restrict the timing of button selections, which allows remote attackers to conduct clickjacking attacks, and trigger unintended launching of a downloaded file, via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1481</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1481" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481" source="CVE"/>
    <description>
    Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allow remote attackers to bypass intended restrictions on window objects by leveraging inconsistency in native getter methods across different JavaScript engines.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1482</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1482" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482" source="CVE"/>
    <description>
    RasterImage.cpp in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 does not prevent access to discarded data, which allows remote attackers to execute arbitrary code or cause a denial of service (incorrect write operations) via crafted image data, as demonstrated by Goo Create.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1483</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1483" source="CVE"/>
    <description>
    Mozilla Firefox before 27.0 and SeaMonkey before 2.24 allow remote attackers to bypass the Same Origin Policy and obtain sensitive information by using an IFRAME element in conjunction with certain timing measurements involving the document.caretPositionFromPoint and document.elementFromPoint functions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1484</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1484" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1484" source="CVE"/>
    <description>
    Mozilla Firefox before 27.0 on Android 4.2 and earlier creates system-log entries containing profile paths, which allows attackers to obtain sensitive information via a crafted application.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1485</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1485" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1485" source="CVE"/>
    <description>
    The Content Security Policy (CSP) implementation in Mozilla Firefox before 27.0 and SeaMonkey before 2.24 operates on XSLT stylesheets according to style-src directives instead of script-src directives, which might allow remote attackers to execute arbitrary XSLT code by leveraging insufficient style-src restrictions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1486</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1486" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486" source="CVE"/>
    <description>
    Use-after-free vulnerability in the imgRequestProxy function in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allows remote attackers to execute arbitrary code via vectors involving unspecified Content-Type values for image data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1487</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1487" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487" source="CVE"/>
    <description>
    The Web workers implementation in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allows remote attackers to bypass the Same Origin Policy and obtain sensitive authentication information via vectors involving error messages.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1488</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1488" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1488" source="CVE"/>
    <description>
    The Web workers implementation in Mozilla Firefox before 27.0 and SeaMonkey before 2.24 allows remote attackers to execute arbitrary code via vectors involving termination of a worker process that has performed a cross-thread object-passing operation in conjunction with use of asm.js.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1489</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1489" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1489" source="CVE"/>
    <description>
    Mozilla Firefox before 27.0 does not properly restrict access to about:home buttons by script on other pages, which allows user-assisted remote attackers to cause a denial of service (session restore) via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1490</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1490" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490" source="CVE"/>
    <description>
    Race condition in libssl in Mozilla Network Security Services (NSS) before 3.15.4, as used in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, SeaMonkey before 2.24, and other products, allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via vectors involving a resumption handshake that triggers incorrect replacement of a session ticket.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137486" comment="libfreebl3-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137487" comment="libsoftokn3-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137488" comment="mozilla-nss-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137489" comment="mozilla-nss-certs-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137490" comment="mozilla-nss-devel-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137491" comment="mozilla-nss-tools-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1491</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1491" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491" source="CVE"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.15.4, as used in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, SeaMonkey before 2.24, and other products, does not properly restrict public values in Diffie-Hellman key exchanges, which makes it easier for remote attackers to bypass cryptographic protection mechanisms in ticket handling by leveraging use of a certain value.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137486" comment="libfreebl3-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137487" comment="libsoftokn3-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137488" comment="mozilla-nss-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137489" comment="mozilla-nss-certs-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137490" comment="mozilla-nss-devel-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137491" comment="mozilla-nss-tools-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1492</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1492" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492" source="CVE"/>
    <description>
    The cert_TestHostName function in lib/certdb/certdb.c in the certificate-checking implementation in Mozilla Network Security Services (NSS) before 3.16 accepts a wildcard character that is embedded in an internationalized domain name's U-label, which might allow man-in-the-middle attackers to spoof SSL servers via a crafted certificate.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137486" comment="libfreebl3-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137487" comment="libsoftokn3-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137488" comment="mozilla-nss-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137489" comment="mozilla-nss-certs-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137490" comment="mozilla-nss-devel-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137491" comment="mozilla-nss-tools-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1493</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1493" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1494</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1494" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 28.0 and SeaMonkey before 2.25 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1497</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1497" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497" source="CVE"/>
    <description>
    The mozilla::WaveReader::DecodeAudioData function in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to obtain sensitive information from process heap memory, cause a denial of service (out-of-bounds read and application crash), or possibly have unspecified other impact via a crafted WAV file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1498</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1498" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1498" source="CVE"/>
    <description>
    The crypto.generateCRMFRequest method in Mozilla Firefox before 28.0 and SeaMonkey before 2.25 does not properly validate a certain key type, which allows remote attackers to cause a denial of service (application crash) via vectors that trigger generation of a key that supports the Elliptic Curve ec-dual-use algorithm.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1499</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1499" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1499" source="CVE"/>
    <description>
    Mozilla Firefox before 28.0 and SeaMonkey before 2.25 allow remote attackers to spoof the domain name in the WebRTC (1) camera or (2) microphone permission prompt by triggering navigation at a certain time during generation of this prompt.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1500</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1500" source="CVE"/>
    <description>
    Mozilla Firefox before 28.0 and SeaMonkey before 2.25 allow remote attackers to cause a denial of service (resource consumption and application hang) via onbeforeunload events that trigger background JavaScript execution.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1502</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1502" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1502" source="CVE"/>
    <description>
    The (1) WebGL.compressedTexImage2D and (2) WebGL.compressedTexSubImage2D functions in Mozilla Firefox before 28.0 and SeaMonkey before 2.25 allow remote attackers to bypass the Same Origin Policy and render content in a different domain via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1504</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1504" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1504" source="CVE"/>
    <description>
    The session-restore feature in Mozilla Firefox before 28.0 and SeaMonkey before 2.25 does not consider the Content Security Policy of a data: URL, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted document that is accessed after a browser restart.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1505</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1505" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505" source="CVE"/>
    <description>
    The SVG filter implementation in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to obtain sensitive displacement-correlation information, and possibly bypass the Same Origin Policy and read text from a different domain, via a timing attack involving feDisplacementMap elements, a related issue to CVE-2013-1693.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1508</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1508" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508" source="CVE"/>
    <description>
    The libxul.so!gfxContext::Polygon function in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to obtain sensitive information from process memory, cause a denial of service (out-of-bounds read and application crash), or possibly bypass the Same Origin Policy via vectors involving MathML polygon rendering.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1509</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1509" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509" source="CVE"/>
    <description>
    Buffer overflow in the _cairo_truetype_index_to_ucs4 function in cairo, as used in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25, allows remote attackers to execute arbitrary code via a crafted extension that renders fonts in a PDF document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1510</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1510" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510" source="CVE"/>
    <description>
    The Web IDL implementation in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to execute arbitrary JavaScript code with chrome privileges by using an IDL fragment to trigger a window.open call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1511</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511" source="CVE"/>
    <description>
    Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allow remote attackers to bypass the popup blocker via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1512</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1512" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512" source="CVE"/>
    <description>
    Use-after-free vulnerability in the TypeObject class in the JavaScript engine in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to execute arbitrary code by triggering extensive memory consumption while garbage collection is occurring, as demonstrated by improper handling of BumpChunk objects.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1513</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1513" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513" source="CVE"/>
    <description>
    TypedArrayObject.cpp in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 does not prevent a zero-length transition during use of an ArrayBuffer object, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based out-of-bounds write or read) via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1514</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1514" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514" source="CVE"/>
    <description>
    vmtypedarrayobject.cpp in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 does not validate the length of the destination array before a copy operation, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write and application crash) by triggering incorrect use of the TypedArrayObject class.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1518</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1518" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1519</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1519" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1519" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 29.0 and SeaMonkey before 2.26 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1522</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1522" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1522" source="CVE"/>
    <description>
    The mozilla::dom::OscillatorNodeEngine::ComputeCustom function in the Web Audio subsystem in Mozilla Firefox before 29.0 and SeaMonkey before 2.26 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read, memory corruption, and application crash) via crafted content.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1523</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1523" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523" source="CVE"/>
    <description>
    Heap-based buffer overflow in the read_u32 function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1524</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1524" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524" source="CVE"/>
    <description>
    The nsXBLProtoImpl::InstallImplementation function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 does not properly check whether objects are XBL objects, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow) via crafted JavaScript code that accesses a non-XBL object as if it were an XBL object.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1525</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1525" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1525" source="CVE"/>
    <description>
    The mozilla::dom::TextTrack::AddCue function in Mozilla Firefox before 29.0 and SeaMonkey before 2.26 does not properly perform garbage collection for Text Track Manager variables, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and heap memory corruption) via a crafted VIDEO element in an HTML document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1526</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1526" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1526" source="CVE"/>
    <description>
    The XrayWrapper implementation in Mozilla Firefox before 29.0 and SeaMonkey before 2.26 allows user-assisted remote attackers to bypass intended access restrictions via a crafted web site that is visited in the debugger, leading to unwrapping operations and calls to DOM methods on the unwrapped objects.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1528</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1528" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1528" source="CVE"/>
    <description>
    The sse2_composite_src_x888_8888 function in Pixman, as used in Cairo in Mozilla Firefox 28.0 and SeaMonkey 2.25 on Windows, allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write and application crash) by painting on a CANVAS element.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1529</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1529" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529" source="CVE"/>
    <description>
    The Web Notification API in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to bypass intended source-component restrictions and execute arbitrary JavaScript code in a privileged context via a crafted web page for which Notification.permission is granted.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1530</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1530" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530" source="CVE"/>
    <description>
    The docshell implementation in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to trigger the loading of a URL with a spoofed baseURI property, and conduct cross-site scripting (XSS) attacks, via a crafted web site that performs history navigation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1531</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1531" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsGenericHTMLElement::GetWidthHeightForImage function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving an imgLoader object that is not properly handled during an image-resize operation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1532</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1532" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsHostResolver::ConditionallyRefreshRecord function in libxul.so in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors related to host resolution.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1533</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1533" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1533" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 30.0, Firefox ESR 24.x before 24.6, and Thunderbird before 24.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1534</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1534" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1534" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 30.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1536</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1536" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1536" source="CVE"/>
    <description>
    The PropertyProvider::FindJustificationRange function in Mozilla Firefox before 30.0 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1537</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1537" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1537" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::dom::workers::WorkerPrivateParent function in Mozilla Firefox before 30.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1538</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1538" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1538" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsTextEditRules::CreateMozBR function in Mozilla Firefox before 30.0, Firefox ESR 24.x before 24.6, and Thunderbird before 24.6 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1539</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1539" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1539" source="CVE"/>
    <description>
    Mozilla Firefox before 30.0 and Thunderbird through 24.6 on OS X do not ensure visibility of the cursor after interaction with a Flash object and a DIV element, which makes it easier for remote attackers to conduct clickjacking attacks via JavaScript code that produces a fake cursor image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1540</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1540" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1540" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsEventListenerManager::CompileEventHandlerInternal function in the Event Listener Manager in Mozilla Firefox before 30.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via crafted web content.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1541</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1541" source="CVE"/>
    <description>
    Use-after-free vulnerability in the RefreshDriverTimer::TickDriver function in the SMIL Animation Controller in Mozilla Firefox before 30.0, Firefox ESR 24.x before 24.6, and Thunderbird before 24.6 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via crafted web content.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1542</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1542" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1542" source="CVE"/>
    <description>
    Buffer overflow in the Speex resampler in the Web Audio subsystem in Mozilla Firefox before 30.0 allows remote attackers to execute arbitrary code via vectors related to a crafted AudioBuffer channel count and sample rate.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1543</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1543" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1543" source="CVE"/>
    <description>
    Multiple heap-based buffer overflows in the navigator.getGamepads function in the Gamepad API in Mozilla Firefox before 30.0 allow remote attackers to execute arbitrary code by using non-contiguous axes with a (1) physical or (2) virtual Gamepad device.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1544</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1544" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544" source="CVE"/>
    <description>
    Use-after-free vulnerability in the CERT_DestroyCertificate function in libnss3.so in Mozilla Network Security Services (NSS) 3.x, as used in Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7, allows remote attackers to execute arbitrary code via vectors that trigger certain improper removal of an NSSCertificate structure from a trust domain.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1545</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1545" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545" source="CVE"/>
    <description>
    Mozilla Netscape Portable Runtime (NSPR) before 4.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write) via vectors involving the sprintf and console functions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137802" comment="mozilla-nspr-4.10.7-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137803" comment="mozilla-nspr-devel-4.10.7-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137868" comment="seamonkey-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137869" comment="seamonkey-dom-inspector-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137870" comment="seamonkey-irc-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137871" comment="seamonkey-translations-common-2.29-1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137872" comment="seamonkey-venkman-2.29-1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1547</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1548</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1548" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1548" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 31.0 and Thunderbird before 31.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1549</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1549" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1549" source="CVE"/>
    <description>
    The mozilla::dom::AudioBufferSourceNodeEngine::CopyFromInputBuffer function in Mozilla Firefox before 31.0 and Thunderbird before 31.0 does not properly allocate Web Audio buffer memory, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via crafted audio content that is improperly handled during playback buffering.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1550</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1550" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1550" source="CVE"/>
    <description>
    Use-after-free vulnerability in the MediaInputPort class in Mozilla Firefox before 31.0 and Thunderbird before 31.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by leveraging incorrect Web Audio control-message ordering.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1552</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1552" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1552" source="CVE"/>
    <description>
    Mozilla Firefox before 31.0 and Thunderbird before 31.0 do not properly implement the sandbox attribute of the IFRAME element, which allows remote attackers to bypass intended restrictions on same-origin content via a crafted web site in conjunction with a redirect.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1553</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1553" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1553" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 32.0, Firefox ESR 31.x before 31.1, and Thunderbird 31.x before 31.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1554</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1554" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1554" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 32.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1555</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsDocLoader::OnProgress function in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allows remote attackers to execute arbitrary code via vectors that trigger a FireOnStateChange event.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1556</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1556" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556" source="CVE"/>
    <description>
    Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allow remote attackers to execute arbitrary code via crafted WebGL content constructed with the Cesium JavaScript library.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1557</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1557" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557" source="CVE"/>
    <description>
    The ConvolveHorizontally function in Skia, as used in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7, does not properly handle the discarding of image data during function execution, which allows remote attackers to execute arbitrary code by triggering prolonged image scaling, as demonstrated by scaling of a high-quality image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1558</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1558" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1558" source="CVE"/>
    <description>
    Mozilla Firefox before 31.0 and Thunderbird before 31.0 allow remote attackers to cause a denial of service (X.509 certificate parsing outage) via a crafted certificate that does not use UTF-8 character encoding in a required context, a different vulnerability than CVE-2014-1559.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1559</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1559" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1559" source="CVE"/>
    <description>
    Mozilla Firefox before 31.0 and Thunderbird before 31.0 allow remote attackers to cause a denial of service (X.509 certificate parsing outage) via a crafted certificate that does not use UTF-8 character encoding in a required context, a different vulnerability than CVE-2014-1558.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1560</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1560" source="CVE"/>
    <description>
    Mozilla Firefox before 31.0 and Thunderbird before 31.0 allow remote attackers to cause a denial of service (X.509 certificate parsing outage) via a crafted certificate that does not use ASCII character encoding in a required context.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1561</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1561" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1561" source="CVE"/>
    <description>
    Mozilla Firefox before 31.0 does not properly restrict use of drag-and-drop events to spoof customization events, which allows remote attackers to alter the placement of UI icons via crafted JavaScript code that is encountered during (1) page, (2) panel, or (3) toolbar customization.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1562</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1562" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562" source="CVE"/>
    <description>
    Unspecified vulnerability in the browser engine in Mozilla Firefox before 32.0, Firefox ESR 24.x before 24.8 and 31.x before 31.1, and Thunderbird 24.x before 24.8 and 31.x before 31.1 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1563</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1563" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::DOMSVGLength::GetTearOff function in Mozilla Firefox before 32.0, Firefox ESR 31.x before 31.1, and Thunderbird 31.x before 31.1 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via an SVG animation with DOM interaction that triggers incorrect cycle collection.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1564</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1564" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1564" source="CVE"/>
    <description>
    Mozilla Firefox before 32.0, Firefox ESR 31.x before 31.1, and Thunderbird 31.x before 31.1 do not properly initialize memory for GIF rendering, which allows remote attackers to obtain sensitive information from process memory via crafted web script that interacts with a CANVAS element associated with a malformed GIF image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1565</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1565" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1565" source="CVE"/>
    <description>
    The mozilla::dom::AudioEventTimeline function in the Web Audio API implementation in Mozilla Firefox before 32.0, Firefox ESR 31.x before 31.1, and Thunderbird 31.x before 31.1 does not properly create audio timelines, which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via crafted API calls.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1567</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1567" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567" source="CVE"/>
    <description>
    Use-after-free vulnerability in DirectionalityUtils.cpp in Mozilla Firefox before 32.0, Firefox ESR 24.x before 24.8 and 31.x before 31.1, and Thunderbird 24.x before 24.8 and 31.x before 31.1 allows remote attackers to execute arbitrary code via text that is improperly handled during the interaction between directionality resolution and layout.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1568</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1568" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568" source="CVE"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.16.2.1, 3.16.x before 3.16.5, and 3.17.x before 3.17.1, as used in Mozilla Firefox before 32.0.3, Mozilla Firefox ESR 24.x before 24.8.1 and 31.x before 31.1.1, Mozilla Thunderbird before 24.8.1 and 31.x before 31.1.2, Mozilla SeaMonkey before 2.29.1, Google Chrome before 37.0.2062.124 on Windows and OS X, and Google Chrome OS before 37.0.2062.120, does not properly parse ASN.1 values in X.509 certificates, which makes it easier for remote attackers to spoof RSA signatures via a crafted certificate, aka a "signature malleability" issue.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137486" comment="libfreebl3-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137487" comment="libsoftokn3-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137488" comment="mozilla-nss-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137489" comment="mozilla-nss-certs-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137490" comment="mozilla-nss-devel-3.17.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137491" comment="mozilla-nss-tools-3.17.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1569</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1569" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1569" source="CVE"/>
    <description>
    The definite_length_decoder function in lib/util/quickder.c in Mozilla Network Security Services (NSS) before 3.16.2.4 and 3.17.x before 3.17.3 does not ensure that the DER encoding of an ASN.1 length is properly formed, which allows remote attackers to conduct data-smuggling attacks by using a long byte sequence for an encoding, as demonstrated by the SEC_QuickDERDecodeItem function's improper handling of an arbitrary-length encoding of 0x00.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009106899" comment="MozillaFirefox-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106900" comment="MozillaFirefox-branding-upstream-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106901" comment="MozillaFirefox-buildsymbols-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106902" comment="MozillaFirefox-devel-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106903" comment="MozillaFirefox-translations-common-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106904" comment="MozillaFirefox-translations-other-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106905" comment="libfreebl3-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106906" comment="libfreebl3-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106907" comment="libsoftokn3-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106908" comment="libsoftokn3-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106909" comment="mozilla-nss-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106910" comment="mozilla-nss-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106911" comment="mozilla-nss-certs-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106912" comment="mozilla-nss-certs-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106913" comment="mozilla-nss-devel-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106914" comment="mozilla-nss-sysinit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106915" comment="mozilla-nss-sysinit-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106916" comment="mozilla-nss-tools-3.17.4-9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1574</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1574" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102926" comment="seamonkey-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102927" comment="seamonkey-dom-inspector-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102928" comment="seamonkey-irc-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102929" comment="seamonkey-translations-common-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102930" comment="seamonkey-translations-other-2.31-4.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1575</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1575" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1575" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 33.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to improper interaction between threading and garbage collection in the GCRuntime::triggerGC function in js/src/jsgc.cpp, and unknown other vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102926" comment="seamonkey-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102927" comment="seamonkey-dom-inspector-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102928" comment="seamonkey-irc-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102929" comment="seamonkey-translations-common-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102930" comment="seamonkey-translations-other-2.31-4.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1576</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1576" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576" source="CVE"/>
    <description>
    Heap-based buffer overflow in the nsTransformedTextRun function in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to execute arbitrary code via Cascading Style Sheets (CSS) token sequences that trigger changes to capitalization style.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102926" comment="seamonkey-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102927" comment="seamonkey-dom-inspector-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102928" comment="seamonkey-irc-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102929" comment="seamonkey-translations-common-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102930" comment="seamonkey-translations-other-2.31-4.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1577</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1577" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577" source="CVE"/>
    <description>
    The mozilla::dom::OscillatorNodeEngine::ComputeCustom function in the Web Audio subsystem in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read, memory corruption, and application crash) via an invalid custom waveform that triggers a calculation of a negative frequency value.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102926" comment="seamonkey-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102927" comment="seamonkey-dom-inspector-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102928" comment="seamonkey-irc-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102929" comment="seamonkey-translations-common-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102930" comment="seamonkey-translations-other-2.31-4.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1578</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1578" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578" source="CVE"/>
    <description>
    The get_tile function in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly execute arbitrary code via WebM frames with invalid tile sizes that are improperly handled in buffering operations during video playback.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102926" comment="seamonkey-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102927" comment="seamonkey-dom-inspector-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102928" comment="seamonkey-irc-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102929" comment="seamonkey-translations-common-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102930" comment="seamonkey-translations-other-2.31-4.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1580</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1580" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1580" source="CVE"/>
    <description>
    Mozilla Firefox before 33.0 does not properly initialize memory for GIF images, which allows remote attackers to obtain sensitive information from process memory via a crafted web page that triggers a sequence of rendering operations for truncated GIF data within a CANVAS element.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102926" comment="seamonkey-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102927" comment="seamonkey-dom-inspector-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102928" comment="seamonkey-irc-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102929" comment="seamonkey-translations-common-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102930" comment="seamonkey-translations-other-2.31-4.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1581</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1581" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581" source="CVE"/>
    <description>
    Use-after-free vulnerability in DirectionalityUtils.cpp in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to execute arbitrary code via text that is improperly handled during the interaction between directionality resolution and layout.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102926" comment="seamonkey-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102927" comment="seamonkey-dom-inspector-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102928" comment="seamonkey-irc-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102929" comment="seamonkey-translations-common-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102930" comment="seamonkey-translations-other-2.31-4.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1582</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1582" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1582" source="CVE"/>
    <description>
    The Public Key Pinning (PKP) implementation in Mozilla Firefox before 33.0 does not properly consider the connection-coalescing behavior of SPDY and HTTP/2 in the case of a shared IP address, which allows man-in-the-middle attackers to bypass an intended pinning configuration and spoof a web site by providing a valid certificate from an arbitrary recognized Certification Authority.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102926" comment="seamonkey-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102927" comment="seamonkey-dom-inspector-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102928" comment="seamonkey-irc-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102929" comment="seamonkey-translations-common-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102930" comment="seamonkey-translations-other-2.31-4.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1583</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1583" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583" source="CVE"/>
    <description>
    The Alarm API in Mozilla Firefox before 33.0 and Firefox ESR 31.x before 31.2 does not properly restrict toJSON calls, which allows remote attackers to bypass the Same Origin Policy via crafted API calls that access sensitive information within the JSON data of an alarm.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102926" comment="seamonkey-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102927" comment="seamonkey-dom-inspector-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102928" comment="seamonkey-irc-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102929" comment="seamonkey-translations-common-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102930" comment="seamonkey-translations-other-2.31-4.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1584</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1584" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1584" source="CVE"/>
    <description>
    The Public Key Pinning (PKP) implementation in Mozilla Firefox before 33.0 skips pinning checks upon an unspecified issuer-verification error, which makes it easier for remote attackers to bypass an intended pinning configuration and spoof a web site via a crafted certificate that leads to presentation of the Untrusted Connection dialog to the user.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102926" comment="seamonkey-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102927" comment="seamonkey-dom-inspector-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102928" comment="seamonkey-irc-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102929" comment="seamonkey-translations-common-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102930" comment="seamonkey-translations-other-2.31-4.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1585</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1585" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585" source="CVE"/>
    <description>
    The WebRTC video-sharing feature in dom/media/MediaManager.cpp in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 does not properly recognize Stop Sharing actions for videos in IFRAME elements, which allows remote attackers to obtain sensitive information from the local camera by maintaining a session after the user tries to discontinue streaming.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102926" comment="seamonkey-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102927" comment="seamonkey-dom-inspector-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102928" comment="seamonkey-irc-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102929" comment="seamonkey-translations-common-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102930" comment="seamonkey-translations-other-2.31-4.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1586</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1586" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586" source="CVE"/>
    <description>
    content/base/src/nsDocument.cpp in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 does not consider whether WebRTC video sharing is occurring, which allows remote attackers to obtain sensitive information from the local camera in certain IFRAME situations by maintaining a session after the user temporarily navigates away.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136921" comment="MozillaFirefox-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136922" comment="MozillaFirefox-translations-common-33.0-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136923" comment="MozillaThunderbird-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136924" comment="MozillaThunderbird-translations-common-31.2.0-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102926" comment="seamonkey-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102927" comment="seamonkey-dom-inspector-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102928" comment="seamonkey-irc-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102929" comment="seamonkey-translations-common-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102930" comment="seamonkey-translations-other-2.31-4.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1587</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1587" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009102550" comment="MozillaFirefox-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102551" comment="MozillaFirefox-branding-upstream-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102552" comment="MozillaFirefox-buildsymbols-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102553" comment="MozillaFirefox-devel-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102554" comment="MozillaFirefox-translations-common-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102555" comment="MozillaFirefox-translations-other-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102921" comment="MozillaThunderbird-31.3.0-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102922" comment="MozillaThunderbird-buildsymbols-31.3.0-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102923" comment="MozillaThunderbird-devel-31.3.0-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102924" comment="MozillaThunderbird-translations-common-31.3.0-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102925" comment="MozillaThunderbird-translations-other-31.3.0-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102559" comment="libfreebl3-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102560" comment="libfreebl3-32bit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102561" comment="libsoftokn3-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102562" comment="libsoftokn3-32bit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102557" comment="mozilla-nspr-4.10.7-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102556" comment="mozilla-nspr-32bit-4.10.7-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102558" comment="mozilla-nspr-devel-4.10.7-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102563" comment="mozilla-nss-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102564" comment="mozilla-nss-32bit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102565" comment="mozilla-nss-certs-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102566" comment="mozilla-nss-certs-32bit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102567" comment="mozilla-nss-devel-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102568" comment="mozilla-nss-sysinit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102569" comment="mozilla-nss-sysinit-32bit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102570" comment="mozilla-nss-tools-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102926" comment="seamonkey-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102927" comment="seamonkey-dom-inspector-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102928" comment="seamonkey-irc-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102929" comment="seamonkey-translations-common-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102930" comment="seamonkey-translations-other-2.31-4.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1588</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1588" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1588" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 34.0 and SeaMonkey before 2.31 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009102550" comment="MozillaFirefox-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102551" comment="MozillaFirefox-branding-upstream-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102552" comment="MozillaFirefox-buildsymbols-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102553" comment="MozillaFirefox-devel-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102554" comment="MozillaFirefox-translations-common-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102555" comment="MozillaFirefox-translations-other-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102559" comment="libfreebl3-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102560" comment="libfreebl3-32bit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102561" comment="libsoftokn3-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102562" comment="libsoftokn3-32bit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102557" comment="mozilla-nspr-4.10.7-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102556" comment="mozilla-nspr-32bit-4.10.7-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102558" comment="mozilla-nspr-devel-4.10.7-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102563" comment="mozilla-nss-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102564" comment="mozilla-nss-32bit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102565" comment="mozilla-nss-certs-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102566" comment="mozilla-nss-certs-32bit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102567" comment="mozilla-nss-devel-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102568" comment="mozilla-nss-sysinit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102569" comment="mozilla-nss-sysinit-32bit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102570" comment="mozilla-nss-tools-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102926" comment="seamonkey-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102927" comment="seamonkey-dom-inspector-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102928" comment="seamonkey-irc-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102929" comment="seamonkey-translations-common-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102930" comment="seamonkey-translations-other-2.31-4.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1589</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1589" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1589" source="CVE"/>
    <description>
    Mozilla Firefox before 34.0 and SeaMonkey before 2.31 provide stylesheets with an incorrect primary namespace, which allows remote attackers to bypass intended access restrictions via an XBL binding.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009102550" comment="MozillaFirefox-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102551" comment="MozillaFirefox-branding-upstream-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102552" comment="MozillaFirefox-buildsymbols-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102553" comment="MozillaFirefox-devel-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102554" comment="MozillaFirefox-translations-common-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102555" comment="MozillaFirefox-translations-other-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102559" comment="libfreebl3-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102560" comment="libfreebl3-32bit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102561" comment="libsoftokn3-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102562" comment="libsoftokn3-32bit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102557" comment="mozilla-nspr-4.10.7-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102556" comment="mozilla-nspr-32bit-4.10.7-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102558" comment="mozilla-nspr-devel-4.10.7-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102563" comment="mozilla-nss-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102564" comment="mozilla-nss-32bit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102565" comment="mozilla-nss-certs-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102566" comment="mozilla-nss-certs-32bit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102567" comment="mozilla-nss-devel-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102568" comment="mozilla-nss-sysinit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102569" comment="mozilla-nss-sysinit-32bit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102570" comment="mozilla-nss-tools-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102926" comment="seamonkey-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102927" comment="seamonkey-dom-inspector-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102928" comment="seamonkey-irc-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102929" comment="seamonkey-translations-common-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102930" comment="seamonkey-translations-other-2.31-4.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1590</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1590" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590" source="CVE"/>
    <description>
    The XMLHttpRequest.prototype.send method in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to cause a denial of service (application crash) via a crafted JavaScript object.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009102550" comment="MozillaFirefox-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102551" comment="MozillaFirefox-branding-upstream-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102552" comment="MozillaFirefox-buildsymbols-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102553" comment="MozillaFirefox-devel-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102554" comment="MozillaFirefox-translations-common-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102555" comment="MozillaFirefox-translations-other-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102921" comment="MozillaThunderbird-31.3.0-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102922" comment="MozillaThunderbird-buildsymbols-31.3.0-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102923" comment="MozillaThunderbird-devel-31.3.0-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102924" comment="MozillaThunderbird-translations-common-31.3.0-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102925" comment="MozillaThunderbird-translations-other-31.3.0-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102559" comment="libfreebl3-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102560" comment="libfreebl3-32bit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102561" comment="libsoftokn3-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102562" comment="libsoftokn3-32bit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102557" comment="mozilla-nspr-4.10.7-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102556" comment="mozilla-nspr-32bit-4.10.7-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102558" comment="mozilla-nspr-devel-4.10.7-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102563" comment="mozilla-nss-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102564" comment="mozilla-nss-32bit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102565" comment="mozilla-nss-certs-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102566" comment="mozilla-nss-certs-32bit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102567" comment="mozilla-nss-devel-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102568" comment="mozilla-nss-sysinit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102569" comment="mozilla-nss-sysinit-32bit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102570" comment="mozilla-nss-tools-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102926" comment="seamonkey-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102927" comment="seamonkey-dom-inspector-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102928" comment="seamonkey-irc-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102929" comment="seamonkey-translations-common-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102930" comment="seamonkey-translations-other-2.31-4.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1591</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1591" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1591" source="CVE"/>
    <description>
    Mozilla Firefox 33.0 and SeaMonkey before 2.31 include path strings in CSP violation reports, which allows remote attackers to obtain sensitive information via a web site that receives a report after a redirect.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009102550" comment="MozillaFirefox-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102551" comment="MozillaFirefox-branding-upstream-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102552" comment="MozillaFirefox-buildsymbols-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102553" comment="MozillaFirefox-devel-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102554" comment="MozillaFirefox-translations-common-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102555" comment="MozillaFirefox-translations-other-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102559" comment="libfreebl3-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102560" comment="libfreebl3-32bit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102561" comment="libsoftokn3-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102562" comment="libsoftokn3-32bit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102557" comment="mozilla-nspr-4.10.7-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102556" comment="mozilla-nspr-32bit-4.10.7-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102558" comment="mozilla-nspr-devel-4.10.7-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102563" comment="mozilla-nss-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102564" comment="mozilla-nss-32bit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102565" comment="mozilla-nss-certs-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102566" comment="mozilla-nss-certs-32bit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102567" comment="mozilla-nss-devel-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102568" comment="mozilla-nss-sysinit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102569" comment="mozilla-nss-sysinit-32bit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102570" comment="mozilla-nss-tools-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102926" comment="seamonkey-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102927" comment="seamonkey-dom-inspector-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102928" comment="seamonkey-irc-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102929" comment="seamonkey-translations-common-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102930" comment="seamonkey-translations-other-2.31-4.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1592</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1592" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsHtml5TreeOperation function in xul.dll in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code by adding a second root element to an HTML5 document during parsing.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009102550" comment="MozillaFirefox-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102551" comment="MozillaFirefox-branding-upstream-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102552" comment="MozillaFirefox-buildsymbols-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102553" comment="MozillaFirefox-devel-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102554" comment="MozillaFirefox-translations-common-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102555" comment="MozillaFirefox-translations-other-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102921" comment="MozillaThunderbird-31.3.0-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102922" comment="MozillaThunderbird-buildsymbols-31.3.0-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102923" comment="MozillaThunderbird-devel-31.3.0-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102924" comment="MozillaThunderbird-translations-common-31.3.0-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102925" comment="MozillaThunderbird-translations-other-31.3.0-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102559" comment="libfreebl3-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102560" comment="libfreebl3-32bit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102561" comment="libsoftokn3-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102562" comment="libsoftokn3-32bit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102557" comment="mozilla-nspr-4.10.7-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102556" comment="mozilla-nspr-32bit-4.10.7-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102558" comment="mozilla-nspr-devel-4.10.7-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102563" comment="mozilla-nss-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102564" comment="mozilla-nss-32bit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102565" comment="mozilla-nss-certs-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102566" comment="mozilla-nss-certs-32bit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102567" comment="mozilla-nss-devel-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102568" comment="mozilla-nss-sysinit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102569" comment="mozilla-nss-sysinit-32bit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102570" comment="mozilla-nss-tools-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102926" comment="seamonkey-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102927" comment="seamonkey-dom-inspector-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102928" comment="seamonkey-irc-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102929" comment="seamonkey-translations-common-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102930" comment="seamonkey-translations-other-2.31-4.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1593</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1593" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593" source="CVE"/>
    <description>
    Stack-based buffer overflow in the mozilla::FileBlockCache::Read function in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code via crafted media content.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009102550" comment="MozillaFirefox-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102551" comment="MozillaFirefox-branding-upstream-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102552" comment="MozillaFirefox-buildsymbols-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102553" comment="MozillaFirefox-devel-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102554" comment="MozillaFirefox-translations-common-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102555" comment="MozillaFirefox-translations-other-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102921" comment="MozillaThunderbird-31.3.0-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102922" comment="MozillaThunderbird-buildsymbols-31.3.0-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102923" comment="MozillaThunderbird-devel-31.3.0-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102924" comment="MozillaThunderbird-translations-common-31.3.0-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102925" comment="MozillaThunderbird-translations-other-31.3.0-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102559" comment="libfreebl3-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102560" comment="libfreebl3-32bit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102561" comment="libsoftokn3-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102562" comment="libsoftokn3-32bit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102557" comment="mozilla-nspr-4.10.7-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102556" comment="mozilla-nspr-32bit-4.10.7-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102558" comment="mozilla-nspr-devel-4.10.7-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102563" comment="mozilla-nss-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102564" comment="mozilla-nss-32bit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102565" comment="mozilla-nss-certs-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102566" comment="mozilla-nss-certs-32bit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102567" comment="mozilla-nss-devel-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102568" comment="mozilla-nss-sysinit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102569" comment="mozilla-nss-sysinit-32bit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102570" comment="mozilla-nss-tools-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102926" comment="seamonkey-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102927" comment="seamonkey-dom-inspector-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102928" comment="seamonkey-irc-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102929" comment="seamonkey-translations-common-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102930" comment="seamonkey-translations-other-2.31-4.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1594</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1594" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594" source="CVE"/>
    <description>
    Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 might allow remote attackers to execute arbitrary code by leveraging an incorrect cast from the BasicThebesLayer data type to the BasicContainerLayer data type.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009102550" comment="MozillaFirefox-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102551" comment="MozillaFirefox-branding-upstream-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102552" comment="MozillaFirefox-buildsymbols-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102553" comment="MozillaFirefox-devel-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102554" comment="MozillaFirefox-translations-common-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102555" comment="MozillaFirefox-translations-other-34.0.5-5.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102921" comment="MozillaThunderbird-31.3.0-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102922" comment="MozillaThunderbird-buildsymbols-31.3.0-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102923" comment="MozillaThunderbird-devel-31.3.0-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102924" comment="MozillaThunderbird-translations-common-31.3.0-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102925" comment="MozillaThunderbird-translations-other-31.3.0-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102559" comment="libfreebl3-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102560" comment="libfreebl3-32bit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102561" comment="libsoftokn3-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102562" comment="libsoftokn3-32bit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102557" comment="mozilla-nspr-4.10.7-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102556" comment="mozilla-nspr-32bit-4.10.7-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102558" comment="mozilla-nspr-devel-4.10.7-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102563" comment="mozilla-nss-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102564" comment="mozilla-nss-32bit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102565" comment="mozilla-nss-certs-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102566" comment="mozilla-nss-certs-32bit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102567" comment="mozilla-nss-devel-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102568" comment="mozilla-nss-sysinit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102569" comment="mozilla-nss-sysinit-32bit-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102570" comment="mozilla-nss-tools-3.17.2-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102926" comment="seamonkey-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102927" comment="seamonkey-dom-inspector-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102928" comment="seamonkey-irc-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102929" comment="seamonkey-translations-common-2.31-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102930" comment="seamonkey-translations-other-2.31-4.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1748</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1748" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1748" source="CVE"/>
    <description>
    The ScrollView::paint function in platform/scroll/ScrollView.cpp in Blink, as used in Google Chrome before 35.0.1916.114, allows remote attackers to spoof the UI by extending scrollbar painting into the parent frame.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125580" comment="libjavascriptcoregtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125581" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125582" comment="libjavascriptcoregtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125583" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125584" comment="libwebkitgtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125585" comment="libwebkitgtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125586" comment="libwebkitgtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125587" comment="libwebkitgtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125588" comment="libwebkitgtk-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125589" comment="libwebkitgtk2-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125590" comment="libwebkitgtk3-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125591" comment="libwebkitgtk3-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125592" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125593" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125594" comment="typelib-1_0-WebKit-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125595" comment="typelib-1_0-WebKit-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125596" comment="webkit-jsc-1-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125597" comment="webkit-jsc-3-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125598" comment="webkitgtk-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125599" comment="webkitgtk3-2.4.10-13.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1876</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1876" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1876" source="CVE"/>
    <description>
    The unpacker::redirect_stdio function in unpack.cpp in unpack200 in OpenJDK 6, 7, and 8; Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 does not securely create temporary files when a log file cannot be opened, which allows local users to overwrite arbitrary files via a symlink attack on /tmp/unpack.log.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1909</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1909" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1909" source="CVE"/>
    <description>
    Integer signedness error in system/core/adb/adb_client.c in Android Debug Bridge (ADB) for Android 4.4 in the Android SDK Platform Tools 18.0.1 allows ADB servers to execute arbitrary code via a negative length value, which bypasses a signed comparison and triggers a stack-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136935" comment="android-tools-4.2.2_r1-5.2.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1912</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1912" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1912" source="CVE"/>
    <description>
    Buffer overflow in the socket.recvfrom_into function in Modules/socketmodule.c in Python 2.5 before 2.7.7, 3.x before 3.3.4, and 3.4.x before 3.4rc1 allows remote attackers to execute arbitrary code via a crafted string.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137609" comment="libpython2_7-1_0-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137610" comment="libpython2_7-1_0-32bit-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137611" comment="python-base-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137612" comment="python-devel-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137613" comment="python-xml-2.7.8-1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141943" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1943</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1943" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1943" source="CVE"/>
    <description>
    Fine Free file before 5.17 allows context-dependent attackers to cause a denial of service (infinite recursion, CPU consumption, and crash) via a crafted indirect offset value in the magic of a file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1959</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-1959" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1959" source="CVE"/>
    <description>
    lib/x509/verify.c in GnuTLS before 3.1.21 and 3.2.x before 3.2.11 treats version 1 X.509 certificates as intermediate CAs, which allows remote attackers to bypass intended restrictions by leveraging a X.509 V1 certificate from a trusted CA to issue new certificates.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137248" comment="gnutls-3.2.18-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137249" comment="libgnutls-devel-3.2.18-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137250" comment="libgnutls-openssl27-3.2.18-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137251" comment="libgnutls28-3.2.18-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137252" comment="libgnutls28-32bit-3.2.18-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2270</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-2270" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2270" source="CVE"/>
    <description>
    softmagic.c in file before 5.17 and libmagic allows context-dependent attackers to cause a denial of service (out-of-bounds memory access and crash) via crafted offsets in the softmagic of a PE executable.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2281</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-2281" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2281" source="CVE"/>
    <description>
    The nfs_name_snoop_add_name function in epan/dissectors/packet-nfs.c in the NFS dissector in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 does not validate a certain length value, which allows remote attackers to cause a denial of service (memory corruption and application crash) via a crafted NFS packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2282</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-2282" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2282" source="CVE"/>
    <description>
    The dissect_protocol_data_parameter function in epan/dissectors/packet-m3ua.c in the M3UA dissector in Wireshark 1.10.x before 1.10.6 does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) via a crafted SS7 MTP3 packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2283</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-2283" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2283" source="CVE"/>
    <description>
    epan/dissectors/packet-rlc in the RLC dissector in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 uses inconsistent memory-management approaches, which allows remote attackers to cause a denial of service (use-after-free error and application crash) via a crafted UMTS Radio Link Control packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2284</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-2284" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2284" source="CVE"/>
    <description>
    The Linux implementation of the ICMP-MIB in Net-SNMP 5.5 before 5.5.2.1, 5.6.x before 5.6.2.1, and 5.7.x before 5.7.2.1 does not properly validate input, which allows remote attackers to cause a denial of service via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137684" comment="libsnmp30-5.7.3-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137685" comment="libsnmp30-32bit-5.7.3-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137686" comment="net-snmp-5.7.3-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137687" comment="net-snmp-devel-5.7.3-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137688" comment="perl-SNMP-5.7.3-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137689" comment="snmp-mibs-5.7.3-1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2285</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-2285" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2285" source="CVE"/>
    <description>
    The perl_trapd_handler function in perl/TrapReceiver/TrapReceiver.xs in Net-SNMP 5.7.3.pre3 and earlier, when using certain Perl versions, allows remote attackers to cause a denial of service (snmptrapd crash) via an empty community string in an SNMP trap, which triggers a NULL pointer dereference within the newSVpv function in Perl.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137684" comment="libsnmp30-5.7.3-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137685" comment="libsnmp30-32bit-5.7.3-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137686" comment="net-snmp-5.7.3-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137687" comment="net-snmp-devel-5.7.3-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137688" comment="perl-SNMP-5.7.3-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137689" comment="snmp-mibs-5.7.3-1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2299</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-2299" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2299" source="CVE"/>
    <description>
    Buffer overflow in the mpeg_read function in wiretap/mpeg.c in the MPEG parser in Wireshark 1.8.x before 1.8.13 and 1.10.x before 1.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a large record in MPEG data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2327</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-2327" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2327" source="CVE"/>
    <description>
    Cross-site request forgery (CSRF) vulnerability in Cacti 0.8.7g, 0.8.8b, and earlier allows remote attackers to hijack the authentication of users for unspecified commands, as demonstrated by requests that (1) modify binary files, (2) modify configurations, or (3) add arbitrary users.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107602" comment="cacti-0.8.8c-4.4.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2397</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-2397" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2397" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u51 and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2398</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-2398" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2398" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JavaFX 2.2.51; and JRockit R27.8.1 and R28.3.1 allows remote authenticated users to affect integrity via unknown vectors related to Javadoc.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2402</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-2402" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2402" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u51 and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2014-0432 and CVE-2014-0455.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2403</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-2403" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2403" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality via vectors related to JAXP.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2412</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-2412" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2412" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, SE 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT, a different vulnerability than CVE-2014-0451.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142413" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2413</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-2413" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2413" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u51 and 8, and Java SE Embedded 7u51, allows remote attackers to affect integrity via unknown vectors related to Libraries.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2414</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-2414" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2414" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAXB.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2421</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-2421" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2421" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JavaFX 2.2.51; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2423</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-2423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2423" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAX-WS, a different vulnerability than CVE-2014-0452 and CVE-2014-0458.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2427</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-2427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2427" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2483</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-2483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2483" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java SE component in Oracle Java SE Java SE 7u60 and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2014-4223. NOTE: the previous information is from the July 2014 CPU. Oracle has not commented on another vendor's claim that the issue is related to improper restriction of the "use of privileged annotations."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2490</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-2490" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2490" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java SE component in Oracle Java SE 7u60 and SE 8u5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2497</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-2497" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2497" source="CVE"/>
    <description>
    The gdImageCreateFromXpm function in gdxpm.c in libgd, as used in PHP 5.4.26 and earlier, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted color table in an XPM file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137182" comment="gd-2.1.0-7.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137183" comment="libgd3-2.1.0-7.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137184" comment="libgd3-32bit-2.1.0-7.2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2524</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-2524" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2524" source="CVE"/>
    <description>
    The _rl_tropen function in util.c in GNU readline before 6.3 patch 3 allows local users to create or overwrite arbitrary files via a symlink attack on a /var/tmp/rltrace.[PID] file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137040" comment="bash-4.2-75.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137041" comment="bash-doc-4.2-75.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137042" comment="libreadline6-6.2-75.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137043" comment="readline-devel-6.2-75.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137044" comment="readline-doc-6.2-75.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2525</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-2525" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2525" source="CVE"/>
    <description>
    Heap-based buffer overflow in the yaml_parser_scan_uri_escapes function in LibYAML before 0.1.6 allows context-dependent attackers to execute arbitrary code via a long sequence of percent-encoded characters in a URI in a YAML file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137794" comment="libyaml-0-2-0.1.6-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106165" comment="perl-YAML-LibYAML-0.59-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2583</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-2583" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2583" source="CVE"/>
    <description>
    Multiple directory traversal vulnerabilities in pam_timestamp.c in the pam_timestamp module for Linux-PAM (aka pam) 1.1.8 allow local users to create arbitrary files or possibly bypass authentication via a .. (dot dot) in the (1) PAM_RUSER value to the get_ruser function or (2) PAM_TTY value to the check_tty function, which is used by the format_timestamp_name function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137820" comment="pam-1.1.8-11.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137821" comment="pam-32bit-1.1.8-11.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137822" comment="pam-devel-1.1.8-11.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2667</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-2667" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2667" source="CVE"/>
    <description>
    Race condition in the _get_masked_mode function in Lib/os.py in Python 3.2 through 3.5, when exist_ok is set to true and multiple threads are used, might allow local users to bypass intended file permissions by leveraging a separate application vulnerability before the umask has been set to the expected value.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137614" comment="libpython3_4m1_0-3.4.1-4.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137615" comment="python3-base-3.4.1-4.2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2707</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-2707" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2707" source="CVE"/>
    <description>
    cups-browsed in cups-filters 1.0.41 before 1.0.51 allows remote IPP printers to execute arbitrary commands via shell metacharacters in the (1) model or (2) PDL, related to "System V interface scripts generated for queues."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137103" comment="cups-filters-foomatic-rip-1.0.58-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137104" comment="cups-filters-ghostscript-1.0.58-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2855</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-2855" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2855" source="CVE"/>
    <description>
    The check_secret function in authenticate.c in rsync 3.1.0 and earlier allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a user name which does not exist in the secrets file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137864" comment="rsync-3.1.1-2.1.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2892</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-2892" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2892" source="CVE"/>
    <description>
    Heap-based buffer overflow in the get_answer function in mmsh.c in libmms before 0.6.4 allows remote attackers to execute arbitrary code via a long line in an MMS over HTTP (MMSH) server response.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137541" comment="libmms-devel-0.6.4-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137542" comment="libmms0-0.6.4-2.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2907</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-2907" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2907" source="CVE"/>
    <description>
    The srtp_add_address function in epan/dissectors/packet-rtp.c in the RTP dissector in Wireshark 1.10.x before 1.10.7 does not properly update SRTP conversation data, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2957</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-2957" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2957" source="CVE"/>
    <description>
    The dmarc_process function in dmarc.c in Exim before 4.82.1, when EXPERIMENTAL_DMARC is enabled, allows remote attackers to execute arbitrary code via the From header in an email, which is passed to the expand_string function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137159" comment="exim-4.83-3.1.8 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2972</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-2972" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2972" source="CVE"/>
    <description>
    expand.c in Exim before 4.83 expands mathematical comparisons twice, which allows local users to gain privileges and execute arbitrary commands via a crafted lookup value.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137159" comment="exim-4.83-3.1.8 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2977</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-2977" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2977" source="CVE"/>
    <description>
    Multiple integer signedness errors in the Dispatch_Write function in proxy/dispatcher/idirectfbsurface_dispatcher.c in DirectFB 1.4.13 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the Voodoo interface, which triggers a stack-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109181" comment="DirectFB-1.7.5-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109182" comment="DirectFB-Mesa-1.7.5-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109183" comment="DirectFB-devel-1.7.5-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109184" comment="DirectFB-devel-32bit-1.7.5-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109185" comment="DirectFB-doc-1.7.5-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109186" comment="DirectFB-libSDL-1.7.5-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109187" comment="DirectFB-libvncclient-1.7.5-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109188" comment="lib++dfb-1_7-5-1.7.5-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109189" comment="lib++dfb-devel-1.7.5-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109179" comment="libdirectfb-1_6-0-1.6.3-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109180" comment="libdirectfb-1_6-0-32bit-1.6.3-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109190" comment="libdirectfb-1_7-5-1.7.5-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109191" comment="libdirectfb-1_7-5-32bit-1.7.5-3.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2978</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-2978" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2978" source="CVE"/>
    <description>
    The Dispatch_Write function in proxy/dispatcher/idirectfbsurface_dispatcher.c in DirectFB 1.4.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the Voodoo interface, which triggers an out-of-bounds write.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109181" comment="DirectFB-1.7.5-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109182" comment="DirectFB-Mesa-1.7.5-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109183" comment="DirectFB-devel-1.7.5-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109184" comment="DirectFB-devel-32bit-1.7.5-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109185" comment="DirectFB-doc-1.7.5-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109186" comment="DirectFB-libSDL-1.7.5-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109187" comment="DirectFB-libvncclient-1.7.5-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109188" comment="lib++dfb-1_7-5-1.7.5-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109189" comment="lib++dfb-devel-1.7.5-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109179" comment="libdirectfb-1_6-0-1.6.3-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109180" comment="libdirectfb-1_6-0-32bit-1.6.3-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109190" comment="libdirectfb-1_7-5-1.7.5-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109191" comment="libdirectfb-1_7-5-32bit-1.7.5-3.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3121</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3121" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3121" source="CVE"/>
    <description>
    rxvt-unicode before 9.20 does not properly handle OSC escape sequences, which allows user-assisted remote attackers to manipulate arbitrary X window properties and execute arbitrary commands.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137867" comment="rxvt-unicode-9.20-2.1.4 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3124</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3124" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3124" source="CVE"/>
    <description>
    The HVMOP_set_mem_type control in Xen 4.1 through 4.4.x allows local guest HVM administrators to cause a denial of service (hypervisor crash) or possibly execute arbitrary code by leveraging a separate qemu-dm vulnerability to trigger invalid page table translations for unspecified memory page types.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3158</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3158" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3158" source="CVE"/>
    <description>
    Integer overflow in the getword function in options.c in pppd in Paul's PPP Package (ppp) before 2.4.7 allows attackers to "access privileged options" via a long word in an options file, which triggers a heap-based buffer overflow that "[corrupts] security-relevant variables."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137838" comment="ppp-2.4.7-2.1.3 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3230</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3230" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3230" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137836" comment="perl-LWP-Protocol-https-6.04-6.1.3 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3421</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3421" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3421" source="CVE"/>
    <description>
    lisp/gnus/gnus-fun.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on the /tmp/gnus.face.ppm temporary file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137144" comment="emacs-24.3-17.2.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137145" comment="emacs-info-24.3-17.2.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137146" comment="emacs-nox-24.3-17.2.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137147" comment="emacs-x11-24.3-17.2.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137148" comment="etags-24.3-17.2.10 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3422</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3422" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3422" source="CVE"/>
    <description>
    lisp/emacs-lisp/find-gc.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on a temporary file under /tmp/esrc/.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137144" comment="emacs-24.3-17.2.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137145" comment="emacs-info-24.3-17.2.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137146" comment="emacs-nox-24.3-17.2.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137147" comment="emacs-x11-24.3-17.2.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137148" comment="etags-24.3-17.2.10 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3423</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3423" source="CVE"/>
    <description>
    lisp/net/browse-url.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on a /tmp/Mosaic.##### temporary file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137144" comment="emacs-24.3-17.2.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137145" comment="emacs-info-24.3-17.2.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137146" comment="emacs-nox-24.3-17.2.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137147" comment="emacs-x11-24.3-17.2.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137148" comment="etags-24.3-17.2.10 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3424</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3424" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3424" source="CVE"/>
    <description>
    lisp/net/tramp-sh.el in GNU Emacs 24.3 and earlier allows local users to overwrite arbitrary files via a symlink attack on a /tmp/tramp.##### temporary file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137144" comment="emacs-24.3-17.2.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137145" comment="emacs-info-24.3-17.2.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137146" comment="emacs-nox-24.3-17.2.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137147" comment="emacs-x11-24.3-17.2.10 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137148" comment="etags-24.3-17.2.10 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3462</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3462" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3462" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009147095" comment="encfs-1.8.1-25.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147096" comment="encfs-lang-1.8.1-25.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3466</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3466" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3466" source="CVE"/>
    <description>
    Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137248" comment="gnutls-3.2.18-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137249" comment="libgnutls-devel-3.2.18-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137250" comment="libgnutls-openssl27-3.2.18-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137251" comment="libgnutls28-3.2.18-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137252" comment="libgnutls28-32bit-3.2.18-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3467</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3467" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the DER decoder in GNU Libtasn1 before 3.6, as used in GnuTLS, allow remote attackers to cause a denial of service (out-of-bounds read) via crafted ASN.1 data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137712" comment="libtasn1-3.7-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137713" comment="libtasn1-6-3.7-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137714" comment="libtasn1-6-32bit-3.7-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137715" comment="libtasn1-devel-3.7-2.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3468</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3468" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468" source="CVE"/>
    <description>
    The asn1_get_bit_der function in GNU Libtasn1 before 3.6 does not properly report an error when a negative bit length is identified, which allows context-dependent attackers to cause out-of-bounds access via crafted ASN.1 data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137712" comment="libtasn1-3.7-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137713" comment="libtasn1-6-3.7-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137714" comment="libtasn1-6-32bit-3.7-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137715" comment="libtasn1-devel-3.7-2.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3469</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3469" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469" source="CVE"/>
    <description>
    The (1) asn1_read_value_type and (2) asn1_read_value functions in GNU Libtasn1 before 3.6 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via a NULL value in an ivalue argument.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137712" comment="libtasn1-3.7-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137713" comment="libtasn1-6-3.7-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137714" comment="libtasn1-6-32bit-3.7-2.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137715" comment="libtasn1-devel-3.7-2.1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3470</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3470" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470" source="CVE"/>
    <description>
    The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h, when an anonymous ECDH cipher suite is used, allows remote attackers to cause a denial of service (NULL pointer dereference and client crash) by triggering a NULL certificate value.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124418" comment="libopenssl0_9_8-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124419" comment="libopenssl0_9_8-32bit-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3477</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3477" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3477" source="CVE"/>
    <description>
    The dbus-daemon in D-Bus 1.2.x through 1.4.x, 1.6.x before 1.6.20, and 1.8.x before 1.8.4, sends an AccessDenied error to the service instead of a client when the client is prohibited from accessing the service, which allows local users to cause a denial of service (initialization failure and exit) or possibly conduct a side-channel attack via a D-Bus message to an inactive service.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137122" comment="dbus-1-1.8.8-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137123" comment="dbus-1-devel-1.8.8-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137124" comment="dbus-1-x11-1.8.8-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137125" comment="libdbus-1-3-1.8.8-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137126" comment="libdbus-1-3-32bit-1.8.8-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3493</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3493" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3493" source="CVE"/>
    <description>
    The push_ascii function in smbd in Samba 3.6.x before 3.6.24, 4.0.x before 4.0.19, and 4.1.x before 4.1.9 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) via an attempt to read a Unicode pathname without specifying use of Unicode, leading to a character-set conversion failure that triggers an invalid pointer dereference.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137424" comment="libdcerpc-binding0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137425" comment="libdcerpc-binding0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137426" comment="libdcerpc0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137427" comment="libdcerpc0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137428" comment="libgensec0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137429" comment="libgensec0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137430" comment="libndr-krb5pac0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137431" comment="libndr-krb5pac0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137432" comment="libndr-nbt0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137433" comment="libndr-nbt0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137434" comment="libndr-standard0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137435" comment="libndr-standard0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137436" comment="libndr0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137437" comment="libndr0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137438" comment="libnetapi0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137439" comment="libnetapi0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137440" comment="libpdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137441" comment="libpdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137442" comment="libregistry0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137443" comment="libsamba-credentials0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137444" comment="libsamba-credentials0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137445" comment="libsamba-hostconfig0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137446" comment="libsamba-hostconfig0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137447" comment="libsamba-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137448" comment="libsamba-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137449" comment="libsamdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137450" comment="libsamdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137451" comment="libsmbclient-devel-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137452" comment="libsmbclient-raw0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137453" comment="libsmbclient-raw0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137454" comment="libsmbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137455" comment="libsmbconf0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137456" comment="libsmbconf0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137457" comment="libsmbldap0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137458" comment="libsmbldap0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137459" comment="libtevent-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137460" comment="libtevent-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137461" comment="libwbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137462" comment="libwbclient0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137463" comment="samba-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137464" comment="samba-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137465" comment="samba-client-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137466" comment="samba-client-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137467" comment="samba-doc-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137468" comment="samba-libs-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137469" comment="samba-libs-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137470" comment="samba-winbind-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137471" comment="samba-winbind-32bit-4.1.12-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3494</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3494" source="CVE"/>
    <description>
    kio/usernotificationhandler.cpp in the POP3 kioslave in kdelibs 4.10.95 before 4.13.3 does not properly generate warning notifications, which allows man-in-the-middle attackers to obtain sensitive information via an invalid certificate.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137299" comment="kdelibs4-4.14.2-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137300" comment="kdelibs4-core-4.14.2-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137301" comment="kdelibs4-doc-4.14.2-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137302" comment="libkde4-4.14.2-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137303" comment="libkde4-devel-4.14.2-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137304" comment="libkdecore4-4.14.2-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137305" comment="libkdecore4-devel-4.14.2-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137306" comment="libksuseinstall-devel-4.14.2-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137307" comment="libksuseinstall1-4.14.2-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3504</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3504" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3504" source="CVE"/>
    <description>
    The (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ssl_cert_certificate functions in Serf 0.2.0 through 1.3.x before 1.3.7 does not properly handle a NUL byte in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137675" comment="libserf-1-1-1.3.7-2.1.3 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3505</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3505" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3505" source="CVE"/>
    <description>
    Double free vulnerability in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (application crash) via crafted DTLS packets that trigger an error condition.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124418" comment="libopenssl0_9_8-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124419" comment="libopenssl0_9_8-32bit-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3506</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3506" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3506" source="CVE"/>
    <description>
    d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via crafted DTLS handshake messages that trigger memory allocations corresponding to large length values.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124418" comment="libopenssl0_9_8-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124419" comment="libopenssl0_9_8-32bit-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3507</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3507" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3507" source="CVE"/>
    <description>
    Memory leak in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via zero-length DTLS fragments that trigger improper handling of the return value of a certain insert function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124418" comment="libopenssl0_9_8-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124419" comment="libopenssl0_9_8-32bit-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3508</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3508" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3508" source="CVE"/>
    <description>
    The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '\0' characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading output from X509_name_oneline, X509_name_print_ex, and unspecified other functions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124418" comment="libopenssl0_9_8-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124419" comment="libopenssl0_9_8-32bit-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3509</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3509" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3509" source="CVE"/>
    <description>
    Race condition in the ssl_parse_serverhello_tlsext function in t1_lib.c in OpenSSL 1.0.0 before 1.0.0n and 1.0.1 before 1.0.1i, when multithreading and session resumption are used, allows remote SSL servers to cause a denial of service (memory overwrite and client application crash) or possibly have unspecified other impact by sending Elliptic Curve (EC) Supported Point Formats Extension data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3510</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3510" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3510" source="CVE"/>
    <description>
    The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote DTLS servers to cause a denial of service (NULL pointer dereference and client application crash) via a crafted handshake message in conjunction with a (1) anonymous DH or (2) anonymous ECDH ciphersuite.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124418" comment="libopenssl0_9_8-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124419" comment="libopenssl0_9_8-32bit-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3511</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3511" source="CVE"/>
    <description>
    The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1 before 1.0.1i allows man-in-the-middle attackers to force the use of TLS 1.0 by triggering ClientHello message fragmentation in communication between a client and server that both support later TLS versions, related to a "protocol downgrade" issue.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3512</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3512" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3512" source="CVE"/>
    <description>
    Multiple buffer overflows in crypto/srp/srp_lib.c in the SRP implementation in OpenSSL 1.0.1 before 1.0.1i allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an invalid SRP (1) g, (2) A, or (3) B parameter.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3513</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3513" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3513" source="CVE"/>
    <description>
    Memory leak in d1_srtp.c in the DTLS SRTP extension in OpenSSL 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted handshake message.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009101697" comment="libopenssl-devel-1.0.1j-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101698" comment="libopenssl-devel-32bit-1.0.1j-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101699" comment="libopenssl1_0_0-1.0.1j-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101700" comment="libopenssl1_0_0-32bit-1.0.1j-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101701" comment="libopenssl1_0_0-hmac-1.0.1j-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101702" comment="libopenssl1_0_0-hmac-32bit-1.0.1j-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101703" comment="openssl-1.0.1j-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101704" comment="openssl-doc-1.0.1j-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3522</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3522" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3522" source="CVE"/>
    <description>
    The Serf RA layer in Apache Subversion 1.4.0 through 1.7.x before 1.7.18 and 1.8.x before 1.8.10 does not properly handle wildcards in the Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137877" comment="subversion-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137878" comment="subversion-devel-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137879" comment="subversion-perl-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137880" comment="subversion-python-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137881" comment="subversion-server-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137882" comment="subversion-tools-1.8.10-2.4.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3523</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3523" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3523" source="CVE"/>
    <description>
    Memory leak in the winnt_accept function in server/mpm/winnt/child.c in the WinNT MPM in the Apache HTTP Server 2.4.x before 2.4.10 on Windows, when the default AcceptFilter is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted requests.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136944" comment="apache2-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136945" comment="apache2-devel-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136946" comment="apache2-doc-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136947" comment="apache2-example-pages-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136948" comment="apache2-prefork-2.4.10-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136949" comment="apache2-utils-2.4.10-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3524</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3524" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3524" source="CVE"/>
    <description>
    Apache OpenOffice before 4.1.1 allows remote attackers to execute arbitrary commands and possibly have other unspecified impact via a crafted Calc spreadsheet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137639" comment="libreoffice-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137640" comment="libreoffice-base-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137641" comment="libreoffice-base-drivers-mysql-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137642" comment="libreoffice-calc-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137643" comment="libreoffice-calc-extensions-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137644" comment="libreoffice-draw-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137645" comment="libreoffice-filters-optional-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137646" comment="libreoffice-gnome-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137647" comment="libreoffice-icon-theme-galaxy-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137648" comment="libreoffice-icon-theme-hicontrast-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137649" comment="libreoffice-icon-theme-oxygen-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137650" comment="libreoffice-icon-theme-sifr-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137651" comment="libreoffice-icon-theme-tango-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137652" comment="libreoffice-impress-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137653" comment="libreoffice-kde4-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137654" comment="libreoffice-l10n-cs-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137655" comment="libreoffice-l10n-da-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137656" comment="libreoffice-l10n-de-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137657" comment="libreoffice-l10n-el-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137658" comment="libreoffice-l10n-en-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137659" comment="libreoffice-l10n-es-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137660" comment="libreoffice-l10n-fr-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137661" comment="libreoffice-l10n-hu-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137662" comment="libreoffice-l10n-it-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137663" comment="libreoffice-l10n-ja-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137664" comment="libreoffice-l10n-pl-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137665" comment="libreoffice-l10n-ru-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137666" comment="libreoffice-mailmerge-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137667" comment="libreoffice-math-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137668" comment="libreoffice-pyuno-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137669" comment="libreoffice-writer-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137670" comment="libreoffice-writer-extensions-4.3.2.2-1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3528</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3528" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3528" source="CVE"/>
    <description>
    Apache Subversion 1.0.0 through 1.7.x before 1.7.17 and 1.8.x before 1.8.10 uses an MD5 hash of the URL and authentication realm to store cached credentials, which makes it easier for remote servers to obtain the credentials via a crafted authentication realm.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137877" comment="subversion-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137878" comment="subversion-devel-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137879" comment="subversion-perl-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137880" comment="subversion-python-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137881" comment="subversion-server-1.8.10-2.4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137882" comment="subversion-tools-1.8.10-2.4.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3532</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3532" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3532" source="CVE"/>
    <description>
    dbus 1.3.0 before 1.6.22 and 1.8.x before 1.8.6, when running on Linux 2.6.37-rc4 or later, allows local users to cause a denial of service (system-bus disconnect of other services or applications) by sending a message containing a file descriptor, then exceeding the maximum recursion depth before the initial message is forwarded.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137122" comment="dbus-1-1.8.8-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137123" comment="dbus-1-devel-1.8.8-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137124" comment="dbus-1-x11-1.8.8-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137125" comment="libdbus-1-3-1.8.8-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137126" comment="libdbus-1-3-32bit-1.8.8-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3533</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3533" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3533" source="CVE"/>
    <description>
    dbus 1.3.0 before 1.6.22 and 1.8.x before 1.8.6 allows local users to cause a denial of service (disconnect) via a certain sequence of crafted messages that cause the dbus-daemon to forward a message containing an invalid file descriptor.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137122" comment="dbus-1-1.8.8-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137123" comment="dbus-1-devel-1.8.8-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137124" comment="dbus-1-x11-1.8.8-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137125" comment="libdbus-1-3-1.8.8-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137126" comment="libdbus-1-3-32bit-1.8.8-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3537</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3537" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3537" source="CVE"/>
    <description>
    The web interface in CUPS before 1.7.4 allows local users in the lp group to read arbitrary files via a symlink attack on a file in /var/cache/cups/rss/.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137098" comment="cups-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137099" comment="cups-client-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137100" comment="cups-devel-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137101" comment="cups-libs-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137102" comment="cups-libs-32bit-1.5.4-21.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3538</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3538" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3538" source="CVE"/>
    <description>
    file before 5.19 does not properly restrict the amount of data read during a regex search, which allows remote attackers to cause a denial of service (CPU consumption) via a crafted file that triggers backtracking during processing of an awk rule.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-7345.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3539</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3539" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3539" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106932" comment="python-rope-0.9.4-8.4.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3540</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3540" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3540" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2014-0114.  Reason: This candidate is a duplicate of CVE-2014-0114.  CVE abstraction content decisions did not require a second ID.  Notes: All CVE users should reference CVE-2014-0114 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136941" comment="apache-commons-beanutils-1.9.2-2.1.10 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3560</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3560" source="CVE"/>
    <description>
    NetBIOS name services daemon (nmbd) in Samba 4.0.x before 4.0.21 and 4.1.x before 4.1.11 allows remote attackers to execute arbitrary code via unspecified vectors that modify heap memory, involving a sizeof operation on an incorrect variable in the unstrcpy macro in string_wrappers.h.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137424" comment="libdcerpc-binding0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137425" comment="libdcerpc-binding0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137426" comment="libdcerpc0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137427" comment="libdcerpc0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137428" comment="libgensec0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137429" comment="libgensec0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137430" comment="libndr-krb5pac0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137431" comment="libndr-krb5pac0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137432" comment="libndr-nbt0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137433" comment="libndr-nbt0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137434" comment="libndr-standard0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137435" comment="libndr-standard0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137436" comment="libndr0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137437" comment="libndr0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137438" comment="libnetapi0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137439" comment="libnetapi0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137440" comment="libpdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137441" comment="libpdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137442" comment="libregistry0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137443" comment="libsamba-credentials0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137444" comment="libsamba-credentials0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137445" comment="libsamba-hostconfig0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137446" comment="libsamba-hostconfig0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137447" comment="libsamba-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137448" comment="libsamba-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137449" comment="libsamdb0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137450" comment="libsamdb0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137451" comment="libsmbclient-devel-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137452" comment="libsmbclient-raw0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137453" comment="libsmbclient-raw0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137454" comment="libsmbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137455" comment="libsmbconf0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137456" comment="libsmbconf0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137457" comment="libsmbldap0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137458" comment="libsmbldap0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137459" comment="libtevent-util0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137460" comment="libtevent-util0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137461" comment="libwbclient0-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137462" comment="libwbclient0-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137463" comment="samba-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137464" comment="samba-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137465" comment="samba-client-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137466" comment="samba-client-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137467" comment="samba-doc-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137468" comment="samba-libs-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137469" comment="samba-libs-32bit-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137470" comment="samba-winbind-4.1.12-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137471" comment="samba-winbind-32bit-4.1.12-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3564</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3564" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3564" source="CVE"/>
    <description>
    Multiple heap-based buffer overflows in the status_handler function in (1) engine-gpgsm.c and (2) engine-uiserver.c in GPGME before 1.5.1 allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to "different line lengths in a specific order."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137254" comment="gpgme-1.5.1-2.1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137255" comment="libgpgme-devel-1.5.1-2.1.8 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137256" comment="libgpgme11-1.5.1-2.1.8 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3565</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3565" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3565" source="CVE"/>
    <description>
    snmplib/mib.c in net-snmp 5.7.0 and earlier, when the -OQ option is used, allows remote attackers to cause a denial of service (snmptrapd crash) via a crafted SNMP trap message, which triggers a conversion to the variable type designated in the MIB file, as demonstrated by a NULL type in an ifMtu trap message.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137684" comment="libsnmp30-5.7.3-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137685" comment="libsnmp30-32bit-5.7.3-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137686" comment="net-snmp-5.7.3-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137687" comment="net-snmp-devel-5.7.3-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137688" comment="perl-SNMP-5.7.3-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137689" comment="snmp-mibs-5.7.3-1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3566</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3566" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" source="CVE"/>
    <description>
    The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009101244" comment="claws-mail-3.11.0-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101245" comment="claws-mail-devel-3.11.0-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101246" comment="claws-mail-lang-3.11.0-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105731" comment="java-1_7_0-openjdk-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105732" comment="java-1_7_0-openjdk-accessibility-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105728" comment="java-1_7_0-openjdk-bootstrap-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105729" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105730" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105733" comment="java-1_7_0-openjdk-demo-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105734" comment="java-1_7_0-openjdk-devel-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105735" comment="java-1_7_0-openjdk-headless-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105736" comment="java-1_7_0-openjdk-javadoc-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105737" comment="java-1_7_0-openjdk-src-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124418" comment="libopenssl0_9_8-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124419" comment="libopenssl0_9_8-32bit-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101362" comment="libserf-1.3.8-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101334" comment="libserf-1-0-1.1.1-2.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101361" comment="libserf-1-1-1.3.8-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101363" comment="libserf-devel-1.3.8-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135911" comment="monit-5.20.0-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135912" comment="monit-doc-5.20.0-2.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3567</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3567" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567" source="CVE"/>
    <description>
    Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009101697" comment="libopenssl-devel-1.0.1j-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101698" comment="libopenssl-devel-32bit-1.0.1j-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124418" comment="libopenssl0_9_8-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124419" comment="libopenssl0_9_8-32bit-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101699" comment="libopenssl1_0_0-1.0.1j-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101700" comment="libopenssl1_0_0-32bit-1.0.1j-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101701" comment="libopenssl1_0_0-hmac-1.0.1j-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101702" comment="libopenssl1_0_0-hmac-32bit-1.0.1j-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101703" comment="openssl-1.0.1j-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101704" comment="openssl-doc-1.0.1j-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3568</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3568" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568" source="CVE"/>
    <description>
    OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j does not properly enforce the no-ssl3 build option, which allows remote attackers to bypass intended access restrictions via an SSL 3.0 handshake, related to s23_clnt.c and s23_srvr.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009101697" comment="libopenssl-devel-1.0.1j-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101698" comment="libopenssl-devel-32bit-1.0.1j-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124418" comment="libopenssl0_9_8-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124419" comment="libopenssl0_9_8-32bit-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101699" comment="libopenssl1_0_0-1.0.1j-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101700" comment="libopenssl1_0_0-32bit-1.0.1j-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101701" comment="libopenssl1_0_0-hmac-1.0.1j-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101702" comment="libopenssl1_0_0-hmac-32bit-1.0.1j-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101703" comment="openssl-1.0.1j-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101704" comment="openssl-doc-1.0.1j-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3569</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3569" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3569" source="CVE"/>
    <description>
    The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 0.9.8zc, 1.0.0o, and 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an unexpected handshake, as demonstrated by an SSLv3 handshake to a no-ssl3 application with certain error handling.  NOTE: this issue became relevant after the CVE-2014-3568 fix.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105297" comment="libopenssl-devel-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105298" comment="libopenssl-devel-32bit-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124418" comment="libopenssl0_9_8-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124419" comment="libopenssl0_9_8-32bit-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105299" comment="libopenssl1_0_0-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105300" comment="libopenssl1_0_0-32bit-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105301" comment="libopenssl1_0_0-hmac-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105302" comment="libopenssl1_0_0-hmac-32bit-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105303" comment="openssl-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105304" comment="openssl-doc-1.0.1k-2.16.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3570</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3570" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3570" source="CVE"/>
    <description>
    The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square of a BIGNUM value, which might make it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors, related to crypto/bn/asm/mips.pl, crypto/bn/asm/x86_64-gcc.c, and crypto/bn/bn_asm.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111311" comment="libcrypto34-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111312" comment="libcrypto34-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105297" comment="libopenssl-devel-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105298" comment="libopenssl-devel-32bit-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124418" comment="libopenssl0_9_8-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124419" comment="libopenssl0_9_8-32bit-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105299" comment="libopenssl1_0_0-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105300" comment="libopenssl1_0_0-32bit-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105301" comment="libopenssl1_0_0-hmac-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105302" comment="libopenssl1_0_0-hmac-32bit-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111313" comment="libressl-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111314" comment="libressl-devel-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111315" comment="libressl-devel-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111316" comment="libressl-devel-doc-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111317" comment="libssl33-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111318" comment="libssl33-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111319" comment="libtls4-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111320" comment="libtls4-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105303" comment="openssl-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105304" comment="openssl-doc-1.0.1k-2.16.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3571</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3571" source="CVE"/>
    <description>
    OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted DTLS message that is processed with a different read operation for the handshake header than for the handshake body, related to the dtls1_get_record function in d1_pkt.c and the ssl3_read_n function in s3_pkt.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105297" comment="libopenssl-devel-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105298" comment="libopenssl-devel-32bit-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124418" comment="libopenssl0_9_8-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124419" comment="libopenssl0_9_8-32bit-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105299" comment="libopenssl1_0_0-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105300" comment="libopenssl1_0_0-32bit-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105301" comment="libopenssl1_0_0-hmac-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105302" comment="libopenssl1_0_0-hmac-32bit-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105303" comment="openssl-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105304" comment="openssl-doc-1.0.1k-2.16.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3572</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3572" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3572" source="CVE"/>
    <description>
    The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger a loss of forward secrecy by omitting the ServerKeyExchange message.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111311" comment="libcrypto34-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111312" comment="libcrypto34-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105297" comment="libopenssl-devel-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105298" comment="libopenssl-devel-32bit-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124418" comment="libopenssl0_9_8-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124419" comment="libopenssl0_9_8-32bit-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105299" comment="libopenssl1_0_0-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105300" comment="libopenssl1_0_0-32bit-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105301" comment="libopenssl1_0_0-hmac-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105302" comment="libopenssl1_0_0-hmac-32bit-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111313" comment="libressl-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111314" comment="libressl-devel-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111315" comment="libressl-devel-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111316" comment="libressl-devel-doc-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111317" comment="libssl33-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111318" comment="libssl33-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111319" comment="libtls4-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111320" comment="libtls4-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105303" comment="openssl-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105304" comment="openssl-doc-1.0.1k-2.16.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3575</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3575" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3575" source="CVE"/>
    <description>
    The OLE preview generation in Apache OpenOffice before 4.1.1 and OpenOffice.org (OOo) might allow remote attackers to embed arbitrary data into documents via crafted OLE objects.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137639" comment="libreoffice-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137640" comment="libreoffice-base-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137641" comment="libreoffice-base-drivers-mysql-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137642" comment="libreoffice-calc-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137643" comment="libreoffice-calc-extensions-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137644" comment="libreoffice-draw-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137645" comment="libreoffice-filters-optional-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137646" comment="libreoffice-gnome-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137647" comment="libreoffice-icon-theme-galaxy-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137648" comment="libreoffice-icon-theme-hicontrast-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137649" comment="libreoffice-icon-theme-oxygen-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137650" comment="libreoffice-icon-theme-sifr-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137651" comment="libreoffice-icon-theme-tango-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137652" comment="libreoffice-impress-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137653" comment="libreoffice-kde4-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137654" comment="libreoffice-l10n-cs-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137655" comment="libreoffice-l10n-da-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137656" comment="libreoffice-l10n-de-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137657" comment="libreoffice-l10n-el-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137658" comment="libreoffice-l10n-en-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137659" comment="libreoffice-l10n-es-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137660" comment="libreoffice-l10n-fr-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137661" comment="libreoffice-l10n-hu-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137662" comment="libreoffice-l10n-it-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137663" comment="libreoffice-l10n-ja-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137664" comment="libreoffice-l10n-pl-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137665" comment="libreoffice-l10n-ru-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137666" comment="libreoffice-mailmerge-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137667" comment="libreoffice-math-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137668" comment="libreoffice-pyuno-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137669" comment="libreoffice-writer-4.3.2.2-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137670" comment="libreoffice-writer-extensions-4.3.2.2-1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3580</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3580" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3580" source="CVE"/>
    <description>
    The mod_dav_svn Apache HTTPD server module in Apache Subversion 1.x before 1.7.19 and 1.8.x before 1.8.11 allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) via a REPORT request for a resource that does not exist.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009103432" comment="libsvn_auth_gnome_keyring-1-0-1.8.11-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103433" comment="libsvn_auth_kwallet-1-0-1.8.11-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103434" comment="subversion-1.8.11-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103435" comment="subversion-bash-completion-1.8.11-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103436" comment="subversion-devel-1.8.11-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103437" comment="subversion-perl-1.8.11-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103438" comment="subversion-python-1.8.11-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103439" comment="subversion-python-ctypes-1.8.11-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103440" comment="subversion-ruby-1.8.11-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103441" comment="subversion-server-1.8.11-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103442" comment="subversion-tools-1.8.11-2.7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3587</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3587" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3587" source="CVE"/>
    <description>
    Integer overflow in the cdf_read_property_info function in cdf.c in file through 5.19, as used in the Fileinfo component in PHP before 5.4.32 and 5.5.x before 5.5.16, allows remote attackers to cause a denial of service (application crash) via a crafted CDF file.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1571.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3589</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3589" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3589" source="CVE"/>
    <description>
    PIL/IcnsImagePlugin.py in Python Imaging Library (PIL) and Pillow before 2.3.2 and 2.5.x before 2.5.2 allows remote attackers to cause a denial of service via a crafted block size.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109158" comment="python-Pillow-2.8.1-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109159" comment="python-Pillow-tk-2.8.1-3.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3591</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3591" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3591" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114195" comment="libgcrypt-1.6.1-8.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114196" comment="libgcrypt-cavs-1.6.1-8.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114197" comment="libgcrypt-devel-1.6.1-8.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114198" comment="libgcrypt-devel-32bit-1.6.1-8.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114174" comment="libgcrypt11-1.5.4-2.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114175" comment="libgcrypt11-32bit-1.5.4-2.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114199" comment="libgcrypt20-1.6.1-8.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114200" comment="libgcrypt20-32bit-1.6.1-8.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114201" comment="libgcrypt20-hmac-1.6.1-8.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114202" comment="libgcrypt20-hmac-32bit-1.6.1-8.6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3597</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3597" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3597" source="CVE"/>
    <description>
    Multiple buffer overflows in the php_parserr function in ext/standard/dns.c in PHP before 5.4.32 and 5.5.x before 5.5.16 allow remote DNS servers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted DNS record, related to the dns_get_record function and the dn_expand function.  NOTE: this issue exists because of an incomplete fix for CVE-2014-4049.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3598</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3598" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3598" source="CVE"/>
    <description>
    The Jpeg2KImagePlugin plugin in Pillow before 2.5.3 allows remote attackers to cause a denial of service via a crafted image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109158" comment="python-Pillow-2.8.1-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109159" comment="python-Pillow-tk-2.8.1-3.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3613</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3613" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3613" source="CVE"/>
    <description>
    cURL and libcurl before 7.38.0 does not properly handle IP addresses in cookie domain names, which allows remote attackers to set cookies for or send arbitrary cookies to certain sites, as demonstrated by a site at 192.168.0.1 setting cookies for a site at 127.168.0.1.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137106" comment="curl-7.38.0-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137107" comment="libcurl-devel-7.38.0-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137108" comment="libcurl4-7.38.0-1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3615</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3615" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3615" source="CVE"/>
    <description>
    The VGA emulator in QEMU allows local guest users to read host memory by setting the display to a high resolution.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133720" comment="xen-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133721" comment="xen-devel-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133722" comment="xen-doc-html-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133723" comment="xen-kmp-default-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133724" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133725" comment="xen-libs-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133726" comment="xen-libs-32bit-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133727" comment="xen-tools-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133728" comment="xen-tools-domU-4.4.4_05-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3618</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3618" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3618" source="CVE"/>
    <description>
    Heap-based buffer overflow in formisc.c in formail in procmail 3.22 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted email header, related to "unbalanced quotes."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137839" comment="procmail-3.22-266.2.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3619</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3619" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3619" source="CVE"/>
    <description>
    The __socket_proto_state_machine function in GlusterFS 3.5 allows remote attackers to cause a denial of service (infinite loop) via a "00000000" fragment header.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107795" comment="glusterfs-3.5.2-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107796" comment="glusterfs-devel-3.5.2-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107797" comment="libgfapi0-3.5.2-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107798" comment="libgfchangelog0-3.5.2-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107799" comment="libgfrpc0-3.5.2-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107800" comment="libgfxdr0-3.5.2-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107801" comment="libglusterfs0-3.5.2-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3620</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3620" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3620" source="CVE"/>
    <description>
    cURL and libcurl before 7.38.0 allow remote attackers to bypass the Same Origin Policy and set cookies for arbitrary sites by setting a cookie for a top-level domain.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137106" comment="curl-7.38.0-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137107" comment="libcurl-devel-7.38.0-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137108" comment="libcurl4-7.38.0-1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3622</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3622" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3622" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3633</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3633" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3633" source="CVE"/>
    <description>
    The qemuDomainGetBlockIoTune function in qemu/qemu_driver.c in libvirt before 1.2.9, when a disk has been hot-plugged or removed from the live image, allows remote attackers to cause a denial of service (crash) or read sensitive heap information via a crafted blkiotune query, which triggers an out-of-bounds read.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137726" comment="libvirt-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137727" comment="libvirt-client-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137728" comment="libvirt-daemon-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137729" comment="libvirt-daemon-config-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137730" comment="libvirt-daemon-config-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137731" comment="libvirt-daemon-driver-interface-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137732" comment="libvirt-daemon-driver-libxl-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137733" comment="libvirt-daemon-driver-lxc-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137734" comment="libvirt-daemon-driver-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137735" comment="libvirt-daemon-driver-nodedev-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137736" comment="libvirt-daemon-driver-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137737" comment="libvirt-daemon-driver-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137738" comment="libvirt-daemon-driver-secret-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137739" comment="libvirt-daemon-driver-storage-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137740" comment="libvirt-daemon-driver-uml-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137741" comment="libvirt-daemon-driver-vbox-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137742" comment="libvirt-daemon-driver-xen-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137743" comment="libvirt-daemon-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137744" comment="libvirt-daemon-xen-1.2.9-1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3634</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3634" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3634" source="CVE"/>
    <description>
    rsyslog before 7.6.6 and 8.x before 8.4.1 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash), possibly execute arbitrary code, or have other unspecified impact via a crafted priority (PRI) value that triggers an out-of-bounds array access.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137329" comment="klogd-1.4.1-778.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137865" comment="rsyslog-8.4.2-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137330" comment="syslog-service-2.0-778.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3635</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3635" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3635" source="CVE"/>
    <description>
    Off-by-one error in D-Bus 1.3.0 through 1.6.x before 1.6.24 and 1.8.x before 1.8.8, when running on a 64-bit system and the max_message_unix_fds limit is set to an odd number, allows local users to cause a denial of service (dbus-daemon crash) or possibly execute arbitrary code by sending one more file descriptor than the limit, which triggers a heap-based buffer overflow or an assertion failure.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137122" comment="dbus-1-1.8.8-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137123" comment="dbus-1-devel-1.8.8-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137124" comment="dbus-1-x11-1.8.8-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137125" comment="libdbus-1-3-1.8.8-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137126" comment="libdbus-1-3-32bit-1.8.8-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3636</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3636" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3636" source="CVE"/>
    <description>
    D-Bus 1.3.0 through 1.6.x before 1.6.24 and 1.8.x before 1.8.8 allows local users to (1) cause a denial of service (prevention of new connections and connection drop) by queuing the maximum number of file descriptors or (2) cause a denial of service (disconnect) via multiple messages that combine to have more than the allowed number of file descriptors for a single sendmsg call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137122" comment="dbus-1-1.8.8-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137123" comment="dbus-1-devel-1.8.8-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137124" comment="dbus-1-x11-1.8.8-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137125" comment="libdbus-1-3-1.8.8-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137126" comment="libdbus-1-3-32bit-1.8.8-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3637</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3637" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3637" source="CVE"/>
    <description>
    D-Bus 1.3.0 through 1.6.x before 1.6.24 and 1.8.x before 1.8.8 does not properly close connections for processes that have terminated, which allows local users to cause a denial of service via a D-bus message containing a D-Bus connection file descriptor.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137122" comment="dbus-1-1.8.8-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137123" comment="dbus-1-devel-1.8.8-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137124" comment="dbus-1-x11-1.8.8-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137125" comment="libdbus-1-3-1.8.8-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137126" comment="libdbus-1-3-32bit-1.8.8-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3638</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3638" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3638" source="CVE"/>
    <description>
    The bus_connections_check_reply function in config-parser.c in D-Bus before 1.6.24 and 1.8.x before 1.8.8 allows local users to cause a denial of service (CPU consumption) via a large number of method calls.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137122" comment="dbus-1-1.8.8-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137123" comment="dbus-1-devel-1.8.8-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137124" comment="dbus-1-x11-1.8.8-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137125" comment="libdbus-1-3-1.8.8-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137126" comment="libdbus-1-3-32bit-1.8.8-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3639</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3639" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3639" source="CVE"/>
    <description>
    The dbus-daemon in D-Bus before 1.6.24 and 1.8.x before 1.8.8 does not properly close old connections, which allows local users to cause a denial of service (incomplete connection consumption and prevention of new connections) via a large number of incomplete connections.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137122" comment="dbus-1-1.8.8-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137123" comment="dbus-1-devel-1.8.8-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137124" comment="dbus-1-x11-1.8.8-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137125" comment="libdbus-1-3-1.8.8-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137126" comment="libdbus-1-3-32bit-1.8.8-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3657</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3657" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3657" source="CVE"/>
    <description>
    The virDomainListPopulate function in conf/domain_conf.c in libvirt before 1.2.9 does not clean up the lock on the list of domains, which allows remote attackers to cause a denial of service (deadlock) via a NULL value in the second parameter in the virConnectListAllDomains API command.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137726" comment="libvirt-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137727" comment="libvirt-client-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137728" comment="libvirt-daemon-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137729" comment="libvirt-daemon-config-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137730" comment="libvirt-daemon-config-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137731" comment="libvirt-daemon-driver-interface-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137732" comment="libvirt-daemon-driver-libxl-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137733" comment="libvirt-daemon-driver-lxc-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137734" comment="libvirt-daemon-driver-network-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137735" comment="libvirt-daemon-driver-nodedev-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137736" comment="libvirt-daemon-driver-nwfilter-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137737" comment="libvirt-daemon-driver-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137738" comment="libvirt-daemon-driver-secret-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137739" comment="libvirt-daemon-driver-storage-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137740" comment="libvirt-daemon-driver-uml-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137741" comment="libvirt-daemon-driver-vbox-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137742" comment="libvirt-daemon-driver-xen-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137743" comment="libvirt-daemon-qemu-1.2.9-1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137744" comment="libvirt-daemon-xen-1.2.9-1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3660</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3660" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3660" source="CVE"/>
    <description>
    parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the "billion laughs" attack.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009120421" comment="libxml2-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137790" comment="libxml2-2-2.9.1-7.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137791" comment="libxml2-2-32bit-2.9.1-7.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137792" comment="libxml2-devel-2.9.1-7.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120425" comment="libxml2-devel-32bit-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120426" comment="libxml2-doc-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137793" comment="libxml2-tools-2.9.1-7.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120428" comment="python-libxml2-2.9.3-7.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3668</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3668" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3668" source="CVE"/>
    <description>
    Buffer overflow in the date_from_ISO8601 function in the mkgmtime implementation in libxmlrpc/xmlrpc.c in the XMLRPC extension in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 allows remote attackers to cause a denial of service (application crash) via (1) a crafted first argument to the xmlrpc_set_type function or (2) a crafted argument to the xmlrpc_decode function, related to an out-of-bounds read operation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009101273" comment="apache2-mod_php5-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101274" comment="php5-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101275" comment="php5-bcmath-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101276" comment="php5-bz2-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101277" comment="php5-calendar-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101278" comment="php5-ctype-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101279" comment="php5-curl-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101280" comment="php5-dba-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101281" comment="php5-devel-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101282" comment="php5-dom-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101283" comment="php5-enchant-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101284" comment="php5-exif-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101285" comment="php5-fastcgi-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101286" comment="php5-fileinfo-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101287" comment="php5-firebird-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101288" comment="php5-fpm-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101289" comment="php5-ftp-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101290" comment="php5-gd-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101291" comment="php5-gettext-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101292" comment="php5-gmp-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101293" comment="php5-iconv-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101294" comment="php5-imap-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101295" comment="php5-intl-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101296" comment="php5-json-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101297" comment="php5-ldap-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101298" comment="php5-mbstring-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101299" comment="php5-mcrypt-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101300" comment="php5-mssql-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101301" comment="php5-mysql-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101302" comment="php5-odbc-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101303" comment="php5-opcache-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101304" comment="php5-openssl-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101305" comment="php5-pcntl-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101306" comment="php5-pdo-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101307" comment="php5-pear-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101308" comment="php5-pgsql-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101309" comment="php5-phar-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101310" comment="php5-posix-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101311" comment="php5-pspell-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101312" comment="php5-readline-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101313" comment="php5-shmop-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101314" comment="php5-snmp-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101315" comment="php5-soap-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101316" comment="php5-sockets-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101317" comment="php5-sqlite-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101318" comment="php5-suhosin-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101319" comment="php5-sysvmsg-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101320" comment="php5-sysvsem-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101321" comment="php5-sysvshm-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101322" comment="php5-tidy-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101323" comment="php5-tokenizer-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101324" comment="php5-wddx-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101325" comment="php5-xmlreader-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101326" comment="php5-xmlrpc-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101327" comment="php5-xmlwriter-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101328" comment="php5-xsl-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101329" comment="php5-zip-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101330" comment="php5-zlib-5.6.1-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3669</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3669" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3669" source="CVE"/>
    <description>
    Integer overflow in the object_custom function in ext/standard/var_unserializer.c in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an argument to the unserialize function that triggers calculation of a large length value.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009101273" comment="apache2-mod_php5-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101274" comment="php5-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101275" comment="php5-bcmath-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101276" comment="php5-bz2-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101277" comment="php5-calendar-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101278" comment="php5-ctype-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101279" comment="php5-curl-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101280" comment="php5-dba-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101281" comment="php5-devel-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101282" comment="php5-dom-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101283" comment="php5-enchant-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101284" comment="php5-exif-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101285" comment="php5-fastcgi-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101286" comment="php5-fileinfo-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101287" comment="php5-firebird-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101288" comment="php5-fpm-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101289" comment="php5-ftp-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101290" comment="php5-gd-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101291" comment="php5-gettext-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101292" comment="php5-gmp-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101293" comment="php5-iconv-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101294" comment="php5-imap-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101295" comment="php5-intl-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101296" comment="php5-json-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101297" comment="php5-ldap-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101298" comment="php5-mbstring-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101299" comment="php5-mcrypt-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101300" comment="php5-mssql-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101301" comment="php5-mysql-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101302" comment="php5-odbc-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101303" comment="php5-opcache-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101304" comment="php5-openssl-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101305" comment="php5-pcntl-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101306" comment="php5-pdo-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101307" comment="php5-pear-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101308" comment="php5-pgsql-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101309" comment="php5-phar-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101310" comment="php5-posix-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101311" comment="php5-pspell-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101312" comment="php5-readline-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101313" comment="php5-shmop-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101314" comment="php5-snmp-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101315" comment="php5-soap-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101316" comment="php5-sockets-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101317" comment="php5-sqlite-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101318" comment="php5-suhosin-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101319" comment="php5-sysvmsg-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101320" comment="php5-sysvsem-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101321" comment="php5-sysvshm-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101322" comment="php5-tidy-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101323" comment="php5-tokenizer-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101324" comment="php5-wddx-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101325" comment="php5-xmlreader-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101326" comment="php5-xmlrpc-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101327" comment="php5-xmlwriter-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101328" comment="php5-xsl-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101329" comment="php5-zip-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101330" comment="php5-zlib-5.6.1-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3670</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3670" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3670" source="CVE"/>
    <description>
    The exif_ifd_make_value function in exif.c in the EXIF extension in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 operates on floating-point arrays incorrectly, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via a crafted JPEG image with TIFF thumbnail data that is improperly handled by the exif_thumbnail function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009101273" comment="apache2-mod_php5-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101274" comment="php5-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101275" comment="php5-bcmath-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101276" comment="php5-bz2-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101277" comment="php5-calendar-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101278" comment="php5-ctype-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101279" comment="php5-curl-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101280" comment="php5-dba-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101281" comment="php5-devel-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101282" comment="php5-dom-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101283" comment="php5-enchant-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101284" comment="php5-exif-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101285" comment="php5-fastcgi-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101286" comment="php5-fileinfo-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101287" comment="php5-firebird-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101288" comment="php5-fpm-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101289" comment="php5-ftp-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101290" comment="php5-gd-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101291" comment="php5-gettext-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101292" comment="php5-gmp-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101293" comment="php5-iconv-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101294" comment="php5-imap-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101295" comment="php5-intl-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101296" comment="php5-json-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101297" comment="php5-ldap-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101298" comment="php5-mbstring-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101299" comment="php5-mcrypt-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101300" comment="php5-mssql-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101301" comment="php5-mysql-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101302" comment="php5-odbc-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101303" comment="php5-opcache-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101304" comment="php5-openssl-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101305" comment="php5-pcntl-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101306" comment="php5-pdo-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101307" comment="php5-pear-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101308" comment="php5-pgsql-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101309" comment="php5-phar-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101310" comment="php5-posix-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101311" comment="php5-pspell-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101312" comment="php5-readline-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101313" comment="php5-shmop-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101314" comment="php5-snmp-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101315" comment="php5-soap-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101316" comment="php5-sockets-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101317" comment="php5-sqlite-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101318" comment="php5-suhosin-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101319" comment="php5-sysvmsg-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101320" comment="php5-sysvsem-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101321" comment="php5-sysvshm-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101322" comment="php5-tidy-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101323" comment="php5-tokenizer-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101324" comment="php5-wddx-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101325" comment="php5-xmlreader-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101326" comment="php5-xmlrpc-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101327" comment="php5-xmlwriter-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101328" comment="php5-xsl-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101329" comment="php5-zip-5.6.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101330" comment="php5-zlib-5.6.1-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3672</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3672" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3672" source="CVE"/>
    <description>
    The qemu implementation in libvirt before 1.3.0 and Xen allows local guest OS users to cause a denial of service (host disk consumption) by writing to stdout or stderr.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133720" comment="xen-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133721" comment="xen-devel-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133722" comment="xen-doc-html-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133723" comment="xen-kmp-default-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133724" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133725" comment="xen-libs-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133726" comment="xen-libs-32bit-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133727" comment="xen-tools-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133728" comment="xen-tools-domU-4.4.4_05-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3673</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3673" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3673" source="CVE"/>
    <description>
    The SCTP implementation in the Linux kernel through 3.17.2 allows remote attackers to cause a denial of service (system crash) via a malformed ASCONF chunk, related to net/sctp/sm_make_chunk.c and net/sctp/sm_statefuns.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009103080" comment="kernel-debug-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103081" comment="kernel-debug-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103082" comment="kernel-debug-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103083" comment="kernel-default-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103084" comment="kernel-default-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103085" comment="kernel-default-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103086" comment="kernel-desktop-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103087" comment="kernel-desktop-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103088" comment="kernel-desktop-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103099" comment="kernel-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103089" comment="kernel-docs-3.16.7-7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103090" comment="kernel-ec2-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103091" comment="kernel-ec2-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103092" comment="kernel-ec2-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103100" comment="kernel-macros-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103093" comment="kernel-obs-build-3.16.7-7.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103095" comment="kernel-obs-qa-3.16.7-7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103094" comment="kernel-obs-qa-xen-3.16.7-7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103096" comment="kernel-pae-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103097" comment="kernel-pae-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103098" comment="kernel-pae-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103101" comment="kernel-source-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103102" comment="kernel-source-vanilla-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103103" comment="kernel-syms-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103104" comment="kernel-vanilla-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103105" comment="kernel-vanilla-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103106" comment="kernel-xen-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103107" comment="kernel-xen-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103108" comment="kernel-xen-devel-3.16.7-7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3675</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3675" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3675" source="CVE"/>
    <description>
    Shim allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted DHCPv6 packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137873" comment="shim-0.7.318.81ee561d-3.4.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3676</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3676" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3676" source="CVE"/>
    <description>
    Heap-based buffer overflow in Shim allows remote attackers to execute arbitrary code via a crafted IPv6 address, related to the "tftp:// DHCPv6 boot option."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137873" comment="shim-0.7.318.81ee561d-3.4.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3677</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3677" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3677" source="CVE"/>
    <description>
    Unspecified vulnerability in Shim might allow attackers to execute arbitrary code via a crafted MOK list, which triggers memory corruption.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137873" comment="shim-0.7.318.81ee561d-3.4.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3683</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3683" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3683" source="CVE"/>
    <description>
    Integer overflow in rsyslog before 7.6.7 and 8.x before 8.4.2 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash) via a large priority (PRI) value.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3634.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137865" comment="rsyslog-8.4.2-1.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3687</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3687" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3687" source="CVE"/>
    <description>
    The sctp_assoc_lookup_asconf_ack function in net/sctp/associola.c in the SCTP implementation in the Linux kernel through 3.17.2 allows remote attackers to cause a denial of service (panic) via duplicate ASCONF chunks that trigger an incorrect uncork within the side-effect interpreter.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009103080" comment="kernel-debug-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103081" comment="kernel-debug-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103082" comment="kernel-debug-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103083" comment="kernel-default-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103084" comment="kernel-default-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103085" comment="kernel-default-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103086" comment="kernel-desktop-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103087" comment="kernel-desktop-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103088" comment="kernel-desktop-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103099" comment="kernel-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103089" comment="kernel-docs-3.16.7-7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103090" comment="kernel-ec2-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103091" comment="kernel-ec2-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103092" comment="kernel-ec2-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103100" comment="kernel-macros-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103093" comment="kernel-obs-build-3.16.7-7.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103095" comment="kernel-obs-qa-3.16.7-7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103094" comment="kernel-obs-qa-xen-3.16.7-7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103096" comment="kernel-pae-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103097" comment="kernel-pae-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103098" comment="kernel-pae-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103101" comment="kernel-source-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103102" comment="kernel-source-vanilla-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103103" comment="kernel-syms-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103104" comment="kernel-vanilla-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103105" comment="kernel-vanilla-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103106" comment="kernel-xen-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103107" comment="kernel-xen-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103108" comment="kernel-xen-devel-3.16.7-7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3688</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3688" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3688" source="CVE"/>
    <description>
    The SCTP implementation in the Linux kernel before 3.17.4 allows remote attackers to cause a denial of service (memory consumption) by triggering a large number of chunks in an association's output queue, as demonstrated by ASCONF probes, related to net/sctp/inqueue.c and net/sctp/sm_statefuns.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009103080" comment="kernel-debug-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103081" comment="kernel-debug-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103082" comment="kernel-debug-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103083" comment="kernel-default-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103084" comment="kernel-default-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103085" comment="kernel-default-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103086" comment="kernel-desktop-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103087" comment="kernel-desktop-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103088" comment="kernel-desktop-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103099" comment="kernel-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103089" comment="kernel-docs-3.16.7-7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103090" comment="kernel-ec2-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103091" comment="kernel-ec2-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103092" comment="kernel-ec2-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103100" comment="kernel-macros-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103093" comment="kernel-obs-build-3.16.7-7.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103095" comment="kernel-obs-qa-3.16.7-7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103094" comment="kernel-obs-qa-xen-3.16.7-7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103096" comment="kernel-pae-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103097" comment="kernel-pae-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103098" comment="kernel-pae-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103101" comment="kernel-source-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103102" comment="kernel-source-vanilla-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103103" comment="kernel-syms-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103104" comment="kernel-vanilla-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103105" comment="kernel-vanilla-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103106" comment="kernel-xen-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103107" comment="kernel-xen-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103108" comment="kernel-xen-devel-3.16.7-7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3689</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3689" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3689" source="CVE"/>
    <description>
    The vmware-vga driver (hw/display/vmware_vga.c) in QEMU allows local guest users to write to qemu memory locations and gain privileges via unspecified parameters related to rectangle handling.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126020" comment="xen-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126021" comment="xen-devel-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126022" comment="xen-doc-html-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126023" comment="xen-kmp-default-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126024" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126025" comment="xen-libs-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126026" comment="xen-libs-32bit-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126027" comment="xen-tools-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126028" comment="xen-tools-domU-4.4.4_02-43.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3693</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3693" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3693" source="CVE"/>
    <description>
    Use-after-free vulnerability in the socket manager of Impress Remote in LibreOffice 4.x before 4.2.7 and 4.3.x before 4.3.3 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted request to TCP port 1599.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123705" comment="cmis-client-0.5.0-4.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123706" comment="libcmis-0_5-5-0.5.0-4.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123707" comment="libcmis-c-0_5-5-0.5.0-4.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123708" comment="libcmis-c-devel-0.5.0-4.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123709" comment="libcmis-devel-0.5.0-4.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123710" comment="libetonyek-0.1.3-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123711" comment="libetonyek-0_1-1-0.1.3-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123712" comment="libetonyek-devel-0.1.3-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123713" comment="libetonyek-devel-doc-0.1.3-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123714" comment="libetonyek-tools-0.1.3-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123715" comment="libmwaw-0.3.6-2.7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123716" comment="libmwaw-0_3-3-0.3.6-2.7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123717" comment="libmwaw-devel-0.3.6-2.7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123718" comment="libmwaw-devel-doc-0.3.6-2.7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123719" comment="libmwaw-tools-0.3.6-2.7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123720" comment="libodfgen-0.1.4-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123721" comment="libodfgen-0_1-1-0.1.4-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123722" comment="libodfgen-devel-0.1.4-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123723" comment="libodfgen-devel-doc-0.1.4-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123724" comment="libpagemaker-0.0.2-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123725" comment="libpagemaker-0_0-0-0.0.2-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123726" comment="libpagemaker-devel-0.0.2-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123727" comment="libpagemaker-devel-doc-0.0.2-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123728" comment="libpagemaker-tools-0.0.2-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123729" comment="libreoffice-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123730" comment="libreoffice-base-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123731" comment="libreoffice-base-drivers-mysql-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123732" comment="libreoffice-base-drivers-postgresql-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123733" comment="libreoffice-branding-upstream-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123734" comment="libreoffice-calc-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123735" comment="libreoffice-calc-extensions-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123736" comment="libreoffice-draw-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123737" comment="libreoffice-filters-optional-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123738" comment="libreoffice-gnome-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123739" comment="libreoffice-gtk3-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123740" comment="libreoffice-icon-theme-breeze-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101791" comment="libreoffice-icon-theme-crystal-4.3.3.2-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123741" comment="libreoffice-icon-theme-galaxy-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123742" comment="libreoffice-icon-theme-hicontrast-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123743" comment="libreoffice-icon-theme-oxygen-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123744" comment="libreoffice-icon-theme-sifr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123745" comment="libreoffice-icon-theme-tango-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123746" comment="libreoffice-impress-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123747" comment="libreoffice-kde4-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123748" comment="libreoffice-l10n-af-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123749" comment="libreoffice-l10n-ar-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123750" comment="libreoffice-l10n-as-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123751" comment="libreoffice-l10n-bg-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123752" comment="libreoffice-l10n-bn-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123753" comment="libreoffice-l10n-br-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123754" comment="libreoffice-l10n-ca-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123755" comment="libreoffice-l10n-cs-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123756" comment="libreoffice-l10n-cy-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123757" comment="libreoffice-l10n-da-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123758" comment="libreoffice-l10n-de-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123759" comment="libreoffice-l10n-dz-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123760" comment="libreoffice-l10n-el-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123761" comment="libreoffice-l10n-en-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123762" comment="libreoffice-l10n-es-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123763" comment="libreoffice-l10n-et-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123764" comment="libreoffice-l10n-eu-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123765" comment="libreoffice-l10n-fa-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123766" comment="libreoffice-l10n-fi-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123767" comment="libreoffice-l10n-fr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123768" comment="libreoffice-l10n-ga-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123769" comment="libreoffice-l10n-gl-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123770" comment="libreoffice-l10n-gu-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123771" comment="libreoffice-l10n-he-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123772" comment="libreoffice-l10n-hi-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123773" comment="libreoffice-l10n-hr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123774" comment="libreoffice-l10n-hu-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123775" comment="libreoffice-l10n-it-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123776" comment="libreoffice-l10n-ja-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123777" comment="libreoffice-l10n-kk-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123778" comment="libreoffice-l10n-kn-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123779" comment="libreoffice-l10n-ko-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123780" comment="libreoffice-l10n-lt-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123781" comment="libreoffice-l10n-lv-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123782" comment="libreoffice-l10n-mai-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123783" comment="libreoffice-l10n-ml-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123784" comment="libreoffice-l10n-mr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123785" comment="libreoffice-l10n-nb-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123786" comment="libreoffice-l10n-nl-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123787" comment="libreoffice-l10n-nn-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123788" comment="libreoffice-l10n-nr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123789" comment="libreoffice-l10n-nso-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123790" comment="libreoffice-l10n-or-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123791" comment="libreoffice-l10n-pa-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123792" comment="libreoffice-l10n-pl-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123793" comment="libreoffice-l10n-pt-BR-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123794" comment="libreoffice-l10n-pt-PT-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123795" comment="libreoffice-l10n-ro-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123796" comment="libreoffice-l10n-ru-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123797" comment="libreoffice-l10n-si-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123798" comment="libreoffice-l10n-sk-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123799" comment="libreoffice-l10n-sl-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123800" comment="libreoffice-l10n-sr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123801" comment="libreoffice-l10n-ss-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123802" comment="libreoffice-l10n-st-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123803" comment="libreoffice-l10n-sv-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123804" comment="libreoffice-l10n-ta-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123805" comment="libreoffice-l10n-te-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123806" comment="libreoffice-l10n-th-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123807" comment="libreoffice-l10n-tn-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123808" comment="libreoffice-l10n-tr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123809" comment="libreoffice-l10n-ts-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123810" comment="libreoffice-l10n-uk-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123811" comment="libreoffice-l10n-ve-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123812" comment="libreoffice-l10n-xh-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123813" comment="libreoffice-l10n-zh-Hans-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123814" comment="libreoffice-l10n-zh-Hant-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123815" comment="libreoffice-l10n-zu-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123816" comment="libreoffice-mailmerge-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123817" comment="libreoffice-math-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123818" comment="libreoffice-officebean-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123819" comment="libreoffice-pyuno-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123820" comment="libreoffice-sdk-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123821" comment="libreoffice-sdk-doc-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123822" comment="libreoffice-share-linker-1-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123823" comment="libreoffice-writer-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123824" comment="libreoffice-writer-extensions-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123825" comment="libwps-0.4.1-2.4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123826" comment="libwps-0_4-4-0.4.1-2.4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123827" comment="libwps-devel-0.4.1-2.4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123828" comment="libwps-tools-0.4.1-2.4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123829" comment="mdds-0.12.1-2.4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123830" comment="mdds-devel-0.12.1-2.4.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3694</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3694" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3694" source="CVE"/>
    <description>
    The (1) bundled GnuTLS SSL/TLS plugin and the (2) bundled OpenSSL SSL/TLS plugin in libpurple in Pidgin before 2.10.10 do not properly consider the Basic Constraints extension during verification of X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009101351" comment="finch-2.10.10-5.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101352" comment="finch-devel-2.10.10-5.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101353" comment="libpurple-2.10.10-5.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101349" comment="libpurple-branding-openSUSE-13.2-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101354" comment="libpurple-branding-upstream-2.10.10-5.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101355" comment="libpurple-devel-2.10.10-5.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101356" comment="libpurple-lang-2.10.10-5.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101357" comment="libpurple-meanwhile-2.10.10-5.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101358" comment="libpurple-tcl-2.10.10-5.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101359" comment="pidgin-2.10.10-5.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101350" comment="pidgin-branding-openSUSE-13.2-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101360" comment="pidgin-devel-2.10.10-5.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3695</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3695" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3695" source="CVE"/>
    <description>
    markup.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.10 allows remote servers to cause a denial of service (application crash) via a large length value in an emoticon response.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009101351" comment="finch-2.10.10-5.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101352" comment="finch-devel-2.10.10-5.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101353" comment="libpurple-2.10.10-5.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101349" comment="libpurple-branding-openSUSE-13.2-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101354" comment="libpurple-branding-upstream-2.10.10-5.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101355" comment="libpurple-devel-2.10.10-5.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101356" comment="libpurple-lang-2.10.10-5.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101357" comment="libpurple-meanwhile-2.10.10-5.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101358" comment="libpurple-tcl-2.10.10-5.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101359" comment="pidgin-2.10.10-5.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101350" comment="pidgin-branding-openSUSE-13.2-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101360" comment="pidgin-devel-2.10.10-5.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3696</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3696" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3696" source="CVE"/>
    <description>
    nmevent.c in the Novell GroupWise protocol plugin in libpurple in Pidgin before 2.10.10 allows remote servers to cause a denial of service (application crash) via a crafted server message that triggers a large memory allocation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009101351" comment="finch-2.10.10-5.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101352" comment="finch-devel-2.10.10-5.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101353" comment="libpurple-2.10.10-5.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101349" comment="libpurple-branding-openSUSE-13.2-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101354" comment="libpurple-branding-upstream-2.10.10-5.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101355" comment="libpurple-devel-2.10.10-5.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101356" comment="libpurple-lang-2.10.10-5.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101357" comment="libpurple-meanwhile-2.10.10-5.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101358" comment="libpurple-tcl-2.10.10-5.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101359" comment="pidgin-2.10.10-5.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101350" comment="pidgin-branding-openSUSE-13.2-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101360" comment="pidgin-devel-2.10.10-5.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3697</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3697" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3697" source="CVE"/>
    <description>
    Absolute path traversal vulnerability in the untar_block function in win32/untar.c in Pidgin before 2.10.10 on Windows allows remote attackers to write to arbitrary files via a drive name in a tar archive of a smiley theme.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009101351" comment="finch-2.10.10-5.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101352" comment="finch-devel-2.10.10-5.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101353" comment="libpurple-2.10.10-5.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101349" comment="libpurple-branding-openSUSE-13.2-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101354" comment="libpurple-branding-upstream-2.10.10-5.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101355" comment="libpurple-devel-2.10.10-5.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101356" comment="libpurple-lang-2.10.10-5.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101357" comment="libpurple-meanwhile-2.10.10-5.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101358" comment="libpurple-tcl-2.10.10-5.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101359" comment="pidgin-2.10.10-5.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101350" comment="pidgin-branding-openSUSE-13.2-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101360" comment="pidgin-devel-2.10.10-5.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3698</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3698" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3698" source="CVE"/>
    <description>
    The jabber_idn_validate function in jutil.c in the Jabber protocol plugin in libpurple in Pidgin before 2.10.10 allows remote attackers to obtain sensitive information from process memory via a crafted XMPP message.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009101351" comment="finch-2.10.10-5.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101352" comment="finch-devel-2.10.10-5.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101353" comment="libpurple-2.10.10-5.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101349" comment="libpurple-branding-openSUSE-13.2-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101354" comment="libpurple-branding-upstream-2.10.10-5.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101355" comment="libpurple-devel-2.10.10-5.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101356" comment="libpurple-lang-2.10.10-5.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101357" comment="libpurple-meanwhile-2.10.10-5.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101358" comment="libpurple-tcl-2.10.10-5.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101359" comment="pidgin-2.10.10-5.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101350" comment="pidgin-branding-openSUSE-13.2-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101360" comment="pidgin-devel-2.10.10-5.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3707</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3707" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3707" source="CVE"/>
    <description>
    The curl_easy_duphandle function in libcurl 7.17.1 through 7.38.0, when running with the CURLOPT_COPYPOSTFIELDS option, does not properly copy HTTP POST data for an easy handle, which triggers an out-of-bounds read that allows remote web servers to read sensitive memory information.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105953" comment="curl-7.40.0-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105954" comment="libcurl-devel-7.40.0-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105956" comment="libcurl4-7.40.0-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105955" comment="libcurl4-32bit-7.40.0-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3710</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3710" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3710" source="CVE"/>
    <description>
    The donote function in readelf.c in file through 5.20, as used in the Fileinfo component in PHP 5.4.34, does not ensure that sufficient note headers are present, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted ELF file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009102125" comment="file-5.19-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102126" comment="file-devel-5.19-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102127" comment="file-magic-5.19-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102104" comment="libmagic-data-5.11-12.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102129" comment="libmagic1-5.19-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102128" comment="libmagic1-32bit-5.19-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102130" comment="python-magic-5.19-3.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3775</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3775" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3775" source="CVE"/>
    <description>
    libgadu before 1.11.4 and 1.12.0 before 1.12.0-rc3, as used in Pidgin and other products, allows remote Gadu-Gadu file relay servers to cause a denial of service (memory overwrite) or possibly execute arbitrary code via a crafted message.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137492" comment="libgadu-devel-1.12.0-2.1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137493" comment="libgadu3-1.12.0-2.1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3941</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3941" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3941" source="CVE"/>
    <description>
    TYPO3 4.5.0 before 4.5.34, 4.7.0 before 4.7.19, 6.0.0 before 6.0.14, 6.1.0 before 6.1.9, and 6.2.0 before 6.2.3 allows remote attackers to have unspecified impact via a crafted HTTP Host header, related to "Host Spoofing."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134119" comment="typo3-cms-4_7-4.7.20-2.3.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3970</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3970" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3970" source="CVE"/>
    <description>
    The pa_rtp_recv function in modules/rtp/rtp.c in the module-rtp-recv module in PulseAudio 5.0 and earlier allows remote attackers to cause a denial of service (assertion failure and abort) via an empty UDP packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137593" comment="libpulse-devel-5.0-4.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137594" comment="libpulse-mainloop-glib0-5.0-4.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137595" comment="libpulse0-5.0-4.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137596" comment="libpulse0-32bit-5.0-4.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137597" comment="pulseaudio-5.0-4.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137598" comment="pulseaudio-module-bluetooth-5.0-4.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137599" comment="pulseaudio-module-gconf-5.0-4.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137600" comment="pulseaudio-module-jack-5.0-4.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137601" comment="pulseaudio-module-lirc-5.0-4.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137602" comment="pulseaudio-module-x11-5.0-4.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137603" comment="pulseaudio-module-zeroconf-5.0-4.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137604" comment="pulseaudio-utils-5.0-4.2.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3985</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-3985" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3985" source="CVE"/>
    <description>
    The getHTTPResponse function in miniwget.c in MiniUPnP 1.9 allows remote attackers to cause a denial of service (crash) via crafted headers that trigger an out-of-bounds read.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137540" comment="libminiupnpc10-1.9-2.1.5 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4002</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-4002" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4002" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in Cacti 0.8.8b allow remote attackers to inject arbitrary web script or HTML via the (1) drp_action parameter to cdef.php, (2) data_input.php, (3) data_queries.php, (4) data_sources.php, (5) data_templates.php, (6) graph_templates.php, (7) graphs.php, (8) host.php, or (9) host_templates.php or the (10) graph_template_input_id or (11) graph_template_id parameter to graph_templates_inputs.php.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107602" comment="cacti-0.8.8c-4.4.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4020</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-4020" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4020" source="CVE"/>
    <description>
    The dissect_frame function in epan/dissectors/packet-frame.c in the frame metadissector in Wireshark 1.10.x before 1.10.8 interprets a negative integer as a length value even though it was intended to represent an error condition, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4043</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-4043" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043" source="CVE"/>
    <description>
    The posix_spawn_file_actions_addopen function in glibc before 2.20 does not copy its path argument in accordance with the POSIX specification, which allows context-dependent attackers to trigger use-after-free vulnerabilities.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137226" comment="glibc-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137227" comment="glibc-32bit-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137228" comment="glibc-devel-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137229" comment="glibc-extra-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137230" comment="glibc-info-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137231" comment="glibc-locale-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137232" comment="glibc-locale-32bit-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137233" comment="nscd-2.19-16.2.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4049</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-4049" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4049" source="CVE"/>
    <description>
    Heap-based buffer overflow in the php_parserr function in ext/standard/dns.c in PHP 5.6.0beta4 and earlier allows remote servers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted DNS TXT record, related to the dns_get_record function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4165</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-4165" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4165" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in ntop allows remote attackers to inject arbitrary web script or HTML via the title parameter in a list action to plugins/rrdPlugin.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108892" comment="ntop-5.0.2-2.3.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4209</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-4209" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4209" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality and integrity via vectors related to JMX.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4216</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-4216" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4216" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4218</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-4218" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4218" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect integrity via unknown vectors related to Libraries.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4219</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-4219" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4219" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4221</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-4221" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4221" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u60 and 8u5 allows remote attackers to affect confidentiality via unknown vectors related to Libraries.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4223</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-4223" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4223" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u60 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2014-2483.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4244</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-4244" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4244" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5, and JRockit R27.8.2 and JRockit R28.3.2, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Security.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4252</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-4252" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4252" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality via unknown vectors related to Security.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4262</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-4262" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4262" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4263</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-4263" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4263" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5, and JRockit R27.8.2 and R28.3.2, allows remote attackers to affect confidentiality and integrity via unknown vectors related to "Diffie-Hellman key agreement."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4264</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-4264" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4264" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u60 and 8u5 allows remote attackers to affect availability via unknown vectors related to Security.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4266</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-4266" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4266" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u60 and 8u5 allows remote attackers to affect integrity via unknown vectors related to Serviceability.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4268</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-4268" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4268" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality via unknown vectors related to Swing.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4336</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-4336" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4336" source="CVE"/>
    <description>
    The generate_local_queue function in utils/cups-browsed.c in cups-browsed in cups-filters before 1.0.53 allows remote IPP printers to execute arbitrary commands via shell metacharacters in the host name.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2707.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137103" comment="cups-filters-foomatic-rip-1.0.58-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137104" comment="cups-filters-ghostscript-1.0.58-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4337</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-4337" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4337" source="CVE"/>
    <description>
    The process_browse_data function in utils/cups-browsed.c in cups-browsed in cups-filters before 1.0.53 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted packet data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137103" comment="cups-filters-foomatic-rip-1.0.58-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137104" comment="cups-filters-ghostscript-1.0.58-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4338</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-4338" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4338" source="CVE"/>
    <description>
    cups-browsed in cups-filters before 1.0.53 allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging a malformed cups-browsed.conf BrowseAllow directive that is interpreted as granting browse access to all IP addresses.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137103" comment="cups-filters-foomatic-rip-1.0.58-2.1.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137104" comment="cups-filters-ghostscript-1.0.58-2.1.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4341</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-4341" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4341" source="CVE"/>
    <description>
    MIT Kerberos 5 (aka krb5) before 1.12.2 allows remote attackers to cause a denial of service (buffer over-read and application crash) by injecting invalid tokens into a GSSAPI application session.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137331" comment="krb5-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137332" comment="krb5-32bit-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137333" comment="krb5-client-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137334" comment="krb5-devel-1.12.2-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4342</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-4342" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4342" source="CVE"/>
    <description>
    MIT Kerberos 5 (aka krb5) 1.7.x through 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (buffer over-read or NULL pointer dereference, and application crash) by injecting invalid tokens into a GSSAPI application session.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137331" comment="krb5-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137332" comment="krb5-32bit-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137333" comment="krb5-client-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137334" comment="krb5-devel-1.12.2-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4343</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-4343" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4343" source="CVE"/>
    <description>
    Double free vulnerability in the init_ctx_reselect function in the SPNEGO initiator in lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) 1.10.x through 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via network traffic that appears to come from an intended acceptor, but specifies a security mechanism different from the one proposed by the initiator.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137331" comment="krb5-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137332" comment="krb5-32bit-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137333" comment="krb5-client-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137334" comment="krb5-devel-1.12.2-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4344</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-4344" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4344" source="CVE"/>
    <description>
    The acc_ctx_cont function in the SPNEGO acceptor in lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) 1.5.x through 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty continuation token at a certain point during a SPNEGO negotiation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137331" comment="krb5-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137332" comment="krb5-32bit-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137333" comment="krb5-client-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137334" comment="krb5-devel-1.12.2-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4345</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-4345" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4345" source="CVE"/>
    <description>
    Off-by-one error in the krb5_encode_krbsecretkey function in plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in the LDAP KDB module in kadmind in MIT Kerberos 5 (aka krb5) 1.6.x through 1.11.x before 1.11.6 and 1.12.x before 1.12.2 allows remote authenticated users to cause a denial of service (buffer overflow) or possibly execute arbitrary code via a series of "cpw -keepold" commands.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137331" comment="krb5-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137332" comment="krb5-32bit-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137333" comment="krb5-client-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137334" comment="krb5-devel-1.12.2-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4607</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-4607" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4607" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109777" comment="LibVNCServer-0.9.10-10.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109778" comment="LibVNCServer-devel-0.9.10-10.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137538" comment="liblzo2-2-2.08-3.1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109779" comment="libvncclient0-0.9.10-10.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109780" comment="libvncserver0-0.9.10-10.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4617</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-4617" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4617" source="CVE"/>
    <description>
    The do_uncompress function in g10/compress.c in GnuPG 1.x before 1.4.17 and 2.x before 2.0.24 allows context-dependent attackers to cause a denial of service (infinite loop) via malformed compressed packets, as demonstrated by an a3 01 5b ff byte sequence.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137253" comment="gpg2-2.0.26-2.1.3 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4650</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-4650" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4650" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137609" comment="libpython2_7-1_0-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137610" comment="libpython2_7-1_0-32bit-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137614" comment="libpython3_4m1_0-3.4.1-4.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134122" comment="libpython3_4m1_0-32bit-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137611" comment="python-base-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137612" comment="python-devel-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137613" comment="python-xml-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134123" comment="python3-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134124" comment="python3-32bit-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137615" comment="python3-base-3.4.1-4.2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134126" comment="python3-base-32bit-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134127" comment="python3-curses-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134128" comment="python3-dbm-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134129" comment="python3-devel-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134130" comment="python3-doc-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134131" comment="python3-doc-pdf-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134132" comment="python3-idle-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134133" comment="python3-testsuite-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134134" comment="python3-tk-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134135" comment="python3-tools-3.4.5-4.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4670</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-4670" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4670" source="CVE"/>
    <description>
    Use-after-free vulnerability in ext/spl/spl_dllist.c in the SPL component in PHP through 5.5.14 allows context-dependent attackers to cause a denial of service or possibly have unspecified other impact via crafted iterator usage within applications in certain web-hosting environments.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4698</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-4698" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4698" source="CVE"/>
    <description>
    Use-after-free vulnerability in ext/spl/spl_array.c in the SPL component in PHP through 5.5.14 allows context-dependent attackers to cause a denial of service or possibly have unspecified other impact via crafted ArrayIterator usage within applications in certain web-hosting environments.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4877</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-4877" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4877" source="CVE"/>
    <description>
    Absolute path traversal vulnerability in GNU Wget before 1.16, when recursion is enabled, allows remote FTP servers to write to arbitrary files, and consequently execute arbitrary code, via a LIST response that references the same filename within two entries, one of which indicates that the filename is for a symlink.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101253" comment="wget-1.16-4.4.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4909</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-4909" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4909" source="CVE"/>
    <description>
    Integer overflow in the tr_bitfieldEnsureNthBitAlloced function in bitfield.c in Transmission before 2.84 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted peer message, which triggers an out-of-bounds write.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137894" comment="transmission-common-2.84-4.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137895" comment="transmission-gtk-2.84-4.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4910</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-4910" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4910" source="CVE"/>
    <description>
    Directory traversal vulnerability in tools/backlight_helper.c in X.Org xf86-video-intel 2.99.911 allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) in the interface name.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137912" comment="xf86-video-intel-2.99.916-2.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4975</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-4975" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4975" source="CVE"/>
    <description>
    Off-by-one error in the encodes function in pack.c in Ruby 1.9.3 and earlier, and 2.x through 2.1.2, when using certain format string specifiers, allows context-dependent attackers to cause a denial of service (segmentation fault) via vectors that trigger a stack-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137671" comment="libruby2_1-2_1-2.1.3-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137672" comment="ruby2.1-2.1.3-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137673" comment="ruby2.1-devel-2.1.3-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137674" comment="ruby2.1-stdlib-2.1.3-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5025</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-5025" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5025" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in data_sources.php in Cacti 0.8.8b allows remote authenticated users with console access to inject arbitrary web script or HTML via the name_cache parameter in a ds_edit action.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107602" comment="cacti-0.8.8c-4.4.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5026</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-5026" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5026" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in Cacti 0.8.8b allow remote authenticated users with console access to inject arbitrary web script or HTML via a (1) Graph Tree Title in a delete or (2) edit action; (3) CDEF Name, (4) Data Input Method Name, or (5) Host Templates Name in a delete action; (6) Data Source Title; (7) Graph Title; or (8) Graph Template Name in a delete or (9) duplicate action.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107602" comment="cacti-0.8.8c-4.4.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5029</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-5029" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5029" source="CVE"/>
    <description>
    The web interface in CUPS 1.7.4 allows local users in the lp group to read arbitrary files via a symlink attack on a file in /var/cache/cups/rss/ and language[0] set to null.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3537.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137098" comment="cups-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137099" comment="cups-client-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137100" comment="cups-devel-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137101" comment="cups-libs-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137102" comment="cups-libs-32bit-1.5.4-21.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5030</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-5030" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5030" source="CVE"/>
    <description>
    CUPS before 2.0 allows local users to read arbitrary files via a symlink attack on (1) index.html, (2) index.class, (3) index.pl, (4) index.php, (5) index.pyc, or (6) index.py.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137098" comment="cups-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137099" comment="cups-client-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137100" comment="cups-devel-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137101" comment="cups-libs-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137102" comment="cups-libs-32bit-1.5.4-21.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5031</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-5031" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5031" source="CVE"/>
    <description>
    The web interface in CUPS before 2.0 does not check that files have world-readable permissions, which allows remote attackers to obtains sensitive information via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137098" comment="cups-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137099" comment="cups-client-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137100" comment="cups-devel-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137101" comment="cups-libs-1.5.4-21.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137102" comment="cups-libs-32bit-1.5.4-21.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5044</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-5044" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5044" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137066" comment="cpp48-4.8.3+r212056-2.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137067" comment="gcc48-4.8.3+r212056-2.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137068" comment="gcc48-c++-4.8.3+r212056-2.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137069" comment="gcc48-fortran-4.8.3+r212056-2.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137070" comment="gcc48-gij-4.8.3+r212056-2.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137071" comment="gcc48-info-4.8.3+r212056-2.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137072" comment="gcc48-java-4.8.3+r212056-2.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137073" comment="gcc48-locale-4.8.3+r212056-2.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137074" comment="gcc48-objc-4.8.3+r212056-2.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137075" comment="libasan0-4.8.3+r212056-2.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137076" comment="libatomic1-4.8.3+r212056-2.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137077" comment="libffi4-4.8.3+r212056-2.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137078" comment="libffi4-32bit-4.8.3+r212056-2.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137079" comment="libffi48-devel-4.8.3+r212056-2.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137080" comment="libgcc_s1-4.8.3+r212056-2.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137081" comment="libgcc_s1-32bit-4.8.3+r212056-2.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137082" comment="libgcj48-4.8.3+r212056-2.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137083" comment="libgcj48-devel-4.8.3+r212056-2.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137084" comment="libgcj48-jar-4.8.3+r212056-2.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137085" comment="libgcj_bc1-4.8.3+r212056-2.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137086" comment="libgfortran3-4.8.3+r212056-2.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137087" comment="libgomp1-4.8.3+r212056-2.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137088" comment="libitm1-4.8.3+r212056-2.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137089" comment="libobjc4-4.8.3+r212056-2.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137090" comment="libquadmath0-4.8.3+r212056-2.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137091" comment="libstdc++48-devel-4.8.3+r212056-2.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137092" comment="libstdc++6-4.8.3+r212056-2.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137093" comment="libstdc++6-32bit-4.8.3+r212056-2.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137094" comment="libstdc++6-locale-4.8.3+r212056-2.2.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137095" comment="libtsan0-4.8.3+r212056-2.2.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5119</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-5119" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5119" source="CVE"/>
    <description>
    Off-by-one error in the __gconv_translit_find function in gconv_trans.c in GNU C Library (aka glibc) allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via vectors related to the CHARSET environment variable and gconv transliteration modules.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137226" comment="glibc-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137227" comment="glibc-32bit-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137228" comment="glibc-devel-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137229" comment="glibc-extra-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137230" comment="glibc-info-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137231" comment="glibc-locale-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137232" comment="glibc-locale-32bit-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137233" comment="nscd-2.19-16.2.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5120</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-5120" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5120" source="CVE"/>
    <description>
    gd_ctx.c in the GD component in PHP 5.4.x before 5.4.32 and 5.5.x before 5.5.16 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to overwrite arbitrary files via crafted input to an application that calls the (1) imagegd, (2) imagegd2, (3) imagegif, (4) imagejpeg, (5) imagepng, (6) imagewbmp, or (7) imagewebp function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5139</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-5139" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5139" source="CVE"/>
    <description>
    The ssl_set_client_disabled function in t1_lib.c in OpenSSL 1.0.1 before 1.0.1i allows remote SSL servers to cause a denial of service (NULL pointer dereference and client application crash) via a ServerHello message that includes an SRP ciphersuite without the required negotiation of that ciphersuite with the client.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137558" comment="libopenssl-devel-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137559" comment="libopenssl1_0_0-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137560" comment="libopenssl1_0_0-32bit-1.0.1i-2.1.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137561" comment="openssl-1.0.1i-2.1.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5146</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-5146" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5146" source="CVE"/>
    <description>
    Certain MMU virtualization operations in Xen 4.2.x through 4.4.x before the xsa97-hap patch, when using Hardware Assisted Paging (HAP), are not preemptible, which allows local HVM guest to cause a denial of service (vcpu consumption) by invoking these operations, which process every page assigned to a guest, a different vulnerability than CVE-2014-5149.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105983" comment="xen-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105984" comment="xen-devel-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105988" comment="xen-doc-html-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105989" comment="xen-kmp-default-4.4.1_08_k3.16.7_7-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105990" comment="xen-kmp-desktop-4.4.1_08_k3.16.7_7-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105986" comment="xen-libs-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105985" comment="xen-libs-32bit-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105991" comment="xen-tools-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105987" comment="xen-tools-domU-4.4.1_08-9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5149</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-5149" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5149" source="CVE"/>
    <description>
    Certain MMU virtualization operations in Xen 4.2.x through 4.4.x, when using shadow pagetables, are not preemptible, which allows local HVM guest to cause a denial of service (vcpu consumption) by invoking these operations, which process every page assigned to a guest, a different vulnerability than CVE-2014-5146.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105983" comment="xen-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105984" comment="xen-devel-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105988" comment="xen-doc-html-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105989" comment="xen-kmp-default-4.4.1_08_k3.16.7_7-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105990" comment="xen-kmp-desktop-4.4.1_08_k3.16.7_7-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105986" comment="xen-libs-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105985" comment="xen-libs-32bit-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105991" comment="xen-tools-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105987" comment="xen-tools-domU-4.4.1_08-9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5161</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-5161" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5161" source="CVE"/>
    <description>
    The dissect_log function in plugins/irda/packet-irda.c in the IrDA dissector in Wireshark 1.10.x before 1.10.9 does not properly strip '\n' characters, which allows remote attackers to cause a denial of service (buffer underflow and application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5162</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-5162" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5162" source="CVE"/>
    <description>
    The read_new_line function in wiretap/catapult_dct2000.c in the Catapult DCT2000 dissector in Wireshark 1.10.x before 1.10.9 does not properly strip '\n' and '\r' characters, which allows remote attackers to cause a denial of service (off-by-one buffer underflow and application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5163</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-5163" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5163" source="CVE"/>
    <description>
    The APN decode functionality in (1) epan/dissectors/packet-gtp.c and (2) epan/dissectors/packet-gsm_a_gm.c in the GTP and GSM Management dissectors in Wireshark 1.10.x before 1.10.9 does not completely initialize a certain buffer, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5164</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-5164" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5164" source="CVE"/>
    <description>
    The rlc_decode_li function in epan/dissectors/packet-rlc.c in the RLC dissector in Wireshark 1.10.x before 1.10.9 initializes a certain structure member only after this member is used, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5165</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-5165" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5165" source="CVE"/>
    <description>
    The dissect_ber_constrained_bitstring function in epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 1.10.x before 1.10.9 does not properly validate padding values, which allows remote attackers to cause a denial of service (buffer underflow and application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5220</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-5220" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5220" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106164" comment="mdadm-3.3.1-5.14.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5269</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-5269" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5269" source="CVE"/>
    <description>
    Plack::App::File in Plack before 1.0031 removes trailing slash characters from paths, which allows remote attackers to bypass the whitelist of generated files and obtain sensitive information via a crafted path, related to Plack::Middleware::Static.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102835" comment="perl-Plack-1.0031-4.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5277</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-5277" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5277" source="CVE"/>
    <description>
    Docker before 1.3.1 and docker-py before 0.5.3 fall back to HTTP when the HTTPS connection to the registry fails, which allows man-in-the-middle attackers to conduct downgrade attacks and obtain authentication and image data by leveraging a network position between the client and the registry to block HTTPS traffic.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009101421" comment="docker-1.3.1-5.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101422" comment="docker-bash-completion-1.3.1-5.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101423" comment="docker-zsh-completion-1.3.1-5.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101417" comment="go-1.3.3-5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101418" comment="go-doc-1.3.3-5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101419" comment="go-emacs-1.3.3-5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101420" comment="go-vim-1.3.3-5.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5351</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-5351" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5351" source="CVE"/>
    <description>
    The kadm5_randkey_principal_3 function in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13 sends old keys in a response to a -randkey -keepold request, which allows remote authenticated users to forge tickets by leveraging administrative access.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137331" comment="krb5-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137332" comment="krb5-32bit-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137333" comment="krb5-client-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137334" comment="krb5-devel-1.12.2-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105998" comment="krb5-devel-32bit-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105999" comment="krb5-doc-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105992" comment="krb5-mini-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105993" comment="krb5-mini-devel-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106000" comment="krb5-plugin-kdb-ldap-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106001" comment="krb5-plugin-preauth-otp-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106002" comment="krb5-plugin-preauth-pkinit-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106003" comment="krb5-server-1.12.2-6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5352</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-5352" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5352" source="CVE"/>
    <description>
    The krb5_gss_process_context_token function in lib/gssapi/krb5/process_context_token.c in the libgssapi_krb5 library in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 does not properly maintain security-context handles, which allows remote authenticated users to cause a denial of service (use-after-free and double free, and daemon crash) or possibly execute arbitrary code via crafted GSSAPI traffic, as demonstrated by traffic to kadmind.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105994" comment="krb5-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105995" comment="krb5-32bit-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105996" comment="krb5-client-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105997" comment="krb5-devel-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105998" comment="krb5-devel-32bit-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105999" comment="krb5-doc-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105992" comment="krb5-mini-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105993" comment="krb5-mini-devel-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106000" comment="krb5-plugin-kdb-ldap-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106001" comment="krb5-plugin-preauth-otp-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106002" comment="krb5-plugin-preauth-pkinit-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106003" comment="krb5-server-1.12.2-6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5353</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-5353" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5353" source="CVE"/>
    <description>
    The krb5_ldap_get_password_policy_from_dn function in plugins/kdb/ldap/libkdb_ldap/ldap_pwd_policy.c in MIT Kerberos 5 (aka krb5) before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (daemon crash) via a successful LDAP query with no results, as demonstrated by using an incorrect object type for a password policy.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107878" comment="krb5-1.12.2-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107879" comment="krb5-32bit-1.12.2-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107880" comment="krb5-client-1.12.2-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107881" comment="krb5-devel-1.12.2-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107882" comment="krb5-devel-32bit-1.12.2-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107883" comment="krb5-doc-1.12.2-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107876" comment="krb5-mini-1.12.2-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107877" comment="krb5-mini-devel-1.12.2-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107884" comment="krb5-plugin-kdb-ldap-1.12.2-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107885" comment="krb5-plugin-preauth-otp-1.12.2-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107886" comment="krb5-plugin-preauth-pkinit-1.12.2-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107887" comment="krb5-server-1.12.2-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5354</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-5354" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5354" source="CVE"/>
    <description>
    plugins/kdb/ldap/libkdb_ldap/ldap_principal2.c in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.1, when the KDC uses LDAP, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by creating a database entry for a keyless principal, as demonstrated by a kadmin "add_principal -nokey" or "purgekeys -all" command.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107878" comment="krb5-1.12.2-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107879" comment="krb5-32bit-1.12.2-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107880" comment="krb5-client-1.12.2-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107881" comment="krb5-devel-1.12.2-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107882" comment="krb5-devel-32bit-1.12.2-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107883" comment="krb5-doc-1.12.2-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107876" comment="krb5-mini-1.12.2-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107877" comment="krb5-mini-devel-1.12.2-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107884" comment="krb5-plugin-kdb-ldap-1.12.2-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107885" comment="krb5-plugin-preauth-otp-1.12.2-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107886" comment="krb5-plugin-preauth-pkinit-1.12.2-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107887" comment="krb5-server-1.12.2-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5355</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-5355" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5355" source="CVE"/>
    <description>
    MIT Kerberos 5 (aka krb5) through 1.13.1 incorrectly expects that a krb5_read_message data field is represented as a string ending with a '\0' character, which allows remote attackers to (1) cause a denial of service (NULL pointer dereference) via a zero-byte version string or (2) cause a denial of service (out-of-bounds read) by omitting the '\0' character, related to appl/user_user/server.c and lib/krb5/krb/recvauth.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107878" comment="krb5-1.12.2-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107879" comment="krb5-32bit-1.12.2-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107880" comment="krb5-client-1.12.2-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107881" comment="krb5-devel-1.12.2-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107882" comment="krb5-devel-32bit-1.12.2-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107883" comment="krb5-doc-1.12.2-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107876" comment="krb5-mini-1.12.2-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107877" comment="krb5-mini-devel-1.12.2-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107884" comment="krb5-plugin-kdb-ldap-1.12.2-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107885" comment="krb5-plugin-preauth-otp-1.12.2-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107886" comment="krb5-plugin-preauth-pkinit-1.12.2-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107887" comment="krb5-server-1.12.2-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5459</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-5459" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5459" source="CVE"/>
    <description>
    The PEAR_REST class in REST.php in PEAR in PHP through 5.6.0 allows local users to write to arbitrary files via a symlink attack on a (1) rest.cachefile or (2) rest.cacheid file in /tmp/pear/cache/, related to the retrieveCacheFirst and useLocalCache functions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136973" comment="apache2-mod_php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136974" comment="php5-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136975" comment="php5-bcmath-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136976" comment="php5-bz2-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136977" comment="php5-calendar-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136978" comment="php5-ctype-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136979" comment="php5-curl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136980" comment="php5-dba-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136981" comment="php5-devel-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136982" comment="php5-dom-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136983" comment="php5-exif-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136984" comment="php5-fastcgi-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136985" comment="php5-ftp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136986" comment="php5-gd-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136987" comment="php5-gettext-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136988" comment="php5-gmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136989" comment="php5-iconv-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136990" comment="php5-imap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136991" comment="php5-json-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136992" comment="php5-ldap-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136993" comment="php5-mbstring-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136994" comment="php5-mcrypt-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136995" comment="php5-mysql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136996" comment="php5-odbc-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136997" comment="php5-openssl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136998" comment="php5-pdo-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136999" comment="php5-pear-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137000" comment="php5-pgsql-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137001" comment="php5-shmop-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137002" comment="php5-snmp-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137003" comment="php5-sockets-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137004" comment="php5-sqlite-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137005" comment="php5-suhosin-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137006" comment="php5-sysvsem-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137007" comment="php5-sysvshm-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137008" comment="php5-tidy-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137009" comment="php5-tokenizer-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137010" comment="php5-wddx-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137011" comment="php5-xmlreader-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137012" comment="php5-xmlwriter-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137013" comment="php5-xsl-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137014" comment="php5-zip-5.6.1-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137015" comment="php5-zlib-5.6.1-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6040</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6040" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040" source="CVE"/>
    <description>
    GNU C Library (aka glibc) before 2.20 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via a multibyte character value of "0xffff" to the iconv function when converting (1) IBM933, (2) IBM935, (3) IBM937, (4) IBM939, or (5) IBM1364 encoded data to UTF-8.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137226" comment="glibc-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137227" comment="glibc-32bit-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137228" comment="glibc-devel-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137229" comment="glibc-extra-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137230" comment="glibc-info-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137231" comment="glibc-locale-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137232" comment="glibc-locale-32bit-2.19-16.2.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137233" comment="nscd-2.19-16.2.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6268</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6268" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6268" source="CVE"/>
    <description>
    The evtchn_fifo_set_pending function in Xen 4.4.x allows local guest users to cause a denial of service (host crash) via vectors involving an uninitialized FIFO-based event channel control block when (1) binding or (2) moving an event to a different VCPU.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6271</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6271" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271" source="CVE"/>
    <description>
    GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock."  NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137040" comment="bash-4.2-75.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137041" comment="bash-doc-4.2-75.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137042" comment="libreadline6-6.2-75.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137043" comment="readline-devel-6.2-75.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137044" comment="readline-doc-6.2-75.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6272</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6272" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6272" source="CVE"/>
    <description>
    Multiple integer overflows in the evbuffer API in Libevent 1.4.x before 1.4.15, 2.0.x before 2.0.22, and 2.1.x before 2.1.5-beta allow context-dependent attackers to cause a denial of service or possibly have other unspecified impact via "insanely large inputs" to the (1) evbuffer_add, (2) evbuffer_expand, or (3) bufferevent_write function, which triggers a heap-based buffer overflow or an infinite loop.  NOTE: this identifier has been SPLIT per ADT3 due to different affected versions. See CVE-2015-6525 for the functions that are only affected in 2.0 and later.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105293" comment="libevent-2.0.21-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105294" comment="libevent-2_0-5-2.0.21-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105295" comment="libevent-2_0-5-32bit-2.0.21-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105296" comment="libevent-devel-2.0.21-4.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6277</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6277" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6277" source="CVE"/>
    <description>
    GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137040" comment="bash-4.2-75.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137041" comment="bash-doc-4.2-75.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137042" comment="libreadline6-6.2-75.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137043" comment="readline-devel-6.2-75.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137044" comment="readline-doc-6.2-75.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6278</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6278" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278" source="CVE"/>
    <description>
    GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137040" comment="bash-4.2-75.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137041" comment="bash-doc-4.2-75.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137042" comment="libreadline6-6.2-75.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137043" comment="readline-devel-6.2-75.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137044" comment="readline-doc-6.2-75.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6407</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6407" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6407" source="CVE"/>
    <description>
    Docker before 1.3.2 allows remote attackers to write to arbitrary files and execute arbitrary code via a (1) symlink or (2) hard link attack in an image archive in a (a) pull or (b) load operation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009102615" comment="docker-1.3.2-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102616" comment="docker-bash-completion-1.3.2-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102617" comment="docker-zsh-completion-1.3.2-9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6408</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6408" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6408" source="CVE"/>
    <description>
    Docker 1.3.0 through 1.3.1 allows remote attackers to modify the default run profile of image containers and possibly bypass the container by applying unspecified security options to an image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009102615" comment="docker-1.3.2-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102616" comment="docker-bash-completion-1.3.2-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102617" comment="docker-zsh-completion-1.3.2-9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6423</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6423" source="CVE"/>
    <description>
    The tvb_raw_text_add function in epan/dissectors/packet-megaco.c in the MEGACO dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (infinite loop) via an empty line.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6424</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6424" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6424" source="CVE"/>
    <description>
    The dissect_v9_v10_pdu_data function in epan/dissectors/packet-netflow.c in the Netflow dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 refers to incorrect offset and start variables, which allows remote attackers to cause a denial of service (uninitialized memory read and application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6425</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6425" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6425" source="CVE"/>
    <description>
    The (1) get_quoted_string and (2) get_unquoted_string functions in epan/dissectors/packet-cups.c in the CUPS dissector in Wireshark 1.12.x before 1.12.1 allow remote attackers to cause a denial of service (buffer over-read and application crash) via a CUPS packet that lacks a trailing '\0' character.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6426</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6426" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6426" source="CVE"/>
    <description>
    The dissect_hip_tlv function in epan/dissectors/packet-hip.c in the HIP dissector in Wireshark 1.12.x before 1.12.1 does not properly handle a NULL tree, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6427</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6427" source="CVE"/>
    <description>
    Off-by-one error in the is_rtsp_request_or_reply function in epan/dissectors/packet-rtsp.c in the RTSP dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet that triggers parsing of a token located one position beyond the current position.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6428</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6428" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6428" source="CVE"/>
    <description>
    The dissect_spdu function in epan/dissectors/packet-ses.c in the SES dissector in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not initialize a certain ID value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6429</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6429" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6429" source="CVE"/>
    <description>
    The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not properly handle empty input data, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6430</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6430" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6430" source="CVE"/>
    <description>
    The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not validate bitmask data, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6431</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6431" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6431" source="CVE"/>
    <description>
    Buffer overflow in the SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 allows remote attackers to cause a denial of service (application crash) via a crafted file that triggers writes of uncompressed bytes beyond the end of the output buffer.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6432</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6432" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6432" source="CVE"/>
    <description>
    The SnifferDecompress function in wiretap/ngsniffer.c in the DOS Sniffer file parser in Wireshark 1.10.x before 1.10.10 and 1.12.x before 1.12.1 does not prevent data overwrites during copy operations, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137902" comment="wireshark-1.12.1-1.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137903" comment="wireshark-ui-gtk-1.12.1-1.5 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6457</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6457" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6457" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20; Java SE Embedded 7u60; and JRockit R27.8.3, and R28.3.3 allows remote attackers to affect confidentiality and integrity via vectors related to JSSE.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6464</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6464" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6464" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:INNODB DML FOREIGN KEYS.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111084" comment="libmysqlclient-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111085" comment="libmysqlclient18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111086" comment="libmysqlclient18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111087" comment="libmysqlclient_r18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111088" comment="libmysqlclient_r18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111089" comment="libmysqld-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111090" comment="libmysqld18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111091" comment="mariadb-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111092" comment="mariadb-bench-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111093" comment="mariadb-client-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111094" comment="mariadb-errormessages-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111095" comment="mariadb-test-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111096" comment="mariadb-tools-10.0.20-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6469</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6469" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6469" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote authenticated users to affect availability via vectors related to SERVER:OPTIMIZER.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111084" comment="libmysqlclient-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111085" comment="libmysqlclient18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111086" comment="libmysqlclient18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111087" comment="libmysqlclient_r18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111088" comment="libmysqlclient_r18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111089" comment="libmysqld-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111090" comment="libmysqld18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111091" comment="mariadb-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111092" comment="mariadb-bench-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111093" comment="mariadb-client-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111094" comment="mariadb-errormessages-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111095" comment="mariadb-test-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111096" comment="mariadb-tools-10.0.20-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6491</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6491" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6491" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to SERVER:SSL:yaSSL, a different vulnerability than CVE-2014-6500.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111084" comment="libmysqlclient-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111085" comment="libmysqlclient18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111086" comment="libmysqlclient18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111087" comment="libmysqlclient_r18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111088" comment="libmysqlclient_r18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111089" comment="libmysqld-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111090" comment="libmysqld18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111091" comment="mariadb-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111092" comment="mariadb-bench-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111093" comment="mariadb-client-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111094" comment="mariadb-errormessages-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111095" comment="mariadb-test-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111096" comment="mariadb-tools-10.0.20-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6494</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6494" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect availability via vectors related to CLIENT:SSL:yaSSL, a different vulnerability than CVE-2014-6496.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111084" comment="libmysqlclient-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111085" comment="libmysqlclient18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111086" comment="libmysqlclient18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111087" comment="libmysqlclient_r18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111088" comment="libmysqlclient_r18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111089" comment="libmysqld-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111090" comment="libmysqld18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111091" comment="mariadb-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111092" comment="mariadb-bench-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111093" comment="mariadb-client-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111094" comment="mariadb-errormessages-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111095" comment="mariadb-test-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111096" comment="mariadb-tools-10.0.20-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6496</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6496" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6496" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect availability via vectors related to CLIENT:SSL:yaSSL, a different vulnerability than CVE-2014-6494.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111084" comment="libmysqlclient-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111085" comment="libmysqlclient18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111086" comment="libmysqlclient18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111087" comment="libmysqlclient_r18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111088" comment="libmysqlclient_r18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111089" comment="libmysqld-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111090" comment="libmysqld18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111091" comment="mariadb-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111092" comment="mariadb-bench-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111093" comment="mariadb-client-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111094" comment="mariadb-errormessages-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111095" comment="mariadb-test-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111096" comment="mariadb-tools-10.0.20-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6500</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6500" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to SERVER:SSL:yaSSL, a different vulnerability than CVE-2014-6491.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111084" comment="libmysqlclient-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111085" comment="libmysqlclient18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111086" comment="libmysqlclient18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111087" comment="libmysqlclient_r18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111088" comment="libmysqlclient_r18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111089" comment="libmysqld-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111090" comment="libmysqld18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111091" comment="mariadb-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111092" comment="mariadb-bench-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111093" comment="mariadb-client-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111094" comment="mariadb-errormessages-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111095" comment="mariadb-test-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111096" comment="mariadb-tools-10.0.20-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6502</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6502" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6502" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20, and Java SE Embedded 7u60, allows remote attackers to affect integrity via unknown vectors related to Libraries.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6504</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6504" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6504" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, and 7u67, and Java SE Embedded 7u60, allows remote attackers to affect confidentiality via unknown vectors related to Hotspot.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6506</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6506" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6506" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20, and Java SE Embedded 7u60, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6507</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6507" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6507" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SERVER:DML.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111084" comment="libmysqlclient-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111085" comment="libmysqlclient18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111086" comment="libmysqlclient18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111087" comment="libmysqlclient_r18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111088" comment="libmysqlclient_r18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111089" comment="libmysqld-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111090" comment="libmysqld18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111091" comment="mariadb-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111092" comment="mariadb-bench-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111093" comment="mariadb-client-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111094" comment="mariadb-errormessages-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111095" comment="mariadb-test-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111096" comment="mariadb-tools-10.0.20-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6511</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6511" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20 allows remote attackers to affect confidentiality via unknown vectors related to 2D.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6512</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6512" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6512" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20; Java SE Embedded 7u60; and JRockit R27.8.3 and R28.3.3 allows remote attackers to affect integrity via unknown vectors related to Libraries.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6513</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6513" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6513" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20, and Java SE Embedded 7u60, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6517</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6517" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6517" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20; Java SE Embedded 7u60; and Jrockit R27.8.3 and R28.3.3 allows remote attackers to affect confidentiality via vectors related to JAXP.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6519</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6519" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6519" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u67 and 8u20, and Java SE Embedded 7u60, allows remote attackers to affect integrity via unknown vectors related to Hotspot.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6531</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6531" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6531" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20, and Java SE Embedded 7u60, allows remote attackers to affect confidentiality via unknown vectors related to Libraries.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6555</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6555" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier and 5.6.20 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to SERVER:DML.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111084" comment="libmysqlclient-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111085" comment="libmysqlclient18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111086" comment="libmysqlclient18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111087" comment="libmysqlclient_r18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111088" comment="libmysqlclient_r18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111089" comment="libmysqld-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111090" comment="libmysqld18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111091" comment="mariadb-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111092" comment="mariadb-bench-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111093" comment="mariadb-client-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111094" comment="mariadb-errormessages-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111095" comment="mariadb-test-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111096" comment="mariadb-tools-10.0.20-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6558</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6558" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6558" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20; Java SE Embedded 7u60; and JRockit R27.8.3 and JRockit R28.3.3 allows remote attackers to affect integrity via unknown vectors related to Security.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137281" comment="java-1_7_0-openjdk-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137282" comment="java-1_7_0-openjdk-devel-1.7.0.71-1.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137283" comment="java-1_7_0-openjdk-headless-1.7.0.71-1.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6559</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6559" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6559" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.39 and earlier, and 5.6.20 and earlier, allows remote attackers to affect confidentiality via vectors related to C API SSL CERTIFICATE HANDLING.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111084" comment="libmysqlclient-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111085" comment="libmysqlclient18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111086" comment="libmysqlclient18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111087" comment="libmysqlclient_r18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111088" comment="libmysqlclient_r18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111089" comment="libmysqld-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111090" comment="libmysqld18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111091" comment="mariadb-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111092" comment="mariadb-bench-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111093" comment="mariadb-client-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111094" comment="mariadb-errormessages-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111095" comment="mariadb-test-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111096" comment="mariadb-tools-10.0.20-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6568</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6568" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6568" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DML.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111084" comment="libmysqlclient-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111085" comment="libmysqlclient18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111086" comment="libmysqlclient18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111087" comment="libmysqlclient_r18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111088" comment="libmysqlclient_r18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111089" comment="libmysqld-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111090" comment="libmysqld18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111091" comment="mariadb-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111092" comment="mariadb-bench-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111093" comment="mariadb-client-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111094" comment="mariadb-errormessages-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111095" comment="mariadb-test-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111096" comment="mariadb-tools-10.0.20-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6585</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6585" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality via unknown vectors related to 2D, a different vulnerability than CVE-2014-6591.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105731" comment="java-1_7_0-openjdk-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105732" comment="java-1_7_0-openjdk-accessibility-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105728" comment="java-1_7_0-openjdk-bootstrap-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105729" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105730" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105733" comment="java-1_7_0-openjdk-demo-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105734" comment="java-1_7_0-openjdk-devel-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105735" comment="java-1_7_0-openjdk-headless-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105736" comment="java-1_7_0-openjdk-javadoc-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105737" comment="java-1_7_0-openjdk-src-1.7.0.75-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6587</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6587" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u85, 7u72, and 8u25 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105731" comment="java-1_7_0-openjdk-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105732" comment="java-1_7_0-openjdk-accessibility-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105728" comment="java-1_7_0-openjdk-bootstrap-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105729" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105730" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105733" comment="java-1_7_0-openjdk-demo-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105734" comment="java-1_7_0-openjdk-devel-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105735" comment="java-1_7_0-openjdk-headless-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105736" comment="java-1_7_0-openjdk-javadoc-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105737" comment="java-1_7_0-openjdk-src-1.7.0.75-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6588</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6588" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6588" source="CVE"/>
    <description>
    Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 4.3.20 allows local users to affect integrity and availability via vectors related to VMSVGA virtual graphics device, a different vulnerability than CVE-2014-6589, CVE-2014-6590, CVE-2014-6595, and CVE-2015-0427.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105911" comment="python-virtualbox-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105912" comment="virtualbox-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105913" comment="virtualbox-devel-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105914" comment="virtualbox-guest-desktop-icons-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105915" comment="virtualbox-guest-kmp-default-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105916" comment="virtualbox-guest-kmp-desktop-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105917" comment="virtualbox-guest-kmp-pae-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105918" comment="virtualbox-guest-tools-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105919" comment="virtualbox-guest-x11-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105920" comment="virtualbox-host-kmp-default-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105921" comment="virtualbox-host-kmp-desktop-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105922" comment="virtualbox-host-kmp-pae-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105923" comment="virtualbox-qt-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105924" comment="virtualbox-websrv-4.3.20-7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6589</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6589" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6589" source="CVE"/>
    <description>
    Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 4.3.20 allows local users to affect integrity and availability via vectors related to VMSVGA virtual graphics device, a different vulnerability than CVE-2014-6588, CVE-2014-6590, CVE-2014-6595, and CVE-2015-0427.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105911" comment="python-virtualbox-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105912" comment="virtualbox-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105913" comment="virtualbox-devel-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105914" comment="virtualbox-guest-desktop-icons-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105915" comment="virtualbox-guest-kmp-default-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105916" comment="virtualbox-guest-kmp-desktop-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105917" comment="virtualbox-guest-kmp-pae-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105918" comment="virtualbox-guest-tools-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105919" comment="virtualbox-guest-x11-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105920" comment="virtualbox-host-kmp-default-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105921" comment="virtualbox-host-kmp-desktop-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105922" comment="virtualbox-host-kmp-pae-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105923" comment="virtualbox-qt-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105924" comment="virtualbox-websrv-4.3.20-7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6590</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6590" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6590" source="CVE"/>
    <description>
    Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 4.3.20 allows local users to affect integrity and availability via vectors related to VMSVGA virtual graphics device, a different vulnerability than CVE-2014-6588, CVE-2014-6589, CVE-2014-6595, and CVE-2015-0427.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105911" comment="python-virtualbox-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105912" comment="virtualbox-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105913" comment="virtualbox-devel-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105914" comment="virtualbox-guest-desktop-icons-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105915" comment="virtualbox-guest-kmp-default-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105916" comment="virtualbox-guest-kmp-desktop-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105917" comment="virtualbox-guest-kmp-pae-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105918" comment="virtualbox-guest-tools-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105919" comment="virtualbox-guest-x11-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105920" comment="virtualbox-host-kmp-default-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105921" comment="virtualbox-host-kmp-desktop-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105922" comment="virtualbox-host-kmp-pae-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105923" comment="virtualbox-qt-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105924" comment="virtualbox-websrv-4.3.20-7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6591</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6591" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java SE component in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality via unknown vectors related to 2D, a different vulnerability than CVE-2014-6585.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105731" comment="java-1_7_0-openjdk-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105732" comment="java-1_7_0-openjdk-accessibility-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105728" comment="java-1_7_0-openjdk-bootstrap-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105729" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105730" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105733" comment="java-1_7_0-openjdk-demo-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105734" comment="java-1_7_0-openjdk-devel-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105735" comment="java-1_7_0-openjdk-headless-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105736" comment="java-1_7_0-openjdk-javadoc-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105737" comment="java-1_7_0-openjdk-src-1.7.0.75-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6593</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6593" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25; Java SE Embedded 7u71 and 8u6; and JRockit 27.8.4 and 28.3.4 allows remote attackers to affect confidentiality and integrity via vectors related to JSSE.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105731" comment="java-1_7_0-openjdk-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105732" comment="java-1_7_0-openjdk-accessibility-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105728" comment="java-1_7_0-openjdk-bootstrap-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105729" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105730" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105733" comment="java-1_7_0-openjdk-demo-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105734" comment="java-1_7_0-openjdk-devel-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105735" comment="java-1_7_0-openjdk-headless-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105736" comment="java-1_7_0-openjdk-javadoc-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105737" comment="java-1_7_0-openjdk-src-1.7.0.75-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6595</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6595" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6595" source="CVE"/>
    <description>
    Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 4.3.20 allows local users to affect integrity and availability via vectors related to VMSVGA virtual graphics device, a different vulnerability than CVE-2014-6588, CVE-2014-6589, CVE-2014-6590, and CVE-2015-0427.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105911" comment="python-virtualbox-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105912" comment="virtualbox-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105913" comment="virtualbox-devel-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105914" comment="virtualbox-guest-desktop-icons-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105915" comment="virtualbox-guest-kmp-default-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105916" comment="virtualbox-guest-kmp-desktop-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105917" comment="virtualbox-guest-kmp-pae-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105918" comment="virtualbox-guest-tools-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105919" comment="virtualbox-guest-x11-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105920" comment="virtualbox-host-kmp-default-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105921" comment="virtualbox-host-kmp-desktop-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105922" comment="virtualbox-host-kmp-pae-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105923" comment="virtualbox-qt-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105924" comment="virtualbox-websrv-4.3.20-7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6601</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-6601" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105731" comment="java-1_7_0-openjdk-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105732" comment="java-1_7_0-openjdk-accessibility-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105728" comment="java-1_7_0-openjdk-bootstrap-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105729" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105730" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105733" comment="java-1_7_0-openjdk-demo-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105734" comment="java-1_7_0-openjdk-devel-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105735" comment="java-1_7_0-openjdk-headless-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105736" comment="java-1_7_0-openjdk-javadoc-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105737" comment="java-1_7_0-openjdk-src-1.7.0.75-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7154</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7154" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7154" source="CVE"/>
    <description>
    Race condition in HVMOP_track_dirty_vram in Xen 4.0.0 through 4.4.x does not ensure possession of the guarding lock for dirty video RAM tracking, which allows certain local guest domains to cause a denial of service via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7155</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7155" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7155" source="CVE"/>
    <description>
    The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen 4.4.x and earlier does not properly check supervisor mode permissions, which allows local HVM users to cause a denial of service (guest crash) or gain guest kernel mode privileges via vectors involving an (1) HLT, (2) LGDT, (3) LIDT, or (4) LMSW instruction.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7156</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7156" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7156" source="CVE"/>
    <description>
    The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen 3.3.x through 4.4.x does not check the supervisor mode permissions for instructions that generate software interrupts, which allows local HVM guest users to cause a denial of service (guest crash) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7169</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169" source="CVE"/>
    <description>
    GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137040" comment="bash-4.2-75.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137041" comment="bash-doc-4.2-75.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137042" comment="libreadline6-6.2-75.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137043" comment="readline-devel-6.2-75.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137044" comment="readline-doc-6.2-75.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7185</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7185" source="CVE"/>
    <description>
    Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a "buffer" function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137609" comment="libpython2_7-1_0-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137610" comment="libpython2_7-1_0-32bit-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137611" comment="python-base-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137612" comment="python-devel-2.7.8-1.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137613" comment="python-xml-2.7.8-1.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7186</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186" source="CVE"/>
    <description>
    The redirection implementation in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via crafted use of here documents, aka the "redir_stack" issue.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137040" comment="bash-4.2-75.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137041" comment="bash-doc-4.2-75.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137042" comment="libreadline6-6.2-75.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137043" comment="readline-devel-6.2-75.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137044" comment="readline-doc-6.2-75.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7187</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187" source="CVE"/>
    <description>
    Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the "word_lineno" issue.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137040" comment="bash-4.2-75.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137041" comment="bash-doc-4.2-75.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137042" comment="libreadline6-6.2-75.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137043" comment="readline-devel-6.2-75.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137044" comment="readline-doc-6.2-75.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7188</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7188" source="CVE"/>
    <description>
    The hvm_msr_read_intercept function in arch/x86/hvm/hvm.c in Xen 4.1 through 4.4.x uses an improper MSR range for x2APIC emulation, which allows local HVM guests to cause a denial of service (host crash) or read data from the hypervisor or other guests via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137905" comment="xen-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137906" comment="xen-doc-html-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137907" comment="xen-kmp-default-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137908" comment="xen-kmp-desktop-4.4.1_06_k3.16.6_2-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137909" comment="xen-libs-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137910" comment="xen-tools-4.4.1_06-3.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137911" comment="xen-tools-domU-4.4.1_06-3.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7189</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7189" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7189" source="CVE"/>
    <description>
    crpyto/tls in Go 1.1 before 1.3.2, when SessionTicketsDisabled is enabled, allows man-in-the-middle attackers to spoof clients via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009101421" comment="docker-1.3.1-5.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101422" comment="docker-bash-completion-1.3.1-5.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101423" comment="docker-zsh-completion-1.3.1-5.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101417" comment="go-1.3.3-5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101418" comment="go-doc-1.3.3-5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101419" comment="go-emacs-1.3.3-5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101420" comment="go-vim-1.3.3-5.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7202</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7202" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7202" source="CVE"/>
    <description>
    stream_engine.cpp in libzmq (aka ZeroMQ/C++)) 4.0.5 before 4.0.5 allows man-in-the-middle attackers to conduct downgrade attacks via a crafted connection request.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009102063" comment="libzmq4-4.0.5-3.6.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102064" comment="zeromq-4.0.5-3.6.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102065" comment="zeromq-devel-4.0.5-3.6.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7203</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7203" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7203" source="CVE"/>
    <description>
    libzmq (aka ZeroMQ/C++) 4.0.x before 4.0.5 does not ensure that nonces are unique, which allows man-in-the-middle attackers to conduct replay attacks via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009102063" comment="libzmq4-4.0.5-3.6.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102064" comment="zeromq-4.0.5-3.6.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102065" comment="zeromq-devel-4.0.5-3.6.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7815</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7815" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7815" source="CVE"/>
    <description>
    The set_pixel_format function in ui/vnc.c in QEMU allows remote attackers to cause a denial of service (crash) via a small bytes_per_pixel value.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126020" comment="xen-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126021" comment="xen-devel-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126022" comment="xen-doc-html-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126023" comment="xen-kmp-default-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126024" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126025" comment="xen-libs-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126026" comment="xen-libs-32bit-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126027" comment="xen-tools-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126028" comment="xen-tools-domU-4.4.4_02-43.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7817</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7817" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817" source="CVE"/>
    <description>
    The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))".
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009106726" comment="glibc-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106727" comment="glibc-32bit-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106728" comment="glibc-devel-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106729" comment="glibc-devel-32bit-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106730" comment="glibc-devel-static-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106731" comment="glibc-devel-static-32bit-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106736" comment="glibc-extra-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106737" comment="glibc-html-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106738" comment="glibc-i18ndata-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106739" comment="glibc-info-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106732" comment="glibc-locale-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106733" comment="glibc-locale-32bit-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106740" comment="glibc-obsolete-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106734" comment="glibc-profile-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106735" comment="glibc-profile-32bit-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106723" comment="glibc-testsuite-2.19-16.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106724" comment="glibc-utils-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106725" comment="glibc-utils-32bit-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106741" comment="nscd-2.19-16.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7818</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7818" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7818" source="CVE"/>
    <description>
    Directory traversal vulnerability in actionpack/lib/action_dispatch/middleware/static.rb in Action Pack in Ruby on Rails 3.x before 3.2.20, 4.0.x before 4.0.11, 4.1.x before 4.1.7, and 4.2.x before 4.2.0.beta3, when serve_static_assets is enabled, allows remote attackers to determine the existence of files outside the application root via a /..%2F sequence.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009102131" comment="rubygem-actionpack-3_2-3.2.17-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102132" comment="rubygem-actionpack-3_2-doc-3.2.17-3.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7819</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7819" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7819" source="CVE"/>
    <description>
    Multiple directory traversal vulnerabilities in server.rb in Sprockets before 2.0.5, 2.1.x before 2.1.4, 2.2.x before 2.2.3, 2.3.x before 2.3.3, 2.4.x before 2.4.6, 2.5.x before 2.5.1, 2.6.x and 2.7.x before 2.7.1, 2.8.x before 2.8.3, 2.9.x before 2.9.4, 2.10.x before 2.10.2, 2.11.x before 2.11.3, 2.12.x before 2.12.3, and 3.x before 3.0.0.beta.3, as distributed with Ruby on Rails 3.x and 4.x, allow remote attackers to determine the existence of files outside the application root via a ../ (dot dot slash) sequence with (1) double slashes or (2) URL encoding.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009102120" comment="rubygem-sprockets-2.12.1-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102094" comment="rubygem-sprockets-2_1-2.1.3-8.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102095" comment="rubygem-sprockets-2_1-doc-2.1.3-8.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102092" comment="rubygem-sprockets-2_2-2.2.2-8.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102093" comment="rubygem-sprockets-2_2-doc-2.2.2-8.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102121" comment="rubygem-sprockets-doc-2.12.1-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102122" comment="rubygem-tilt-1_4-1.4.1-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102123" comment="rubygem-tilt-1_4-doc-1.4.1-2.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102124" comment="rubygem-tilt-1_4-testsuite-1.4.1-2.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7823</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7823" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7823" source="CVE"/>
    <description>
    The virDomainGetXMLDesc API in Libvirt before 1.2.11 allows remote read-only users to obtain the VNC password by using the VIR_DOMAIN_XML_MIGRATABLE flag, which triggers the use of the VIR_DOMAIN_XML_SECURE flag.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009101971" comment="libvirt-1.2.9-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101972" comment="libvirt-client-1.2.9-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101973" comment="libvirt-client-32bit-1.2.9-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101974" comment="libvirt-daemon-1.2.9-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101975" comment="libvirt-daemon-config-network-1.2.9-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101976" comment="libvirt-daemon-config-nwfilter-1.2.9-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101977" comment="libvirt-daemon-driver-interface-1.2.9-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101996" comment="libvirt-daemon-driver-libxl-1.2.9-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101978" comment="libvirt-daemon-driver-lxc-1.2.9-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101979" comment="libvirt-daemon-driver-network-1.2.9-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101980" comment="libvirt-daemon-driver-nodedev-1.2.9-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101981" comment="libvirt-daemon-driver-nwfilter-1.2.9-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101982" comment="libvirt-daemon-driver-qemu-1.2.9-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101983" comment="libvirt-daemon-driver-secret-1.2.9-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101984" comment="libvirt-daemon-driver-storage-1.2.9-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101985" comment="libvirt-daemon-driver-uml-1.2.9-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101986" comment="libvirt-daemon-driver-vbox-1.2.9-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101997" comment="libvirt-daemon-driver-xen-1.2.9-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101987" comment="libvirt-daemon-lxc-1.2.9-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101988" comment="libvirt-daemon-qemu-1.2.9-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101989" comment="libvirt-daemon-uml-1.2.9-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101990" comment="libvirt-daemon-vbox-1.2.9-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101998" comment="libvirt-daemon-xen-1.2.9-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101991" comment="libvirt-devel-1.2.9-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101992" comment="libvirt-devel-32bit-1.2.9-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101993" comment="libvirt-doc-1.2.9-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101994" comment="libvirt-lock-sanlock-1.2.9-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101995" comment="libvirt-login-shell-1.2.9-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101958" comment="libvirt-python-1.1.2-2.40.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7824</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7824" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7824" source="CVE"/>
    <description>
    D-Bus 1.3.0 through 1.6.x before 1.6.26, 1.8.x before 1.8.10, and 1.9.x before 1.9.2 allows local users to cause a denial of service (prevention of new connections and connection drop) by queuing the maximum number of file descriptors.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3636.1.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009101899" comment="dbus-1-1.8.10-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101902" comment="dbus-1-devel-1.8.10-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101903" comment="dbus-1-devel-32bit-1.8.10-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101900" comment="dbus-1-devel-doc-1.8.10-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101901" comment="dbus-1-x11-1.8.10-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101904" comment="libdbus-1-3-1.8.10-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101905" comment="libdbus-1-3-32bit-1.8.10-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7826</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7826" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7826" source="CVE"/>
    <description>
    kernel/trace/trace_syscalls.c in the Linux kernel through 3.17.2 does not properly handle private syscall numbers during use of the ftrace subsystem, which allows local users to gain privileges or cause a denial of service (invalid pointer dereference) via a crafted application.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009103080" comment="kernel-debug-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103081" comment="kernel-debug-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103082" comment="kernel-debug-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103083" comment="kernel-default-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103084" comment="kernel-default-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103085" comment="kernel-default-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103086" comment="kernel-desktop-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103087" comment="kernel-desktop-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103088" comment="kernel-desktop-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103099" comment="kernel-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103089" comment="kernel-docs-3.16.7-7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103090" comment="kernel-ec2-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103091" comment="kernel-ec2-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103092" comment="kernel-ec2-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103100" comment="kernel-macros-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103093" comment="kernel-obs-build-3.16.7-7.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103095" comment="kernel-obs-qa-3.16.7-7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103094" comment="kernel-obs-qa-xen-3.16.7-7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103096" comment="kernel-pae-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103097" comment="kernel-pae-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103098" comment="kernel-pae-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103101" comment="kernel-source-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103102" comment="kernel-source-vanilla-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103103" comment="kernel-syms-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103104" comment="kernel-vanilla-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103105" comment="kernel-vanilla-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103106" comment="kernel-xen-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103107" comment="kernel-xen-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103108" comment="kernel-xen-devel-3.16.7-7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7829</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7829" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7829" source="CVE"/>
    <description>
    Directory traversal vulnerability in actionpack/lib/action_dispatch/middleware/static.rb in Action Pack in Ruby on Rails 3.x before 3.2.21, 4.0.x before 4.0.12, 4.1.x before 4.1.8, and 4.2.x before 4.2.0.beta4, when serve_static_assets is enabled, allows remote attackers to determine the existence of files outside the application root via vectors involving a \ (backslash) character, a similar issue to CVE-2014-7818.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009102131" comment="rubygem-actionpack-3_2-3.2.17-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102132" comment="rubygem-actionpack-3_2-doc-3.2.17-3.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7841</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7841" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7841" source="CVE"/>
    <description>
    The sctp_process_param function in net/sctp/sm_make_chunk.c in the SCTP implementation in the Linux kernel before 3.17.4, when ASCONF is used, allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via a malformed INIT chunk.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009103080" comment="kernel-debug-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103081" comment="kernel-debug-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103082" comment="kernel-debug-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103083" comment="kernel-default-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103084" comment="kernel-default-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103085" comment="kernel-default-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103086" comment="kernel-desktop-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103087" comment="kernel-desktop-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103088" comment="kernel-desktop-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103099" comment="kernel-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103089" comment="kernel-docs-3.16.7-7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103090" comment="kernel-ec2-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103091" comment="kernel-ec2-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103092" comment="kernel-ec2-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103100" comment="kernel-macros-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103093" comment="kernel-obs-build-3.16.7-7.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103095" comment="kernel-obs-qa-3.16.7-7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103094" comment="kernel-obs-qa-xen-3.16.7-7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103096" comment="kernel-pae-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103097" comment="kernel-pae-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103098" comment="kernel-pae-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103101" comment="kernel-source-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103102" comment="kernel-source-vanilla-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103103" comment="kernel-syms-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103104" comment="kernel-vanilla-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103105" comment="kernel-vanilla-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103106" comment="kernel-xen-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103107" comment="kernel-xen-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103108" comment="kernel-xen-devel-3.16.7-7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7844</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7844" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7844" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103229" comment="mailx-12.5-20.4.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7899</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7899" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7899" source="CVE"/>
    <description>
    Google Chrome before 38.0.2125.101 allows remote attackers to spoof the address bar by placing a blob: substring at the beginning of the URL, followed by the original URI scheme and a long username string.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009102711" comment="chromedriver-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102712" comment="chromium-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102713" comment="chromium-desktop-gnome-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102714" comment="chromium-desktop-kde-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102715" comment="chromium-ffmpegsumo-39.0.2171.65-4.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7900</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7900" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7900" source="CVE"/>
    <description>
    Use-after-free vulnerability in the CPDF_Parser::IsLinearizedFile function in fpdfapi/fpdf_parser/fpdf_parser_parser.cpp in PDFium, as used in Google Chrome before 39.0.2171.65, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted PDF document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009102711" comment="chromedriver-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102712" comment="chromium-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102713" comment="chromium-desktop-gnome-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102714" comment="chromium-desktop-kde-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102715" comment="chromium-ffmpegsumo-39.0.2171.65-4.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7901</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7901" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7901" source="CVE"/>
    <description>
    Integer overflow in the opj_t2_read_packet_data function in fxcodec/fx_libopenjpeg/libopenjpeg20/t2.c in OpenJPEG in PDFium, as used in Google Chrome before 39.0.2171.65, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a long segment in a JPEG image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009102711" comment="chromedriver-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102712" comment="chromium-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102713" comment="chromium-desktop-gnome-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102714" comment="chromium-desktop-kde-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102715" comment="chromium-ffmpegsumo-39.0.2171.65-4.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7902</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7902" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7902" source="CVE"/>
    <description>
    Use-after-free vulnerability in PDFium, as used in Google Chrome before 39.0.2171.65, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted PDF document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009102711" comment="chromedriver-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102712" comment="chromium-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102713" comment="chromium-desktop-gnome-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102714" comment="chromium-desktop-kde-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102715" comment="chromium-ffmpegsumo-39.0.2171.65-4.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7903</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7903" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7903" source="CVE"/>
    <description>
    Buffer overflow in OpenJPEG before r2911 in PDFium, as used in Google Chrome before 39.0.2171.65, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted JPEG image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009102711" comment="chromedriver-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102712" comment="chromium-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102713" comment="chromium-desktop-gnome-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102714" comment="chromium-desktop-kde-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102715" comment="chromium-ffmpegsumo-39.0.2171.65-4.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7904</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7904" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7904" source="CVE"/>
    <description>
    Buffer overflow in Skia, as used in Google Chrome before 39.0.2171.65, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009102711" comment="chromedriver-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102712" comment="chromium-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102713" comment="chromium-desktop-gnome-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102714" comment="chromium-desktop-kde-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102715" comment="chromium-ffmpegsumo-39.0.2171.65-4.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7905</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7905" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7905" source="CVE"/>
    <description>
    Google Chrome before 39.0.2171.65 on Android does not prevent navigation to a URL in cases where an intent for the URL lacks CATEGORY_BROWSABLE, which allows remote attackers to bypass intended access restrictions via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009102711" comment="chromedriver-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102712" comment="chromium-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102713" comment="chromium-desktop-gnome-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102714" comment="chromium-desktop-kde-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102715" comment="chromium-ffmpegsumo-39.0.2171.65-4.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7906</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7906" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7906" source="CVE"/>
    <description>
    Use-after-free vulnerability in the Pepper plugins in Google Chrome before 39.0.2171.65 allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted Flash content that triggers an attempted PepperMediaDeviceManager access outside of the object's lifetime.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009102711" comment="chromedriver-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102712" comment="chromium-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102713" comment="chromium-desktop-gnome-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102714" comment="chromium-desktop-kde-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102715" comment="chromium-ffmpegsumo-39.0.2171.65-4.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7907</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7907" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7907" source="CVE"/>
    <description>
    Multiple use-after-free vulnerabilities in modules/screen_orientation/ScreenOrientationController.cpp in Blink, as used in Google Chrome before 39.0.2171.65, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger improper handling of a detached frame, related to the (1) lock and (2) unlock methods.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009102711" comment="chromedriver-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102712" comment="chromium-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102713" comment="chromium-desktop-gnome-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102714" comment="chromium-desktop-kde-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102715" comment="chromium-ffmpegsumo-39.0.2171.65-4.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7908</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7908" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7908" source="CVE"/>
    <description>
    Multiple integer overflows in the CheckMov function in media/base/container_names.cc in Google Chrome before 39.0.2171.65 allow remote attackers to cause a denial of service or possibly have unspecified other impact via a large atom in (1) MPEG-4 or (2) QuickTime .mov data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009102711" comment="chromedriver-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102712" comment="chromium-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102713" comment="chromium-desktop-gnome-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102714" comment="chromium-desktop-kde-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102715" comment="chromium-ffmpegsumo-39.0.2171.65-4.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7909</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7909" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7909" source="CVE"/>
    <description>
    effects/SkDashPathEffect.cpp in Skia, as used in Google Chrome before 39.0.2171.65, computes a hash key using uninitialized integer values, which might allow remote attackers to cause a denial of service by rendering crafted data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009102711" comment="chromedriver-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102712" comment="chromium-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102713" comment="chromium-desktop-gnome-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102714" comment="chromium-desktop-kde-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102715" comment="chromium-ffmpegsumo-39.0.2171.65-4.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7910</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7910" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7910" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 39.0.2171.65 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009102711" comment="chromedriver-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102712" comment="chromium-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102713" comment="chromium-desktop-gnome-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102714" comment="chromium-desktop-kde-39.0.2171.65-4.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102715" comment="chromium-ffmpegsumo-39.0.2171.65-4.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7923</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7923" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7923" source="CVE"/>
    <description>
    The Regular Expressions package in International Components for Unicode (ICU) 52 before SVN revision 292944, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via vectors related to a (1) zero-length quantifier or (2) look-behind expression, a different vulnerability than CVE-2014-7926.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107156" comment="chromedriver-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107157" comment="chromium-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107158" comment="chromium-desktop-gnome-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107159" comment="chromium-desktop-kde-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107160" comment="chromium-ffmpegsumo-40.0.2214.111-13.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7924</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7924" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7924" source="CVE"/>
    <description>
    Use-after-free vulnerability in the IndexedDB implementation in Google Chrome before 40.0.2214.91 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering duplicate BLOB references, related to content/browser/indexed_db/indexed_db_callbacks.cc and content/browser/indexed_db/indexed_db_dispatcher_host.cc.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107156" comment="chromedriver-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107157" comment="chromium-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107158" comment="chromium-desktop-gnome-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107159" comment="chromium-desktop-kde-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107160" comment="chromium-ffmpegsumo-40.0.2214.111-13.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7925</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7925" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7925" source="CVE"/>
    <description>
    Use-after-free vulnerability in the WebAudio implementation in Blink, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an audio-rendering thread in which AudioNode data is improperly maintained.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107156" comment="chromedriver-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107157" comment="chromium-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107158" comment="chromium-desktop-gnome-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107159" comment="chromium-desktop-kde-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107160" comment="chromium-ffmpegsumo-40.0.2214.111-13.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7926</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7926" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7926" source="CVE"/>
    <description>
    The Regular Expressions package in International Components for Unicode (ICU) 52 before SVN revision 292944, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via vectors related to a (1) zero-length quantifier or (2) look-behind expression, a different vulnerability than CVE-2014-7923.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107156" comment="chromedriver-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107157" comment="chromium-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107158" comment="chromium-desktop-gnome-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107159" comment="chromium-desktop-kde-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107160" comment="chromium-ffmpegsumo-40.0.2214.111-13.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7927</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7927" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7927" source="CVE"/>
    <description>
    The SimplifiedLowering::DoLoadBuffer function in compiler/simplified-lowering.cc in Google V8, as used in Google Chrome before 40.0.2214.91, does not properly choose an integer data type, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted JavaScript code.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107156" comment="chromedriver-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107157" comment="chromium-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107158" comment="chromium-desktop-gnome-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107159" comment="chromium-desktop-kde-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107160" comment="chromium-ffmpegsumo-40.0.2214.111-13.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7928</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7928" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7928" source="CVE"/>
    <description>
    hydrogen.cc in Google V8, as used Google Chrome before 40.0.2214.91, does not properly handle arrays with holes, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted JavaScript code that triggers an array copy.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107156" comment="chromedriver-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107157" comment="chromium-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107158" comment="chromium-desktop-gnome-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107159" comment="chromium-desktop-kde-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107160" comment="chromium-ffmpegsumo-40.0.2214.111-13.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7929</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7929" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7929" source="CVE"/>
    <description>
    Use-after-free vulnerability in the HTMLScriptElement::didMoveToNewDocument function in core/html/HTMLScriptElement.cpp in the DOM implementation in Blink, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving movement of a SCRIPT element across documents.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107156" comment="chromedriver-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107157" comment="chromium-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107158" comment="chromium-desktop-gnome-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107159" comment="chromium-desktop-kde-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107160" comment="chromium-ffmpegsumo-40.0.2214.111-13.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7930</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7930" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7930" source="CVE"/>
    <description>
    Use-after-free vulnerability in core/events/TreeScopeEventContext.cpp in the DOM implementation in Blink, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers improper maintenance of TreeScope data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107156" comment="chromedriver-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107157" comment="chromium-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107158" comment="chromium-desktop-gnome-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107159" comment="chromium-desktop-kde-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107160" comment="chromium-ffmpegsumo-40.0.2214.111-13.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7931</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7931" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7931" source="CVE"/>
    <description>
    factory.cc in Google V8, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted JavaScript code that triggers improper maintenance of backing-store pointers.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107156" comment="chromedriver-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107157" comment="chromium-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107158" comment="chromium-desktop-gnome-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107159" comment="chromium-desktop-kde-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107160" comment="chromium-ffmpegsumo-40.0.2214.111-13.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7932</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7932" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7932" source="CVE"/>
    <description>
    Use-after-free vulnerability in the Element::detach function in core/dom/Element.cpp in the DOM implementation in Blink, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving pending updates of detached elements.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107156" comment="chromedriver-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107157" comment="chromium-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107158" comment="chromium-desktop-gnome-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107159" comment="chromium-desktop-kde-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107160" comment="chromium-ffmpegsumo-40.0.2214.111-13.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7933</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7933" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7933" source="CVE"/>
    <description>
    Use-after-free vulnerability in the matroska_read_seek function in libavformat/matroskadec.c in FFmpeg before 2.5.1, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted Matroska file that triggers improper maintenance of tracks data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107156" comment="chromedriver-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107157" comment="chromium-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107158" comment="chromium-desktop-gnome-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107159" comment="chromium-desktop-kde-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107160" comment="chromium-ffmpegsumo-40.0.2214.111-13.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7934</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7934" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7934" source="CVE"/>
    <description>
    Use-after-free vulnerability in the DOM implementation in Blink, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to unexpected absence of document data structures.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107156" comment="chromedriver-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107157" comment="chromium-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107158" comment="chromium-desktop-gnome-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107159" comment="chromium-desktop-kde-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107160" comment="chromium-ffmpegsumo-40.0.2214.111-13.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7935</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7935" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7935" source="CVE"/>
    <description>
    Use-after-free vulnerability in browser/speech/tts_message_filter.cc in the Speech implementation in Google Chrome before 40.0.2214.91 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving utterances from a closed tab.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107156" comment="chromedriver-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107157" comment="chromium-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107158" comment="chromium-desktop-gnome-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107159" comment="chromium-desktop-kde-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107160" comment="chromium-ffmpegsumo-40.0.2214.111-13.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7936</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7936" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7936" source="CVE"/>
    <description>
    Use-after-free vulnerability in the ZoomBubbleView::Close function in browser/ui/views/location_bar/zoom_bubble_view.cc in the Views implementation in Google Chrome before 40.0.2214.91 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted document that triggers improper maintenance of a zoom bubble.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107156" comment="chromedriver-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107157" comment="chromium-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107158" comment="chromium-desktop-gnome-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107159" comment="chromium-desktop-kde-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107160" comment="chromium-ffmpegsumo-40.0.2214.111-13.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7937</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7937" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7937" source="CVE"/>
    <description>
    Multiple off-by-one errors in libavcodec/vorbisdec.c in FFmpeg before 2.4.2, as used in Google Chrome before 40.0.2214.91, allow remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted Vorbis I data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107156" comment="chromedriver-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107157" comment="chromium-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107158" comment="chromium-desktop-gnome-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107159" comment="chromium-desktop-kde-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107160" comment="chromium-ffmpegsumo-40.0.2214.111-13.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7938</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7938" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7938" source="CVE"/>
    <description>
    The Fonts implementation in Google Chrome before 40.0.2214.91 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107156" comment="chromedriver-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107157" comment="chromium-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107158" comment="chromium-desktop-gnome-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107159" comment="chromium-desktop-kde-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107160" comment="chromium-ffmpegsumo-40.0.2214.111-13.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7939</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7939" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7939" source="CVE"/>
    <description>
    Google Chrome before 40.0.2214.91, when the Harmony proxy in Google V8 is enabled, allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code with Proxy.create and console.log calls, related to HTTP responses that lack an "X-Content-Type-Options: nosniff" header.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107156" comment="chromedriver-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107157" comment="chromium-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107158" comment="chromium-desktop-gnome-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107159" comment="chromium-desktop-kde-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107160" comment="chromium-ffmpegsumo-40.0.2214.111-13.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7940</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7940" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7940" source="CVE"/>
    <description>
    The collator implementation in i18n/ucol.cpp in International Components for Unicode (ICU) 52 through SVN revision 293126, as used in Google Chrome before 40.0.2214.91, does not initialize memory for a data structure, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted character sequence.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107156" comment="chromedriver-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107157" comment="chromium-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107158" comment="chromium-desktop-gnome-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107159" comment="chromium-desktop-kde-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107160" comment="chromium-ffmpegsumo-40.0.2214.111-13.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7941</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7941" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7941" source="CVE"/>
    <description>
    The SelectionOwner::ProcessTarget function in ui/base/x/selection_owner.cc in the UI implementation in Google Chrome before 40.0.2214.91 uses an incorrect data type for a certain length value, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted X11 data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107156" comment="chromedriver-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107157" comment="chromium-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107158" comment="chromium-desktop-gnome-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107159" comment="chromium-desktop-kde-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107160" comment="chromium-ffmpegsumo-40.0.2214.111-13.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7942</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7942" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7942" source="CVE"/>
    <description>
    The Fonts implementation in Google Chrome before 40.0.2214.91 does not initialize memory for a data structure, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107156" comment="chromedriver-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107157" comment="chromium-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107158" comment="chromium-desktop-gnome-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107159" comment="chromium-desktop-kde-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107160" comment="chromium-ffmpegsumo-40.0.2214.111-13.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147943" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7943</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7943" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7943" source="CVE"/>
    <description>
    Skia, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107156" comment="chromedriver-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107157" comment="chromium-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107158" comment="chromium-desktop-gnome-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107159" comment="chromium-desktop-kde-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107160" comment="chromium-ffmpegsumo-40.0.2214.111-13.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7944</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7944" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7944" source="CVE"/>
    <description>
    The sycc422_to_rgb function in fxcodec/codec/fx_codec_jpx_opj.cpp in PDFium, as used in Google Chrome before 40.0.2214.91, does not properly handle odd values of image width, which allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PDF document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107156" comment="chromedriver-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107157" comment="chromium-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107158" comment="chromium-desktop-gnome-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107159" comment="chromium-desktop-kde-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107160" comment="chromium-ffmpegsumo-40.0.2214.111-13.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7945</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7945" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7945" source="CVE"/>
    <description>
    OpenJPEG before r2908, as used in PDFium in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PDF document, related to j2k.c, jp2.c, and t2.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107156" comment="chromedriver-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107157" comment="chromium-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107158" comment="chromium-desktop-gnome-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107159" comment="chromium-desktop-kde-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107160" comment="chromium-ffmpegsumo-40.0.2214.111-13.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7946</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7946" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7946" source="CVE"/>
    <description>
    The RenderTable::simplifiedNormalFlowLayout function in core/rendering/RenderTable.cpp in Blink, as used in Google Chrome before 40.0.2214.91, skips captions during table layout in certain situations, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors related to the Fonts implementation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107156" comment="chromedriver-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107157" comment="chromium-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107158" comment="chromium-desktop-gnome-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107159" comment="chromium-desktop-kde-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107160" comment="chromium-ffmpegsumo-40.0.2214.111-13.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7947</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7947" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7947" source="CVE"/>
    <description>
    OpenJPEG before r2944, as used in PDFium in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PDF document, related to j2k.c, jp2.c, pi.c, t1.c, t2.c, and tcd.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107156" comment="chromedriver-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107157" comment="chromium-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107158" comment="chromium-desktop-gnome-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107159" comment="chromium-desktop-kde-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107160" comment="chromium-ffmpegsumo-40.0.2214.111-13.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7948</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-7948" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7948" source="CVE"/>
    <description>
    The AppCacheUpdateJob::URLFetcher::OnResponseStarted function in content/browser/appcache/appcache_update_job.cc in Google Chrome before 40.0.2214.91 proceeds with AppCache caching for SSL sessions even if there is an X.509 certificate error, which allows man-in-the-middle attackers to spoof HTML5 application content via a crafted certificate.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107156" comment="chromedriver-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107157" comment="chromium-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107158" comment="chromium-desktop-gnome-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107159" comment="chromium-desktop-kde-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107160" comment="chromium-ffmpegsumo-40.0.2214.111-13.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8080</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8080" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8080" source="CVE"/>
    <description>
    The REXML parser in Ruby 1.9.x before 1.9.3-p550, 2.0.x before 2.0.0-p594, and 2.1.x before 2.1.4 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document, aka an XML Entity Expansion (XEE) attack.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009103724" comment="libruby2_1-2_1-2.1.3-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103725" comment="ruby2.1-2.1.3-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103726" comment="ruby2.1-devel-2.1.3-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103727" comment="ruby2.1-devel-extra-2.1.3-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103728" comment="ruby2.1-doc-2.1.3-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103729" comment="ruby2.1-doc-ri-2.1.3-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103730" comment="ruby2.1-stdlib-2.1.3-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8090</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8090" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8090" source="CVE"/>
    <description>
    The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nested entity references, aka an XML Entity Expansion (XEE) attack.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1821 and CVE-2014-8080.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009103724" comment="libruby2_1-2_1-2.1.3-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103725" comment="ruby2.1-2.1.3-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103726" comment="ruby2.1-devel-2.1.3-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103727" comment="ruby2.1-devel-extra-2.1.3-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103728" comment="ruby2.1-doc-2.1.3-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103729" comment="ruby2.1-doc-ri-2.1.3-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103730" comment="ruby2.1-stdlib-2.1.3-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8091</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8091" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8091" source="CVE"/>
    <description>
    X.Org X Window System (aka X11 and X) X11R5 and X.Org Server (aka xserver and xorg-server) before 1.16.3, when using SUN-DES-1 (Secure RPC) authentication credentials, does not check the return value of a malloc call, which allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) via a crafted connection request.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009103230" comment="xorg-x11-server-7.6_1.16.1-5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103231" comment="xorg-x11-server-extra-7.6_1.16.1-5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103232" comment="xorg-x11-server-sdk-7.6_1.16.1-5.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8092</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8092" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8092" source="CVE"/>
    <description>
    Multiple integer overflows in X.Org X Window System (aka X11 or X) X11R1 and X.Org Server (aka xserver and xorg-server) before 1.16.3 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a crafted request to the (1) ProcPutImage, (2) GetHosts, (3) RegionSizeof, or (4) REQUEST_FIXED_SIZE function, which triggers an out-of-bounds read or write.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009103230" comment="xorg-x11-server-7.6_1.16.1-5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103231" comment="xorg-x11-server-extra-7.6_1.16.1-5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103232" comment="xorg-x11-server-sdk-7.6_1.16.1-5.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8093</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8093" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8093" source="CVE"/>
    <description>
    Multiple integer overflows in the GLX extension in XFree86 4.0, X.Org X Window System (aka X11 or X) X11R6.7, and X.Org Server (aka xserver and xorg-server) before 1.16.3 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a crafted request to the (1) __glXDisp_ReadPixels, (2) __glXDispSwap_ReadPixels, (3) __glXDisp_GetTexImage, (4) __glXDispSwap_GetTexImage, (5) GetSeparableFilter, (6) GetConvolutionFilter, (7) GetHistogram, (8) GetMinmax, (9) GetColorTable, (10) __glXGetAnswerBuffer, (11) __GLX_GET_ANSWER_BUFFER, (12) __glXMap1dReqSize, (13) __glXMap1fReqSize, (14) Map2Size, (15) __glXMap2dReqSize, (16) __glXMap2fReqSize, (17) __glXImageSize, or (18) __glXSeparableFilter2DReqSize function, which triggers an out-of-bounds read or write.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009103230" comment="xorg-x11-server-7.6_1.16.1-5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103231" comment="xorg-x11-server-extra-7.6_1.16.1-5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103232" comment="xorg-x11-server-sdk-7.6_1.16.1-5.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8094</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8094" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8094" source="CVE"/>
    <description>
    Integer overflow in the ProcDRI2GetBuffers function in the DRI2 extension in X.Org Server (aka xserver and xorg-server) 1.7.0 through 1.16.x before 1.16.3 allows remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a crafted request, which triggers an out-of-bounds read or write.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009103230" comment="xorg-x11-server-7.6_1.16.1-5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103231" comment="xorg-x11-server-extra-7.6_1.16.1-5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103232" comment="xorg-x11-server-sdk-7.6_1.16.1-5.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8095</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8095" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8095" source="CVE"/>
    <description>
    The XInput extension in X.Org X Window System (aka X11 or X) X11R4 and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) SProcXChangeDeviceControl, (2) ProcXChangeDeviceControl, (3) ProcXChangeFeedbackControl, (4) ProcXSendExtensionEvent, (5) SProcXIAllowEvents, (6) SProcXIChangeCursor, (7) ProcXIChangeHierarchy, (8) SProcXIGetClientPointer, (9) SProcXIGrabDevice, (10) SProcXIUngrabDevice, (11) ProcXIUngrabDevice, (12) SProcXIPassiveGrabDevice, (13) ProcXIPassiveGrabDevice, (14) SProcXIPassiveUngrabDevice, (15) ProcXIPassiveUngrabDevice, (16) SProcXListDeviceProperties, (17) SProcXDeleteDeviceProperty, (18) SProcXIListProperties, (19) SProcXIDeleteProperty, (20) SProcXIGetProperty, (21) SProcXIQueryDevice, (22) SProcXIQueryPointer, (23) SProcXISelectEvents, (24) SProcXISetClientPointer, (25) SProcXISetFocus, (26) SProcXIGetFocus, or (27) SProcXIWarpPointer function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009103230" comment="xorg-x11-server-7.6_1.16.1-5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103231" comment="xorg-x11-server-extra-7.6_1.16.1-5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103232" comment="xorg-x11-server-sdk-7.6_1.16.1-5.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8096</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8096" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8096" source="CVE"/>
    <description>
    The SProcXCMiscGetXIDList function in the XC-MISC extension in X.Org X Window System (aka X11 or X) X11R6.0 and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009103230" comment="xorg-x11-server-7.6_1.16.1-5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103231" comment="xorg-x11-server-extra-7.6_1.16.1-5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103232" comment="xorg-x11-server-sdk-7.6_1.16.1-5.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8097</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8097" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8097" source="CVE"/>
    <description>
    The DBE extension in X.Org X Window System (aka X11 or X) X11R6.1 and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) ProcDbeSwapBuffers or (2) SProcDbeSwapBuffers function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009103230" comment="xorg-x11-server-7.6_1.16.1-5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103231" comment="xorg-x11-server-extra-7.6_1.16.1-5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103232" comment="xorg-x11-server-sdk-7.6_1.16.1-5.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8098</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8098" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8098" source="CVE"/>
    <description>
    The GLX extension in XFree86 4.0, X.Org X Window System (aka X11 or X) X11R6.7, and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) __glXDisp_Render, (2) __glXDisp_RenderLarge, (3) __glXDispSwap_VendorPrivate, (4) __glXDispSwap_VendorPrivateWithReply, (5) set_client_info, (6) __glXDispSwap_SetClientInfoARB, (7) DoSwapInterval, (8) DoGetProgramString, (9) DoGetString, (10) __glXDispSwap_RenderMode, (11) __glXDisp_GetCompressedTexImage, (12) __glXDispSwap_GetCompressedTexImage, (13) __glXDisp_FeedbackBuffer, (14) __glXDispSwap_FeedbackBuffer, (15) __glXDisp_SelectBuffer, (16) __glXDispSwap_SelectBuffer, (17) __glXDisp_Flush, (18) __glXDispSwap_Flush, (19) __glXDisp_Finish, (20) __glXDispSwap_Finish, (21) __glXDisp_ReadPixels, (22) __glXDispSwap_ReadPixels, (23) __glXDisp_GetTexImage, (24) __glXDispSwap_GetTexImage, (25) __glXDisp_GetPolygonStipple, (26) __glXDispSwap_GetPolygonStipple, (27) __glXDisp_GetSeparableFilter, (28) __glXDisp_GetSeparableFilterEXT, (29) __glXDisp_GetConvolutionFilter, (30) __glXDisp_GetConvolutionFilterEXT, (31) __glXDisp_GetHistogram, (32) __glXDisp_GetHistogramEXT, (33) __glXDisp_GetMinmax, (34) __glXDisp_GetMinmaxEXT, (35) __glXDisp_GetColorTable, (36) __glXDisp_GetColorTableSGI, (37) GetSeparableFilter, (38) GetConvolutionFilter, (39) GetHistogram, (40) GetMinmax, or (41) GetColorTable function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009103230" comment="xorg-x11-server-7.6_1.16.1-5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103231" comment="xorg-x11-server-extra-7.6_1.16.1-5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103232" comment="xorg-x11-server-sdk-7.6_1.16.1-5.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8099</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8099" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8099" source="CVE"/>
    <description>
    The XVideo extension in XFree86 4.0.0, X.Org X Window System (aka X11 or X) X11R6.7, and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) SProcXvQueryExtension, (2) SProcXvQueryAdaptors, (3) SProcXvQueryEncodings, (4) SProcXvGrabPort, (5) SProcXvUngrabPort, (6) SProcXvPutVideo, (7) SProcXvPutStill, (8) SProcXvGetVideo, (9) SProcXvGetStill, (10) SProcXvPutImage, (11) SProcXvShmPutImage, (12) SProcXvSelectVideoNotify, (13) SProcXvSelectPortNotify, (14) SProcXvStopVideo, (15) SProcXvSetPortAttribute, (16) SProcXvGetPortAttribute, (17) SProcXvQueryBestSize, (18) SProcXvQueryPortAttributes, (19) SProcXvQueryImageAttributes, or (20) SProcXvListImageFormats function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009103230" comment="xorg-x11-server-7.6_1.16.1-5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103231" comment="xorg-x11-server-extra-7.6_1.16.1-5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103232" comment="xorg-x11-server-sdk-7.6_1.16.1-5.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8100</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8100" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8100" source="CVE"/>
    <description>
    The Render extension in XFree86 4.0.1, X.Org X Window System (aka X11 or X) X11R6.7, and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) ProcRenderQueryVersion, (2) SProcRenderQueryVersion, (3) SProcRenderQueryPictFormats, (4) SProcRenderQueryPictIndexValues, (5) SProcRenderCreatePicture, (6) SProcRenderChangePicture, (7) SProcRenderSetPictureClipRectangles, (8) SProcRenderFreePicture, (9) SProcRenderComposite, (10) SProcRenderScale, (11) SProcRenderCreateGlyphSet, (12) SProcRenderReferenceGlyphSet, (13) SProcRenderFreeGlyphSet, (14) SProcRenderFreeGlyphs, or (15) SProcRenderCompositeGlyphs function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009103230" comment="xorg-x11-server-7.6_1.16.1-5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103231" comment="xorg-x11-server-extra-7.6_1.16.1-5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103232" comment="xorg-x11-server-sdk-7.6_1.16.1-5.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8101</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8101" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8101" source="CVE"/>
    <description>
    The RandR extension in XFree86 4.2.0, X.Org X Window System (aka X11 or X) X11R6.7, and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) SProcRRQueryVersion, (2) SProcRRGetScreenInfo, (3) SProcRRSelectInput, or (4) SProcRRConfigureOutputProperty function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009103230" comment="xorg-x11-server-7.6_1.16.1-5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103231" comment="xorg-x11-server-extra-7.6_1.16.1-5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103232" comment="xorg-x11-server-sdk-7.6_1.16.1-5.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8102</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8102" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8102" source="CVE"/>
    <description>
    The SProcXFixesSelectSelectionInput function in the XFixes extension in X.Org X Window System (aka X11 or X) X11R6.8.0 and X.Org Server (aka xserver and xorg-server) before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length value.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009103230" comment="xorg-x11-server-7.6_1.16.1-5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103231" comment="xorg-x11-server-extra-7.6_1.16.1-5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103232" comment="xorg-x11-server-sdk-7.6_1.16.1-5.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8103</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8103" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8103" source="CVE"/>
    <description>
    X.Org Server (aka xserver and xorg-server) 1.15.0 through 1.16.x before 1.16.3 allows remote authenticated users to cause a denial of service (out-of-bounds read or write) or possibly execute arbitrary code via a crafted length or index value to the (1) sproc_dri3_query_version, (2) sproc_dri3_open, (3) sproc_dri3_pixmap_from_buffer, (4) sproc_dri3_buffer_from_pixmap, (5) sproc_dri3_fence_from_fd, (6) sproc_dri3_fd_from_fence, (7) proc_present_query_capabilities, (8) sproc_present_query_version, (9) sproc_present_pixmap, (10) sproc_present_notify_msc, (11) sproc_present_select_input, or (12) sproc_present_query_capabilities function in the (a) DRI3 or (b) Present extension.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009103230" comment="xorg-x11-server-7.6_1.16.1-5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103231" comment="xorg-x11-server-extra-7.6_1.16.1-5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103232" comment="xorg-x11-server-sdk-7.6_1.16.1-5.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8104</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8104" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8104" source="CVE"/>
    <description>
    OpenVPN 2.x before 2.0.11, 2.1.x, 2.2.x before 2.2.3, and 2.3.x before 2.3.6 allows remote authenticated users to cause a denial of service (server crash) via a small control channel packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009102618" comment="openvpn-2.3.4-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102619" comment="openvpn-auth-pam-plugin-2.3.4-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102620" comment="openvpn-down-root-plugin-2.3.4-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8108</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8108" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8108" source="CVE"/>
    <description>
    The mod_dav_svn Apache HTTPD server module in Apache Subversion 1.7.x before 1.7.19 and 1.8.x before 1.8.11 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a request for a URI that triggers a lookup for a virtual transaction name that does not exist.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009103432" comment="libsvn_auth_gnome_keyring-1-0-1.8.11-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103433" comment="libsvn_auth_kwallet-1-0-1.8.11-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103434" comment="subversion-1.8.11-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103435" comment="subversion-bash-completion-1.8.11-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103436" comment="subversion-devel-1.8.11-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103437" comment="subversion-perl-1.8.11-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103438" comment="subversion-python-1.8.11-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103439" comment="subversion-python-ctypes-1.8.11-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103440" comment="subversion-ruby-1.8.11-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103441" comment="subversion-server-1.8.11-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103442" comment="subversion-tools-1.8.11-2.7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8109</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8109" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8109" source="CVE"/>
    <description>
    mod_lua.c in the mod_lua module in the Apache HTTP Server 2.3.x and 2.4.x through 2.4.10 does not support an httpd configuration in which the same Lua authorization provider is used with different arguments within different contexts, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging multiple Require directives, as demonstrated by a configuration that specifies authorization for one group to access a certain directory, and authorization for a second group to access a second directory.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009103537" comment="apache2-2.4.10-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103538" comment="apache2-devel-2.4.10-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103539" comment="apache2-doc-2.4.10-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103540" comment="apache2-event-2.4.10-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103541" comment="apache2-example-pages-2.4.10-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103259" comment="apache2-itk-2.2.29-10.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103542" comment="apache2-prefork-2.4.10-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103543" comment="apache2-utils-2.4.10-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103544" comment="apache2-worker-2.4.10-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8118</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8118" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8118" source="CVE"/>
    <description>
    Integer overflow in RPM 4.12 and earlier allows remote attackers to execute arbitrary code via a crafted CPIO header in the payload section of an RPM file, which triggers a stack-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009103233" comment="python3-rpm-4.11.3-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103236" comment="rpm-4.11.3-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103235" comment="rpm-32bit-4.11.3-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103237" comment="rpm-build-4.11.3-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103238" comment="rpm-devel-4.11.3-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103234" comment="rpm-python-4.11.3-4.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8121</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8121" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8121" source="CVE"/>
    <description>
    DB_LOOKUP in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) 2.21 and earlier does not properly check if a file is open, which allows remote attackers to cause a denial of service (infinite loop) by performing a look-up on a database while iterating over it, which triggers the file pointer to be reset.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110738" comment="glibc-2.19-16.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110739" comment="glibc-32bit-2.19-16.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110740" comment="glibc-devel-2.19-16.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110741" comment="glibc-devel-32bit-2.19-16.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110742" comment="glibc-devel-static-2.19-16.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110743" comment="glibc-devel-static-32bit-2.19-16.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110748" comment="glibc-extra-2.19-16.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110749" comment="glibc-html-2.19-16.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110750" comment="glibc-i18ndata-2.19-16.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110751" comment="glibc-info-2.19-16.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110744" comment="glibc-locale-2.19-16.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110745" comment="glibc-locale-32bit-2.19-16.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110752" comment="glibc-obsolete-2.19-16.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110746" comment="glibc-profile-2.19-16.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110747" comment="glibc-profile-32bit-2.19-16.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110735" comment="glibc-testsuite-2.19-16.15.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110736" comment="glibc-utils-2.19-16.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110737" comment="glibc-utils-32bit-2.19-16.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110753" comment="nscd-2.19-16.15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8127</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8127" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8127" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136807" comment="libtiff-devel-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136808" comment="libtiff-devel-32bit-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136809" comment="libtiff5-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136810" comment="libtiff5-32bit-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136811" comment="tiff-4.0.7-10.35.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8128</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8128" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8128" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111098" comment="libtiff-devel-4.0.4-10.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111097" comment="libtiff-devel-32bit-4.0.4-10.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111100" comment="libtiff5-4.0.4-10.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111099" comment="libtiff5-32bit-4.0.4-10.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111101" comment="tiff-4.0.4-10.10.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8129</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8129" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8129" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111098" comment="libtiff-devel-4.0.4-10.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111097" comment="libtiff-devel-32bit-4.0.4-10.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111100" comment="libtiff5-4.0.4-10.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111099" comment="libtiff5-32bit-4.0.4-10.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111101" comment="tiff-4.0.4-10.10.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8130</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8130" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8130" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111098" comment="libtiff-devel-4.0.4-10.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111097" comment="libtiff-devel-32bit-4.0.4-10.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111100" comment="libtiff5-4.0.4-10.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111099" comment="libtiff5-32bit-4.0.4-10.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111101" comment="tiff-4.0.4-10.10.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8131</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8131" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8131" source="CVE"/>
    <description>
    The qemu implementation of virConnectGetAllDomainStats in libvirt before 1.2.11 does not properly handle locks when a domain is skipped due to ACL restrictions, which allows a remote authenticated users to cause a denial of service (deadlock or segmentation fault and crash) via a request to access the users does not have privileges to access.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009103696" comment="libvirt-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103697" comment="libvirt-client-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103698" comment="libvirt-client-32bit-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103699" comment="libvirt-daemon-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103700" comment="libvirt-daemon-config-network-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103701" comment="libvirt-daemon-config-nwfilter-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103702" comment="libvirt-daemon-driver-interface-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103721" comment="libvirt-daemon-driver-libxl-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103703" comment="libvirt-daemon-driver-lxc-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103704" comment="libvirt-daemon-driver-network-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103705" comment="libvirt-daemon-driver-nodedev-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103706" comment="libvirt-daemon-driver-nwfilter-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103707" comment="libvirt-daemon-driver-qemu-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103708" comment="libvirt-daemon-driver-secret-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103709" comment="libvirt-daemon-driver-storage-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103710" comment="libvirt-daemon-driver-uml-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103711" comment="libvirt-daemon-driver-vbox-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103722" comment="libvirt-daemon-driver-xen-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103712" comment="libvirt-daemon-lxc-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103713" comment="libvirt-daemon-qemu-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103714" comment="libvirt-daemon-uml-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103715" comment="libvirt-daemon-vbox-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103723" comment="libvirt-daemon-xen-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103716" comment="libvirt-devel-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103717" comment="libvirt-devel-32bit-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103718" comment="libvirt-doc-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103719" comment="libvirt-lock-sanlock-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103720" comment="libvirt-login-shell-1.2.9-8.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8132</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8132" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8132" source="CVE"/>
    <description>
    Double free vulnerability in the ssh_packet_kexinit function in kex.c in libssh 0.5.x and 0.6.x before 0.6.4 allows remote attackers to cause a denial of service via a crafted kexinit packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105055" comment="libssh-0.6.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105056" comment="libssh-devel-0.6.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105057" comment="libssh-devel-doc-0.6.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105058" comment="libssh4-0.6.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105059" comment="libssh4-32bit-0.6.3-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8133</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8133" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8133" source="CVE"/>
    <description>
    arch/x86/kernel/tls.c in the Thread Local Storage (TLS) implementation in the Linux kernel through 3.18.1 allows local users to bypass the espfix protection mechanism, and consequently makes it easier for local users to bypass the ASLR protection mechanism, via a crafted application that makes a set_thread_area system call and later reads a 16-bit value.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009103080" comment="kernel-debug-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103081" comment="kernel-debug-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103082" comment="kernel-debug-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103083" comment="kernel-default-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103084" comment="kernel-default-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103085" comment="kernel-default-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103086" comment="kernel-desktop-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103087" comment="kernel-desktop-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103088" comment="kernel-desktop-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103099" comment="kernel-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103089" comment="kernel-docs-3.16.7-7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103090" comment="kernel-ec2-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103091" comment="kernel-ec2-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103092" comment="kernel-ec2-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103100" comment="kernel-macros-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103093" comment="kernel-obs-build-3.16.7-7.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103095" comment="kernel-obs-qa-3.16.7-7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103094" comment="kernel-obs-qa-xen-3.16.7-7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103096" comment="kernel-pae-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103097" comment="kernel-pae-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103098" comment="kernel-pae-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103101" comment="kernel-source-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103102" comment="kernel-source-vanilla-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103103" comment="kernel-syms-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103104" comment="kernel-vanilla-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103105" comment="kernel-vanilla-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103106" comment="kernel-xen-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103107" comment="kernel-xen-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103108" comment="kernel-xen-devel-3.16.7-7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8134</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8134" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8134" source="CVE"/>
    <description>
    The paravirt_ops_setup function in arch/x86/kernel/kvm.c in the Linux kernel through 3.18 uses an improper paravirt_enabled setting for KVM guest kernels, which makes it easier for guest OS users to bypass the ASLR protection mechanism via a crafted application that reads a 16-bit value.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108989" comment="bbswitch-0.8-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108990" comment="bbswitch-kmp-default-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108991" comment="bbswitch-kmp-desktop-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108992" comment="bbswitch-kmp-pae-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108993" comment="bbswitch-kmp-xen-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108994" comment="cloop-2.639-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108995" comment="cloop-kmp-default-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108996" comment="cloop-kmp-desktop-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108997" comment="cloop-kmp-pae-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108998" comment="cloop-kmp-xen-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108999" comment="crash-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109000" comment="crash-devel-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109001" comment="crash-doc-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109002" comment="crash-eppic-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109003" comment="crash-gcore-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109004" comment="crash-kmp-default-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109005" comment="crash-kmp-desktop-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109006" comment="crash-kmp-pae-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109007" comment="crash-kmp-xen-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109008" comment="hdjmod-1.28-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109009" comment="hdjmod-kmp-default-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109010" comment="hdjmod-kmp-desktop-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109011" comment="hdjmod-kmp-pae-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109012" comment="hdjmod-kmp-xen-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109013" comment="ipset-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109014" comment="ipset-devel-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109015" comment="ipset-kmp-default-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109016" comment="ipset-kmp-desktop-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109017" comment="ipset-kmp-pae-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109018" comment="ipset-kmp-xen-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109020" comment="kernel-debug-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109021" comment="kernel-debug-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109022" comment="kernel-debug-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109023" comment="kernel-default-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109024" comment="kernel-default-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109025" comment="kernel-default-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109026" comment="kernel-desktop-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109027" comment="kernel-desktop-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109028" comment="kernel-desktop-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109039" comment="kernel-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109029" comment="kernel-docs-3.16.7-21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109030" comment="kernel-ec2-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109031" comment="kernel-ec2-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109032" comment="kernel-ec2-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109040" comment="kernel-macros-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109033" comment="kernel-obs-build-3.16.7-21.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109035" comment="kernel-obs-qa-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109034" comment="kernel-obs-qa-xen-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109036" comment="kernel-pae-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109037" comment="kernel-pae-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109038" comment="kernel-pae-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109041" comment="kernel-source-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109042" comment="kernel-source-vanilla-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109043" comment="kernel-syms-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109044" comment="kernel-vanilla-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109045" comment="kernel-vanilla-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109046" comment="kernel-xen-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109047" comment="kernel-xen-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109048" comment="kernel-xen-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109019" comment="libipset3-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109049" comment="pcfclock-0.44-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109050" comment="pcfclock-kmp-default-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109051" comment="pcfclock-kmp-desktop-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109052" comment="pcfclock-kmp-pae-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109058" comment="python-virtualbox-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109053" comment="vhba-kmp-20140629-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109054" comment="vhba-kmp-default-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109055" comment="vhba-kmp-desktop-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109056" comment="vhba-kmp-pae-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109057" comment="vhba-kmp-xen-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109059" comment="virtualbox-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109060" comment="virtualbox-devel-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109061" comment="virtualbox-guest-desktop-icons-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109062" comment="virtualbox-guest-kmp-default-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109063" comment="virtualbox-guest-kmp-desktop-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109064" comment="virtualbox-guest-kmp-pae-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109065" comment="virtualbox-guest-tools-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109066" comment="virtualbox-guest-x11-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109067" comment="virtualbox-host-kmp-default-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109068" comment="virtualbox-host-kmp-desktop-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109069" comment="virtualbox-host-kmp-pae-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109070" comment="virtualbox-qt-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109071" comment="virtualbox-websrv-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109072" comment="xen-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109073" comment="xen-devel-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109082" comment="xen-doc-html-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109083" comment="xen-kmp-default-4.4.1_08_k3.16.7_21-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109084" comment="xen-kmp-desktop-4.4.1_08_k3.16.7_21-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109075" comment="xen-libs-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109074" comment="xen-libs-32bit-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109085" comment="xen-tools-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109076" comment="xen-tools-domU-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109077" comment="xtables-addons-2.6-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109078" comment="xtables-addons-kmp-default-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109079" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109080" comment="xtables-addons-kmp-pae-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109081" comment="xtables-addons-kmp-xen-2.6_k3.16.7_21-9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8135</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8135" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8135" source="CVE"/>
    <description>
    The storageVolUpload function in storage/storage_driver.c in libvirt before 1.2.11 does not check a certain return value, which allows local users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted offset value in a "virsh vol-upload" command.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009103696" comment="libvirt-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103697" comment="libvirt-client-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103698" comment="libvirt-client-32bit-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103699" comment="libvirt-daemon-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103700" comment="libvirt-daemon-config-network-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103701" comment="libvirt-daemon-config-nwfilter-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103702" comment="libvirt-daemon-driver-interface-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103721" comment="libvirt-daemon-driver-libxl-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103703" comment="libvirt-daemon-driver-lxc-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103704" comment="libvirt-daemon-driver-network-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103705" comment="libvirt-daemon-driver-nodedev-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103706" comment="libvirt-daemon-driver-nwfilter-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103707" comment="libvirt-daemon-driver-qemu-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103708" comment="libvirt-daemon-driver-secret-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103709" comment="libvirt-daemon-driver-storage-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103710" comment="libvirt-daemon-driver-uml-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103711" comment="libvirt-daemon-driver-vbox-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103722" comment="libvirt-daemon-driver-xen-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103712" comment="libvirt-daemon-lxc-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103713" comment="libvirt-daemon-qemu-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103714" comment="libvirt-daemon-uml-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103715" comment="libvirt-daemon-vbox-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103723" comment="libvirt-daemon-xen-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103716" comment="libvirt-devel-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103717" comment="libvirt-devel-32bit-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103718" comment="libvirt-doc-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103719" comment="libvirt-lock-sanlock-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103720" comment="libvirt-login-shell-1.2.9-8.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8136</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8136" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8136" source="CVE"/>
    <description>
    The (1) qemuDomainMigratePerform and (2) qemuDomainMigrateFinish2 functions in qemu/qemu_driver.c in libvirt do not unlock the domain when an ACL check fails, which allow local users to cause a denial of service via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009103696" comment="libvirt-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103697" comment="libvirt-client-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103698" comment="libvirt-client-32bit-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103699" comment="libvirt-daemon-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103700" comment="libvirt-daemon-config-network-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103701" comment="libvirt-daemon-config-nwfilter-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103702" comment="libvirt-daemon-driver-interface-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103721" comment="libvirt-daemon-driver-libxl-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103703" comment="libvirt-daemon-driver-lxc-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103704" comment="libvirt-daemon-driver-network-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103705" comment="libvirt-daemon-driver-nodedev-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103706" comment="libvirt-daemon-driver-nwfilter-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103707" comment="libvirt-daemon-driver-qemu-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103708" comment="libvirt-daemon-driver-secret-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103709" comment="libvirt-daemon-driver-storage-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103710" comment="libvirt-daemon-driver-uml-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103711" comment="libvirt-daemon-driver-vbox-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103722" comment="libvirt-daemon-driver-xen-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103712" comment="libvirt-daemon-lxc-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103713" comment="libvirt-daemon-qemu-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103714" comment="libvirt-daemon-uml-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103715" comment="libvirt-daemon-vbox-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103723" comment="libvirt-daemon-xen-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103716" comment="libvirt-devel-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103717" comment="libvirt-devel-32bit-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103718" comment="libvirt-doc-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103719" comment="libvirt-lock-sanlock-1.2.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103720" comment="libvirt-login-shell-1.2.9-8.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8137</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8137" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8137" source="CVE"/>
    <description>
    Double free vulnerability in the jas_iccattrval_destroy function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted ICC color profile in a JPEG 2000 image file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105112" comment="jasper-1.900.1-163.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105113" comment="libjasper-devel-1.900.1-163.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105114" comment="libjasper1-1.900.1-163.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105115" comment="libjasper1-32bit-1.900.1-163.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8139</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8139" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8139" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105943" comment="unzip-6.00-26.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105944" comment="unzip-doc-6.00-26.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105942" comment="unzip-rcc-6.00-26.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8140</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8140" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8140" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105943" comment="unzip-6.00-26.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105944" comment="unzip-doc-6.00-26.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105942" comment="unzip-rcc-6.00-26.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8141</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8141" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8141" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105943" comment="unzip-6.00-26.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105944" comment="unzip-doc-6.00-26.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105942" comment="unzip-rcc-6.00-26.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8142</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8142" source="CVE"/>
    <description>
    Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.36, 5.5.x before 5.5.20, and 5.6.x before 5.6.4 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate keys within the serialized properties of an object, a different vulnerability than CVE-2004-1019.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009106233" comment="apache2-mod_php5-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106234" comment="php5-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106235" comment="php5-bcmath-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106236" comment="php5-bz2-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106237" comment="php5-calendar-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106238" comment="php5-ctype-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106239" comment="php5-curl-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106240" comment="php5-dba-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106241" comment="php5-devel-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106242" comment="php5-dom-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106243" comment="php5-enchant-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106244" comment="php5-exif-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106245" comment="php5-fastcgi-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106246" comment="php5-fileinfo-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106247" comment="php5-firebird-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106248" comment="php5-fpm-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106249" comment="php5-ftp-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106250" comment="php5-gd-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106251" comment="php5-gettext-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106252" comment="php5-gmp-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106253" comment="php5-iconv-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106254" comment="php5-imap-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106255" comment="php5-intl-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106256" comment="php5-json-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106257" comment="php5-ldap-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106258" comment="php5-mbstring-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106259" comment="php5-mcrypt-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106260" comment="php5-mssql-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106261" comment="php5-mysql-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106262" comment="php5-odbc-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106263" comment="php5-opcache-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106264" comment="php5-openssl-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106265" comment="php5-pcntl-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106266" comment="php5-pdo-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106267" comment="php5-pear-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106268" comment="php5-pgsql-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106269" comment="php5-phar-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106270" comment="php5-posix-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106271" comment="php5-pspell-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106272" comment="php5-readline-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106273" comment="php5-shmop-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106274" comment="php5-snmp-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106275" comment="php5-soap-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106276" comment="php5-sockets-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106277" comment="php5-sqlite-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106278" comment="php5-suhosin-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106279" comment="php5-sysvmsg-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106280" comment="php5-sysvsem-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106281" comment="php5-sysvshm-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106282" comment="php5-tidy-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106283" comment="php5-tokenizer-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106284" comment="php5-wddx-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106285" comment="php5-xmlreader-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106286" comment="php5-xmlrpc-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106287" comment="php5-xmlwriter-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106288" comment="php5-xsl-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106289" comment="php5-zip-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106290" comment="php5-zlib-5.6.1-8.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8143</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8143" source="CVE"/>
    <description>
    Samba 4.0.x before 4.0.24, 4.1.x before 4.1.16, and 4.2.x before 4.2rc4, when an Active Directory Domain Controller (AD DC) is configured, allows remote authenticated users to set the LDB userAccountControl UF_SERVER_TRUST_ACCOUNT bit, and consequently gain privileges, by leveraging delegation of authority for user-account or computer-account creation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126263" comment="ctdb-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126264" comment="ctdb-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126265" comment="ctdb-pcp-pmda-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126266" comment="ctdb-tests-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126267" comment="libdcerpc-atsvc-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126268" comment="libdcerpc-atsvc0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126269" comment="libdcerpc-atsvc0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126270" comment="libdcerpc-binding0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126271" comment="libdcerpc-binding0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126272" comment="libdcerpc-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126273" comment="libdcerpc-samr-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126274" comment="libdcerpc-samr0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126275" comment="libdcerpc-samr0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126276" comment="libdcerpc0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126277" comment="libdcerpc0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126278" comment="libgensec-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126279" comment="libgensec0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126280" comment="libgensec0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126281" comment="libndr-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126282" comment="libndr-krb5pac-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126283" comment="libndr-krb5pac0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126284" comment="libndr-krb5pac0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126285" comment="libndr-nbt-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126286" comment="libndr-nbt0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126287" comment="libndr-nbt0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126288" comment="libndr-standard-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126289" comment="libndr-standard0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126290" comment="libndr-standard0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126291" comment="libndr0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126292" comment="libndr0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126293" comment="libnetapi-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126294" comment="libnetapi0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126295" comment="libnetapi0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106771" comment="libpdb-devel-4.1.17-5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106773" comment="libpdb0-4.1.17-5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106772" comment="libpdb0-32bit-4.1.17-5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126296" comment="libregistry-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126297" comment="libregistry0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126298" comment="libregistry0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126299" comment="libsamba-credentials-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126300" comment="libsamba-credentials0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126301" comment="libsamba-credentials0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126302" comment="libsamba-hostconfig-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126303" comment="libsamba-hostconfig0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126304" comment="libsamba-hostconfig0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126305" comment="libsamba-passdb-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126306" comment="libsamba-passdb0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126307" comment="libsamba-passdb0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126308" comment="libsamba-policy-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126309" comment="libsamba-policy0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126310" comment="libsamba-policy0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126311" comment="libsamba-util-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126312" comment="libsamba-util0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126313" comment="libsamba-util0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126314" comment="libsamdb-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126315" comment="libsamdb0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126316" comment="libsamdb0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126317" comment="libsmbclient-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126318" comment="libsmbclient-raw-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126319" comment="libsmbclient-raw0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126320" comment="libsmbclient-raw0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126321" comment="libsmbclient0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126322" comment="libsmbclient0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126323" comment="libsmbconf-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126324" comment="libsmbconf0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126325" comment="libsmbconf0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126326" comment="libsmbldap-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126327" comment="libsmbldap0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126328" comment="libsmbldap0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106804" comment="libsmbsharemodes-devel-4.1.17-5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106805" comment="libsmbsharemodes0-4.1.17-5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126329" comment="libtevent-util-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126330" comment="libtevent-util0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126331" comment="libtevent-util0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126332" comment="libwbclient-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126333" comment="libwbclient0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126334" comment="libwbclient0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126335" comment="samba-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126336" comment="samba-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126337" comment="samba-client-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126338" comment="samba-client-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126339" comment="samba-core-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126340" comment="samba-doc-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126341" comment="samba-libs-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126342" comment="samba-libs-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126343" comment="samba-pidl-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126344" comment="samba-python-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126345" comment="samba-test-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126346" comment="samba-test-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126347" comment="samba-winbind-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126348" comment="samba-winbind-32bit-4.2.4-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8146</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8146" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8146" source="CVE"/>
    <description>
    The resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional Algorithm implementation in ICU4C in International Components for Unicode (ICU) before 55.1 does not properly track directionally isolated pieces of text, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly execute arbitrary code via crafted text.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123705" comment="cmis-client-0.5.0-4.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123706" comment="libcmis-0_5-5-0.5.0-4.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123707" comment="libcmis-c-0_5-5-0.5.0-4.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123708" comment="libcmis-c-devel-0.5.0-4.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123709" comment="libcmis-devel-0.5.0-4.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123710" comment="libetonyek-0.1.3-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123711" comment="libetonyek-0_1-1-0.1.3-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123712" comment="libetonyek-devel-0.1.3-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123713" comment="libetonyek-devel-doc-0.1.3-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123714" comment="libetonyek-tools-0.1.3-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123715" comment="libmwaw-0.3.6-2.7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123716" comment="libmwaw-0_3-3-0.3.6-2.7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123717" comment="libmwaw-devel-0.3.6-2.7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123718" comment="libmwaw-devel-doc-0.3.6-2.7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123719" comment="libmwaw-tools-0.3.6-2.7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123720" comment="libodfgen-0.1.4-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123721" comment="libodfgen-0_1-1-0.1.4-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123722" comment="libodfgen-devel-0.1.4-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123723" comment="libodfgen-devel-doc-0.1.4-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123724" comment="libpagemaker-0.0.2-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123725" comment="libpagemaker-0_0-0-0.0.2-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123726" comment="libpagemaker-devel-0.0.2-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123727" comment="libpagemaker-devel-doc-0.0.2-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123728" comment="libpagemaker-tools-0.0.2-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123729" comment="libreoffice-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123730" comment="libreoffice-base-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123731" comment="libreoffice-base-drivers-mysql-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123732" comment="libreoffice-base-drivers-postgresql-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123733" comment="libreoffice-branding-upstream-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123734" comment="libreoffice-calc-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123735" comment="libreoffice-calc-extensions-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123736" comment="libreoffice-draw-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123737" comment="libreoffice-filters-optional-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123738" comment="libreoffice-gnome-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123739" comment="libreoffice-gtk3-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123740" comment="libreoffice-icon-theme-breeze-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123741" comment="libreoffice-icon-theme-galaxy-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123742" comment="libreoffice-icon-theme-hicontrast-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123743" comment="libreoffice-icon-theme-oxygen-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123744" comment="libreoffice-icon-theme-sifr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123745" comment="libreoffice-icon-theme-tango-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123746" comment="libreoffice-impress-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123747" comment="libreoffice-kde4-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123748" comment="libreoffice-l10n-af-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123749" comment="libreoffice-l10n-ar-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123750" comment="libreoffice-l10n-as-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123751" comment="libreoffice-l10n-bg-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123752" comment="libreoffice-l10n-bn-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123753" comment="libreoffice-l10n-br-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123754" comment="libreoffice-l10n-ca-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123755" comment="libreoffice-l10n-cs-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123756" comment="libreoffice-l10n-cy-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123757" comment="libreoffice-l10n-da-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123758" comment="libreoffice-l10n-de-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123759" comment="libreoffice-l10n-dz-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123760" comment="libreoffice-l10n-el-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123761" comment="libreoffice-l10n-en-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123762" comment="libreoffice-l10n-es-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123763" comment="libreoffice-l10n-et-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123764" comment="libreoffice-l10n-eu-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123765" comment="libreoffice-l10n-fa-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123766" comment="libreoffice-l10n-fi-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123767" comment="libreoffice-l10n-fr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123768" comment="libreoffice-l10n-ga-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123769" comment="libreoffice-l10n-gl-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123770" comment="libreoffice-l10n-gu-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123771" comment="libreoffice-l10n-he-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123772" comment="libreoffice-l10n-hi-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123773" comment="libreoffice-l10n-hr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123774" comment="libreoffice-l10n-hu-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123775" comment="libreoffice-l10n-it-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123776" comment="libreoffice-l10n-ja-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123777" comment="libreoffice-l10n-kk-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123778" comment="libreoffice-l10n-kn-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123779" comment="libreoffice-l10n-ko-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123780" comment="libreoffice-l10n-lt-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123781" comment="libreoffice-l10n-lv-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123782" comment="libreoffice-l10n-mai-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123783" comment="libreoffice-l10n-ml-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123784" comment="libreoffice-l10n-mr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123785" comment="libreoffice-l10n-nb-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123786" comment="libreoffice-l10n-nl-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123787" comment="libreoffice-l10n-nn-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123788" comment="libreoffice-l10n-nr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123789" comment="libreoffice-l10n-nso-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123790" comment="libreoffice-l10n-or-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123791" comment="libreoffice-l10n-pa-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123792" comment="libreoffice-l10n-pl-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123793" comment="libreoffice-l10n-pt-BR-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123794" comment="libreoffice-l10n-pt-PT-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123795" comment="libreoffice-l10n-ro-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123796" comment="libreoffice-l10n-ru-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123797" comment="libreoffice-l10n-si-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123798" comment="libreoffice-l10n-sk-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123799" comment="libreoffice-l10n-sl-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123800" comment="libreoffice-l10n-sr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123801" comment="libreoffice-l10n-ss-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123802" comment="libreoffice-l10n-st-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123803" comment="libreoffice-l10n-sv-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123804" comment="libreoffice-l10n-ta-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123805" comment="libreoffice-l10n-te-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123806" comment="libreoffice-l10n-th-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123807" comment="libreoffice-l10n-tn-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123808" comment="libreoffice-l10n-tr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123809" comment="libreoffice-l10n-ts-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123810" comment="libreoffice-l10n-uk-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123811" comment="libreoffice-l10n-ve-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123812" comment="libreoffice-l10n-xh-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123813" comment="libreoffice-l10n-zh-Hans-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123814" comment="libreoffice-l10n-zh-Hant-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123815" comment="libreoffice-l10n-zu-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123816" comment="libreoffice-mailmerge-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123817" comment="libreoffice-math-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123818" comment="libreoffice-officebean-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123819" comment="libreoffice-pyuno-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123820" comment="libreoffice-sdk-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123821" comment="libreoffice-sdk-doc-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123822" comment="libreoffice-share-linker-1-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123823" comment="libreoffice-writer-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123824" comment="libreoffice-writer-extensions-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123825" comment="libwps-0.4.1-2.4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123826" comment="libwps-0_4-4-0.4.1-2.4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123827" comment="libwps-devel-0.4.1-2.4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123828" comment="libwps-tools-0.4.1-2.4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123829" comment="mdds-0.12.1-2.4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123830" comment="mdds-devel-0.12.1-2.4.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8147</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8147" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8147" source="CVE"/>
    <description>
    The resolveImplicitLevels function in common/ubidi.c in the Unicode Bidirectional Algorithm implementation in ICU4C in International Components for Unicode (ICU) before 55.1 uses an integer data type that is inconsistent with a header file, which allows remote attackers to cause a denial of service (incorrect malloc followed by invalid free) or possibly execute arbitrary code via crafted text.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123705" comment="cmis-client-0.5.0-4.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123706" comment="libcmis-0_5-5-0.5.0-4.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123707" comment="libcmis-c-0_5-5-0.5.0-4.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123708" comment="libcmis-c-devel-0.5.0-4.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123709" comment="libcmis-devel-0.5.0-4.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123710" comment="libetonyek-0.1.3-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123711" comment="libetonyek-0_1-1-0.1.3-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123712" comment="libetonyek-devel-0.1.3-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123713" comment="libetonyek-devel-doc-0.1.3-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123714" comment="libetonyek-tools-0.1.3-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123715" comment="libmwaw-0.3.6-2.7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123716" comment="libmwaw-0_3-3-0.3.6-2.7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123717" comment="libmwaw-devel-0.3.6-2.7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123718" comment="libmwaw-devel-doc-0.3.6-2.7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123719" comment="libmwaw-tools-0.3.6-2.7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123720" comment="libodfgen-0.1.4-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123721" comment="libodfgen-0_1-1-0.1.4-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123722" comment="libodfgen-devel-0.1.4-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123723" comment="libodfgen-devel-doc-0.1.4-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123724" comment="libpagemaker-0.0.2-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123725" comment="libpagemaker-0_0-0-0.0.2-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123726" comment="libpagemaker-devel-0.0.2-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123727" comment="libpagemaker-devel-doc-0.0.2-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123728" comment="libpagemaker-tools-0.0.2-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123729" comment="libreoffice-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123730" comment="libreoffice-base-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123731" comment="libreoffice-base-drivers-mysql-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123732" comment="libreoffice-base-drivers-postgresql-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123733" comment="libreoffice-branding-upstream-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123734" comment="libreoffice-calc-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123735" comment="libreoffice-calc-extensions-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123736" comment="libreoffice-draw-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123737" comment="libreoffice-filters-optional-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123738" comment="libreoffice-gnome-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123739" comment="libreoffice-gtk3-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123740" comment="libreoffice-icon-theme-breeze-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123741" comment="libreoffice-icon-theme-galaxy-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123742" comment="libreoffice-icon-theme-hicontrast-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123743" comment="libreoffice-icon-theme-oxygen-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123744" comment="libreoffice-icon-theme-sifr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123745" comment="libreoffice-icon-theme-tango-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123746" comment="libreoffice-impress-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123747" comment="libreoffice-kde4-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123748" comment="libreoffice-l10n-af-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123749" comment="libreoffice-l10n-ar-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123750" comment="libreoffice-l10n-as-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123751" comment="libreoffice-l10n-bg-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123752" comment="libreoffice-l10n-bn-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123753" comment="libreoffice-l10n-br-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123754" comment="libreoffice-l10n-ca-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123755" comment="libreoffice-l10n-cs-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123756" comment="libreoffice-l10n-cy-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123757" comment="libreoffice-l10n-da-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123758" comment="libreoffice-l10n-de-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123759" comment="libreoffice-l10n-dz-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123760" comment="libreoffice-l10n-el-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123761" comment="libreoffice-l10n-en-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123762" comment="libreoffice-l10n-es-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123763" comment="libreoffice-l10n-et-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123764" comment="libreoffice-l10n-eu-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123765" comment="libreoffice-l10n-fa-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123766" comment="libreoffice-l10n-fi-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123767" comment="libreoffice-l10n-fr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123768" comment="libreoffice-l10n-ga-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123769" comment="libreoffice-l10n-gl-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123770" comment="libreoffice-l10n-gu-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123771" comment="libreoffice-l10n-he-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123772" comment="libreoffice-l10n-hi-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123773" comment="libreoffice-l10n-hr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123774" comment="libreoffice-l10n-hu-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123775" comment="libreoffice-l10n-it-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123776" comment="libreoffice-l10n-ja-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123777" comment="libreoffice-l10n-kk-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123778" comment="libreoffice-l10n-kn-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123779" comment="libreoffice-l10n-ko-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123780" comment="libreoffice-l10n-lt-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123781" comment="libreoffice-l10n-lv-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123782" comment="libreoffice-l10n-mai-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123783" comment="libreoffice-l10n-ml-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123784" comment="libreoffice-l10n-mr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123785" comment="libreoffice-l10n-nb-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123786" comment="libreoffice-l10n-nl-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123787" comment="libreoffice-l10n-nn-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123788" comment="libreoffice-l10n-nr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123789" comment="libreoffice-l10n-nso-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123790" comment="libreoffice-l10n-or-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123791" comment="libreoffice-l10n-pa-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123792" comment="libreoffice-l10n-pl-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123793" comment="libreoffice-l10n-pt-BR-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123794" comment="libreoffice-l10n-pt-PT-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123795" comment="libreoffice-l10n-ro-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123796" comment="libreoffice-l10n-ru-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123797" comment="libreoffice-l10n-si-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123798" comment="libreoffice-l10n-sk-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123799" comment="libreoffice-l10n-sl-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123800" comment="libreoffice-l10n-sr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123801" comment="libreoffice-l10n-ss-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123802" comment="libreoffice-l10n-st-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123803" comment="libreoffice-l10n-sv-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123804" comment="libreoffice-l10n-ta-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123805" comment="libreoffice-l10n-te-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123806" comment="libreoffice-l10n-th-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123807" comment="libreoffice-l10n-tn-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123808" comment="libreoffice-l10n-tr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123809" comment="libreoffice-l10n-ts-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123810" comment="libreoffice-l10n-uk-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123811" comment="libreoffice-l10n-ve-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123812" comment="libreoffice-l10n-xh-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123813" comment="libreoffice-l10n-zh-Hans-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123814" comment="libreoffice-l10n-zh-Hant-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123815" comment="libreoffice-l10n-zu-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123816" comment="libreoffice-mailmerge-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123817" comment="libreoffice-math-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123818" comment="libreoffice-officebean-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123819" comment="libreoffice-pyuno-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123820" comment="libreoffice-sdk-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123821" comment="libreoffice-sdk-doc-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123822" comment="libreoffice-share-linker-1-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123823" comment="libreoffice-writer-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123824" comment="libreoffice-writer-extensions-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123825" comment="libwps-0.4.1-2.4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123826" comment="libwps-0_4-4-0.4.1-2.4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123827" comment="libwps-devel-0.4.1-2.4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123828" comment="libwps-tools-0.4.1-2.4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123829" comment="mdds-0.12.1-2.4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123830" comment="mdds-devel-0.12.1-2.4.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8148</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8148" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8148" source="CVE"/>
    <description>
    The default D-Bus access control rule in Midgard2 10.05.7.1 allows local users to send arbitrary method calls or signals to any process on the system bus and possibly execute arbitrary code with root privileges.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105256" comment="dbus-1-1.8.14-12.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105260" comment="dbus-1-devel-1.8.14-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105261" comment="dbus-1-devel-32bit-1.8.14-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105257" comment="dbus-1-devel-doc-1.8.14-12.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105258" comment="dbus-1-x11-1.8.14-12.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105262" comment="libdbus-1-3-1.8.14-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105263" comment="libdbus-1-3-32bit-1.8.14-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8150</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8150" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8150" source="CVE"/>
    <description>
    CRLF injection vulnerability in libcurl 6.0 through 7.x before 7.40.0, when using an HTTP proxy, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in a URL.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105953" comment="curl-7.40.0-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105954" comment="libcurl-devel-7.40.0-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105956" comment="libcurl4-7.40.0-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105955" comment="libcurl4-32bit-7.40.0-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8154</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8154" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8154" source="CVE"/>
    <description>
    The Gst.MapInfo function in Vala 0.26.0 and 0.26.1 uses an incorrect buffer length declaration for the Gstreamer bindings, which allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via unspecified vectors, which trigger a heap-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105284" comment="libvala-0_26-0-0.26.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105285" comment="libvala-0_26-devel-0.26.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105282" comment="shotwell-0.20.1-5.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105283" comment="shotwell-lang-0.20.1-5.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105286" comment="vala-0.26.1-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8157</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8157" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8157" source="CVE"/>
    <description>
    Off-by-one error in the jpc_dec_process_sot function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image, which triggers a heap-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105809" comment="jasper-1.900.1-163.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105810" comment="libjasper-devel-1.900.1-163.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105811" comment="libjasper1-1.900.1-163.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105812" comment="libjasper1-32bit-1.900.1-163.13.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8158</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8158" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8158" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in jpc_qmfb.c in JasPer 1.900.1 and earlier allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted JPEG 2000 image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105809" comment="jasper-1.900.1-163.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105810" comment="libjasper-devel-1.900.1-163.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105811" comment="libjasper1-1.900.1-163.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105812" comment="libjasper1-32bit-1.900.1-163.13.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8160</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8160" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8160" source="CVE"/>
    <description>
    net/netfilter/nf_conntrack_proto_generic.c in the Linux kernel before 3.18 generates incorrect conntrack entries during handling of certain iptables rule sets for the SCTP, DCCP, GRE, and UDP-Lite protocols, which allows remote attackers to bypass intended access restrictions via packets with disallowed port numbers.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108989" comment="bbswitch-0.8-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108990" comment="bbswitch-kmp-default-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108991" comment="bbswitch-kmp-desktop-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108992" comment="bbswitch-kmp-pae-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108993" comment="bbswitch-kmp-xen-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108994" comment="cloop-2.639-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108995" comment="cloop-kmp-default-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108996" comment="cloop-kmp-desktop-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108997" comment="cloop-kmp-pae-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108998" comment="cloop-kmp-xen-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108999" comment="crash-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109000" comment="crash-devel-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109001" comment="crash-doc-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109002" comment="crash-eppic-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109003" comment="crash-gcore-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109004" comment="crash-kmp-default-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109005" comment="crash-kmp-desktop-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109006" comment="crash-kmp-pae-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109007" comment="crash-kmp-xen-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109008" comment="hdjmod-1.28-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109009" comment="hdjmod-kmp-default-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109010" comment="hdjmod-kmp-desktop-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109011" comment="hdjmod-kmp-pae-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109012" comment="hdjmod-kmp-xen-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109013" comment="ipset-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109014" comment="ipset-devel-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109015" comment="ipset-kmp-default-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109016" comment="ipset-kmp-desktop-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109017" comment="ipset-kmp-pae-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109018" comment="ipset-kmp-xen-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109020" comment="kernel-debug-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109021" comment="kernel-debug-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109022" comment="kernel-debug-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109023" comment="kernel-default-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109024" comment="kernel-default-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109025" comment="kernel-default-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109026" comment="kernel-desktop-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109027" comment="kernel-desktop-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109028" comment="kernel-desktop-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109039" comment="kernel-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109029" comment="kernel-docs-3.16.7-21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109030" comment="kernel-ec2-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109031" comment="kernel-ec2-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109032" comment="kernel-ec2-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109040" comment="kernel-macros-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109033" comment="kernel-obs-build-3.16.7-21.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109035" comment="kernel-obs-qa-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109034" comment="kernel-obs-qa-xen-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109036" comment="kernel-pae-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109037" comment="kernel-pae-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109038" comment="kernel-pae-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109041" comment="kernel-source-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109042" comment="kernel-source-vanilla-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109043" comment="kernel-syms-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109044" comment="kernel-vanilla-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109045" comment="kernel-vanilla-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109046" comment="kernel-xen-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109047" comment="kernel-xen-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109048" comment="kernel-xen-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109019" comment="libipset3-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109049" comment="pcfclock-0.44-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109050" comment="pcfclock-kmp-default-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109051" comment="pcfclock-kmp-desktop-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109052" comment="pcfclock-kmp-pae-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109058" comment="python-virtualbox-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109053" comment="vhba-kmp-20140629-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109054" comment="vhba-kmp-default-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109055" comment="vhba-kmp-desktop-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109056" comment="vhba-kmp-pae-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109057" comment="vhba-kmp-xen-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109059" comment="virtualbox-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109060" comment="virtualbox-devel-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109061" comment="virtualbox-guest-desktop-icons-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109062" comment="virtualbox-guest-kmp-default-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109063" comment="virtualbox-guest-kmp-desktop-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109064" comment="virtualbox-guest-kmp-pae-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109065" comment="virtualbox-guest-tools-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109066" comment="virtualbox-guest-x11-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109067" comment="virtualbox-host-kmp-default-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109068" comment="virtualbox-host-kmp-desktop-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109069" comment="virtualbox-host-kmp-pae-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109070" comment="virtualbox-qt-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109071" comment="virtualbox-websrv-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109072" comment="xen-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109073" comment="xen-devel-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109082" comment="xen-doc-html-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109083" comment="xen-kmp-default-4.4.1_08_k3.16.7_21-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109084" comment="xen-kmp-desktop-4.4.1_08_k3.16.7_21-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109075" comment="xen-libs-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109074" comment="xen-libs-32bit-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109085" comment="xen-tools-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109076" comment="xen-tools-domU-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109077" comment="xtables-addons-2.6-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109078" comment="xtables-addons-kmp-default-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109079" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109080" comment="xtables-addons-kmp-pae-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109081" comment="xtables-addons-kmp-xen-2.6_k3.16.7_21-9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8161</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8161" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8161" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009106919" comment="libecpg6-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106918" comment="libecpg6-32bit-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106921" comment="libpq5-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106920" comment="libpq5-32bit-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106924" comment="postgresql93-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106925" comment="postgresql93-contrib-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106922" comment="postgresql93-devel-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106926" comment="postgresql93-docs-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106923" comment="postgresql93-libs-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106927" comment="postgresql93-plperl-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106928" comment="postgresql93-plpython-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106929" comment="postgresql93-pltcl-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106930" comment="postgresql93-server-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106931" comment="postgresql93-test-9.3.6-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8169</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8169" source="CVE"/>
    <description>
    automount 5.0.8, when a program map uses certain interpreted languages, uses the calling user's USER and HOME environment variable values instead of the values for the user used to run the mapped program, which allows local users to gain privileges via a Trojan horse program in the user home directory.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107601" comment="autofs-5.1.0-2.8.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8176</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8176" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8176" source="CVE"/>
    <description>
    The dtls1_clear_queues function in ssl/d1_lib.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h frees data structures without considering that application data can arrive between a ChangeCipherSpec message and a Finished message, which allows remote DTLS peers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unexpected application data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111311" comment="libcrypto34-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111312" comment="libcrypto34-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111313" comment="libressl-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111314" comment="libressl-devel-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111315" comment="libressl-devel-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111316" comment="libressl-devel-doc-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111317" comment="libssl33-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111318" comment="libssl33-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111319" comment="libtls4-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111320" comment="libtls4-32bit-2.2.1-2.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8178</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8178" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8178" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115059" comment="docker-1.8.3-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115060" comment="docker-bash-completion-1.8.3-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115061" comment="docker-test-1.8.3-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115062" comment="docker-zsh-completion-1.8.3-43.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8179</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8179" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115059" comment="docker-1.8.3-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115060" comment="docker-bash-completion-1.8.3-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115061" comment="docker-test-1.8.3-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115062" comment="docker-zsh-completion-1.8.3-43.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8242</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8242" source="CVE"/>
    <description>
    librsync before 1.0.0 uses a truncated MD4 checksum to match blocks, which makes it easier for remote attackers to modify transmitted data via a birthday attack.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115046" comment="rsync-3.1.1-2.7.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8275</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8275" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8275" source="CVE"/>
    <description>
    OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not enforce certain constraints on certificate data, which allows remote attackers to defeat a fingerprint-based certificate-blacklist protection mechanism by including crafted data within a certificate's unsigned portion, related to crypto/asn1/a_verify.c, crypto/dsa/dsa_asn1.c, crypto/ecdsa/ecs_vrf.c, and crypto/x509/x_all.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111311" comment="libcrypto34-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111312" comment="libcrypto34-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105297" comment="libopenssl-devel-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105298" comment="libopenssl-devel-32bit-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124418" comment="libopenssl0_9_8-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124419" comment="libopenssl0_9_8-32bit-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105299" comment="libopenssl1_0_0-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105300" comment="libopenssl1_0_0-32bit-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105301" comment="libopenssl1_0_0-hmac-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105302" comment="libopenssl1_0_0-hmac-32bit-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111313" comment="libressl-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111314" comment="libressl-devel-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111315" comment="libressl-devel-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111316" comment="libressl-devel-doc-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111317" comment="libssl33-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111318" comment="libssl33-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111319" comment="libtls4-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111320" comment="libtls4-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105303" comment="openssl-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105304" comment="openssl-doc-1.0.1k-2.16.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8354</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8354" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8354" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009101364" comment="ImageMagick-6.8.9.8-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101366" comment="ImageMagick-devel-6.8.9.8-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101365" comment="ImageMagick-devel-32bit-6.8.9.8-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101367" comment="ImageMagick-doc-6.8.9.8-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101368" comment="ImageMagick-extra-6.8.9.8-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101538" comment="libMagick++-6_Q16-2-6.8.6.9-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101537" comment="libMagick++-6_Q16-2-32bit-6.8.6.9-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101370" comment="libMagick++-6_Q16-5-6.8.9.8-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101369" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101372" comment="libMagick++-devel-6.8.9.8-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101371" comment="libMagick++-devel-32bit-6.8.9.8-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101343" comment="libMagick++5-6.7.8.8-4.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101542" comment="libMagickCore-6_Q16-1-6.8.6.9-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101541" comment="libMagickCore-6_Q16-1-32bit-6.8.6.9-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101374" comment="libMagickCore-6_Q16-2-6.8.9.8-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101373" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101345" comment="libMagickCore5-6.7.8.8-4.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101344" comment="libMagickCore5-32bit-6.7.8.8-4.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101544" comment="libMagickWand-6_Q16-1-6.8.6.9-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101543" comment="libMagickWand-6_Q16-1-32bit-6.8.6.9-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101376" comment="libMagickWand-6_Q16-2-6.8.9.8-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101375" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101347" comment="libMagickWand5-6.7.8.8-4.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101346" comment="libMagickWand5-32bit-6.7.8.8-4.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101377" comment="perl-PerlMagick-6.8.9.8-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8355</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8355" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8355" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009101364" comment="ImageMagick-6.8.9.8-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101366" comment="ImageMagick-devel-6.8.9.8-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101365" comment="ImageMagick-devel-32bit-6.8.9.8-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101367" comment="ImageMagick-doc-6.8.9.8-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101368" comment="ImageMagick-extra-6.8.9.8-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101538" comment="libMagick++-6_Q16-2-6.8.6.9-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101537" comment="libMagick++-6_Q16-2-32bit-6.8.6.9-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101370" comment="libMagick++-6_Q16-5-6.8.9.8-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101369" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101372" comment="libMagick++-devel-6.8.9.8-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101371" comment="libMagick++-devel-32bit-6.8.9.8-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101343" comment="libMagick++5-6.7.8.8-4.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101542" comment="libMagickCore-6_Q16-1-6.8.6.9-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101541" comment="libMagickCore-6_Q16-1-32bit-6.8.6.9-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101374" comment="libMagickCore-6_Q16-2-6.8.9.8-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101373" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101345" comment="libMagickCore5-6.7.8.8-4.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101344" comment="libMagickCore5-32bit-6.7.8.8-4.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101544" comment="libMagickWand-6_Q16-1-6.8.6.9-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101543" comment="libMagickWand-6_Q16-1-32bit-6.8.6.9-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101376" comment="libMagickWand-6_Q16-2-6.8.9.8-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101375" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101347" comment="libMagickWand5-6.7.8.8-4.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101346" comment="libMagickWand5-32bit-6.7.8.8-4.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101377" comment="perl-PerlMagick-6.8.9.8-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8437</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2014-8437" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8437" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allow remote attackers to discover session tokens via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117556" comment="flash-player-11.2.202.418-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117557" comment="flash-player-gnome-11.2.202.418-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117558" comment="flash-player-kde4-11.2.202.418-2.11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8438</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2014-8438" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8438" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-0573 and CVE-2014-0588.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117556" comment="flash-player-11.2.202.418-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117557" comment="flash-player-gnome-11.2.202.418-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117558" comment="flash-player-kde4-11.2.202.418-2.11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8440</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2014-8440" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8440" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0576, CVE-2014-0581, and CVE-2014-8441.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117556" comment="flash-player-11.2.202.418-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117557" comment="flash-player-gnome-11.2.202.418-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117558" comment="flash-player-kde4-11.2.202.418-2.11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8441</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2014-8441" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8441" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0576, CVE-2014-0581, and CVE-2014-8440.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117556" comment="flash-player-11.2.202.418-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117557" comment="flash-player-gnome-11.2.202.418-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117558" comment="flash-player-kde4-11.2.202.418-2.11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8442</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2014-8442" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8442" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.252 and 14.x and 15.x before 15.0.0.223 on Windows and OS X and before 11.2.202.418 on Linux, Adobe AIR before 15.0.0.356, Adobe AIR SDK before 15.0.0.356, and Adobe AIR SDK &amp; Compiler before 15.0.0.356 allow attackers to complete a transition from Low Integrity to Medium Integrity by leveraging incorrect permissions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117556" comment="flash-player-11.2.202.418-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117557" comment="flash-player-gnome-11.2.202.418-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117558" comment="flash-player-kde4-11.2.202.418-2.11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8443</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2014-8443" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8443" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.259 and 14.x through 16.x before 16.0.0.235 on Windows and OS X and before 11.2.202.425 on Linux allows attackers to execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117562" comment="flash-player-11.2.202.425-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117563" comment="flash-player-gnome-11.2.202.425-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117564" comment="flash-player-kde4-11.2.202.425-2.17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8483</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8483" source="CVE"/>
    <description>
    The blowfishECB function in core/cipher.cpp in Quassel IRC 0.10.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a malformed string.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009101403" comment="konversation-1.5.1-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101404" comment="konversation-lang-1.5.1-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101248" comment="quassel-0.10.0-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101249" comment="quassel-base-0.10.0-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101250" comment="quassel-client-0.10.0-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101251" comment="quassel-core-0.10.0-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101252" comment="quassel-mono-0.10.0-3.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8500</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8500" source="CVE"/>
    <description>
    ISC BIND 9.0.x through 9.8.x, 9.9.0 through 9.9.6, and 9.10.0 through 9.10.1 does not limit delegation chaining, which allows remote attackers to cause a denial of service (memory consumption and named crash) via a large or infinite number of referrals.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111175" comment="bind-9.9.6P1-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111176" comment="bind-chrootenv-9.9.6P1-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111177" comment="bind-devel-9.9.6P1-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111178" comment="bind-doc-9.9.6P1-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111180" comment="bind-libs-9.9.6P1-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111179" comment="bind-libs-32bit-9.9.6P1-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111181" comment="bind-lwresd-9.9.6P1-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111182" comment="bind-utils-9.9.6P1-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8517</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8517" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8517" source="CVE"/>
    <description>
    The fetch_url function in usr.bin/ftp/fetch.c in tnftp, as used in NetBSD 5.1 through 5.1.4, 5.2 through 5.2.2, 6.0 through 6.0.6, and 6.1 through 6.1.5 allows remote attackers to execute arbitrary commands via a | (pipe) character at the end of an HTTP redirect.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101247" comment="tnftp-20130505-4.4.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8559</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8559" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8559" source="CVE"/>
    <description>
    The d_walk function in fs/dcache.c in the Linux kernel through 3.17.2 does not properly maintain the semantics of rename_lock, which allows local users to cause a denial of service (deadlock and system hang) via a crafted application.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108989" comment="bbswitch-0.8-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108990" comment="bbswitch-kmp-default-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108991" comment="bbswitch-kmp-desktop-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108992" comment="bbswitch-kmp-pae-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108993" comment="bbswitch-kmp-xen-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108994" comment="cloop-2.639-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108995" comment="cloop-kmp-default-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108996" comment="cloop-kmp-desktop-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108997" comment="cloop-kmp-pae-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108998" comment="cloop-kmp-xen-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108999" comment="crash-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109000" comment="crash-devel-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109001" comment="crash-doc-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109002" comment="crash-eppic-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109003" comment="crash-gcore-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109004" comment="crash-kmp-default-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109005" comment="crash-kmp-desktop-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109006" comment="crash-kmp-pae-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109007" comment="crash-kmp-xen-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109008" comment="hdjmod-1.28-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109009" comment="hdjmod-kmp-default-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109010" comment="hdjmod-kmp-desktop-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109011" comment="hdjmod-kmp-pae-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109012" comment="hdjmod-kmp-xen-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109013" comment="ipset-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109014" comment="ipset-devel-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109015" comment="ipset-kmp-default-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109016" comment="ipset-kmp-desktop-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109017" comment="ipset-kmp-pae-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109018" comment="ipset-kmp-xen-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109020" comment="kernel-debug-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109021" comment="kernel-debug-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109022" comment="kernel-debug-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109023" comment="kernel-default-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109024" comment="kernel-default-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109025" comment="kernel-default-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109026" comment="kernel-desktop-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109027" comment="kernel-desktop-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109028" comment="kernel-desktop-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109039" comment="kernel-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109029" comment="kernel-docs-3.16.7-21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109030" comment="kernel-ec2-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109031" comment="kernel-ec2-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109032" comment="kernel-ec2-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109040" comment="kernel-macros-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109033" comment="kernel-obs-build-3.16.7-21.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109035" comment="kernel-obs-qa-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109034" comment="kernel-obs-qa-xen-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109036" comment="kernel-pae-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109037" comment="kernel-pae-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109038" comment="kernel-pae-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109041" comment="kernel-source-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109042" comment="kernel-source-vanilla-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109043" comment="kernel-syms-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109044" comment="kernel-vanilla-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109045" comment="kernel-vanilla-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109046" comment="kernel-xen-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109047" comment="kernel-xen-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109048" comment="kernel-xen-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109019" comment="libipset3-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109049" comment="pcfclock-0.44-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109050" comment="pcfclock-kmp-default-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109051" comment="pcfclock-kmp-desktop-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109052" comment="pcfclock-kmp-pae-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109058" comment="python-virtualbox-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109053" comment="vhba-kmp-20140629-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109054" comment="vhba-kmp-default-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109055" comment="vhba-kmp-desktop-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109056" comment="vhba-kmp-pae-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109057" comment="vhba-kmp-xen-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109059" comment="virtualbox-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109060" comment="virtualbox-devel-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109061" comment="virtualbox-guest-desktop-icons-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109062" comment="virtualbox-guest-kmp-default-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109063" comment="virtualbox-guest-kmp-desktop-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109064" comment="virtualbox-guest-kmp-pae-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109065" comment="virtualbox-guest-tools-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109066" comment="virtualbox-guest-x11-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109067" comment="virtualbox-host-kmp-default-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109068" comment="virtualbox-host-kmp-desktop-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109069" comment="virtualbox-host-kmp-pae-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109070" comment="virtualbox-qt-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109071" comment="virtualbox-websrv-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109072" comment="xen-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109073" comment="xen-devel-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109082" comment="xen-doc-html-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109083" comment="xen-kmp-default-4.4.1_08_k3.16.7_21-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109084" comment="xen-kmp-desktop-4.4.1_08_k3.16.7_21-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109075" comment="xen-libs-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109074" comment="xen-libs-32bit-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109085" comment="xen-tools-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109076" comment="xen-tools-domU-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109077" comment="xtables-addons-2.6-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109078" comment="xtables-addons-kmp-default-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109079" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109080" comment="xtables-addons-kmp-pae-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109081" comment="xtables-addons-kmp-xen-2.6_k3.16.7_21-9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8562</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8562" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8562" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009101364" comment="ImageMagick-6.8.9.8-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101366" comment="ImageMagick-devel-6.8.9.8-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101365" comment="ImageMagick-devel-32bit-6.8.9.8-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101367" comment="ImageMagick-doc-6.8.9.8-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101368" comment="ImageMagick-extra-6.8.9.8-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101538" comment="libMagick++-6_Q16-2-6.8.6.9-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101537" comment="libMagick++-6_Q16-2-32bit-6.8.6.9-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101370" comment="libMagick++-6_Q16-5-6.8.9.8-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101369" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101372" comment="libMagick++-devel-6.8.9.8-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101371" comment="libMagick++-devel-32bit-6.8.9.8-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101343" comment="libMagick++5-6.7.8.8-4.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101542" comment="libMagickCore-6_Q16-1-6.8.6.9-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101541" comment="libMagickCore-6_Q16-1-32bit-6.8.6.9-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101374" comment="libMagickCore-6_Q16-2-6.8.9.8-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101373" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101345" comment="libMagickCore5-6.7.8.8-4.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101344" comment="libMagickCore5-32bit-6.7.8.8-4.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101544" comment="libMagickWand-6_Q16-1-6.8.6.9-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101543" comment="libMagickWand-6_Q16-1-32bit-6.8.6.9-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101376" comment="libMagickWand-6_Q16-2-6.8.9.8-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101375" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101347" comment="libMagickWand5-6.7.8.8-4.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101346" comment="libMagickWand5-32bit-6.7.8.8-4.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101377" comment="perl-PerlMagick-6.8.9.8-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8564</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8564" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8564" source="CVE"/>
    <description>
    The _gnutls_ecc_ansi_x963_export function in gnutls_ecc.c in GnuTLS 3.x before 3.1.28, 3.2.x before 3.2.20, and 3.3.x before 3.3.10 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) Elliptic Curve Cryptography (ECC) certificate or (2) certificate signing requests (CSR), related to generating key IDs.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009101999" comment="gnutls-3.2.18-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102000" comment="libgnutls-devel-3.2.18-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102001" comment="libgnutls-devel-32bit-3.2.18-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102002" comment="libgnutls-openssl-devel-3.2.18-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102003" comment="libgnutls-openssl27-3.2.18-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102004" comment="libgnutls28-3.2.18-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102005" comment="libgnutls28-32bit-3.2.18-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102006" comment="libgnutlsxx-devel-3.2.18-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102007" comment="libgnutlsxx28-3.2.18-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8594</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8594" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8594" source="CVE"/>
    <description>
    The do_mmu_update function in arch/x86/mm.c in Xen 4.x through 4.4.x does not properly restrict updates to only PV page tables, which allows remote PV guests to cause a denial of service (NULL pointer dereference) by leveraging hardware emulation services for HVM guests using Hardware Assisted Paging (HAP).
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105983" comment="xen-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105984" comment="xen-devel-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105988" comment="xen-doc-html-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105989" comment="xen-kmp-default-4.4.1_08_k3.16.7_7-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105990" comment="xen-kmp-desktop-4.4.1_08_k3.16.7_7-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105986" comment="xen-libs-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105985" comment="xen-libs-32bit-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105991" comment="xen-tools-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105987" comment="xen-tools-domU-4.4.1_08-9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8595</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8595" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8595" source="CVE"/>
    <description>
    arch/x86/x86_emulate/x86_emulate.c in Xen 3.2.1 through 4.4.x does not properly check privileges, which allows local HVM guest users to gain privileges or cause a denial of service (crash) via a crafted (1) CALL, (2) JMP, (3) RETF, (4) LCALL, (5) LJMP, or (6) LRET far branch instruction.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105983" comment="xen-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105984" comment="xen-devel-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105988" comment="xen-doc-html-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105989" comment="xen-kmp-default-4.4.1_08_k3.16.7_7-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105990" comment="xen-kmp-desktop-4.4.1_08_k3.16.7_7-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105986" comment="xen-libs-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105985" comment="xen-libs-32bit-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105991" comment="xen-tools-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105987" comment="xen-tools-domU-4.4.1_08-9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8602</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8602" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8602" source="CVE"/>
    <description>
    iterator.c in NLnet Labs Unbound before 1.5.1 does not limit delegation chaining, which allows remote attackers to cause a denial of service (memory and CPU consumption) via a large or infinite number of referrals.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009103122" comment="libunbound2-1.4.22-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103123" comment="unbound-1.4.22-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103124" comment="unbound-anchor-1.4.22-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103125" comment="unbound-devel-1.4.22-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103126" comment="unbound-munin-1.4.22-4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103127" comment="unbound-python-1.4.22-4.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8627</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8627" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8627" source="CVE"/>
    <description>
    PolarSSL 1.3.8 does not properly negotiate the signature algorithm to use, which allows remote attackers to conduct downgrade attacks via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009101896" comment="libpolarssl7-1.3.9-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101897" comment="polarssl-1.3.9-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101898" comment="polarssl-devel-1.3.9-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8628</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8628" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8628" source="CVE"/>
    <description>
    Memory leak in PolarSSL before 1.2.12 and 1.3.x before 1.3.9 allows remote attackers to cause a denial of service (memory consumption) via a large number of crafted X.509 certificates.  NOTE: this identifier has been SPLIT per ADT3 due to different affected versions. See CVE-2014-9744 for the ClientHello message issue.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009101896" comment="libpolarssl7-1.3.9-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101897" comment="polarssl-1.3.9-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009101898" comment="polarssl-devel-1.3.9-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8634</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8634" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105185" comment="MozillaFirefox-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105186" comment="MozillaFirefox-branding-upstream-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105187" comment="MozillaFirefox-buildsymbols-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105188" comment="MozillaFirefox-devel-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105189" comment="MozillaFirefox-translations-common-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105190" comment="MozillaFirefox-translations-other-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105287" comment="MozillaThunderbird-31.4.0-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105288" comment="MozillaThunderbird-buildsymbols-31.4.0-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105289" comment="MozillaThunderbird-devel-31.4.0-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105290" comment="MozillaThunderbird-translations-common-31.4.0-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105291" comment="MozillaThunderbird-translations-other-31.4.0-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105711" comment="seamonkey-2.32-8.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105712" comment="seamonkey-dom-inspector-2.32-8.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105713" comment="seamonkey-irc-2.32-8.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105714" comment="seamonkey-translations-common-2.32-8.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105715" comment="seamonkey-translations-other-2.32-8.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8635</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8635" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8635" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 35.0 and SeaMonkey before 2.32 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105185" comment="MozillaFirefox-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105186" comment="MozillaFirefox-branding-upstream-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105187" comment="MozillaFirefox-buildsymbols-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105188" comment="MozillaFirefox-devel-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105189" comment="MozillaFirefox-translations-common-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105190" comment="MozillaFirefox-translations-other-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105287" comment="MozillaThunderbird-31.4.0-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105288" comment="MozillaThunderbird-buildsymbols-31.4.0-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105289" comment="MozillaThunderbird-devel-31.4.0-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105290" comment="MozillaThunderbird-translations-common-31.4.0-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105291" comment="MozillaThunderbird-translations-other-31.4.0-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105711" comment="seamonkey-2.32-8.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105712" comment="seamonkey-dom-inspector-2.32-8.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105713" comment="seamonkey-irc-2.32-8.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105714" comment="seamonkey-translations-common-2.32-8.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105715" comment="seamonkey-translations-other-2.32-8.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8636</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8636" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8636" source="CVE"/>
    <description>
    The XrayWrapper implementation in Mozilla Firefox before 35.0 and SeaMonkey before 2.32 does not properly interact with a DOM object that has a named getter, which might allow remote attackers to execute arbitrary JavaScript code with chrome privileges via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105185" comment="MozillaFirefox-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105186" comment="MozillaFirefox-branding-upstream-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105187" comment="MozillaFirefox-buildsymbols-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105188" comment="MozillaFirefox-devel-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105189" comment="MozillaFirefox-translations-common-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105190" comment="MozillaFirefox-translations-other-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105711" comment="seamonkey-2.32-8.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105712" comment="seamonkey-dom-inspector-2.32-8.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105713" comment="seamonkey-irc-2.32-8.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105714" comment="seamonkey-translations-common-2.32-8.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105715" comment="seamonkey-translations-other-2.32-8.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8637</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8637" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8637" source="CVE"/>
    <description>
    Mozilla Firefox before 35.0 and SeaMonkey before 2.32 do not properly initialize memory for BMP images, which allows remote attackers to obtain sensitive information from process memory via a crafted web page that triggers the rendering of malformed BMP data within a CANVAS element.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105185" comment="MozillaFirefox-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105186" comment="MozillaFirefox-branding-upstream-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105187" comment="MozillaFirefox-buildsymbols-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105188" comment="MozillaFirefox-devel-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105189" comment="MozillaFirefox-translations-common-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105190" comment="MozillaFirefox-translations-other-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105711" comment="seamonkey-2.32-8.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105712" comment="seamonkey-dom-inspector-2.32-8.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105713" comment="seamonkey-irc-2.32-8.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105714" comment="seamonkey-translations-common-2.32-8.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105715" comment="seamonkey-translations-other-2.32-8.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8638</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8638" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638" source="CVE"/>
    <description>
    The navigator.sendBeacon implementation in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 omits the CORS Origin header, which allows remote attackers to bypass intended CORS access-control checks and conduct cross-site request forgery (CSRF) attacks via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105185" comment="MozillaFirefox-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105186" comment="MozillaFirefox-branding-upstream-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105187" comment="MozillaFirefox-buildsymbols-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105188" comment="MozillaFirefox-devel-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105189" comment="MozillaFirefox-translations-common-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105190" comment="MozillaFirefox-translations-other-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105287" comment="MozillaThunderbird-31.4.0-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105288" comment="MozillaThunderbird-buildsymbols-31.4.0-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105289" comment="MozillaThunderbird-devel-31.4.0-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105290" comment="MozillaThunderbird-translations-common-31.4.0-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105291" comment="MozillaThunderbird-translations-other-31.4.0-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105711" comment="seamonkey-2.32-8.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105712" comment="seamonkey-dom-inspector-2.32-8.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105713" comment="seamonkey-irc-2.32-8.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105714" comment="seamonkey-translations-common-2.32-8.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105715" comment="seamonkey-translations-other-2.32-8.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8639</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8639" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639" source="CVE"/>
    <description>
    Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 do not properly interpret Set-Cookie headers within responses that have a 407 (aka Proxy Authentication Required) status code, which allows remote HTTP proxy servers to conduct session fixation attacks by providing a cookie name that corresponds to the session cookie of the origin server.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105185" comment="MozillaFirefox-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105186" comment="MozillaFirefox-branding-upstream-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105187" comment="MozillaFirefox-buildsymbols-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105188" comment="MozillaFirefox-devel-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105189" comment="MozillaFirefox-translations-common-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105190" comment="MozillaFirefox-translations-other-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105287" comment="MozillaThunderbird-31.4.0-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105288" comment="MozillaThunderbird-buildsymbols-31.4.0-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105289" comment="MozillaThunderbird-devel-31.4.0-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105290" comment="MozillaThunderbird-translations-common-31.4.0-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105291" comment="MozillaThunderbird-translations-other-31.4.0-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105711" comment="seamonkey-2.32-8.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105712" comment="seamonkey-dom-inspector-2.32-8.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105713" comment="seamonkey-irc-2.32-8.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105714" comment="seamonkey-translations-common-2.32-8.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105715" comment="seamonkey-translations-other-2.32-8.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8640</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8640" source="CVE"/>
    <description>
    The mozilla::dom::AudioParamTimeline::AudioNodeInputValue function in the Web Audio API implementation in Mozilla Firefox before 35.0 and SeaMonkey before 2.32 does not properly restrict timeline operations, which allows remote attackers to cause a denial of service (uninitialized-memory read and application crash) via crafted API calls.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105185" comment="MozillaFirefox-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105186" comment="MozillaFirefox-branding-upstream-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105187" comment="MozillaFirefox-buildsymbols-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105188" comment="MozillaFirefox-devel-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105189" comment="MozillaFirefox-translations-common-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105190" comment="MozillaFirefox-translations-other-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105711" comment="seamonkey-2.32-8.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105712" comment="seamonkey-dom-inspector-2.32-8.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105713" comment="seamonkey-irc-2.32-8.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105714" comment="seamonkey-translations-common-2.32-8.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105715" comment="seamonkey-translations-other-2.32-8.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8641</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8641" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641" source="CVE"/>
    <description>
    Use-after-free vulnerability in the WebRTC implementation in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, and SeaMonkey before 2.32 allows remote attackers to execute arbitrary code via crafted track data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105185" comment="MozillaFirefox-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105186" comment="MozillaFirefox-branding-upstream-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105187" comment="MozillaFirefox-buildsymbols-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105188" comment="MozillaFirefox-devel-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105189" comment="MozillaFirefox-translations-common-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105190" comment="MozillaFirefox-translations-other-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105711" comment="seamonkey-2.32-8.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105712" comment="seamonkey-dom-inspector-2.32-8.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105713" comment="seamonkey-irc-2.32-8.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105714" comment="seamonkey-translations-common-2.32-8.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105715" comment="seamonkey-translations-other-2.32-8.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8642</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8642" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8642" source="CVE"/>
    <description>
    Mozilla Firefox before 35.0 and SeaMonkey before 2.32 do not consider the id-pkix-ocsp-nocheck extension in deciding whether to trust an OCSP responder, which makes it easier for remote attackers to obtain sensitive information by sniffing the network during a session in which there was an incorrect decision to accept a compromised and revoked certificate.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105185" comment="MozillaFirefox-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105186" comment="MozillaFirefox-branding-upstream-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105187" comment="MozillaFirefox-buildsymbols-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105188" comment="MozillaFirefox-devel-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105189" comment="MozillaFirefox-translations-common-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105190" comment="MozillaFirefox-translations-other-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105711" comment="seamonkey-2.32-8.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105712" comment="seamonkey-dom-inspector-2.32-8.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105713" comment="seamonkey-irc-2.32-8.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105714" comment="seamonkey-translations-common-2.32-8.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105715" comment="seamonkey-translations-other-2.32-8.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8643</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8643" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8643" source="CVE"/>
    <description>
    Mozilla Firefox before 35.0 on Windows allows remote attackers to bypass the Gecko Media Plugin (GMP) sandbox protection mechanism by leveraging access to the GMP process, as demonstrated by the OpenH264 plugin's process.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105185" comment="MozillaFirefox-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105186" comment="MozillaFirefox-branding-upstream-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105187" comment="MozillaFirefox-buildsymbols-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105188" comment="MozillaFirefox-devel-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105189" comment="MozillaFirefox-translations-common-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105190" comment="MozillaFirefox-translations-other-35.0-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105711" comment="seamonkey-2.32-8.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105712" comment="seamonkey-dom-inspector-2.32-8.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105713" comment="seamonkey-irc-2.32-8.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105714" comment="seamonkey-translations-common-2.32-8.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105715" comment="seamonkey-translations-other-2.32-8.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8710</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8710" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8710" source="CVE"/>
    <description>
    The decompress_sigcomp_message function in epan/sigcomp-udvm.c in the SigComp UDVM dissector in Wireshark 1.10.x before 1.10.11 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009102096" comment="wireshark-1.12.2-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102097" comment="wireshark-devel-1.12.2-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102098" comment="wireshark-ui-gtk-1.12.2-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102099" comment="wireshark-ui-qt-1.12.2-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8711</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8711" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8711" source="CVE"/>
    <description>
    Multiple integer overflows in epan/dissectors/packet-amqp.c in the AMQP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allow remote attackers to cause a denial of service (application crash) via a crafted amqp_0_10 PDU in a packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009102096" comment="wireshark-1.12.2-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102097" comment="wireshark-devel-1.12.2-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102098" comment="wireshark-ui-gtk-1.12.2-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102099" comment="wireshark-ui-qt-1.12.2-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8712</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8712" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8712" source="CVE"/>
    <description>
    The build_expert_data function in epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009102096" comment="wireshark-1.12.2-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102097" comment="wireshark-devel-1.12.2-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102098" comment="wireshark-ui-gtk-1.12.2-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102099" comment="wireshark-ui-qt-1.12.2-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8713</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8713" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8713" source="CVE"/>
    <description>
    Stack-based buffer overflow in the build_expert_data function in epan/dissectors/packet-ncp2222.inc in the NCP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009102096" comment="wireshark-1.12.2-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102097" comment="wireshark-devel-1.12.2-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102098" comment="wireshark-ui-gtk-1.12.2-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102099" comment="wireshark-ui-qt-1.12.2-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8714</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8714" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8714" source="CVE"/>
    <description>
    The dissect_write_structured_field function in epan/dissectors/packet-tn5250.c in the TN5250 dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009102096" comment="wireshark-1.12.2-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102097" comment="wireshark-devel-1.12.2-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102098" comment="wireshark-ui-gtk-1.12.2-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102099" comment="wireshark-ui-qt-1.12.2-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8716</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8716" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8716" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009102066" comment="ImageMagick-6.8.9.8-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102068" comment="ImageMagick-devel-6.8.9.8-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102067" comment="ImageMagick-devel-32bit-6.8.9.8-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102069" comment="ImageMagick-doc-6.8.9.8-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102070" comment="ImageMagick-extra-6.8.9.8-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102055" comment="libMagick++-6_Q16-2-6.8.6.9-2.28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102054" comment="libMagick++-6_Q16-2-32bit-6.8.6.9-2.28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102072" comment="libMagick++-6_Q16-5-6.8.9.8-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102071" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102074" comment="libMagick++-devel-6.8.9.8-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102073" comment="libMagick++-devel-32bit-6.8.9.8-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102043" comment="libMagick++5-6.7.8.8-4.21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102059" comment="libMagickCore-6_Q16-1-6.8.6.9-2.28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102058" comment="libMagickCore-6_Q16-1-32bit-6.8.6.9-2.28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102076" comment="libMagickCore-6_Q16-2-6.8.9.8-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102075" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102045" comment="libMagickCore5-6.7.8.8-4.21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102044" comment="libMagickCore5-32bit-6.7.8.8-4.21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102061" comment="libMagickWand-6_Q16-1-6.8.6.9-2.28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102060" comment="libMagickWand-6_Q16-1-32bit-6.8.6.9-2.28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102078" comment="libMagickWand-6_Q16-2-6.8.9.8-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102077" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102047" comment="libMagickWand5-6.7.8.8-4.21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102046" comment="libMagickWand5-32bit-6.7.8.8-4.21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102079" comment="perl-PerlMagick-6.8.9.8-8.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8767</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8767" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8767" source="CVE"/>
    <description>
    Integer underflow in the olsr_print function in tcpdump 3.9.6 through 4.6.2, when in verbose mode, allows remote attackers to cause a denial of service (crash) via a crafted length value in an OLSR frame.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106072" comment="tcpdump-4.6.2-4.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8768</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8768" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8768" source="CVE"/>
    <description>
    Multiple Integer underflows in the geonet_print function in tcpdump 4.5.0 through 4.6.2, when in verbose mode, allow remote attackers to cause a denial of service (segmentation fault and crash) via a crafted length value in a Geonet frame.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106072" comment="tcpdump-4.6.2-4.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8769</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8769" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8769" source="CVE"/>
    <description>
    tcpdump 3.8 through 4.6.2 might allow remote attackers to obtain sensitive information from memory or cause a denial of service (packet loss or segmentation fault) via a crafted Ad hoc On-Demand Distance Vector (AODV) packet, which triggers an out-of-bounds memory access.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106072" comment="tcpdump-4.6.2-4.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8866</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8866" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8866" source="CVE"/>
    <description>
    The compatibility mode hypercall argument translation in Xen 3.3.x through 4.4.x, when running on a 64-bit hypervisor, allows local 32-bit HVM guests to cause a denial of service (host crash) via vectors involving altering the high halves of registers while in 64-bit mode.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105983" comment="xen-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105984" comment="xen-devel-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105988" comment="xen-doc-html-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105989" comment="xen-kmp-default-4.4.1_08_k3.16.7_7-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105990" comment="xen-kmp-desktop-4.4.1_08_k3.16.7_7-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105986" comment="xen-libs-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105985" comment="xen-libs-32bit-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105991" comment="xen-tools-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105987" comment="xen-tools-domU-4.4.1_08-9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8867</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8867" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8867" source="CVE"/>
    <description>
    The acceleration support for the "REP MOVS" instruction in Xen 4.4.x, 3.2.x, and earlier lacks properly bounds checking for memory mapped I/O (MMIO) emulated in the hypervisor, which allows local HVM guests to cause a denial of service (host crash) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105983" comment="xen-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105984" comment="xen-devel-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105988" comment="xen-doc-html-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105989" comment="xen-kmp-default-4.4.1_08_k3.16.7_7-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105990" comment="xen-kmp-desktop-4.4.1_08_k3.16.7_7-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105986" comment="xen-libs-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105985" comment="xen-libs-32bit-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105991" comment="xen-tools-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105987" comment="xen-tools-domU-4.4.1_08-9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8958</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8958" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8958" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 4.0.x before 4.0.10.6, 4.1.x before 4.1.14.7, and 4.2.x before 4.2.12 allow remote authenticated users to inject arbitrary web script or HTML via a crafted (1) database, (2) table, or (3) column name that is improperly handled during rendering of the table browse page; a crafted ENUM value that is improperly handled during rendering of the (4) table print view or (5) zoom search page; or (6) a crafted pma_fontsize cookie that is improperly handled during rendering of the home page.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102499" comment="phpMyAdmin-4.2.12-4.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8959</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8959" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8959" source="CVE"/>
    <description>
    Directory traversal vulnerability in libraries/gis/GIS_Factory.class.php in the GIS editor in phpMyAdmin 4.0.x before 4.0.10.6, 4.1.x before 4.1.14.7, and 4.2.x before 4.2.12 allows remote authenticated users to include and execute arbitrary local files via a crafted geometry-type parameter.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102499" comment="phpMyAdmin-4.2.12-4.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8960</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8960" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8960" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in libraries/error_report.lib.php in the error-reporting feature in phpMyAdmin 4.1.x before 4.1.14.7 and 4.2.x before 4.2.12 allows remote authenticated users to inject arbitrary web script or HTML via a crafted filename.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102499" comment="phpMyAdmin-4.2.12-4.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8961</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8961" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8961" source="CVE"/>
    <description>
    Directory traversal vulnerability in libraries/error_report.lib.php in the error-reporting feature in phpMyAdmin 4.1.x before 4.1.14.7 and 4.2.x before 4.2.12 allows remote authenticated users to obtain potentially sensitive information about a file's line count via a crafted parameter.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102499" comment="phpMyAdmin-4.2.12-4.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8962</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8962" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8962" source="CVE"/>
    <description>
    Stack-based buffer overflow in stream_decoder.c in libFLAC before 1.3.1 allows remote attackers to execute arbitrary code via a crafted .flac file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009102608" comment="flac-1.3.0-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102609" comment="flac-devel-1.3.0-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102610" comment="flac-devel-32bit-1.3.0-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102611" comment="libFLAC++6-1.3.0-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102612" comment="libFLAC++6-32bit-1.3.0-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102613" comment="libFLAC8-1.3.0-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102614" comment="libFLAC8-32bit-1.3.0-4.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8964</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8964" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8964" source="CVE"/>
    <description>
    Heap-based buffer overflow in PCRE 8.36 and earlier allows remote attackers to cause a denial of service (crash) or have other unspecified impact via a crafted regular expression, related to an assertion that allows zero repeats.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111084" comment="libmysqlclient-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111085" comment="libmysqlclient18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111086" comment="libmysqlclient18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111087" comment="libmysqlclient_r18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111088" comment="libmysqlclient_r18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111089" comment="libmysqld-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111090" comment="libmysqld18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109526" comment="libpcre1-8.37-3.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109525" comment="libpcre1-32bit-8.37-3.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109528" comment="libpcre16-0-8.37-3.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109527" comment="libpcre16-0-32bit-8.37-3.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109530" comment="libpcrecpp0-8.37-3.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109529" comment="libpcrecpp0-32bit-8.37-3.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109532" comment="libpcreposix0-8.37-3.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109531" comment="libpcreposix0-32bit-8.37-3.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111091" comment="mariadb-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111092" comment="mariadb-bench-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111093" comment="mariadb-client-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111094" comment="mariadb-errormessages-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111095" comment="mariadb-test-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111096" comment="mariadb-tools-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109533" comment="pcre-8.37-3.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109534" comment="pcre-devel-8.37-3.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109535" comment="pcre-devel-static-8.37-3.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109536" comment="pcre-doc-8.37-3.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109537" comment="pcre-tools-8.37-3.5.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8989</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-8989" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8989" source="CVE"/>
    <description>
    The Linux kernel through 3.17.4 does not properly restrict dropping of supplemental group memberships in certain namespace scenarios, which allows local users to bypass intended file permissions by leveraging a POSIX ACL containing an entry for the group category that is more restrictive than the entry for the other category, aka a "negative groups" issue, related to kernel/groups.c, kernel/uid16.c, and kernel/user_namespace.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122787" comment="bbswitch-0.8-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122788" comment="bbswitch-kmp-default-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122789" comment="bbswitch-kmp-desktop-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122790" comment="bbswitch-kmp-pae-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122791" comment="bbswitch-kmp-xen-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122792" comment="cloop-2.639-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122793" comment="cloop-kmp-default-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122794" comment="cloop-kmp-desktop-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122795" comment="cloop-kmp-pae-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122796" comment="cloop-kmp-xen-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122797" comment="crash-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122798" comment="crash-devel-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122799" comment="crash-doc-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122800" comment="crash-eppic-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122801" comment="crash-gcore-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122802" comment="crash-kmp-default-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122803" comment="crash-kmp-desktop-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122804" comment="crash-kmp-pae-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122805" comment="crash-kmp-xen-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122806" comment="hdjmod-1.28-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122807" comment="hdjmod-kmp-default-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122808" comment="hdjmod-kmp-desktop-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122809" comment="hdjmod-kmp-pae-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122810" comment="hdjmod-kmp-xen-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122811" comment="ipset-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122812" comment="ipset-devel-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122813" comment="ipset-kmp-default-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122814" comment="ipset-kmp-desktop-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122815" comment="ipset-kmp-pae-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122816" comment="ipset-kmp-xen-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122817" comment="kernel-debug-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122818" comment="kernel-debug-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122819" comment="kernel-debug-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122820" comment="kernel-default-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122821" comment="kernel-default-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122822" comment="kernel-default-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122823" comment="kernel-desktop-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122824" comment="kernel-desktop-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122825" comment="kernel-desktop-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122826" comment="kernel-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122827" comment="kernel-docs-3.16.7-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122828" comment="kernel-ec2-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122829" comment="kernel-ec2-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122830" comment="kernel-ec2-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122831" comment="kernel-macros-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122832" comment="kernel-obs-build-3.16.7-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122833" comment="kernel-obs-qa-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122834" comment="kernel-obs-qa-xen-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122835" comment="kernel-pae-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122836" comment="kernel-pae-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122837" comment="kernel-pae-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122838" comment="kernel-source-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122839" comment="kernel-source-vanilla-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122840" comment="kernel-syms-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122841" comment="kernel-vanilla-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122842" comment="kernel-vanilla-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122843" comment="kernel-xen-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122844" comment="kernel-xen-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122845" comment="kernel-xen-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122846" comment="libipset3-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122847" comment="pcfclock-0.44-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122848" comment="pcfclock-kmp-default-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122849" comment="pcfclock-kmp-desktop-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122850" comment="pcfclock-kmp-pae-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122851" comment="python-virtualbox-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122852" comment="vhba-kmp-20140629-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122853" comment="vhba-kmp-default-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122854" comment="vhba-kmp-desktop-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122855" comment="vhba-kmp-pae-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122856" comment="vhba-kmp-xen-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122857" comment="virtualbox-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122858" comment="virtualbox-devel-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122859" comment="virtualbox-guest-desktop-icons-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122860" comment="virtualbox-guest-kmp-default-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122861" comment="virtualbox-guest-kmp-desktop-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122862" comment="virtualbox-guest-kmp-pae-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122863" comment="virtualbox-guest-tools-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122864" comment="virtualbox-guest-x11-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122865" comment="virtualbox-host-kmp-default-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122866" comment="virtualbox-host-kmp-desktop-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122867" comment="virtualbox-host-kmp-pae-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122868" comment="virtualbox-host-source-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122869" comment="virtualbox-qt-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122870" comment="virtualbox-websrv-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122871" comment="xen-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122872" comment="xen-devel-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122873" comment="xen-doc-html-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122874" comment="xen-kmp-default-4.4.3_08_k3.16.7_32-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122875" comment="xen-kmp-desktop-4.4.3_08_k3.16.7_32-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122876" comment="xen-libs-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122877" comment="xen-libs-32bit-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122878" comment="xen-tools-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122879" comment="xen-tools-domU-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122880" comment="xtables-addons-2.6-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122881" comment="xtables-addons-kmp-default-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122882" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122883" comment="xtables-addons-kmp-pae-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122884" comment="xtables-addons-kmp-xen-2.6_k3.16.7_32-15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9018</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9018" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9018" source="CVE"/>
    <description>
    Icecast before 2.4.1 transmits the output of the on-connect script, which might allow remote attackers to obtain sensitive information, related to shared file descriptors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009102606" comment="icecast-2.4.0-2.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102607" comment="icecast-doc-2.4.0-2.8.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9028</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9028" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9028" source="CVE"/>
    <description>
    Heap-based buffer overflow in stream_decoder.c in libFLAC before 1.3.1 allows remote attackers to execute arbitrary code via a crafted .flac file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009102608" comment="flac-1.3.0-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102609" comment="flac-devel-1.3.0-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102610" comment="flac-devel-32bit-1.3.0-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102611" comment="libFLAC++6-1.3.0-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102612" comment="libFLAC++6-32bit-1.3.0-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102613" comment="libFLAC8-1.3.0-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102614" comment="libFLAC8-32bit-1.3.0-4.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9029</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9029" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9029" source="CVE"/>
    <description>
    Multiple off-by-one errors in the (1) jpc_dec_cp_setfromcox and (2) jpc_dec_cp_setfromrgn functions in jpc/jpc_dec.c in JasPer 1.900.1 and earlier allow remote attackers to execute arbitrary code via a crafted jp2 file, which triggers a heap-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009102856" comment="jasper-1.900.1-163.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102857" comment="libjasper-devel-1.900.1-163.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102858" comment="libjasper1-1.900.1-163.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102859" comment="libjasper1-32bit-1.900.1-163.5.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9030</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9030" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9030" source="CVE"/>
    <description>
    The do_mmu_update function in arch/x86/mm.c in Xen 3.2.x through 4.4.x does not properly manage page references, which allows remote domains to cause a denial of service by leveraging control over an HVM guest and a crafted MMU_MACHPHYS_UPDATE.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105983" comment="xen-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105984" comment="xen-devel-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105988" comment="xen-doc-html-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105989" comment="xen-kmp-default-4.4.1_08_k3.16.7_7-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105990" comment="xen-kmp-desktop-4.4.1_08_k3.16.7_7-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105986" comment="xen-libs-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105985" comment="xen-libs-32bit-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105991" comment="xen-tools-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105987" comment="xen-tools-domU-4.4.1_08-9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9050</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9050" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9050" source="CVE"/>
    <description>
    Heap-based buffer overflow in the cli_scanpe function in libclamav/pe.c in ClamAV before 0.98.5 allows remote attackers to cause a denial of service (crash) via a crafted y0da Crypter PE file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102498" comment="clamav-0.98.5-2.5.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9065</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9065" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9065" source="CVE"/>
    <description>
    common/spinlock.c in Xen 4.4.x and earlier does not properly handle read and write locks, which allows local x86 guest users to cause a denial of service (write denial or NMI watchdog timeout and host crash) via a large number of read requests, a different vulnerability to CVE-2014-9066.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105983" comment="xen-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105984" comment="xen-devel-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105988" comment="xen-doc-html-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105989" comment="xen-kmp-default-4.4.1_08_k3.16.7_7-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105990" comment="xen-kmp-desktop-4.4.1_08_k3.16.7_7-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105986" comment="xen-libs-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105985" comment="xen-libs-32bit-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105991" comment="xen-tools-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105987" comment="xen-tools-domU-4.4.1_08-9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9066</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9066" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9066" source="CVE"/>
    <description>
    Xen 4.4.x and earlier, when using a large number of VCPUs, does not properly handle read and write locks, which allows local x86 guest users to cause a denial of service (write denial or NMI watchdog timeout and host crash) via a large number of read requests, a different vulnerability than CVE-2014-9065.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105983" comment="xen-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105984" comment="xen-devel-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105988" comment="xen-doc-html-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105989" comment="xen-kmp-default-4.4.1_08_k3.16.7_7-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105990" comment="xen-kmp-desktop-4.4.1_08_k3.16.7_7-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105986" comment="xen-libs-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105985" comment="xen-libs-32bit-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105991" comment="xen-tools-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105987" comment="xen-tools-domU-4.4.1_08-9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9087</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9087" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9087" source="CVE"/>
    <description>
    Integer underflow in the ksba_oid_to_str function in Libksba before 1.3.2, as used in GnuPG, allows remote attackers to cause a denial of service (crash) via a crafted OID in a (1) S/MIME message or (2) ECC based OpenPGP data, which triggers a buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009103117" comment="libksba-1.3.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103118" comment="libksba-devel-1.3.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103119" comment="libksba8-1.3.1-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9090</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9090" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9090" source="CVE"/>
    <description>
    The do_double_fault function in arch/x86/kernel/traps.c in the Linux kernel through 3.17.4 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to cause a denial of service (panic) via a modify_ldt system call, as demonstrated by sigreturn_32 in the linux-clock-tests test suite.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009103080" comment="kernel-debug-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103081" comment="kernel-debug-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103082" comment="kernel-debug-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103083" comment="kernel-default-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103084" comment="kernel-default-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103085" comment="kernel-default-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103086" comment="kernel-desktop-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103087" comment="kernel-desktop-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103088" comment="kernel-desktop-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103099" comment="kernel-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103089" comment="kernel-docs-3.16.7-7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103090" comment="kernel-ec2-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103091" comment="kernel-ec2-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103092" comment="kernel-ec2-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103100" comment="kernel-macros-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103093" comment="kernel-obs-build-3.16.7-7.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103095" comment="kernel-obs-qa-3.16.7-7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103094" comment="kernel-obs-qa-xen-3.16.7-7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103096" comment="kernel-pae-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103097" comment="kernel-pae-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103098" comment="kernel-pae-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103101" comment="kernel-source-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103102" comment="kernel-source-vanilla-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103103" comment="kernel-syms-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103104" comment="kernel-vanilla-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103105" comment="kernel-vanilla-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103106" comment="kernel-xen-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103107" comment="kernel-xen-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103108" comment="kernel-xen-devel-3.16.7-7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9092</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9092" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9092" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009102823" comment="libjpeg-turbo-1.3.1-30.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102831" comment="libjpeg62-62.1.0-30.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102830" comment="libjpeg62-32bit-62.1.0-30.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102833" comment="libjpeg62-devel-62.1.0-30.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102832" comment="libjpeg62-devel-32bit-62.1.0-30.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102834" comment="libjpeg62-turbo-1.3.1-30.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102825" comment="libjpeg8-8.0.2-30.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102824" comment="libjpeg8-32bit-8.0.2-30.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102827" comment="libjpeg8-devel-8.0.2-30.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102826" comment="libjpeg8-devel-32bit-8.0.2-30.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102829" comment="libturbojpeg0-8.0.2-30.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102828" comment="libturbojpeg0-32bit-8.0.2-30.5.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9093</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9093" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9093" source="CVE"/>
    <description>
    LibreOffice before 4.3.5 allows remote attackers to cause a denial of service (invalid write operation and crash) and possibly execute arbitrary code via a crafted RTF file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123705" comment="cmis-client-0.5.0-4.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123706" comment="libcmis-0_5-5-0.5.0-4.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123707" comment="libcmis-c-0_5-5-0.5.0-4.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123708" comment="libcmis-c-devel-0.5.0-4.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123709" comment="libcmis-devel-0.5.0-4.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123710" comment="libetonyek-0.1.3-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123711" comment="libetonyek-0_1-1-0.1.3-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123712" comment="libetonyek-devel-0.1.3-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123713" comment="libetonyek-devel-doc-0.1.3-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123714" comment="libetonyek-tools-0.1.3-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123715" comment="libmwaw-0.3.6-2.7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123716" comment="libmwaw-0_3-3-0.3.6-2.7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123717" comment="libmwaw-devel-0.3.6-2.7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123718" comment="libmwaw-devel-doc-0.3.6-2.7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123719" comment="libmwaw-tools-0.3.6-2.7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123720" comment="libodfgen-0.1.4-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123721" comment="libodfgen-0_1-1-0.1.4-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123722" comment="libodfgen-devel-0.1.4-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123723" comment="libodfgen-devel-doc-0.1.4-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123724" comment="libpagemaker-0.0.2-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123725" comment="libpagemaker-0_0-0-0.0.2-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123726" comment="libpagemaker-devel-0.0.2-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123727" comment="libpagemaker-devel-doc-0.0.2-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123728" comment="libpagemaker-tools-0.0.2-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123729" comment="libreoffice-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123730" comment="libreoffice-base-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123731" comment="libreoffice-base-drivers-mysql-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123732" comment="libreoffice-base-drivers-postgresql-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103403" comment="libreoffice-base-extensions-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123733" comment="libreoffice-branding-upstream-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123734" comment="libreoffice-calc-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123735" comment="libreoffice-calc-extensions-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123736" comment="libreoffice-draw-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103407" comment="libreoffice-draw-extensions-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123737" comment="libreoffice-filters-optional-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123738" comment="libreoffice-gnome-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123739" comment="libreoffice-gtk3-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103275" comment="libreoffice-help-ast-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103276" comment="libreoffice-help-bg-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103277" comment="libreoffice-help-ca-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103278" comment="libreoffice-help-cs-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103279" comment="libreoffice-help-da-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103280" comment="libreoffice-help-de-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103283" comment="libreoffice-help-el-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103281" comment="libreoffice-help-en-GB-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103274" comment="libreoffice-help-en-US-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103284" comment="libreoffice-help-en-ZA-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103285" comment="libreoffice-help-es-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103286" comment="libreoffice-help-et-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103287" comment="libreoffice-help-eu-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103288" comment="libreoffice-help-fi-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103289" comment="libreoffice-help-fr-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103291" comment="libreoffice-help-gl-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103282" comment="libreoffice-help-group1-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103290" comment="libreoffice-help-group2-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103292" comment="libreoffice-help-group3-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103299" comment="libreoffice-help-group4-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103307" comment="libreoffice-help-group5-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103293" comment="libreoffice-help-gu-IN-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103294" comment="libreoffice-help-hi-IN-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103295" comment="libreoffice-help-hu-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103296" comment="libreoffice-help-it-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103297" comment="libreoffice-help-ja-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103298" comment="libreoffice-help-km-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103300" comment="libreoffice-help-ko-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103301" comment="libreoffice-help-mk-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103302" comment="libreoffice-help-nb-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103303" comment="libreoffice-help-nl-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103304" comment="libreoffice-help-pl-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103305" comment="libreoffice-help-pt-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103306" comment="libreoffice-help-pt-BR-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103308" comment="libreoffice-help-ru-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103309" comment="libreoffice-help-sk-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103310" comment="libreoffice-help-sl-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103311" comment="libreoffice-help-sv-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103312" comment="libreoffice-help-tr-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103313" comment="libreoffice-help-vi-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103314" comment="libreoffice-help-zh-CN-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103315" comment="libreoffice-help-zh-TW-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123740" comment="libreoffice-icon-theme-breeze-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103453" comment="libreoffice-icon-theme-crystal-4.3.5.2-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123741" comment="libreoffice-icon-theme-galaxy-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123742" comment="libreoffice-icon-theme-hicontrast-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123743" comment="libreoffice-icon-theme-oxygen-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123744" comment="libreoffice-icon-theme-sifr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123745" comment="libreoffice-icon-theme-tango-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103321" comment="libreoffice-icon-themes-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103410" comment="libreoffice-icon-themes-prebuilt-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123746" comment="libreoffice-impress-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103412" comment="libreoffice-impress-extensions-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103413" comment="libreoffice-kde-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123747" comment="libreoffice-kde4-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103322" comment="libreoffice-l10n-4.1.6.2-37.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123748" comment="libreoffice-l10n-af-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103324" comment="libreoffice-l10n-am-4.1.6.2-37.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123749" comment="libreoffice-l10n-ar-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123750" comment="libreoffice-l10n-as-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103327" comment="libreoffice-l10n-ast-4.1.6.2-37.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103328" comment="libreoffice-l10n-be-BY-4.1.6.2-37.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123751" comment="libreoffice-l10n-bg-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123752" comment="libreoffice-l10n-bn-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123753" comment="libreoffice-l10n-br-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123754" comment="libreoffice-l10n-ca-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123755" comment="libreoffice-l10n-cs-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123756" comment="libreoffice-l10n-cy-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123757" comment="libreoffice-l10n-da-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123758" comment="libreoffice-l10n-de-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123759" comment="libreoffice-l10n-dz-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123760" comment="libreoffice-l10n-el-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123761" comment="libreoffice-l10n-en-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103337" comment="libreoffice-l10n-en-GB-4.1.6.2-37.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103338" comment="libreoffice-l10n-en-ZA-4.1.6.2-37.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103339" comment="libreoffice-l10n-eo-4.1.6.2-37.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123762" comment="libreoffice-l10n-es-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123763" comment="libreoffice-l10n-et-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123764" comment="libreoffice-l10n-eu-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123765" comment="libreoffice-l10n-fa-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123766" comment="libreoffice-l10n-fi-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123767" comment="libreoffice-l10n-fr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123768" comment="libreoffice-l10n-ga-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103346" comment="libreoffice-l10n-gd-4.1.6.2-37.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123769" comment="libreoffice-l10n-gl-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123770" comment="libreoffice-l10n-gu-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103348" comment="libreoffice-l10n-gu-IN-4.1.6.2-37.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123771" comment="libreoffice-l10n-he-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123772" comment="libreoffice-l10n-hi-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103350" comment="libreoffice-l10n-hi-IN-4.1.6.2-37.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123773" comment="libreoffice-l10n-hr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123774" comment="libreoffice-l10n-hu-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103353" comment="libreoffice-l10n-id-4.1.6.2-37.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103354" comment="libreoffice-l10n-is-4.1.6.2-37.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123775" comment="libreoffice-l10n-it-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123776" comment="libreoffice-l10n-ja-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103357" comment="libreoffice-l10n-ka-4.1.6.2-37.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123777" comment="libreoffice-l10n-kk-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103358" comment="libreoffice-l10n-km-4.1.6.2-37.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123778" comment="libreoffice-l10n-kn-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123779" comment="libreoffice-l10n-ko-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123780" comment="libreoffice-l10n-lt-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123781" comment="libreoffice-l10n-lv-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123782" comment="libreoffice-l10n-mai-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103362" comment="libreoffice-l10n-mk-4.1.6.2-37.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123783" comment="libreoffice-l10n-ml-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123784" comment="libreoffice-l10n-mr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123785" comment="libreoffice-l10n-nb-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123786" comment="libreoffice-l10n-nl-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123787" comment="libreoffice-l10n-nn-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123788" comment="libreoffice-l10n-nr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123789" comment="libreoffice-l10n-nso-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103369" comment="libreoffice-l10n-om-4.1.6.2-37.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123790" comment="libreoffice-l10n-or-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123791" comment="libreoffice-l10n-pa-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103371" comment="libreoffice-l10n-pa-IN-4.1.6.2-37.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123792" comment="libreoffice-l10n-pl-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103415" comment="libreoffice-l10n-prebuilt-4.1.6.2-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103373" comment="libreoffice-l10n-pt-4.1.6.2-37.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123793" comment="libreoffice-l10n-pt-BR-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123794" comment="libreoffice-l10n-pt-PT-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123795" comment="libreoffice-l10n-ro-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123796" comment="libreoffice-l10n-ru-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103377" comment="libreoffice-l10n-rw-4.1.6.2-37.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103378" comment="libreoffice-l10n-sh-4.1.6.2-37.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123797" comment="libreoffice-l10n-si-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123798" comment="libreoffice-l10n-sk-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123799" comment="libreoffice-l10n-sl-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123800" comment="libreoffice-l10n-sr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123801" comment="libreoffice-l10n-ss-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123802" comment="libreoffice-l10n-st-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123803" comment="libreoffice-l10n-sv-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123804" comment="libreoffice-l10n-ta-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123805" comment="libreoffice-l10n-te-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103387" comment="libreoffice-l10n-tg-4.1.6.2-37.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123806" comment="libreoffice-l10n-th-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123807" comment="libreoffice-l10n-tn-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123808" comment="libreoffice-l10n-tr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123809" comment="libreoffice-l10n-ts-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103391" comment="libreoffice-l10n-ug-4.1.6.2-37.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123810" comment="libreoffice-l10n-uk-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123811" comment="libreoffice-l10n-ve-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103394" comment="libreoffice-l10n-vi-4.1.6.2-37.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123812" comment="libreoffice-l10n-xh-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103396" comment="libreoffice-l10n-zh-CN-4.1.6.2-37.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123813" comment="libreoffice-l10n-zh-Hans-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123814" comment="libreoffice-l10n-zh-Hant-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103397" comment="libreoffice-l10n-zh-TW-4.1.6.2-37.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123815" comment="libreoffice-l10n-zu-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123816" comment="libreoffice-mailmerge-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123817" comment="libreoffice-math-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123818" comment="libreoffice-officebean-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123819" comment="libreoffice-pyuno-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123820" comment="libreoffice-sdk-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123821" comment="libreoffice-sdk-doc-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123822" comment="libreoffice-share-linker-1-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123823" comment="libreoffice-writer-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123824" comment="libreoffice-writer-extensions-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123825" comment="libwps-0.4.1-2.4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123826" comment="libwps-0_4-4-0.4.1-2.4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123827" comment="libwps-devel-0.4.1-2.4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123828" comment="libwps-tools-0.4.1-2.4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123829" comment="mdds-0.12.1-2.4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123830" comment="mdds-devel-0.12.1-2.4.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9112</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9112" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9112" source="CVE"/>
    <description>
    Heap-based buffer overflow in the process_copy_in function in GNU Cpio 2.11 allows remote attackers to cause a denial of service via a large block value in a cpio archive.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009102821" comment="cpio-2.11-29.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102822" comment="cpio-lang-2.11-29.5.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9114</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9114" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9114" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105150" comment="libblkid-devel-2.25.1-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105151" comment="libblkid-devel-32bit-2.25.1-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105152" comment="libblkid-devel-static-2.25.1-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105153" comment="libblkid1-2.25.1-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105154" comment="libblkid1-32bit-2.25.1-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105155" comment="libmount-devel-2.25.1-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105156" comment="libmount-devel-32bit-2.25.1-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105157" comment="libmount-devel-static-2.25.1-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105158" comment="libmount1-2.25.1-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105159" comment="libmount1-32bit-2.25.1-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105160" comment="libsmartcols-devel-2.25.1-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105161" comment="libsmartcols-devel-static-2.25.1-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105162" comment="libsmartcols1-2.25.1-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105163" comment="libuuid-devel-2.25.1-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105164" comment="libuuid-devel-32bit-2.25.1-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105165" comment="libuuid-devel-static-2.25.1-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105166" comment="libuuid1-2.25.1-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105167" comment="libuuid1-32bit-2.25.1-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105147" comment="python-libmount-2.25.1-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105168" comment="util-linux-2.25.1-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105169" comment="util-linux-lang-2.25.1-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105148" comment="util-linux-systemd-2.25.1-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105149" comment="uuidd-2.25.1-9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9116</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9116" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9116" source="CVE"/>
    <description>
    The write_one_header function in mutt 1.5.23 does not properly handle newline characters at the beginning of a header, which allows remote attackers to cause a denial of service (crash) via a header with an empty body, which triggers a heap-based buffer overflow in the mutt_substrdup function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102844" comment="mutt-1.5.21-44.4.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9130</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9130" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9130" source="CVE"/>
    <description>
    scanner.c in LibYAML 0.1.5 and 0.1.6, as used in the YAML-LibYAML (aka YAML-XS) module for Perl, allows context-dependent attackers to cause a denial of service (assertion failure and crash) via vectors involving line-wrapping.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009102717" comment="libyaml-0.1.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102716" comment="libyaml-0-2-0.1.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102718" comment="libyaml-devel-0.1.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106165" comment="perl-YAML-LibYAML-0.59-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9140</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9140" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9140" source="CVE"/>
    <description>
    Buffer overflow in the ppp_hdlc function in print-ppp.c in tcpdump 4.6.2 and earlier allows remote attackers to cause a denial of service (crash) cia a crafted PPP packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108128" comment="tcpdump-4.6.2-8.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9162</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2014-9162" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9162" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.259 and 14.x through 16.x before 16.0.0.235 on Windows and OS X and before 11.2.202.425 on Linux allows attackers to obtain sensitive information via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117562" comment="flash-player-11.2.202.425-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117563" comment="flash-player-gnome-11.2.202.425-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117564" comment="flash-player-kde4-11.2.202.425-2.17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9163</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2014-9163" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9163" source="CVE"/>
    <description>
    Stack-based buffer overflow in Adobe Flash Player before 13.0.0.259 and 14.x and 15.x before 15.0.0.246 on Windows and OS X and before 11.2.202.425 on Linux allows attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in December 2014.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117562" comment="flash-player-11.2.202.425-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117563" comment="flash-player-gnome-11.2.202.425-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117564" comment="flash-player-kde4-11.2.202.425-2.17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9164</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2014-9164" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9164" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.259 and 14.x through 16.x before 16.0.0.235 on Windows and OS X and before 11.2.202.425 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2014-0587.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117562" comment="flash-player-11.2.202.425-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117563" comment="flash-player-gnome-11.2.202.425-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117564" comment="flash-player-kde4-11.2.202.425-2.17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9218</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9218" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9218" source="CVE"/>
    <description>
    libraries/common.inc.php in phpMyAdmin 4.0.x before 4.0.10.7, 4.1.x before 4.1.14.8, and 4.2.x before 4.2.13.1 allows remote attackers to cause a denial of service (resource consumption) via a long password.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102836" comment="phpMyAdmin-4.2.13.1-8.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9219</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9219" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9219" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the redirection feature in url.php in phpMyAdmin 4.2.x before 4.2.13.1 allows remote attackers to inject arbitrary web script or HTML via the url parameter.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102836" comment="phpMyAdmin-4.2.13.1-8.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9220</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9220" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9220" source="CVE"/>
    <description>
    SQL injection vulnerability in OpenVAS Manager before 4.0.6 and 5.x before 5.0.7 allows remote attackers to execute arbitrary SQL commands via the timezone parameter in a modify_schedule OMP command.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105951" comment="openvas-manager-4.0.4-6.4.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9221</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9221" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9221" source="CVE"/>
    <description>
    strongSwan 4.5.x through 5.2.x before 5.2.1 allows remote attackers to cause a denial of service (invalid pointer dereference) via a crafted IKEv2 Key Exchange (KE) message with Diffie-Hellman (DH) group 1025.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105249" comment="strongswan-5.1.3-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105250" comment="strongswan-doc-5.1.3-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105251" comment="strongswan-ipsec-5.1.3-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105252" comment="strongswan-libs0-5.1.3-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105253" comment="strongswan-mysql-5.1.3-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105254" comment="strongswan-nm-5.1.3-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105255" comment="strongswan-sqlite-5.1.3-4.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9273</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9273" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9273" source="CVE"/>
    <description>
    lib/handle.c in Hivex before 1.3.11 allows local users to execute arbitrary code and gain privileges via a small hive files, which triggers an out-of-bounds read or write.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105723" comment="hivex-1.3.10-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105724" comment="hivex-devel-1.3.10-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105725" comment="libhivex0-1.3.10-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105726" comment="perl-Win-Hivex-1.3.10-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105727" comment="python-hivex-1.3.10-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9295</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9295" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9295" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in ntpd in NTP before 4.2.8 allow remote attackers to execute arbitrary code via a crafted packet, related to (1) the crypto_recv function when the Autokey Authentication feature is used, (2) the ctl_putdata function, and (3) the configure function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009102973" comment="ntp-4.2.6p5-25.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102974" comment="ntp-doc-4.2.6p5-25.5.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9296</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9296" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9296" source="CVE"/>
    <description>
    The receive function in ntp_proto.c in ntpd in NTP before 4.2.8 continues to execute after detecting a certain authentication error, which might allow remote attackers to trigger an unintended association change via crafted packets.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009102973" comment="ntp-4.2.6p5-25.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009102974" comment="ntp-doc-4.2.6p5-25.5.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9322</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9322" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9322" source="CVE"/>
    <description>
    arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009103080" comment="kernel-debug-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103081" comment="kernel-debug-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103082" comment="kernel-debug-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103083" comment="kernel-default-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103084" comment="kernel-default-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103085" comment="kernel-default-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103086" comment="kernel-desktop-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103087" comment="kernel-desktop-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103088" comment="kernel-desktop-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103099" comment="kernel-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103089" comment="kernel-docs-3.16.7-7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103090" comment="kernel-ec2-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103091" comment="kernel-ec2-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103092" comment="kernel-ec2-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103100" comment="kernel-macros-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103093" comment="kernel-obs-build-3.16.7-7.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103095" comment="kernel-obs-qa-3.16.7-7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103094" comment="kernel-obs-qa-xen-3.16.7-7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103096" comment="kernel-pae-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103097" comment="kernel-pae-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103098" comment="kernel-pae-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103101" comment="kernel-source-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103102" comment="kernel-source-vanilla-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103103" comment="kernel-syms-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103104" comment="kernel-vanilla-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103105" comment="kernel-vanilla-devel-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103106" comment="kernel-xen-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103107" comment="kernel-xen-base-3.16.7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103108" comment="kernel-xen-devel-3.16.7-7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9324</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9324" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9324" source="CVE"/>
    <description>
    The GenericInterface in OTRS Help Desk 3.2.x before 3.2.17, 3.3.x before 3.3.11, and 4.0.x before 4.0.3 allows remote authenticated users to access and modify arbitrary tickets via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105246" comment="otrs-3.3.11-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105247" comment="otrs-doc-3.3.11-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105248" comment="otrs-itsm-3.3.11-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9328</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9328" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9328" source="CVE"/>
    <description>
    ClamAV before 0.98.6 allows remote attackers to have unspecified impact via a crafted upack packer file, related to a "heap out of bounds condition."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106071" comment="clamav-0.98.6-2.13.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9356</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9356" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9356" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009103226" comment="docker-1.4.0-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103227" comment="docker-bash-completion-1.4.0-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103228" comment="docker-zsh-completion-1.4.0-13.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9357</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9357" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9357" source="CVE"/>
    <description>
    Docker 1.3.2 allows remote attackers to execute arbitrary code with root privileges via a crafted (1) image or (2) build in a Dockerfile in an LZMA (.xz) archive, related to the chroot for archive extraction.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009103226" comment="docker-1.4.0-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103227" comment="docker-bash-completion-1.4.0-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103228" comment="docker-zsh-completion-1.4.0-13.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9358</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9358" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9358" source="CVE"/>
    <description>
    Docker before 1.3.3 does not properly validate image IDs, which allows remote attackers to conduct path traversal attacks and spoof repositories via a crafted image in a (1) "docker load" operation or (2) "registry communications."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009103226" comment="docker-1.4.0-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103227" comment="docker-bash-completion-1.4.0-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009103228" comment="docker-zsh-completion-1.4.0-13.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9390</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9390" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9390" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110623" comment="cgit-0.11.2-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105579" comment="git-2.1.4-9.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105580" comment="git-arch-2.1.4-9.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105581" comment="git-core-2.1.4-9.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105582" comment="git-cvs-2.1.4-9.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105583" comment="git-daemon-2.1.4-9.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105573" comment="git-doc-2.1.4-9.7 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105584" comment="git-email-2.1.4-9.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105585" comment="git-gui-2.1.4-9.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105556" comment="git-remote-helpers-1.8.4.5-3.8.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105586" comment="git-svn-2.1.4-9.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105587" comment="git-web-2.1.4-9.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105588" comment="gitk-2.1.4-9.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108406" comment="libgit2-0.21.5-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108393" comment="libgit2-0-0.19.0-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108407" comment="libgit2-21-0.21.5-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108408" comment="libgit2-devel-0.21.5-2.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9402</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9402" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402" source="CVE"/>
    <description>
    The nss_dns implementation of getnetbyname in GNU C Library (aka glibc) before 2.21, when the DNS backend in the Name Service Switch configuration is enabled, allows remote attackers to cause a denial of service (infinite loop) by sending a positive answer while a network name is being process.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009106726" comment="glibc-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106727" comment="glibc-32bit-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106728" comment="glibc-devel-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106729" comment="glibc-devel-32bit-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106730" comment="glibc-devel-static-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106731" comment="glibc-devel-static-32bit-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106736" comment="glibc-extra-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106737" comment="glibc-html-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106738" comment="glibc-i18ndata-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106739" comment="glibc-info-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106732" comment="glibc-locale-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106733" comment="glibc-locale-32bit-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106740" comment="glibc-obsolete-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106734" comment="glibc-profile-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106735" comment="glibc-profile-32bit-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106723" comment="glibc-testsuite-2.19-16.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106724" comment="glibc-utils-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106725" comment="glibc-utils-32bit-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106741" comment="nscd-2.19-16.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9419</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9419" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9419" source="CVE"/>
    <description>
    The __switch_to function in arch/x86/kernel/process_64.c in the Linux kernel through 3.18.1 does not ensure that Thread Local Storage (TLS) descriptors are loaded before proceeding with other steps, which makes it easier for local users to bypass the ASLR protection mechanism via a crafted application that reads a TLS base address.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108989" comment="bbswitch-0.8-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108990" comment="bbswitch-kmp-default-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108991" comment="bbswitch-kmp-desktop-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108992" comment="bbswitch-kmp-pae-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108993" comment="bbswitch-kmp-xen-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108994" comment="cloop-2.639-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108995" comment="cloop-kmp-default-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108996" comment="cloop-kmp-desktop-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108997" comment="cloop-kmp-pae-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108998" comment="cloop-kmp-xen-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108999" comment="crash-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109000" comment="crash-devel-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109001" comment="crash-doc-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109002" comment="crash-eppic-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109003" comment="crash-gcore-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109004" comment="crash-kmp-default-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109005" comment="crash-kmp-desktop-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109006" comment="crash-kmp-pae-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109007" comment="crash-kmp-xen-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109008" comment="hdjmod-1.28-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109009" comment="hdjmod-kmp-default-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109010" comment="hdjmod-kmp-desktop-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109011" comment="hdjmod-kmp-pae-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109012" comment="hdjmod-kmp-xen-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109013" comment="ipset-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109014" comment="ipset-devel-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109015" comment="ipset-kmp-default-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109016" comment="ipset-kmp-desktop-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109017" comment="ipset-kmp-pae-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109018" comment="ipset-kmp-xen-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109020" comment="kernel-debug-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109021" comment="kernel-debug-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109022" comment="kernel-debug-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109023" comment="kernel-default-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109024" comment="kernel-default-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109025" comment="kernel-default-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109026" comment="kernel-desktop-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109027" comment="kernel-desktop-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109028" comment="kernel-desktop-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109039" comment="kernel-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109029" comment="kernel-docs-3.16.7-21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109030" comment="kernel-ec2-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109031" comment="kernel-ec2-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109032" comment="kernel-ec2-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109040" comment="kernel-macros-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109033" comment="kernel-obs-build-3.16.7-21.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109035" comment="kernel-obs-qa-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109034" comment="kernel-obs-qa-xen-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109036" comment="kernel-pae-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109037" comment="kernel-pae-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109038" comment="kernel-pae-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109041" comment="kernel-source-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109042" comment="kernel-source-vanilla-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109043" comment="kernel-syms-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109044" comment="kernel-vanilla-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109045" comment="kernel-vanilla-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109046" comment="kernel-xen-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109047" comment="kernel-xen-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109048" comment="kernel-xen-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109019" comment="libipset3-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109049" comment="pcfclock-0.44-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109050" comment="pcfclock-kmp-default-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109051" comment="pcfclock-kmp-desktop-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109052" comment="pcfclock-kmp-pae-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109058" comment="python-virtualbox-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109053" comment="vhba-kmp-20140629-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109054" comment="vhba-kmp-default-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109055" comment="vhba-kmp-desktop-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109056" comment="vhba-kmp-pae-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109057" comment="vhba-kmp-xen-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109059" comment="virtualbox-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109060" comment="virtualbox-devel-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109061" comment="virtualbox-guest-desktop-icons-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109062" comment="virtualbox-guest-kmp-default-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109063" comment="virtualbox-guest-kmp-desktop-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109064" comment="virtualbox-guest-kmp-pae-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109065" comment="virtualbox-guest-tools-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109066" comment="virtualbox-guest-x11-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109067" comment="virtualbox-host-kmp-default-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109068" comment="virtualbox-host-kmp-desktop-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109069" comment="virtualbox-host-kmp-pae-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109070" comment="virtualbox-qt-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109071" comment="virtualbox-websrv-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109072" comment="xen-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109073" comment="xen-devel-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109082" comment="xen-doc-html-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109083" comment="xen-kmp-default-4.4.1_08_k3.16.7_21-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109084" comment="xen-kmp-desktop-4.4.1_08_k3.16.7_21-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109075" comment="xen-libs-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109074" comment="xen-libs-32bit-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109085" comment="xen-tools-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109076" comment="xen-tools-domU-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109077" comment="xtables-addons-2.6-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109078" comment="xtables-addons-kmp-default-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109079" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109080" comment="xtables-addons-kmp-pae-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109081" comment="xtables-addons-kmp-xen-2.6_k3.16.7_21-9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9420</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9420" source="CVE"/>
    <description>
    The rock_continue function in fs/isofs/rock.c in the Linux kernel through 3.18.1 does not restrict the number of Rock Ridge continuation entries, which allows local users to cause a denial of service (infinite loop, and system crash or hang) via a crafted iso9660 image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108989" comment="bbswitch-0.8-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108990" comment="bbswitch-kmp-default-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108991" comment="bbswitch-kmp-desktop-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108992" comment="bbswitch-kmp-pae-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108993" comment="bbswitch-kmp-xen-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108994" comment="cloop-2.639-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108995" comment="cloop-kmp-default-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108996" comment="cloop-kmp-desktop-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108997" comment="cloop-kmp-pae-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108998" comment="cloop-kmp-xen-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108999" comment="crash-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109000" comment="crash-devel-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109001" comment="crash-doc-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109002" comment="crash-eppic-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109003" comment="crash-gcore-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109004" comment="crash-kmp-default-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109005" comment="crash-kmp-desktop-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109006" comment="crash-kmp-pae-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109007" comment="crash-kmp-xen-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109008" comment="hdjmod-1.28-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109009" comment="hdjmod-kmp-default-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109010" comment="hdjmod-kmp-desktop-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109011" comment="hdjmod-kmp-pae-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109012" comment="hdjmod-kmp-xen-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109013" comment="ipset-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109014" comment="ipset-devel-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109015" comment="ipset-kmp-default-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109016" comment="ipset-kmp-desktop-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109017" comment="ipset-kmp-pae-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109018" comment="ipset-kmp-xen-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109020" comment="kernel-debug-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109021" comment="kernel-debug-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109022" comment="kernel-debug-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109023" comment="kernel-default-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109024" comment="kernel-default-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109025" comment="kernel-default-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109026" comment="kernel-desktop-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109027" comment="kernel-desktop-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109028" comment="kernel-desktop-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109039" comment="kernel-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109029" comment="kernel-docs-3.16.7-21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109030" comment="kernel-ec2-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109031" comment="kernel-ec2-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109032" comment="kernel-ec2-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109040" comment="kernel-macros-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109033" comment="kernel-obs-build-3.16.7-21.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109035" comment="kernel-obs-qa-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109034" comment="kernel-obs-qa-xen-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109036" comment="kernel-pae-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109037" comment="kernel-pae-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109038" comment="kernel-pae-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109041" comment="kernel-source-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109042" comment="kernel-source-vanilla-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109043" comment="kernel-syms-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109044" comment="kernel-vanilla-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109045" comment="kernel-vanilla-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109046" comment="kernel-xen-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109047" comment="kernel-xen-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109048" comment="kernel-xen-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109019" comment="libipset3-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109049" comment="pcfclock-0.44-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109050" comment="pcfclock-kmp-default-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109051" comment="pcfclock-kmp-desktop-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109052" comment="pcfclock-kmp-pae-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109058" comment="python-virtualbox-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109053" comment="vhba-kmp-20140629-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109054" comment="vhba-kmp-default-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109055" comment="vhba-kmp-desktop-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109056" comment="vhba-kmp-pae-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109057" comment="vhba-kmp-xen-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109059" comment="virtualbox-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109060" comment="virtualbox-devel-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109061" comment="virtualbox-guest-desktop-icons-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109062" comment="virtualbox-guest-kmp-default-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109063" comment="virtualbox-guest-kmp-desktop-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109064" comment="virtualbox-guest-kmp-pae-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109065" comment="virtualbox-guest-tools-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109066" comment="virtualbox-guest-x11-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109067" comment="virtualbox-host-kmp-default-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109068" comment="virtualbox-host-kmp-desktop-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109069" comment="virtualbox-host-kmp-pae-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109070" comment="virtualbox-qt-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109071" comment="virtualbox-websrv-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109072" comment="xen-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109073" comment="xen-devel-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109082" comment="xen-doc-html-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109083" comment="xen-kmp-default-4.4.1_08_k3.16.7_21-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109084" comment="xen-kmp-desktop-4.4.1_08_k3.16.7_21-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109075" comment="xen-libs-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109074" comment="xen-libs-32bit-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109085" comment="xen-tools-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109076" comment="xen-tools-domU-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109077" comment="xtables-addons-2.6-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109078" comment="xtables-addons-kmp-default-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109079" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109080" comment="xtables-addons-kmp-pae-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109081" comment="xtables-addons-kmp-xen-2.6_k3.16.7_21-9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9421</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9421" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9421" source="CVE"/>
    <description>
    The auth_gssapi_unwrap_data function in lib/rpc/auth_gssapi_misc.c in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 does not properly handle partial XDR deserialization, which allows remote authenticated users to cause a denial of service (use-after-free and double free, and daemon crash) or possibly execute arbitrary code via malformed XDR data, as demonstrated by data sent to kadmind.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105994" comment="krb5-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105995" comment="krb5-32bit-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105996" comment="krb5-client-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105997" comment="krb5-devel-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105998" comment="krb5-devel-32bit-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105999" comment="krb5-doc-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105992" comment="krb5-mini-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105993" comment="krb5-mini-devel-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106000" comment="krb5-plugin-kdb-ldap-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106001" comment="krb5-plugin-preauth-otp-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106002" comment="krb5-plugin-preauth-pkinit-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106003" comment="krb5-server-1.12.2-6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9422</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9422" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9422" source="CVE"/>
    <description>
    The check_rpcsec_auth function in kadmin/server/kadm_rpc_svc.c in kadmind in MIT Kerberos 5 (aka krb5) through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 allows remote authenticated users to bypass a kadmin/* authorization check and obtain administrative access by leveraging access to a two-component principal with an initial "kadmind" substring, as demonstrated by a "ka/x" principal.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105994" comment="krb5-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105995" comment="krb5-32bit-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105996" comment="krb5-client-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105997" comment="krb5-devel-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105998" comment="krb5-devel-32bit-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105999" comment="krb5-doc-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105992" comment="krb5-mini-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105993" comment="krb5-mini-devel-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106000" comment="krb5-plugin-kdb-ldap-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106001" comment="krb5-plugin-preauth-otp-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106002" comment="krb5-plugin-preauth-pkinit-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106003" comment="krb5-server-1.12.2-6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9423</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9423" source="CVE"/>
    <description>
    The svcauth_gss_accept_sec_context function in lib/rpc/svc_auth_gss.c in MIT Kerberos 5 (aka krb5) 1.11.x through 1.11.5, 1.12.x through 1.12.2, and 1.13.x before 1.13.1 transmits uninitialized interposer data to clients, which allows remote attackers to obtain sensitive information from process heap memory by sniffing the network for data in a handle field.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105994" comment="krb5-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105995" comment="krb5-32bit-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105996" comment="krb5-client-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105997" comment="krb5-devel-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105998" comment="krb5-devel-32bit-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105999" comment="krb5-doc-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105992" comment="krb5-mini-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105993" comment="krb5-mini-devel-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106000" comment="krb5-plugin-kdb-ldap-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106001" comment="krb5-plugin-preauth-otp-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106002" comment="krb5-plugin-preauth-pkinit-1.12.2-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106003" comment="krb5-server-1.12.2-6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9426</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9426" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9426" source="CVE"/>
    <description>
    ** DISPUTED ** The apprentice_load function in libmagic/apprentice.c in the Fileinfo component in PHP through 5.6.4 attempts to perform a free operation on a stack-based character array, which allows remote attackers to cause a denial of service (memory corruption or application crash) or possibly have unspecified other impact via unknown vectors.  NOTE: this is disputed by the vendor because the standard erealloc behavior makes the free operation unreachable.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009106233" comment="apache2-mod_php5-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106234" comment="php5-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106235" comment="php5-bcmath-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106236" comment="php5-bz2-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106237" comment="php5-calendar-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106238" comment="php5-ctype-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106239" comment="php5-curl-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106240" comment="php5-dba-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106241" comment="php5-devel-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106242" comment="php5-dom-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106243" comment="php5-enchant-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106244" comment="php5-exif-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106245" comment="php5-fastcgi-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106246" comment="php5-fileinfo-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106247" comment="php5-firebird-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106248" comment="php5-fpm-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106249" comment="php5-ftp-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106250" comment="php5-gd-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106251" comment="php5-gettext-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106252" comment="php5-gmp-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106253" comment="php5-iconv-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106254" comment="php5-imap-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106255" comment="php5-intl-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106256" comment="php5-json-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106257" comment="php5-ldap-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106258" comment="php5-mbstring-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106259" comment="php5-mcrypt-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106260" comment="php5-mssql-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106261" comment="php5-mysql-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106262" comment="php5-odbc-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106263" comment="php5-opcache-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106264" comment="php5-openssl-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106265" comment="php5-pcntl-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106266" comment="php5-pdo-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106267" comment="php5-pear-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106268" comment="php5-pgsql-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106269" comment="php5-phar-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106270" comment="php5-posix-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106271" comment="php5-pspell-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106272" comment="php5-readline-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106273" comment="php5-shmop-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106274" comment="php5-snmp-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106275" comment="php5-soap-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106276" comment="php5-sockets-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106277" comment="php5-sqlite-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106278" comment="php5-suhosin-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106279" comment="php5-sysvmsg-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106280" comment="php5-sysvsem-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106281" comment="php5-sysvshm-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106282" comment="php5-tidy-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106283" comment="php5-tokenizer-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106284" comment="php5-wddx-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106285" comment="php5-xmlreader-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106286" comment="php5-xmlrpc-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106287" comment="php5-xmlwriter-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106288" comment="php5-xsl-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106289" comment="php5-zip-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106290" comment="php5-zlib-5.6.1-8.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9427</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9427" source="CVE"/>
    <description>
    sapi/cgi/cgi_main.c in the CGI component in PHP through 5.4.36, 5.5.x through 5.5.20, and 5.6.x through 5.6.4, when mmap is used to read a .php file, does not properly consider the mapping's length during processing of an invalid file that begins with a # character and lacks a newline character, which causes an out-of-bounds read and might (1) allow remote attackers to obtain sensitive information from php-cgi process memory by leveraging the ability to upload a .php file or (2) trigger unexpected code execution if a valid PHP script is present in memory locations adjacent to the mapping.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009106233" comment="apache2-mod_php5-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106234" comment="php5-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106235" comment="php5-bcmath-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106236" comment="php5-bz2-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106237" comment="php5-calendar-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106238" comment="php5-ctype-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106239" comment="php5-curl-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106240" comment="php5-dba-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106241" comment="php5-devel-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106242" comment="php5-dom-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106243" comment="php5-enchant-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106244" comment="php5-exif-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106245" comment="php5-fastcgi-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106246" comment="php5-fileinfo-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106247" comment="php5-firebird-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106248" comment="php5-fpm-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106249" comment="php5-ftp-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106250" comment="php5-gd-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106251" comment="php5-gettext-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106252" comment="php5-gmp-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106253" comment="php5-iconv-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106254" comment="php5-imap-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106255" comment="php5-intl-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106256" comment="php5-json-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106257" comment="php5-ldap-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106258" comment="php5-mbstring-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106259" comment="php5-mcrypt-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106260" comment="php5-mssql-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106261" comment="php5-mysql-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106262" comment="php5-odbc-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106263" comment="php5-opcache-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106264" comment="php5-openssl-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106265" comment="php5-pcntl-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106266" comment="php5-pdo-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106267" comment="php5-pear-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106268" comment="php5-pgsql-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106269" comment="php5-phar-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106270" comment="php5-posix-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106271" comment="php5-pspell-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106272" comment="php5-readline-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106273" comment="php5-shmop-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106274" comment="php5-snmp-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106275" comment="php5-soap-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106276" comment="php5-sockets-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106277" comment="php5-sqlite-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106278" comment="php5-suhosin-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106279" comment="php5-sysvmsg-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106280" comment="php5-sysvsem-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106281" comment="php5-sysvshm-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106282" comment="php5-tidy-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106283" comment="php5-tokenizer-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106284" comment="php5-wddx-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106285" comment="php5-xmlreader-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106286" comment="php5-xmlrpc-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106287" comment="php5-xmlwriter-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106288" comment="php5-xsl-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106289" comment="php5-zip-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106290" comment="php5-zlib-5.6.1-8.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9428</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9428" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9428" source="CVE"/>
    <description>
    The batadv_frag_merge_packets function in net/batman-adv/fragmentation.c in the B.A.T.M.A.N. implementation in the Linux kernel through 3.18.1 uses an incorrect length field during a calculation of an amount of memory, which allows remote attackers to cause a denial of service (mesh-node system crash) via fragmented packets.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108989" comment="bbswitch-0.8-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108990" comment="bbswitch-kmp-default-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108991" comment="bbswitch-kmp-desktop-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108992" comment="bbswitch-kmp-pae-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108993" comment="bbswitch-kmp-xen-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108994" comment="cloop-2.639-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108995" comment="cloop-kmp-default-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108996" comment="cloop-kmp-desktop-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108997" comment="cloop-kmp-pae-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108998" comment="cloop-kmp-xen-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108999" comment="crash-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109000" comment="crash-devel-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109001" comment="crash-doc-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109002" comment="crash-eppic-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109003" comment="crash-gcore-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109004" comment="crash-kmp-default-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109005" comment="crash-kmp-desktop-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109006" comment="crash-kmp-pae-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109007" comment="crash-kmp-xen-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109008" comment="hdjmod-1.28-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109009" comment="hdjmod-kmp-default-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109010" comment="hdjmod-kmp-desktop-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109011" comment="hdjmod-kmp-pae-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109012" comment="hdjmod-kmp-xen-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109013" comment="ipset-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109014" comment="ipset-devel-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109015" comment="ipset-kmp-default-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109016" comment="ipset-kmp-desktop-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109017" comment="ipset-kmp-pae-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109018" comment="ipset-kmp-xen-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109020" comment="kernel-debug-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109021" comment="kernel-debug-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109022" comment="kernel-debug-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109023" comment="kernel-default-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109024" comment="kernel-default-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109025" comment="kernel-default-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109026" comment="kernel-desktop-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109027" comment="kernel-desktop-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109028" comment="kernel-desktop-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109039" comment="kernel-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109029" comment="kernel-docs-3.16.7-21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109030" comment="kernel-ec2-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109031" comment="kernel-ec2-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109032" comment="kernel-ec2-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109040" comment="kernel-macros-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109033" comment="kernel-obs-build-3.16.7-21.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109035" comment="kernel-obs-qa-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109034" comment="kernel-obs-qa-xen-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109036" comment="kernel-pae-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109037" comment="kernel-pae-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109038" comment="kernel-pae-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109041" comment="kernel-source-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109042" comment="kernel-source-vanilla-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109043" comment="kernel-syms-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109044" comment="kernel-vanilla-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109045" comment="kernel-vanilla-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109046" comment="kernel-xen-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109047" comment="kernel-xen-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109048" comment="kernel-xen-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109019" comment="libipset3-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109049" comment="pcfclock-0.44-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109050" comment="pcfclock-kmp-default-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109051" comment="pcfclock-kmp-desktop-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109052" comment="pcfclock-kmp-pae-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109058" comment="python-virtualbox-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109053" comment="vhba-kmp-20140629-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109054" comment="vhba-kmp-default-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109055" comment="vhba-kmp-desktop-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109056" comment="vhba-kmp-pae-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109057" comment="vhba-kmp-xen-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109059" comment="virtualbox-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109060" comment="virtualbox-devel-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109061" comment="virtualbox-guest-desktop-icons-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109062" comment="virtualbox-guest-kmp-default-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109063" comment="virtualbox-guest-kmp-desktop-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109064" comment="virtualbox-guest-kmp-pae-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109065" comment="virtualbox-guest-tools-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109066" comment="virtualbox-guest-x11-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109067" comment="virtualbox-host-kmp-default-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109068" comment="virtualbox-host-kmp-desktop-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109069" comment="virtualbox-host-kmp-pae-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109070" comment="virtualbox-qt-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109071" comment="virtualbox-websrv-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109072" comment="xen-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109073" comment="xen-devel-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109082" comment="xen-doc-html-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109083" comment="xen-kmp-default-4.4.1_08_k3.16.7_21-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109084" comment="xen-kmp-desktop-4.4.1_08_k3.16.7_21-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109075" comment="xen-libs-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109074" comment="xen-libs-32bit-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109085" comment="xen-tools-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109076" comment="xen-tools-domU-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109077" comment="xtables-addons-2.6-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109078" comment="xtables-addons-kmp-default-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109079" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109080" comment="xtables-addons-kmp-pae-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109081" comment="xtables-addons-kmp-xen-2.6_k3.16.7_21-9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9447</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9447" source="CVE"/>
    <description>
    Directory traversal vulnerability in the read_long_names function in libelf/elf_begin.c in elfutils 0.152 and 0.161 allows remote attackers to write to arbitrary files to the root directory via a / (slash) in a crafted archive, as demonstrated using the ar program.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105268" comment="elfutils-0.158-4.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105269" comment="libasm-devel-0.158-4.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105270" comment="libasm1-0.158-4.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105271" comment="libasm1-32bit-0.158-4.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105272" comment="libdw-devel-0.158-4.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105273" comment="libdw1-0.158-4.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105274" comment="libdw1-32bit-0.158-4.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105275" comment="libebl-devel-0.158-4.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105276" comment="libebl1-0.158-4.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105277" comment="libebl1-32bit-0.158-4.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105278" comment="libelf-devel-0.158-4.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105279" comment="libelf-devel-32bit-0.158-4.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105280" comment="libelf1-0.158-4.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105281" comment="libelf1-32bit-0.158-4.5.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9462</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9462" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9462" source="CVE"/>
    <description>
    The _validaterepo function in sshpeer in Mercurial before 3.2.4 allows remote attackers to execute arbitrary commands via a crafted repository name in a clone command.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108129" comment="mercurial-3.1.2-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108130" comment="mercurial-lang-3.1.2-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9488</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9488" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9488" source="CVE"/>
    <description>
    The is_utf8_well_formed function in GNU less before 475 allows remote attackers to have unspecified impact via malformed UTF-8 characters, which triggers an out-of-bounds read.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108090" comment="less-458-6.4.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9495</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9495" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9495" source="CVE"/>
    <description>
    Heap-based buffer overflow in the png_combine_row function in libpng before 1.5.21 and 1.6.x before 1.6.16, when running on 64-bit systems, might allow context-dependent attackers to execute arbitrary code via a "very wide interlaced" PNG image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105589" comment="libpng16-1.6.13-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105590" comment="libpng16-16-1.6.13-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105591" comment="libpng16-16-32bit-1.6.13-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105592" comment="libpng16-compat-devel-1.6.13-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105593" comment="libpng16-compat-devel-32bit-1.6.13-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105594" comment="libpng16-devel-1.6.13-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105595" comment="libpng16-devel-32bit-1.6.13-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105596" comment="libpng16-tools-1.6.13-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9496</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9496" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9496" source="CVE"/>
    <description>
    The sd2_parse_rsrc_fork function in sd2.c in libsndfile allows attackers to have unspecified impact via vectors related to a (1) map offset or (2) rsrc marker, which triggers an out-of-bounds read.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105121" comment="libsndfile-1.0.25-19.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105122" comment="libsndfile-devel-1.0.25-19.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105120" comment="libsndfile-progs-1.0.25-19.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105123" comment="libsndfile1-1.0.25-19.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105124" comment="libsndfile1-32bit-1.0.25-19.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9508</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9508" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9508" source="CVE"/>
    <description>
    The frontend rendering component in TYPO3 4.5.x before 4.5.39, 4.6.x through 6.2.x before 6.2.9, and 7.x before 7.0.2, when config.prefixLocalAnchors is set and using a homepage with links that only contain anchors, allows remote attackers to change URLs to arbitrary domains for those links via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134120" comment="typo3-cms-4_5-4.5.40-2.3.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9512</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9512" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9512" source="CVE"/>
    <description>
    rsync 3.1.1 allows remote attackers to write to arbitrary files via a symlink attack on a file in the synchronization path.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129366" comment="rsync-3.1.1-2.10.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9529</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9529" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9529" source="CVE"/>
    <description>
    Race condition in the key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 3.18.2 allows local users to cause a denial of service (memory corruption or panic) or possibly have unspecified other impact via keyctl commands that trigger access to a key structure member during garbage collection of a key.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122787" comment="bbswitch-0.8-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122788" comment="bbswitch-kmp-default-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122789" comment="bbswitch-kmp-desktop-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122790" comment="bbswitch-kmp-pae-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122791" comment="bbswitch-kmp-xen-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122792" comment="cloop-2.639-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122793" comment="cloop-kmp-default-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122794" comment="cloop-kmp-desktop-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122795" comment="cloop-kmp-pae-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122796" comment="cloop-kmp-xen-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122797" comment="crash-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122798" comment="crash-devel-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122799" comment="crash-doc-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122800" comment="crash-eppic-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122801" comment="crash-gcore-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122802" comment="crash-kmp-default-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122803" comment="crash-kmp-desktop-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122804" comment="crash-kmp-pae-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122805" comment="crash-kmp-xen-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122806" comment="hdjmod-1.28-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122807" comment="hdjmod-kmp-default-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122808" comment="hdjmod-kmp-desktop-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122809" comment="hdjmod-kmp-pae-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122810" comment="hdjmod-kmp-xen-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122811" comment="ipset-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122812" comment="ipset-devel-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122813" comment="ipset-kmp-default-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122814" comment="ipset-kmp-desktop-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122815" comment="ipset-kmp-pae-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122816" comment="ipset-kmp-xen-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122817" comment="kernel-debug-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122818" comment="kernel-debug-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122819" comment="kernel-debug-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122820" comment="kernel-default-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122821" comment="kernel-default-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122822" comment="kernel-default-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122823" comment="kernel-desktop-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122824" comment="kernel-desktop-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122825" comment="kernel-desktop-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122826" comment="kernel-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122827" comment="kernel-docs-3.16.7-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122828" comment="kernel-ec2-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122829" comment="kernel-ec2-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122830" comment="kernel-ec2-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122831" comment="kernel-macros-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122832" comment="kernel-obs-build-3.16.7-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122833" comment="kernel-obs-qa-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122834" comment="kernel-obs-qa-xen-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122835" comment="kernel-pae-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122836" comment="kernel-pae-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122837" comment="kernel-pae-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122838" comment="kernel-source-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122839" comment="kernel-source-vanilla-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122840" comment="kernel-syms-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122841" comment="kernel-vanilla-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122842" comment="kernel-vanilla-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122843" comment="kernel-xen-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122844" comment="kernel-xen-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122845" comment="kernel-xen-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122846" comment="libipset3-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122847" comment="pcfclock-0.44-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122848" comment="pcfclock-kmp-default-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122849" comment="pcfclock-kmp-desktop-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122850" comment="pcfclock-kmp-pae-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122851" comment="python-virtualbox-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122852" comment="vhba-kmp-20140629-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122853" comment="vhba-kmp-default-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122854" comment="vhba-kmp-desktop-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122855" comment="vhba-kmp-pae-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122856" comment="vhba-kmp-xen-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122857" comment="virtualbox-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122858" comment="virtualbox-devel-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122859" comment="virtualbox-guest-desktop-icons-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122860" comment="virtualbox-guest-kmp-default-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122861" comment="virtualbox-guest-kmp-desktop-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122862" comment="virtualbox-guest-kmp-pae-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122863" comment="virtualbox-guest-tools-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122864" comment="virtualbox-guest-x11-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122865" comment="virtualbox-host-kmp-default-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122866" comment="virtualbox-host-kmp-desktop-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122867" comment="virtualbox-host-kmp-pae-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122868" comment="virtualbox-host-source-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122869" comment="virtualbox-qt-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122870" comment="virtualbox-websrv-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122871" comment="xen-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122872" comment="xen-devel-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122873" comment="xen-doc-html-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122874" comment="xen-kmp-default-4.4.3_08_k3.16.7_32-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122875" comment="xen-kmp-desktop-4.4.3_08_k3.16.7_32-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122876" comment="xen-libs-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122877" comment="xen-libs-32bit-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122878" comment="xen-tools-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122879" comment="xen-tools-domU-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122880" comment="xtables-addons-2.6-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122881" comment="xtables-addons-kmp-default-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122882" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122883" comment="xtables-addons-kmp-pae-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122884" comment="xtables-addons-kmp-xen-2.6_k3.16.7_32-15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9556</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9556" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9556" source="CVE"/>
    <description>
    Integer overflow in the qtmd_decompress function in libmspack 0.4 allows remote attackers to cause a denial of service (hang) via a crafted CAB file, which triggers an infinite loop.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107246" comment="libmspack-0.4-5.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107247" comment="libmspack-devel-0.4-5.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107248" comment="libmspack0-0.4-5.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107249" comment="libmspack0-32bit-0.4-5.8.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9584</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9584" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9584" source="CVE"/>
    <description>
    The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel before 3.18.2 does not validate a length value in the Extensions Reference (ER) System Use Field, which allows local users to obtain sensitive information from kernel memory via a crafted iso9660 image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108989" comment="bbswitch-0.8-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108990" comment="bbswitch-kmp-default-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108991" comment="bbswitch-kmp-desktop-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108992" comment="bbswitch-kmp-pae-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108993" comment="bbswitch-kmp-xen-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108994" comment="cloop-2.639-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108995" comment="cloop-kmp-default-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108996" comment="cloop-kmp-desktop-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108997" comment="cloop-kmp-pae-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108998" comment="cloop-kmp-xen-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108999" comment="crash-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109000" comment="crash-devel-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109001" comment="crash-doc-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109002" comment="crash-eppic-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109003" comment="crash-gcore-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109004" comment="crash-kmp-default-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109005" comment="crash-kmp-desktop-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109006" comment="crash-kmp-pae-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109007" comment="crash-kmp-xen-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109008" comment="hdjmod-1.28-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109009" comment="hdjmod-kmp-default-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109010" comment="hdjmod-kmp-desktop-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109011" comment="hdjmod-kmp-pae-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109012" comment="hdjmod-kmp-xen-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109013" comment="ipset-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109014" comment="ipset-devel-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109015" comment="ipset-kmp-default-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109016" comment="ipset-kmp-desktop-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109017" comment="ipset-kmp-pae-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109018" comment="ipset-kmp-xen-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109020" comment="kernel-debug-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109021" comment="kernel-debug-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109022" comment="kernel-debug-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109023" comment="kernel-default-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109024" comment="kernel-default-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109025" comment="kernel-default-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109026" comment="kernel-desktop-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109027" comment="kernel-desktop-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109028" comment="kernel-desktop-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109039" comment="kernel-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109029" comment="kernel-docs-3.16.7-21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109030" comment="kernel-ec2-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109031" comment="kernel-ec2-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109032" comment="kernel-ec2-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109040" comment="kernel-macros-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109033" comment="kernel-obs-build-3.16.7-21.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109035" comment="kernel-obs-qa-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109034" comment="kernel-obs-qa-xen-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109036" comment="kernel-pae-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109037" comment="kernel-pae-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109038" comment="kernel-pae-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109041" comment="kernel-source-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109042" comment="kernel-source-vanilla-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109043" comment="kernel-syms-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109044" comment="kernel-vanilla-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109045" comment="kernel-vanilla-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109046" comment="kernel-xen-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109047" comment="kernel-xen-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109048" comment="kernel-xen-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109019" comment="libipset3-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109049" comment="pcfclock-0.44-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109050" comment="pcfclock-kmp-default-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109051" comment="pcfclock-kmp-desktop-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109052" comment="pcfclock-kmp-pae-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109058" comment="python-virtualbox-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109053" comment="vhba-kmp-20140629-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109054" comment="vhba-kmp-default-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109055" comment="vhba-kmp-desktop-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109056" comment="vhba-kmp-pae-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109057" comment="vhba-kmp-xen-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109059" comment="virtualbox-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109060" comment="virtualbox-devel-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109061" comment="virtualbox-guest-desktop-icons-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109062" comment="virtualbox-guest-kmp-default-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109063" comment="virtualbox-guest-kmp-desktop-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109064" comment="virtualbox-guest-kmp-pae-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109065" comment="virtualbox-guest-tools-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109066" comment="virtualbox-guest-x11-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109067" comment="virtualbox-host-kmp-default-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109068" comment="virtualbox-host-kmp-desktop-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109069" comment="virtualbox-host-kmp-pae-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109070" comment="virtualbox-qt-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109071" comment="virtualbox-websrv-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109072" comment="xen-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109073" comment="xen-devel-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109082" comment="xen-doc-html-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109083" comment="xen-kmp-default-4.4.1_08_k3.16.7_21-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109084" comment="xen-kmp-desktop-4.4.1_08_k3.16.7_21-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109075" comment="xen-libs-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109074" comment="xen-libs-32bit-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109085" comment="xen-tools-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109076" comment="xen-tools-domU-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109077" comment="xtables-addons-2.6-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109078" comment="xtables-addons-kmp-default-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109079" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109080" comment="xtables-addons-kmp-pae-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109081" comment="xtables-addons-kmp-xen-2.6_k3.16.7_21-9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9585</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9585" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9585" source="CVE"/>
    <description>
    The vdso_addr function in arch/x86/vdso/vma.c in the Linux kernel through 3.18.2 does not properly choose memory locations for the vDSO area, which makes it easier for local users to bypass the ASLR protection mechanism by guessing a location at the end of a PMD.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108989" comment="bbswitch-0.8-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108990" comment="bbswitch-kmp-default-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108991" comment="bbswitch-kmp-desktop-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108992" comment="bbswitch-kmp-pae-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108993" comment="bbswitch-kmp-xen-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108994" comment="cloop-2.639-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108995" comment="cloop-kmp-default-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108996" comment="cloop-kmp-desktop-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108997" comment="cloop-kmp-pae-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108998" comment="cloop-kmp-xen-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108999" comment="crash-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109000" comment="crash-devel-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109001" comment="crash-doc-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109002" comment="crash-eppic-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109003" comment="crash-gcore-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109004" comment="crash-kmp-default-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109005" comment="crash-kmp-desktop-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109006" comment="crash-kmp-pae-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109007" comment="crash-kmp-xen-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109008" comment="hdjmod-1.28-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109009" comment="hdjmod-kmp-default-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109010" comment="hdjmod-kmp-desktop-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109011" comment="hdjmod-kmp-pae-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109012" comment="hdjmod-kmp-xen-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109013" comment="ipset-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109014" comment="ipset-devel-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109015" comment="ipset-kmp-default-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109016" comment="ipset-kmp-desktop-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109017" comment="ipset-kmp-pae-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109018" comment="ipset-kmp-xen-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109020" comment="kernel-debug-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109021" comment="kernel-debug-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109022" comment="kernel-debug-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109023" comment="kernel-default-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109024" comment="kernel-default-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109025" comment="kernel-default-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109026" comment="kernel-desktop-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109027" comment="kernel-desktop-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109028" comment="kernel-desktop-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109039" comment="kernel-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109029" comment="kernel-docs-3.16.7-21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109030" comment="kernel-ec2-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109031" comment="kernel-ec2-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109032" comment="kernel-ec2-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109040" comment="kernel-macros-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109033" comment="kernel-obs-build-3.16.7-21.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109035" comment="kernel-obs-qa-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109034" comment="kernel-obs-qa-xen-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109036" comment="kernel-pae-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109037" comment="kernel-pae-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109038" comment="kernel-pae-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109041" comment="kernel-source-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109042" comment="kernel-source-vanilla-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109043" comment="kernel-syms-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109044" comment="kernel-vanilla-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109045" comment="kernel-vanilla-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109046" comment="kernel-xen-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109047" comment="kernel-xen-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109048" comment="kernel-xen-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109019" comment="libipset3-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109049" comment="pcfclock-0.44-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109050" comment="pcfclock-kmp-default-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109051" comment="pcfclock-kmp-desktop-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109052" comment="pcfclock-kmp-pae-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109058" comment="python-virtualbox-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109053" comment="vhba-kmp-20140629-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109054" comment="vhba-kmp-default-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109055" comment="vhba-kmp-desktop-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109056" comment="vhba-kmp-pae-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109057" comment="vhba-kmp-xen-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109059" comment="virtualbox-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109060" comment="virtualbox-devel-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109061" comment="virtualbox-guest-desktop-icons-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109062" comment="virtualbox-guest-kmp-default-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109063" comment="virtualbox-guest-kmp-desktop-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109064" comment="virtualbox-guest-kmp-pae-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109065" comment="virtualbox-guest-tools-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109066" comment="virtualbox-guest-x11-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109067" comment="virtualbox-host-kmp-default-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109068" comment="virtualbox-host-kmp-desktop-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109069" comment="virtualbox-host-kmp-pae-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109070" comment="virtualbox-qt-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109071" comment="virtualbox-websrv-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109072" comment="xen-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109073" comment="xen-devel-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109082" comment="xen-doc-html-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109083" comment="xen-kmp-default-4.4.1_08_k3.16.7_21-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109084" comment="xen-kmp-desktop-4.4.1_08_k3.16.7_21-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109075" comment="xen-libs-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109074" comment="xen-libs-32bit-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109085" comment="xen-tools-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109076" comment="xen-tools-domU-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109077" comment="xtables-addons-2.6-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109078" comment="xtables-addons-kmp-default-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109079" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109080" comment="xtables-addons-kmp-pae-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109081" comment="xtables-addons-kmp-xen-2.6_k3.16.7_21-9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9587</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9587" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9587" source="CVE"/>
    <description>
    Multiple cross-site request forgery (CSRF) vulnerabilities in Roundcube Webmail before 1.0.4 allow remote attackers to hijack the authentication of unspecified victims via unknown vectors, related to (1) address book operations or the (2) ACL or (3) Managesieve plugins.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105292" comment="roundcubemail-1.0.4-4.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9601</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9601" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9601" source="CVE"/>
    <description>
    Pillow before 2.7.0 allows remote attackers to cause a denial of service via a compressed text chunk in a PNG image that has a large size when it is decompressed.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109158" comment="python-Pillow-2.8.1-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109159" comment="python-Pillow-tk-2.8.1-3.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9622</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9622" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9622" source="CVE"/>
    <description>
    Eval injection vulnerability in xdg-utils 1.1.0 RC1, when no supported desktop environment is identified, allows context-dependent attackers to execute arbitrary code via the URL argument to xdg-open.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105710" comment="xdg-utils-20140922-12.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9625</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9625" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9625" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105801" comment="libvlc5-2.1.5-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105802" comment="libvlccore7-2.1.5-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105799" comment="live555-2014.09.22-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105800" comment="live555-devel-2014.09.22-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105803" comment="vlc-2.1.5-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105804" comment="vlc-devel-2.1.5-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105805" comment="vlc-gnome-2.1.5-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105806" comment="vlc-noX-2.1.5-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105807" comment="vlc-noX-lang-2.1.5-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105808" comment="vlc-qt-2.1.5-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9638</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9638" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9638" source="CVE"/>
    <description>
    oggenc in vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (divide-by-zero error and crash) via a WAV file with the number of channels set to zero.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107786" comment="vorbis-tools-1.4.0-17.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107787" comment="vorbis-tools-lang-1.4.0-17.8.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9639</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9639" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9639" source="CVE"/>
    <description>
    Integer overflow in oggenc in vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (crash) via a crafted number of channels in a WAV file, which triggers an out-of-bounds memory access.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107786" comment="vorbis-tools-1.4.0-17.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107787" comment="vorbis-tools-lang-1.4.0-17.8.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9640</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9640" source="CVE"/>
    <description>
    oggenc/oggenc.c in vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted raw file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105909" comment="vorbis-tools-1.4.0-17.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105910" comment="vorbis-tools-lang-1.4.0-17.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9645</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9645" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9645" source="CVE"/>
    <description>
    The add_probe function in modutils/modprobe.c in BusyBox before 1.23.0 allows local users to bypass intended restrictions on loading kernel modules via a / (slash) character in a module name, as demonstrated by an "ifconfig /usbserial up" command or a "mount -t /snd_pcm none /" command.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110559" comment="busybox-1.22.1-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110558" comment="busybox-static-1.22.1-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9652</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9652" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9652" source="CVE"/>
    <description>
    The mconvert function in softmagic.c in file before 5.21, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not properly handle a certain string-length field during a copy of a truncated version of a Pascal string, which might allow remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107161" comment="apache2-mod_php5-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107162" comment="php5-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107163" comment="php5-bcmath-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107164" comment="php5-bz2-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107165" comment="php5-calendar-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107166" comment="php5-ctype-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107167" comment="php5-curl-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107168" comment="php5-dba-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107169" comment="php5-devel-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107170" comment="php5-dom-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107171" comment="php5-enchant-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107172" comment="php5-exif-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107173" comment="php5-fastcgi-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107174" comment="php5-fileinfo-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107175" comment="php5-firebird-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107176" comment="php5-fpm-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107177" comment="php5-ftp-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107178" comment="php5-gd-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107179" comment="php5-gettext-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107180" comment="php5-gmp-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107181" comment="php5-iconv-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107182" comment="php5-imap-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107183" comment="php5-intl-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107184" comment="php5-json-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107185" comment="php5-ldap-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107186" comment="php5-mbstring-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107187" comment="php5-mcrypt-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107188" comment="php5-mssql-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107189" comment="php5-mysql-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107190" comment="php5-odbc-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107191" comment="php5-opcache-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107192" comment="php5-openssl-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107193" comment="php5-pcntl-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107194" comment="php5-pdo-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107195" comment="php5-pear-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107196" comment="php5-pgsql-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107197" comment="php5-phar-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107198" comment="php5-posix-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107199" comment="php5-pspell-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107200" comment="php5-readline-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107201" comment="php5-shmop-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107202" comment="php5-snmp-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107203" comment="php5-soap-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107204" comment="php5-sockets-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107205" comment="php5-sqlite-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107206" comment="php5-suhosin-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107207" comment="php5-sysvmsg-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107208" comment="php5-sysvsem-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107209" comment="php5-sysvshm-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107210" comment="php5-tidy-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107211" comment="php5-tokenizer-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107212" comment="php5-wddx-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107213" comment="php5-xmlreader-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107214" comment="php5-xmlrpc-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107215" comment="php5-xmlwriter-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107216" comment="php5-xsl-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107217" comment="php5-zip-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107218" comment="php5-zlib-5.6.1-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9655</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9655" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9655" source="CVE"/>
    <description>
    The (1) putcontig8bitYCbCr21tile function in tif_getimage.c or (2) NeXTDecode function in tif_next.c in LibTIFF allows remote attackers to cause a denial of service (uninitialized memory access) via a crafted TIFF image, as demonstrated by libtiff-cvs-1.tif and libtiff-cvs-2.tif.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111098" comment="libtiff-devel-4.0.4-10.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111097" comment="libtiff-devel-32bit-4.0.4-10.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111100" comment="libtiff5-4.0.4-10.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111099" comment="libtiff5-32bit-4.0.4-10.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111101" comment="tiff-4.0.4-10.10.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9656</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9656" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9656" source="CVE"/>
    <description>
    The tt_sbit_decoder_load_image function in sfnt/ttsbit.c in FreeType before 2.5.4 does not properly check for an integer overflow, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted OpenType font.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108189" comment="freetype2-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108190" comment="freetype2-devel-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108191" comment="freetype2-devel-32bit-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108194" comment="ft2demos-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108192" comment="libfreetype6-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108193" comment="libfreetype6-32bit-2.5.3-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9657</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9657" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9657" source="CVE"/>
    <description>
    The tt_face_load_hdmx function in truetype/ttpload.c in FreeType before 2.5.4 does not establish a minimum record size, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted TrueType font.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108189" comment="freetype2-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108190" comment="freetype2-devel-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108191" comment="freetype2-devel-32bit-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108194" comment="ft2demos-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108192" comment="libfreetype6-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108193" comment="libfreetype6-32bit-2.5.3-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9658</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9658" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9658" source="CVE"/>
    <description>
    The tt_face_load_kern function in sfnt/ttkern.c in FreeType before 2.5.4 enforces an incorrect minimum table length, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted TrueType font.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108189" comment="freetype2-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108190" comment="freetype2-devel-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108191" comment="freetype2-devel-32bit-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108194" comment="ft2demos-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108192" comment="libfreetype6-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108193" comment="libfreetype6-32bit-2.5.3-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9659</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9659" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9659" source="CVE"/>
    <description>
    cff/cf2intrp.c in the CFF CharString interpreter in FreeType before 2.5.4 proceeds with additional hints after the hint mask has been computed, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted OpenType font.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2240.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108189" comment="freetype2-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108190" comment="freetype2-devel-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108191" comment="freetype2-devel-32bit-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108194" comment="ft2demos-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108192" comment="libfreetype6-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108193" comment="libfreetype6-32bit-2.5.3-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9660</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9660" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9660" source="CVE"/>
    <description>
    The _bdf_parse_glyphs function in bdf/bdflib.c in FreeType before 2.5.4 does not properly handle a missing ENDCHAR record, which allows remote attackers to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted BDF font.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108189" comment="freetype2-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108190" comment="freetype2-devel-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108191" comment="freetype2-devel-32bit-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108194" comment="ft2demos-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108192" comment="libfreetype6-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108193" comment="libfreetype6-32bit-2.5.3-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9661</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9661" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9661" source="CVE"/>
    <description>
    type42/t42parse.c in FreeType before 2.5.4 does not consider that scanning can be incomplete without triggering an error, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted Type42 font.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108189" comment="freetype2-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108190" comment="freetype2-devel-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108191" comment="freetype2-devel-32bit-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108194" comment="ft2demos-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108192" comment="libfreetype6-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108193" comment="libfreetype6-32bit-2.5.3-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9662</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9662" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9662" source="CVE"/>
    <description>
    cff/cf2ft.c in FreeType before 2.5.4 does not validate the return values of point-allocation functions, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted OTF font.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108189" comment="freetype2-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108190" comment="freetype2-devel-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108191" comment="freetype2-devel-32bit-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108194" comment="ft2demos-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108192" comment="libfreetype6-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108193" comment="libfreetype6-32bit-2.5.3-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9663</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9663" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9663" source="CVE"/>
    <description>
    The tt_cmap4_validate function in sfnt/ttcmap.c in FreeType before 2.5.4 validates a certain length field before that field's value is completely calculated, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted cmap SFNT table.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108189" comment="freetype2-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108190" comment="freetype2-devel-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108191" comment="freetype2-devel-32bit-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108194" comment="ft2demos-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108192" comment="libfreetype6-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108193" comment="libfreetype6-32bit-2.5.3-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9664</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9664" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9664" source="CVE"/>
    <description>
    FreeType before 2.5.4 does not check for the end of the data during certain parsing actions, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted Type42 font, related to type42/t42parse.c and type1/t1load.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108189" comment="freetype2-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108190" comment="freetype2-devel-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108191" comment="freetype2-devel-32bit-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108194" comment="ft2demos-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108192" comment="libfreetype6-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108193" comment="libfreetype6-32bit-2.5.3-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9665</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9665" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9665" source="CVE"/>
    <description>
    The Load_SBit_Png function in sfnt/pngshim.c in FreeType before 2.5.4 does not restrict the rows and pitch values of PNG data, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact by embedding a PNG file in a .ttf font file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108189" comment="freetype2-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108190" comment="freetype2-devel-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108191" comment="freetype2-devel-32bit-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108194" comment="ft2demos-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108192" comment="libfreetype6-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108193" comment="libfreetype6-32bit-2.5.3-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9666</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9666" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9666" source="CVE"/>
    <description>
    The tt_sbit_decoder_init function in sfnt/ttsbit.c in FreeType before 2.5.4 proceeds with a count-to-size association without restricting the count value, which allows remote attackers to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted embedded bitmap.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108189" comment="freetype2-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108190" comment="freetype2-devel-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108191" comment="freetype2-devel-32bit-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108194" comment="ft2demos-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108192" comment="libfreetype6-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108193" comment="libfreetype6-32bit-2.5.3-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9667</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9667" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9667" source="CVE"/>
    <description>
    sfnt/ttload.c in FreeType before 2.5.4 proceeds with offset+length calculations without restricting the values, which allows remote attackers to cause a denial of service (integer overflow and out-of-bounds read) or possibly have unspecified other impact via a crafted SFNT table.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108189" comment="freetype2-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108190" comment="freetype2-devel-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108191" comment="freetype2-devel-32bit-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108194" comment="ft2demos-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108192" comment="libfreetype6-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108193" comment="libfreetype6-32bit-2.5.3-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9668</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9668" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9668" source="CVE"/>
    <description>
    The woff_open_font function in sfnt/sfobjs.c in FreeType before 2.5.4 proceeds with offset+length calculations without restricting length values, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact via a crafted Web Open Font Format (WOFF) file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108189" comment="freetype2-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108190" comment="freetype2-devel-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108191" comment="freetype2-devel-32bit-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108194" comment="ft2demos-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108192" comment="libfreetype6-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108193" comment="libfreetype6-32bit-2.5.3-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9669</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9669" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9669" source="CVE"/>
    <description>
    Multiple integer overflows in sfnt/ttcmap.c in FreeType before 2.5.4 allow remote attackers to cause a denial of service (out-of-bounds read or memory corruption) or possibly have unspecified other impact via a crafted cmap SFNT table.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108189" comment="freetype2-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108190" comment="freetype2-devel-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108191" comment="freetype2-devel-32bit-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108194" comment="ft2demos-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108192" comment="libfreetype6-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108193" comment="libfreetype6-32bit-2.5.3-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9670</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9670" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9670" source="CVE"/>
    <description>
    Multiple integer signedness errors in the pcf_get_encodings function in pcf/pcfread.c in FreeType before 2.5.4 allow remote attackers to cause a denial of service (integer overflow, NULL pointer dereference, and application crash) via a crafted PCF file that specifies negative values for the first column and first row.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108189" comment="freetype2-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108190" comment="freetype2-devel-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108191" comment="freetype2-devel-32bit-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108194" comment="ft2demos-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108192" comment="libfreetype6-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108193" comment="libfreetype6-32bit-2.5.3-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9671</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9671" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9671" source="CVE"/>
    <description>
    Off-by-one error in the pcf_get_properties function in pcf/pcfread.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted PCF file with a 0xffffffff size value that is improperly incremented.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108189" comment="freetype2-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108190" comment="freetype2-devel-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108191" comment="freetype2-devel-32bit-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108194" comment="ft2demos-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108192" comment="libfreetype6-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108193" comment="libfreetype6-32bit-2.5.3-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9672</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9672" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9672" source="CVE"/>
    <description>
    Array index error in the parse_fond function in base/ftmac.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (out-of-bounds read) or obtain sensitive information from process memory via a crafted FOND resource in a Mac font file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108189" comment="freetype2-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108190" comment="freetype2-devel-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108191" comment="freetype2-devel-32bit-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108194" comment="ft2demos-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108192" comment="libfreetype6-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108193" comment="libfreetype6-32bit-2.5.3-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9673</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9673" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9673" source="CVE"/>
    <description>
    Integer signedness error in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.5.4 allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted Mac font.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108189" comment="freetype2-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108190" comment="freetype2-devel-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108191" comment="freetype2-devel-32bit-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108194" comment="ft2demos-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108192" comment="libfreetype6-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108193" comment="libfreetype6-32bit-2.5.3-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9674</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9674" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9674" source="CVE"/>
    <description>
    The Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.5.4 proceeds with adding to length values without validating the original values, which allows remote attackers to cause a denial of service (integer overflow and heap-based buffer overflow) or possibly have unspecified other impact via a crafted Mac font.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108189" comment="freetype2-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108190" comment="freetype2-devel-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108191" comment="freetype2-devel-32bit-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108194" comment="ft2demos-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108192" comment="libfreetype6-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108193" comment="libfreetype6-32bit-2.5.3-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9675</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9675" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9675" source="CVE"/>
    <description>
    bdf/bdflib.c in FreeType before 2.5.4 identifies property names by only verifying that an initial substring is present, which allows remote attackers to discover heap pointer values and bypass the ASLR protection mechanism via a crafted BDF font.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108189" comment="freetype2-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108190" comment="freetype2-devel-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108191" comment="freetype2-devel-32bit-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108194" comment="ft2demos-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108192" comment="libfreetype6-2.5.3-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108193" comment="libfreetype6-32bit-2.5.3-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9679</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9679" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9679" source="CVE"/>
    <description>
    Integer underflow in the cupsRasterReadPixels function in filter/raster.c in CUPS before 2.0.2 allows remote attackers to have unspecified impact via a malformed compressed raster file, which triggers a buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009106843" comment="cups-1.5.4-21.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106844" comment="cups-client-1.5.4-21.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106845" comment="cups-ddk-1.5.4-21.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106846" comment="cups-devel-1.5.4-21.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106847" comment="cups-libs-1.5.4-21.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106848" comment="cups-libs-32bit-1.5.4-21.6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9680</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9680" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9680" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115491" comment="sudo-1.8.10p3-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115492" comment="sudo-devel-1.8.10p3-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115493" comment="sudo-test-1.8.10p3-2.7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9683</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9683" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9683" source="CVE"/>
    <description>
    Off-by-one error in the ecryptfs_decode_from_filename function in fs/ecryptfs/crypto.c in the eCryptfs subsystem in the Linux kernel before 3.18.2 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted filename.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108989" comment="bbswitch-0.8-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108990" comment="bbswitch-kmp-default-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108991" comment="bbswitch-kmp-desktop-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108992" comment="bbswitch-kmp-pae-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108993" comment="bbswitch-kmp-xen-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108994" comment="cloop-2.639-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108995" comment="cloop-kmp-default-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108996" comment="cloop-kmp-desktop-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108997" comment="cloop-kmp-pae-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108998" comment="cloop-kmp-xen-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108999" comment="crash-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109000" comment="crash-devel-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109001" comment="crash-doc-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109002" comment="crash-eppic-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109003" comment="crash-gcore-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109004" comment="crash-kmp-default-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109005" comment="crash-kmp-desktop-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109006" comment="crash-kmp-pae-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109007" comment="crash-kmp-xen-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109008" comment="hdjmod-1.28-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109009" comment="hdjmod-kmp-default-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109010" comment="hdjmod-kmp-desktop-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109011" comment="hdjmod-kmp-pae-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109012" comment="hdjmod-kmp-xen-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109013" comment="ipset-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109014" comment="ipset-devel-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109015" comment="ipset-kmp-default-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109016" comment="ipset-kmp-desktop-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109017" comment="ipset-kmp-pae-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109018" comment="ipset-kmp-xen-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109020" comment="kernel-debug-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109021" comment="kernel-debug-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109022" comment="kernel-debug-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109023" comment="kernel-default-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109024" comment="kernel-default-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109025" comment="kernel-default-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109026" comment="kernel-desktop-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109027" comment="kernel-desktop-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109028" comment="kernel-desktop-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109039" comment="kernel-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109029" comment="kernel-docs-3.16.7-21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109030" comment="kernel-ec2-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109031" comment="kernel-ec2-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109032" comment="kernel-ec2-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109040" comment="kernel-macros-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109033" comment="kernel-obs-build-3.16.7-21.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109035" comment="kernel-obs-qa-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109034" comment="kernel-obs-qa-xen-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109036" comment="kernel-pae-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109037" comment="kernel-pae-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109038" comment="kernel-pae-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109041" comment="kernel-source-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109042" comment="kernel-source-vanilla-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109043" comment="kernel-syms-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109044" comment="kernel-vanilla-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109045" comment="kernel-vanilla-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109046" comment="kernel-xen-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109047" comment="kernel-xen-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109048" comment="kernel-xen-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109019" comment="libipset3-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109049" comment="pcfclock-0.44-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109050" comment="pcfclock-kmp-default-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109051" comment="pcfclock-kmp-desktop-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109052" comment="pcfclock-kmp-pae-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109058" comment="python-virtualbox-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109053" comment="vhba-kmp-20140629-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109054" comment="vhba-kmp-default-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109055" comment="vhba-kmp-desktop-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109056" comment="vhba-kmp-pae-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109057" comment="vhba-kmp-xen-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109059" comment="virtualbox-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109060" comment="virtualbox-devel-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109061" comment="virtualbox-guest-desktop-icons-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109062" comment="virtualbox-guest-kmp-default-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109063" comment="virtualbox-guest-kmp-desktop-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109064" comment="virtualbox-guest-kmp-pae-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109065" comment="virtualbox-guest-tools-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109066" comment="virtualbox-guest-x11-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109067" comment="virtualbox-host-kmp-default-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109068" comment="virtualbox-host-kmp-desktop-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109069" comment="virtualbox-host-kmp-pae-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109070" comment="virtualbox-qt-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109071" comment="virtualbox-websrv-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109072" comment="xen-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109073" comment="xen-devel-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109082" comment="xen-doc-html-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109083" comment="xen-kmp-default-4.4.1_08_k3.16.7_21-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109084" comment="xen-kmp-desktop-4.4.1_08_k3.16.7_21-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109075" comment="xen-libs-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109074" comment="xen-libs-32bit-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109085" comment="xen-tools-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109076" comment="xen-tools-domU-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109077" comment="xtables-addons-2.6-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109078" comment="xtables-addons-kmp-default-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109079" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109080" comment="xtables-addons-kmp-pae-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109081" comment="xtables-addons-kmp-xen-2.6_k3.16.7_21-9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9705</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9705" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9705" source="CVE"/>
    <description>
    Heap-based buffer overflow in the enchant_broker_request_dict function in ext/enchant/enchant.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 allows remote attackers to execute arbitrary code via vectors that trigger creation of multiple dictionaries.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108278" comment="apache2-mod_php5-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108279" comment="php5-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108280" comment="php5-bcmath-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108281" comment="php5-bz2-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108282" comment="php5-calendar-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108283" comment="php5-ctype-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108284" comment="php5-curl-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108285" comment="php5-dba-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108286" comment="php5-devel-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108287" comment="php5-dom-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108288" comment="php5-enchant-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108289" comment="php5-exif-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108290" comment="php5-fastcgi-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108291" comment="php5-fileinfo-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108292" comment="php5-firebird-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108293" comment="php5-fpm-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108294" comment="php5-ftp-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108295" comment="php5-gd-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108296" comment="php5-gettext-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108297" comment="php5-gmp-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108298" comment="php5-iconv-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108299" comment="php5-imap-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108300" comment="php5-intl-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108301" comment="php5-json-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108302" comment="php5-ldap-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108303" comment="php5-mbstring-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108304" comment="php5-mcrypt-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108305" comment="php5-mssql-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108306" comment="php5-mysql-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108307" comment="php5-odbc-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108308" comment="php5-opcache-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108309" comment="php5-openssl-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108310" comment="php5-pcntl-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108311" comment="php5-pdo-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108312" comment="php5-pear-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108313" comment="php5-pgsql-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108314" comment="php5-phar-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108315" comment="php5-posix-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108316" comment="php5-pspell-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108317" comment="php5-readline-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108318" comment="php5-shmop-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108319" comment="php5-snmp-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108320" comment="php5-soap-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108321" comment="php5-sockets-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108322" comment="php5-sqlite-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108323" comment="php5-suhosin-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108324" comment="php5-sysvmsg-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108325" comment="php5-sysvsem-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108326" comment="php5-sysvshm-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108327" comment="php5-tidy-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108328" comment="php5-tokenizer-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108329" comment="php5-wddx-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108330" comment="php5-xmlreader-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108331" comment="php5-xmlrpc-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108332" comment="php5-xmlwriter-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108333" comment="php5-xsl-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108334" comment="php5-zip-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108335" comment="php5-zlib-5.6.1-15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9709</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9709" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9709" source="CVE"/>
    <description>
    The GetCode_ function in gd_gif_in.c in GD 2.1.1 and earlier, as used in PHP before 5.5.21 and 5.6.x before 5.6.5, allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted GIF image that is improperly handled by the gdImageCreateFromGif function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108278" comment="apache2-mod_php5-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108209" comment="gd-2.1.0-7.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108207" comment="gd-32bit-2.0.36.RC1-78.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108210" comment="gd-devel-2.1.0-7.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108211" comment="libgd3-2.1.0-7.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108212" comment="libgd3-32bit-2.1.0-7.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108279" comment="php5-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108280" comment="php5-bcmath-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108281" comment="php5-bz2-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108282" comment="php5-calendar-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108283" comment="php5-ctype-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108284" comment="php5-curl-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108285" comment="php5-dba-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108286" comment="php5-devel-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108287" comment="php5-dom-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108288" comment="php5-enchant-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108289" comment="php5-exif-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108290" comment="php5-fastcgi-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108291" comment="php5-fileinfo-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108292" comment="php5-firebird-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108293" comment="php5-fpm-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108294" comment="php5-ftp-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108295" comment="php5-gd-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108296" comment="php5-gettext-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108297" comment="php5-gmp-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108298" comment="php5-iconv-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108299" comment="php5-imap-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108300" comment="php5-intl-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108301" comment="php5-json-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108302" comment="php5-ldap-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108303" comment="php5-mbstring-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108304" comment="php5-mcrypt-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108305" comment="php5-mssql-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108306" comment="php5-mysql-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108307" comment="php5-odbc-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108308" comment="php5-opcache-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108309" comment="php5-openssl-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108310" comment="php5-pcntl-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108311" comment="php5-pdo-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108312" comment="php5-pear-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108313" comment="php5-pgsql-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108314" comment="php5-phar-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108315" comment="php5-posix-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108316" comment="php5-pspell-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108317" comment="php5-readline-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108318" comment="php5-shmop-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108319" comment="php5-snmp-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108320" comment="php5-soap-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108321" comment="php5-sockets-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108322" comment="php5-sqlite-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108323" comment="php5-suhosin-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108324" comment="php5-sysvmsg-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108325" comment="php5-sysvsem-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108326" comment="php5-sysvshm-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108327" comment="php5-tidy-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108328" comment="php5-tokenizer-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108329" comment="php5-wddx-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108330" comment="php5-xmlreader-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108331" comment="php5-xmlrpc-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108332" comment="php5-xmlwriter-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108333" comment="php5-xsl-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108334" comment="php5-zip-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108335" comment="php5-zlib-5.6.1-15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9718</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9718" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9718" source="CVE"/>
    <description>
    The (1) BMDMA and (2) AHCI HBA interfaces in the IDE functionality in QEMU 1.0 through 2.1.3 have multiple interpretations of a function's return value, which allows guest OS users to cause a host OS denial of service (memory consumption or infinite loop, and system crash) via a PRDT with zero complete sectors, related to the bmdma_prepare_buf and ahci_dma_prepare_buf functions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126020" comment="xen-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126021" comment="xen-devel-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126022" comment="xen-doc-html-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126023" comment="xen-kmp-default-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126024" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126025" comment="xen-libs-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126026" comment="xen-libs-32bit-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126027" comment="xen-tools-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126028" comment="xen-tools-domU-4.4.4_02-43.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9721</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9721" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9721" source="CVE"/>
    <description>
    libzmq before 4.0.6 and 4.1.x before 4.1.1 allows remote attackers to conduct downgrade attacks and bypass ZMTP v3 protocol security mechanisms via a ZMTP v2 or earlier header.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110267" comment="libzmq4-4.0.5-3.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110268" comment="zeromq-4.0.5-3.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110269" comment="zeromq-devel-4.0.5-3.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110270" comment="zeromq-tools-4.0.5-3.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9728</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9728" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9728" source="CVE"/>
    <description>
    The UDF filesystem implementation in the Linux kernel before 3.18.2 does not validate certain lengths, which allows local users to cause a denial of service (buffer over-read and system crash) via a crafted filesystem image, related to fs/udf/inode.c and fs/udf/symlink.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113567" comment="bbswitch-0.8-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113568" comment="bbswitch-kmp-default-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113569" comment="bbswitch-kmp-desktop-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113570" comment="bbswitch-kmp-pae-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113571" comment="bbswitch-kmp-xen-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113572" comment="cloop-2.639-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113573" comment="cloop-kmp-default-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113574" comment="cloop-kmp-desktop-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113575" comment="cloop-kmp-pae-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113576" comment="cloop-kmp-xen-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113577" comment="crash-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113578" comment="crash-devel-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113579" comment="crash-doc-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113580" comment="crash-eppic-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113581" comment="crash-gcore-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113582" comment="crash-kmp-default-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113583" comment="crash-kmp-desktop-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113584" comment="crash-kmp-pae-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113585" comment="crash-kmp-xen-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113586" comment="hdjmod-1.28-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113587" comment="hdjmod-kmp-default-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113588" comment="hdjmod-kmp-desktop-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113589" comment="hdjmod-kmp-pae-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113590" comment="hdjmod-kmp-xen-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113591" comment="ipset-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113592" comment="ipset-devel-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113593" comment="ipset-kmp-default-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113594" comment="ipset-kmp-desktop-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113595" comment="ipset-kmp-pae-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113596" comment="ipset-kmp-xen-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113598" comment="kernel-debug-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113599" comment="kernel-debug-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113600" comment="kernel-debug-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113601" comment="kernel-default-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113602" comment="kernel-default-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113603" comment="kernel-default-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113604" comment="kernel-desktop-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113605" comment="kernel-desktop-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113606" comment="kernel-desktop-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113617" comment="kernel-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113607" comment="kernel-docs-3.16.7-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113608" comment="kernel-ec2-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113609" comment="kernel-ec2-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113610" comment="kernel-ec2-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113618" comment="kernel-macros-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113611" comment="kernel-obs-build-3.16.7-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113613" comment="kernel-obs-qa-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113612" comment="kernel-obs-qa-xen-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113614" comment="kernel-pae-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113615" comment="kernel-pae-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113616" comment="kernel-pae-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113619" comment="kernel-source-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113620" comment="kernel-source-vanilla-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113621" comment="kernel-syms-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113622" comment="kernel-vanilla-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113623" comment="kernel-vanilla-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113624" comment="kernel-xen-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113625" comment="kernel-xen-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113626" comment="kernel-xen-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113597" comment="libipset3-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113627" comment="pcfclock-0.44-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113628" comment="pcfclock-kmp-default-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113629" comment="pcfclock-kmp-desktop-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113630" comment="pcfclock-kmp-pae-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113631" comment="vhba-kmp-20140629-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113632" comment="vhba-kmp-default-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113633" comment="vhba-kmp-desktop-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113634" comment="vhba-kmp-pae-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113635" comment="vhba-kmp-xen-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113636" comment="xen-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113637" comment="xen-devel-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113646" comment="xen-doc-html-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113647" comment="xen-kmp-default-4.4.2_06_k3.16.7_24-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113648" comment="xen-kmp-desktop-4.4.2_06_k3.16.7_24-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113639" comment="xen-libs-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113638" comment="xen-libs-32bit-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113649" comment="xen-tools-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113640" comment="xen-tools-domU-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113641" comment="xtables-addons-2.6-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113642" comment="xtables-addons-kmp-default-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113643" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113644" comment="xtables-addons-kmp-pae-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113645" comment="xtables-addons-kmp-xen-2.6_k3.16.7_24-11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9729</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9729" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9729" source="CVE"/>
    <description>
    The udf_read_inode function in fs/udf/inode.c in the Linux kernel before 3.18.2 does not ensure a certain data-structure size consistency, which allows local users to cause a denial of service (system crash) via a crafted UDF filesystem image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113567" comment="bbswitch-0.8-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113568" comment="bbswitch-kmp-default-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113569" comment="bbswitch-kmp-desktop-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113570" comment="bbswitch-kmp-pae-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113571" comment="bbswitch-kmp-xen-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113572" comment="cloop-2.639-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113573" comment="cloop-kmp-default-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113574" comment="cloop-kmp-desktop-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113575" comment="cloop-kmp-pae-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113576" comment="cloop-kmp-xen-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113577" comment="crash-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113578" comment="crash-devel-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113579" comment="crash-doc-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113580" comment="crash-eppic-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113581" comment="crash-gcore-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113582" comment="crash-kmp-default-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113583" comment="crash-kmp-desktop-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113584" comment="crash-kmp-pae-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113585" comment="crash-kmp-xen-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113586" comment="hdjmod-1.28-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113587" comment="hdjmod-kmp-default-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113588" comment="hdjmod-kmp-desktop-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113589" comment="hdjmod-kmp-pae-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113590" comment="hdjmod-kmp-xen-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113591" comment="ipset-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113592" comment="ipset-devel-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113593" comment="ipset-kmp-default-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113594" comment="ipset-kmp-desktop-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113595" comment="ipset-kmp-pae-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113596" comment="ipset-kmp-xen-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113598" comment="kernel-debug-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113599" comment="kernel-debug-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113600" comment="kernel-debug-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113601" comment="kernel-default-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113602" comment="kernel-default-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113603" comment="kernel-default-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113604" comment="kernel-desktop-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113605" comment="kernel-desktop-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113606" comment="kernel-desktop-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113617" comment="kernel-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113607" comment="kernel-docs-3.16.7-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113608" comment="kernel-ec2-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113609" comment="kernel-ec2-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113610" comment="kernel-ec2-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113618" comment="kernel-macros-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113611" comment="kernel-obs-build-3.16.7-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113613" comment="kernel-obs-qa-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113612" comment="kernel-obs-qa-xen-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113614" comment="kernel-pae-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113615" comment="kernel-pae-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113616" comment="kernel-pae-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113619" comment="kernel-source-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113620" comment="kernel-source-vanilla-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113621" comment="kernel-syms-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113622" comment="kernel-vanilla-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113623" comment="kernel-vanilla-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113624" comment="kernel-xen-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113625" comment="kernel-xen-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113626" comment="kernel-xen-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113597" comment="libipset3-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113627" comment="pcfclock-0.44-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113628" comment="pcfclock-kmp-default-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113629" comment="pcfclock-kmp-desktop-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113630" comment="pcfclock-kmp-pae-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113631" comment="vhba-kmp-20140629-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113632" comment="vhba-kmp-default-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113633" comment="vhba-kmp-desktop-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113634" comment="vhba-kmp-pae-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113635" comment="vhba-kmp-xen-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113636" comment="xen-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113637" comment="xen-devel-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113646" comment="xen-doc-html-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113647" comment="xen-kmp-default-4.4.2_06_k3.16.7_24-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113648" comment="xen-kmp-desktop-4.4.2_06_k3.16.7_24-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113639" comment="xen-libs-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113638" comment="xen-libs-32bit-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113649" comment="xen-tools-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113640" comment="xen-tools-domU-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113641" comment="xtables-addons-2.6-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113642" comment="xtables-addons-kmp-default-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113643" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113644" comment="xtables-addons-kmp-pae-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113645" comment="xtables-addons-kmp-xen-2.6_k3.16.7_24-11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9730</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9730" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9730" source="CVE"/>
    <description>
    The udf_pc_to_char function in fs/udf/symlink.c in the Linux kernel before 3.18.2 relies on component lengths that are unused, which allows local users to cause a denial of service (system crash) via a crafted UDF filesystem image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113567" comment="bbswitch-0.8-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113568" comment="bbswitch-kmp-default-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113569" comment="bbswitch-kmp-desktop-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113570" comment="bbswitch-kmp-pae-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113571" comment="bbswitch-kmp-xen-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113572" comment="cloop-2.639-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113573" comment="cloop-kmp-default-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113574" comment="cloop-kmp-desktop-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113575" comment="cloop-kmp-pae-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113576" comment="cloop-kmp-xen-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113577" comment="crash-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113578" comment="crash-devel-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113579" comment="crash-doc-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113580" comment="crash-eppic-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113581" comment="crash-gcore-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113582" comment="crash-kmp-default-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113583" comment="crash-kmp-desktop-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113584" comment="crash-kmp-pae-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113585" comment="crash-kmp-xen-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113586" comment="hdjmod-1.28-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113587" comment="hdjmod-kmp-default-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113588" comment="hdjmod-kmp-desktop-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113589" comment="hdjmod-kmp-pae-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113590" comment="hdjmod-kmp-xen-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113591" comment="ipset-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113592" comment="ipset-devel-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113593" comment="ipset-kmp-default-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113594" comment="ipset-kmp-desktop-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113595" comment="ipset-kmp-pae-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113596" comment="ipset-kmp-xen-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113598" comment="kernel-debug-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113599" comment="kernel-debug-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113600" comment="kernel-debug-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113601" comment="kernel-default-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113602" comment="kernel-default-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113603" comment="kernel-default-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113604" comment="kernel-desktop-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113605" comment="kernel-desktop-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113606" comment="kernel-desktop-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113617" comment="kernel-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113607" comment="kernel-docs-3.16.7-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113608" comment="kernel-ec2-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113609" comment="kernel-ec2-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113610" comment="kernel-ec2-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113618" comment="kernel-macros-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113611" comment="kernel-obs-build-3.16.7-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113613" comment="kernel-obs-qa-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113612" comment="kernel-obs-qa-xen-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113614" comment="kernel-pae-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113615" comment="kernel-pae-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113616" comment="kernel-pae-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113619" comment="kernel-source-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113620" comment="kernel-source-vanilla-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113621" comment="kernel-syms-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113622" comment="kernel-vanilla-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113623" comment="kernel-vanilla-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113624" comment="kernel-xen-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113625" comment="kernel-xen-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113626" comment="kernel-xen-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113597" comment="libipset3-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113627" comment="pcfclock-0.44-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113628" comment="pcfclock-kmp-default-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113629" comment="pcfclock-kmp-desktop-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113630" comment="pcfclock-kmp-pae-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113631" comment="vhba-kmp-20140629-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113632" comment="vhba-kmp-default-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113633" comment="vhba-kmp-desktop-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113634" comment="vhba-kmp-pae-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113635" comment="vhba-kmp-xen-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113636" comment="xen-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113637" comment="xen-devel-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113646" comment="xen-doc-html-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113647" comment="xen-kmp-default-4.4.2_06_k3.16.7_24-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113648" comment="xen-kmp-desktop-4.4.2_06_k3.16.7_24-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113639" comment="xen-libs-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113638" comment="xen-libs-32bit-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113649" comment="xen-tools-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113640" comment="xen-tools-domU-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113641" comment="xtables-addons-2.6-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113642" comment="xtables-addons-kmp-default-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113643" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113644" comment="xtables-addons-kmp-pae-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113645" comment="xtables-addons-kmp-xen-2.6_k3.16.7_24-11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9731</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9731" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9731" source="CVE"/>
    <description>
    The UDF filesystem implementation in the Linux kernel before 3.18.2 does not ensure that space is available for storing a symlink target's name along with a trailing \0 character, which allows local users to obtain sensitive information via a crafted filesystem image, related to fs/udf/symlink.c and fs/udf/unicode.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113567" comment="bbswitch-0.8-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113568" comment="bbswitch-kmp-default-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113569" comment="bbswitch-kmp-desktop-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113570" comment="bbswitch-kmp-pae-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113571" comment="bbswitch-kmp-xen-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113572" comment="cloop-2.639-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113573" comment="cloop-kmp-default-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113574" comment="cloop-kmp-desktop-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113575" comment="cloop-kmp-pae-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113576" comment="cloop-kmp-xen-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113577" comment="crash-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113578" comment="crash-devel-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113579" comment="crash-doc-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113580" comment="crash-eppic-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113581" comment="crash-gcore-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113582" comment="crash-kmp-default-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113583" comment="crash-kmp-desktop-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113584" comment="crash-kmp-pae-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113585" comment="crash-kmp-xen-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113586" comment="hdjmod-1.28-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113587" comment="hdjmod-kmp-default-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113588" comment="hdjmod-kmp-desktop-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113589" comment="hdjmod-kmp-pae-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113590" comment="hdjmod-kmp-xen-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113591" comment="ipset-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113592" comment="ipset-devel-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113593" comment="ipset-kmp-default-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113594" comment="ipset-kmp-desktop-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113595" comment="ipset-kmp-pae-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113596" comment="ipset-kmp-xen-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113598" comment="kernel-debug-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113599" comment="kernel-debug-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113600" comment="kernel-debug-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113601" comment="kernel-default-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113602" comment="kernel-default-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113603" comment="kernel-default-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113604" comment="kernel-desktop-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113605" comment="kernel-desktop-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113606" comment="kernel-desktop-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113617" comment="kernel-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113607" comment="kernel-docs-3.16.7-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113608" comment="kernel-ec2-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113609" comment="kernel-ec2-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113610" comment="kernel-ec2-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113618" comment="kernel-macros-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113611" comment="kernel-obs-build-3.16.7-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113613" comment="kernel-obs-qa-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113612" comment="kernel-obs-qa-xen-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113614" comment="kernel-pae-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113615" comment="kernel-pae-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113616" comment="kernel-pae-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113619" comment="kernel-source-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113620" comment="kernel-source-vanilla-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113621" comment="kernel-syms-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113622" comment="kernel-vanilla-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113623" comment="kernel-vanilla-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113624" comment="kernel-xen-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113625" comment="kernel-xen-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113626" comment="kernel-xen-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113597" comment="libipset3-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113627" comment="pcfclock-0.44-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113628" comment="pcfclock-kmp-default-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113629" comment="pcfclock-kmp-desktop-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113630" comment="pcfclock-kmp-pae-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113631" comment="vhba-kmp-20140629-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113632" comment="vhba-kmp-default-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113633" comment="vhba-kmp-desktop-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113634" comment="vhba-kmp-pae-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113635" comment="vhba-kmp-xen-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113636" comment="xen-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113637" comment="xen-devel-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113646" comment="xen-doc-html-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113647" comment="xen-kmp-default-4.4.2_06_k3.16.7_24-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113648" comment="xen-kmp-desktop-4.4.2_06_k3.16.7_24-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113639" comment="xen-libs-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113638" comment="xen-libs-32bit-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113649" comment="xen-tools-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113640" comment="xen-tools-domU-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113641" comment="xtables-addons-2.6-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113642" comment="xtables-addons-kmp-default-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113643" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113644" comment="xtables-addons-kmp-pae-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113645" comment="xtables-addons-kmp-xen-2.6_k3.16.7_24-11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9749</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9749" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9749" source="CVE"/>
    <description>
    Squid 3.4.4 through 3.4.11 and 3.5.0.1 through 3.5.1, when Digest authentication is used, allow remote authenticated users to retain access by leveraging a stale nonce, aka "Nonce replay vulnerability."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115287" comment="squid-3.4.4-3.13.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9756</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9756" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9756" source="CVE"/>
    <description>
    The psf_fwrite function in file_io.c in libsndfile allows attackers to cause a denial of service (divide-by-zero error and application crash) via unspecified vectors related to the headindex variable.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117876" comment="libsndfile-1.0.25-19.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117877" comment="libsndfile-devel-1.0.25-19.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117878" comment="libsndfile-progs-1.0.25-19.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117879" comment="libsndfile1-1.0.25-19.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117880" comment="libsndfile1-32bit-1.0.25-19.7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9761</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9761" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9761" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in the GNU C Library (aka glibc or libc6) before 2.23 allow context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long argument to the (1) nan, (2) nanf, or (3) nanl function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123373" comment="glibc-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123374" comment="glibc-32bit-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123375" comment="glibc-devel-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123376" comment="glibc-devel-32bit-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123377" comment="glibc-devel-static-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123378" comment="glibc-devel-static-32bit-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123379" comment="glibc-extra-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123380" comment="glibc-html-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123381" comment="glibc-i18ndata-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123382" comment="glibc-info-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123383" comment="glibc-locale-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123384" comment="glibc-locale-32bit-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123385" comment="glibc-obsolete-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123386" comment="glibc-profile-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123387" comment="glibc-profile-32bit-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123388" comment="glibc-testsuite-2.19-16.22.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123389" comment="glibc-utils-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123390" comment="glibc-utils-32bit-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123391" comment="nscd-2.19-16.22.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9762</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9762" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9762" source="CVE"/>
    <description>
    imlib2 before 1.4.7 allows remote attackers to cause a denial of service (segmentation fault) via a GIF image without a colormap.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127747" comment="imlib2-1.4.9-17.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127748" comment="imlib2-devel-1.4.9-17.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127749" comment="imlib2-filters-1.4.9-17.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127750" comment="imlib2-loaders-1.4.9-17.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127751" comment="libImlib2-1-1.4.9-17.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9763</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9763" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9763" source="CVE"/>
    <description>
    imlib2 before 1.4.7 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted PNM file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127747" comment="imlib2-1.4.9-17.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127748" comment="imlib2-devel-1.4.9-17.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127749" comment="imlib2-filters-1.4.9-17.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127750" comment="imlib2-loaders-1.4.9-17.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127751" comment="libImlib2-1-1.4.9-17.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9764</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9764" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9764" source="CVE"/>
    <description>
    imlib2 before 1.4.7 allows remote attackers to cause a denial of service (segmentation fault) via a crafted GIF file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127747" comment="imlib2-1.4.9-17.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127748" comment="imlib2-devel-1.4.9-17.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127749" comment="imlib2-filters-1.4.9-17.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127750" comment="imlib2-loaders-1.4.9-17.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127751" comment="libImlib2-1-1.4.9-17.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9765</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9765" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9765" source="CVE"/>
    <description>
    Buffer overflow in the main_get_appheader function in xdelta3-main.h in xdelta3 before 3.0.9 allows remote attackers to execute arbitrary code via a crafted input file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123495" comment="xdelta3-3.0.8-2.3.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9767</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9767" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9767" source="CVE"/>
    <description>
    Directory traversal vulnerability in the ZipArchive::extractTo function in ext/zip/php_zip.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 and ext/zip/ext_zip.cpp in HHVM before 3.12.1 allows remote attackers to create arbitrary empty directories via a crafted ZIP archive.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126844" comment="apache2-mod_php5-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126845" comment="php5-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126846" comment="php5-bcmath-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126847" comment="php5-bz2-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126848" comment="php5-calendar-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126849" comment="php5-ctype-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126850" comment="php5-curl-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126851" comment="php5-dba-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126852" comment="php5-devel-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126853" comment="php5-dom-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126854" comment="php5-enchant-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126855" comment="php5-exif-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126856" comment="php5-fastcgi-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126857" comment="php5-fileinfo-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126858" comment="php5-firebird-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126859" comment="php5-fpm-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126860" comment="php5-ftp-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126861" comment="php5-gd-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126862" comment="php5-gettext-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126863" comment="php5-gmp-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126864" comment="php5-iconv-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126865" comment="php5-imap-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126866" comment="php5-intl-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126867" comment="php5-json-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126868" comment="php5-ldap-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126869" comment="php5-mbstring-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126870" comment="php5-mcrypt-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126871" comment="php5-mssql-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126872" comment="php5-mysql-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126873" comment="php5-odbc-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126874" comment="php5-opcache-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126875" comment="php5-openssl-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126876" comment="php5-pcntl-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126877" comment="php5-pdo-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126878" comment="php5-pear-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126879" comment="php5-pgsql-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126880" comment="php5-phar-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126881" comment="php5-posix-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126882" comment="php5-pspell-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126883" comment="php5-readline-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126884" comment="php5-shmop-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126885" comment="php5-snmp-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126886" comment="php5-soap-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126887" comment="php5-sockets-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126888" comment="php5-sqlite-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126889" comment="php5-suhosin-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126890" comment="php5-sysvmsg-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126891" comment="php5-sysvsem-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126892" comment="php5-sysvshm-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126893" comment="php5-tidy-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126894" comment="php5-tokenizer-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126895" comment="php5-wddx-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126896" comment="php5-xmlreader-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126897" comment="php5-xmlrpc-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126898" comment="php5-xmlwriter-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126899" comment="php5-xsl-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126900" comment="php5-zip-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126901" comment="php5-zlib-5.6.1-53.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9770</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9770" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9770" source="CVE"/>
    <description>
    tmpfiles.d/systemd.conf in systemd before 214 uses weak permissions for journal files under (1) /run/log/journal/%m and (2) /var/log/journal/%m, which allows local users to obtain sensitive information by reading these files.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126496" comment="libgudev-1_0-0-210.1459453449.5237776-25.37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126497" comment="libgudev-1_0-0-32bit-210.1459453449.5237776-25.37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126498" comment="libgudev-1_0-devel-210.1459453449.5237776-25.37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126499" comment="libudev-devel-210.1459453449.5237776-25.37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126500" comment="libudev-mini-devel-210.1459453449.5237776-25.37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126501" comment="libudev-mini1-210.1459453449.5237776-25.37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126502" comment="libudev1-210.1459453449.5237776-25.37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126503" comment="libudev1-32bit-210.1459453449.5237776-25.37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126504" comment="nss-myhostname-210.1459453449.5237776-25.37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126505" comment="nss-myhostname-32bit-210.1459453449.5237776-25.37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126506" comment="systemd-210.1459453449.5237776-25.37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126507" comment="systemd-32bit-210.1459453449.5237776-25.37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126508" comment="systemd-bash-completion-210.1459453449.5237776-25.37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126509" comment="systemd-devel-210.1459453449.5237776-25.37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126510" comment="systemd-journal-gateway-210.1459453449.5237776-25.37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126511" comment="systemd-logger-210.1459453449.5237776-25.37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126512" comment="systemd-mini-210.1459453449.5237776-25.37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126513" comment="systemd-mini-devel-210.1459453449.5237776-25.37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126514" comment="systemd-mini-sysvinit-210.1459453449.5237776-25.37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126515" comment="systemd-sysvinit-210.1459453449.5237776-25.37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126516" comment="typelib-1_0-GUdev-1_0-210.1459453449.5237776-25.37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126517" comment="udev-210.1459453449.5237776-25.37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126518" comment="udev-mini-210.1459453449.5237776-25.37.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9771</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9771" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9771" source="CVE"/>
    <description>
    Integer overflow in imlib2 before 1.4.7 allows remote attackers to cause a denial of service (memory consumption or application crash) via a crafted image, which triggers an invalid read operation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127747" comment="imlib2-1.4.9-17.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127748" comment="imlib2-devel-1.4.9-17.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127749" comment="imlib2-filters-1.4.9-17.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127750" comment="imlib2-loaders-1.4.9-17.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127751" comment="libImlib2-1-1.4.9-17.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9773</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9773" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9773" source="CVE"/>
    <description>
    modules/chanserv/flags.c in Atheme before 7.2.7 allows remote attackers to modify the Anope FLAGS behavior by registering and dropping the (1) LIST, (2) CLEAR, or (3) MODIFY keyword nicks.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127695" comment="atheme-7.2.6-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127696" comment="atheme-devel-7.2.6-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127697" comment="libathemecore1-7.2.6-2.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9805</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9805" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9805" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129696" comment="GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129697" comment="GraphicsMagick-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129698" comment="libGraphicsMagick++-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129699" comment="libGraphicsMagick++-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129700" comment="libGraphicsMagick-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129701" comment="libGraphicsMagick3-config-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129702" comment="libGraphicsMagickWand-Q16-2-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129703" comment="perl-GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9806</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9806" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9806" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9807</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9807" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9807" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129696" comment="GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129697" comment="GraphicsMagick-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129698" comment="libGraphicsMagick++-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129699" comment="libGraphicsMagick++-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129700" comment="libGraphicsMagick-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129701" comment="libGraphicsMagick3-config-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129702" comment="libGraphicsMagickWand-Q16-2-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129703" comment="perl-GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9808</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9808" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9808" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129696" comment="GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129697" comment="GraphicsMagick-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129698" comment="libGraphicsMagick++-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129699" comment="libGraphicsMagick++-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129700" comment="libGraphicsMagick-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129701" comment="libGraphicsMagick3-config-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129702" comment="libGraphicsMagickWand-Q16-2-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129703" comment="perl-GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9809</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9809" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9809" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129696" comment="GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129697" comment="GraphicsMagick-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129698" comment="libGraphicsMagick++-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129699" comment="libGraphicsMagick++-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129700" comment="libGraphicsMagick-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129701" comment="libGraphicsMagick3-config-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129702" comment="libGraphicsMagickWand-Q16-2-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129703" comment="perl-GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9810</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9810" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9810" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129696" comment="GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129697" comment="GraphicsMagick-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129698" comment="libGraphicsMagick++-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129699" comment="libGraphicsMagick++-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129700" comment="libGraphicsMagick-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129701" comment="libGraphicsMagick3-config-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129702" comment="libGraphicsMagickWand-Q16-2-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129703" comment="perl-GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9811</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9811" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9811" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129696" comment="GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129697" comment="GraphicsMagick-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129698" comment="libGraphicsMagick++-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129699" comment="libGraphicsMagick++-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129700" comment="libGraphicsMagick-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129701" comment="libGraphicsMagick3-config-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129702" comment="libGraphicsMagickWand-Q16-2-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129703" comment="perl-GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9812</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9812" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9812" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9813</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9813" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9813" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129696" comment="GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129697" comment="GraphicsMagick-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129698" comment="libGraphicsMagick++-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129699" comment="libGraphicsMagick++-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129700" comment="libGraphicsMagick-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129701" comment="libGraphicsMagick3-config-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129702" comment="libGraphicsMagickWand-Q16-2-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129703" comment="perl-GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9814</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9814" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9814" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129696" comment="GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129697" comment="GraphicsMagick-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129698" comment="libGraphicsMagick++-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129699" comment="libGraphicsMagick++-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129700" comment="libGraphicsMagick-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129701" comment="libGraphicsMagick3-config-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129702" comment="libGraphicsMagickWand-Q16-2-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129703" comment="perl-GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9815</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9815" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9815" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129696" comment="GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129697" comment="GraphicsMagick-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129698" comment="libGraphicsMagick++-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129699" comment="libGraphicsMagick++-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129700" comment="libGraphicsMagick-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129701" comment="libGraphicsMagick3-config-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129702" comment="libGraphicsMagickWand-Q16-2-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129703" comment="perl-GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9816</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9816" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9816" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129696" comment="GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129697" comment="GraphicsMagick-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129698" comment="libGraphicsMagick++-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129699" comment="libGraphicsMagick++-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129700" comment="libGraphicsMagick-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129701" comment="libGraphicsMagick3-config-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129702" comment="libGraphicsMagickWand-Q16-2-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129703" comment="perl-GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9817</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9817" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9817" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129696" comment="GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129697" comment="GraphicsMagick-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129698" comment="libGraphicsMagick++-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129699" comment="libGraphicsMagick++-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129700" comment="libGraphicsMagick-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129701" comment="libGraphicsMagick3-config-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129702" comment="libGraphicsMagickWand-Q16-2-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129703" comment="perl-GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9818</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9818" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9818" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129696" comment="GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129697" comment="GraphicsMagick-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129698" comment="libGraphicsMagick++-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129699" comment="libGraphicsMagick++-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129700" comment="libGraphicsMagick-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129701" comment="libGraphicsMagick3-config-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129702" comment="libGraphicsMagickWand-Q16-2-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129703" comment="perl-GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9819</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9819" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9819" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129696" comment="GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129697" comment="GraphicsMagick-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129698" comment="libGraphicsMagick++-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129699" comment="libGraphicsMagick++-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129700" comment="libGraphicsMagick-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129701" comment="libGraphicsMagick3-config-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129702" comment="libGraphicsMagickWand-Q16-2-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129703" comment="perl-GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9820</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9820" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9820" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129696" comment="GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129697" comment="GraphicsMagick-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129698" comment="libGraphicsMagick++-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129699" comment="libGraphicsMagick++-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129700" comment="libGraphicsMagick-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129701" comment="libGraphicsMagick3-config-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129702" comment="libGraphicsMagickWand-Q16-2-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129703" comment="perl-GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9821</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9821" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9821" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9822</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9822" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9822" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9823</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9823" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9823" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9824</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9824" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9824" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9825</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9825" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9825" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9826</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9826" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9826" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9828</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9828" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9828" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129696" comment="GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129697" comment="GraphicsMagick-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129698" comment="libGraphicsMagick++-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129699" comment="libGraphicsMagick++-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129700" comment="libGraphicsMagick-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129701" comment="libGraphicsMagick3-config-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129702" comment="libGraphicsMagickWand-Q16-2-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129703" comment="perl-GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9829</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9829" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9829" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129696" comment="GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129697" comment="GraphicsMagick-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129698" comment="libGraphicsMagick++-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129699" comment="libGraphicsMagick++-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129700" comment="libGraphicsMagick-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129701" comment="libGraphicsMagick3-config-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129702" comment="libGraphicsMagickWand-Q16-2-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129703" comment="perl-GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9830</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9830" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9830" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129696" comment="GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129697" comment="GraphicsMagick-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129698" comment="libGraphicsMagick++-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129699" comment="libGraphicsMagick++-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129700" comment="libGraphicsMagick-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129701" comment="libGraphicsMagick3-config-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129702" comment="libGraphicsMagickWand-Q16-2-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129703" comment="perl-GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9831</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9831" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9831" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129696" comment="GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129697" comment="GraphicsMagick-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129698" comment="libGraphicsMagick++-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129699" comment="libGraphicsMagick++-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129700" comment="libGraphicsMagick-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129701" comment="libGraphicsMagick3-config-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129702" comment="libGraphicsMagickWand-Q16-2-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129703" comment="perl-GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9832</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9832" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9832" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9833</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9833" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9833" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9834</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9834" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9834" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129696" comment="GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129697" comment="GraphicsMagick-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129698" comment="libGraphicsMagick++-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129699" comment="libGraphicsMagick++-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129700" comment="libGraphicsMagick-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129701" comment="libGraphicsMagick3-config-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129702" comment="libGraphicsMagickWand-Q16-2-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129703" comment="perl-GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9835</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9835" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129696" comment="GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129697" comment="GraphicsMagick-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129698" comment="libGraphicsMagick++-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129699" comment="libGraphicsMagick++-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129700" comment="libGraphicsMagick-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129701" comment="libGraphicsMagick3-config-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129702" comment="libGraphicsMagickWand-Q16-2-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129703" comment="perl-GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9836</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9836" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9837</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9837" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9837" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129696" comment="GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129697" comment="GraphicsMagick-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129698" comment="libGraphicsMagick++-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129699" comment="libGraphicsMagick++-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129700" comment="libGraphicsMagick-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129701" comment="libGraphicsMagick3-config-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129702" comment="libGraphicsMagickWand-Q16-2-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129703" comment="perl-GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9838</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9838" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9838" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9839</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9839" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9839" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129696" comment="GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129697" comment="GraphicsMagick-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129698" comment="libGraphicsMagick++-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129699" comment="libGraphicsMagick++-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129700" comment="libGraphicsMagick-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129701" comment="libGraphicsMagick3-config-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129702" comment="libGraphicsMagickWand-Q16-2-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129703" comment="perl-GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9840</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9840" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9840" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129696" comment="GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129697" comment="GraphicsMagick-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129698" comment="libGraphicsMagick++-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129699" comment="libGraphicsMagick++-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129700" comment="libGraphicsMagick-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129701" comment="libGraphicsMagick3-config-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129702" comment="libGraphicsMagickWand-Q16-2-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129703" comment="perl-GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9841</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9841" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9841" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9842</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9842" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9842" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9843</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9843" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9843" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9844</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9844" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9844" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129696" comment="GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129697" comment="GraphicsMagick-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129698" comment="libGraphicsMagick++-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129699" comment="libGraphicsMagick++-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129700" comment="libGraphicsMagick-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129701" comment="libGraphicsMagick3-config-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129702" comment="libGraphicsMagickWand-Q16-2-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129703" comment="perl-GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9845</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9845" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9845" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129696" comment="GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129697" comment="GraphicsMagick-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129698" comment="libGraphicsMagick++-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129699" comment="libGraphicsMagick++-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129700" comment="libGraphicsMagick-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129701" comment="libGraphicsMagick3-config-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129702" comment="libGraphicsMagickWand-Q16-2-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129703" comment="perl-GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9846</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9846" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9846" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129696" comment="GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129697" comment="GraphicsMagick-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129698" comment="libGraphicsMagick++-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129699" comment="libGraphicsMagick++-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129700" comment="libGraphicsMagick-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129701" comment="libGraphicsMagick3-config-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129702" comment="libGraphicsMagickWand-Q16-2-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129703" comment="perl-GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9847</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9847" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9847" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129696" comment="GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129697" comment="GraphicsMagick-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129698" comment="libGraphicsMagick++-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129699" comment="libGraphicsMagick++-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129700" comment="libGraphicsMagick-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129701" comment="libGraphicsMagick3-config-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129702" comment="libGraphicsMagickWand-Q16-2-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129703" comment="perl-GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9848</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9848" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9848" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9849</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9849" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9849" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9850</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9850" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9850" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9851</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9851" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9851" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9852</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9852" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9852" source="CVE"/>
    <description>
    distribute-cache.c in ImageMagick re-uses objects after they have been destroyed, which allows remote attackers to have unspecified impact via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9853</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9853" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9853" source="CVE"/>
    <description>
    Memory leak in coders/rle.c in ImageMagick allows remote attackers to cause a denial of service (memory consumption) via a crafted rle file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129696" comment="GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129697" comment="GraphicsMagick-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129698" comment="libGraphicsMagick++-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129699" comment="libGraphicsMagick++-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129700" comment="libGraphicsMagick-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129701" comment="libGraphicsMagick3-config-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129702" comment="libGraphicsMagickWand-Q16-2-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129703" comment="perl-GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9854</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9854" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9854" source="CVE"/>
    <description>
    coders/tiff.c in ImageMagick allows remote attackers to cause a denial of service (application crash) via vectors related to the "identification of image."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9862</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9862" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9862" source="CVE"/>
    <description>
    Integer signedness error in bspatch.c in bspatch in bsdiff, as used in Apple OS X before 10.11.6 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow) via a crafted patch file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130878" comment="bsdiff-4.3-2.5.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9904</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9904" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9904" source="CVE"/>
    <description>
    The snd_compress_check_input function in sound/core/compress_offload.c in the ALSA subsystem in the Linux kernel before 3.17 does not properly check for an integer overflow, which allows local users to cause a denial of service (insufficient memory allocation) or possibly have unspecified other impact via a crafted SNDRV_COMPRESS_SET_PARAMS ioctl call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9907</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2014-9907" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9907" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133990" comment="ImageMagick-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133991" comment="ImageMagick-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133992" comment="ImageMagick-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133993" comment="ImageMagick-doc-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133994" comment="ImageMagick-extra-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133995" comment="libMagick++-6_Q16-5-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133996" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133997" comment="libMagick++-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133998" comment="libMagick++-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133999" comment="libMagickCore-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134000" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134001" comment="libMagickWand-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134002" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134003" comment="perl-PerlMagick-6.8.9.8-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0202</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0202" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0202" source="CVE"/>
    <description>
    The mod_dav_svn server in Subversion 1.8.0 through 1.8.11 allows remote attackers to cause a denial of service (memory consumption) via a large number of REPORT requests, which trigger the traversal of FSFS repository nodes.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108409" comment="libsvn_auth_gnome_keyring-1-0-1.8.13-2.14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108410" comment="libsvn_auth_kwallet-1-0-1.8.13-2.14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108411" comment="subversion-1.8.13-2.14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108412" comment="subversion-bash-completion-1.8.13-2.14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108413" comment="subversion-devel-1.8.13-2.14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108414" comment="subversion-perl-1.8.13-2.14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108415" comment="subversion-python-1.8.13-2.14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108416" comment="subversion-python-ctypes-1.8.13-2.14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108417" comment="subversion-ruby-1.8.13-2.14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108418" comment="subversion-server-1.8.13-2.14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108419" comment="subversion-tools-1.8.13-2.14.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0204</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0204" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0204" source="CVE"/>
    <description>
    The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the "FREAK" issue.  NOTE: the scope of this CVE is only client code based on OpenSSL, not EXPORT_RSA issues associated with servers or other TLS implementations.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105297" comment="libopenssl-devel-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105298" comment="libopenssl-devel-32bit-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124418" comment="libopenssl0_9_8-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124419" comment="libopenssl0_9_8-32bit-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105299" comment="libopenssl1_0_0-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105300" comment="libopenssl1_0_0-32bit-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105301" comment="libopenssl1_0_0-hmac-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105302" comment="libopenssl1_0_0-hmac-32bit-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105303" comment="openssl-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105304" comment="openssl-doc-1.0.1k-2.16.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0205</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0205" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0205" source="CVE"/>
    <description>
    The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a Diffie-Hellman (DH) certificate without requiring a CertificateVerify message, which allows remote attackers to obtain access without knowledge of a private key via crafted TLS Handshake Protocol traffic to a server that recognizes a Certification Authority with DH support.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111311" comment="libcrypto34-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111312" comment="libcrypto34-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105297" comment="libopenssl-devel-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105298" comment="libopenssl-devel-32bit-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105299" comment="libopenssl1_0_0-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105300" comment="libopenssl1_0_0-32bit-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105301" comment="libopenssl1_0_0-hmac-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105302" comment="libopenssl1_0_0-hmac-32bit-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111313" comment="libressl-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111314" comment="libressl-devel-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111315" comment="libressl-devel-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111316" comment="libressl-devel-doc-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111317" comment="libssl33-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111318" comment="libssl33-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111319" comment="libtls4-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111320" comment="libtls4-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105303" comment="openssl-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105304" comment="openssl-doc-1.0.1k-2.16.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0206</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0206" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0206" source="CVE"/>
    <description>
    Memory leak in the dtls1_buffer_record function in d1_pkt.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (memory consumption) by sending many duplicate records for the next epoch, leading to failure of replay detection.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111311" comment="libcrypto34-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111312" comment="libcrypto34-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105297" comment="libopenssl-devel-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105298" comment="libopenssl-devel-32bit-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105299" comment="libopenssl1_0_0-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105300" comment="libopenssl1_0_0-32bit-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105301" comment="libopenssl1_0_0-hmac-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105302" comment="libopenssl1_0_0-hmac-32bit-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111313" comment="libressl-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111314" comment="libressl-devel-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111315" comment="libressl-devel-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111316" comment="libressl-devel-doc-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111317" comment="libssl33-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111318" comment="libssl33-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111319" comment="libtls4-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111320" comment="libtls4-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105303" comment="openssl-1.0.1k-2.16.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105304" comment="openssl-doc-1.0.1k-2.16.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0209</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0209" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0209" source="CVE"/>
    <description>
    Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a malformed Elliptic Curve (EC) private-key file that is improperly handled during import.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111311" comment="libcrypto34-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111312" comment="libcrypto34-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107960" comment="libopenssl-devel-1.0.1k-2.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107961" comment="libopenssl-devel-32bit-1.0.1k-2.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124418" comment="libopenssl0_9_8-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124419" comment="libopenssl0_9_8-32bit-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107962" comment="libopenssl1_0_0-1.0.1k-2.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107963" comment="libopenssl1_0_0-32bit-1.0.1k-2.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107964" comment="libopenssl1_0_0-hmac-1.0.1k-2.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107965" comment="libopenssl1_0_0-hmac-32bit-1.0.1k-2.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111313" comment="libressl-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111314" comment="libressl-devel-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111315" comment="libressl-devel-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111316" comment="libressl-devel-doc-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111317" comment="libssl33-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111318" comment="libssl33-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111319" comment="libtls4-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111320" comment="libtls4-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107966" comment="openssl-1.0.1k-2.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107967" comment="openssl-doc-1.0.1k-2.20.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0219</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0219" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0219" source="CVE"/>
    <description>
    Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 allows remote attackers to spoof WSGI headers by using an _ (underscore) character instead of a - (dash) character in an HTTP header, as demonstrated by an X-Auth_User header.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108336" comment="python-Django-1.6.11-3.4.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0221</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0221" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0221" source="CVE"/>
    <description>
    The django.views.static.serve view in Django before 1.4.18, 1.6.x before 1.6.10, and 1.7.x before 1.7.3 reads files an entire line at a time, which allows remote attackers to cause a denial of service (memory consumption) via a long line in a file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108336" comment="python-Django-1.6.11-3.4.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0222</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0222" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0222" source="CVE"/>
    <description>
    ModelMultipleChoiceField in Django 1.6.x before 1.6.10 and 1.7.x before 1.7.3, when show_hidden_initial is set to True, allows remote attackers to cause a denial of service by submitting duplicate values, which triggers a large number of SQL queries.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108336" comment="python-Django-1.6.11-3.4.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0228</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0228" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0228" source="CVE"/>
    <description>
    The lua_websocket_read function in lua_request.c in the mod_lua module in the Apache HTTP Server through 2.4.12 allows remote attackers to cause a denial of service (child-process crash) by sending a crafted WebSocket Ping frame after a Lua script has called the wsupgrade function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009106938" comment="apache2-2.4.10-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106939" comment="apache2-devel-2.4.10-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106940" comment="apache2-doc-2.4.10-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106941" comment="apache2-event-2.4.10-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106942" comment="apache2-example-pages-2.4.10-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106943" comment="apache2-prefork-2.4.10-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106944" comment="apache2-utils-2.4.10-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106945" comment="apache2-worker-2.4.10-16.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0231</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0231" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0231" source="CVE"/>
    <description>
    Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate numerical keys within the serialized properties of an object.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-8142.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009106233" comment="apache2-mod_php5-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106234" comment="php5-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106235" comment="php5-bcmath-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106236" comment="php5-bz2-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106237" comment="php5-calendar-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106238" comment="php5-ctype-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106239" comment="php5-curl-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106240" comment="php5-dba-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106241" comment="php5-devel-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106242" comment="php5-dom-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106243" comment="php5-enchant-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106244" comment="php5-exif-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106245" comment="php5-fastcgi-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106246" comment="php5-fileinfo-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106247" comment="php5-firebird-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106248" comment="php5-fpm-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106249" comment="php5-ftp-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106250" comment="php5-gd-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106251" comment="php5-gettext-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106252" comment="php5-gmp-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106253" comment="php5-iconv-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106254" comment="php5-imap-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106255" comment="php5-intl-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106256" comment="php5-json-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106257" comment="php5-ldap-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106258" comment="php5-mbstring-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106259" comment="php5-mcrypt-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106260" comment="php5-mssql-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106261" comment="php5-mysql-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106262" comment="php5-odbc-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106263" comment="php5-opcache-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106264" comment="php5-openssl-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106265" comment="php5-pcntl-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106266" comment="php5-pdo-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106267" comment="php5-pear-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106268" comment="php5-pgsql-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106269" comment="php5-phar-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106270" comment="php5-posix-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106271" comment="php5-pspell-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106272" comment="php5-readline-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106273" comment="php5-shmop-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106274" comment="php5-snmp-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106275" comment="php5-soap-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106276" comment="php5-sockets-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106277" comment="php5-sqlite-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106278" comment="php5-suhosin-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106279" comment="php5-sysvmsg-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106280" comment="php5-sysvsem-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106281" comment="php5-sysvshm-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106282" comment="php5-tidy-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106283" comment="php5-tokenizer-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106284" comment="php5-wddx-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106285" comment="php5-xmlreader-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106286" comment="php5-xmlrpc-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106287" comment="php5-xmlwriter-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106288" comment="php5-xsl-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106289" comment="php5-zip-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106290" comment="php5-zlib-5.6.1-8.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0232</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0232" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0232" source="CVE"/>
    <description>
    The exif_process_unicode function in ext/exif/exif.c in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5 allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized pointer free and application crash) via crafted EXIF data in a JPEG image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009106233" comment="apache2-mod_php5-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106234" comment="php5-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106235" comment="php5-bcmath-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106236" comment="php5-bz2-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106237" comment="php5-calendar-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106238" comment="php5-ctype-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106239" comment="php5-curl-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106240" comment="php5-dba-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106241" comment="php5-devel-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106242" comment="php5-dom-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106243" comment="php5-enchant-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106244" comment="php5-exif-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106245" comment="php5-fastcgi-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106246" comment="php5-fileinfo-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106247" comment="php5-firebird-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106248" comment="php5-fpm-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106249" comment="php5-ftp-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106250" comment="php5-gd-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106251" comment="php5-gettext-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106252" comment="php5-gmp-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106253" comment="php5-iconv-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106254" comment="php5-imap-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106255" comment="php5-intl-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106256" comment="php5-json-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106257" comment="php5-ldap-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106258" comment="php5-mbstring-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106259" comment="php5-mcrypt-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106260" comment="php5-mssql-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106261" comment="php5-mysql-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106262" comment="php5-odbc-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106263" comment="php5-opcache-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106264" comment="php5-openssl-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106265" comment="php5-pcntl-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106266" comment="php5-pdo-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106267" comment="php5-pear-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106268" comment="php5-pgsql-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106269" comment="php5-phar-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106270" comment="php5-posix-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106271" comment="php5-pspell-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106272" comment="php5-readline-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106273" comment="php5-shmop-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106274" comment="php5-snmp-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106275" comment="php5-soap-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106276" comment="php5-sockets-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106277" comment="php5-sqlite-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106278" comment="php5-suhosin-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106279" comment="php5-sysvmsg-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106280" comment="php5-sysvsem-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106281" comment="php5-sysvshm-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106282" comment="php5-tidy-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106283" comment="php5-tokenizer-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106284" comment="php5-wddx-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106285" comment="php5-xmlreader-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106286" comment="php5-xmlrpc-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106287" comment="php5-xmlwriter-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106288" comment="php5-xsl-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106289" comment="php5-zip-5.6.1-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106290" comment="php5-zlib-5.6.1-8.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0236</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0236" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0236" source="CVE"/>
    <description>
    libvirt before 1.2.12 allow remote authenticated users to obtain the VNC password by using the VIR_DOMAIN_XML_SECURE flag with a crafted (1) snapshot to the virDomainSnapshotGetXMLDesc interface or (2) image to the virDomainSaveImageGetXMLDesc interface.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105881" comment="libvirt-1.2.9-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105882" comment="libvirt-client-1.2.9-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105883" comment="libvirt-client-32bit-1.2.9-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105884" comment="libvirt-daemon-1.2.9-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105885" comment="libvirt-daemon-config-network-1.2.9-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105886" comment="libvirt-daemon-config-nwfilter-1.2.9-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105887" comment="libvirt-daemon-driver-interface-1.2.9-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105906" comment="libvirt-daemon-driver-libxl-1.2.9-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105888" comment="libvirt-daemon-driver-lxc-1.2.9-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105889" comment="libvirt-daemon-driver-network-1.2.9-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105890" comment="libvirt-daemon-driver-nodedev-1.2.9-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105891" comment="libvirt-daemon-driver-nwfilter-1.2.9-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105892" comment="libvirt-daemon-driver-qemu-1.2.9-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105893" comment="libvirt-daemon-driver-secret-1.2.9-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105894" comment="libvirt-daemon-driver-storage-1.2.9-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105895" comment="libvirt-daemon-driver-uml-1.2.9-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105896" comment="libvirt-daemon-driver-vbox-1.2.9-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105907" comment="libvirt-daemon-driver-xen-1.2.9-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105897" comment="libvirt-daemon-lxc-1.2.9-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105898" comment="libvirt-daemon-qemu-1.2.9-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105899" comment="libvirt-daemon-uml-1.2.9-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105900" comment="libvirt-daemon-vbox-1.2.9-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105908" comment="libvirt-daemon-xen-1.2.9-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105901" comment="libvirt-devel-1.2.9-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105902" comment="libvirt-devel-32bit-1.2.9-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105903" comment="libvirt-doc-1.2.9-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105904" comment="libvirt-lock-sanlock-1.2.9-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105905" comment="libvirt-login-shell-1.2.9-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105860" comment="libvirt-python-1.1.2-2.48.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0240</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0240" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0240" source="CVE"/>
    <description>
    The Netlogon server implementation in smbd in Samba 3.5.x and 3.6.x before 3.6.25, 4.0.x before 4.0.25, 4.1.x before 4.1.17, and 4.2.x before 4.2.0rc5 performs a free operation on an uninitialized stack pointer, which allows remote attackers to execute arbitrary code via crafted Netlogon packets that use the ServerPasswordSet RPC API, as demonstrated by packets reaching the _netr_ServerPasswordSet function in rpc_server/netlogon/srv_netlog_nt.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126263" comment="ctdb-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126264" comment="ctdb-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126265" comment="ctdb-pcp-pmda-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126266" comment="ctdb-tests-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126267" comment="libdcerpc-atsvc-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126268" comment="libdcerpc-atsvc0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126269" comment="libdcerpc-atsvc0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126270" comment="libdcerpc-binding0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126271" comment="libdcerpc-binding0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126272" comment="libdcerpc-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126273" comment="libdcerpc-samr-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126274" comment="libdcerpc-samr0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126275" comment="libdcerpc-samr0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126276" comment="libdcerpc0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126277" comment="libdcerpc0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126278" comment="libgensec-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126279" comment="libgensec0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126280" comment="libgensec0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126281" comment="libndr-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126282" comment="libndr-krb5pac-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126283" comment="libndr-krb5pac0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126284" comment="libndr-krb5pac0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126285" comment="libndr-nbt-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126286" comment="libndr-nbt0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126287" comment="libndr-nbt0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126288" comment="libndr-standard-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126289" comment="libndr-standard0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126290" comment="libndr-standard0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126291" comment="libndr0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126292" comment="libndr0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126293" comment="libnetapi-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126294" comment="libnetapi0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126295" comment="libnetapi0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106771" comment="libpdb-devel-4.1.17-5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106773" comment="libpdb0-4.1.17-5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106772" comment="libpdb0-32bit-4.1.17-5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126296" comment="libregistry-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126297" comment="libregistry0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126298" comment="libregistry0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126299" comment="libsamba-credentials-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126300" comment="libsamba-credentials0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126301" comment="libsamba-credentials0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126302" comment="libsamba-hostconfig-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126303" comment="libsamba-hostconfig0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126304" comment="libsamba-hostconfig0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126305" comment="libsamba-passdb-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126306" comment="libsamba-passdb0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126307" comment="libsamba-passdb0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126308" comment="libsamba-policy-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126309" comment="libsamba-policy0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126310" comment="libsamba-policy0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126311" comment="libsamba-util-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126312" comment="libsamba-util0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126313" comment="libsamba-util0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126314" comment="libsamdb-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126315" comment="libsamdb0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126316" comment="libsamdb0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126317" comment="libsmbclient-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126318" comment="libsmbclient-raw-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126319" comment="libsmbclient-raw0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126320" comment="libsmbclient-raw0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126321" comment="libsmbclient0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126322" comment="libsmbclient0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126323" comment="libsmbconf-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126324" comment="libsmbconf0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126325" comment="libsmbconf0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126326" comment="libsmbldap-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126327" comment="libsmbldap0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126328" comment="libsmbldap0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106804" comment="libsmbsharemodes-devel-4.1.17-5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106805" comment="libsmbsharemodes0-4.1.17-5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126329" comment="libtevent-util-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126330" comment="libtevent-util0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126331" comment="libtevent-util0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126332" comment="libwbclient-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126333" comment="libwbclient0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126334" comment="libwbclient0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126335" comment="samba-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126336" comment="samba-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126337" comment="samba-client-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126338" comment="samba-client-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126339" comment="samba-core-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126340" comment="samba-doc-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126341" comment="samba-libs-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126342" comment="samba-libs-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126343" comment="samba-pidl-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126344" comment="samba-python-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126345" comment="samba-test-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126346" comment="samba-test-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126347" comment="samba-winbind-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126348" comment="samba-winbind-32bit-4.2.4-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0241</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0241" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0241" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009106919" comment="libecpg6-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106918" comment="libecpg6-32bit-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106921" comment="libpq5-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106920" comment="libpq5-32bit-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106924" comment="postgresql93-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106925" comment="postgresql93-contrib-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106922" comment="postgresql93-devel-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106926" comment="postgresql93-docs-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106923" comment="postgresql93-libs-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106927" comment="postgresql93-plperl-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106928" comment="postgresql93-plpython-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106929" comment="postgresql93-pltcl-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106930" comment="postgresql93-server-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106931" comment="postgresql93-test-9.3.6-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0243</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0243" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0243" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009106919" comment="libecpg6-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106918" comment="libecpg6-32bit-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106921" comment="libpq5-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106920" comment="libpq5-32bit-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106924" comment="postgresql93-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106925" comment="postgresql93-contrib-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106922" comment="postgresql93-devel-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106926" comment="postgresql93-docs-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106923" comment="postgresql93-libs-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106927" comment="postgresql93-plperl-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106928" comment="postgresql93-plpython-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106929" comment="postgresql93-pltcl-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106930" comment="postgresql93-server-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106931" comment="postgresql93-test-9.3.6-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0244</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0244" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0244" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009106919" comment="libecpg6-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106918" comment="libecpg6-32bit-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106921" comment="libpq5-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106920" comment="libpq5-32bit-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106924" comment="postgresql93-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106925" comment="postgresql93-contrib-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106922" comment="postgresql93-devel-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106926" comment="postgresql93-docs-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106923" comment="postgresql93-libs-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106927" comment="postgresql93-plperl-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106928" comment="postgresql93-plpython-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106929" comment="postgresql93-pltcl-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106930" comment="postgresql93-server-9.3.6-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106931" comment="postgresql93-test-9.3.6-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0245</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0245" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0245" source="CVE"/>
    <description>
    D-Bus 1.4.x through 1.6.x before 1.6.30, 1.8.x before 1.8.16, and 1.9.x before 1.9.10 does not validate the source of ActivationFailure signals, which allows local users to cause a denial of service (activation failure error returned) by leveraging a race condition involving sending an ActivationFailure signal before systemd responds.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009106128" comment="dbus-1-1.8.16-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106131" comment="dbus-1-devel-1.8.16-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106132" comment="dbus-1-devel-32bit-1.8.16-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106129" comment="dbus-1-devel-doc-1.8.16-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106130" comment="dbus-1-x11-1.8.16-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106133" comment="libdbus-1-3-1.8.16-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106134" comment="libdbus-1-3-32bit-1.8.16-16.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0248</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0248" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0248" source="CVE"/>
    <description>
    The (1) mod_dav_svn and (2) svnserve servers in Subversion 1.6.0 through 1.7.19 and 1.8.0 through 1.8.11 allow remote attackers to cause a denial of service (assertion failure and abort) via crafted parameter combinations related to dynamically evaluated revision numbers.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108409" comment="libsvn_auth_gnome_keyring-1-0-1.8.13-2.14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108410" comment="libsvn_auth_kwallet-1-0-1.8.13-2.14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108411" comment="subversion-1.8.13-2.14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108412" comment="subversion-bash-completion-1.8.13-2.14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108413" comment="subversion-devel-1.8.13-2.14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108414" comment="subversion-perl-1.8.13-2.14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108415" comment="subversion-python-1.8.13-2.14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108416" comment="subversion-python-ctypes-1.8.13-2.14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108417" comment="subversion-ruby-1.8.13-2.14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108418" comment="subversion-server-1.8.13-2.14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108419" comment="subversion-tools-1.8.13-2.14.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0251</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0251" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0251" source="CVE"/>
    <description>
    The mod_dav_svn server in Subversion 1.5.0 through 1.7.19 and 1.8.0 through 1.8.11 allows remote authenticated users to spoof the svn:author property via a crafted v1 HTTP protocol request sequences.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108409" comment="libsvn_auth_gnome_keyring-1-0-1.8.13-2.14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108410" comment="libsvn_auth_kwallet-1-0-1.8.13-2.14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108411" comment="subversion-1.8.13-2.14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108412" comment="subversion-bash-completion-1.8.13-2.14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108413" comment="subversion-devel-1.8.13-2.14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108414" comment="subversion-perl-1.8.13-2.14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108415" comment="subversion-python-1.8.13-2.14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108416" comment="subversion-python-ctypes-1.8.13-2.14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108417" comment="subversion-ruby-1.8.13-2.14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108418" comment="subversion-server-1.8.13-2.14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108419" comment="subversion-tools-1.8.13-2.14.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0252</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0252" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0252" source="CVE"/>
    <description>
    internal/XMLReader.cpp in Apache Xerces-C before 3.1.2 allows remote attackers to cause a denial of service (segmentation fault and crash) via crafted XML data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125996" comment="libxerces-c-3_1-3.1.1-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125997" comment="libxerces-c-3_1-32bit-3.1.1-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125998" comment="libxerces-c-devel-3.1.1-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125999" comment="xerces-c-3.1.1-13.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0254</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0254" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0254" source="CVE"/>
    <description>
    Apache Standard Taglibs before 1.2.3 allows remote attackers to execute arbitrary code or conduct external XML entity (XXE) attacks via a crafted XSLT extension in a (1) &lt;x:parse&gt; or (2) &lt;x:transform&gt; JSTL XML tag.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115040" comment="jakarta-taglibs-standard-1.1.1-255.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115041" comment="jakarta-taglibs-standard-javadoc-1.1.1-255.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115031" comment="xalan-j2-2.7.2-262.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115032" comment="xalan-j2-demo-2.7.2-262.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115033" comment="xalan-j2-manual-2.7.2-262.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115034" comment="xalan-j2-xsltc-2.7.2-262.7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0255</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0255" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0255" source="CVE"/>
    <description>
    X.Org Server (aka xserver and xorg-server) before 1.16.3 and 1.17.x before 1.17.1 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (crash) via a crafted string length value in a XkbSetGeometry request.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009106297" comment="tigervnc-1.4.1-6.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106298" comment="xorg-x11-Xvnc-1.4.1-6.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106294" comment="xorg-x11-server-7.6_1.16.1-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106295" comment="xorg-x11-server-extra-7.6_1.16.1-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106296" comment="xorg-x11-server-sdk-7.6_1.16.1-9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0261</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0261" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0261" source="CVE"/>
    <description>
    Integer signedness error in the mobility_opt_print function in the IPv6 mobility printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (out-of-bounds read and crash) or possibly execute arbitrary code via a negative length value.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108128" comment="tcpdump-4.6.2-8.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0272</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0272" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0272" source="CVE"/>
    <description>
    GNOME NetworkManager allows remote attackers to cause a denial of service (IPv6 traffic disruption) via a crafted MTU value in an IPv6 Router Advertisement (RA) message, a different vulnerability than CVE-2015-8215.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115288" comment="bbswitch-0.8-3.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115289" comment="bbswitch-kmp-default-0.8_k3.16.7_29-3.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115290" comment="bbswitch-kmp-desktop-0.8_k3.16.7_29-3.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115291" comment="bbswitch-kmp-pae-0.8_k3.16.7_29-3.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115292" comment="bbswitch-kmp-xen-0.8_k3.16.7_29-3.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115293" comment="cloop-2.639-14.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115294" comment="cloop-kmp-default-2.639_k3.16.7_29-14.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115295" comment="cloop-kmp-desktop-2.639_k3.16.7_29-14.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115296" comment="cloop-kmp-pae-2.639_k3.16.7_29-14.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115297" comment="cloop-kmp-xen-2.639_k3.16.7_29-14.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115298" comment="crash-7.0.8-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115299" comment="crash-devel-7.0.8-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115300" comment="crash-doc-7.0.8-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115301" comment="crash-eppic-7.0.8-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115302" comment="crash-gcore-7.0.8-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115303" comment="crash-kmp-default-7.0.8_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115304" comment="crash-kmp-desktop-7.0.8_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115305" comment="crash-kmp-pae-7.0.8_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115306" comment="crash-kmp-xen-7.0.8_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115307" comment="hdjmod-1.28-18.14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115308" comment="hdjmod-kmp-default-1.28_k3.16.7_29-18.14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115309" comment="hdjmod-kmp-desktop-1.28_k3.16.7_29-18.14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115310" comment="hdjmod-kmp-pae-1.28_k3.16.7_29-18.14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115311" comment="hdjmod-kmp-xen-1.28_k3.16.7_29-18.14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115312" comment="ipset-6.23-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115313" comment="ipset-devel-6.23-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115314" comment="ipset-kmp-default-6.23_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115315" comment="ipset-kmp-desktop-6.23_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115316" comment="ipset-kmp-pae-6.23_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115317" comment="ipset-kmp-xen-6.23_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115319" comment="kernel-debug-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115320" comment="kernel-debug-base-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115321" comment="kernel-debug-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115322" comment="kernel-default-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115323" comment="kernel-default-base-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115324" comment="kernel-default-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115325" comment="kernel-desktop-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115326" comment="kernel-desktop-base-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115327" comment="kernel-desktop-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115338" comment="kernel-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115328" comment="kernel-docs-3.16.7-29.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115329" comment="kernel-ec2-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115330" comment="kernel-ec2-base-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115331" comment="kernel-ec2-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115339" comment="kernel-macros-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115332" comment="kernel-obs-build-3.16.7-29.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115334" comment="kernel-obs-qa-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115333" comment="kernel-obs-qa-xen-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115335" comment="kernel-pae-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115336" comment="kernel-pae-base-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115337" comment="kernel-pae-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115340" comment="kernel-source-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115341" comment="kernel-source-vanilla-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115342" comment="kernel-syms-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115343" comment="kernel-vanilla-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115344" comment="kernel-vanilla-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115345" comment="kernel-xen-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115346" comment="kernel-xen-base-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115347" comment="kernel-xen-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115318" comment="libipset3-6.23-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115348" comment="pcfclock-0.44-260.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115349" comment="pcfclock-kmp-default-0.44_k3.16.7_29-260.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115350" comment="pcfclock-kmp-desktop-0.44_k3.16.7_29-260.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115351" comment="pcfclock-kmp-pae-0.44_k3.16.7_29-260.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115352" comment="vhba-kmp-20140629-2.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115353" comment="vhba-kmp-default-20140629_k3.16.7_29-2.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115354" comment="vhba-kmp-desktop-20140629_k3.16.7_29-2.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115355" comment="vhba-kmp-pae-20140629_k3.16.7_29-2.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115356" comment="vhba-kmp-xen-20140629_k3.16.7_29-2.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115357" comment="xen-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115358" comment="xen-devel-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115367" comment="xen-doc-html-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115368" comment="xen-kmp-default-4.4.2_06_k3.16.7_29-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115369" comment="xen-kmp-desktop-4.4.2_06_k3.16.7_29-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115360" comment="xen-libs-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115359" comment="xen-libs-32bit-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115370" comment="xen-tools-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115361" comment="xen-tools-domU-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115362" comment="xtables-addons-2.6-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115363" comment="xtables-addons-kmp-default-2.6_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115364" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115365" comment="xtables-addons-kmp-pae-2.6_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115366" comment="xtables-addons-kmp-xen-2.6_k3.16.7_29-13.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0273</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0273" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0273" source="CVE"/>
    <description>
    Multiple use-after-free vulnerabilities in ext/date/php_date.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 allow remote attackers to execute arbitrary code via crafted serialized input containing a (1) R or (2) r type specifier in (a) DateTimeZone data handled by the php_date_timezone_initialize_from_hash function or (b) DateTime data handled by the php_date_initialize_from_hash function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107161" comment="apache2-mod_php5-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107162" comment="php5-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107163" comment="php5-bcmath-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107164" comment="php5-bz2-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107165" comment="php5-calendar-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107166" comment="php5-ctype-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107167" comment="php5-curl-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107168" comment="php5-dba-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107169" comment="php5-devel-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107170" comment="php5-dom-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107171" comment="php5-enchant-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107172" comment="php5-exif-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107173" comment="php5-fastcgi-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107174" comment="php5-fileinfo-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107175" comment="php5-firebird-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107176" comment="php5-fpm-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107177" comment="php5-ftp-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107178" comment="php5-gd-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107179" comment="php5-gettext-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107180" comment="php5-gmp-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107181" comment="php5-iconv-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107182" comment="php5-imap-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107183" comment="php5-intl-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107184" comment="php5-json-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107185" comment="php5-ldap-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107186" comment="php5-mbstring-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107187" comment="php5-mcrypt-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107188" comment="php5-mssql-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107189" comment="php5-mysql-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107190" comment="php5-odbc-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107191" comment="php5-opcache-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107192" comment="php5-openssl-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107193" comment="php5-pcntl-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107194" comment="php5-pdo-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107195" comment="php5-pear-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107196" comment="php5-pgsql-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107197" comment="php5-phar-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107198" comment="php5-posix-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107199" comment="php5-pspell-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107200" comment="php5-readline-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107201" comment="php5-shmop-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107202" comment="php5-snmp-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107203" comment="php5-soap-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107204" comment="php5-sockets-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107205" comment="php5-sqlite-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107206" comment="php5-suhosin-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107207" comment="php5-sysvmsg-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107208" comment="php5-sysvsem-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107209" comment="php5-sysvshm-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107210" comment="php5-tidy-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107211" comment="php5-tokenizer-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107212" comment="php5-wddx-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107213" comment="php5-xmlreader-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107214" comment="php5-xmlrpc-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107215" comment="php5-xmlwriter-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107216" comment="php5-xsl-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107217" comment="php5-zip-5.6.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107218" comment="php5-zlib-5.6.1-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0275</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0275" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0275" source="CVE"/>
    <description>
    The ext4_zero_range function in fs/ext4/extents.c in the Linux kernel before 4.1 allows local users to cause a denial of service (BUG) via a crafted fallocate zero-range request.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108989" comment="bbswitch-0.8-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108990" comment="bbswitch-kmp-default-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108991" comment="bbswitch-kmp-desktop-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108992" comment="bbswitch-kmp-pae-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108993" comment="bbswitch-kmp-xen-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108994" comment="cloop-2.639-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108995" comment="cloop-kmp-default-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108996" comment="cloop-kmp-desktop-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108997" comment="cloop-kmp-pae-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108998" comment="cloop-kmp-xen-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108999" comment="crash-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109000" comment="crash-devel-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109001" comment="crash-doc-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109002" comment="crash-eppic-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109003" comment="crash-gcore-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109004" comment="crash-kmp-default-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109005" comment="crash-kmp-desktop-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109006" comment="crash-kmp-pae-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109007" comment="crash-kmp-xen-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109008" comment="hdjmod-1.28-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109009" comment="hdjmod-kmp-default-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109010" comment="hdjmod-kmp-desktop-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109011" comment="hdjmod-kmp-pae-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109012" comment="hdjmod-kmp-xen-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109013" comment="ipset-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109014" comment="ipset-devel-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109015" comment="ipset-kmp-default-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109016" comment="ipset-kmp-desktop-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109017" comment="ipset-kmp-pae-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109018" comment="ipset-kmp-xen-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109020" comment="kernel-debug-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109021" comment="kernel-debug-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109022" comment="kernel-debug-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109023" comment="kernel-default-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109024" comment="kernel-default-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109025" comment="kernel-default-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109026" comment="kernel-desktop-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109027" comment="kernel-desktop-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109028" comment="kernel-desktop-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109039" comment="kernel-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109029" comment="kernel-docs-3.16.7-21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109030" comment="kernel-ec2-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109031" comment="kernel-ec2-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109032" comment="kernel-ec2-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109040" comment="kernel-macros-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109033" comment="kernel-obs-build-3.16.7-21.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109035" comment="kernel-obs-qa-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109034" comment="kernel-obs-qa-xen-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109036" comment="kernel-pae-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109037" comment="kernel-pae-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109038" comment="kernel-pae-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109041" comment="kernel-source-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109042" comment="kernel-source-vanilla-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109043" comment="kernel-syms-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109044" comment="kernel-vanilla-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109045" comment="kernel-vanilla-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109046" comment="kernel-xen-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109047" comment="kernel-xen-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109048" comment="kernel-xen-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109019" comment="libipset3-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109049" comment="pcfclock-0.44-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109050" comment="pcfclock-kmp-default-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109051" comment="pcfclock-kmp-desktop-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109052" comment="pcfclock-kmp-pae-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109058" comment="python-virtualbox-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109053" comment="vhba-kmp-20140629-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109054" comment="vhba-kmp-default-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109055" comment="vhba-kmp-desktop-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109056" comment="vhba-kmp-pae-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109057" comment="vhba-kmp-xen-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109059" comment="virtualbox-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109060" comment="virtualbox-devel-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109061" comment="virtualbox-guest-desktop-icons-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109062" comment="virtualbox-guest-kmp-default-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109063" comment="virtualbox-guest-kmp-desktop-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109064" comment="virtualbox-guest-kmp-pae-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109065" comment="virtualbox-guest-tools-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109066" comment="virtualbox-guest-x11-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109067" comment="virtualbox-host-kmp-default-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109068" comment="virtualbox-host-kmp-desktop-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109069" comment="virtualbox-host-kmp-pae-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109070" comment="virtualbox-qt-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109071" comment="virtualbox-websrv-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109072" comment="xen-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109073" comment="xen-devel-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109082" comment="xen-doc-html-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109083" comment="xen-kmp-default-4.4.1_08_k3.16.7_21-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109084" comment="xen-kmp-desktop-4.4.1_08_k3.16.7_21-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109075" comment="xen-libs-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109074" comment="xen-libs-32bit-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109085" comment="xen-tools-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109076" comment="xen-tools-domU-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109077" comment="xtables-addons-2.6-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109078" comment="xtables-addons-kmp-default-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109079" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109080" comment="xtables-addons-kmp-pae-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109081" comment="xtables-addons-kmp-xen-2.6_k3.16.7_21-9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0286</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0286" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0286" source="CVE"/>
    <description>
    The ASN1_TYPE_cmp function in crypto/asn1/a_type.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly perform boolean-type comparisons, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted X.509 certificate to an endpoint that uses the certificate-verification feature.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111311" comment="libcrypto34-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111312" comment="libcrypto34-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118962" comment="libmysql56client18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118963" comment="libmysql56client18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118964" comment="libmysql56client_r18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118965" comment="libmysql56client_r18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107960" comment="libopenssl-devel-1.0.1k-2.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107961" comment="libopenssl-devel-32bit-1.0.1k-2.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124418" comment="libopenssl0_9_8-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124419" comment="libopenssl0_9_8-32bit-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107962" comment="libopenssl1_0_0-1.0.1k-2.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107963" comment="libopenssl1_0_0-32bit-1.0.1k-2.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107964" comment="libopenssl1_0_0-hmac-1.0.1k-2.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107965" comment="libopenssl1_0_0-hmac-32bit-1.0.1k-2.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111313" comment="libressl-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111314" comment="libressl-devel-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111315" comment="libressl-devel-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111316" comment="libressl-devel-doc-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111317" comment="libssl33-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111318" comment="libssl33-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111319" comment="libtls4-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111320" comment="libtls4-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118966" comment="mysql-community-server-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118967" comment="mysql-community-server-bench-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118968" comment="mysql-community-server-client-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118969" comment="mysql-community-server-errormessages-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118970" comment="mysql-community-server-test-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118971" comment="mysql-community-server-tools-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107966" comment="openssl-1.0.1k-2.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107967" comment="openssl-doc-1.0.1k-2.20.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0287</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0287" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0287" source="CVE"/>
    <description>
    The ASN1_item_ex_d2i function in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not reinitialize CHOICE and ADB data structures, which might allow attackers to cause a denial of service (invalid write operation and memory corruption) by leveraging an application that relies on ASN.1 structure reuse.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111311" comment="libcrypto34-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111312" comment="libcrypto34-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107960" comment="libopenssl-devel-1.0.1k-2.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107961" comment="libopenssl-devel-32bit-1.0.1k-2.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124418" comment="libopenssl0_9_8-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124419" comment="libopenssl0_9_8-32bit-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107962" comment="libopenssl1_0_0-1.0.1k-2.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107963" comment="libopenssl1_0_0-32bit-1.0.1k-2.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107964" comment="libopenssl1_0_0-hmac-1.0.1k-2.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107965" comment="libopenssl1_0_0-hmac-32bit-1.0.1k-2.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111313" comment="libressl-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111314" comment="libressl-devel-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111315" comment="libressl-devel-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111316" comment="libressl-devel-doc-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111317" comment="libssl33-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111318" comment="libssl33-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111319" comment="libtls4-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111320" comment="libtls4-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107966" comment="openssl-1.0.1k-2.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107967" comment="openssl-doc-1.0.1k-2.20.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0288</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0288" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0288" source="CVE"/>
    <description>
    The X509_to_X509_REQ function in crypto/x509/x509_req.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow attackers to cause a denial of service (NULL pointer dereference and application crash) via an invalid certificate key.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111311" comment="libcrypto34-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111312" comment="libcrypto34-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118962" comment="libmysql56client18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118963" comment="libmysql56client18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118964" comment="libmysql56client_r18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118965" comment="libmysql56client_r18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107960" comment="libopenssl-devel-1.0.1k-2.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107961" comment="libopenssl-devel-32bit-1.0.1k-2.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124418" comment="libopenssl0_9_8-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124419" comment="libopenssl0_9_8-32bit-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107962" comment="libopenssl1_0_0-1.0.1k-2.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107963" comment="libopenssl1_0_0-32bit-1.0.1k-2.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107964" comment="libopenssl1_0_0-hmac-1.0.1k-2.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107965" comment="libopenssl1_0_0-hmac-32bit-1.0.1k-2.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111313" comment="libressl-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111314" comment="libressl-devel-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111315" comment="libressl-devel-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111316" comment="libressl-devel-doc-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111317" comment="libssl33-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111318" comment="libssl33-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111319" comment="libtls4-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111320" comment="libtls4-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118966" comment="mysql-community-server-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118967" comment="mysql-community-server-bench-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118968" comment="mysql-community-server-client-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118969" comment="mysql-community-server-errormessages-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118970" comment="mysql-community-server-test-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118971" comment="mysql-community-server-tools-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107966" comment="openssl-1.0.1k-2.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107967" comment="openssl-doc-1.0.1k-2.20.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0289</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0289" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0289" source="CVE"/>
    <description>
    The PKCS#7 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly handle a lack of outer ContentInfo, which allows attackers to cause a denial of service (NULL pointer dereference and application crash) by leveraging an application that processes arbitrary PKCS#7 data and providing malformed data with ASN.1 encoding, related to crypto/pkcs7/pk7_doit.c and crypto/pkcs7/pk7_lib.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111311" comment="libcrypto34-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111312" comment="libcrypto34-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107960" comment="libopenssl-devel-1.0.1k-2.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107961" comment="libopenssl-devel-32bit-1.0.1k-2.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124418" comment="libopenssl0_9_8-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124419" comment="libopenssl0_9_8-32bit-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107962" comment="libopenssl1_0_0-1.0.1k-2.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107963" comment="libopenssl1_0_0-32bit-1.0.1k-2.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107964" comment="libopenssl1_0_0-hmac-1.0.1k-2.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107965" comment="libopenssl1_0_0-hmac-32bit-1.0.1k-2.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111313" comment="libressl-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111314" comment="libressl-devel-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111315" comment="libressl-devel-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111316" comment="libressl-devel-doc-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111317" comment="libssl33-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111318" comment="libssl33-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111319" comment="libtls4-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111320" comment="libtls4-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107966" comment="openssl-1.0.1k-2.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107967" comment="openssl-doc-1.0.1k-2.20.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0293</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0293" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0293" source="CVE"/>
    <description>
    The SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (s2_lib.c assertion failure and daemon exit) via a crafted CLIENT-MASTER-KEY message.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107960" comment="libopenssl-devel-1.0.1k-2.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107961" comment="libopenssl-devel-32bit-1.0.1k-2.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124418" comment="libopenssl0_9_8-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124419" comment="libopenssl0_9_8-32bit-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107962" comment="libopenssl1_0_0-1.0.1k-2.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107963" comment="libopenssl1_0_0-32bit-1.0.1k-2.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107964" comment="libopenssl1_0_0-hmac-1.0.1k-2.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107965" comment="libopenssl1_0_0-hmac-32bit-1.0.1k-2.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107966" comment="openssl-1.0.1k-2.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107967" comment="openssl-doc-1.0.1k-2.20.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0294</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0294" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0294" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108180" comment="gnutls-3.2.18-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108181" comment="libgnutls-devel-3.2.18-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108182" comment="libgnutls-devel-32bit-3.2.18-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108183" comment="libgnutls-openssl-devel-3.2.18-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108184" comment="libgnutls-openssl27-3.2.18-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108185" comment="libgnutls28-3.2.18-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108186" comment="libgnutls28-32bit-3.2.18-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108187" comment="libgnutlsxx-devel-3.2.18-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108188" comment="libgnutlsxx28-3.2.18-8.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0301</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0301" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0301" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK &amp; Compiler before 16.0.0.272 do not properly validate files, which has unspecified impact and attack vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117574" comment="flash-player-11.2.202.429-2.21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117575" comment="flash-player-gnome-11.2.202.429-2.21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117576" comment="flash-player-kde4-11.2.202.429-2.21.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0302</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0302" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0302" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK &amp; Compiler before 16.0.0.272 allow attackers to obtain sensitive keystroke information via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117574" comment="flash-player-11.2.202.429-2.21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117575" comment="flash-player-gnome-11.2.202.429-2.21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117576" comment="flash-player-kde4-11.2.202.429-2.21.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0303</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0303" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0303" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK &amp; Compiler before 16.0.0.272 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0306.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117574" comment="flash-player-11.2.202.429-2.21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117575" comment="flash-player-gnome-11.2.202.429-2.21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117576" comment="flash-player-kde4-11.2.202.429-2.21.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0304</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0304" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0304" source="CVE"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK &amp; Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0309.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117574" comment="flash-player-11.2.202.429-2.21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117575" comment="flash-player-gnome-11.2.202.429-2.21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117576" comment="flash-player-kde4-11.2.202.429-2.21.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0305</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0305" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0305" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK &amp; Compiler before 16.0.0.272 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117574" comment="flash-player-11.2.202.429-2.21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117575" comment="flash-player-gnome-11.2.202.429-2.21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117576" comment="flash-player-kde4-11.2.202.429-2.21.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0306</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0306" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0306" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK &amp; Compiler before 16.0.0.272 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0303.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117574" comment="flash-player-11.2.202.429-2.21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117575" comment="flash-player-gnome-11.2.202.429-2.21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117576" comment="flash-player-kde4-11.2.202.429-2.21.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0307</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0307" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0307" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK &amp; Compiler before 16.0.0.272 allow remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117574" comment="flash-player-11.2.202.429-2.21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117575" comment="flash-player-gnome-11.2.202.429-2.21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117576" comment="flash-player-kde4-11.2.202.429-2.21.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0308</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0308" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0308" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK &amp; Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117574" comment="flash-player-11.2.202.429-2.21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117575" comment="flash-player-gnome-11.2.202.429-2.21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117576" comment="flash-player-kde4-11.2.202.429-2.21.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0309</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0309" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0309" source="CVE"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK &amp; Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0304.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117574" comment="flash-player-11.2.202.429-2.21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117575" comment="flash-player-gnome-11.2.202.429-2.21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117576" comment="flash-player-kde4-11.2.202.429-2.21.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0310</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0310" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0310" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.262 and 14.x through 16.x before 16.0.0.287 on Windows and OS X and before 11.2.202.438 on Linux does not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism on Windows, and have an unspecified impact on other platforms, via unknown vectors, as exploited in the wild in January 2015.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117592" comment="flash-player-11.2.202.438-2.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117593" comment="flash-player-gnome-11.2.202.438-2.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117594" comment="flash-player-kde4-11.2.202.438-2.25.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0311</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0311" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0311" source="CVE"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player through 13.0.0.262 and 14.x, 15.x, and 16.x through 16.0.0.287 on Windows and OS X and through 11.2.202.438 on Linux allows remote attackers to execute arbitrary code via unknown vectors, as exploited in the wild in January 2015.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117678" comment="flash-player-11.2.202.440-2.29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117679" comment="flash-player-gnome-11.2.202.440-2.29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117680" comment="flash-player-kde4-11.2.202.440-2.29.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0313</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0313" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0313" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in February 2015, a different vulnerability than CVE-2015-0315, CVE-2015-0320, and CVE-2015-0322.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117568" comment="flash-player-11.2.202.442-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117569" comment="flash-player-gnome-11.2.202.442-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117570" comment="flash-player-kde4-11.2.202.442-2.33.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0314</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0314" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0314" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0316, CVE-2015-0318, CVE-2015-0321, CVE-2015-0329, and CVE-2015-0330.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117568" comment="flash-player-11.2.202.442-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117569" comment="flash-player-gnome-11.2.202.442-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117570" comment="flash-player-kde4-11.2.202.442-2.33.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0315</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0315" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0315" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0313, CVE-2015-0320, and CVE-2015-0322.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117568" comment="flash-player-11.2.202.442-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117569" comment="flash-player-gnome-11.2.202.442-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117570" comment="flash-player-kde4-11.2.202.442-2.33.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0316</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0316" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0316" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0314, CVE-2015-0318, CVE-2015-0321, CVE-2015-0329, and CVE-2015-0330.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117568" comment="flash-player-11.2.202.442-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117569" comment="flash-player-gnome-11.2.202.442-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117570" comment="flash-player-kde4-11.2.202.442-2.33.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0317</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0317" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0317" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-0319.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117568" comment="flash-player-11.2.202.442-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117569" comment="flash-player-gnome-11.2.202.442-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117570" comment="flash-player-kde4-11.2.202.442-2.33.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0318</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0318" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0318" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0314, CVE-2015-0316, CVE-2015-0321, CVE-2015-0329, and CVE-2015-0330.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117568" comment="flash-player-11.2.202.442-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117569" comment="flash-player-gnome-11.2.202.442-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117570" comment="flash-player-kde4-11.2.202.442-2.33.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0319</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0319" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0319" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-0317.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117568" comment="flash-player-11.2.202.442-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117569" comment="flash-player-gnome-11.2.202.442-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117570" comment="flash-player-kde4-11.2.202.442-2.33.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150320" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0320</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0320" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0320" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0313, CVE-2015-0315, and CVE-2015-0322.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117568" comment="flash-player-11.2.202.442-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117569" comment="flash-player-gnome-11.2.202.442-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117570" comment="flash-player-kde4-11.2.202.442-2.33.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0321</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0321" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0321" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0314, CVE-2015-0316, CVE-2015-0318, CVE-2015-0329, and CVE-2015-0330.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117568" comment="flash-player-11.2.202.442-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117569" comment="flash-player-gnome-11.2.202.442-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117570" comment="flash-player-kde4-11.2.202.442-2.33.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0322</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0322" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0322" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0313, CVE-2015-0315, and CVE-2015-0320.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117568" comment="flash-player-11.2.202.442-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117569" comment="flash-player-gnome-11.2.202.442-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117570" comment="flash-player-kde4-11.2.202.442-2.33.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0323</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0323" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0323" source="CVE"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0327.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117568" comment="flash-player-11.2.202.442-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117569" comment="flash-player-gnome-11.2.202.442-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117570" comment="flash-player-kde4-11.2.202.442-2.33.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0324</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0324" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0324" source="CVE"/>
    <description>
    Buffer overflow in Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117568" comment="flash-player-11.2.202.442-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117569" comment="flash-player-gnome-11.2.202.442-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117570" comment="flash-player-kde4-11.2.202.442-2.33.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0325</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0325" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0325" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via unknown vectors, a different vulnerability than CVE-2015-0326 and CVE-2015-0328.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117568" comment="flash-player-11.2.202.442-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117569" comment="flash-player-gnome-11.2.202.442-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117570" comment="flash-player-kde4-11.2.202.442-2.33.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0326</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0326" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0326" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via unknown vectors, a different vulnerability than CVE-2015-0325 and CVE-2015-0328.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117568" comment="flash-player-11.2.202.442-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117569" comment="flash-player-gnome-11.2.202.442-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117570" comment="flash-player-kde4-11.2.202.442-2.33.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0327</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0327" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0327" source="CVE"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0323.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117568" comment="flash-player-11.2.202.442-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117569" comment="flash-player-gnome-11.2.202.442-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117570" comment="flash-player-kde4-11.2.202.442-2.33.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0328</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0328" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0328" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via unknown vectors, a different vulnerability than CVE-2015-0325 and CVE-2015-0326.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117568" comment="flash-player-11.2.202.442-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117569" comment="flash-player-gnome-11.2.202.442-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117570" comment="flash-player-kde4-11.2.202.442-2.33.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0329</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0329" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0329" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0314, CVE-2015-0316, CVE-2015-0318, CVE-2015-0321, and CVE-2015-0330.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117568" comment="flash-player-11.2.202.442-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117569" comment="flash-player-gnome-11.2.202.442-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117570" comment="flash-player-kde4-11.2.202.442-2.33.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0330</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0330" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0330" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0314, CVE-2015-0316, CVE-2015-0318, CVE-2015-0321, and CVE-2015-0329.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117568" comment="flash-player-11.2.202.442-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117569" comment="flash-player-gnome-11.2.202.442-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117570" comment="flash-player-kde4-11.2.202.442-2.33.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0332</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0332" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0332" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0333, CVE-2015-0335, and CVE-2015-0339.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117571" comment="flash-player-11.2.202.451-2.45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117572" comment="flash-player-gnome-11.2.202.451-2.45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117573" comment="flash-player-kde4-11.2.202.451-2.45.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150333" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0333</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0333" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0333" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0332, CVE-2015-0335, and CVE-2015-0339.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117571" comment="flash-player-11.2.202.451-2.45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117572" comment="flash-player-gnome-11.2.202.451-2.45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117573" comment="flash-player-kde4-11.2.202.451-2.45.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150334" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0334</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0334" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0334" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-0336.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117571" comment="flash-player-11.2.202.451-2.45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117572" comment="flash-player-gnome-11.2.202.451-2.45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117573" comment="flash-player-kde4-11.2.202.451-2.45.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0335</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0335" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0335" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0332, CVE-2015-0333, and CVE-2015-0339.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117571" comment="flash-player-11.2.202.451-2.45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117572" comment="flash-player-gnome-11.2.202.451-2.45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117573" comment="flash-player-kde4-11.2.202.451-2.45.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0336</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0336" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0336" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-0334.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117571" comment="flash-player-11.2.202.451-2.45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117572" comment="flash-player-gnome-11.2.202.451-2.45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117573" comment="flash-player-kde4-11.2.202.451-2.45.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0337</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0337" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0337" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows remote attackers to bypass the Same Origin Policy via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117571" comment="flash-player-11.2.202.451-2.45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117572" comment="flash-player-gnome-11.2.202.451-2.45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117573" comment="flash-player-kde4-11.2.202.451-2.45.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0338</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0338" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0338" source="CVE"/>
    <description>
    Integer overflow in Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows attackers to execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117571" comment="flash-player-11.2.202.451-2.45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117572" comment="flash-player-gnome-11.2.202.451-2.45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117573" comment="flash-player-kde4-11.2.202.451-2.45.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0339</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0339" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0339" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0332, CVE-2015-0333, and CVE-2015-0335.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117571" comment="flash-player-11.2.202.451-2.45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117572" comment="flash-player-gnome-11.2.202.451-2.45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117573" comment="flash-player-kde4-11.2.202.451-2.45.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0340</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0340" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0340" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows remote attackers to bypass intended file-upload restrictions via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117571" comment="flash-player-11.2.202.451-2.45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117572" comment="flash-player-gnome-11.2.202.451-2.45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117573" comment="flash-player-kde4-11.2.202.451-2.45.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0341</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0341" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0341" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0342.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117571" comment="flash-player-11.2.202.451-2.45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117572" comment="flash-player-gnome-11.2.202.451-2.45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117573" comment="flash-player-kde4-11.2.202.451-2.45.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0342</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0342" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0342" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.277 and 14.x through 17.x before 17.0.0.134 on Windows and OS X and before 11.2.202.451 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0341.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117571" comment="flash-player-11.2.202.451-2.45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117572" comment="flash-player-gnome-11.2.202.451-2.45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117573" comment="flash-player-kde4-11.2.202.451-2.45.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0346</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0346" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0346" source="CVE"/>
    <description>
    Double free vulnerability in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0359.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117577" comment="flash-player-11.2.202.457-2.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117578" comment="flash-player-gnome-11.2.202.457-2.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117579" comment="flash-player-kde4-11.2.202.457-2.48.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0347</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0347" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0347" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, CVE-2015-3042, and CVE-2015-3043.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117577" comment="flash-player-11.2.202.457-2.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117578" comment="flash-player-gnome-11.2.202.457-2.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117579" comment="flash-player-kde4-11.2.202.457-2.48.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0348</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0348" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0348" source="CVE"/>
    <description>
    Buffer overflow in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117577" comment="flash-player-11.2.202.457-2.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117578" comment="flash-player-gnome-11.2.202.457-2.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117579" comment="flash-player-kde4-11.2.202.457-2.48.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0349</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0349" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0349" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0351, CVE-2015-0358, and CVE-2015-3039.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117577" comment="flash-player-11.2.202.457-2.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117578" comment="flash-player-gnome-11.2.202.457-2.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117579" comment="flash-player-kde4-11.2.202.457-2.48.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0350</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0350" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0350" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, CVE-2015-3042, and CVE-2015-3043.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117577" comment="flash-player-11.2.202.457-2.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117578" comment="flash-player-gnome-11.2.202.457-2.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117579" comment="flash-player-kde4-11.2.202.457-2.48.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0351</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0351" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0351" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0349, CVE-2015-0358, and CVE-2015-3039.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117577" comment="flash-player-11.2.202.457-2.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117578" comment="flash-player-gnome-11.2.202.457-2.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117579" comment="flash-player-kde4-11.2.202.457-2.48.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0352</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0352" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0352" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, CVE-2015-3042, and CVE-2015-3043.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117577" comment="flash-player-11.2.202.457-2.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117578" comment="flash-player-gnome-11.2.202.457-2.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117579" comment="flash-player-kde4-11.2.202.457-2.48.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0353</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0353" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0353" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, CVE-2015-3042, and CVE-2015-3043.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117577" comment="flash-player-11.2.202.457-2.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117578" comment="flash-player-gnome-11.2.202.457-2.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117579" comment="flash-player-kde4-11.2.202.457-2.48.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0354</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0354" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0354" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, CVE-2015-3042, and CVE-2015-3043.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117577" comment="flash-player-11.2.202.457-2.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117578" comment="flash-player-gnome-11.2.202.457-2.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117579" comment="flash-player-kde4-11.2.202.457-2.48.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0355</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0355" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0355" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, CVE-2015-3042, and CVE-2015-3043.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117577" comment="flash-player-11.2.202.457-2.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117578" comment="flash-player-gnome-11.2.202.457-2.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117579" comment="flash-player-kde4-11.2.202.457-2.48.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0356</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0356" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0356" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code by leveraging an unspecified "type confusion."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117577" comment="flash-player-11.2.202.457-2.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117578" comment="flash-player-gnome-11.2.202.457-2.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117579" comment="flash-player-kde4-11.2.202.457-2.48.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0357</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0357" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0357" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux does not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism via unspecified vectors, a different vulnerability than CVE-2015-3040.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117577" comment="flash-player-11.2.202.457-2.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117578" comment="flash-player-gnome-11.2.202.457-2.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117579" comment="flash-player-kde4-11.2.202.457-2.48.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0358</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0358" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0358" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0349, CVE-2015-0351, and CVE-2015-3039.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117577" comment="flash-player-11.2.202.457-2.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117578" comment="flash-player-gnome-11.2.202.457-2.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117579" comment="flash-player-kde4-11.2.202.457-2.48.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0359</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0359" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0359" source="CVE"/>
    <description>
    Double free vulnerability in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0346.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117577" comment="flash-player-11.2.202.457-2.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117578" comment="flash-player-gnome-11.2.202.457-2.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117579" comment="flash-player-kde4-11.2.202.457-2.48.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0360</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-0360" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0360" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-3038, CVE-2015-3041, CVE-2015-3042, and CVE-2015-3043.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117577" comment="flash-player-11.2.202.457-2.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117578" comment="flash-player-gnome-11.2.202.457-2.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117579" comment="flash-player-kde4-11.2.202.457-2.48.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0361</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0361" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0361" source="CVE"/>
    <description>
    Use-after-free vulnerability in Xen 4.2.x, 4.3.x, and 4.4.x allows remote domains to cause a denial of service (system crash) via a crafted hypercall during HVM guest teardown.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105983" comment="xen-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105984" comment="xen-devel-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105988" comment="xen-doc-html-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105989" comment="xen-kmp-default-4.4.1_08_k3.16.7_7-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105990" comment="xen-kmp-desktop-4.4.1_08_k3.16.7_7-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105986" comment="xen-libs-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105985" comment="xen-libs-32bit-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105991" comment="xen-tools-4.4.1_08-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105987" comment="xen-tools-domU-4.4.1_08-9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0374</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0374" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0374" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Security : Privileges : Foreign Key.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111084" comment="libmysqlclient-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111085" comment="libmysqlclient18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111086" comment="libmysqlclient18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111087" comment="libmysqlclient_r18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111088" comment="libmysqlclient_r18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111089" comment="libmysqld-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111090" comment="libmysqld18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111091" comment="mariadb-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111092" comment="mariadb-bench-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111093" comment="mariadb-client-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111094" comment="mariadb-errormessages-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111095" comment="mariadb-test-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111096" comment="mariadb-tools-10.0.20-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0377</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0377" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0377" source="CVE"/>
    <description>
    Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox prior to 3.2.26, 4.0.28, 4.1.36, and 4.2.28 allows local users to affect availability via unknown vectors related to Core, a different vulnerability than CVE-2015-0418.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105911" comment="python-virtualbox-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105912" comment="virtualbox-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105913" comment="virtualbox-devel-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105914" comment="virtualbox-guest-desktop-icons-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105915" comment="virtualbox-guest-kmp-default-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105916" comment="virtualbox-guest-kmp-desktop-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105917" comment="virtualbox-guest-kmp-pae-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105918" comment="virtualbox-guest-tools-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105919" comment="virtualbox-guest-x11-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105920" comment="virtualbox-host-kmp-default-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105921" comment="virtualbox-host-kmp-desktop-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105922" comment="virtualbox-host-kmp-pae-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105923" comment="virtualbox-qt-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105924" comment="virtualbox-websrv-4.3.20-7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0381</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0381" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0381" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0382.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111084" comment="libmysqlclient-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111085" comment="libmysqlclient18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111086" comment="libmysqlclient18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111087" comment="libmysqlclient_r18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111088" comment="libmysqlclient_r18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111089" comment="libmysqld-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111090" comment="libmysqld18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111091" comment="mariadb-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111092" comment="mariadb-bench-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111093" comment="mariadb-client-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111094" comment="mariadb-errormessages-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111095" comment="mariadb-test-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111096" comment="mariadb-tools-10.0.20-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0382</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0382" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0382" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier and 5.6.21 and earlier allows remote attackers to affect availability via unknown vectors related to Server : Replication, a different vulnerability than CVE-2015-0381.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111084" comment="libmysqlclient-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111085" comment="libmysqlclient18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111086" comment="libmysqlclient18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111087" comment="libmysqlclient_r18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111088" comment="libmysqlclient_r18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111089" comment="libmysqld-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111090" comment="libmysqld18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111091" comment="mariadb-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111092" comment="mariadb-bench-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111093" comment="mariadb-client-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111094" comment="mariadb-errormessages-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111095" comment="mariadb-test-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111096" comment="mariadb-tools-10.0.20-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0383</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0383" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25; Java SE Embedded 7u71 and 8u6; and JRockit R27.8.4 and R28.3.4 allows local users to affect integrity and availability via unknown vectors related to Hotspot.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105731" comment="java-1_7_0-openjdk-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105732" comment="java-1_7_0-openjdk-accessibility-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105728" comment="java-1_7_0-openjdk-bootstrap-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105729" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105730" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105733" comment="java-1_7_0-openjdk-demo-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105734" comment="java-1_7_0-openjdk-devel-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105735" comment="java-1_7_0-openjdk-headless-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105736" comment="java-1_7_0-openjdk-javadoc-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105737" comment="java-1_7_0-openjdk-src-1.7.0.75-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0395</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0395" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105731" comment="java-1_7_0-openjdk-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105732" comment="java-1_7_0-openjdk-accessibility-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105728" comment="java-1_7_0-openjdk-bootstrap-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105729" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105730" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105733" comment="java-1_7_0-openjdk-demo-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105734" comment="java-1_7_0-openjdk-devel-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105735" comment="java-1_7_0-openjdk-headless-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105736" comment="java-1_7_0-openjdk-javadoc-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105737" comment="java-1_7_0-openjdk-src-1.7.0.75-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0400</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0400" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0400" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality via unknown vectors related to Libraries.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105731" comment="java-1_7_0-openjdk-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105732" comment="java-1_7_0-openjdk-accessibility-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105728" comment="java-1_7_0-openjdk-bootstrap-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105729" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105730" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105733" comment="java-1_7_0-openjdk-demo-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105734" comment="java-1_7_0-openjdk-devel-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105735" comment="java-1_7_0-openjdk-headless-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105736" comment="java-1_7_0-openjdk-javadoc-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105737" comment="java-1_7_0-openjdk-src-1.7.0.75-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0407</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0407" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality via unknown vectors related to Swing.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105731" comment="java-1_7_0-openjdk-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105732" comment="java-1_7_0-openjdk-accessibility-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105728" comment="java-1_7_0-openjdk-bootstrap-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105729" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105730" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105733" comment="java-1_7_0-openjdk-demo-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105734" comment="java-1_7_0-openjdk-devel-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105735" comment="java-1_7_0-openjdk-headless-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105736" comment="java-1_7_0-openjdk-javadoc-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105737" comment="java-1_7_0-openjdk-src-1.7.0.75-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0408</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0408" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105731" comment="java-1_7_0-openjdk-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105732" comment="java-1_7_0-openjdk-accessibility-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105728" comment="java-1_7_0-openjdk-bootstrap-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105729" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105730" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105733" comment="java-1_7_0-openjdk-demo-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105734" comment="java-1_7_0-openjdk-devel-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105735" comment="java-1_7_0-openjdk-headless-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105736" comment="java-1_7_0-openjdk-javadoc-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105737" comment="java-1_7_0-openjdk-src-1.7.0.75-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0410</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0410" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java SE, Java SE Embedded, JRockit component in Oracle Java SE 5.0u75, 6u85, 7u72, and 8u25; Java SE Embedded 7u71 and 8u6; and JRockit R27.8.4 and R28.3.4 allows remote attackers to affect availability via unknown vectors related to Security.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105731" comment="java-1_7_0-openjdk-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105732" comment="java-1_7_0-openjdk-accessibility-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105728" comment="java-1_7_0-openjdk-bootstrap-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105729" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105730" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105733" comment="java-1_7_0-openjdk-demo-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105734" comment="java-1_7_0-openjdk-devel-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105735" comment="java-1_7_0-openjdk-headless-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105736" comment="java-1_7_0-openjdk-javadoc-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105737" comment="java-1_7_0-openjdk-src-1.7.0.75-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0411</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0411" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0411" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier, and 5.6.21 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Server : Security : Encryption.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111084" comment="libmysqlclient-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111085" comment="libmysqlclient18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111086" comment="libmysqlclient18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111087" comment="libmysqlclient_r18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111088" comment="libmysqlclient_r18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111089" comment="libmysqld-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111090" comment="libmysqld18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111091" comment="mariadb-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111092" comment="mariadb-bench-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111093" comment="mariadb-client-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111094" comment="mariadb-errormessages-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111095" comment="mariadb-test-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111096" comment="mariadb-tools-10.0.20-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0412</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0412" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAX-WS.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105731" comment="java-1_7_0-openjdk-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105732" comment="java-1_7_0-openjdk-accessibility-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105728" comment="java-1_7_0-openjdk-bootstrap-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105729" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105730" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105733" comment="java-1_7_0-openjdk-demo-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105734" comment="java-1_7_0-openjdk-devel-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105735" comment="java-1_7_0-openjdk-headless-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105736" comment="java-1_7_0-openjdk-javadoc-1.7.0.75-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105737" comment="java-1_7_0-openjdk-src-1.7.0.75-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0418</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0418" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0418" source="CVE"/>
    <description>
    Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox prior to 3.2.26, 4.0.28, 4.1.36, and 4.2.28 allows local users to affect availability via unknown vectors related to Core, a different vulnerability than CVE-2015-0377.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105911" comment="python-virtualbox-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105912" comment="virtualbox-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105913" comment="virtualbox-devel-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105914" comment="virtualbox-guest-desktop-icons-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105915" comment="virtualbox-guest-kmp-default-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105916" comment="virtualbox-guest-kmp-desktop-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105917" comment="virtualbox-guest-kmp-pae-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105918" comment="virtualbox-guest-tools-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105919" comment="virtualbox-guest-x11-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105920" comment="virtualbox-host-kmp-default-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105921" comment="virtualbox-host-kmp-desktop-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105922" comment="virtualbox-host-kmp-pae-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105923" comment="virtualbox-qt-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105924" comment="virtualbox-websrv-4.3.20-7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0427</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0427" source="CVE"/>
    <description>
    Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox prior to 4.3.20 allows local users to affect integrity and availability via vectors related to VMSVGA virtual graphics device, a different vulnerability than CVE-2014-6588, CVE-2014-6589, CVE-2014-6590, and CVE-2014-6595.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105911" comment="python-virtualbox-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105912" comment="virtualbox-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105913" comment="virtualbox-devel-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105914" comment="virtualbox-guest-desktop-icons-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105915" comment="virtualbox-guest-kmp-default-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105916" comment="virtualbox-guest-kmp-desktop-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105917" comment="virtualbox-guest-kmp-pae-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105918" comment="virtualbox-guest-tools-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105919" comment="virtualbox-guest-x11-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105920" comment="virtualbox-host-kmp-default-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105921" comment="virtualbox-host-kmp-desktop-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105922" comment="virtualbox-host-kmp-pae-4.3.20_k3.16.7_7-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105923" comment="virtualbox-qt-4.3.20-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105924" comment="virtualbox-websrv-4.3.20-7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0432</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0432" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0432" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.40 and earlier allows remote authenticated users to affect availability via vectors related to Server : InnoDB : DDL : Foreign Key.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111084" comment="libmysqlclient-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111085" comment="libmysqlclient18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111086" comment="libmysqlclient18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111087" comment="libmysqlclient_r18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111088" comment="libmysqlclient_r18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111089" comment="libmysqld-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111090" comment="libmysqld18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111091" comment="mariadb-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111092" comment="mariadb-bench-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111093" comment="mariadb-client-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111094" comment="mariadb-errormessages-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111095" comment="mariadb-test-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111096" comment="mariadb-tools-10.0.20-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0433</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0433" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0433" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via vectors related to InnoDB : DML.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111084" comment="libmysqlclient-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111085" comment="libmysqlclient18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111086" comment="libmysqlclient18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111087" comment="libmysqlclient_r18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111088" comment="libmysqlclient_r18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111089" comment="libmysqld-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111090" comment="libmysqld18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111091" comment="mariadb-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111092" comment="mariadb-bench-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111093" comment="mariadb-client-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111094" comment="mariadb-errormessages-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111095" comment="mariadb-test-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111096" comment="mariadb-tools-10.0.20-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0441</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0441" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0441" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Security : Encryption.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111084" comment="libmysqlclient-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111085" comment="libmysqlclient18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111086" comment="libmysqlclient18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111087" comment="libmysqlclient_r18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111088" comment="libmysqlclient_r18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111089" comment="libmysqld-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111090" comment="libmysqld18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111091" comment="mariadb-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111092" comment="mariadb-bench-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111093" comment="mariadb-client-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111094" comment="mariadb-errormessages-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111095" comment="mariadb-test-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111096" comment="mariadb-tools-10.0.20-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0458</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0458" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0458" source="CVE"/>
    <description>
    Unspecified vulnerability in in Oracle Java SE 6u91, 7u76, and 8u40 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109107" comment="java-1_7_0-openjdk-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109108" comment="java-1_7_0-openjdk-accessibility-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109109" comment="java-1_7_0-openjdk-demo-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109110" comment="java-1_7_0-openjdk-devel-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109111" comment="java-1_7_0-openjdk-headless-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109112" comment="java-1_7_0-openjdk-javadoc-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109113" comment="java-1_7_0-openjdk-src-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109114" comment="java-1_8_0-openjdk-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109115" comment="java-1_8_0-openjdk-accessibility-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109116" comment="java-1_8_0-openjdk-demo-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109117" comment="java-1_8_0-openjdk-devel-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109118" comment="java-1_8_0-openjdk-headless-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109119" comment="java-1_8_0-openjdk-javadoc-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109120" comment="java-1_8_0-openjdk-src-1.8.0.45-9.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0459</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0459" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0459" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40, and JavaFX 2.2.76, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2015-0491.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109107" comment="java-1_7_0-openjdk-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109108" comment="java-1_7_0-openjdk-accessibility-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109109" comment="java-1_7_0-openjdk-demo-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109110" comment="java-1_7_0-openjdk-devel-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109111" comment="java-1_7_0-openjdk-headless-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109112" comment="java-1_7_0-openjdk-javadoc-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109113" comment="java-1_7_0-openjdk-src-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109114" comment="java-1_8_0-openjdk-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109115" comment="java-1_8_0-openjdk-accessibility-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109116" comment="java-1_8_0-openjdk-demo-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109117" comment="java-1_8_0-openjdk-devel-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109118" comment="java-1_8_0-openjdk-headless-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109119" comment="java-1_8_0-openjdk-javadoc-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109120" comment="java-1_8_0-openjdk-src-1.8.0.45-9.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0460</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0460" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0460" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109107" comment="java-1_7_0-openjdk-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109108" comment="java-1_7_0-openjdk-accessibility-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109109" comment="java-1_7_0-openjdk-demo-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109110" comment="java-1_7_0-openjdk-devel-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109111" comment="java-1_7_0-openjdk-headless-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109112" comment="java-1_7_0-openjdk-javadoc-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109113" comment="java-1_7_0-openjdk-src-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109114" comment="java-1_8_0-openjdk-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109115" comment="java-1_8_0-openjdk-accessibility-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109116" comment="java-1_8_0-openjdk-demo-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109117" comment="java-1_8_0-openjdk-devel-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109118" comment="java-1_8_0-openjdk-headless-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109119" comment="java-1_8_0-openjdk-javadoc-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109120" comment="java-1_8_0-openjdk-src-1.8.0.45-9.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0469</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0469" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109107" comment="java-1_7_0-openjdk-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109108" comment="java-1_7_0-openjdk-accessibility-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109109" comment="java-1_7_0-openjdk-demo-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109110" comment="java-1_7_0-openjdk-devel-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109111" comment="java-1_7_0-openjdk-headless-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109112" comment="java-1_7_0-openjdk-javadoc-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109113" comment="java-1_7_0-openjdk-src-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109114" comment="java-1_8_0-openjdk-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109115" comment="java-1_8_0-openjdk-accessibility-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109116" comment="java-1_8_0-openjdk-demo-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109117" comment="java-1_8_0-openjdk-devel-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109118" comment="java-1_8_0-openjdk-headless-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109119" comment="java-1_8_0-openjdk-javadoc-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109120" comment="java-1_8_0-openjdk-src-1.8.0.45-9.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0470</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0470" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0470" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u40 allows remote attackers to affect integrity via unknown vectors related to Hotspot.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109114" comment="java-1_8_0-openjdk-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109115" comment="java-1_8_0-openjdk-accessibility-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109116" comment="java-1_8_0-openjdk-demo-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109117" comment="java-1_8_0-openjdk-devel-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109118" comment="java-1_8_0-openjdk-headless-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109119" comment="java-1_8_0-openjdk-javadoc-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109120" comment="java-1_8_0-openjdk-src-1.8.0.45-9.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0477</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0477" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40 allows remote attackers to affect integrity via unknown vectors related to Beans.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109107" comment="java-1_7_0-openjdk-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109108" comment="java-1_7_0-openjdk-accessibility-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109109" comment="java-1_7_0-openjdk-demo-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109110" comment="java-1_7_0-openjdk-devel-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109111" comment="java-1_7_0-openjdk-headless-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109112" comment="java-1_7_0-openjdk-javadoc-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109113" comment="java-1_7_0-openjdk-src-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109114" comment="java-1_8_0-openjdk-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109115" comment="java-1_8_0-openjdk-accessibility-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109116" comment="java-1_8_0-openjdk-demo-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109117" comment="java-1_8_0-openjdk-devel-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109118" comment="java-1_8_0-openjdk-headless-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109119" comment="java-1_8_0-openjdk-javadoc-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109120" comment="java-1_8_0-openjdk-src-1.8.0.45-9.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0478</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0478" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40, and JRockit R28.3.5, allows remote attackers to affect confidentiality via vectors related to JCE.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109107" comment="java-1_7_0-openjdk-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109108" comment="java-1_7_0-openjdk-accessibility-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109109" comment="java-1_7_0-openjdk-demo-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109110" comment="java-1_7_0-openjdk-devel-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109111" comment="java-1_7_0-openjdk-headless-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109112" comment="java-1_7_0-openjdk-javadoc-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109113" comment="java-1_7_0-openjdk-src-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109114" comment="java-1_8_0-openjdk-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109115" comment="java-1_8_0-openjdk-accessibility-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109116" comment="java-1_8_0-openjdk-demo-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109117" comment="java-1_8_0-openjdk-devel-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109118" comment="java-1_8_0-openjdk-headless-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109119" comment="java-1_8_0-openjdk-javadoc-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109120" comment="java-1_8_0-openjdk-src-1.8.0.45-9.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0480</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0480" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40 allows remote attackers to affect integrity and availability via unknown vectors related to Tools.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109107" comment="java-1_7_0-openjdk-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109108" comment="java-1_7_0-openjdk-accessibility-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109109" comment="java-1_7_0-openjdk-demo-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109110" comment="java-1_7_0-openjdk-devel-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109111" comment="java-1_7_0-openjdk-headless-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109112" comment="java-1_7_0-openjdk-javadoc-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109113" comment="java-1_7_0-openjdk-src-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109114" comment="java-1_8_0-openjdk-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109115" comment="java-1_8_0-openjdk-accessibility-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109116" comment="java-1_8_0-openjdk-demo-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109117" comment="java-1_8_0-openjdk-devel-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109118" comment="java-1_8_0-openjdk-headless-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109119" comment="java-1_8_0-openjdk-javadoc-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109120" comment="java-1_8_0-openjdk-src-1.8.0.45-9.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0484</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0484" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0484" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u76 and 8u40, and Java FX 2.2.76, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2015-0492.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109107" comment="java-1_7_0-openjdk-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109108" comment="java-1_7_0-openjdk-accessibility-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109109" comment="java-1_7_0-openjdk-demo-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109110" comment="java-1_7_0-openjdk-devel-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109111" comment="java-1_7_0-openjdk-headless-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109112" comment="java-1_7_0-openjdk-javadoc-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109113" comment="java-1_7_0-openjdk-src-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109114" comment="java-1_8_0-openjdk-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109115" comment="java-1_8_0-openjdk-accessibility-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109116" comment="java-1_8_0-openjdk-demo-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109117" comment="java-1_8_0-openjdk-devel-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109118" comment="java-1_8_0-openjdk-headless-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109119" comment="java-1_8_0-openjdk-javadoc-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109120" comment="java-1_8_0-openjdk-src-1.8.0.45-9.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0486</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0486" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0486" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u40 allows remote attackers to affect confidentiality via unknown vectors related to Deployment.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109114" comment="java-1_8_0-openjdk-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109115" comment="java-1_8_0-openjdk-accessibility-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109116" comment="java-1_8_0-openjdk-demo-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109117" comment="java-1_8_0-openjdk-devel-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109118" comment="java-1_8_0-openjdk-headless-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109119" comment="java-1_8_0-openjdk-javadoc-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109120" comment="java-1_8_0-openjdk-src-1.8.0.45-9.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0488</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0488" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40, and JRockit R28.3.5, allows remote attackers to affect availability via vectors related to JSSE.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109107" comment="java-1_7_0-openjdk-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109108" comment="java-1_7_0-openjdk-accessibility-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109109" comment="java-1_7_0-openjdk-demo-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109110" comment="java-1_7_0-openjdk-devel-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109111" comment="java-1_7_0-openjdk-headless-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109112" comment="java-1_7_0-openjdk-javadoc-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109113" comment="java-1_7_0-openjdk-src-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109114" comment="java-1_8_0-openjdk-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109115" comment="java-1_8_0-openjdk-accessibility-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109116" comment="java-1_8_0-openjdk-demo-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109117" comment="java-1_8_0-openjdk-devel-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109118" comment="java-1_8_0-openjdk-headless-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109119" comment="java-1_8_0-openjdk-javadoc-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109120" comment="java-1_8_0-openjdk-src-1.8.0.45-9.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0491</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0491" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0491" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40, and Java FX 2.2.76, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2015-0459.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109107" comment="java-1_7_0-openjdk-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109108" comment="java-1_7_0-openjdk-accessibility-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109109" comment="java-1_7_0-openjdk-demo-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109110" comment="java-1_7_0-openjdk-devel-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109111" comment="java-1_7_0-openjdk-headless-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109112" comment="java-1_7_0-openjdk-javadoc-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109113" comment="java-1_7_0-openjdk-src-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109114" comment="java-1_8_0-openjdk-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109115" comment="java-1_8_0-openjdk-accessibility-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109116" comment="java-1_8_0-openjdk-demo-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109117" comment="java-1_8_0-openjdk-devel-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109118" comment="java-1_8_0-openjdk-headless-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109119" comment="java-1_8_0-openjdk-javadoc-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109120" comment="java-1_8_0-openjdk-src-1.8.0.45-9.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0492</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0492" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0492" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u76 and 8u40, and JavaFX 2.2.76, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2015-0484.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109107" comment="java-1_7_0-openjdk-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109108" comment="java-1_7_0-openjdk-accessibility-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109109" comment="java-1_7_0-openjdk-demo-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109110" comment="java-1_7_0-openjdk-devel-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109111" comment="java-1_7_0-openjdk-headless-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109112" comment="java-1_7_0-openjdk-javadoc-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109113" comment="java-1_7_0-openjdk-src-1.7.0.79-7.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109114" comment="java-1_8_0-openjdk-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109115" comment="java-1_8_0-openjdk-accessibility-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109116" comment="java-1_8_0-openjdk-demo-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109117" comment="java-1_8_0-openjdk-devel-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109118" comment="java-1_8_0-openjdk-headless-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109119" comment="java-1_8_0-openjdk-javadoc-1.8.0.45-9.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109120" comment="java-1_8_0-openjdk-src-1.8.0.45-9.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0499</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0499" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0499" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Federated.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111084" comment="libmysqlclient-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111085" comment="libmysqlclient18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111086" comment="libmysqlclient18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111087" comment="libmysqlclient_r18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111088" comment="libmysqlclient_r18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111089" comment="libmysqld-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111090" comment="libmysqld18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111091" comment="mariadb-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111092" comment="mariadb-bench-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111093" comment="mariadb-client-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111094" comment="mariadb-errormessages-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111095" comment="mariadb-test-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111096" comment="mariadb-tools-10.0.20-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0501</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0501" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0501" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Compiling.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111084" comment="libmysqlclient-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111085" comment="libmysqlclient18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111086" comment="libmysqlclient18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111087" comment="libmysqlclient_r18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111088" comment="libmysqlclient_r18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111089" comment="libmysqld-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111090" comment="libmysqld18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111091" comment="mariadb-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111092" comment="mariadb-bench-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111093" comment="mariadb-client-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111094" comment="mariadb-errormessages-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111095" comment="mariadb-test-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111096" comment="mariadb-tools-10.0.20-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0505</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0505" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0505" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via vectors related to DDL.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111084" comment="libmysqlclient-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111085" comment="libmysqlclient18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111086" comment="libmysqlclient18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111087" comment="libmysqlclient_r18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111088" comment="libmysqlclient_r18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111089" comment="libmysqld-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111090" comment="libmysqld18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111091" comment="mariadb-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111092" comment="mariadb-bench-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111093" comment="mariadb-client-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111094" comment="mariadb-errormessages-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111095" comment="mariadb-test-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111096" comment="mariadb-tools-10.0.20-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0552</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0552" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0552" source="CVE"/>
    <description>
    Directory traversal vulnerability in the gcab_folder_extract function in libgcab/gcab-folder.c in gcab 0.4 allows remote attackers to write to arbitrary files via crafted path in a CAB file, as demonstrated by "\tmp\moo."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105116" comment="gcab-0.4-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105117" comment="gcab-devel-0.4-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105118" comment="gcab-lang-0.4-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105119" comment="libgcab-1_0-0-0.4-4.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0559</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0559" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0559" source="CVE"/>
    <description>
    Multiple use-after-free vulnerabilities in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allow remote attackers to cause a denial of service (application crash) via a crafted packet, related to the use of packet-scope memory instead of pinfo-scope memory.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105264" comment="wireshark-1.12.3-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105265" comment="wireshark-devel-1.12.3-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105266" comment="wireshark-ui-gtk-1.12.3-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105267" comment="wireshark-ui-qt-1.12.3-8.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0560</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0560" source="CVE"/>
    <description>
    The dissect_wccp2r1_address_table_info function in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 does not initialize certain data structures, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105264" comment="wireshark-1.12.3-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105265" comment="wireshark-devel-1.12.3-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105266" comment="wireshark-ui-gtk-1.12.3-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105267" comment="wireshark-ui-qt-1.12.3-8.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0561</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0561" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0561" source="CVE"/>
    <description>
    asn1/lpp/lpp.cnf in the LPP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 does not validate a certain index value, which allows remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105264" comment="wireshark-1.12.3-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105265" comment="wireshark-devel-1.12.3-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105266" comment="wireshark-ui-gtk-1.12.3-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105267" comment="wireshark-ui-qt-1.12.3-8.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0562</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0562" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0562" source="CVE"/>
    <description>
    Multiple use-after-free vulnerabilities in epan/dissectors/packet-dec-dnart.c in the DEC DNA Routing Protocol dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allow remote attackers to cause a denial of service (application crash) via a crafted packet, related to the use of packet-scope memory instead of pinfo-scope memory.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105264" comment="wireshark-1.12.3-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105265" comment="wireshark-devel-1.12.3-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105266" comment="wireshark-ui-gtk-1.12.3-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105267" comment="wireshark-ui-qt-1.12.3-8.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0563</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0563" source="CVE"/>
    <description>
    epan/dissectors/packet-smtp.c in the SMTP dissector in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 uses an incorrect length value for certain string-append operations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105264" comment="wireshark-1.12.3-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105265" comment="wireshark-devel-1.12.3-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105266" comment="wireshark-ui-gtk-1.12.3-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105267" comment="wireshark-ui-qt-1.12.3-8.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0564</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0564" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0564" source="CVE"/>
    <description>
    Buffer underflow in the ssl_decrypt_record function in epan/dissectors/packet-ssl-utils.c in Wireshark 1.10.x before 1.10.12 and 1.12.x before 1.12.3 allows remote attackers to cause a denial of service (application crash) via a crafted packet that is improperly handled during decryption of an SSL session.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105264" comment="wireshark-1.12.3-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105265" comment="wireshark-devel-1.12.3-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105266" comment="wireshark-ui-gtk-1.12.3-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105267" comment="wireshark-ui-qt-1.12.3-8.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0777</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0777" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0777" source="CVE"/>
    <description>
    drivers/xen/usbback/usbback.c in linux-2.6.18-xen-3.4.0 (aka the Xen 3.4.x support patches for the Linux kernel 2.6.18), as used in the Linux kernel 2.6.x and 3.x in SUSE Linux distributions, allows guest OS users to obtain sensitive information from uninitialized locations in host OS kernel memory via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108989" comment="bbswitch-0.8-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108990" comment="bbswitch-kmp-default-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108991" comment="bbswitch-kmp-desktop-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108992" comment="bbswitch-kmp-pae-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108993" comment="bbswitch-kmp-xen-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108994" comment="cloop-2.639-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108995" comment="cloop-kmp-default-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108996" comment="cloop-kmp-desktop-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108997" comment="cloop-kmp-pae-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108998" comment="cloop-kmp-xen-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108999" comment="crash-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109000" comment="crash-devel-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109001" comment="crash-doc-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109002" comment="crash-eppic-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109003" comment="crash-gcore-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109004" comment="crash-kmp-default-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109005" comment="crash-kmp-desktop-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109006" comment="crash-kmp-pae-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109007" comment="crash-kmp-xen-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109008" comment="hdjmod-1.28-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109009" comment="hdjmod-kmp-default-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109010" comment="hdjmod-kmp-desktop-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109011" comment="hdjmod-kmp-pae-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109012" comment="hdjmod-kmp-xen-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109013" comment="ipset-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109014" comment="ipset-devel-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109015" comment="ipset-kmp-default-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109016" comment="ipset-kmp-desktop-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109017" comment="ipset-kmp-pae-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109018" comment="ipset-kmp-xen-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109020" comment="kernel-debug-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109021" comment="kernel-debug-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109022" comment="kernel-debug-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109023" comment="kernel-default-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109024" comment="kernel-default-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109025" comment="kernel-default-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109026" comment="kernel-desktop-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109027" comment="kernel-desktop-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109028" comment="kernel-desktop-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109039" comment="kernel-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109029" comment="kernel-docs-3.16.7-21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109030" comment="kernel-ec2-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109031" comment="kernel-ec2-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109032" comment="kernel-ec2-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109040" comment="kernel-macros-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109033" comment="kernel-obs-build-3.16.7-21.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109035" comment="kernel-obs-qa-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109034" comment="kernel-obs-qa-xen-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109036" comment="kernel-pae-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109037" comment="kernel-pae-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109038" comment="kernel-pae-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109041" comment="kernel-source-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109042" comment="kernel-source-vanilla-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109043" comment="kernel-syms-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109044" comment="kernel-vanilla-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109045" comment="kernel-vanilla-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109046" comment="kernel-xen-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109047" comment="kernel-xen-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109048" comment="kernel-xen-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109019" comment="libipset3-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109049" comment="pcfclock-0.44-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109050" comment="pcfclock-kmp-default-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109051" comment="pcfclock-kmp-desktop-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109052" comment="pcfclock-kmp-pae-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109058" comment="python-virtualbox-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109053" comment="vhba-kmp-20140629-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109054" comment="vhba-kmp-default-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109055" comment="vhba-kmp-desktop-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109056" comment="vhba-kmp-pae-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109057" comment="vhba-kmp-xen-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109059" comment="virtualbox-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109060" comment="virtualbox-devel-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109061" comment="virtualbox-guest-desktop-icons-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109062" comment="virtualbox-guest-kmp-default-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109063" comment="virtualbox-guest-kmp-desktop-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109064" comment="virtualbox-guest-kmp-pae-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109065" comment="virtualbox-guest-tools-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109066" comment="virtualbox-guest-x11-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109067" comment="virtualbox-host-kmp-default-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109068" comment="virtualbox-host-kmp-desktop-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109069" comment="virtualbox-host-kmp-pae-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109070" comment="virtualbox-qt-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109071" comment="virtualbox-websrv-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109072" comment="xen-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109073" comment="xen-devel-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109082" comment="xen-doc-html-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109083" comment="xen-kmp-default-4.4.1_08_k3.16.7_21-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109084" comment="xen-kmp-desktop-4.4.1_08_k3.16.7_21-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109075" comment="xen-libs-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109074" comment="xen-libs-32bit-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109085" comment="xen-tools-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109076" comment="xen-tools-domU-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109077" comment="xtables-addons-2.6-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109078" comment="xtables-addons-kmp-default-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109079" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109080" comment="xtables-addons-kmp-pae-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109081" comment="xtables-addons-kmp-xen-2.6_k3.16.7_21-9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0778</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0778" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0778" source="CVE"/>
    <description>
    osc before 0.151.0 allows remote attackers to execute arbitrary commands via shell metacharacters in a _service file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107657" comment="osc-0.151.0-8.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0794</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0794" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0794" source="CVE"/>
    <description>
    modules.d/90crypt/module-setup.sh in the dracut package before 037-17.30.1 in openSUSE 13.2 allows local users to have unspecified impact via a symlink attack on /tmp/dracut_block_uuid.map.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117999" comment="dracut-037-17.30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118000" comment="dracut-fips-037-17.30.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0797</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0797" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0797" source="CVE"/>
    <description>
    GStreamer before 1.4.5, as used in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 on Linux, allows remote attackers to cause a denial of service (buffer over-read and application crash) or possibly execute arbitrary code via crafted H.264 video data in an m4v file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109786" comment="MozillaThunderbird-31.7.0-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109787" comment="MozillaThunderbird-buildsymbols-31.7.0-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109788" comment="MozillaThunderbird-devel-31.7.0-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109789" comment="MozillaThunderbird-translations-common-31.7.0-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109790" comment="MozillaThunderbird-translations-other-31.7.0-18.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0799</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0799" source="CVE"/>
    <description>
    The HTTP Alternative Services feature in Mozilla Firefox before 37.0.1 allows man-in-the-middle attackers to bypass an intended X.509 certificate-verification step for an SSL server by specifying that server in the uri-host field of an Alt-Svc HTTP/2 response header.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108533" comment="MozillaFirefox-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108534" comment="MozillaFirefox-branding-upstream-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108535" comment="MozillaFirefox-buildsymbols-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108536" comment="MozillaFirefox-devel-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108537" comment="MozillaFirefox-translations-common-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108538" comment="MozillaFirefox-translations-other-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108539" comment="MozillaThunderbird-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108540" comment="MozillaThunderbird-buildsymbols-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108541" comment="MozillaThunderbird-devel-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108542" comment="MozillaThunderbird-translations-common-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108543" comment="MozillaThunderbird-translations-other-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108545" comment="mozilla-nspr-4.10.8-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108544" comment="mozilla-nspr-32bit-4.10.8-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108546" comment="mozilla-nspr-devel-4.10.8-6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0801</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0801" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0801" source="CVE"/>
    <description>
    Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 allow remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code with chrome privileges via vectors involving anchor navigation, a similar issue to CVE-2015-0818.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108533" comment="MozillaFirefox-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108534" comment="MozillaFirefox-branding-upstream-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108535" comment="MozillaFirefox-buildsymbols-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108536" comment="MozillaFirefox-devel-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108537" comment="MozillaFirefox-translations-common-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108538" comment="MozillaFirefox-translations-other-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108539" comment="MozillaThunderbird-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108540" comment="MozillaThunderbird-buildsymbols-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108541" comment="MozillaThunderbird-devel-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108542" comment="MozillaThunderbird-translations-common-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108543" comment="MozillaThunderbird-translations-other-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108545" comment="mozilla-nspr-4.10.8-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108544" comment="mozilla-nspr-32bit-4.10.8-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108546" comment="mozilla-nspr-devel-4.10.8-6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0802</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0802" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0802" source="CVE"/>
    <description>
    Mozilla Firefox before 37.0 relies on docshell type information instead of page principal information for Window.webidl access control, which might allow remote attackers to execute arbitrary JavaScript code with chrome privileges via certain content navigation that leverages the reachability of a privileged window with an unintended persistence of access to restricted internal methods.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108533" comment="MozillaFirefox-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108534" comment="MozillaFirefox-branding-upstream-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108535" comment="MozillaFirefox-buildsymbols-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108536" comment="MozillaFirefox-devel-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108537" comment="MozillaFirefox-translations-common-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108538" comment="MozillaFirefox-translations-other-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108539" comment="MozillaThunderbird-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108540" comment="MozillaThunderbird-buildsymbols-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108541" comment="MozillaThunderbird-devel-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108542" comment="MozillaThunderbird-translations-common-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108543" comment="MozillaThunderbird-translations-other-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108545" comment="mozilla-nspr-4.10.8-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108544" comment="mozilla-nspr-32bit-4.10.8-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108546" comment="mozilla-nspr-devel-4.10.8-6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0803</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0803" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0803" source="CVE"/>
    <description>
    The HTMLSourceElement::AfterSetAttr function in Mozilla Firefox before 37.0 does not properly constrain the original data type of a casted value during the setting of a SOURCE element's attributes, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via a crafted HTML document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108533" comment="MozillaFirefox-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108534" comment="MozillaFirefox-branding-upstream-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108535" comment="MozillaFirefox-buildsymbols-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108536" comment="MozillaFirefox-devel-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108537" comment="MozillaFirefox-translations-common-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108538" comment="MozillaFirefox-translations-other-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108539" comment="MozillaThunderbird-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108540" comment="MozillaThunderbird-buildsymbols-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108541" comment="MozillaThunderbird-devel-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108542" comment="MozillaThunderbird-translations-common-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108543" comment="MozillaThunderbird-translations-other-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108545" comment="mozilla-nspr-4.10.8-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108544" comment="mozilla-nspr-32bit-4.10.8-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108546" comment="mozilla-nspr-devel-4.10.8-6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0804</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0804" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0804" source="CVE"/>
    <description>
    The HTMLSourceElement::BindToTree function in Mozilla Firefox before 37.0 does not properly constrain a data type after omitting namespace validation during certain tree-binding operations, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via a crafted HTML document containing a SOURCE element.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108533" comment="MozillaFirefox-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108534" comment="MozillaFirefox-branding-upstream-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108535" comment="MozillaFirefox-buildsymbols-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108536" comment="MozillaFirefox-devel-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108537" comment="MozillaFirefox-translations-common-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108538" comment="MozillaFirefox-translations-other-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108539" comment="MozillaThunderbird-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108540" comment="MozillaThunderbird-buildsymbols-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108541" comment="MozillaThunderbird-devel-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108542" comment="MozillaThunderbird-translations-common-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108543" comment="MozillaThunderbird-translations-other-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108545" comment="mozilla-nspr-4.10.8-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108544" comment="mozilla-nspr-32bit-4.10.8-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108546" comment="mozilla-nspr-devel-4.10.8-6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0805</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0805" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0805" source="CVE"/>
    <description>
    The Off Main Thread Compositing (OMTC) implementation in Mozilla Firefox before 37.0 makes an incorrect memset call during interaction with the mozilla::layers::BufferTextureClient::AllocateForSurface function, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors that trigger rendering of 2D graphics content.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108533" comment="MozillaFirefox-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108534" comment="MozillaFirefox-branding-upstream-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108535" comment="MozillaFirefox-buildsymbols-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108536" comment="MozillaFirefox-devel-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108537" comment="MozillaFirefox-translations-common-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108538" comment="MozillaFirefox-translations-other-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108539" comment="MozillaThunderbird-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108540" comment="MozillaThunderbird-buildsymbols-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108541" comment="MozillaThunderbird-devel-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108542" comment="MozillaThunderbird-translations-common-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108543" comment="MozillaThunderbird-translations-other-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108545" comment="mozilla-nspr-4.10.8-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108544" comment="mozilla-nspr-32bit-4.10.8-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108546" comment="mozilla-nspr-devel-4.10.8-6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0806</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0806" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0806" source="CVE"/>
    <description>
    The Off Main Thread Compositing (OMTC) implementation in Mozilla Firefox before 37.0 attempts to use memset for a memory region of negative length during interaction with the mozilla::layers::BufferTextureClient::AllocateForSurface function, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors that trigger rendering of 2D graphics content.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108533" comment="MozillaFirefox-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108534" comment="MozillaFirefox-branding-upstream-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108535" comment="MozillaFirefox-buildsymbols-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108536" comment="MozillaFirefox-devel-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108537" comment="MozillaFirefox-translations-common-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108538" comment="MozillaFirefox-translations-other-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108539" comment="MozillaThunderbird-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108540" comment="MozillaThunderbird-buildsymbols-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108541" comment="MozillaThunderbird-devel-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108542" comment="MozillaThunderbird-translations-common-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108543" comment="MozillaThunderbird-translations-other-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108545" comment="mozilla-nspr-4.10.8-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108544" comment="mozilla-nspr-32bit-4.10.8-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108546" comment="mozilla-nspr-devel-4.10.8-6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0807</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0807" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0807" source="CVE"/>
    <description>
    The navigator.sendBeacon implementation in Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 processes HTTP 30x status codes for redirects after a preflight request has occurred, which allows remote attackers to bypass intended CORS access-control checks and conduct cross-site request forgery (CSRF) attacks via a crafted web site, a similar issue to CVE-2014-8638.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108533" comment="MozillaFirefox-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108534" comment="MozillaFirefox-branding-upstream-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108535" comment="MozillaFirefox-buildsymbols-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108536" comment="MozillaFirefox-devel-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108537" comment="MozillaFirefox-translations-common-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108538" comment="MozillaFirefox-translations-other-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108539" comment="MozillaThunderbird-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108540" comment="MozillaThunderbird-buildsymbols-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108541" comment="MozillaThunderbird-devel-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108542" comment="MozillaThunderbird-translations-common-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108543" comment="MozillaThunderbird-translations-other-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108545" comment="mozilla-nspr-4.10.8-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108544" comment="mozilla-nspr-32bit-4.10.8-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108546" comment="mozilla-nspr-devel-4.10.8-6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0808</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0808" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0808" source="CVE"/>
    <description>
    The webrtc::VPMContentAnalysis::Release function in the WebRTC implementation in Mozilla Firefox before 37.0 uses incompatible approaches to the deallocation of memory for simple-type arrays, which might allow remote attackers to cause a denial of service (memory corruption) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108533" comment="MozillaFirefox-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108534" comment="MozillaFirefox-branding-upstream-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108535" comment="MozillaFirefox-buildsymbols-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108536" comment="MozillaFirefox-devel-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108537" comment="MozillaFirefox-translations-common-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108538" comment="MozillaFirefox-translations-other-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108539" comment="MozillaThunderbird-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108540" comment="MozillaThunderbird-buildsymbols-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108541" comment="MozillaThunderbird-devel-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108542" comment="MozillaThunderbird-translations-common-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108543" comment="MozillaThunderbird-translations-other-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108545" comment="mozilla-nspr-4.10.8-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108544" comment="mozilla-nspr-32bit-4.10.8-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108546" comment="mozilla-nspr-devel-4.10.8-6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0811</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0811" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0811" source="CVE"/>
    <description>
    The QCMS implementation in Mozilla Firefox before 37.0 allows remote attackers to obtain sensitive information from process heap memory or cause a denial of service (out-of-bounds read) via an image that is improperly handled during transformation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108533" comment="MozillaFirefox-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108534" comment="MozillaFirefox-branding-upstream-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108535" comment="MozillaFirefox-buildsymbols-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108536" comment="MozillaFirefox-devel-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108537" comment="MozillaFirefox-translations-common-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108538" comment="MozillaFirefox-translations-other-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108539" comment="MozillaThunderbird-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108540" comment="MozillaThunderbird-buildsymbols-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108541" comment="MozillaThunderbird-devel-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108542" comment="MozillaThunderbird-translations-common-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108543" comment="MozillaThunderbird-translations-other-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108545" comment="mozilla-nspr-4.10.8-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108544" comment="mozilla-nspr-32bit-4.10.8-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108546" comment="mozilla-nspr-devel-4.10.8-6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0812</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0812" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0812" source="CVE"/>
    <description>
    Mozilla Firefox before 37.0 does not require an HTTPS session for lightweight theme add-on installations, which allows man-in-the-middle attackers to bypass an intended user-confirmation requirement by deploying a crafted web site and conducting a DNS spoofing attack against a mozilla.org subdomain.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108533" comment="MozillaFirefox-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108534" comment="MozillaFirefox-branding-upstream-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108535" comment="MozillaFirefox-buildsymbols-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108536" comment="MozillaFirefox-devel-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108537" comment="MozillaFirefox-translations-common-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108538" comment="MozillaFirefox-translations-other-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108539" comment="MozillaThunderbird-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108540" comment="MozillaThunderbird-buildsymbols-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108541" comment="MozillaThunderbird-devel-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108542" comment="MozillaThunderbird-translations-common-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108543" comment="MozillaThunderbird-translations-other-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108545" comment="mozilla-nspr-4.10.8-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108544" comment="mozilla-nspr-32bit-4.10.8-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108546" comment="mozilla-nspr-devel-4.10.8-6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0813</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0813" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0813" source="CVE"/>
    <description>
    Use-after-free vulnerability in the AppendElements function in Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 on Linux, when the Fluendo MP3 plugin for GStreamer is used, allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted MP3 file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108533" comment="MozillaFirefox-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108534" comment="MozillaFirefox-branding-upstream-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108535" comment="MozillaFirefox-buildsymbols-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108536" comment="MozillaFirefox-devel-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108537" comment="MozillaFirefox-translations-common-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108538" comment="MozillaFirefox-translations-other-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108539" comment="MozillaThunderbird-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108540" comment="MozillaThunderbird-buildsymbols-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108541" comment="MozillaThunderbird-devel-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108542" comment="MozillaThunderbird-translations-common-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108543" comment="MozillaThunderbird-translations-other-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108545" comment="mozilla-nspr-4.10.8-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108544" comment="mozilla-nspr-32bit-4.10.8-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108546" comment="mozilla-nspr-devel-4.10.8-6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0814</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0814" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0814" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 37.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108533" comment="MozillaFirefox-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108534" comment="MozillaFirefox-branding-upstream-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108535" comment="MozillaFirefox-buildsymbols-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108536" comment="MozillaFirefox-devel-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108537" comment="MozillaFirefox-translations-common-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108538" comment="MozillaFirefox-translations-other-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108539" comment="MozillaThunderbird-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108540" comment="MozillaThunderbird-buildsymbols-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108541" comment="MozillaThunderbird-devel-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108542" comment="MozillaThunderbird-translations-common-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108543" comment="MozillaThunderbird-translations-other-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108545" comment="mozilla-nspr-4.10.8-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108544" comment="mozilla-nspr-32bit-4.10.8-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108546" comment="mozilla-nspr-devel-4.10.8-6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0815</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0815" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0815" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108533" comment="MozillaFirefox-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108534" comment="MozillaFirefox-branding-upstream-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108535" comment="MozillaFirefox-buildsymbols-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108536" comment="MozillaFirefox-devel-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108537" comment="MozillaFirefox-translations-common-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108538" comment="MozillaFirefox-translations-other-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108539" comment="MozillaThunderbird-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108540" comment="MozillaThunderbird-buildsymbols-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108541" comment="MozillaThunderbird-devel-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108542" comment="MozillaThunderbird-translations-common-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108543" comment="MozillaThunderbird-translations-other-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108545" comment="mozilla-nspr-4.10.8-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108544" comment="mozilla-nspr-32bit-4.10.8-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108546" comment="mozilla-nspr-devel-4.10.8-6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0816</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0816" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0816" source="CVE"/>
    <description>
    Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 do not properly restrict resource: URLs, which makes it easier for remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging the ability to bypass the Same Origin Policy, as demonstrated by the resource: URL associated with PDF.js.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108533" comment="MozillaFirefox-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108534" comment="MozillaFirefox-branding-upstream-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108535" comment="MozillaFirefox-buildsymbols-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108536" comment="MozillaFirefox-devel-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108537" comment="MozillaFirefox-translations-common-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108538" comment="MozillaFirefox-translations-other-37.0.1-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108539" comment="MozillaThunderbird-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108540" comment="MozillaThunderbird-buildsymbols-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108541" comment="MozillaThunderbird-devel-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108542" comment="MozillaThunderbird-translations-common-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108543" comment="MozillaThunderbird-translations-other-31.6.0-15.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108545" comment="mozilla-nspr-4.10.8-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108544" comment="mozilla-nspr-32bit-4.10.8-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108546" comment="mozilla-nspr-devel-4.10.8-6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0817</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0817" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817" source="CVE"/>
    <description>
    The asm.js implementation in Mozilla Firefox before 36.0.3, Firefox ESR 31.x before 31.5.2, and SeaMonkey before 2.33.1 does not properly determine the cases in which bounds checking may be safely skipped during JIT compilation and heap access, which allows remote attackers to read or write to unintended memory locations, and consequently execute arbitrary code, via crafted JavaScript.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108102" comment="MozillaFirefox-36.0.4-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108103" comment="MozillaFirefox-branding-upstream-36.0.4-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108104" comment="MozillaFirefox-buildsymbols-36.0.4-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108105" comment="MozillaFirefox-devel-36.0.4-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108106" comment="MozillaFirefox-translations-common-36.0.4-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108107" comment="MozillaFirefox-translations-other-36.0.4-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108197" comment="seamonkey-2.33.1-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108198" comment="seamonkey-dom-inspector-2.33.1-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108199" comment="seamonkey-irc-2.33.1-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108200" comment="seamonkey-translations-common-2.33.1-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108201" comment="seamonkey-translations-other-2.33.1-17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0818</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0818" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0818" source="CVE"/>
    <description>
    Mozilla Firefox before 36.0.4, Firefox ESR 31.x before 31.5.3, and SeaMonkey before 2.33.1 allow remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code with chrome privileges via vectors involving SVG hash navigation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108102" comment="MozillaFirefox-36.0.4-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108103" comment="MozillaFirefox-branding-upstream-36.0.4-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108104" comment="MozillaFirefox-buildsymbols-36.0.4-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108105" comment="MozillaFirefox-devel-36.0.4-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108106" comment="MozillaFirefox-translations-common-36.0.4-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108107" comment="MozillaFirefox-translations-other-36.0.4-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108197" comment="seamonkey-2.33.1-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108198" comment="seamonkey-dom-inspector-2.33.1-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108199" comment="seamonkey-irc-2.33.1-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108200" comment="seamonkey-translations-common-2.33.1-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108201" comment="seamonkey-translations-other-2.33.1-17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0819</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0819" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0819" source="CVE"/>
    <description>
    The UITour::onPageEvent function in Mozilla Firefox before 36.0 does not ensure that an API call originates from a foreground tab, which allows remote attackers to conduct spoofing and clickjacking attacks by leveraging access to a UI Tour web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009106899" comment="MozillaFirefox-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106900" comment="MozillaFirefox-branding-upstream-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106901" comment="MozillaFirefox-buildsymbols-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106902" comment="MozillaFirefox-devel-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106903" comment="MozillaFirefox-translations-common-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106904" comment="MozillaFirefox-translations-other-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106905" comment="libfreebl3-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106906" comment="libfreebl3-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106907" comment="libsoftokn3-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106908" comment="libsoftokn3-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106909" comment="mozilla-nss-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106910" comment="mozilla-nss-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106911" comment="mozilla-nss-certs-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106912" comment="mozilla-nss-certs-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106913" comment="mozilla-nss-devel-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106914" comment="mozilla-nss-sysinit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106915" comment="mozilla-nss-sysinit-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106916" comment="mozilla-nss-tools-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108032" comment="seamonkey-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108033" comment="seamonkey-dom-inspector-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108034" comment="seamonkey-irc-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108035" comment="seamonkey-translations-common-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108036" comment="seamonkey-translations-other-2.33-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0820</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0820" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0820" source="CVE"/>
    <description>
    Mozilla Firefox before 36.0 does not properly restrict transitions of JavaScript objects from a non-extensible state to an extensible state, which allows remote attackers to bypass a Caja Compiler sandbox protection mechanism or a Secure EcmaScript sandbox protection mechanism via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009106899" comment="MozillaFirefox-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106900" comment="MozillaFirefox-branding-upstream-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106901" comment="MozillaFirefox-buildsymbols-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106902" comment="MozillaFirefox-devel-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106903" comment="MozillaFirefox-translations-common-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106904" comment="MozillaFirefox-translations-other-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106905" comment="libfreebl3-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106906" comment="libfreebl3-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106907" comment="libsoftokn3-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106908" comment="libsoftokn3-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106909" comment="mozilla-nss-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106910" comment="mozilla-nss-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106911" comment="mozilla-nss-certs-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106912" comment="mozilla-nss-certs-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106913" comment="mozilla-nss-devel-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106914" comment="mozilla-nss-sysinit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106915" comment="mozilla-nss-sysinit-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106916" comment="mozilla-nss-tools-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108032" comment="seamonkey-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108033" comment="seamonkey-dom-inspector-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108034" comment="seamonkey-irc-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108035" comment="seamonkey-translations-common-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108036" comment="seamonkey-translations-other-2.33-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0821</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0821" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0821" source="CVE"/>
    <description>
    Mozilla Firefox before 36.0 allows user-assisted remote attackers to read arbitrary files or execute arbitrary JavaScript code with chrome privileges via a crafted web site that is accessed with unspecified mouse and keyboard actions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009106899" comment="MozillaFirefox-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106900" comment="MozillaFirefox-branding-upstream-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106901" comment="MozillaFirefox-buildsymbols-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106902" comment="MozillaFirefox-devel-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106903" comment="MozillaFirefox-translations-common-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106904" comment="MozillaFirefox-translations-other-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106905" comment="libfreebl3-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106906" comment="libfreebl3-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106907" comment="libsoftokn3-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106908" comment="libsoftokn3-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106909" comment="mozilla-nss-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106910" comment="mozilla-nss-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106911" comment="mozilla-nss-certs-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106912" comment="mozilla-nss-certs-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106913" comment="mozilla-nss-devel-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106914" comment="mozilla-nss-sysinit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106915" comment="mozilla-nss-sysinit-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106916" comment="mozilla-nss-tools-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108032" comment="seamonkey-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108033" comment="seamonkey-dom-inspector-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108034" comment="seamonkey-irc-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108035" comment="seamonkey-translations-common-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108036" comment="seamonkey-translations-other-2.33-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0822</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0822" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822" source="CVE"/>
    <description>
    The Form Autocompletion feature in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allows remote attackers to read arbitrary files via crafted JavaScript code.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009106899" comment="MozillaFirefox-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106900" comment="MozillaFirefox-branding-upstream-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106901" comment="MozillaFirefox-buildsymbols-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106902" comment="MozillaFirefox-devel-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106903" comment="MozillaFirefox-translations-common-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106904" comment="MozillaFirefox-translations-other-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107228" comment="MozillaThunderbird-31.5.0-12.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107229" comment="MozillaThunderbird-buildsymbols-31.5.0-12.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107230" comment="MozillaThunderbird-devel-31.5.0-12.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107231" comment="MozillaThunderbird-translations-common-31.5.0-12.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107232" comment="MozillaThunderbird-translations-other-31.5.0-12.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106905" comment="libfreebl3-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106906" comment="libfreebl3-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106907" comment="libsoftokn3-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106908" comment="libsoftokn3-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106909" comment="mozilla-nss-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106910" comment="mozilla-nss-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106911" comment="mozilla-nss-certs-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106912" comment="mozilla-nss-certs-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106913" comment="mozilla-nss-devel-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106914" comment="mozilla-nss-sysinit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106915" comment="mozilla-nss-sysinit-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106916" comment="mozilla-nss-tools-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108032" comment="seamonkey-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108033" comment="seamonkey-dom-inspector-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108034" comment="seamonkey-irc-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108035" comment="seamonkey-translations-common-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108036" comment="seamonkey-translations-other-2.33-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0823</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0823" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0823" source="CVE"/>
    <description>
    Multiple use-after-free vulnerabilities in OpenType Sanitiser, as used in Mozilla Firefox before 36.0, might allow remote attackers to trigger problematic Developer Console information or possibly have unspecified other impact by leveraging incorrect macro expansion, related to the ots::ots_gasp_parse function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009106899" comment="MozillaFirefox-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106900" comment="MozillaFirefox-branding-upstream-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106901" comment="MozillaFirefox-buildsymbols-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106902" comment="MozillaFirefox-devel-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106903" comment="MozillaFirefox-translations-common-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106904" comment="MozillaFirefox-translations-other-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106905" comment="libfreebl3-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106906" comment="libfreebl3-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106907" comment="libsoftokn3-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106908" comment="libsoftokn3-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106909" comment="mozilla-nss-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106910" comment="mozilla-nss-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106911" comment="mozilla-nss-certs-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106912" comment="mozilla-nss-certs-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106913" comment="mozilla-nss-devel-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106914" comment="mozilla-nss-sysinit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106915" comment="mozilla-nss-sysinit-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106916" comment="mozilla-nss-tools-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108032" comment="seamonkey-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108033" comment="seamonkey-dom-inspector-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108034" comment="seamonkey-irc-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108035" comment="seamonkey-translations-common-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108036" comment="seamonkey-translations-other-2.33-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0824</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0824" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0824" source="CVE"/>
    <description>
    The mozilla::layers::BufferTextureClient::AllocateForSurface function in Mozilla Firefox before 36.0 allows remote attackers to cause a denial of service (out-of-bounds write of zero values, and application crash) via vectors that trigger use of DrawTarget and the Cairo library for image drawing.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009106899" comment="MozillaFirefox-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106900" comment="MozillaFirefox-branding-upstream-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106901" comment="MozillaFirefox-buildsymbols-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106902" comment="MozillaFirefox-devel-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106903" comment="MozillaFirefox-translations-common-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106904" comment="MozillaFirefox-translations-other-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106905" comment="libfreebl3-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106906" comment="libfreebl3-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106907" comment="libsoftokn3-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106908" comment="libsoftokn3-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106909" comment="mozilla-nss-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106910" comment="mozilla-nss-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106911" comment="mozilla-nss-certs-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106912" comment="mozilla-nss-certs-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106913" comment="mozilla-nss-devel-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106914" comment="mozilla-nss-sysinit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106915" comment="mozilla-nss-sysinit-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106916" comment="mozilla-nss-tools-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108032" comment="seamonkey-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108033" comment="seamonkey-dom-inspector-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108034" comment="seamonkey-irc-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108035" comment="seamonkey-translations-common-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108036" comment="seamonkey-translations-other-2.33-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0825</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0825" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0825" source="CVE"/>
    <description>
    Stack-based buffer underflow in the mozilla::MP3FrameParser::ParseBuffer function in Mozilla Firefox before 36.0 allows remote attackers to obtain sensitive information from process memory via a malformed MP3 file that improperly interacts with memory allocation during playback.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009106899" comment="MozillaFirefox-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106900" comment="MozillaFirefox-branding-upstream-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106901" comment="MozillaFirefox-buildsymbols-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106902" comment="MozillaFirefox-devel-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106903" comment="MozillaFirefox-translations-common-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106904" comment="MozillaFirefox-translations-other-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106905" comment="libfreebl3-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106906" comment="libfreebl3-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106907" comment="libsoftokn3-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106908" comment="libsoftokn3-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106909" comment="mozilla-nss-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106910" comment="mozilla-nss-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106911" comment="mozilla-nss-certs-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106912" comment="mozilla-nss-certs-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106913" comment="mozilla-nss-devel-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106914" comment="mozilla-nss-sysinit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106915" comment="mozilla-nss-sysinit-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106916" comment="mozilla-nss-tools-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108032" comment="seamonkey-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108033" comment="seamonkey-dom-inspector-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108034" comment="seamonkey-irc-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108035" comment="seamonkey-translations-common-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108036" comment="seamonkey-translations-other-2.33-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0826</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0826" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0826" source="CVE"/>
    <description>
    The nsTransformedTextRun::SetCapitalization function in Mozilla Firefox before 36.0 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read of heap memory) via a crafted Cascading Style Sheets (CSS) token sequence that triggers a restyle or reflow operation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009106899" comment="MozillaFirefox-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106900" comment="MozillaFirefox-branding-upstream-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106901" comment="MozillaFirefox-buildsymbols-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106902" comment="MozillaFirefox-devel-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106903" comment="MozillaFirefox-translations-common-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106904" comment="MozillaFirefox-translations-other-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106905" comment="libfreebl3-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106906" comment="libfreebl3-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106907" comment="libsoftokn3-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106908" comment="libsoftokn3-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106909" comment="mozilla-nss-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106910" comment="mozilla-nss-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106911" comment="mozilla-nss-certs-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106912" comment="mozilla-nss-certs-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106913" comment="mozilla-nss-devel-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106914" comment="mozilla-nss-sysinit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106915" comment="mozilla-nss-sysinit-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106916" comment="mozilla-nss-tools-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108032" comment="seamonkey-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108033" comment="seamonkey-dom-inspector-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108034" comment="seamonkey-irc-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108035" comment="seamonkey-translations-common-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108036" comment="seamonkey-translations-other-2.33-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0827</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0827" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827" source="CVE"/>
    <description>
    Heap-based buffer overflow in the mozilla::gfx::CopyRect function in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allows remote attackers to obtain sensitive information from uninitialized process memory via a malformed SVG graphic.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009106899" comment="MozillaFirefox-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106900" comment="MozillaFirefox-branding-upstream-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106901" comment="MozillaFirefox-buildsymbols-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106902" comment="MozillaFirefox-devel-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106903" comment="MozillaFirefox-translations-common-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106904" comment="MozillaFirefox-translations-other-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107228" comment="MozillaThunderbird-31.5.0-12.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107229" comment="MozillaThunderbird-buildsymbols-31.5.0-12.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107230" comment="MozillaThunderbird-devel-31.5.0-12.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107231" comment="MozillaThunderbird-translations-common-31.5.0-12.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107232" comment="MozillaThunderbird-translations-other-31.5.0-12.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106905" comment="libfreebl3-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106906" comment="libfreebl3-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106907" comment="libsoftokn3-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106908" comment="libsoftokn3-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106909" comment="mozilla-nss-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106910" comment="mozilla-nss-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106911" comment="mozilla-nss-certs-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106912" comment="mozilla-nss-certs-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106913" comment="mozilla-nss-devel-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106914" comment="mozilla-nss-sysinit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106915" comment="mozilla-nss-sysinit-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106916" comment="mozilla-nss-tools-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108032" comment="seamonkey-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108033" comment="seamonkey-dom-inspector-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108034" comment="seamonkey-irc-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108035" comment="seamonkey-translations-common-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108036" comment="seamonkey-translations-other-2.33-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0828</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0828" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0828" source="CVE"/>
    <description>
    Double free vulnerability in the nsXMLHttpRequest::GetResponse function in Mozilla Firefox before 36.0, when a nonstandard memory allocator is used, allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via crafted JavaScript code that makes an XMLHttpRequest call with zero bytes of data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009106899" comment="MozillaFirefox-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106900" comment="MozillaFirefox-branding-upstream-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106901" comment="MozillaFirefox-buildsymbols-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106902" comment="MozillaFirefox-devel-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106903" comment="MozillaFirefox-translations-common-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106904" comment="MozillaFirefox-translations-other-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106905" comment="libfreebl3-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106906" comment="libfreebl3-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106907" comment="libsoftokn3-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106908" comment="libsoftokn3-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106909" comment="mozilla-nss-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106910" comment="mozilla-nss-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106911" comment="mozilla-nss-certs-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106912" comment="mozilla-nss-certs-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106913" comment="mozilla-nss-devel-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106914" comment="mozilla-nss-sysinit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106915" comment="mozilla-nss-sysinit-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106916" comment="mozilla-nss-tools-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108032" comment="seamonkey-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108033" comment="seamonkey-dom-inspector-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108034" comment="seamonkey-irc-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108035" comment="seamonkey-translations-common-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108036" comment="seamonkey-translations-other-2.33-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0829</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0829" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0829" source="CVE"/>
    <description>
    Buffer overflow in libstagefright in Mozilla Firefox before 36.0 allows remote attackers to execute arbitrary code via a crafted MP4 video that is improperly handled during playback.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009106899" comment="MozillaFirefox-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106900" comment="MozillaFirefox-branding-upstream-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106901" comment="MozillaFirefox-buildsymbols-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106902" comment="MozillaFirefox-devel-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106903" comment="MozillaFirefox-translations-common-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106904" comment="MozillaFirefox-translations-other-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106905" comment="libfreebl3-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106906" comment="libfreebl3-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106907" comment="libsoftokn3-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106908" comment="libsoftokn3-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106909" comment="mozilla-nss-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106910" comment="mozilla-nss-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106911" comment="mozilla-nss-certs-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106912" comment="mozilla-nss-certs-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106913" comment="mozilla-nss-devel-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106914" comment="mozilla-nss-sysinit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106915" comment="mozilla-nss-sysinit-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106916" comment="mozilla-nss-tools-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108032" comment="seamonkey-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108033" comment="seamonkey-dom-inspector-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108034" comment="seamonkey-irc-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108035" comment="seamonkey-translations-common-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108036" comment="seamonkey-translations-other-2.33-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0830</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0830" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0830" source="CVE"/>
    <description>
    The WebGL implementation in Mozilla Firefox before 36.0 does not properly allocate memory for copying an unspecified string to a shader's compilation log, which allows remote attackers to cause a denial of service (application crash) via crafted WebGL content.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009106899" comment="MozillaFirefox-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106900" comment="MozillaFirefox-branding-upstream-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106901" comment="MozillaFirefox-buildsymbols-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106902" comment="MozillaFirefox-devel-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106903" comment="MozillaFirefox-translations-common-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106904" comment="MozillaFirefox-translations-other-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106905" comment="libfreebl3-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106906" comment="libfreebl3-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106907" comment="libsoftokn3-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106908" comment="libsoftokn3-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106909" comment="mozilla-nss-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106910" comment="mozilla-nss-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106911" comment="mozilla-nss-certs-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106912" comment="mozilla-nss-certs-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106913" comment="mozilla-nss-devel-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106914" comment="mozilla-nss-sysinit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106915" comment="mozilla-nss-sysinit-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106916" comment="mozilla-nss-tools-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108032" comment="seamonkey-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108033" comment="seamonkey-dom-inspector-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108034" comment="seamonkey-irc-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108035" comment="seamonkey-translations-common-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108036" comment="seamonkey-translations-other-2.33-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0831</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0831" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::dom::IndexedDB::IDBObjectStore::CreateIndex function in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via crafted content that is improperly handled during IndexedDB index creation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009106899" comment="MozillaFirefox-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106900" comment="MozillaFirefox-branding-upstream-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106901" comment="MozillaFirefox-buildsymbols-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106902" comment="MozillaFirefox-devel-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106903" comment="MozillaFirefox-translations-common-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106904" comment="MozillaFirefox-translations-other-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107228" comment="MozillaThunderbird-31.5.0-12.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107229" comment="MozillaThunderbird-buildsymbols-31.5.0-12.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107230" comment="MozillaThunderbird-devel-31.5.0-12.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107231" comment="MozillaThunderbird-translations-common-31.5.0-12.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107232" comment="MozillaThunderbird-translations-other-31.5.0-12.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106905" comment="libfreebl3-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106906" comment="libfreebl3-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106907" comment="libsoftokn3-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106908" comment="libsoftokn3-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106909" comment="mozilla-nss-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106910" comment="mozilla-nss-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106911" comment="mozilla-nss-certs-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106912" comment="mozilla-nss-certs-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106913" comment="mozilla-nss-devel-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106914" comment="mozilla-nss-sysinit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106915" comment="mozilla-nss-sysinit-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106916" comment="mozilla-nss-tools-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108032" comment="seamonkey-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108033" comment="seamonkey-dom-inspector-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108034" comment="seamonkey-irc-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108035" comment="seamonkey-translations-common-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108036" comment="seamonkey-translations-other-2.33-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0832</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0832" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0832" source="CVE"/>
    <description>
    Mozilla Firefox before 36.0 does not properly recognize the equivalence of domain names with and without a trailing . (dot) character, which allows man-in-the-middle attackers to bypass the HPKP and HSTS protection mechanisms by constructing a URL with this character and leveraging access to an X.509 certificate for a domain with this character.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009106899" comment="MozillaFirefox-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106900" comment="MozillaFirefox-branding-upstream-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106901" comment="MozillaFirefox-buildsymbols-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106902" comment="MozillaFirefox-devel-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106903" comment="MozillaFirefox-translations-common-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106904" comment="MozillaFirefox-translations-other-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106905" comment="libfreebl3-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106906" comment="libfreebl3-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106907" comment="libsoftokn3-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106908" comment="libsoftokn3-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106909" comment="mozilla-nss-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106910" comment="mozilla-nss-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106911" comment="mozilla-nss-certs-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106912" comment="mozilla-nss-certs-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106913" comment="mozilla-nss-devel-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106914" comment="mozilla-nss-sysinit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106915" comment="mozilla-nss-sysinit-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106916" comment="mozilla-nss-tools-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108032" comment="seamonkey-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108033" comment="seamonkey-dom-inspector-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108034" comment="seamonkey-irc-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108035" comment="seamonkey-translations-common-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108036" comment="seamonkey-translations-other-2.33-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0833</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0833" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0833" source="CVE"/>
    <description>
    Multiple untrusted search path vulnerabilities in updater.exe in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 on Windows, when the Maintenance Service is not used, allow local users to gain privileges via a Trojan horse DLL in (1) the current working directory or (2) a temporary directory, as demonstrated by bcrypt.dll.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108032" comment="seamonkey-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108033" comment="seamonkey-dom-inspector-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108034" comment="seamonkey-irc-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108035" comment="seamonkey-translations-common-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108036" comment="seamonkey-translations-other-2.33-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0834</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0834" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0834" source="CVE"/>
    <description>
    The WebRTC subsystem in Mozilla Firefox before 36.0 recognizes turns: and stuns: URIs but accesses the TURN or STUN server without using TLS, which makes it easier for man-in-the-middle attackers to discover credentials by spoofing a server and completing a brute-force attack within a short time window.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009106899" comment="MozillaFirefox-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106900" comment="MozillaFirefox-branding-upstream-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106901" comment="MozillaFirefox-buildsymbols-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106902" comment="MozillaFirefox-devel-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106903" comment="MozillaFirefox-translations-common-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106904" comment="MozillaFirefox-translations-other-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106905" comment="libfreebl3-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106906" comment="libfreebl3-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106907" comment="libsoftokn3-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106908" comment="libsoftokn3-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106909" comment="mozilla-nss-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106910" comment="mozilla-nss-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106911" comment="mozilla-nss-certs-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106912" comment="mozilla-nss-certs-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106913" comment="mozilla-nss-devel-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106914" comment="mozilla-nss-sysinit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106915" comment="mozilla-nss-sysinit-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106916" comment="mozilla-nss-tools-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108032" comment="seamonkey-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108033" comment="seamonkey-dom-inspector-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108034" comment="seamonkey-irc-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108035" comment="seamonkey-translations-common-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108036" comment="seamonkey-translations-other-2.33-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0835</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0835" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 36.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009106899" comment="MozillaFirefox-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106900" comment="MozillaFirefox-branding-upstream-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106901" comment="MozillaFirefox-buildsymbols-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106902" comment="MozillaFirefox-devel-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106903" comment="MozillaFirefox-translations-common-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106904" comment="MozillaFirefox-translations-other-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106905" comment="libfreebl3-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106906" comment="libfreebl3-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106907" comment="libsoftokn3-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106908" comment="libsoftokn3-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106909" comment="mozilla-nss-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106910" comment="mozilla-nss-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106911" comment="mozilla-nss-certs-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106912" comment="mozilla-nss-certs-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106913" comment="mozilla-nss-devel-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106914" comment="mozilla-nss-sysinit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106915" comment="mozilla-nss-sysinit-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106916" comment="mozilla-nss-tools-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108032" comment="seamonkey-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108033" comment="seamonkey-dom-inspector-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108034" comment="seamonkey-irc-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108035" comment="seamonkey-translations-common-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108036" comment="seamonkey-translations-other-2.33-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0836</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009106899" comment="MozillaFirefox-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106900" comment="MozillaFirefox-branding-upstream-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106901" comment="MozillaFirefox-buildsymbols-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106902" comment="MozillaFirefox-devel-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106903" comment="MozillaFirefox-translations-common-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106904" comment="MozillaFirefox-translations-other-36.0-14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107228" comment="MozillaThunderbird-31.5.0-12.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107229" comment="MozillaThunderbird-buildsymbols-31.5.0-12.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107230" comment="MozillaThunderbird-devel-31.5.0-12.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107231" comment="MozillaThunderbird-translations-common-31.5.0-12.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107232" comment="MozillaThunderbird-translations-other-31.5.0-12.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106905" comment="libfreebl3-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106906" comment="libfreebl3-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106907" comment="libsoftokn3-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106908" comment="libsoftokn3-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106909" comment="mozilla-nss-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106910" comment="mozilla-nss-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106911" comment="mozilla-nss-certs-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106912" comment="mozilla-nss-certs-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106913" comment="mozilla-nss-devel-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106914" comment="mozilla-nss-sysinit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106915" comment="mozilla-nss-sysinit-32bit-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106916" comment="mozilla-nss-tools-3.17.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108032" comment="seamonkey-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108033" comment="seamonkey-dom-inspector-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108034" comment="seamonkey-irc-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108035" comment="seamonkey-translations-common-2.33-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108036" comment="seamonkey-translations-other-2.33-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0837</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0837" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0837" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114195" comment="libgcrypt-1.6.1-8.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114196" comment="libgcrypt-cavs-1.6.1-8.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114197" comment="libgcrypt-devel-1.6.1-8.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114198" comment="libgcrypt-devel-32bit-1.6.1-8.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114174" comment="libgcrypt11-1.5.4-2.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114175" comment="libgcrypt11-32bit-1.5.4-2.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114199" comment="libgcrypt20-1.6.1-8.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114200" comment="libgcrypt20-32bit-1.6.1-8.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114201" comment="libgcrypt20-hmac-1.6.1-8.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114202" comment="libgcrypt20-hmac-32bit-1.6.1-8.6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0840</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0840" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0840" source="CVE"/>
    <description>
    The dpkg-source command in Debian dpkg before 1.16.16 and 1.17.x before 1.17.25 allows remote attackers to bypass signature verification via a crafted Debian source control file (.dsc).
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110478" comment="dpkg-1.16.16-8.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110479" comment="dpkg-devel-1.16.16-8.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110480" comment="dpkg-lang-1.16.16-8.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110481" comment="update-alternatives-1.16.16-8.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0847</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0847" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0847" source="CVE"/>
    <description>
    nbd-server.c in Network Block Device (nbd-server) before 3.11 does not properly handle signals, which allows remote attackers to cause a denial of service (deadlock) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110102" comment="nbd-3.3-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110103" comment="nbd-doc-3.3-4.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0848</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0848" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0848" source="CVE"/>
    <description>
    Heap-based buffer overflow in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted BMP image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111102" comment="libwmf-0.2.8.4-239.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111103" comment="libwmf-0_2-7-0.2.8.4-239.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111104" comment="libwmf-0_2-7-32bit-0.2.8.4-239.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111105" comment="libwmf-devel-0.2.8.4-239.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111106" comment="libwmf-gnome-0.2.8.4-239.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111107" comment="libwmf-gnome-32bit-0.2.8.4-239.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111108" comment="libwmf-tools-0.2.8.4-239.7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0855</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0855" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0855" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009121328" comment="pitivi-0.94-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121329" comment="pitivi-lang-0.94-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0973</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-0973" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0973" source="CVE"/>
    <description>
    Buffer overflow in the png_read_IDAT_data function in pngrutil.c in libpng before 1.5.21 and 1.6.x before 1.6.16 allows context-dependent attackers to execute arbitrary code via IDAT data with a large width, a different vulnerability than CVE-2014-9495.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105589" comment="libpng16-1.6.13-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105590" comment="libpng16-16-1.6.13-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105591" comment="libpng16-16-32bit-1.6.13-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105592" comment="libpng16-compat-devel-1.6.13-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105593" comment="libpng16-compat-devel-32bit-1.6.13-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105594" comment="libpng16-devel-1.6.13-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105595" comment="libpng16-devel-32bit-1.6.13-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105596" comment="libpng16-tools-1.6.13-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1027</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1027" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1027" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107597" comment="percona-toolkit-2.2.13-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107598" comment="xtrabackup-2.2.9-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107599" comment="xtrabackup-test-2.2.9-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1038</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1038" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1038" source="CVE"/>
    <description>
    p7zip 9.20.1 allows remote attackers to write to arbitrary files via a symlink attack in an archive.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110797" comment="p7zip-9.20.1-12.3.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1071</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1071" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1071" source="CVE"/>
    <description>
    WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125580" comment="libjavascriptcoregtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125581" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125582" comment="libjavascriptcoregtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125583" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125584" comment="libwebkitgtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125585" comment="libwebkitgtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125586" comment="libwebkitgtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125587" comment="libwebkitgtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125588" comment="libwebkitgtk-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125589" comment="libwebkitgtk2-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125590" comment="libwebkitgtk3-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125591" comment="libwebkitgtk3-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125592" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125593" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125594" comment="typelib-1_0-WebKit-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125595" comment="typelib-1_0-WebKit-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125596" comment="webkit-jsc-1-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125597" comment="webkit-jsc-3-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125598" comment="webkitgtk-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125599" comment="webkitgtk3-2.4.10-13.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1076</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1076" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1076" source="CVE"/>
    <description>
    WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125580" comment="libjavascriptcoregtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125581" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125582" comment="libjavascriptcoregtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125583" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125584" comment="libwebkitgtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125585" comment="libwebkitgtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125586" comment="libwebkitgtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125587" comment="libwebkitgtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125588" comment="libwebkitgtk-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125589" comment="libwebkitgtk2-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125590" comment="libwebkitgtk3-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125591" comment="libwebkitgtk3-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125592" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125593" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125594" comment="typelib-1_0-WebKit-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125595" comment="typelib-1_0-WebKit-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125596" comment="webkit-jsc-1-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125597" comment="webkit-jsc-3-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125598" comment="webkitgtk-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125599" comment="webkitgtk3-2.4.10-13.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1081</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1081" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1081" source="CVE"/>
    <description>
    WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125580" comment="libjavascriptcoregtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125581" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125582" comment="libjavascriptcoregtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125583" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125584" comment="libwebkitgtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125585" comment="libwebkitgtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125586" comment="libwebkitgtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125587" comment="libwebkitgtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125588" comment="libwebkitgtk-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125589" comment="libwebkitgtk2-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125590" comment="libwebkitgtk3-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125591" comment="libwebkitgtk3-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125592" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125593" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125594" comment="typelib-1_0-WebKit-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125595" comment="typelib-1_0-WebKit-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125596" comment="webkit-jsc-1-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125597" comment="webkit-jsc-3-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125598" comment="webkitgtk-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125599" comment="webkitgtk3-2.4.10-13.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1083</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1083" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1083" source="CVE"/>
    <description>
    WebKit, as used in Apple Safari before 6.2.4, 7.x before 7.1.4, and 8.x before 8.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other CVEs listed in APPLE-SA-2015-03-17-1.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125580" comment="libjavascriptcoregtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125581" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125582" comment="libjavascriptcoregtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125583" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125584" comment="libwebkitgtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125585" comment="libwebkitgtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125586" comment="libwebkitgtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125587" comment="libwebkitgtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125588" comment="libwebkitgtk-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125589" comment="libwebkitgtk2-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125590" comment="libwebkitgtk3-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125591" comment="libwebkitgtk3-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125592" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125593" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125594" comment="typelib-1_0-WebKit-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125595" comment="typelib-1_0-WebKit-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125596" comment="webkit-jsc-1-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125597" comment="webkit-jsc-3-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125598" comment="webkitgtk-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125599" comment="webkitgtk3-2.4.10-13.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1120</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1120" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1120" source="CVE"/>
    <description>
    WebKit, as used in Apple iOS before 8.3, Apple TV before 7.2, and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-04-08-1, APPLE-SA-2015-04-08-3, and APPLE-SA-2015-04-08-4.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125580" comment="libjavascriptcoregtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125581" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125582" comment="libjavascriptcoregtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125583" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125584" comment="libwebkitgtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125585" comment="libwebkitgtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125586" comment="libwebkitgtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125587" comment="libwebkitgtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125588" comment="libwebkitgtk-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125589" comment="libwebkitgtk2-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125590" comment="libwebkitgtk3-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125591" comment="libwebkitgtk3-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125592" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125593" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125594" comment="typelib-1_0-WebKit-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125595" comment="typelib-1_0-WebKit-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125596" comment="webkit-jsc-1-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125597" comment="webkit-jsc-3-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125598" comment="webkitgtk-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125599" comment="webkitgtk3-2.4.10-13.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1122</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1122" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1122" source="CVE"/>
    <description>
    WebKit, as used in Apple iOS before 8.3, Apple TV before 7.2, and Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-04-08-1, APPLE-SA-2015-04-08-3, and APPLE-SA-2015-04-08-4.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125580" comment="libjavascriptcoregtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125581" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125582" comment="libjavascriptcoregtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125583" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125584" comment="libwebkitgtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125585" comment="libwebkitgtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125586" comment="libwebkitgtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125587" comment="libwebkitgtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125588" comment="libwebkitgtk-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125589" comment="libwebkitgtk2-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125590" comment="libwebkitgtk3-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125591" comment="libwebkitgtk3-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125592" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125593" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125594" comment="typelib-1_0-WebKit-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125595" comment="typelib-1_0-WebKit-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125596" comment="webkit-jsc-1-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125597" comment="webkit-jsc-3-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125598" comment="webkitgtk-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125599" comment="webkitgtk3-2.4.10-13.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1127</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1127" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1127" source="CVE"/>
    <description>
    The private-browsing implementation in WebKit in Apple Safari before 6.2.5, 7.x before 7.1.5, and 8.x before 8.0.5 places browsing history into an index, which might allow local users to obtain sensitive information by reading index entries.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125580" comment="libjavascriptcoregtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125581" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125582" comment="libjavascriptcoregtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125583" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125584" comment="libwebkitgtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125585" comment="libwebkitgtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125586" comment="libwebkitgtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125587" comment="libwebkitgtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125588" comment="libwebkitgtk-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125589" comment="libwebkitgtk2-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125590" comment="libwebkitgtk3-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125591" comment="libwebkitgtk3-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125592" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125593" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125594" comment="typelib-1_0-WebKit-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125595" comment="typelib-1_0-WebKit-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125596" comment="webkit-jsc-1-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125597" comment="webkit-jsc-3-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125598" comment="webkitgtk-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125599" comment="webkitgtk3-2.4.10-13.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1153</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1153" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1153" source="CVE"/>
    <description>
    WebKit, as used in Apple Safari before 6.2.6, 7.x before 7.1.6, and 8.x before 8.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2015-1152 and CVE-2015-1154.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125580" comment="libjavascriptcoregtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125581" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125582" comment="libjavascriptcoregtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125583" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125584" comment="libwebkitgtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125585" comment="libwebkitgtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125586" comment="libwebkitgtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125587" comment="libwebkitgtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125588" comment="libwebkitgtk-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125589" comment="libwebkitgtk2-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125590" comment="libwebkitgtk3-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125591" comment="libwebkitgtk3-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125592" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125593" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125594" comment="typelib-1_0-WebKit-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125595" comment="typelib-1_0-WebKit-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125596" comment="webkit-jsc-1-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125597" comment="webkit-jsc-3-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125598" comment="webkitgtk-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125599" comment="webkitgtk3-2.4.10-13.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1155</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1155" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1155" source="CVE"/>
    <description>
    The history implementation in WebKit, as used in Apple Safari before 6.2.6, 7.x before 7.1.6, and 8.x before 8.0.6, allows remote attackers to bypass the Same Origin Policy and read arbitrary files via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125580" comment="libjavascriptcoregtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125581" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125582" comment="libjavascriptcoregtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125583" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125584" comment="libwebkitgtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125585" comment="libwebkitgtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125586" comment="libwebkitgtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125587" comment="libwebkitgtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125588" comment="libwebkitgtk-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125589" comment="libwebkitgtk2-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125590" comment="libwebkitgtk3-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125591" comment="libwebkitgtk3-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125592" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125593" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125594" comment="typelib-1_0-WebKit-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125595" comment="typelib-1_0-WebKit-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125596" comment="webkit-jsc-1-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125597" comment="webkit-jsc-3-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125598" comment="webkitgtk-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125599" comment="webkitgtk3-2.4.10-13.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1158</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1158" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1158" source="CVE"/>
    <description>
    The add_job function in scheduler/ipp.c in cupsd in CUPS before 2.0.3 performs incorrect free operations for multiple-value job-originating-host-name attributes, which allows remote attackers to trigger data corruption for reference-counted strings via a crafted (1) IPP_CREATE_JOB or (2) IPP_PRINT_JOB request, as demonstrated by replacing the configuration file and consequently executing arbitrary code.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110482" comment="cups-1.5.4-21.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110483" comment="cups-client-1.5.4-21.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110484" comment="cups-ddk-1.5.4-21.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110485" comment="cups-devel-1.5.4-21.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110486" comment="cups-libs-1.5.4-21.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110487" comment="cups-libs-32bit-1.5.4-21.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1159</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1159" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1159" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the cgi_puts function in cgi-bin/template.c in the template engine in CUPS before 2.0.3 allows remote attackers to inject arbitrary web script or HTML via the QUERY parameter to help/.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110482" comment="cups-1.5.4-21.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110483" comment="cups-client-1.5.4-21.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110484" comment="cups-ddk-1.5.4-21.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110485" comment="cups-devel-1.5.4-21.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110486" comment="cups-libs-1.5.4-21.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110487" comment="cups-libs-32bit-1.5.4-21.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1182</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1182" source="CVE"/>
    <description>
    The asn1_get_sequence_of function in library/asn1parse.c in PolarSSL 1.0 through 1.2.12 and 1.3.x through 1.3.9 does not properly initialize a pointer in the asn1_sequence linked list, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted ASN.1 sequence in a certificate.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105720" comment="libpolarssl7-1.3.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105721" comment="polarssl-1.3.9-8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105722" comment="polarssl-devel-1.3.9-8.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1191</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1191" source="CVE"/>
    <description>
    Multiple directory traversal vulnerabilities in pigz 2.3.1 allow remote attackers to write to arbitrary files via a (1) full pathname or (2) .. (dot dot) in an archive.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124423" comment="pigz-2.3-4.3.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1196</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1196" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1196" source="CVE"/>
    <description>
    GNU patch 2.7.1 allows remote attackers to write to arbitrary files via a symlink attack in a patch file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105813" comment="patch-2.7.3-7.4.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1205</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1205" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1205" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 40.0.2214.91 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107156" comment="chromedriver-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107157" comment="chromium-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107158" comment="chromium-desktop-gnome-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107159" comment="chromium-desktop-kde-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107160" comment="chromium-ffmpegsumo-40.0.2214.111-13.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1209</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1209" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1209" source="CVE"/>
    <description>
    Use-after-free vulnerability in the VisibleSelection::nonBoundaryShadowTreeRootNode function in core/editing/VisibleSelection.cpp in the DOM implementation in Blink, as used in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers improper handling of a shadow-root anchor.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107156" comment="chromedriver-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107157" comment="chromium-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107158" comment="chromium-desktop-gnome-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107159" comment="chromium-desktop-kde-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107160" comment="chromium-ffmpegsumo-40.0.2214.111-13.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1210</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1210" source="CVE"/>
    <description>
    The V8ThrowException::createDOMException function in bindings/core/v8/V8ThrowException.cpp in the V8 bindings in Blink, as used in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android, does not properly consider frame access restrictions during the throwing of an exception, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107156" comment="chromedriver-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107157" comment="chromium-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107158" comment="chromium-desktop-gnome-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107159" comment="chromium-desktop-kde-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107160" comment="chromium-ffmpegsumo-40.0.2214.111-13.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1211</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1211" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1211" source="CVE"/>
    <description>
    The OriginCanAccessServiceWorkers function in content/browser/service_worker/service_worker_dispatcher_host.cc in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android does not properly restrict the URI scheme during a ServiceWorker registration, which allows remote attackers to gain privileges via a filesystem: URI.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107156" comment="chromedriver-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107157" comment="chromium-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107158" comment="chromium-desktop-gnome-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107159" comment="chromium-desktop-kde-40.0.2214.111-13.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107160" comment="chromium-ffmpegsumo-40.0.2214.111-13.4 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1212</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1212" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1212" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107682" comment="chromedriver-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107683" comment="chromium-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107684" comment="chromium-desktop-gnome-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107685" comment="chromium-desktop-kde-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107686" comment="chromium-ffmpegsumo-41.0.2272.76-17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1213</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1213" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1213" source="CVE"/>
    <description>
    The SkBitmap::ReadRawPixels function in core/SkBitmap.cpp in the filters implementation in Skia, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an out-of-bounds write operation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107682" comment="chromedriver-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107683" comment="chromium-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107684" comment="chromium-desktop-gnome-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107685" comment="chromium-desktop-kde-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107686" comment="chromium-ffmpegsumo-41.0.2272.76-17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1214</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1214" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1214" source="CVE"/>
    <description>
    Integer overflow in the SkAutoSTArray implementation in include/core/SkTemplates.h in the filters implementation in Skia, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a reset action with a large count value, leading to an out-of-bounds write operation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107682" comment="chromedriver-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107683" comment="chromium-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107684" comment="chromium-desktop-gnome-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107685" comment="chromium-desktop-kde-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107686" comment="chromium-ffmpegsumo-41.0.2272.76-17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1215</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1215" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1215" source="CVE"/>
    <description>
    The filters implementation in Skia, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an out-of-bounds write operation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107682" comment="chromedriver-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107683" comment="chromium-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107684" comment="chromium-desktop-gnome-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107685" comment="chromium-desktop-kde-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107686" comment="chromium-ffmpegsumo-41.0.2272.76-17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1216</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1216" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1216" source="CVE"/>
    <description>
    Use-after-free vulnerability in the V8Window::namedPropertyGetterCustom function in bindings/core/v8/custom/V8WindowCustom.cpp in the V8 bindings in Blink, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a frame detachment.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107682" comment="chromedriver-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107683" comment="chromium-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107684" comment="chromium-desktop-gnome-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107685" comment="chromium-desktop-kde-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107686" comment="chromium-ffmpegsumo-41.0.2272.76-17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1217</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1217" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1217" source="CVE"/>
    <description>
    The V8LazyEventListener::prepareListenerObject function in bindings/core/v8/V8LazyEventListener.cpp in the V8 bindings in Blink, as used in Google Chrome before 41.0.2272.76, does not properly compile listeners, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage "type confusion."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107682" comment="chromedriver-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107683" comment="chromium-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107684" comment="chromium-desktop-gnome-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107685" comment="chromium-desktop-kde-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107686" comment="chromium-ffmpegsumo-41.0.2272.76-17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1218</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1218" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1218" source="CVE"/>
    <description>
    Multiple use-after-free vulnerabilities in the DOM implementation in Blink, as used in Google Chrome before 41.0.2272.76, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger movement of a SCRIPT element to different documents, related to (1) the HTMLScriptElement::didMoveToNewDocument function in core/html/HTMLScriptElement.cpp and (2) the SVGScriptElement::didMoveToNewDocument function in core/svg/SVGScriptElement.cpp.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107682" comment="chromedriver-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107683" comment="chromium-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107684" comment="chromium-desktop-gnome-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107685" comment="chromium-desktop-kde-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107686" comment="chromium-ffmpegsumo-41.0.2272.76-17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1219</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1219" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1219" source="CVE"/>
    <description>
    Integer overflow in the SkMallocPixelRef::NewAllocate function in core/SkMallocPixelRef.cpp in Skia, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an attempted allocation of a large amount of memory during WebGL rendering.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107682" comment="chromedriver-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107683" comment="chromium-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107684" comment="chromium-desktop-gnome-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107685" comment="chromium-desktop-kde-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107686" comment="chromium-ffmpegsumo-41.0.2272.76-17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1220</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1220" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1220" source="CVE"/>
    <description>
    Use-after-free vulnerability in the GIFImageReader::parseData function in platform/image-decoders/gif/GIFImageReader.cpp in Blink, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted frame size in a GIF image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107682" comment="chromedriver-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107683" comment="chromium-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107684" comment="chromium-desktop-gnome-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107685" comment="chromium-desktop-kde-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107686" comment="chromium-ffmpegsumo-41.0.2272.76-17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1221</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1221" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1221" source="CVE"/>
    <description>
    Use-after-free vulnerability in Blink, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging incorrect ordering of operations in the Web SQL Database thread relative to Blink's main thread, related to the shutdown function in web/WebKit.cpp.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107682" comment="chromedriver-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107683" comment="chromium-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107684" comment="chromium-desktop-gnome-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107685" comment="chromium-desktop-kde-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107686" comment="chromium-ffmpegsumo-41.0.2272.76-17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1222</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1222" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1222" source="CVE"/>
    <description>
    Multiple use-after-free vulnerabilities in the ServiceWorkerScriptCacheMap implementation in content/browser/service_worker/service_worker_script_cache_map.cc in Google Chrome before 41.0.2272.76 allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a ServiceWorkerContextWrapper::DeleteAndStartOver call, related to the NotifyStartedCaching and NotifyFinishedCaching functions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107682" comment="chromedriver-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107683" comment="chromium-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107684" comment="chromium-desktop-gnome-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107685" comment="chromium-desktop-kde-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107686" comment="chromium-ffmpegsumo-41.0.2272.76-17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1223</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1223" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1223" source="CVE"/>
    <description>
    Multiple use-after-free vulnerabilities in core/html/HTMLInputElement.cpp in the DOM implementation in Blink, as used in Google Chrome before 41.0.2272.76, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger extraneous change events, as demonstrated by events for invalid input or input to read-only fields, related to the initializeTypeInParsing and updateType functions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107682" comment="chromedriver-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107683" comment="chromium-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107684" comment="chromium-desktop-gnome-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107685" comment="chromium-desktop-kde-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107686" comment="chromium-ffmpegsumo-41.0.2272.76-17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1224</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1224" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1224" source="CVE"/>
    <description>
    The VpxVideoDecoder::VpxDecode function in media/filters/vpx_video_decoder.cc in the vpxdecoder implementation in Google Chrome before 41.0.2272.76 does not ensure that alpha-plane dimensions are identical to image dimensions, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted VPx video data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107682" comment="chromedriver-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107683" comment="chromium-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107684" comment="chromium-desktop-gnome-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107685" comment="chromium-desktop-kde-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107686" comment="chromium-ffmpegsumo-41.0.2272.76-17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1225</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1225" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1225" source="CVE"/>
    <description>
    PDFium, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107682" comment="chromedriver-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107683" comment="chromium-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107684" comment="chromium-desktop-gnome-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107685" comment="chromium-desktop-kde-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107686" comment="chromium-ffmpegsumo-41.0.2272.76-17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1226</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1226" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1226" source="CVE"/>
    <description>
    The DebuggerFunction::InitAgentHost function in browser/extensions/api/debugger/debugger_api.cc in Google Chrome before 41.0.2272.76 does not properly restrict what URLs are available as debugger targets, which allows remote attackers to bypass intended access restrictions via a crafted extension.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107682" comment="chromedriver-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107683" comment="chromium-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107684" comment="chromium-desktop-gnome-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107685" comment="chromium-desktop-kde-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107686" comment="chromium-ffmpegsumo-41.0.2272.76-17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1227</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1227" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1227" source="CVE"/>
    <description>
    The DragImage::create function in platform/DragImage.cpp in Blink, as used in Google Chrome before 41.0.2272.76, does not initialize memory for image drawing, which allows remote attackers to have an unspecified impact by triggering a failed image decoding, as demonstrated by an image for which the default orientation cannot be used.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107682" comment="chromedriver-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107683" comment="chromium-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107684" comment="chromium-desktop-gnome-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107685" comment="chromium-desktop-kde-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107686" comment="chromium-ffmpegsumo-41.0.2272.76-17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1228</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1228" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1228" source="CVE"/>
    <description>
    The RenderCounter::updateCounter function in core/rendering/RenderCounter.cpp in Blink, as used in Google Chrome before 41.0.2272.76, does not force a relayout operation and consequently does not initialize memory for a data structure, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted Cascading Style Sheets (CSS) token sequence.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107682" comment="chromedriver-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107683" comment="chromium-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107684" comment="chromium-desktop-gnome-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107685" comment="chromium-desktop-kde-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107686" comment="chromium-ffmpegsumo-41.0.2272.76-17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1229</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1229" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1229" source="CVE"/>
    <description>
    net/http/proxy_client_socket.cc in Google Chrome before 41.0.2272.76 does not properly handle a 407 (aka Proxy Authentication Required) HTTP status code accompanied by a Set-Cookie header, which allows remote proxy servers to conduct cookie-injection attacks via a crafted response.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107682" comment="chromedriver-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107683" comment="chromium-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107684" comment="chromium-desktop-gnome-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107685" comment="chromium-desktop-kde-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107686" comment="chromium-ffmpegsumo-41.0.2272.76-17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1230</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1230" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1230" source="CVE"/>
    <description>
    The getHiddenProperty function in bindings/core/v8/V8EventListenerList.h in Blink, as used in Google Chrome before 41.0.2272.76, has a name conflict with the AudioContext class, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via JavaScript code that adds an AudioContext event listener and triggers "type confusion."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107682" comment="chromedriver-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107683" comment="chromium-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107684" comment="chromium-desktop-gnome-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107685" comment="chromium-desktop-kde-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107686" comment="chromium-ffmpegsumo-41.0.2272.76-17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1231</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1231" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1231" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 41.0.2272.76 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107682" comment="chromedriver-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107683" comment="chromium-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107684" comment="chromium-desktop-gnome-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107685" comment="chromium-desktop-kde-41.0.2272.76-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107686" comment="chromium-ffmpegsumo-41.0.2272.76-17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1233</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1233" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1233" source="CVE"/>
    <description>
    Google Chrome before 41.0.2272.118 does not properly handle the interaction of IPC, the Gamepad API, and Google V8, which allows remote attackers to execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108610" comment="chromedriver-41.0.2272.118-20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108611" comment="chromium-41.0.2272.118-20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108612" comment="chromium-desktop-gnome-41.0.2272.118-20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108613" comment="chromium-desktop-kde-41.0.2272.118-20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108614" comment="chromium-ffmpegsumo-41.0.2272.118-20.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1234</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1234" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1234" source="CVE"/>
    <description>
    Race condition in gpu/command_buffer/service/gles2_cmd_decoder.cc in Google Chrome before 41.0.2272.118 allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact by manipulating OpenGL ES commands.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108610" comment="chromedriver-41.0.2272.118-20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108611" comment="chromium-41.0.2272.118-20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108612" comment="chromium-desktop-gnome-41.0.2272.118-20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108613" comment="chromium-desktop-kde-41.0.2272.118-20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108614" comment="chromium-ffmpegsumo-41.0.2272.118-20.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1235</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1235" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1235" source="CVE"/>
    <description>
    The ContainerNode::parserRemoveChild function in core/dom/ContainerNode.cpp in the HTML parser in Blink, as used in Google Chrome before 42.0.2311.90, allows remote attackers to bypass the Same Origin Policy via a crafted HTML document with an IFRAME element.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109086" comment="chromedriver-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109087" comment="chromium-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109088" comment="chromium-desktop-gnome-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109089" comment="chromium-desktop-kde-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109090" comment="chromium-ffmpegsumo-42.0.2311.90-23.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1236</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1236" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1236" source="CVE"/>
    <description>
    The MediaElementAudioSourceNode::process function in modules/webaudio/MediaElementAudioSourceNode.cpp in the Web Audio API implementation in Blink, as used in Google Chrome before 42.0.2311.90, allows remote attackers to bypass the Same Origin Policy and obtain sensitive audio sample values via a crafted web site containing a media element.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109086" comment="chromedriver-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109087" comment="chromium-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109088" comment="chromium-desktop-gnome-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109089" comment="chromium-desktop-kde-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109090" comment="chromium-ffmpegsumo-42.0.2311.90-23.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1237</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1237" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1237" source="CVE"/>
    <description>
    Use-after-free vulnerability in the RenderFrameImpl::OnMessageReceived function in content/renderer/render_frame_impl.cc in Google Chrome before 42.0.2311.90 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger renderer IPC messages during a detach operation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109086" comment="chromedriver-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109087" comment="chromium-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109088" comment="chromium-desktop-gnome-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109089" comment="chromium-desktop-kde-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109090" comment="chromium-ffmpegsumo-42.0.2311.90-23.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1238</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1238" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1238" source="CVE"/>
    <description>
    Skia, as used in Google Chrome before 42.0.2311.90, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109086" comment="chromedriver-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109087" comment="chromium-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109088" comment="chromium-desktop-gnome-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109089" comment="chromium-desktop-kde-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109090" comment="chromium-ffmpegsumo-42.0.2311.90-23.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1240</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1240" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1240" source="CVE"/>
    <description>
    gpu/blink/webgraphicscontext3d_impl.cc in the WebGL implementation in Google Chrome before 42.0.2311.90 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WebGL program that triggers a state inconsistency.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109086" comment="chromedriver-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109087" comment="chromium-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109088" comment="chromium-desktop-gnome-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109089" comment="chromium-desktop-kde-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109090" comment="chromium-ffmpegsumo-42.0.2311.90-23.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1241</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1241" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1241" source="CVE"/>
    <description>
    Google Chrome before 42.0.2311.90 does not properly consider the interaction of page navigation with the handling of touch events and gesture events, which allows remote attackers to trigger unintended UI actions via a crafted web site that conducts a "tapjacking" attack.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109086" comment="chromedriver-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109087" comment="chromium-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109088" comment="chromium-desktop-gnome-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109089" comment="chromium-desktop-kde-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109090" comment="chromium-ffmpegsumo-42.0.2311.90-23.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1242</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1242" source="CVE"/>
    <description>
    The ReduceTransitionElementsKind function in hydrogen-check-elimination.cc in Google V8 before 4.2.77.8, as used in Google Chrome before 42.0.2311.90, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that leverages "type confusion" in the check-elimination optimization.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109086" comment="chromedriver-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109087" comment="chromium-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109088" comment="chromium-desktop-gnome-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109089" comment="chromium-desktop-kde-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109090" comment="chromium-ffmpegsumo-42.0.2311.90-23.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1243</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1243" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1243" source="CVE"/>
    <description>
    Use-after-free vulnerability in the MutationObserver::disconnect function in core/dom/MutationObserver.cpp in the DOM implementation in Blink, as used in Google Chrome before 42.0.2311.135, allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering an attempt to unregister a MutationObserver object that is not currently registered.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109520" comment="chromedriver-42.0.2311.135-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109521" comment="chromium-42.0.2311.135-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109522" comment="chromium-desktop-gnome-42.0.2311.135-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109523" comment="chromium-desktop-kde-42.0.2311.135-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109524" comment="chromium-ffmpegsumo-42.0.2311.135-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1244</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1244" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1244" source="CVE"/>
    <description>
    The URLRequest::GetHSTSRedirect function in url_request/url_request.cc in Google Chrome before 42.0.2311.90 does not replace the ws scheme with the wss scheme whenever an HSTS Policy is active, which makes it easier for remote attackers to obtain sensitive information by sniffing the network for WebSocket traffic.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109086" comment="chromedriver-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109087" comment="chromium-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109088" comment="chromium-desktop-gnome-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109089" comment="chromium-desktop-kde-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109090" comment="chromium-ffmpegsumo-42.0.2311.90-23.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1245</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1245" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1245" source="CVE"/>
    <description>
    Use-after-free vulnerability in the OpenPDFInReaderView::Update function in browser/ui/views/location_bar/open_pdf_in_reader_view.cc in Google Chrome before 41.0.2272.76 might allow user-assisted remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact by triggering interaction with a PDFium "Open PDF in Reader" button that has an invalid tab association.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109086" comment="chromedriver-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109087" comment="chromium-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109088" comment="chromium-desktop-gnome-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109089" comment="chromium-desktop-kde-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109090" comment="chromium-ffmpegsumo-42.0.2311.90-23.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1246</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1246" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1246" source="CVE"/>
    <description>
    Blink, as used in Google Chrome before 42.0.2311.90, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109086" comment="chromedriver-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109087" comment="chromium-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109088" comment="chromium-desktop-gnome-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109089" comment="chromium-desktop-kde-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109090" comment="chromium-ffmpegsumo-42.0.2311.90-23.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1247</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1247" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1247" source="CVE"/>
    <description>
    The SearchEngineTabHelper::OnPageHasOSDD function in browser/ui/search_engines/search_engine_tab_helper.cc in Google Chrome before 42.0.2311.90 does not prevent use of a file: URL for an OpenSearch descriptor XML document, which might allow remote attackers to obtain sensitive information from local files via a crafted (1) http or (2) https web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109086" comment="chromedriver-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109087" comment="chromium-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109088" comment="chromium-desktop-gnome-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109089" comment="chromium-desktop-kde-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109090" comment="chromium-ffmpegsumo-42.0.2311.90-23.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1248</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1248" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1248" source="CVE"/>
    <description>
    The FileSystem API in Google Chrome before 40.0.2214.91 allows remote attackers to bypass the SafeBrowsing for Executable Files protection mechanism by creating a .exe file in a temporary filesystem and then referencing this file with a filesystem:http: URL.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109086" comment="chromedriver-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109087" comment="chromium-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109088" comment="chromium-desktop-gnome-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109089" comment="chromium-desktop-kde-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109090" comment="chromium-ffmpegsumo-42.0.2311.90-23.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1249</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1249" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1249" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 42.0.2311.90 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109086" comment="chromedriver-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109087" comment="chromium-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109088" comment="chromium-desktop-gnome-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109089" comment="chromium-desktop-kde-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109090" comment="chromium-ffmpegsumo-42.0.2311.90-23.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1250</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1250" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1250" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 42.0.2311.135 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109520" comment="chromedriver-42.0.2311.135-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109521" comment="chromium-42.0.2311.135-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109522" comment="chromium-desktop-gnome-42.0.2311.135-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109523" comment="chromium-desktop-kde-42.0.2311.135-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109524" comment="chromium-ffmpegsumo-42.0.2311.135-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1251</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1251" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1251" source="CVE"/>
    <description>
    Use-after-free vulnerability in the SpeechRecognitionClient implementation in the Speech subsystem in Google Chrome before 43.0.2357.65 allows remote attackers to execute arbitrary code via a crafted document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109977" comment="chromedriver-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109978" comment="chromium-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109979" comment="chromium-desktop-gnome-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109980" comment="chromium-desktop-kde-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109981" comment="chromium-ffmpegsumo-43.0.2357.65-29.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1252</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1252" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1252" source="CVE"/>
    <description>
    common/partial_circular_buffer.cc in Google Chrome before 43.0.2357.65 does not properly handle wraps, which allows remote attackers to bypass a sandbox protection mechanism or cause a denial of service (out-of-bounds write) via vectors that trigger a write operation with a large amount of data, related to the PartialCircularBuffer::Write and PartialCircularBuffer::DoWrite functions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109977" comment="chromedriver-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109978" comment="chromium-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109979" comment="chromium-desktop-gnome-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109980" comment="chromium-desktop-kde-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109981" comment="chromium-ffmpegsumo-43.0.2357.65-29.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151253" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1253</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1253" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1253" source="CVE"/>
    <description>
    core/html/parser/HTMLConstructionSite.cpp in the DOM implementation in Blink, as used in Google Chrome before 43.0.2357.65, allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code that appends a child to a SCRIPT element, related to the insert and executeReparentTask functions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109977" comment="chromedriver-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109978" comment="chromium-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109979" comment="chromium-desktop-gnome-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109980" comment="chromium-desktop-kde-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109981" comment="chromium-ffmpegsumo-43.0.2357.65-29.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1254</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1254" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1254" source="CVE"/>
    <description>
    core/dom/Document.cpp in Blink, as used in Google Chrome before 43.0.2357.65, enables the inheritance of the designMode attribute, which allows remote attackers to bypass the Same Origin Policy by leveraging the availability of editing.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109977" comment="chromedriver-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109978" comment="chromium-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109979" comment="chromium-desktop-gnome-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109980" comment="chromium-desktop-kde-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109981" comment="chromium-ffmpegsumo-43.0.2357.65-29.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1255</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1255" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1255" source="CVE"/>
    <description>
    Use-after-free vulnerability in content/renderer/media/webaudio_capturer_source.cc in the WebAudio implementation in Google Chrome before 43.0.2357.65 allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact by leveraging improper handling of a stop action for an audio track.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109977" comment="chromedriver-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109978" comment="chromium-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109979" comment="chromium-desktop-gnome-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109980" comment="chromium-desktop-kde-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109981" comment="chromium-ffmpegsumo-43.0.2357.65-29.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1256</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1256" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1256" source="CVE"/>
    <description>
    Use-after-free vulnerability in the SVG implementation in Blink, as used in Google Chrome before 43.0.2357.65, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted document that leverages improper handling of a shadow tree for a use element.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109977" comment="chromedriver-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109978" comment="chromium-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109979" comment="chromium-desktop-gnome-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109980" comment="chromium-desktop-kde-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109981" comment="chromium-ffmpegsumo-43.0.2357.65-29.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151257" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1257</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1257" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1257" source="CVE"/>
    <description>
    platform/graphics/filters/FEColorMatrix.cpp in the SVG implementation in Blink, as used in Google Chrome before 43.0.2357.65, does not properly handle an insufficient number of values in an feColorMatrix filter, which allows remote attackers to cause a denial of service (container overflow) or possibly have unspecified other impact via a crafted document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109977" comment="chromedriver-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109978" comment="chromium-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109979" comment="chromium-desktop-gnome-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109980" comment="chromium-desktop-kde-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109981" comment="chromium-ffmpegsumo-43.0.2357.65-29.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1258</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1258" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1258" source="CVE"/>
    <description>
    Google Chrome before 43.0.2357.65 relies on libvpx code that was not built with an appropriate --size-limit value, which allows remote attackers to trigger a negative value for a size field, and consequently cause a denial of service or possibly have unspecified other impact, via a crafted frame size in VP9 video data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109977" comment="chromedriver-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109978" comment="chromium-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109979" comment="chromium-desktop-gnome-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109980" comment="chromium-desktop-kde-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109981" comment="chromium-ffmpegsumo-43.0.2357.65-29.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1259</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1259" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1259" source="CVE"/>
    <description>
    PDFium, as used in Google Chrome before 43.0.2357.65, does not properly initialize memory, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109977" comment="chromedriver-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109978" comment="chromium-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109979" comment="chromium-desktop-gnome-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109980" comment="chromium-desktop-kde-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109981" comment="chromium-ffmpegsumo-43.0.2357.65-29.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151260" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1260</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1260" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1260" source="CVE"/>
    <description>
    Multiple use-after-free vulnerabilities in content/renderer/media/user_media_client_impl.cc in the WebRTC implementation in Google Chrome before 43.0.2357.65 allow remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that executes upon completion of a getUserMedia request.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109977" comment="chromedriver-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109978" comment="chromium-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109979" comment="chromium-desktop-gnome-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109980" comment="chromium-desktop-kde-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109981" comment="chromium-ffmpegsumo-43.0.2357.65-29.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1261</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1261" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1261" source="CVE"/>
    <description>
    android/java/src/org/chromium/chrome/browser/WebsiteSettingsPopup.java in Google Chrome before 43.0.2357.65 on Android does not properly restrict use of a URL's fragment identifier during construction of a page-info popup, which allows remote attackers to spoof the URL bar or deliver misleading popup content via crafted text.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109977" comment="chromedriver-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109978" comment="chromium-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109979" comment="chromium-desktop-gnome-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109980" comment="chromium-desktop-kde-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109981" comment="chromium-ffmpegsumo-43.0.2357.65-29.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1262</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1262" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1262" source="CVE"/>
    <description>
    platform/fonts/shaping/HarfBuzzShaper.cpp in Blink, as used in Google Chrome before 43.0.2357.65, does not initialize a certain width field, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted Unicode text.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109977" comment="chromedriver-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109978" comment="chromium-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109979" comment="chromium-desktop-gnome-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109980" comment="chromium-desktop-kde-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109981" comment="chromium-ffmpegsumo-43.0.2357.65-29.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1263</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1263" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1263" source="CVE"/>
    <description>
    The Spellcheck API implementation in Google Chrome before 43.0.2357.65 does not use an HTTPS session for downloading a Hunspell dictionary, which allows man-in-the-middle attackers to deliver incorrect spelling suggestions or possibly have unspecified other impact via a crafted file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109977" comment="chromedriver-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109978" comment="chromium-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109979" comment="chromium-desktop-gnome-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109980" comment="chromium-desktop-kde-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109981" comment="chromium-ffmpegsumo-43.0.2357.65-29.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1264</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1264" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1264" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Google Chrome before 43.0.2357.65 allows user-assisted remote attackers to inject arbitrary web script or HTML via crafted data that is improperly handled by the Bookmarks feature.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109977" comment="chromedriver-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109978" comment="chromium-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109979" comment="chromium-desktop-gnome-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109980" comment="chromium-desktop-kde-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109981" comment="chromium-ffmpegsumo-43.0.2357.65-29.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1265</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1265" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1265" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 43.0.2357.65 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109977" comment="chromedriver-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109978" comment="chromium-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109979" comment="chromium-desktop-gnome-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109980" comment="chromium-desktop-kde-43.0.2357.65-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109981" comment="chromium-ffmpegsumo-43.0.2357.65-29.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1266</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1266" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1266" source="CVE"/>
    <description>
    content/browser/webui/content_web_ui_controller_factory.cc in Google Chrome before 43.0.2357.130 does not properly consider the scheme in determining whether a URL is associated with a WebUI SiteInstance, which allows remote attackers to bypass intended access restrictions via a similar URL, as demonstrated by use of http://gpu when there is a WebUI class for handling chrome://gpu requests.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110754" comment="chromedriver-43.0.2357.130-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110755" comment="chromium-43.0.2357.130-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110756" comment="chromium-desktop-gnome-43.0.2357.130-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110757" comment="chromium-desktop-kde-43.0.2357.130-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110758" comment="chromium-ffmpegsumo-43.0.2357.130-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1267</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1267" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1267" source="CVE"/>
    <description>
    Blink, as used in Google Chrome before 43.0.2357.130, does not properly restrict the creation context during creation of a DOM wrapper, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code that uses a Blink public API, related to WebArrayBufferConverter.cpp, WebBlob.cpp, WebDOMError.cpp, and WebDOMFileSystem.cpp.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110754" comment="chromedriver-43.0.2357.130-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110755" comment="chromium-43.0.2357.130-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110756" comment="chromium-desktop-gnome-43.0.2357.130-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110757" comment="chromium-desktop-kde-43.0.2357.130-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110758" comment="chromium-ffmpegsumo-43.0.2357.130-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1268</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1268" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1268" source="CVE"/>
    <description>
    bindings/scripts/v8_types.py in Blink, as used in Google Chrome before 43.0.2357.130, does not properly select a creation context for a return value's DOM wrapper, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code, as demonstrated by use of a data: URL.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110754" comment="chromedriver-43.0.2357.130-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110755" comment="chromium-43.0.2357.130-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110756" comment="chromium-desktop-gnome-43.0.2357.130-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110757" comment="chromium-desktop-kde-43.0.2357.130-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110758" comment="chromium-ffmpegsumo-43.0.2357.130-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1269</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1269" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1269" source="CVE"/>
    <description>
    The DecodeHSTSPreloadRaw function in net/http/transport_security_state.cc in Google Chrome before 43.0.2357.130 does not properly canonicalize DNS hostnames before making comparisons to HSTS or HPKP preload entries, which allows remote attackers to bypass intended access restrictions via a string that (1) ends in a . (dot) character or (2) is not entirely lowercase.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110754" comment="chromedriver-43.0.2357.130-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110755" comment="chromium-43.0.2357.130-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110756" comment="chromium-desktop-gnome-43.0.2357.130-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110757" comment="chromium-desktop-kde-43.0.2357.130-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110758" comment="chromium-ffmpegsumo-43.0.2357.130-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1270</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1270" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1270" source="CVE"/>
    <description>
    The ucnv_io_getConverterName function in common/ucnv_io.cpp in International Components for Unicode (ICU), as used in Google Chrome before 44.0.2403.89, mishandles converter names with initial x- substrings, which allows remote attackers to cause a denial of service (read of uninitialized memory) or possibly have unspecified other impact via a crafted file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111340" comment="chromedriver-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111341" comment="chromium-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111342" comment="chromium-desktop-gnome-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111343" comment="chromium-desktop-kde-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111344" comment="chromium-ffmpegsumo-44.0.2403.89-38.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1271</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1271" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1271" source="CVE"/>
    <description>
    PDFium, as used in Google Chrome before 44.0.2403.89, does not properly handle certain out-of-memory conditions, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted PDF document that triggers a large memory allocation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111340" comment="chromedriver-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111341" comment="chromium-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111342" comment="chromium-desktop-gnome-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111343" comment="chromium-desktop-kde-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111344" comment="chromium-ffmpegsumo-44.0.2403.89-38.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1272</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1272" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1272" source="CVE"/>
    <description>
    Use-after-free vulnerability in the GPU process implementation in Google Chrome before 44.0.2403.89 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging the continued availability of a GPUChannelHost data structure during Blink shutdown, related to content/browser/gpu/browser_gpu_channel_host_factory.cc and content/renderer/render_thread_impl.cc.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111340" comment="chromedriver-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111341" comment="chromium-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111342" comment="chromium-desktop-gnome-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111343" comment="chromium-desktop-kde-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111344" comment="chromium-ffmpegsumo-44.0.2403.89-38.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1273</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1273" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1273" source="CVE"/>
    <description>
    Heap-based buffer overflow in j2k.c in OpenJPEG before r3002, as used in PDFium in Google Chrome before 44.0.2403.89, allows remote attackers to cause a denial of service or possibly have unspecified other impact via invalid JPEG2000 data in a PDF document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111340" comment="chromedriver-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111341" comment="chromium-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111342" comment="chromium-desktop-gnome-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111343" comment="chromium-desktop-kde-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111344" comment="chromium-ffmpegsumo-44.0.2403.89-38.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1274</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1274" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1274" source="CVE"/>
    <description>
    Google Chrome before 44.0.2403.89 does not ensure that the auto-open list omits all dangerous file types, which makes it easier for remote attackers to execute arbitrary code by providing a crafted file and leveraging a user's previous "Always open files of this type" choice, related to download_commands.cc and download_prefs.cc.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111340" comment="chromedriver-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111341" comment="chromium-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111342" comment="chromium-desktop-gnome-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111343" comment="chromium-desktop-kde-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111344" comment="chromium-ffmpegsumo-44.0.2403.89-38.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1275</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1275" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1275" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in org/chromium/chrome/browser/UrlUtilities.java in Google Chrome before 44.0.2403.89 on Android allows remote attackers to inject arbitrary web script or HTML via a crafted intent: URL, as demonstrated by a trailing alert(document.cookie);// substring, aka "Universal XSS (UXSS)."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111340" comment="chromedriver-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111341" comment="chromium-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111342" comment="chromium-desktop-gnome-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111343" comment="chromium-desktop-kde-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111344" comment="chromium-ffmpegsumo-44.0.2403.89-38.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1276</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1276" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1276" source="CVE"/>
    <description>
    Use-after-free vulnerability in content/browser/indexed_db/indexed_db_backing_store.cc in the IndexedDB implementation in Google Chrome before 44.0.2403.89 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging an abort action before a certain write operation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111340" comment="chromedriver-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111341" comment="chromium-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111342" comment="chromium-desktop-gnome-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111343" comment="chromium-desktop-kde-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111344" comment="chromium-ffmpegsumo-44.0.2403.89-38.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1277</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1277" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1277" source="CVE"/>
    <description>
    Use-after-free vulnerability in the accessibility implementation in Google Chrome before 44.0.2403.89 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging lack of certain validity checks for accessibility-tree data structures.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111340" comment="chromedriver-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111341" comment="chromium-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111342" comment="chromium-desktop-gnome-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111343" comment="chromium-desktop-kde-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111344" comment="chromium-ffmpegsumo-44.0.2403.89-38.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1278</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1278" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1278" source="CVE"/>
    <description>
    content/browser/web_contents/web_contents_impl.cc in Google Chrome before 44.0.2403.89 does not ensure that a PDF document's modal dialog is closed upon navigation to an interstitial page, which allows remote attackers to spoof URLs via a crafted document, as demonstrated by the alert_dialog.pdf document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111340" comment="chromedriver-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111341" comment="chromium-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111342" comment="chromium-desktop-gnome-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111343" comment="chromium-desktop-kde-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111344" comment="chromium-ffmpegsumo-44.0.2403.89-38.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151279" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1279</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1279" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1279" source="CVE"/>
    <description>
    Integer overflow in the CJBig2_Image::expand function in fxcodec/jbig2/JBig2_Image.cpp in PDFium, as used in Google Chrome before 44.0.2403.89, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via large height and stride values.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111340" comment="chromedriver-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111341" comment="chromium-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111342" comment="chromium-desktop-gnome-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111343" comment="chromium-desktop-kde-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111344" comment="chromium-ffmpegsumo-44.0.2403.89-38.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151280" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1280</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1280" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1280" source="CVE"/>
    <description>
    SkPictureShader.cpp in Skia, as used in Google Chrome before 44.0.2403.89, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging access to a renderer process and providing crafted serialized data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111340" comment="chromedriver-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111341" comment="chromium-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111342" comment="chromium-desktop-gnome-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111343" comment="chromium-desktop-kde-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111344" comment="chromium-ffmpegsumo-44.0.2403.89-38.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1281</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1281" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1281" source="CVE"/>
    <description>
    core/loader/ImageLoader.cpp in Blink, as used in Google Chrome before 44.0.2403.89, does not properly determine the V8 context of a microtask, which allows remote attackers to bypass Content Security Policy (CSP) restrictions by providing an image from an unintended source.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111340" comment="chromedriver-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111341" comment="chromium-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111342" comment="chromium-desktop-gnome-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111343" comment="chromium-desktop-kde-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111344" comment="chromium-ffmpegsumo-44.0.2403.89-38.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1282</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1282" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1282" source="CVE"/>
    <description>
    Multiple use-after-free vulnerabilities in fpdfsdk/src/javascript/Document.cpp in PDFium, as used in Google Chrome before 44.0.2403.89, allow remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted PDF document, related to the (1) Document::delay and (2) Document::DoFieldDelay functions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111340" comment="chromedriver-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111341" comment="chromium-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111342" comment="chromium-desktop-gnome-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111343" comment="chromium-desktop-kde-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111344" comment="chromium-ffmpegsumo-44.0.2403.89-38.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1283</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1283" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1283" source="CVE"/>
    <description>
    Multiple integer overflows in the XML_GetBuffer function in Expat through 2.1.0, as used in Google Chrome before 44.0.2403.89 and other products, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted XML data, a related issue to CVE-2015-2716.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111340" comment="chromedriver-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111341" comment="chromium-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111342" comment="chromium-desktop-gnome-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111343" comment="chromium-desktop-kde-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111344" comment="chromium-ffmpegsumo-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128279" comment="expat-2.1.0-14.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128280" comment="libexpat-devel-2.1.0-14.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128281" comment="libexpat-devel-32bit-2.1.0-14.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128282" comment="libexpat1-2.1.0-14.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128283" comment="libexpat1-32bit-2.1.0-14.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1284</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1284" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1284" source="CVE"/>
    <description>
    The LocalFrame::isURLAllowed function in core/frame/LocalFrame.cpp in Blink, as used in Google Chrome before 44.0.2403.89, does not properly check for a page's maximum number of frames, which allows remote attackers to cause a denial of service (invalid count value and use-after-free) or possibly have unspecified other impact via crafted JavaScript code that makes many createElement calls for IFRAME elements.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111340" comment="chromedriver-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111341" comment="chromium-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111342" comment="chromium-desktop-gnome-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111343" comment="chromium-desktop-kde-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111344" comment="chromium-ffmpegsumo-44.0.2403.89-38.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1285</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1285" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1285" source="CVE"/>
    <description>
    The XSSAuditor::canonicalize function in core/html/parser/XSSAuditor.cpp in the XSS auditor in Blink, as used in Google Chrome before 44.0.2403.89, does not properly choose a truncation point, which makes it easier for remote attackers to obtain sensitive information via an unspecified linear-time attack.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111340" comment="chromedriver-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111341" comment="chromium-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111342" comment="chromium-desktop-gnome-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111343" comment="chromium-desktop-kde-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111344" comment="chromium-ffmpegsumo-44.0.2403.89-38.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1286</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1286" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1286" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the V8ContextNativeHandler::GetModuleSystem function in extensions/renderer/v8_context_native_handler.cc in Google Chrome before 44.0.2403.89 allows remote attackers to inject arbitrary web script or HTML by leveraging the lack of a certain V8 context restriction, aka a Blink "Universal XSS (UXSS)."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111340" comment="chromedriver-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111341" comment="chromium-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111342" comment="chromium-desktop-gnome-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111343" comment="chromium-desktop-kde-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111344" comment="chromium-ffmpegsumo-44.0.2403.89-38.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1287</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1287" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1287" source="CVE"/>
    <description>
    Blink, as used in Google Chrome before 44.0.2403.89, enables a quirks-mode exception that limits the cases in which a Cascading Style Sheets (CSS) document is required to have the text/css content type, which allows remote attackers to bypass the Same Origin Policy via a crafted web site, related to core/fetch/CSSStyleSheetResource.cpp.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111340" comment="chromedriver-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111341" comment="chromium-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111342" comment="chromium-desktop-gnome-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111343" comment="chromium-desktop-kde-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111344" comment="chromium-ffmpegsumo-44.0.2403.89-38.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1288</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1288" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1288" source="CVE"/>
    <description>
    The Spellcheck API implementation in Google Chrome before 44.0.2403.89 does not use an HTTPS session for downloading a Hunspell dictionary, which allows man-in-the-middle attackers to deliver incorrect spelling suggestions or possibly have unspecified other impact via a crafted file, a related issue to CVE-2015-1263.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111340" comment="chromedriver-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111341" comment="chromium-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111342" comment="chromium-desktop-gnome-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111343" comment="chromium-desktop-kde-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111344" comment="chromium-ffmpegsumo-44.0.2403.89-38.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1289</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1289" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1289" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 44.0.2403.89 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111340" comment="chromedriver-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111341" comment="chromium-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111342" comment="chromium-desktop-gnome-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111343" comment="chromium-desktop-kde-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111344" comment="chromium-ffmpegsumo-44.0.2403.89-38.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1291</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1291" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1291" source="CVE"/>
    <description>
    The ContainerNode::parserRemoveChild function in core/dom/ContainerNode.cpp in Blink, as used in Google Chrome before 45.0.2454.85, does not check whether a node is expected, which allows remote attackers to bypass the Same Origin Policy or cause a denial of service (DOM tree corruption) via a web site with crafted JavaScript code and IFRAME elements.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114376" comment="chromedriver-45.0.2454.85-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114377" comment="chromium-45.0.2454.85-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114378" comment="chromium-desktop-gnome-45.0.2454.85-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114379" comment="chromium-desktop-kde-45.0.2454.85-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114380" comment="chromium-ffmpegsumo-45.0.2454.85-43.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1292</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1292" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1292" source="CVE"/>
    <description>
    The NavigatorServiceWorker::serviceWorker function in modules/serviceworkers/NavigatorServiceWorker.cpp in Blink, as used in Google Chrome before 45.0.2454.85, allows remote attackers to bypass the Same Origin Policy by accessing a Service Worker.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114376" comment="chromedriver-45.0.2454.85-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114377" comment="chromium-45.0.2454.85-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114378" comment="chromium-desktop-gnome-45.0.2454.85-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114379" comment="chromium-desktop-kde-45.0.2454.85-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114380" comment="chromium-ffmpegsumo-45.0.2454.85-43.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1293</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1293" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1293" source="CVE"/>
    <description>
    The DOM implementation in Blink, as used in Google Chrome before 45.0.2454.85, allows remote attackers to bypass the Same Origin Policy via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114376" comment="chromedriver-45.0.2454.85-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114377" comment="chromium-45.0.2454.85-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114378" comment="chromium-desktop-gnome-45.0.2454.85-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114379" comment="chromium-desktop-kde-45.0.2454.85-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114380" comment="chromium-ffmpegsumo-45.0.2454.85-43.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1294</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1294" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1294" source="CVE"/>
    <description>
    Use-after-free vulnerability in the SkMatrix::invertNonIdentity function in core/SkMatrix.cpp in Skia, as used in Google Chrome before 45.0.2454.85, allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering the use of matrix elements that lead to an infinite result during an inversion calculation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114376" comment="chromedriver-45.0.2454.85-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114377" comment="chromium-45.0.2454.85-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114378" comment="chromium-desktop-gnome-45.0.2454.85-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114379" comment="chromium-desktop-kde-45.0.2454.85-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114380" comment="chromium-ffmpegsumo-45.0.2454.85-43.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1295</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1295" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1295" source="CVE"/>
    <description>
    Multiple use-after-free vulnerabilities in the PrintWebViewHelper class in components/printing/renderer/print_web_view_helper.cc in Google Chrome before 45.0.2454.85 allow user-assisted remote attackers to cause a denial of service or possibly have unspecified other impact by triggering nested IPC messages during preparation for printing, as demonstrated by messages associated with PDF documents in conjunction with messages about printer capabilities.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114376" comment="chromedriver-45.0.2454.85-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114377" comment="chromium-45.0.2454.85-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114378" comment="chromium-desktop-gnome-45.0.2454.85-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114379" comment="chromium-desktop-kde-45.0.2454.85-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114380" comment="chromium-ffmpegsumo-45.0.2454.85-43.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1296</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1296" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1296" source="CVE"/>
    <description>
    The UnescapeURLWithAdjustmentsImpl implementation in net/base/escape.cc in Google Chrome before 45.0.2454.85 does not prevent display of Unicode LOCK characters in the omnibox, which makes it easier for remote attackers to spoof the SSL lock icon by placing one of these characters at the end of a URL, as demonstrated by the omnibox in localizations for right-to-left languages.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114376" comment="chromedriver-45.0.2454.85-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114377" comment="chromium-45.0.2454.85-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114378" comment="chromium-desktop-gnome-45.0.2454.85-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114379" comment="chromium-desktop-kde-45.0.2454.85-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114380" comment="chromium-ffmpegsumo-45.0.2454.85-43.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1297</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1297" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1297" source="CVE"/>
    <description>
    The WebRequest API implementation in extensions/browser/api/web_request/web_request_api.cc in Google Chrome before 45.0.2454.85 does not properly consider a request's source before accepting the request, which allows remote attackers to bypass intended access restrictions via a crafted (1) app or (2) extension.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114376" comment="chromedriver-45.0.2454.85-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114377" comment="chromium-45.0.2454.85-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114378" comment="chromium-desktop-gnome-45.0.2454.85-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114379" comment="chromium-desktop-kde-45.0.2454.85-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114380" comment="chromium-ffmpegsumo-45.0.2454.85-43.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1298</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1298" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1298" source="CVE"/>
    <description>
    The RuntimeEventRouter::OnExtensionUninstalled function in extensions/browser/api/runtime/runtime_api.cc in Google Chrome before 45.0.2454.85 does not ensure that the setUninstallURL preference corresponds to the URL of a web site, which allows user-assisted remote attackers to trigger access to an arbitrary URL via a crafted extension that is uninstalled.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114376" comment="chromedriver-45.0.2454.85-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114377" comment="chromium-45.0.2454.85-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114378" comment="chromium-desktop-gnome-45.0.2454.85-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114379" comment="chromium-desktop-kde-45.0.2454.85-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114380" comment="chromium-ffmpegsumo-45.0.2454.85-43.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1299</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1299" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1299" source="CVE"/>
    <description>
    Use-after-free vulnerability in the shared-timer implementation in Blink, as used in Google Chrome before 45.0.2454.85, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging erroneous timer firing, related to ThreadTimers.cpp and Timer.cpp.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114376" comment="chromedriver-45.0.2454.85-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114377" comment="chromium-45.0.2454.85-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114378" comment="chromium-desktop-gnome-45.0.2454.85-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114379" comment="chromium-desktop-kde-45.0.2454.85-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114380" comment="chromium-ffmpegsumo-45.0.2454.85-43.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1300</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1300" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1300" source="CVE"/>
    <description>
    The FrameFetchContext::updateTimingInfoForIFrameNavigation function in core/loader/FrameFetchContext.cpp in Blink, as used in Google Chrome before 45.0.2454.85, does not properly restrict the availability of IFRAME Resource Timing API times, which allows remote attackers to obtain sensitive information via crafted JavaScript code that leverages a history.back call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114376" comment="chromedriver-45.0.2454.85-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114377" comment="chromium-45.0.2454.85-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114378" comment="chromium-desktop-gnome-45.0.2454.85-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114379" comment="chromium-desktop-kde-45.0.2454.85-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114380" comment="chromium-ffmpegsumo-45.0.2454.85-43.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1301</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1301" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1301" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 45.0.2454.85 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114376" comment="chromedriver-45.0.2454.85-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114377" comment="chromium-45.0.2454.85-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114378" comment="chromium-desktop-gnome-45.0.2454.85-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114379" comment="chromium-desktop-kde-45.0.2454.85-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114380" comment="chromium-ffmpegsumo-45.0.2454.85-43.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1302</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1302" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1302" source="CVE"/>
    <description>
    The PDF viewer in Google Chrome before 46.0.2490.86 does not properly restrict scripting messages and API exposure, which allows remote attackers to bypass the Same Origin Policy via an unintended embedder or unintended plugin loading, related to pdf.js and out_of_process_instance.cc.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118061" comment="chromedriver-46.0.2490.86-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118062" comment="chromium-46.0.2490.86-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118063" comment="chromium-desktop-gnome-46.0.2490.86-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118064" comment="chromium-desktop-kde-46.0.2490.86-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118065" comment="chromium-ffmpegsumo-46.0.2490.86-57.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1303</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1303" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1303" source="CVE"/>
    <description>
    bindings/core/v8/V8DOMWrapper.h in Blink, as used in Google Chrome before 45.0.2454.101, does not perform a rethrow action to propagate information about a cross-context exception, which allows remote attackers to bypass the Same Origin Policy via a crafted HTML document containing an IFRAME element.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114971" comment="chromedriver-45.0.2454.101-50.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114972" comment="chromium-45.0.2454.101-50.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114973" comment="chromium-desktop-gnome-45.0.2454.101-50.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114974" comment="chromium-desktop-kde-45.0.2454.101-50.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114975" comment="chromium-ffmpegsumo-45.0.2454.101-50.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1304</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1304" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1304" source="CVE"/>
    <description>
    object-observe.js in Google V8, as used in Google Chrome before 45.0.2454.101, does not properly restrict method calls on access-checked objects, which allows remote attackers to bypass the Same Origin Policy via a (1) observe or (2) getNotifier call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114971" comment="chromedriver-45.0.2454.101-50.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114972" comment="chromium-45.0.2454.101-50.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114973" comment="chromium-desktop-gnome-45.0.2454.101-50.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114974" comment="chromium-desktop-kde-45.0.2454.101-50.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114975" comment="chromium-ffmpegsumo-45.0.2454.101-50.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1331</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1331" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1331" source="CVE"/>
    <description>
    lxclock.c in LXC 1.1.2 and earlier allows local users to create arbitrary files via a symlink attack on /run/lock/lxc/*.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111521" comment="lxc-1.0.6-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111522" comment="lxc-devel-1.0.6-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151333" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1333</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1333" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1333" source="CVE"/>
    <description>
    Memory leak in the __key_link_end function in security/keys/keyring.c in the Linux kernel before 4.1.4 allows local users to cause a denial of service (memory consumption) via many add_key system calls that refer to existing keys.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115288" comment="bbswitch-0.8-3.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115289" comment="bbswitch-kmp-default-0.8_k3.16.7_29-3.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115290" comment="bbswitch-kmp-desktop-0.8_k3.16.7_29-3.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115291" comment="bbswitch-kmp-pae-0.8_k3.16.7_29-3.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115292" comment="bbswitch-kmp-xen-0.8_k3.16.7_29-3.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115293" comment="cloop-2.639-14.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115294" comment="cloop-kmp-default-2.639_k3.16.7_29-14.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115295" comment="cloop-kmp-desktop-2.639_k3.16.7_29-14.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115296" comment="cloop-kmp-pae-2.639_k3.16.7_29-14.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115297" comment="cloop-kmp-xen-2.639_k3.16.7_29-14.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115298" comment="crash-7.0.8-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115299" comment="crash-devel-7.0.8-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115300" comment="crash-doc-7.0.8-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115301" comment="crash-eppic-7.0.8-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115302" comment="crash-gcore-7.0.8-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115303" comment="crash-kmp-default-7.0.8_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115304" comment="crash-kmp-desktop-7.0.8_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115305" comment="crash-kmp-pae-7.0.8_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115306" comment="crash-kmp-xen-7.0.8_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115307" comment="hdjmod-1.28-18.14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115308" comment="hdjmod-kmp-default-1.28_k3.16.7_29-18.14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115309" comment="hdjmod-kmp-desktop-1.28_k3.16.7_29-18.14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115310" comment="hdjmod-kmp-pae-1.28_k3.16.7_29-18.14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115311" comment="hdjmod-kmp-xen-1.28_k3.16.7_29-18.14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115312" comment="ipset-6.23-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115313" comment="ipset-devel-6.23-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115314" comment="ipset-kmp-default-6.23_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115315" comment="ipset-kmp-desktop-6.23_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115316" comment="ipset-kmp-pae-6.23_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115317" comment="ipset-kmp-xen-6.23_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115319" comment="kernel-debug-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115320" comment="kernel-debug-base-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115321" comment="kernel-debug-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115322" comment="kernel-default-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115323" comment="kernel-default-base-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115324" comment="kernel-default-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115325" comment="kernel-desktop-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115326" comment="kernel-desktop-base-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115327" comment="kernel-desktop-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115338" comment="kernel-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115328" comment="kernel-docs-3.16.7-29.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115329" comment="kernel-ec2-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115330" comment="kernel-ec2-base-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115331" comment="kernel-ec2-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115339" comment="kernel-macros-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115332" comment="kernel-obs-build-3.16.7-29.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115334" comment="kernel-obs-qa-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115333" comment="kernel-obs-qa-xen-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115335" comment="kernel-pae-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115336" comment="kernel-pae-base-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115337" comment="kernel-pae-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115340" comment="kernel-source-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115341" comment="kernel-source-vanilla-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115342" comment="kernel-syms-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115343" comment="kernel-vanilla-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115344" comment="kernel-vanilla-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115345" comment="kernel-xen-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115346" comment="kernel-xen-base-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115347" comment="kernel-xen-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115318" comment="libipset3-6.23-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115348" comment="pcfclock-0.44-260.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115349" comment="pcfclock-kmp-default-0.44_k3.16.7_29-260.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115350" comment="pcfclock-kmp-desktop-0.44_k3.16.7_29-260.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115351" comment="pcfclock-kmp-pae-0.44_k3.16.7_29-260.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115352" comment="vhba-kmp-20140629-2.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115353" comment="vhba-kmp-default-20140629_k3.16.7_29-2.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115354" comment="vhba-kmp-desktop-20140629_k3.16.7_29-2.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115355" comment="vhba-kmp-pae-20140629_k3.16.7_29-2.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115356" comment="vhba-kmp-xen-20140629_k3.16.7_29-2.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115357" comment="xen-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115358" comment="xen-devel-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115367" comment="xen-doc-html-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115368" comment="xen-kmp-default-4.4.2_06_k3.16.7_29-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115369" comment="xen-kmp-desktop-4.4.2_06_k3.16.7_29-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115360" comment="xen-libs-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115359" comment="xen-libs-32bit-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115370" comment="xen-tools-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115361" comment="xen-tools-domU-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115362" comment="xtables-addons-2.6-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115363" comment="xtables-addons-kmp-default-2.6_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115364" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115365" comment="xtables-addons-kmp-pae-2.6_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115366" comment="xtables-addons-kmp-xen-2.6_k3.16.7_29-13.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151334" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1334</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1334" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1334" source="CVE"/>
    <description>
    attach.c in LXC 1.1.2 and earlier uses the proc filesystem in a container, which allows local container users to escape AppArmor or SELinux confinement by mounting a proc filesystem with a crafted (1) AppArmor profile or (2) SELinux label.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111521" comment="lxc-1.0.6-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111522" comment="lxc-devel-1.0.6-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1335</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1335" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1335" source="CVE"/>
    <description>
    lxc-start in lxc before 1.0.8 and 1.1.x before 1.1.4 allows local container administrators to escape AppArmor confinement via a symlink attack on a (1) mount target or (2) bind mount source.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114964" comment="lxc-1.0.6-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114965" comment="lxc-devel-1.0.6-9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1345</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1345" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1345" source="CVE"/>
    <description>
    The bmexec_trans function in kwset.c in grep 2.19 through 2.21 allows local users to cause a denial of service (out-of-bounds heap read and crash) via crafted input when using the -F option.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105945" comment="grep-2.20-2.4.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1349</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1349" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1349" source="CVE"/>
    <description>
    named in ISC BIND 9.7.0 through 9.9.6 before 9.9.6-P2 and 9.10.x before 9.10.1-P2, when DNSSEC validation and the managed-keys feature are enabled, allows remote attackers to cause a denial of service (assertion failure and daemon exit, or daemon crash) by triggering an incorrect trust-anchor management scenario in which no key is ready for use.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111175" comment="bind-9.9.6P1-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111176" comment="bind-chrootenv-9.9.6P1-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111177" comment="bind-devel-9.9.6P1-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111178" comment="bind-doc-9.9.6P1-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111180" comment="bind-libs-9.9.6P1-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111179" comment="bind-libs-32bit-9.9.6P1-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111181" comment="bind-lwresd-9.9.6P1-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111182" comment="bind-utils-9.9.6P1-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1380</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1380" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1380" source="CVE"/>
    <description>
    jcc.c in Privoxy before 3.0.23 allows remote attackers to cause a denial of service (abort) via a crafted chunk-encoded body.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105925" comment="privoxy-3.0.23-8.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105926" comment="privoxy-doc-3.0.23-8.8.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1381</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1381" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1381" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in pcrs.c in Privoxy before 3.0.23 allow remote attackers to cause a denial of service (segmentation fault or memory consumption) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105925" comment="privoxy-3.0.23-8.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105926" comment="privoxy-doc-3.0.23-8.8.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1382</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1382" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1382" source="CVE"/>
    <description>
    parsers.c in Privoxy before 3.0.23 allows remote attackers to cause a denial of service (invalid read and crash) via vectors related to an HTTP time header.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009105925" comment="privoxy-3.0.23-8.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009105926" comment="privoxy-doc-3.0.23-8.8.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1419</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1419" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1419" source="CVE"/>
    <description>
    Unspecified vulnerability in vsftp 3.0.2 and earlier allows remote attackers to bypass access restrictions via unknown vectors, related to deny_file parsing.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107011" comment="vsftpd-3.0.2-14.9.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1420</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1420" source="CVE"/>
    <description>
    Race condition in the handle_to_path function in fs/fhandle.c in the Linux kernel through 3.19.1 allows local users to bypass intended size restrictions and trigger read operations on additional memory locations by changing the handle_bytes value of a file handle during the execution of this function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113567" comment="bbswitch-0.8-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113568" comment="bbswitch-kmp-default-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113569" comment="bbswitch-kmp-desktop-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113570" comment="bbswitch-kmp-pae-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113571" comment="bbswitch-kmp-xen-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113572" comment="cloop-2.639-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113573" comment="cloop-kmp-default-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113574" comment="cloop-kmp-desktop-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113575" comment="cloop-kmp-pae-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113576" comment="cloop-kmp-xen-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113577" comment="crash-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113578" comment="crash-devel-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113579" comment="crash-doc-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113580" comment="crash-eppic-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113581" comment="crash-gcore-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113582" comment="crash-kmp-default-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113583" comment="crash-kmp-desktop-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113584" comment="crash-kmp-pae-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113585" comment="crash-kmp-xen-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113586" comment="hdjmod-1.28-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113587" comment="hdjmod-kmp-default-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113588" comment="hdjmod-kmp-desktop-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113589" comment="hdjmod-kmp-pae-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113590" comment="hdjmod-kmp-xen-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113591" comment="ipset-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113592" comment="ipset-devel-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113593" comment="ipset-kmp-default-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113594" comment="ipset-kmp-desktop-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113595" comment="ipset-kmp-pae-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113596" comment="ipset-kmp-xen-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113598" comment="kernel-debug-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113599" comment="kernel-debug-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113600" comment="kernel-debug-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113601" comment="kernel-default-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113602" comment="kernel-default-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113603" comment="kernel-default-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113604" comment="kernel-desktop-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113605" comment="kernel-desktop-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113606" comment="kernel-desktop-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113617" comment="kernel-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113607" comment="kernel-docs-3.16.7-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113608" comment="kernel-ec2-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113609" comment="kernel-ec2-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113610" comment="kernel-ec2-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113618" comment="kernel-macros-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113611" comment="kernel-obs-build-3.16.7-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113613" comment="kernel-obs-qa-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113612" comment="kernel-obs-qa-xen-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113614" comment="kernel-pae-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113615" comment="kernel-pae-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113616" comment="kernel-pae-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113619" comment="kernel-source-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113620" comment="kernel-source-vanilla-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113621" comment="kernel-syms-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113622" comment="kernel-vanilla-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113623" comment="kernel-vanilla-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113624" comment="kernel-xen-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113625" comment="kernel-xen-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113626" comment="kernel-xen-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113597" comment="libipset3-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113627" comment="pcfclock-0.44-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113628" comment="pcfclock-kmp-default-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113629" comment="pcfclock-kmp-desktop-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113630" comment="pcfclock-kmp-pae-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113631" comment="vhba-kmp-20140629-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113632" comment="vhba-kmp-default-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113633" comment="vhba-kmp-desktop-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113634" comment="vhba-kmp-pae-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113635" comment="vhba-kmp-xen-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113636" comment="xen-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113637" comment="xen-devel-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113646" comment="xen-doc-html-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113647" comment="xen-kmp-default-4.4.2_06_k3.16.7_24-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113648" comment="xen-kmp-desktop-4.4.2_06_k3.16.7_24-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113639" comment="xen-libs-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113638" comment="xen-libs-32bit-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113649" comment="xen-tools-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113640" comment="xen-tools-domU-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113641" comment="xtables-addons-2.6-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113642" comment="xtables-addons-kmp-default-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113643" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113644" comment="xtables-addons-kmp-pae-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113645" comment="xtables-addons-kmp-xen-2.6_k3.16.7_24-11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1421</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1421" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1421" source="CVE"/>
    <description>
    Use-after-free vulnerability in the sctp_assoc_update function in net/sctp/associola.c in the Linux kernel before 3.18.8 allows remote attackers to cause a denial of service (slab corruption and panic) or possibly have unspecified other impact by triggering an INIT collision that leads to improper handling of shared-key data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108989" comment="bbswitch-0.8-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108990" comment="bbswitch-kmp-default-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108991" comment="bbswitch-kmp-desktop-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108992" comment="bbswitch-kmp-pae-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108993" comment="bbswitch-kmp-xen-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108994" comment="cloop-2.639-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108995" comment="cloop-kmp-default-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108996" comment="cloop-kmp-desktop-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108997" comment="cloop-kmp-pae-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108998" comment="cloop-kmp-xen-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108999" comment="crash-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109000" comment="crash-devel-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109001" comment="crash-doc-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109002" comment="crash-eppic-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109003" comment="crash-gcore-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109004" comment="crash-kmp-default-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109005" comment="crash-kmp-desktop-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109006" comment="crash-kmp-pae-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109007" comment="crash-kmp-xen-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109008" comment="hdjmod-1.28-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109009" comment="hdjmod-kmp-default-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109010" comment="hdjmod-kmp-desktop-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109011" comment="hdjmod-kmp-pae-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109012" comment="hdjmod-kmp-xen-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109013" comment="ipset-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109014" comment="ipset-devel-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109015" comment="ipset-kmp-default-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109016" comment="ipset-kmp-desktop-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109017" comment="ipset-kmp-pae-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109018" comment="ipset-kmp-xen-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109020" comment="kernel-debug-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109021" comment="kernel-debug-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109022" comment="kernel-debug-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109023" comment="kernel-default-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109024" comment="kernel-default-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109025" comment="kernel-default-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109026" comment="kernel-desktop-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109027" comment="kernel-desktop-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109028" comment="kernel-desktop-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109039" comment="kernel-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109029" comment="kernel-docs-3.16.7-21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109030" comment="kernel-ec2-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109031" comment="kernel-ec2-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109032" comment="kernel-ec2-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109040" comment="kernel-macros-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109033" comment="kernel-obs-build-3.16.7-21.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109035" comment="kernel-obs-qa-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109034" comment="kernel-obs-qa-xen-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109036" comment="kernel-pae-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109037" comment="kernel-pae-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109038" comment="kernel-pae-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109041" comment="kernel-source-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109042" comment="kernel-source-vanilla-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109043" comment="kernel-syms-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109044" comment="kernel-vanilla-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109045" comment="kernel-vanilla-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109046" comment="kernel-xen-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109047" comment="kernel-xen-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109048" comment="kernel-xen-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109019" comment="libipset3-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109049" comment="pcfclock-0.44-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109050" comment="pcfclock-kmp-default-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109051" comment="pcfclock-kmp-desktop-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109052" comment="pcfclock-kmp-pae-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109058" comment="python-virtualbox-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109053" comment="vhba-kmp-20140629-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109054" comment="vhba-kmp-default-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109055" comment="vhba-kmp-desktop-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109056" comment="vhba-kmp-pae-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109057" comment="vhba-kmp-xen-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109059" comment="virtualbox-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109060" comment="virtualbox-devel-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109061" comment="virtualbox-guest-desktop-icons-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109062" comment="virtualbox-guest-kmp-default-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109063" comment="virtualbox-guest-kmp-desktop-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109064" comment="virtualbox-guest-kmp-pae-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109065" comment="virtualbox-guest-tools-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109066" comment="virtualbox-guest-x11-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109067" comment="virtualbox-host-kmp-default-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109068" comment="virtualbox-host-kmp-desktop-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109069" comment="virtualbox-host-kmp-pae-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109070" comment="virtualbox-qt-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109071" comment="virtualbox-websrv-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109072" comment="xen-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109073" comment="xen-devel-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109082" comment="xen-doc-html-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109083" comment="xen-kmp-default-4.4.1_08_k3.16.7_21-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109084" comment="xen-kmp-desktop-4.4.1_08_k3.16.7_21-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109075" comment="xen-libs-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109074" comment="xen-libs-32bit-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109085" comment="xen-tools-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109076" comment="xen-tools-domU-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109077" comment="xtables-addons-2.6-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109078" comment="xtables-addons-kmp-default-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109079" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109080" comment="xtables-addons-kmp-pae-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109081" comment="xtables-addons-kmp-xen-2.6_k3.16.7_21-9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1433</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1433" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1433" source="CVE"/>
    <description>
    program/lib/Roundcube/rcube_washtml.php in Roundcube before 1.0.5 does not properly quote strings, which allows remote attackers to conduct cross-site scripting (XSS) attacks via the style attribute in an email.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106073" comment="roundcubemail-1.0.5-8.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1461</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1461" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1461" source="CVE"/>
    <description>
    ClamAV before 0.98.6 allows remote attackers to have unspecified impact via a crafted (1) Yoda's crypter or (2) mew packer file, related to a "heap out of bounds condition."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106071" comment="clamav-0.98.6-2.13.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1462</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1462" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1462" source="CVE"/>
    <description>
    ClamAV before 0.98.6 allows remote attackers to have unspecified impact via a crafted upx packer file, related to a "heap out of bounds condition."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106071" comment="clamav-0.98.6-2.13.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1463</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1463" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1463" source="CVE"/>
    <description>
    ClamAV before 0.98.6 allows remote attackers to cause a denial of service (crash) via a crafted petite packer file, related to an "incorrect compiler optimization."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106071" comment="clamav-0.98.6-2.13.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1465</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1465" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1465" source="CVE"/>
    <description>
    The IPv4 implementation in the Linux kernel before 3.18.8 does not properly consider the length of the Read-Copy Update (RCU) grace period for redirecting lookups in the absence of caching, which allows remote attackers to cause a denial of service (memory consumption or system crash) via a flood of packets.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113567" comment="bbswitch-0.8-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113568" comment="bbswitch-kmp-default-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113569" comment="bbswitch-kmp-desktop-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113570" comment="bbswitch-kmp-pae-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113571" comment="bbswitch-kmp-xen-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113572" comment="cloop-2.639-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113573" comment="cloop-kmp-default-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113574" comment="cloop-kmp-desktop-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113575" comment="cloop-kmp-pae-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113576" comment="cloop-kmp-xen-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113577" comment="crash-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113578" comment="crash-devel-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113579" comment="crash-doc-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113580" comment="crash-eppic-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113581" comment="crash-gcore-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113582" comment="crash-kmp-default-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113583" comment="crash-kmp-desktop-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113584" comment="crash-kmp-pae-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113585" comment="crash-kmp-xen-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113586" comment="hdjmod-1.28-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113587" comment="hdjmod-kmp-default-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113588" comment="hdjmod-kmp-desktop-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113589" comment="hdjmod-kmp-pae-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113590" comment="hdjmod-kmp-xen-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113591" comment="ipset-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113592" comment="ipset-devel-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113593" comment="ipset-kmp-default-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113594" comment="ipset-kmp-desktop-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113595" comment="ipset-kmp-pae-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113596" comment="ipset-kmp-xen-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113598" comment="kernel-debug-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113599" comment="kernel-debug-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113600" comment="kernel-debug-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113601" comment="kernel-default-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113602" comment="kernel-default-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113603" comment="kernel-default-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113604" comment="kernel-desktop-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113605" comment="kernel-desktop-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113606" comment="kernel-desktop-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113617" comment="kernel-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113607" comment="kernel-docs-3.16.7-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113608" comment="kernel-ec2-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113609" comment="kernel-ec2-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113610" comment="kernel-ec2-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113618" comment="kernel-macros-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113611" comment="kernel-obs-build-3.16.7-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113613" comment="kernel-obs-qa-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113612" comment="kernel-obs-qa-xen-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113614" comment="kernel-pae-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113615" comment="kernel-pae-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113616" comment="kernel-pae-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113619" comment="kernel-source-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113620" comment="kernel-source-vanilla-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113621" comment="kernel-syms-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113622" comment="kernel-vanilla-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113623" comment="kernel-vanilla-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113624" comment="kernel-xen-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113625" comment="kernel-xen-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113626" comment="kernel-xen-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113597" comment="libipset3-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113627" comment="pcfclock-0.44-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113628" comment="pcfclock-kmp-default-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113629" comment="pcfclock-kmp-desktop-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113630" comment="pcfclock-kmp-pae-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113631" comment="vhba-kmp-20140629-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113632" comment="vhba-kmp-default-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113633" comment="vhba-kmp-desktop-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113634" comment="vhba-kmp-pae-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113635" comment="vhba-kmp-xen-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113636" comment="xen-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113637" comment="xen-devel-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113646" comment="xen-doc-html-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113647" comment="xen-kmp-default-4.4.2_06_k3.16.7_24-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113648" comment="xen-kmp-desktop-4.4.2_06_k3.16.7_24-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113639" comment="xen-libs-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113638" comment="xen-libs-32bit-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113649" comment="xen-tools-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113640" comment="xen-tools-domU-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113641" comment="xtables-addons-2.6-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113642" comment="xtables-addons-kmp-default-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113643" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113644" comment="xtables-addons-kmp-pae-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113645" comment="xtables-addons-kmp-xen-2.6_k3.16.7_24-11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1472</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1472" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472" source="CVE"/>
    <description>
    The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during memory allocation, which allows context-dependent attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a long line containing wide characters that are improperly handled in a wscanf call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009106726" comment="glibc-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106727" comment="glibc-32bit-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106728" comment="glibc-devel-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106729" comment="glibc-devel-32bit-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106730" comment="glibc-devel-static-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106731" comment="glibc-devel-static-32bit-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106736" comment="glibc-extra-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106737" comment="glibc-html-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106738" comment="glibc-i18ndata-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106739" comment="glibc-info-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106732" comment="glibc-locale-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106733" comment="glibc-locale-32bit-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106740" comment="glibc-obsolete-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106734" comment="glibc-profile-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106735" comment="glibc-profile-32bit-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106723" comment="glibc-testsuite-2.19-16.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106724" comment="glibc-utils-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106725" comment="glibc-utils-32bit-2.19-16.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009106741" comment="nscd-2.19-16.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1545</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1545" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1545" source="CVE"/>
    <description>
    The deref_parseCtrl function in servers/slapd/overlays/deref.c in OpenLDAP 2.4.13 through 2.4.40 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an empty attribute list in a deref control in a search request.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111557" comment="compat-libldap-2_3-0-2.3.37-8.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111551" comment="libldap-2_4-2-2.4.39-8.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111552" comment="libldap-2_4-2-32bit-2.4.39-8.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111558" comment="openldap2-2.4.39-8.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111559" comment="openldap2-back-meta-2.4.39-8.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111560" comment="openldap2-back-perl-2.4.39-8.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111561" comment="openldap2-back-sql-2.4.39-8.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111553" comment="openldap2-client-2.4.39-8.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111554" comment="openldap2-devel-2.4.39-8.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111555" comment="openldap2-devel-32bit-2.4.39-8.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111556" comment="openldap2-devel-static-2.4.39-8.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111562" comment="openldap2-doc-2.4.39-8.5.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1546</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1546" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1546" source="CVE"/>
    <description>
    Double free vulnerability in the get_vrFilter function in servers/slapd/filter.c in OpenLDAP 2.4.40 allows remote attackers to cause a denial of service (crash) via a crafted search query with a matched values control.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111557" comment="compat-libldap-2_3-0-2.3.37-8.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111551" comment="libldap-2_4-2-2.4.39-8.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111552" comment="libldap-2_4-2-32bit-2.4.39-8.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111558" comment="openldap2-2.4.39-8.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111559" comment="openldap2-back-meta-2.4.39-8.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111560" comment="openldap2-back-perl-2.4.39-8.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111561" comment="openldap2-back-sql-2.4.39-8.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111553" comment="openldap2-client-2.4.39-8.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111554" comment="openldap2-devel-2.4.39-8.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111555" comment="openldap2-devel-32bit-2.4.39-8.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111556" comment="openldap2-devel-static-2.4.39-8.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111562" comment="openldap2-doc-2.4.39-8.5.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1547</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1547" source="CVE"/>
    <description>
    The NeXTDecode function in tif_next.c in LibTIFF allows remote attackers to cause a denial of service (uninitialized memory access) via a crafted TIFF image, as demonstrated by libtiff5.tif.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111098" comment="libtiff-devel-4.0.4-10.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111097" comment="libtiff-devel-32bit-4.0.4-10.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111100" comment="libtiff5-4.0.4-10.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111099" comment="libtiff5-32bit-4.0.4-10.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111101" comment="tiff-4.0.4-10.10.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1572</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1572" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1572" source="CVE"/>
    <description>
    Heap-based buffer overflow in closefs.c in the libext2fs library in e2fsprogs before 1.42.12 allows local users to execute arbitrary code by causing a crafted block group descriptor to be marked as dirty. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-0247.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110189" comment="e2fsprogs-1.42.12-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110190" comment="e2fsprogs-devel-1.42.12-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110191" comment="libcom_err-devel-1.42.12-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110192" comment="libcom_err-devel-32bit-1.42.12-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110193" comment="libcom_err2-1.42.12-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110194" comment="libcom_err2-32bit-1.42.12-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110195" comment="libext2fs-devel-1.42.12-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110196" comment="libext2fs-devel-32bit-1.42.12-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110197" comment="libext2fs2-1.42.12-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110198" comment="libext2fs2-32bit-1.42.12-7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1593</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1593" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1593" source="CVE"/>
    <description>
    The stack randomization feature in the Linux kernel before 3.19.1 on 64-bit platforms uses incorrect data types for the results of bitwise left-shift operations, which makes it easier for attackers to bypass the ASLR protection mechanism by predicting the address of the top of the stack, related to the randomize_stack_top function in fs/binfmt_elf.c and the stack_maxrandom_size function in arch/x86/mm/mmap.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108989" comment="bbswitch-0.8-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108990" comment="bbswitch-kmp-default-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108991" comment="bbswitch-kmp-desktop-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108992" comment="bbswitch-kmp-pae-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108993" comment="bbswitch-kmp-xen-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108994" comment="cloop-2.639-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108995" comment="cloop-kmp-default-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108996" comment="cloop-kmp-desktop-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108997" comment="cloop-kmp-pae-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108998" comment="cloop-kmp-xen-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108999" comment="crash-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109000" comment="crash-devel-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109001" comment="crash-doc-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109002" comment="crash-eppic-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109003" comment="crash-gcore-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109004" comment="crash-kmp-default-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109005" comment="crash-kmp-desktop-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109006" comment="crash-kmp-pae-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109007" comment="crash-kmp-xen-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109008" comment="hdjmod-1.28-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109009" comment="hdjmod-kmp-default-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109010" comment="hdjmod-kmp-desktop-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109011" comment="hdjmod-kmp-pae-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109012" comment="hdjmod-kmp-xen-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109013" comment="ipset-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109014" comment="ipset-devel-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109015" comment="ipset-kmp-default-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109016" comment="ipset-kmp-desktop-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109017" comment="ipset-kmp-pae-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109018" comment="ipset-kmp-xen-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109020" comment="kernel-debug-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109021" comment="kernel-debug-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109022" comment="kernel-debug-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109023" comment="kernel-default-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109024" comment="kernel-default-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109025" comment="kernel-default-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109026" comment="kernel-desktop-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109027" comment="kernel-desktop-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109028" comment="kernel-desktop-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109039" comment="kernel-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109029" comment="kernel-docs-3.16.7-21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109030" comment="kernel-ec2-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109031" comment="kernel-ec2-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109032" comment="kernel-ec2-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109040" comment="kernel-macros-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109033" comment="kernel-obs-build-3.16.7-21.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109035" comment="kernel-obs-qa-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109034" comment="kernel-obs-qa-xen-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109036" comment="kernel-pae-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109037" comment="kernel-pae-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109038" comment="kernel-pae-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109041" comment="kernel-source-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109042" comment="kernel-source-vanilla-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109043" comment="kernel-syms-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109044" comment="kernel-vanilla-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109045" comment="kernel-vanilla-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109046" comment="kernel-xen-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109047" comment="kernel-xen-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109048" comment="kernel-xen-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109019" comment="libipset3-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109049" comment="pcfclock-0.44-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109050" comment="pcfclock-kmp-default-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109051" comment="pcfclock-kmp-desktop-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109052" comment="pcfclock-kmp-pae-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109058" comment="python-virtualbox-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109053" comment="vhba-kmp-20140629-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109054" comment="vhba-kmp-default-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109055" comment="vhba-kmp-desktop-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109056" comment="vhba-kmp-pae-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109057" comment="vhba-kmp-xen-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109059" comment="virtualbox-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109060" comment="virtualbox-devel-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109061" comment="virtualbox-guest-desktop-icons-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109062" comment="virtualbox-guest-kmp-default-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109063" comment="virtualbox-guest-kmp-desktop-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109064" comment="virtualbox-guest-kmp-pae-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109065" comment="virtualbox-guest-tools-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109066" comment="virtualbox-guest-x11-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109067" comment="virtualbox-host-kmp-default-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109068" comment="virtualbox-host-kmp-desktop-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109069" comment="virtualbox-host-kmp-pae-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109070" comment="virtualbox-qt-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109071" comment="virtualbox-websrv-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109072" comment="xen-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109073" comment="xen-devel-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109082" comment="xen-doc-html-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109083" comment="xen-kmp-default-4.4.1_08_k3.16.7_21-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109084" comment="xen-kmp-desktop-4.4.1_08_k3.16.7_21-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109075" comment="xen-libs-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109074" comment="xen-libs-32bit-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109085" comment="xen-tools-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109076" comment="xen-tools-domU-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109077" comment="xtables-addons-2.6-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109078" comment="xtables-addons-kmp-default-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109079" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109080" comment="xtables-addons-kmp-pae-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109081" comment="xtables-addons-kmp-xen-2.6_k3.16.7_21-9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1606</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1606" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1606" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118549" comment="gpg2-2.0.26-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118550" comment="gpg2-lang-2.0.26-2.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1607</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1607" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1607" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118549" comment="gpg2-2.0.26-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118550" comment="gpg2-lang-2.0.26-2.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1774</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1774" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1774" source="CVE"/>
    <description>
    The HWP filter in LibreOffice before 4.3.7 and 4.4.x before 4.4.2 and Apache OpenOffice before 4.1.2 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted HWP document, which triggers an out-of-bounds write.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109421" comment="libreoffice-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109422" comment="libreoffice-base-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109423" comment="libreoffice-base-drivers-mysql-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109424" comment="libreoffice-base-drivers-postgresql-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109425" comment="libreoffice-branding-upstream-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109426" comment="libreoffice-calc-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109427" comment="libreoffice-calc-extensions-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109428" comment="libreoffice-draw-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109429" comment="libreoffice-filters-optional-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109430" comment="libreoffice-gnome-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109431" comment="libreoffice-icon-theme-crystal-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109432" comment="libreoffice-icon-theme-galaxy-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109433" comment="libreoffice-icon-theme-hicontrast-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109434" comment="libreoffice-icon-theme-oxygen-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109435" comment="libreoffice-icon-theme-sifr-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109436" comment="libreoffice-icon-theme-tango-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109437" comment="libreoffice-impress-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109438" comment="libreoffice-kde4-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109439" comment="libreoffice-l10n-af-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109440" comment="libreoffice-l10n-ar-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109441" comment="libreoffice-l10n-as-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109442" comment="libreoffice-l10n-bg-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109443" comment="libreoffice-l10n-bn-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109444" comment="libreoffice-l10n-br-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109445" comment="libreoffice-l10n-ca-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109446" comment="libreoffice-l10n-cs-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109447" comment="libreoffice-l10n-cy-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109448" comment="libreoffice-l10n-da-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109449" comment="libreoffice-l10n-de-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109450" comment="libreoffice-l10n-dz-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109451" comment="libreoffice-l10n-el-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109452" comment="libreoffice-l10n-en-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109453" comment="libreoffice-l10n-es-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109454" comment="libreoffice-l10n-et-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109455" comment="libreoffice-l10n-eu-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109456" comment="libreoffice-l10n-fa-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109457" comment="libreoffice-l10n-fi-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109458" comment="libreoffice-l10n-fr-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109459" comment="libreoffice-l10n-ga-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109460" comment="libreoffice-l10n-gl-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109461" comment="libreoffice-l10n-gu-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109462" comment="libreoffice-l10n-he-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109463" comment="libreoffice-l10n-hi-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109464" comment="libreoffice-l10n-hr-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109465" comment="libreoffice-l10n-hu-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109466" comment="libreoffice-l10n-it-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109467" comment="libreoffice-l10n-ja-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109468" comment="libreoffice-l10n-kk-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109469" comment="libreoffice-l10n-kn-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109470" comment="libreoffice-l10n-ko-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109471" comment="libreoffice-l10n-lt-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109472" comment="libreoffice-l10n-lv-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109473" comment="libreoffice-l10n-mai-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109474" comment="libreoffice-l10n-ml-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109475" comment="libreoffice-l10n-mr-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109476" comment="libreoffice-l10n-nb-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109477" comment="libreoffice-l10n-nl-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109478" comment="libreoffice-l10n-nn-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109479" comment="libreoffice-l10n-nr-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109480" comment="libreoffice-l10n-nso-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109481" comment="libreoffice-l10n-or-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109482" comment="libreoffice-l10n-pa-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109483" comment="libreoffice-l10n-pl-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109484" comment="libreoffice-l10n-pt-BR-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109485" comment="libreoffice-l10n-pt-PT-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109486" comment="libreoffice-l10n-ro-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109487" comment="libreoffice-l10n-ru-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109488" comment="libreoffice-l10n-si-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109489" comment="libreoffice-l10n-sk-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109490" comment="libreoffice-l10n-sl-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109491" comment="libreoffice-l10n-sr-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109492" comment="libreoffice-l10n-ss-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109493" comment="libreoffice-l10n-st-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109494" comment="libreoffice-l10n-sv-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109495" comment="libreoffice-l10n-ta-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109496" comment="libreoffice-l10n-te-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109497" comment="libreoffice-l10n-th-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109498" comment="libreoffice-l10n-tn-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109499" comment="libreoffice-l10n-tr-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109500" comment="libreoffice-l10n-ts-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109501" comment="libreoffice-l10n-uk-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109502" comment="libreoffice-l10n-ve-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109503" comment="libreoffice-l10n-xh-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109504" comment="libreoffice-l10n-zh-Hans-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109505" comment="libreoffice-l10n-zh-Hant-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109506" comment="libreoffice-l10n-zu-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109507" comment="libreoffice-mailmerge-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109508" comment="libreoffice-math-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109509" comment="libreoffice-officebean-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109510" comment="libreoffice-pyuno-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109511" comment="libreoffice-sdk-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109512" comment="libreoffice-sdk-doc-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109513" comment="libreoffice-writer-4.3.7.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109514" comment="libreoffice-writer-extensions-4.3.7.2-18.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1779</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1779" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1779" source="CVE"/>
    <description>
    The VNC websocket frame decoder in QEMU allows remote attackers to cause a denial of service (memory and CPU consumption) via a large (1) websocket payload or (2) HTTP headers section.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126020" comment="xen-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126021" comment="xen-devel-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126022" comment="xen-doc-html-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126023" comment="xen-kmp-default-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126024" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126025" comment="xen-libs-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126026" comment="xen-libs-32bit-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126027" comment="xen-tools-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126028" comment="xen-tools-domU-4.4.4_02-43.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1781</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1781" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1781" source="CVE"/>
    <description>
    Buffer overflow in the gethostbyname_r and other unspecified NSS functions in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response, which triggers a call with a misaligned buffer.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110738" comment="glibc-2.19-16.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110739" comment="glibc-32bit-2.19-16.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110740" comment="glibc-devel-2.19-16.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110741" comment="glibc-devel-32bit-2.19-16.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110742" comment="glibc-devel-static-2.19-16.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110743" comment="glibc-devel-static-32bit-2.19-16.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110748" comment="glibc-extra-2.19-16.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110749" comment="glibc-html-2.19-16.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110750" comment="glibc-i18ndata-2.19-16.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110751" comment="glibc-info-2.19-16.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110744" comment="glibc-locale-2.19-16.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110745" comment="glibc-locale-32bit-2.19-16.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110752" comment="glibc-obsolete-2.19-16.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110746" comment="glibc-profile-2.19-16.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110747" comment="glibc-profile-32bit-2.19-16.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110735" comment="glibc-testsuite-2.19-16.15.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110736" comment="glibc-utils-2.19-16.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110737" comment="glibc-utils-32bit-2.19-16.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110753" comment="nscd-2.19-16.15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1782</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1782" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1782" source="CVE"/>
    <description>
    The kex_agree_methods function in libssh2 before 1.5.0 allows remote servers to cause a denial of service (crash) or have other unspecified impact via crafted length values in an SSH_MSG_KEXINIT packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107872" comment="libssh2-1-1.5.0-9.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107873" comment="libssh2-1-32bit-1.5.0-9.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107874" comment="libssh2-devel-1.5.0-9.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107875" comment="libssh2_org-1.5.0-9.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1788</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1788" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788" source="CVE"/>
    <description>
    The BN_GF2m_mod_inv function in crypto/bn/bn_gf2m.c in OpenSSL before 0.9.8s, 1.0.0 before 1.0.0e, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b does not properly handle ECParameters structures in which the curve is over a malformed binary polynomial field, which allows remote attackers to cause a denial of service (infinite loop) via a session that uses an Elliptic Curve algorithm, as demonstrated by an attack against a server that supports client authentication.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111311" comment="libcrypto34-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111312" comment="libcrypto34-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110688" comment="libopenssl-devel-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110689" comment="libopenssl-devel-32bit-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124418" comment="libopenssl0_9_8-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124419" comment="libopenssl0_9_8-32bit-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110690" comment="libopenssl1_0_0-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110691" comment="libopenssl1_0_0-32bit-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110692" comment="libopenssl1_0_0-hmac-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110693" comment="libopenssl1_0_0-hmac-32bit-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111313" comment="libressl-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111314" comment="libressl-devel-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111315" comment="libressl-devel-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111316" comment="libressl-devel-doc-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111317" comment="libssl33-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111318" comment="libssl33-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111319" comment="libtls4-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111320" comment="libtls4-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110694" comment="openssl-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110695" comment="openssl-doc-1.0.1k-2.24.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1789</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1789" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789" source="CVE"/>
    <description>
    The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack against a server that supports client authentication with a custom verification callback.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111311" comment="libcrypto34-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111312" comment="libcrypto34-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118962" comment="libmysql56client18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118963" comment="libmysql56client18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118964" comment="libmysql56client_r18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118965" comment="libmysql56client_r18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110688" comment="libopenssl-devel-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110689" comment="libopenssl-devel-32bit-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124418" comment="libopenssl0_9_8-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124419" comment="libopenssl0_9_8-32bit-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110690" comment="libopenssl1_0_0-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110691" comment="libopenssl1_0_0-32bit-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110692" comment="libopenssl1_0_0-hmac-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110693" comment="libopenssl1_0_0-hmac-32bit-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111313" comment="libressl-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111314" comment="libressl-devel-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111315" comment="libressl-devel-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111316" comment="libressl-devel-doc-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111317" comment="libssl33-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111318" comment="libssl33-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111319" comment="libtls4-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111320" comment="libtls4-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118966" comment="mysql-community-server-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118967" comment="mysql-community-server-bench-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118968" comment="mysql-community-server-client-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118969" comment="mysql-community-server-errormessages-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118970" comment="mysql-community-server-test-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118971" comment="mysql-community-server-tools-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110694" comment="openssl-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110695" comment="openssl-doc-1.0.1k-2.24.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1790</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1790" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790" source="CVE"/>
    <description>
    The PKCS7_dataDecodefunction in crypto/pkcs7/pk7_doit.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a PKCS#7 blob that uses ASN.1 encoding and lacks inner EncryptedContent data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111311" comment="libcrypto34-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111312" comment="libcrypto34-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110688" comment="libopenssl-devel-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110689" comment="libopenssl-devel-32bit-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124418" comment="libopenssl0_9_8-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124419" comment="libopenssl0_9_8-32bit-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110690" comment="libopenssl1_0_0-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110691" comment="libopenssl1_0_0-32bit-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110692" comment="libopenssl1_0_0-hmac-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110693" comment="libopenssl1_0_0-hmac-32bit-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111313" comment="libressl-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111314" comment="libressl-devel-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111315" comment="libressl-devel-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111316" comment="libressl-devel-doc-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111317" comment="libssl33-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111318" comment="libssl33-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111319" comment="libtls4-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111320" comment="libtls4-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110694" comment="openssl-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110695" comment="openssl-doc-1.0.1k-2.24.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1791</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1791" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1791" source="CVE"/>
    <description>
    Race condition in the ssl3_get_new_session_ticket function in ssl/s3_clnt.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b, when used for a multi-threaded client, allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact by providing a NewSessionTicket during an attempt to reuse a ticket that had been obtained earlier.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110688" comment="libopenssl-devel-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110689" comment="libopenssl-devel-32bit-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124418" comment="libopenssl0_9_8-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124419" comment="libopenssl0_9_8-32bit-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110690" comment="libopenssl1_0_0-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110691" comment="libopenssl1_0_0-32bit-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110692" comment="libopenssl1_0_0-hmac-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110693" comment="libopenssl1_0_0-hmac-32bit-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110694" comment="openssl-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110695" comment="openssl-doc-1.0.1k-2.24.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1792</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1792" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1792" source="CVE"/>
    <description>
    The do_free_upto function in crypto/cms/cms_smime.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (infinite loop) via vectors that trigger a NULL value of a BIO data structure, as demonstrated by an unrecognized X.660 OID for a hash function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111311" comment="libcrypto34-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111312" comment="libcrypto34-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110688" comment="libopenssl-devel-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110689" comment="libopenssl-devel-32bit-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124418" comment="libopenssl0_9_8-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124419" comment="libopenssl0_9_8-32bit-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110690" comment="libopenssl1_0_0-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110691" comment="libopenssl1_0_0-32bit-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110692" comment="libopenssl1_0_0-hmac-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110693" comment="libopenssl1_0_0-hmac-32bit-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111313" comment="libressl-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111314" comment="libressl-devel-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111315" comment="libressl-devel-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111316" comment="libressl-devel-doc-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111317" comment="libssl33-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111318" comment="libssl33-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111319" comment="libtls4-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111320" comment="libtls4-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110694" comment="openssl-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110695" comment="openssl-doc-1.0.1k-2.24.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1793</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1793" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1793" source="CVE"/>
    <description>
    The X509_verify_cert function in crypto/x509/x509_vfy.c in OpenSSL 1.0.1n, 1.0.1o, 1.0.2b, and 1.0.2c does not properly process X.509 Basic Constraints cA values during identification of alternative certificate chains, which allows remote attackers to spoof a Certification Authority role and trigger unintended certificate verifications via a valid leaf certificate.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118962" comment="libmysql56client18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118963" comment="libmysql56client18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118964" comment="libmysql56client_r18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118965" comment="libmysql56client_r18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118966" comment="mysql-community-server-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118967" comment="mysql-community-server-bench-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118968" comment="mysql-community-server-client-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118969" comment="mysql-community-server-errormessages-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118970" comment="mysql-community-server-test-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118971" comment="mysql-community-server-tools-5.6.27-2.12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1798</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1798" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1798" source="CVE"/>
    <description>
    The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p2 requires a correct MAC only if the MAC field has a nonzero length, which makes it easier for man-in-the-middle attackers to spoof packets by omitting the MAC.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109121" comment="ntp-4.2.6p5-25.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109122" comment="ntp-doc-4.2.6p5-25.12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1799</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1799" source="CVE"/>
    <description>
    The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 3.x and 4.x before 4.2.8p2 performs state-variable updates upon receiving certain invalid packets, which makes it easier for man-in-the-middle attackers to cause a denial of service (synchronization loss) by spoofing the source IP address of a peer.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109121" comment="ntp-4.2.6p5-25.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109122" comment="ntp-doc-4.2.6p5-25.12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1802</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1802" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1802" source="CVE"/>
    <description>
    The bdfReadProperties function in bitmap/bdfread.c in X.Org libXfont before 1.4.9 and 1.5.x before 1.5.1 allows remote authenticated users to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a (1) negative or (2) large property count in a BDF font file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108123" comment="libXfont-1.5.0-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108124" comment="libXfont-devel-1.5.0-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108125" comment="libXfont-devel-32bit-1.5.0-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108126" comment="libXfont1-1.5.0-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108127" comment="libXfont1-32bit-1.5.0-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1803</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1803" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1803" source="CVE"/>
    <description>
    The bdfReadCharacters function in bitmap/bdfread.c in X.Org libXfont before 1.4.9 and 1.5.x before 1.5.1 does not properly handle character bitmaps it cannot read, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) and possibly execute arbitrary code via a crafted BDF font file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108123" comment="libXfont-1.5.0-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108124" comment="libXfont-devel-1.5.0-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108125" comment="libXfont-devel-32bit-1.5.0-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108126" comment="libXfont1-1.5.0-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108127" comment="libXfont1-32bit-1.5.0-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1804</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1804" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1804" source="CVE"/>
    <description>
    The bdfReadCharacters function in bitmap/bdfread.c in X.Org libXfont before 1.4.9 and 1.5.x before 1.5.1 does not properly perform type conversion for metrics values, which allows remote authenticated users to cause a denial of service (out-of-bounds memory access) and possibly execute arbitrary code via a crafted BDF font file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119788" comment="libXfont-1.5.0-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119789" comment="libXfont-devel-1.5.0-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119790" comment="libXfont-devel-32bit-1.5.0-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119791" comment="libXfont1-1.5.0-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119792" comment="libXfont1-32bit-1.5.0-2.7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1819</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1819" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1819" source="CVE"/>
    <description>
    The xmlreader in libxml allows remote attackers to cause a denial of service (memory consumption) via crafted XML data, related to an XML Entity Expansion (XEE) attack.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009120421" comment="libxml2-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120422" comment="libxml2-2-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120423" comment="libxml2-2-32bit-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120424" comment="libxml2-devel-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120425" comment="libxml2-devel-32bit-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120426" comment="libxml2-doc-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120427" comment="libxml2-tools-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120428" comment="python-libxml2-2.9.3-7.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1832</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1832" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1832" source="CVE"/>
    <description>
    XML external entity (XXE) vulnerability in the SqlXmlUtil code in Apache Derby before 10.12.1.1, when a Java Security Manager is not in place, allows context-dependent attackers to read arbitrary files or cause a denial of service (resource consumption) via vectors involving XmlVTI and the XML datatype.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133770" comment="derby-10.10.2.0-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133771" comment="derby-javadoc-10.10.2.0-2.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1840</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1840" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1840" source="CVE"/>
    <description>
    jquery_ujs.js in jquery-rails before 3.1.3 and 4.x before 4.0.4 and rails.js in jquery-ujs before 1.0.4, as used with Ruby on Rails 3.x and 4.x, allow remote attackers to bypass the Same Origin Policy, and trigger transmission of a CSRF token to a different-domain web server, via a leading space character in a URL within an attribute value.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111218" comment="rubygem-jquery-rails-3.1.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111219" comment="rubygem-jquery-rails-doc-3.1.1-2.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1863</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1863" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1863" source="CVE"/>
    <description>
    Heap-based buffer overflow in wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (crash), read memory, or possibly execute arbitrary code via crafted SSID information in a management frame when creating or updating P2P entries.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109206" comment="wpa_supplicant-2.2-5.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109207" comment="wpa_supplicant-gui-2.2-5.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1868</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-1868" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1868" source="CVE"/>
    <description>
    The label decompression functionality in PowerDNS Recursor 3.5.x, 3.6.x before 3.6.3, and 3.7.x before 3.7.2 and Authoritative (Auth) Server 3.2.x, 3.3.x before 3.3.2, and 3.4.x before 3.4.4 allows remote attackers to cause a denial of service (CPU consumption or crash) via a request with a name that refers to itself.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111302" comment="pdns-3.3.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111303" comment="pdns-backend-ldap-3.3.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111304" comment="pdns-backend-lua-3.3.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111305" comment="pdns-backend-mydns-3.3.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111306" comment="pdns-backend-mysql-3.3.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111307" comment="pdns-backend-postgresql-3.3.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111308" comment="pdns-backend-sqlite3-3.3.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111286" comment="pdns-recursor-3.6.2-8.7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2041</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2041" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2041" source="CVE"/>
    <description>
    net/llc/sysctl_net_llc.c in the Linux kernel before 3.19 uses an incorrect data type in a sysctl table, which allows local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113567" comment="bbswitch-0.8-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113568" comment="bbswitch-kmp-default-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113569" comment="bbswitch-kmp-desktop-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113570" comment="bbswitch-kmp-pae-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113571" comment="bbswitch-kmp-xen-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113572" comment="cloop-2.639-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113573" comment="cloop-kmp-default-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113574" comment="cloop-kmp-desktop-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113575" comment="cloop-kmp-pae-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113576" comment="cloop-kmp-xen-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113577" comment="crash-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113578" comment="crash-devel-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113579" comment="crash-doc-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113580" comment="crash-eppic-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113581" comment="crash-gcore-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113582" comment="crash-kmp-default-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113583" comment="crash-kmp-desktop-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113584" comment="crash-kmp-pae-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113585" comment="crash-kmp-xen-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113586" comment="hdjmod-1.28-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113587" comment="hdjmod-kmp-default-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113588" comment="hdjmod-kmp-desktop-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113589" comment="hdjmod-kmp-pae-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113590" comment="hdjmod-kmp-xen-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113591" comment="ipset-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113592" comment="ipset-devel-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113593" comment="ipset-kmp-default-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113594" comment="ipset-kmp-desktop-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113595" comment="ipset-kmp-pae-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113596" comment="ipset-kmp-xen-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113598" comment="kernel-debug-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113599" comment="kernel-debug-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113600" comment="kernel-debug-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113601" comment="kernel-default-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113602" comment="kernel-default-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113603" comment="kernel-default-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113604" comment="kernel-desktop-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113605" comment="kernel-desktop-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113606" comment="kernel-desktop-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113617" comment="kernel-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113607" comment="kernel-docs-3.16.7-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113608" comment="kernel-ec2-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113609" comment="kernel-ec2-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113610" comment="kernel-ec2-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113618" comment="kernel-macros-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113611" comment="kernel-obs-build-3.16.7-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113613" comment="kernel-obs-qa-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113612" comment="kernel-obs-qa-xen-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113614" comment="kernel-pae-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113615" comment="kernel-pae-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113616" comment="kernel-pae-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113619" comment="kernel-source-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113620" comment="kernel-source-vanilla-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113621" comment="kernel-syms-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113622" comment="kernel-vanilla-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113623" comment="kernel-vanilla-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113624" comment="kernel-xen-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113625" comment="kernel-xen-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113626" comment="kernel-xen-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113597" comment="libipset3-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113627" comment="pcfclock-0.44-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113628" comment="pcfclock-kmp-default-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113629" comment="pcfclock-kmp-desktop-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113630" comment="pcfclock-kmp-pae-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113631" comment="vhba-kmp-20140629-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113632" comment="vhba-kmp-default-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113633" comment="vhba-kmp-desktop-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113634" comment="vhba-kmp-pae-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113635" comment="vhba-kmp-xen-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113636" comment="xen-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113637" comment="xen-devel-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113646" comment="xen-doc-html-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113647" comment="xen-kmp-default-4.4.2_06_k3.16.7_24-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113648" comment="xen-kmp-desktop-4.4.2_06_k3.16.7_24-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113639" comment="xen-libs-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113638" comment="xen-libs-32bit-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113649" comment="xen-tools-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113640" comment="xen-tools-domU-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113641" comment="xtables-addons-2.6-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113642" comment="xtables-addons-kmp-default-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113643" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113644" comment="xtables-addons-kmp-pae-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113645" comment="xtables-addons-kmp-xen-2.6_k3.16.7_24-11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2042</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2042" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2042" source="CVE"/>
    <description>
    net/rds/sysctl.c in the Linux kernel before 3.19 uses an incorrect data type in a sysctl table, which allows local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108989" comment="bbswitch-0.8-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108990" comment="bbswitch-kmp-default-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108991" comment="bbswitch-kmp-desktop-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108992" comment="bbswitch-kmp-pae-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108993" comment="bbswitch-kmp-xen-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108994" comment="cloop-2.639-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108995" comment="cloop-kmp-default-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108996" comment="cloop-kmp-desktop-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108997" comment="cloop-kmp-pae-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108998" comment="cloop-kmp-xen-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108999" comment="crash-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109000" comment="crash-devel-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109001" comment="crash-doc-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109002" comment="crash-eppic-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109003" comment="crash-gcore-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109004" comment="crash-kmp-default-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109005" comment="crash-kmp-desktop-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109006" comment="crash-kmp-pae-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109007" comment="crash-kmp-xen-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109008" comment="hdjmod-1.28-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109009" comment="hdjmod-kmp-default-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109010" comment="hdjmod-kmp-desktop-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109011" comment="hdjmod-kmp-pae-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109012" comment="hdjmod-kmp-xen-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109013" comment="ipset-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109014" comment="ipset-devel-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109015" comment="ipset-kmp-default-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109016" comment="ipset-kmp-desktop-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109017" comment="ipset-kmp-pae-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109018" comment="ipset-kmp-xen-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109020" comment="kernel-debug-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109021" comment="kernel-debug-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109022" comment="kernel-debug-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109023" comment="kernel-default-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109024" comment="kernel-default-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109025" comment="kernel-default-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109026" comment="kernel-desktop-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109027" comment="kernel-desktop-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109028" comment="kernel-desktop-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109039" comment="kernel-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109029" comment="kernel-docs-3.16.7-21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109030" comment="kernel-ec2-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109031" comment="kernel-ec2-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109032" comment="kernel-ec2-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109040" comment="kernel-macros-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109033" comment="kernel-obs-build-3.16.7-21.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109035" comment="kernel-obs-qa-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109034" comment="kernel-obs-qa-xen-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109036" comment="kernel-pae-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109037" comment="kernel-pae-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109038" comment="kernel-pae-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109041" comment="kernel-source-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109042" comment="kernel-source-vanilla-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109043" comment="kernel-syms-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109044" comment="kernel-vanilla-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109045" comment="kernel-vanilla-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109046" comment="kernel-xen-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109047" comment="kernel-xen-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109048" comment="kernel-xen-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109019" comment="libipset3-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109049" comment="pcfclock-0.44-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109050" comment="pcfclock-kmp-default-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109051" comment="pcfclock-kmp-desktop-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109052" comment="pcfclock-kmp-pae-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109058" comment="python-virtualbox-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109053" comment="vhba-kmp-20140629-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109054" comment="vhba-kmp-default-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109055" comment="vhba-kmp-desktop-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109056" comment="vhba-kmp-pae-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109057" comment="vhba-kmp-xen-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109059" comment="virtualbox-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109060" comment="virtualbox-devel-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109061" comment="virtualbox-guest-desktop-icons-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109062" comment="virtualbox-guest-kmp-default-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109063" comment="virtualbox-guest-kmp-desktop-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109064" comment="virtualbox-guest-kmp-pae-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109065" comment="virtualbox-guest-tools-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109066" comment="virtualbox-guest-x11-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109067" comment="virtualbox-host-kmp-default-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109068" comment="virtualbox-host-kmp-desktop-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109069" comment="virtualbox-host-kmp-pae-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109070" comment="virtualbox-qt-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109071" comment="virtualbox-websrv-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109072" comment="xen-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109073" comment="xen-devel-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109082" comment="xen-doc-html-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109083" comment="xen-kmp-default-4.4.1_08_k3.16.7_21-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109084" comment="xen-kmp-desktop-4.4.1_08_k3.16.7_21-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109075" comment="xen-libs-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109074" comment="xen-libs-32bit-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109085" comment="xen-tools-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109076" comment="xen-tools-domU-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109077" comment="xtables-addons-2.6-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109078" comment="xtables-addons-kmp-default-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109079" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109080" comment="xtables-addons-kmp-pae-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109081" comment="xtables-addons-kmp-xen-2.6_k3.16.7_21-9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2044</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2044" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2044" source="CVE"/>
    <description>
    The emulation routines for unspecified X86 devices in Xen 3.2.x through 4.5.x does not properly initialize data, which allow local HVM guest users to obtain sensitive information via vectors involving an unsupported access size.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110614" comment="xen-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110615" comment="xen-devel-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110619" comment="xen-doc-html-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110620" comment="xen-kmp-default-4.4.2_06_k3.16.7_21-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110621" comment="xen-kmp-desktop-4.4.2_06_k3.16.7_21-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110617" comment="xen-libs-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110616" comment="xen-libs-32bit-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110622" comment="xen-tools-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110618" comment="xen-tools-domU-4.4.2_06-23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2045</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2045" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2045" source="CVE"/>
    <description>
    The HYPERVISOR_xen_version hypercall in Xen 3.2.x through 4.5.x does not properly initialize data structures, which allows local guest users to obtain sensitive information via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110614" comment="xen-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110615" comment="xen-devel-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110619" comment="xen-doc-html-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110620" comment="xen-kmp-default-4.4.2_06_k3.16.7_21-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110621" comment="xen-kmp-desktop-4.4.2_06_k3.16.7_21-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110617" comment="xen-libs-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110616" comment="xen-libs-32bit-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110622" comment="xen-tools-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110618" comment="xen-tools-domU-4.4.2_06-23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2047</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2047" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2047" source="CVE"/>
    <description>
    The rsaauth extension in TYPO3 4.3.0 through 4.3.14, 4.4.0 through 4.4.15, 4.5.0 through 4.5.39, and 4.6.0 through 4.6.18, when configured for the frontend, allows remote attackers to bypass authentication via a password that is casted to an empty value.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134120" comment="typo3-cms-4_5-4.5.40-2.3.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2059</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2059" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2059" source="CVE"/>
    <description>
    The stringprep_utf8_to_ucs4 function in libin before 1.31, as used in jabberd2, allows context-dependent attackers to read system memory and possibly have other unspecified impact via invalid UTF-8 characters in a string, which triggers an out-of-bounds read.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111204" comment="libidn-1.31-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111205" comment="libidn-devel-1.31-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111206" comment="libidn-tools-1.31-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111207" comment="libidn11-1.31-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111208" comment="libidn11-32bit-1.31-3.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2141</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2141" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2141" source="CVE"/>
    <description>
    The InvertibleRWFunction::CalculateInverse function in rw.cpp in libcrypt++ 5.6.2 does not properly blind private key operations for the Rabin-Williams digital signature algorithm, which allows remote attackers to obtain private keys via a timing attack.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111281" comment="libcryptopp-5.6.2-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111283" comment="libcryptopp-5_6_2-0-5.6.2-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111282" comment="libcryptopp-5_6_2-0-32bit-5.6.2-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111284" comment="libcryptopp-devel-5.6.2-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111285" comment="libcryptopp-devel-static-5.6.2-7.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2150</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2150" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2150" source="CVE"/>
    <description>
    Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not properly restrict access to PCI command registers, which might allow local guest OS users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108989" comment="bbswitch-0.8-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108990" comment="bbswitch-kmp-default-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108991" comment="bbswitch-kmp-desktop-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108992" comment="bbswitch-kmp-pae-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108993" comment="bbswitch-kmp-xen-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108994" comment="cloop-2.639-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108995" comment="cloop-kmp-default-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108996" comment="cloop-kmp-desktop-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108997" comment="cloop-kmp-pae-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108998" comment="cloop-kmp-xen-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108999" comment="crash-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109000" comment="crash-devel-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109001" comment="crash-doc-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109002" comment="crash-eppic-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109003" comment="crash-gcore-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109004" comment="crash-kmp-default-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109005" comment="crash-kmp-desktop-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109006" comment="crash-kmp-pae-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109007" comment="crash-kmp-xen-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109008" comment="hdjmod-1.28-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109009" comment="hdjmod-kmp-default-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109010" comment="hdjmod-kmp-desktop-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109011" comment="hdjmod-kmp-pae-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109012" comment="hdjmod-kmp-xen-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109013" comment="ipset-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109014" comment="ipset-devel-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109015" comment="ipset-kmp-default-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109016" comment="ipset-kmp-desktop-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109017" comment="ipset-kmp-pae-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109018" comment="ipset-kmp-xen-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109020" comment="kernel-debug-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109021" comment="kernel-debug-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109022" comment="kernel-debug-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109023" comment="kernel-default-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109024" comment="kernel-default-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109025" comment="kernel-default-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109026" comment="kernel-desktop-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109027" comment="kernel-desktop-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109028" comment="kernel-desktop-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109039" comment="kernel-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109029" comment="kernel-docs-3.16.7-21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109030" comment="kernel-ec2-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109031" comment="kernel-ec2-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109032" comment="kernel-ec2-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109040" comment="kernel-macros-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109033" comment="kernel-obs-build-3.16.7-21.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109035" comment="kernel-obs-qa-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109034" comment="kernel-obs-qa-xen-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109036" comment="kernel-pae-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109037" comment="kernel-pae-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109038" comment="kernel-pae-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109041" comment="kernel-source-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109042" comment="kernel-source-vanilla-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109043" comment="kernel-syms-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109044" comment="kernel-vanilla-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109045" comment="kernel-vanilla-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109046" comment="kernel-xen-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109047" comment="kernel-xen-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109048" comment="kernel-xen-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109019" comment="libipset3-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109049" comment="pcfclock-0.44-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109050" comment="pcfclock-kmp-default-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109051" comment="pcfclock-kmp-desktop-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109052" comment="pcfclock-kmp-pae-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109058" comment="python-virtualbox-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109053" comment="vhba-kmp-20140629-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109054" comment="vhba-kmp-default-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109055" comment="vhba-kmp-desktop-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109056" comment="vhba-kmp-pae-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109057" comment="vhba-kmp-xen-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109059" comment="virtualbox-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109060" comment="virtualbox-devel-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109061" comment="virtualbox-guest-desktop-icons-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109062" comment="virtualbox-guest-kmp-default-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109063" comment="virtualbox-guest-kmp-desktop-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109064" comment="virtualbox-guest-kmp-pae-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109065" comment="virtualbox-guest-tools-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109066" comment="virtualbox-guest-x11-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109067" comment="virtualbox-host-kmp-default-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109068" comment="virtualbox-host-kmp-desktop-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109069" comment="virtualbox-host-kmp-pae-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109070" comment="virtualbox-qt-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109071" comment="virtualbox-websrv-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109072" comment="xen-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109073" comment="xen-devel-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109082" comment="xen-doc-html-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109083" comment="xen-kmp-default-4.4.1_08_k3.16.7_21-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109084" comment="xen-kmp-desktop-4.4.1_08_k3.16.7_21-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109075" comment="xen-libs-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109074" comment="xen-libs-32bit-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109085" comment="xen-tools-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109076" comment="xen-tools-domU-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109077" comment="xtables-addons-2.6-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109078" comment="xtables-addons-kmp-default-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109079" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109080" comment="xtables-addons-kmp-pae-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109081" comment="xtables-addons-kmp-xen-2.6_k3.16.7_21-9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2151</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2151" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2151" source="CVE"/>
    <description>
    The x86 emulator in Xen 3.2.x through 4.5.x does not properly ignore segment overrides for instructions with register operands, which allows local guest users to obtain sensitive information, cause a denial of service (memory corruption), or possibly execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110614" comment="xen-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110615" comment="xen-devel-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110619" comment="xen-doc-html-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110620" comment="xen-kmp-default-4.4.2_06_k3.16.7_21-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110621" comment="xen-kmp-desktop-4.4.2_06_k3.16.7_21-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110617" comment="xen-libs-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110616" comment="xen-libs-32bit-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110622" comment="xen-tools-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110618" comment="xen-tools-domU-4.4.2_06-23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2152</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2152" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2152" source="CVE"/>
    <description>
    Xen 4.5.x and earlier enables certain default backends when emulating a VGA device for an x86 HVM guest qemu even when the configuration disables them, which allows local guest users to obtain access to the VGA console by (1) setting the DISPLAY environment variable, when compiled with SDL support, or connecting to the VNC server on (2) ::1 or (3) 127.0.0.1, when not compiled with SDL support.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110614" comment="xen-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110615" comment="xen-devel-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110619" comment="xen-doc-html-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110620" comment="xen-kmp-default-4.4.2_06_k3.16.7_21-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110621" comment="xen-kmp-desktop-4.4.2_06_k3.16.7_21-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110617" comment="xen-libs-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110616" comment="xen-libs-32bit-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110622" comment="xen-tools-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110618" comment="xen-tools-domU-4.4.2_06-23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2153</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2153" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2153" source="CVE"/>
    <description>
    The rpki_rtr_pdu_print function in print-rpki-rtr.c in the TCP printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) via a crafted header length in an RPKI-RTR Protocol Data Unit (PDU).
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108128" comment="tcpdump-4.6.2-8.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2154</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2154" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2154" source="CVE"/>
    <description>
    The osi_print_cksum function in print-isoclns.c in the ethernet printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) length, (2) offset, or (3) base pointer checksum value.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108128" comment="tcpdump-4.6.2-8.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2155</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2155" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2155" source="CVE"/>
    <description>
    The force printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108128" comment="tcpdump-4.6.2-8.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2157</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2157" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2157" source="CVE"/>
    <description>
    The (1) ssh2_load_userkey and (2) ssh2_save_userkey functions in PuTTY 0.51 through 0.63 do not properly wipe SSH-2 private keys from memory, which allows local users to obtain sensitive information by reading the memory.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107600" comment="putty-0.64-4.4.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2170</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2170" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2170" source="CVE"/>
    <description>
    The upx decoder in ClamAV before 0.98.7 allows remote attackers to cause a denial of service (crash) via a crafted file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109691" comment="clamav-0.98.7-2.16.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2181</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2181" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2181" source="CVE"/>
    <description>
    Multiple buffer overflows in the DBMail driver in the Password plugin in Roundcube before 1.1.0 allow remote attackers to have unspecified impact via the (1) password or (2) username.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134103" comment="roundcubemail-1.0.9-20.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2187</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2187" source="CVE"/>
    <description>
    The dissect_atn_cpdlc_heur function in asn1/atn-cpdlc/packet-atn-cpdlc-template.c in the ATN-CPDLC dissector in Wireshark 1.12.x before 1.12.4 does not properly follow the TRY/ENDTRY code requirements, which allows remote attackers to cause a denial of service (stack memory corruption and application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107667" comment="wireshark-1.12.4-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107668" comment="wireshark-devel-1.12.4-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107669" comment="wireshark-ui-gtk-1.12.4-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107670" comment="wireshark-ui-qt-1.12.4-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2188</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2188" source="CVE"/>
    <description>
    epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet that is improperly handled during decompression.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107667" comment="wireshark-1.12.4-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107668" comment="wireshark-devel-1.12.4-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107669" comment="wireshark-ui-gtk-1.12.4-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107670" comment="wireshark-ui-qt-1.12.4-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2189</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2189" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2189" source="CVE"/>
    <description>
    Off-by-one error in the pcapng_read function in wiretap/pcapng.c in the pcapng file parser in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via an invalid Interface Statistics Block (ISB) interface ID in a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107667" comment="wireshark-1.12.4-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107668" comment="wireshark-devel-1.12.4-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107669" comment="wireshark-ui-gtk-1.12.4-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107670" comment="wireshark-ui-qt-1.12.4-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2190</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2190" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2190" source="CVE"/>
    <description>
    epan/proto.c in Wireshark 1.12.x before 1.12.4 does not properly handle integer data types greater than 32 bits in size, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted packet that is improperly handled by the LLDP dissector.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107667" comment="wireshark-1.12.4-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107668" comment="wireshark-devel-1.12.4-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107669" comment="wireshark-ui-gtk-1.12.4-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107670" comment="wireshark-ui-qt-1.12.4-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2191</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2191" source="CVE"/>
    <description>
    Integer overflow in the dissect_tnef function in epan/dissectors/packet-tnef.c in the TNEF dissector in Wireshark 1.10.x before 1.10.13 and 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted length field in a packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107667" comment="wireshark-1.12.4-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107668" comment="wireshark-devel-1.12.4-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107669" comment="wireshark-ui-gtk-1.12.4-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107670" comment="wireshark-ui-qt-1.12.4-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2192</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2192" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2192" source="CVE"/>
    <description>
    Integer overflow in the dissect_osd2_cdb_continuation function in epan/dissectors/packet-scsi-osd.c in the SCSI OSD dissector in Wireshark 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted length field in a packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107667" comment="wireshark-1.12.4-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107668" comment="wireshark-devel-1.12.4-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107669" comment="wireshark-ui-gtk-1.12.4-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107670" comment="wireshark-ui-qt-1.12.4-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2206</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2206" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2206" source="CVE"/>
    <description>
    libraries/select_lang.lib.php in phpMyAdmin 4.0.x before 4.0.10.9, 4.2.x before 4.2.13.2, and 4.3.x before 4.3.11.1 includes invalid language values in unknown-language error responses that contain a CSRF token and may be sent with HTTP compression, which makes it easier for remote attackers to conduct a BREACH attack and determine this token via a series of crafted requests.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110879" comment="phpMyAdmin-4.2.13.3-11.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2221</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2221" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2221" source="CVE"/>
    <description>
    ClamAV before 0.98.7 allows remote attackers to cause a denial of service (infinite loop) via a crafted y0da cryptor file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109691" comment="clamav-0.98.7-2.16.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2222</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2222" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2222" source="CVE"/>
    <description>
    ClamAV before 0.98.7 allows remote attackers to cause a denial of service (crash) via a crafted petite packed file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109691" comment="clamav-0.98.7-2.16.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2265</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2265" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2265" source="CVE"/>
    <description>
    The remove_bad_chars function in utils/cups-browsed.c in cups-filters before 1.0.66 allows remote IPP printers to execute arbitrary commands via consecutive shell metacharacters in the (1) model or (2) PDL. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-2707.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111170" comment="cups-filters-1.0.58-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111171" comment="cups-filters-cups-browsed-1.0.58-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111172" comment="cups-filters-devel-1.0.58-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111173" comment="cups-filters-foomatic-rip-1.0.58-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111174" comment="cups-filters-ghostscript-1.0.58-2.7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2301</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2301" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2301" source="CVE"/>
    <description>
    Use-after-free vulnerability in the phar_rename_archive function in phar_object.c in PHP before 5.5.22 and 5.6.x before 5.6.6 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an attempted renaming of a Phar archive to the name of an existing file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108278" comment="apache2-mod_php5-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108279" comment="php5-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108280" comment="php5-bcmath-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108281" comment="php5-bz2-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108282" comment="php5-calendar-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108283" comment="php5-ctype-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108284" comment="php5-curl-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108285" comment="php5-dba-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108286" comment="php5-devel-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108287" comment="php5-dom-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108288" comment="php5-enchant-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108289" comment="php5-exif-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108290" comment="php5-fastcgi-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108291" comment="php5-fileinfo-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108292" comment="php5-firebird-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108293" comment="php5-fpm-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108294" comment="php5-ftp-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108295" comment="php5-gd-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108296" comment="php5-gettext-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108297" comment="php5-gmp-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108298" comment="php5-iconv-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108299" comment="php5-imap-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108300" comment="php5-intl-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108301" comment="php5-json-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108302" comment="php5-ldap-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108303" comment="php5-mbstring-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108304" comment="php5-mcrypt-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108305" comment="php5-mssql-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108306" comment="php5-mysql-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108307" comment="php5-odbc-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108308" comment="php5-opcache-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108309" comment="php5-openssl-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108310" comment="php5-pcntl-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108311" comment="php5-pdo-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108312" comment="php5-pear-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108313" comment="php5-pgsql-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108314" comment="php5-phar-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108315" comment="php5-posix-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108316" comment="php5-pspell-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108317" comment="php5-readline-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108318" comment="php5-shmop-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108319" comment="php5-snmp-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108320" comment="php5-soap-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108321" comment="php5-sockets-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108322" comment="php5-sqlite-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108323" comment="php5-suhosin-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108324" comment="php5-sysvmsg-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108325" comment="php5-sysvsem-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108326" comment="php5-sysvshm-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108327" comment="php5-tidy-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108328" comment="php5-tokenizer-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108329" comment="php5-wddx-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108330" comment="php5-xmlreader-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108331" comment="php5-xmlrpc-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108332" comment="php5-xmlwriter-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108333" comment="php5-xsl-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108334" comment="php5-zip-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108335" comment="php5-zlib-5.6.1-15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2304</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2304" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2304" source="CVE"/>
    <description>
    Absolute path traversal vulnerability in bsdcpio in libarchive 3.1.2 and earlier allows remote attackers to write to arbitrary files via a full pathname in an archive.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009107977" comment="bsdtar-3.1.2-7.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107978" comment="libarchive-3.1.2-7.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107979" comment="libarchive-devel-3.1.2-7.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107980" comment="libarchive13-3.1.2-7.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009107981" comment="libarchive13-32bit-3.1.2-7.5.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2305</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2305" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2305" source="CVE"/>
    <description>
    Integer overflow in the regcomp implementation in the Henry Spencer BSD regex library (aka rxspencer) alpha3.8.g5 on 32-bit platforms, as used in NetBSD through 6.1.5 and other products, might allow context-dependent attackers to execute arbitrary code via a large regular expression that leads to a heap-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108278" comment="apache2-mod_php5-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109691" comment="clamav-0.98.7-2.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108279" comment="php5-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108280" comment="php5-bcmath-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108281" comment="php5-bz2-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108282" comment="php5-calendar-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108283" comment="php5-ctype-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108284" comment="php5-curl-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108285" comment="php5-dba-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108286" comment="php5-devel-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108287" comment="php5-dom-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108288" comment="php5-enchant-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108289" comment="php5-exif-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108290" comment="php5-fastcgi-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108291" comment="php5-fileinfo-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108292" comment="php5-firebird-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108293" comment="php5-fpm-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108294" comment="php5-ftp-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108295" comment="php5-gd-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108296" comment="php5-gettext-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108297" comment="php5-gmp-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108298" comment="php5-iconv-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108299" comment="php5-imap-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108300" comment="php5-intl-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108301" comment="php5-json-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108302" comment="php5-ldap-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108303" comment="php5-mbstring-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108304" comment="php5-mcrypt-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108305" comment="php5-mssql-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108306" comment="php5-mysql-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108307" comment="php5-odbc-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108308" comment="php5-opcache-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108309" comment="php5-openssl-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108310" comment="php5-pcntl-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108311" comment="php5-pdo-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108312" comment="php5-pear-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108313" comment="php5-pgsql-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108314" comment="php5-phar-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108315" comment="php5-posix-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108316" comment="php5-pspell-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108317" comment="php5-readline-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108318" comment="php5-shmop-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108319" comment="php5-snmp-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108320" comment="php5-soap-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108321" comment="php5-sockets-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108322" comment="php5-sqlite-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108323" comment="php5-suhosin-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108324" comment="php5-sysvmsg-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108325" comment="php5-sysvsem-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108326" comment="php5-sysvshm-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108327" comment="php5-tidy-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108328" comment="php5-tokenizer-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108329" comment="php5-wddx-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108330" comment="php5-xmlreader-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108331" comment="php5-xmlrpc-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108332" comment="php5-xmlwriter-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108333" comment="php5-xsl-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108334" comment="php5-zip-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108335" comment="php5-zlib-5.6.1-15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2316</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2316" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2316" source="CVE"/>
    <description>
    The utils.html.strip_tags function in Django 1.6.x before 1.6.11, 1.7.x before 1.7.7, and 1.8.x before 1.8c1, when using certain versions of Python, allows remote attackers to cause a denial of service (infinite loop) by increasing the length of the input string.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108336" comment="python-Django-1.6.11-3.4.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2317</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2317" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2317" source="CVE"/>
    <description>
    The utils.http.is_safe_url function in Django before 1.4.20, 1.5.x, 1.6.x before 1.6.11, 1.7.x before 1.7.7, and 1.8.x before 1.8c1 does not properly validate URLs, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a control character in a URL, as demonstrated by a \x08javascript: URL.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108336" comment="python-Django-1.6.11-3.4.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2325</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2325" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2325" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111084" comment="libmysqlclient-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111085" comment="libmysqlclient18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111086" comment="libmysqlclient18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111087" comment="libmysqlclient_r18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111088" comment="libmysqlclient_r18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111089" comment="libmysqld-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111090" comment="libmysqld18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109526" comment="libpcre1-8.37-3.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109525" comment="libpcre1-32bit-8.37-3.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109528" comment="libpcre16-0-8.37-3.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109527" comment="libpcre16-0-32bit-8.37-3.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109530" comment="libpcrecpp0-8.37-3.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109529" comment="libpcrecpp0-32bit-8.37-3.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109532" comment="libpcreposix0-8.37-3.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109531" comment="libpcreposix0-32bit-8.37-3.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111091" comment="mariadb-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111092" comment="mariadb-bench-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111093" comment="mariadb-client-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111094" comment="mariadb-errormessages-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111095" comment="mariadb-test-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111096" comment="mariadb-tools-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109533" comment="pcre-8.37-3.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109534" comment="pcre-devel-8.37-3.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109535" comment="pcre-devel-static-8.37-3.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109536" comment="pcre-doc-8.37-3.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109537" comment="pcre-tools-8.37-3.5.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2326</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2326" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2326" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111084" comment="libmysqlclient-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111085" comment="libmysqlclient18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111086" comment="libmysqlclient18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111087" comment="libmysqlclient_r18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111088" comment="libmysqlclient_r18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111089" comment="libmysqld-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111090" comment="libmysqld18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109526" comment="libpcre1-8.37-3.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109525" comment="libpcre1-32bit-8.37-3.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109528" comment="libpcre16-0-8.37-3.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109527" comment="libpcre16-0-32bit-8.37-3.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109530" comment="libpcrecpp0-8.37-3.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109529" comment="libpcrecpp0-32bit-8.37-3.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109532" comment="libpcreposix0-8.37-3.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109531" comment="libpcreposix0-32bit-8.37-3.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111091" comment="mariadb-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111092" comment="mariadb-bench-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111093" comment="mariadb-client-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111094" comment="mariadb-errormessages-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111095" comment="mariadb-test-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111096" comment="mariadb-tools-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109533" comment="pcre-8.37-3.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109534" comment="pcre-devel-8.37-3.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109535" comment="pcre-devel-static-8.37-3.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109536" comment="pcre-doc-8.37-3.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109537" comment="pcre-tools-8.37-3.5.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2331</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2331" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2331" source="CVE"/>
    <description>
    Integer overflow in the _zip_cdir_new function in zip_dirent.c in libzip 0.11.2 and earlier, as used in the ZIP extension in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a ZIP archive that contains many entries, leading to a heap-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108278" comment="apache2-mod_php5-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108119" comment="libzip-0.11.2-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108120" comment="libzip-devel-0.11.2-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108121" comment="libzip2-0.11.2-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108122" comment="libzip2-32bit-0.11.2-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108279" comment="php5-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108280" comment="php5-bcmath-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108281" comment="php5-bz2-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108282" comment="php5-calendar-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108283" comment="php5-ctype-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108284" comment="php5-curl-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108285" comment="php5-dba-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108286" comment="php5-devel-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108287" comment="php5-dom-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108288" comment="php5-enchant-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108289" comment="php5-exif-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108290" comment="php5-fastcgi-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108291" comment="php5-fileinfo-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108292" comment="php5-firebird-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108293" comment="php5-fpm-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108294" comment="php5-ftp-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108295" comment="php5-gd-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108296" comment="php5-gettext-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108297" comment="php5-gmp-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108298" comment="php5-iconv-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108299" comment="php5-imap-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108300" comment="php5-intl-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108301" comment="php5-json-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108302" comment="php5-ldap-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108303" comment="php5-mbstring-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108304" comment="php5-mcrypt-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108305" comment="php5-mssql-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108306" comment="php5-mysql-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108307" comment="php5-odbc-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108308" comment="php5-opcache-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108309" comment="php5-openssl-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108310" comment="php5-pcntl-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108311" comment="php5-pdo-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108312" comment="php5-pear-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108313" comment="php5-pgsql-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108314" comment="php5-phar-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108315" comment="php5-posix-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108316" comment="php5-pspell-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108317" comment="php5-readline-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108318" comment="php5-shmop-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108319" comment="php5-snmp-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108320" comment="php5-soap-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108321" comment="php5-sockets-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108322" comment="php5-sqlite-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108323" comment="php5-suhosin-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108324" comment="php5-sysvmsg-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108325" comment="php5-sysvsem-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108326" comment="php5-sysvshm-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108327" comment="php5-tidy-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108328" comment="php5-tokenizer-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108329" comment="php5-wddx-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108330" comment="php5-xmlreader-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108331" comment="php5-xmlrpc-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108332" comment="php5-xmlwriter-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108333" comment="php5-xsl-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108334" comment="php5-zip-5.6.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108335" comment="php5-zlib-5.6.1-15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2348</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2348" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2348" source="CVE"/>
    <description>
    The move_uploaded_file implementation in ext/standard/basic_functions.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 truncates a pathname upon encountering a \x00 character, which allows remote attackers to bypass intended extension restrictions and create files with unexpected names via a crafted second argument.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108547" comment="apache2-mod_php5-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108548" comment="php5-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108549" comment="php5-bcmath-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108550" comment="php5-bz2-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108551" comment="php5-calendar-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108552" comment="php5-ctype-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108553" comment="php5-curl-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108554" comment="php5-dba-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108555" comment="php5-devel-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108556" comment="php5-dom-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108557" comment="php5-enchant-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108558" comment="php5-exif-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108559" comment="php5-fastcgi-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108560" comment="php5-fileinfo-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108561" comment="php5-firebird-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108562" comment="php5-fpm-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108563" comment="php5-ftp-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108564" comment="php5-gd-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108565" comment="php5-gettext-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108566" comment="php5-gmp-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108567" comment="php5-iconv-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108568" comment="php5-imap-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108569" comment="php5-intl-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108570" comment="php5-json-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108571" comment="php5-ldap-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108572" comment="php5-mbstring-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108573" comment="php5-mcrypt-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108574" comment="php5-mssql-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108575" comment="php5-mysql-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108576" comment="php5-odbc-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108577" comment="php5-opcache-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108578" comment="php5-openssl-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108579" comment="php5-pcntl-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108580" comment="php5-pdo-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108581" comment="php5-pear-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108582" comment="php5-pgsql-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108583" comment="php5-phar-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108584" comment="php5-posix-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108585" comment="php5-pspell-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108586" comment="php5-readline-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108587" comment="php5-shmop-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108588" comment="php5-snmp-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108589" comment="php5-soap-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108590" comment="php5-sockets-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108591" comment="php5-sqlite-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108592" comment="php5-suhosin-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108593" comment="php5-sysvmsg-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108594" comment="php5-sysvsem-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108595" comment="php5-sysvshm-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108596" comment="php5-tidy-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108597" comment="php5-tokenizer-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108598" comment="php5-wddx-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108599" comment="php5-xmlreader-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108600" comment="php5-xmlrpc-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108601" comment="php5-xmlwriter-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108602" comment="php5-xsl-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108603" comment="php5-zip-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108604" comment="php5-zlib-5.6.1-18.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2568</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2568" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2568" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote attackers to affect availability via unknown vectors related to Server : Security : Privileges.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111084" comment="libmysqlclient-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111085" comment="libmysqlclient18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111086" comment="libmysqlclient18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111087" comment="libmysqlclient_r18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111088" comment="libmysqlclient_r18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111089" comment="libmysqld-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111090" comment="libmysqld18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111091" comment="mariadb-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111092" comment="mariadb-bench-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111093" comment="mariadb-client-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111094" comment="mariadb-errormessages-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111095" comment="mariadb-test-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111096" comment="mariadb-tools-10.0.20-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2571</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2571" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111084" comment="libmysqlclient-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111085" comment="libmysqlclient18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111086" comment="libmysqlclient18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111087" comment="libmysqlclient_r18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111088" comment="libmysqlclient_r18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111089" comment="libmysqld-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111090" comment="libmysqld18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111091" comment="mariadb-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111092" comment="mariadb-bench-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111093" comment="mariadb-client-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111094" comment="mariadb-errormessages-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111095" comment="mariadb-test-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111096" comment="mariadb-tools-10.0.20-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2573</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2573" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2573" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.41 and earlier, and 5.6.22 and earlier, allows remote authenticated users to affect availability via vectors related to DDL.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111084" comment="libmysqlclient-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111085" comment="libmysqlclient18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111086" comment="libmysqlclient18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111087" comment="libmysqlclient_r18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111088" comment="libmysqlclient_r18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111089" comment="libmysqld-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111090" comment="libmysqld18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111091" comment="mariadb-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111092" comment="mariadb-bench-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111093" comment="mariadb-client-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111094" comment="mariadb-errormessages-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111095" comment="mariadb-test-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111096" comment="mariadb-tools-10.0.20-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2575</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2575" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2575" source="CVE"/>
    <description>
    Unspecified vulnerability in the MySQL Connectors component in Oracle MySQL 5.1.34 and earlier allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Connector/J.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109982" comment="mysql-connector-java-5.1.35-3.3.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2582</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2582" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2582" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to GIS.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114573" comment="libmysql56client18-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114572" comment="libmysql56client18-32bit-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114575" comment="libmysql56client_r18-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114574" comment="libmysql56client_r18-32bit-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114576" comment="mysql-community-server-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114577" comment="mysql-community-server-bench-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114578" comment="mysql-community-server-client-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114579" comment="mysql-community-server-errormessages-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114580" comment="mysql-community-server-test-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114581" comment="mysql-community-server-tools-5.6.26-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2590</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2590" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2590" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2015-4732.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111326" comment="java-1_7_0-openjdk-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111327" comment="java-1_7_0-openjdk-accessibility-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111323" comment="java-1_7_0-openjdk-bootstrap-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111324" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111325" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111328" comment="java-1_7_0-openjdk-demo-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111329" comment="java-1_7_0-openjdk-devel-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111330" comment="java-1_7_0-openjdk-headless-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111331" comment="java-1_7_0-openjdk-javadoc-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111332" comment="java-1_7_0-openjdk-src-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111333" comment="java-1_8_0-openjdk-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111334" comment="java-1_8_0-openjdk-accessibility-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111335" comment="java-1_8_0-openjdk-demo-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111336" comment="java-1_8_0-openjdk-devel-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111337" comment="java-1_8_0-openjdk-headless-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111338" comment="java-1_8_0-openjdk-javadoc-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111339" comment="java-1_8_0-openjdk-src-1.8.0.51-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2594</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2594" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2594" source="CVE"/>
    <description>
    Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox prior to 4.0.32, 4.1.40, 4.2.32, and 4.3.30 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Core.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113820" comment="python-virtualbox-4.3.30-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113821" comment="virtualbox-4.3.30-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113822" comment="virtualbox-devel-4.3.30-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113823" comment="virtualbox-guest-desktop-icons-4.3.30-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113824" comment="virtualbox-guest-kmp-default-4.3.30_k3.16.7_21-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113825" comment="virtualbox-guest-kmp-desktop-4.3.30_k3.16.7_21-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113826" comment="virtualbox-guest-kmp-pae-4.3.30_k3.16.7_21-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113827" comment="virtualbox-guest-tools-4.3.30-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113828" comment="virtualbox-guest-x11-4.3.30-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113829" comment="virtualbox-host-kmp-default-4.3.30_k3.16.7_21-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113830" comment="virtualbox-host-kmp-desktop-4.3.30_k3.16.7_21-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113831" comment="virtualbox-host-kmp-pae-4.3.30_k3.16.7_21-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113832" comment="virtualbox-host-source-4.3.30-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113833" comment="virtualbox-qt-4.3.30-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113834" comment="virtualbox-websrv-4.3.30-17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2596</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2596" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2596" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u80 allows remote attackers to affect integrity via unknown vectors related to Hotspot.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111326" comment="java-1_7_0-openjdk-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111327" comment="java-1_7_0-openjdk-accessibility-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111323" comment="java-1_7_0-openjdk-bootstrap-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111324" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111325" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111328" comment="java-1_7_0-openjdk-demo-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111329" comment="java-1_7_0-openjdk-devel-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111330" comment="java-1_7_0-openjdk-headless-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111331" comment="java-1_7_0-openjdk-javadoc-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111332" comment="java-1_7_0-openjdk-src-1.7.0.85-10.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2597</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2597" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2597" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u80 and 8u45 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Install.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111326" comment="java-1_7_0-openjdk-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111327" comment="java-1_7_0-openjdk-accessibility-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111323" comment="java-1_7_0-openjdk-bootstrap-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111324" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111325" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111328" comment="java-1_7_0-openjdk-demo-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111329" comment="java-1_7_0-openjdk-devel-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111330" comment="java-1_7_0-openjdk-headless-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111331" comment="java-1_7_0-openjdk-javadoc-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111332" comment="java-1_7_0-openjdk-src-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111333" comment="java-1_8_0-openjdk-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111334" comment="java-1_8_0-openjdk-accessibility-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111335" comment="java-1_8_0-openjdk-demo-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111336" comment="java-1_8_0-openjdk-devel-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111337" comment="java-1_8_0-openjdk-headless-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111338" comment="java-1_8_0-openjdk-javadoc-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111339" comment="java-1_8_0-openjdk-src-1.8.0.51-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2601</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2601" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2601" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, JRockit R28.3.6, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via vectors related to JCE.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111326" comment="java-1_7_0-openjdk-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111327" comment="java-1_7_0-openjdk-accessibility-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111323" comment="java-1_7_0-openjdk-bootstrap-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111324" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111325" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111328" comment="java-1_7_0-openjdk-demo-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111329" comment="java-1_7_0-openjdk-devel-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111330" comment="java-1_7_0-openjdk-headless-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111331" comment="java-1_7_0-openjdk-javadoc-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111332" comment="java-1_7_0-openjdk-src-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111333" comment="java-1_8_0-openjdk-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111334" comment="java-1_8_0-openjdk-accessibility-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111335" comment="java-1_8_0-openjdk-demo-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111336" comment="java-1_8_0-openjdk-devel-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111337" comment="java-1_8_0-openjdk-headless-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111338" comment="java-1_8_0-openjdk-javadoc-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111339" comment="java-1_8_0-openjdk-src-1.8.0.51-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2611</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2611" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2611" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to DML.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114573" comment="libmysql56client18-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114572" comment="libmysql56client18-32bit-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114575" comment="libmysql56client_r18-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114574" comment="libmysql56client_r18-32bit-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114576" comment="mysql-community-server-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114577" comment="mysql-community-server-bench-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114578" comment="mysql-community-server-client-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114579" comment="mysql-community-server-errormessages-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114580" comment="mysql-community-server-test-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114581" comment="mysql-community-server-tools-5.6.26-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2613</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2613" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2613" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u80 and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via vectors related to JCE.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111326" comment="java-1_7_0-openjdk-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111327" comment="java-1_7_0-openjdk-accessibility-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111323" comment="java-1_7_0-openjdk-bootstrap-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111324" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111325" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111328" comment="java-1_7_0-openjdk-demo-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111329" comment="java-1_7_0-openjdk-devel-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111330" comment="java-1_7_0-openjdk-headless-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111331" comment="java-1_7_0-openjdk-javadoc-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111332" comment="java-1_7_0-openjdk-src-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111333" comment="java-1_8_0-openjdk-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111334" comment="java-1_8_0-openjdk-accessibility-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111335" comment="java-1_8_0-openjdk-demo-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111336" comment="java-1_8_0-openjdk-devel-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111337" comment="java-1_8_0-openjdk-headless-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111338" comment="java-1_8_0-openjdk-javadoc-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111339" comment="java-1_8_0-openjdk-src-1.8.0.51-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2617</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2617" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2617" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Partition.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114573" comment="libmysql56client18-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114572" comment="libmysql56client18-32bit-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114575" comment="libmysql56client_r18-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114574" comment="libmysql56client_r18-32bit-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114576" comment="mysql-community-server-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114577" comment="mysql-community-server-bench-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114578" comment="mysql-community-server-client-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114579" comment="mysql-community-server-errormessages-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114580" comment="mysql-community-server-test-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114581" comment="mysql-community-server-tools-5.6.26-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2619</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2619" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2619" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u80 and 8u45, JavaFX 2.2.80, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via unknown vectors related to 2D.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111326" comment="java-1_7_0-openjdk-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111327" comment="java-1_7_0-openjdk-accessibility-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111323" comment="java-1_7_0-openjdk-bootstrap-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111324" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111325" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111328" comment="java-1_7_0-openjdk-demo-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111329" comment="java-1_7_0-openjdk-devel-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111330" comment="java-1_7_0-openjdk-headless-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111331" comment="java-1_7_0-openjdk-javadoc-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111332" comment="java-1_7_0-openjdk-src-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111333" comment="java-1_8_0-openjdk-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111334" comment="java-1_8_0-openjdk-accessibility-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111335" comment="java-1_8_0-openjdk-demo-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111336" comment="java-1_8_0-openjdk-devel-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111337" comment="java-1_8_0-openjdk-headless-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111338" comment="java-1_8_0-openjdk-javadoc-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111339" comment="java-1_8_0-openjdk-src-1.8.0.51-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2620</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2620" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2620" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.23 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Security : Privileges.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114573" comment="libmysql56client18-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114572" comment="libmysql56client18-32bit-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114575" comment="libmysql56client_r18-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114574" comment="libmysql56client_r18-32bit-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114576" comment="mysql-community-server-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114577" comment="mysql-community-server-bench-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114578" comment="mysql-community-server-client-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114579" comment="mysql-community-server-errormessages-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114580" comment="mysql-community-server-test-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114581" comment="mysql-community-server-tools-5.6.26-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2621</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2621" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2621" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33, allows remote attackers to affect confidentiality via vectors related to JMX.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111326" comment="java-1_7_0-openjdk-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111327" comment="java-1_7_0-openjdk-accessibility-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111323" comment="java-1_7_0-openjdk-bootstrap-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111324" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111325" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111328" comment="java-1_7_0-openjdk-demo-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111329" comment="java-1_7_0-openjdk-devel-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111330" comment="java-1_7_0-openjdk-headless-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111331" comment="java-1_7_0-openjdk-javadoc-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111332" comment="java-1_7_0-openjdk-src-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111333" comment="java-1_8_0-openjdk-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111334" comment="java-1_8_0-openjdk-accessibility-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111335" comment="java-1_8_0-openjdk-demo-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111336" comment="java-1_8_0-openjdk-devel-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111337" comment="java-1_8_0-openjdk-headless-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111338" comment="java-1_8_0-openjdk-javadoc-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111339" comment="java-1_8_0-openjdk-src-1.8.0.51-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2625</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2625" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via vectors related to JSSE.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111326" comment="java-1_7_0-openjdk-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111327" comment="java-1_7_0-openjdk-accessibility-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111323" comment="java-1_7_0-openjdk-bootstrap-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111324" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111325" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111328" comment="java-1_7_0-openjdk-demo-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111329" comment="java-1_7_0-openjdk-devel-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111330" comment="java-1_7_0-openjdk-headless-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111331" comment="java-1_7_0-openjdk-javadoc-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111332" comment="java-1_7_0-openjdk-src-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111333" comment="java-1_8_0-openjdk-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111334" comment="java-1_8_0-openjdk-accessibility-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111335" comment="java-1_8_0-openjdk-demo-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111336" comment="java-1_8_0-openjdk-devel-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111337" comment="java-1_8_0-openjdk-headless-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111338" comment="java-1_8_0-openjdk-javadoc-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111339" comment="java-1_8_0-openjdk-src-1.8.0.51-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2627</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2627" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2627" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allows remote attackers to affect confidentiality via unknown vectors related to installation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111326" comment="java-1_7_0-openjdk-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111327" comment="java-1_7_0-openjdk-accessibility-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111323" comment="java-1_7_0-openjdk-bootstrap-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111324" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111325" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111328" comment="java-1_7_0-openjdk-demo-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111329" comment="java-1_7_0-openjdk-devel-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111330" comment="java-1_7_0-openjdk-headless-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111331" comment="java-1_7_0-openjdk-javadoc-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111332" comment="java-1_7_0-openjdk-src-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111333" comment="java-1_8_0-openjdk-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111334" comment="java-1_8_0-openjdk-accessibility-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111335" comment="java-1_8_0-openjdk-demo-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111336" comment="java-1_8_0-openjdk-devel-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111337" comment="java-1_8_0-openjdk-headless-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111338" comment="java-1_8_0-openjdk-javadoc-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111339" comment="java-1_8_0-openjdk-src-1.8.0.51-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2628</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2628" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2628" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111326" comment="java-1_7_0-openjdk-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111327" comment="java-1_7_0-openjdk-accessibility-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111323" comment="java-1_7_0-openjdk-bootstrap-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111324" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111325" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111328" comment="java-1_7_0-openjdk-demo-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111329" comment="java-1_7_0-openjdk-devel-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111330" comment="java-1_7_0-openjdk-headless-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111331" comment="java-1_7_0-openjdk-javadoc-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111332" comment="java-1_7_0-openjdk-src-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111333" comment="java-1_8_0-openjdk-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111334" comment="java-1_8_0-openjdk-accessibility-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111335" comment="java-1_8_0-openjdk-demo-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111336" comment="java-1_8_0-openjdk-devel-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111337" comment="java-1_8_0-openjdk-headless-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111338" comment="java-1_8_0-openjdk-javadoc-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111339" comment="java-1_8_0-openjdk-src-1.8.0.51-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2632</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2632" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2632" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allows remote attackers to affect confidentiality via unknown vectors related to 2D.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111326" comment="java-1_7_0-openjdk-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111327" comment="java-1_7_0-openjdk-accessibility-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111323" comment="java-1_7_0-openjdk-bootstrap-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111324" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111325" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111328" comment="java-1_7_0-openjdk-demo-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111329" comment="java-1_7_0-openjdk-devel-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111330" comment="java-1_7_0-openjdk-headless-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111331" comment="java-1_7_0-openjdk-javadoc-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111332" comment="java-1_7_0-openjdk-src-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111333" comment="java-1_8_0-openjdk-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111334" comment="java-1_8_0-openjdk-accessibility-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111335" comment="java-1_8_0-openjdk-demo-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111336" comment="java-1_8_0-openjdk-devel-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111337" comment="java-1_8_0-openjdk-headless-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111338" comment="java-1_8_0-openjdk-javadoc-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111339" comment="java-1_8_0-openjdk-src-1.8.0.51-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2637</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2637" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2637" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JavaFX 2.2.80; and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via unknown vectors related to 2D.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111326" comment="java-1_7_0-openjdk-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111327" comment="java-1_7_0-openjdk-accessibility-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111323" comment="java-1_7_0-openjdk-bootstrap-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111324" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111325" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111328" comment="java-1_7_0-openjdk-demo-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111329" comment="java-1_7_0-openjdk-devel-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111330" comment="java-1_7_0-openjdk-headless-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111331" comment="java-1_7_0-openjdk-javadoc-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111332" comment="java-1_7_0-openjdk-src-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111333" comment="java-1_8_0-openjdk-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111334" comment="java-1_8_0-openjdk-accessibility-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111335" comment="java-1_8_0-openjdk-demo-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111336" comment="java-1_8_0-openjdk-devel-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111337" comment="java-1_8_0-openjdk-headless-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111338" comment="java-1_8_0-openjdk-javadoc-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111339" comment="java-1_8_0-openjdk-src-1.8.0.51-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2638</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2638" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2638" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JavaFX 2.2.80; and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111326" comment="java-1_7_0-openjdk-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111327" comment="java-1_7_0-openjdk-accessibility-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111323" comment="java-1_7_0-openjdk-bootstrap-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111324" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111325" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111328" comment="java-1_7_0-openjdk-demo-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111329" comment="java-1_7_0-openjdk-devel-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111330" comment="java-1_7_0-openjdk-headless-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111331" comment="java-1_7_0-openjdk-javadoc-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111332" comment="java-1_7_0-openjdk-src-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111333" comment="java-1_8_0-openjdk-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111334" comment="java-1_8_0-openjdk-accessibility-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111335" comment="java-1_8_0-openjdk-demo-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111336" comment="java-1_8_0-openjdk-devel-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111337" comment="java-1_8_0-openjdk-headless-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111338" comment="java-1_8_0-openjdk-javadoc-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111339" comment="java-1_8_0-openjdk-src-1.8.0.51-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2639</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2639" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2639" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Server : Security : Firewall.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114573" comment="libmysql56client18-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114572" comment="libmysql56client18-32bit-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114575" comment="libmysql56client_r18-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114574" comment="libmysql56client_r18-32bit-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114576" comment="mysql-community-server-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114577" comment="mysql-community-server-bench-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114578" comment="mysql-community-server-client-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114579" comment="mysql-community-server-errormessages-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114580" comment="mysql-community-server-test-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114581" comment="mysql-community-server-tools-5.6.26-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2641</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2641" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2641" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Security : Privileges.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114573" comment="libmysql56client18-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114572" comment="libmysql56client18-32bit-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114575" comment="libmysql56client_r18-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114574" comment="libmysql56client_r18-32bit-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114576" comment="mysql-community-server-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114577" comment="mysql-community-server-bench-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114578" comment="mysql-community-server-client-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114579" comment="mysql-community-server-errormessages-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114580" comment="mysql-community-server-test-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114581" comment="mysql-community-server-tools-5.6.26-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2643</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2643" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2643" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114573" comment="libmysql56client18-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114572" comment="libmysql56client18-32bit-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114575" comment="libmysql56client_r18-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114574" comment="libmysql56client_r18-32bit-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114576" comment="mysql-community-server-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114577" comment="mysql-community-server-bench-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114578" comment="mysql-community-server-client-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114579" comment="mysql-community-server-errormessages-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114580" comment="mysql-community-server-test-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114581" comment="mysql-community-server-tools-5.6.26-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2648</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2648" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2648" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to DML.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114573" comment="libmysql56client18-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114572" comment="libmysql56client18-32bit-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114575" comment="libmysql56client_r18-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114574" comment="libmysql56client_r18-32bit-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114576" comment="mysql-community-server-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114577" comment="mysql-community-server-bench-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114578" comment="mysql-community-server-client-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114579" comment="mysql-community-server-errormessages-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114580" comment="mysql-community-server-test-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114581" comment="mysql-community-server-tools-5.6.26-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2659</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2659" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2659" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u45 and Java SE Embedded 8u33 allows remote attackers to affect availability via unknown vectors related to Security.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111333" comment="java-1_8_0-openjdk-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111334" comment="java-1_8_0-openjdk-accessibility-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111335" comment="java-1_8_0-openjdk-demo-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111336" comment="java-1_8_0-openjdk-devel-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111337" comment="java-1_8_0-openjdk-headless-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111338" comment="java-1_8_0-openjdk-javadoc-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111339" comment="java-1_8_0-openjdk-src-1.8.0.51-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2661</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2661" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2661" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows local users to affect availability via unknown vectors related to Client.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114573" comment="libmysql56client18-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114572" comment="libmysql56client18-32bit-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114575" comment="libmysql56client_r18-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114574" comment="libmysql56client_r18-32bit-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114576" comment="mysql-community-server-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114577" comment="mysql-community-server-bench-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114578" comment="mysql-community-server-client-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114579" comment="mysql-community-server-errormessages-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114580" comment="mysql-community-server-test-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114581" comment="mysql-community-server-tools-5.6.26-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2664</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2664" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2664" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111326" comment="java-1_7_0-openjdk-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111327" comment="java-1_7_0-openjdk-accessibility-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111323" comment="java-1_7_0-openjdk-bootstrap-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111324" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111325" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111328" comment="java-1_7_0-openjdk-demo-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111329" comment="java-1_7_0-openjdk-devel-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111330" comment="java-1_7_0-openjdk-headless-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111331" comment="java-1_7_0-openjdk-javadoc-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111332" comment="java-1_7_0-openjdk-src-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111333" comment="java-1_8_0-openjdk-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111334" comment="java-1_8_0-openjdk-accessibility-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111335" comment="java-1_8_0-openjdk-demo-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111336" comment="java-1_8_0-openjdk-devel-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111337" comment="java-1_8_0-openjdk-headless-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111338" comment="java-1_8_0-openjdk-javadoc-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111339" comment="java-1_8_0-openjdk-src-1.8.0.51-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2666</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2666" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2666" source="CVE"/>
    <description>
    Stack-based buffer overflow in the get_matching_model_microcode function in arch/x86/kernel/cpu/microcode/intel_early.c in the Linux kernel before 4.0 allows context-dependent attackers to gain privileges by constructing a crafted microcode header and leveraging root privileges for write access to the initrd.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108989" comment="bbswitch-0.8-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108990" comment="bbswitch-kmp-default-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108991" comment="bbswitch-kmp-desktop-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108992" comment="bbswitch-kmp-pae-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108993" comment="bbswitch-kmp-xen-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108994" comment="cloop-2.639-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108995" comment="cloop-kmp-default-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108996" comment="cloop-kmp-desktop-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108997" comment="cloop-kmp-pae-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108998" comment="cloop-kmp-xen-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108999" comment="crash-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109000" comment="crash-devel-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109001" comment="crash-doc-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109002" comment="crash-eppic-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109003" comment="crash-gcore-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109004" comment="crash-kmp-default-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109005" comment="crash-kmp-desktop-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109006" comment="crash-kmp-pae-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109007" comment="crash-kmp-xen-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109008" comment="hdjmod-1.28-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109009" comment="hdjmod-kmp-default-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109010" comment="hdjmod-kmp-desktop-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109011" comment="hdjmod-kmp-pae-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109012" comment="hdjmod-kmp-xen-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109013" comment="ipset-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109014" comment="ipset-devel-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109015" comment="ipset-kmp-default-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109016" comment="ipset-kmp-desktop-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109017" comment="ipset-kmp-pae-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109018" comment="ipset-kmp-xen-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109020" comment="kernel-debug-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109021" comment="kernel-debug-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109022" comment="kernel-debug-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109023" comment="kernel-default-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109024" comment="kernel-default-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109025" comment="kernel-default-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109026" comment="kernel-desktop-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109027" comment="kernel-desktop-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109028" comment="kernel-desktop-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109039" comment="kernel-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109029" comment="kernel-docs-3.16.7-21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109030" comment="kernel-ec2-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109031" comment="kernel-ec2-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109032" comment="kernel-ec2-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109040" comment="kernel-macros-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109033" comment="kernel-obs-build-3.16.7-21.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109035" comment="kernel-obs-qa-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109034" comment="kernel-obs-qa-xen-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109036" comment="kernel-pae-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109037" comment="kernel-pae-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109038" comment="kernel-pae-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109041" comment="kernel-source-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109042" comment="kernel-source-vanilla-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109043" comment="kernel-syms-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109044" comment="kernel-vanilla-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109045" comment="kernel-vanilla-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109046" comment="kernel-xen-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109047" comment="kernel-xen-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109048" comment="kernel-xen-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109019" comment="libipset3-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109049" comment="pcfclock-0.44-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109050" comment="pcfclock-kmp-default-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109051" comment="pcfclock-kmp-desktop-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109052" comment="pcfclock-kmp-pae-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109058" comment="python-virtualbox-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109053" comment="vhba-kmp-20140629-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109054" comment="vhba-kmp-default-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109055" comment="vhba-kmp-desktop-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109056" comment="vhba-kmp-pae-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109057" comment="vhba-kmp-xen-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109059" comment="virtualbox-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109060" comment="virtualbox-devel-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109061" comment="virtualbox-guest-desktop-icons-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109062" comment="virtualbox-guest-kmp-default-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109063" comment="virtualbox-guest-kmp-desktop-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109064" comment="virtualbox-guest-kmp-pae-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109065" comment="virtualbox-guest-tools-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109066" comment="virtualbox-guest-x11-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109067" comment="virtualbox-host-kmp-default-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109068" comment="virtualbox-host-kmp-desktop-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109069" comment="virtualbox-host-kmp-pae-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109070" comment="virtualbox-qt-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109071" comment="virtualbox-websrv-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109072" comment="xen-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109073" comment="xen-devel-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109082" comment="xen-doc-html-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109083" comment="xen-kmp-default-4.4.1_08_k3.16.7_21-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109084" comment="xen-kmp-desktop-4.4.1_08_k3.16.7_21-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109075" comment="xen-libs-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109074" comment="xen-libs-32bit-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109085" comment="xen-tools-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109076" comment="xen-tools-domU-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109077" comment="xtables-addons-2.6-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109078" comment="xtables-addons-kmp-default-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109079" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109080" comment="xtables-addons-kmp-pae-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109081" comment="xtables-addons-kmp-xen-2.6_k3.16.7_21-9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2668</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2668" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2668" source="CVE"/>
    <description>
    ClamAV before 0.98.7 allows remote attackers to cause a denial of service (infinite loop) via a crafted xz archive file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109691" comment="clamav-0.98.7-2.16.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2688</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2688" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2688" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108091" comment="tor-0.2.4.26-9.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2689</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2689" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2689" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108091" comment="tor-0.2.4.26-9.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2695</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2695" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2695" source="CVE"/>
    <description>
    lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) before 1.14 relies on an inappropriate context handle, which allows remote attackers to cause a denial of service (incorrect pointer read and process crash) via a crafted SPNEGO packet that is mishandled during a gss_inquire_context call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115999" comment="krb5-1.12.2-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116000" comment="krb5-32bit-1.12.2-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116001" comment="krb5-client-1.12.2-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116002" comment="krb5-devel-1.12.2-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116003" comment="krb5-devel-32bit-1.12.2-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116004" comment="krb5-doc-1.12.2-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115997" comment="krb5-mini-1.12.2-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115998" comment="krb5-mini-devel-1.12.2-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116005" comment="krb5-plugin-kdb-ldap-1.12.2-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116006" comment="krb5-plugin-preauth-otp-1.12.2-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116007" comment="krb5-plugin-preauth-pkinit-1.12.2-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116008" comment="krb5-server-1.12.2-15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2696</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2696" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2696" source="CVE"/>
    <description>
    lib/gssapi/krb5/iakerb.c in MIT Kerberos 5 (aka krb5) before 1.14 relies on an inappropriate context handle, which allows remote attackers to cause a denial of service (incorrect pointer read and process crash) via a crafted IAKERB packet that is mishandled during a gss_inquire_context call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115999" comment="krb5-1.12.2-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116000" comment="krb5-32bit-1.12.2-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116001" comment="krb5-client-1.12.2-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116002" comment="krb5-devel-1.12.2-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116003" comment="krb5-devel-32bit-1.12.2-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116004" comment="krb5-doc-1.12.2-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115997" comment="krb5-mini-1.12.2-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115998" comment="krb5-mini-devel-1.12.2-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116005" comment="krb5-plugin-kdb-ldap-1.12.2-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116006" comment="krb5-plugin-preauth-otp-1.12.2-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116007" comment="krb5-plugin-preauth-pkinit-1.12.2-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116008" comment="krb5-server-1.12.2-15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2697</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2697" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2697" source="CVE"/>
    <description>
    The build_principal_va function in lib/krb5/krb/bld_princ.c in MIT Kerberos 5 (aka krb5) before 1.14 allows remote authenticated users to cause a denial of service (out-of-bounds read and KDC crash) via an initial '\0' character in a long realm field within a TGS request.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115999" comment="krb5-1.12.2-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116000" comment="krb5-32bit-1.12.2-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116001" comment="krb5-client-1.12.2-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116002" comment="krb5-devel-1.12.2-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116003" comment="krb5-devel-32bit-1.12.2-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116004" comment="krb5-doc-1.12.2-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115997" comment="krb5-mini-1.12.2-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115998" comment="krb5-mini-devel-1.12.2-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116005" comment="krb5-plugin-kdb-ldap-1.12.2-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116006" comment="krb5-plugin-preauth-otp-1.12.2-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116007" comment="krb5-plugin-preauth-pkinit-1.12.2-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116008" comment="krb5-server-1.12.2-15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2698</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2698" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2698" source="CVE"/>
    <description>
    The iakerb_gss_export_sec_context function in lib/gssapi/krb5/iakerb.c in MIT Kerberos 5 (aka krb5) 1.14 pre-release 2015-09-14 improperly accesses a certain pointer, which allows remote authenticated users to cause a denial of service (memory corruption) or possibly have unspecified other impact by interacting with an application that calls the gss_export_sec_context function.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2015-2696.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118016" comment="krb5-1.12.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118017" comment="krb5-32bit-1.12.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118018" comment="krb5-client-1.12.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118019" comment="krb5-devel-1.12.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118020" comment="krb5-devel-32bit-1.12.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118021" comment="krb5-doc-1.12.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118022" comment="krb5-mini-1.12.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118023" comment="krb5-mini-devel-1.12.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118024" comment="krb5-plugin-kdb-ldap-1.12.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118025" comment="krb5-plugin-preauth-otp-1.12.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118026" comment="krb5-plugin-preauth-pkinit-1.12.2-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118027" comment="krb5-server-1.12.2-18.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2706</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2706" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2706" source="CVE"/>
    <description>
    Race condition in the AsyncPaintWaitEvent::AsyncPaintWaitEvent function in Mozilla Firefox before 37.0.2 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via a crafted plugin that does not properly complete initialization.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109099" comment="MozillaFirefox-37.0.2-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109100" comment="MozillaFirefox-branding-upstream-37.0.2-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109101" comment="MozillaFirefox-buildsymbols-37.0.2-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109102" comment="MozillaFirefox-devel-37.0.2-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109103" comment="MozillaFirefox-translations-common-37.0.2-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109104" comment="MozillaFirefox-translations-other-37.0.2-27.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2708</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2708" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2708" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109791" comment="MozillaFirefox-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109792" comment="MozillaFirefox-branding-upstream-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109793" comment="MozillaFirefox-buildsymbols-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109794" comment="MozillaFirefox-devel-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109795" comment="MozillaFirefox-translations-common-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109796" comment="MozillaFirefox-translations-other-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109786" comment="MozillaThunderbird-31.7.0-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109787" comment="MozillaThunderbird-buildsymbols-31.7.0-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109788" comment="MozillaThunderbird-devel-31.7.0-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109789" comment="MozillaThunderbird-translations-common-31.7.0-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109790" comment="MozillaThunderbird-translations-other-31.7.0-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109797" comment="libfreebl3-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109798" comment="libfreebl3-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109799" comment="libsoftokn3-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109800" comment="libsoftokn3-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109801" comment="mozilla-nss-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109802" comment="mozilla-nss-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109803" comment="mozilla-nss-certs-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109804" comment="mozilla-nss-certs-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109805" comment="mozilla-nss-devel-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109806" comment="mozilla-nss-sysinit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109807" comment="mozilla-nss-sysinit-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109808" comment="mozilla-nss-tools-3.18.1-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2709</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2709" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2709" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 38.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109791" comment="MozillaFirefox-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109792" comment="MozillaFirefox-branding-upstream-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109793" comment="MozillaFirefox-buildsymbols-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109794" comment="MozillaFirefox-devel-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109795" comment="MozillaFirefox-translations-common-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109796" comment="MozillaFirefox-translations-other-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109797" comment="libfreebl3-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109798" comment="libfreebl3-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109799" comment="libsoftokn3-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109800" comment="libsoftokn3-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109801" comment="mozilla-nss-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109802" comment="mozilla-nss-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109803" comment="mozilla-nss-certs-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109804" comment="mozilla-nss-certs-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109805" comment="mozilla-nss-devel-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109806" comment="mozilla-nss-sysinit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109807" comment="mozilla-nss-sysinit-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109808" comment="mozilla-nss-tools-3.18.1-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2710</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2710" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2710" source="CVE"/>
    <description>
    Heap-based buffer overflow in the SVGTextFrame class in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code via crafted SVG graphics data in conjunction with a crafted Cascading Style Sheets (CSS) token sequence.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109791" comment="MozillaFirefox-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109792" comment="MozillaFirefox-branding-upstream-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109793" comment="MozillaFirefox-buildsymbols-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109794" comment="MozillaFirefox-devel-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109795" comment="MozillaFirefox-translations-common-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109796" comment="MozillaFirefox-translations-other-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109786" comment="MozillaThunderbird-31.7.0-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109787" comment="MozillaThunderbird-buildsymbols-31.7.0-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109788" comment="MozillaThunderbird-devel-31.7.0-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109789" comment="MozillaThunderbird-translations-common-31.7.0-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109790" comment="MozillaThunderbird-translations-other-31.7.0-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109797" comment="libfreebl3-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109798" comment="libfreebl3-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109799" comment="libsoftokn3-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109800" comment="libsoftokn3-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109801" comment="mozilla-nss-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109802" comment="mozilla-nss-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109803" comment="mozilla-nss-certs-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109804" comment="mozilla-nss-certs-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109805" comment="mozilla-nss-devel-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109806" comment="mozilla-nss-sysinit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109807" comment="mozilla-nss-sysinit-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109808" comment="mozilla-nss-tools-3.18.1-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2711</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2711" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2711" source="CVE"/>
    <description>
    Mozilla Firefox before 38.0 does not recognize a referrer policy delivered by a referrer META element in cases of context-menu navigation and middle-click navigation, which allows remote attackers to obtain sensitive information by reading web-server Referer logs that contain private data in a URL, as demonstrated by a private path component.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109791" comment="MozillaFirefox-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109792" comment="MozillaFirefox-branding-upstream-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109793" comment="MozillaFirefox-buildsymbols-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109794" comment="MozillaFirefox-devel-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109795" comment="MozillaFirefox-translations-common-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109796" comment="MozillaFirefox-translations-other-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109797" comment="libfreebl3-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109798" comment="libfreebl3-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109799" comment="libsoftokn3-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109800" comment="libsoftokn3-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109801" comment="mozilla-nss-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109802" comment="mozilla-nss-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109803" comment="mozilla-nss-certs-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109804" comment="mozilla-nss-certs-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109805" comment="mozilla-nss-devel-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109806" comment="mozilla-nss-sysinit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109807" comment="mozilla-nss-sysinit-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109808" comment="mozilla-nss-tools-3.18.1-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2712</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2712" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2712" source="CVE"/>
    <description>
    The asm.js implementation in Mozilla Firefox before 38.0 does not properly determine heap lengths during identification of cases in which bounds checking may be safely skipped, which allows remote attackers to trigger out-of-bounds write operations and possibly execute arbitrary code, or trigger out-of-bounds read operations and possibly obtain sensitive information from process memory, via crafted JavaScript.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109791" comment="MozillaFirefox-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109792" comment="MozillaFirefox-branding-upstream-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109793" comment="MozillaFirefox-buildsymbols-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109794" comment="MozillaFirefox-devel-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109795" comment="MozillaFirefox-translations-common-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109796" comment="MozillaFirefox-translations-other-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109797" comment="libfreebl3-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109798" comment="libfreebl3-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109799" comment="libsoftokn3-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109800" comment="libsoftokn3-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109801" comment="mozilla-nss-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109802" comment="mozilla-nss-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109803" comment="mozilla-nss-certs-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109804" comment="mozilla-nss-certs-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109805" comment="mozilla-nss-devel-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109806" comment="mozilla-nss-sysinit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109807" comment="mozilla-nss-sysinit-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109808" comment="mozilla-nss-tools-3.18.1-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2713</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2713" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2713" source="CVE"/>
    <description>
    Use-after-free vulnerability in the SetBreaks function in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a document containing crafted text in conjunction with a Cascading Style Sheets (CSS) token sequence containing properties related to vertical text.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109791" comment="MozillaFirefox-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109792" comment="MozillaFirefox-branding-upstream-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109793" comment="MozillaFirefox-buildsymbols-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109794" comment="MozillaFirefox-devel-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109795" comment="MozillaFirefox-translations-common-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109796" comment="MozillaFirefox-translations-other-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109786" comment="MozillaThunderbird-31.7.0-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109787" comment="MozillaThunderbird-buildsymbols-31.7.0-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109788" comment="MozillaThunderbird-devel-31.7.0-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109789" comment="MozillaThunderbird-translations-common-31.7.0-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109790" comment="MozillaThunderbird-translations-other-31.7.0-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109797" comment="libfreebl3-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109798" comment="libfreebl3-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109799" comment="libsoftokn3-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109800" comment="libsoftokn3-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109801" comment="mozilla-nss-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109802" comment="mozilla-nss-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109803" comment="mozilla-nss-certs-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109804" comment="mozilla-nss-certs-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109805" comment="mozilla-nss-devel-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109806" comment="mozilla-nss-sysinit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109807" comment="mozilla-nss-sysinit-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109808" comment="mozilla-nss-tools-3.18.1-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2715</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2715" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2715" source="CVE"/>
    <description>
    Race condition in the nsThreadManager::RegisterCurrentThread function in Mozilla Firefox before 38.0 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and heap memory corruption) by leveraging improper Media Decoder Thread creation at the time of a shutdown.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109791" comment="MozillaFirefox-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109792" comment="MozillaFirefox-branding-upstream-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109793" comment="MozillaFirefox-buildsymbols-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109794" comment="MozillaFirefox-devel-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109795" comment="MozillaFirefox-translations-common-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109796" comment="MozillaFirefox-translations-other-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109797" comment="libfreebl3-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109798" comment="libfreebl3-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109799" comment="libsoftokn3-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109800" comment="libsoftokn3-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109801" comment="mozilla-nss-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109802" comment="mozilla-nss-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109803" comment="mozilla-nss-certs-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109804" comment="mozilla-nss-certs-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109805" comment="mozilla-nss-devel-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109806" comment="mozilla-nss-sysinit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109807" comment="mozilla-nss-sysinit-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109808" comment="mozilla-nss-tools-3.18.1-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2716</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2716" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2716" source="CVE"/>
    <description>
    Buffer overflow in the XML parser in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code by providing a large amount of compressed XML data, a related issue to CVE-2015-1283.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109791" comment="MozillaFirefox-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109792" comment="MozillaFirefox-branding-upstream-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109793" comment="MozillaFirefox-buildsymbols-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109794" comment="MozillaFirefox-devel-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109795" comment="MozillaFirefox-translations-common-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109796" comment="MozillaFirefox-translations-other-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109786" comment="MozillaThunderbird-31.7.0-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109787" comment="MozillaThunderbird-buildsymbols-31.7.0-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109788" comment="MozillaThunderbird-devel-31.7.0-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109789" comment="MozillaThunderbird-translations-common-31.7.0-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109790" comment="MozillaThunderbird-translations-other-31.7.0-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109797" comment="libfreebl3-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109798" comment="libfreebl3-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109799" comment="libsoftokn3-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109800" comment="libsoftokn3-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109801" comment="mozilla-nss-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109802" comment="mozilla-nss-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109803" comment="mozilla-nss-certs-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109804" comment="mozilla-nss-certs-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109805" comment="mozilla-nss-devel-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109806" comment="mozilla-nss-sysinit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109807" comment="mozilla-nss-sysinit-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109808" comment="mozilla-nss-tools-3.18.1-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2717</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2717" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2717" source="CVE"/>
    <description>
    Integer overflow in libstagefright in Mozilla Firefox before 38.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and out-of-bounds read) via an MP4 video file containing invalid metadata.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109791" comment="MozillaFirefox-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109792" comment="MozillaFirefox-branding-upstream-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109793" comment="MozillaFirefox-buildsymbols-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109794" comment="MozillaFirefox-devel-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109795" comment="MozillaFirefox-translations-common-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109796" comment="MozillaFirefox-translations-other-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109797" comment="libfreebl3-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109798" comment="libfreebl3-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109799" comment="libsoftokn3-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109800" comment="libsoftokn3-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109801" comment="mozilla-nss-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109802" comment="mozilla-nss-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109803" comment="mozilla-nss-certs-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109804" comment="mozilla-nss-certs-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109805" comment="mozilla-nss-devel-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109806" comment="mozilla-nss-sysinit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109807" comment="mozilla-nss-sysinit-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109808" comment="mozilla-nss-tools-3.18.1-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2718</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2718" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2718" source="CVE"/>
    <description>
    The WebChannel.jsm module in Mozilla Firefox before 38.0 allows remote attackers to bypass the Same Origin Policy and obtain sensitive webchannel-response data via a crafted web site containing an IFRAME element referencing a different web site that is intended to read this data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109791" comment="MozillaFirefox-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109792" comment="MozillaFirefox-branding-upstream-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109793" comment="MozillaFirefox-buildsymbols-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109794" comment="MozillaFirefox-devel-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109795" comment="MozillaFirefox-translations-common-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109796" comment="MozillaFirefox-translations-other-38.0.1-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109797" comment="libfreebl3-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109798" comment="libfreebl3-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109799" comment="libsoftokn3-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109800" comment="libsoftokn3-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109801" comment="mozilla-nss-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109802" comment="mozilla-nss-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109803" comment="mozilla-nss-certs-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109804" comment="mozilla-nss-certs-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109805" comment="mozilla-nss-devel-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109806" comment="mozilla-nss-sysinit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109807" comment="mozilla-nss-sysinit-32bit-3.18.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109808" comment="mozilla-nss-tools-3.18.1-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2721</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2721" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2721" source="CVE"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.19, as used in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, Thunderbird before 38.1, and other products, does not properly determine state transitions for the TLS state machine, which allows man-in-the-middle attackers to defeat cryptographic protection mechanisms by blocking messages, as demonstrated by removing a forward-secrecy property by blocking a ServerKeyExchange message, aka a "SMACK SKIP-TLS" issue.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111145" comment="MozillaFirefox-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111146" comment="MozillaFirefox-branding-upstream-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111147" comment="MozillaFirefox-buildsymbols-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111148" comment="MozillaFirefox-devel-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111149" comment="MozillaFirefox-translations-common-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111150" comment="MozillaFirefox-translations-other-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111220" comment="MozillaThunderbird-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111221" comment="MozillaThunderbird-buildsymbols-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111222" comment="MozillaThunderbird-devel-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111223" comment="MozillaThunderbird-translations-common-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111224" comment="MozillaThunderbird-translations-other-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111151" comment="libfreebl3-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111152" comment="libfreebl3-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111153" comment="libsoftokn3-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111154" comment="libsoftokn3-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111155" comment="mozilla-nss-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111156" comment="mozilla-nss-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111157" comment="mozilla-nss-certs-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111158" comment="mozilla-nss-certs-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111159" comment="mozilla-nss-devel-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111160" comment="mozilla-nss-sysinit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111161" comment="mozilla-nss-sysinit-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111162" comment="mozilla-nss-tools-3.19.2-16.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2722</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2722" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2722" source="CVE"/>
    <description>
    Use-after-free vulnerability in the CanonicalizeXPCOMParticipant function in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 allows remote attackers to execute arbitrary code via vectors involving attachment of an XMLHttpRequest object to a shared worker.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111145" comment="MozillaFirefox-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111146" comment="MozillaFirefox-branding-upstream-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111147" comment="MozillaFirefox-buildsymbols-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111148" comment="MozillaFirefox-devel-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111149" comment="MozillaFirefox-translations-common-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111150" comment="MozillaFirefox-translations-other-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111220" comment="MozillaThunderbird-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111221" comment="MozillaThunderbird-buildsymbols-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111222" comment="MozillaThunderbird-devel-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111223" comment="MozillaThunderbird-translations-common-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111224" comment="MozillaThunderbird-translations-other-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111151" comment="libfreebl3-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111152" comment="libfreebl3-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111153" comment="libsoftokn3-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111154" comment="libsoftokn3-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111155" comment="mozilla-nss-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111156" comment="mozilla-nss-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111157" comment="mozilla-nss-certs-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111158" comment="mozilla-nss-certs-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111159" comment="mozilla-nss-devel-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111160" comment="mozilla-nss-sysinit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111161" comment="mozilla-nss-sysinit-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111162" comment="mozilla-nss-tools-3.19.2-16.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2724</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2724" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2724" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111145" comment="MozillaFirefox-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111146" comment="MozillaFirefox-branding-upstream-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111147" comment="MozillaFirefox-buildsymbols-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111148" comment="MozillaFirefox-devel-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111149" comment="MozillaFirefox-translations-common-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111150" comment="MozillaFirefox-translations-other-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111220" comment="MozillaThunderbird-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111221" comment="MozillaThunderbird-buildsymbols-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111222" comment="MozillaThunderbird-devel-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111223" comment="MozillaThunderbird-translations-common-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111224" comment="MozillaThunderbird-translations-other-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111151" comment="libfreebl3-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111152" comment="libfreebl3-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111153" comment="libsoftokn3-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111154" comment="libsoftokn3-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111155" comment="mozilla-nss-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111156" comment="mozilla-nss-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111157" comment="mozilla-nss-certs-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111158" comment="mozilla-nss-certs-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111159" comment="mozilla-nss-devel-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111160" comment="mozilla-nss-sysinit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111161" comment="mozilla-nss-sysinit-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111162" comment="mozilla-nss-tools-3.19.2-16.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2725</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2725" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2725" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunderbird before 38.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111145" comment="MozillaFirefox-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111146" comment="MozillaFirefox-branding-upstream-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111147" comment="MozillaFirefox-buildsymbols-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111148" comment="MozillaFirefox-devel-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111149" comment="MozillaFirefox-translations-common-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111150" comment="MozillaFirefox-translations-other-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111220" comment="MozillaThunderbird-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111221" comment="MozillaThunderbird-buildsymbols-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111222" comment="MozillaThunderbird-devel-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111223" comment="MozillaThunderbird-translations-common-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111224" comment="MozillaThunderbird-translations-other-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111151" comment="libfreebl3-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111152" comment="libfreebl3-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111153" comment="libsoftokn3-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111154" comment="libsoftokn3-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111155" comment="mozilla-nss-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111156" comment="mozilla-nss-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111157" comment="mozilla-nss-certs-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111158" comment="mozilla-nss-certs-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111159" comment="mozilla-nss-devel-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111160" comment="mozilla-nss-sysinit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111161" comment="mozilla-nss-sysinit-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111162" comment="mozilla-nss-tools-3.19.2-16.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2726</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2726" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2726" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 39.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111145" comment="MozillaFirefox-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111146" comment="MozillaFirefox-branding-upstream-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111147" comment="MozillaFirefox-buildsymbols-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111148" comment="MozillaFirefox-devel-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111149" comment="MozillaFirefox-translations-common-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111150" comment="MozillaFirefox-translations-other-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111151" comment="libfreebl3-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111152" comment="libfreebl3-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111153" comment="libsoftokn3-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111154" comment="libsoftokn3-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111155" comment="mozilla-nss-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111156" comment="mozilla-nss-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111157" comment="mozilla-nss-certs-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111158" comment="mozilla-nss-certs-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111159" comment="mozilla-nss-devel-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111160" comment="mozilla-nss-sysinit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111161" comment="mozilla-nss-sysinit-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111162" comment="mozilla-nss-tools-3.19.2-16.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2727</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2727" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2727" source="CVE"/>
    <description>
    Mozilla Firefox 38.0 and Firefox ESR 38.0 allow user-assisted remote attackers to read arbitrary files or execute arbitrary JavaScript code with chrome privileges via a crafted web site that is accessed with unspecified mouse and keyboard actions.  NOTE: this vulnerability exists because of a CVE-2015-0821 regression.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111145" comment="MozillaFirefox-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111146" comment="MozillaFirefox-branding-upstream-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111147" comment="MozillaFirefox-buildsymbols-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111148" comment="MozillaFirefox-devel-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111149" comment="MozillaFirefox-translations-common-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111150" comment="MozillaFirefox-translations-other-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111220" comment="MozillaThunderbird-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111221" comment="MozillaThunderbird-buildsymbols-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111222" comment="MozillaThunderbird-devel-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111223" comment="MozillaThunderbird-translations-common-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111224" comment="MozillaThunderbird-translations-other-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111151" comment="libfreebl3-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111152" comment="libfreebl3-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111153" comment="libsoftokn3-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111154" comment="libsoftokn3-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111155" comment="mozilla-nss-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111156" comment="mozilla-nss-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111157" comment="mozilla-nss-certs-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111158" comment="mozilla-nss-certs-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111159" comment="mozilla-nss-devel-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111160" comment="mozilla-nss-sysinit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111161" comment="mozilla-nss-sysinit-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111162" comment="mozilla-nss-tools-3.19.2-16.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2728</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2728" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2728" source="CVE"/>
    <description>
    The IndexedDatabaseManager class in the IndexedDB implementation in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 misinterprets an unspecified IDBDatabase field as a pointer, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via unspecified vectors, related to a "type confusion" issue.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111145" comment="MozillaFirefox-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111146" comment="MozillaFirefox-branding-upstream-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111147" comment="MozillaFirefox-buildsymbols-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111148" comment="MozillaFirefox-devel-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111149" comment="MozillaFirefox-translations-common-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111150" comment="MozillaFirefox-translations-other-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111220" comment="MozillaThunderbird-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111221" comment="MozillaThunderbird-buildsymbols-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111222" comment="MozillaThunderbird-devel-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111223" comment="MozillaThunderbird-translations-common-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111224" comment="MozillaThunderbird-translations-other-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111151" comment="libfreebl3-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111152" comment="libfreebl3-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111153" comment="libsoftokn3-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111154" comment="libsoftokn3-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111155" comment="mozilla-nss-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111156" comment="mozilla-nss-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111157" comment="mozilla-nss-certs-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111158" comment="mozilla-nss-certs-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111159" comment="mozilla-nss-devel-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111160" comment="mozilla-nss-sysinit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111161" comment="mozilla-nss-sysinit-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111162" comment="mozilla-nss-tools-3.19.2-16.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2729</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2729" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2729" source="CVE"/>
    <description>
    The AudioParamTimeline::AudioNodeInputValue function in the Web Audio implementation in Mozilla Firefox before 39.0 and Firefox ESR 38.x before 38.1 does not properly calculate an oscillator rendering range, which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111145" comment="MozillaFirefox-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111146" comment="MozillaFirefox-branding-upstream-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111147" comment="MozillaFirefox-buildsymbols-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111148" comment="MozillaFirefox-devel-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111149" comment="MozillaFirefox-translations-common-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111150" comment="MozillaFirefox-translations-other-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111220" comment="MozillaThunderbird-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111221" comment="MozillaThunderbird-buildsymbols-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111222" comment="MozillaThunderbird-devel-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111223" comment="MozillaThunderbird-translations-common-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111224" comment="MozillaThunderbird-translations-other-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111151" comment="libfreebl3-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111152" comment="libfreebl3-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111153" comment="libsoftokn3-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111154" comment="libsoftokn3-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111155" comment="mozilla-nss-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111156" comment="mozilla-nss-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111157" comment="mozilla-nss-certs-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111158" comment="mozilla-nss-certs-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111159" comment="mozilla-nss-devel-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111160" comment="mozilla-nss-sysinit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111161" comment="mozilla-nss-sysinit-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111162" comment="mozilla-nss-tools-3.19.2-16.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2730</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2730" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2730" source="CVE"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.19.1, as used in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and other products, does not properly perform Elliptical Curve Cryptography (ECC) multiplications, which makes it easier for remote attackers to spoof ECDSA signatures via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111145" comment="MozillaFirefox-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111146" comment="MozillaFirefox-branding-upstream-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111147" comment="MozillaFirefox-buildsymbols-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111148" comment="MozillaFirefox-devel-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111149" comment="MozillaFirefox-translations-common-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111150" comment="MozillaFirefox-translations-other-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111220" comment="MozillaThunderbird-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111221" comment="MozillaThunderbird-buildsymbols-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111222" comment="MozillaThunderbird-devel-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111223" comment="MozillaThunderbird-translations-common-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111224" comment="MozillaThunderbird-translations-other-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111151" comment="libfreebl3-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111152" comment="libfreebl3-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111153" comment="libsoftokn3-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111154" comment="libsoftokn3-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111155" comment="mozilla-nss-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111156" comment="mozilla-nss-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111157" comment="mozilla-nss-certs-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111158" comment="mozilla-nss-certs-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111159" comment="mozilla-nss-devel-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111160" comment="mozilla-nss-sysinit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111161" comment="mozilla-nss-sysinit-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111162" comment="mozilla-nss-tools-3.19.2-16.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2731</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2731" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2731" source="CVE"/>
    <description>
    Use-after-free vulnerability in the CSPService::ShouldLoad function in the microtask implementation in Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunderbird before 38.1 allows remote attackers to execute arbitrary code by leveraging client-side JavaScript that triggers removal of a DOM object on the basis of a Content Policy.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111145" comment="MozillaFirefox-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111146" comment="MozillaFirefox-branding-upstream-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111147" comment="MozillaFirefox-buildsymbols-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111148" comment="MozillaFirefox-devel-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111149" comment="MozillaFirefox-translations-common-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111150" comment="MozillaFirefox-translations-other-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111220" comment="MozillaThunderbird-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111221" comment="MozillaThunderbird-buildsymbols-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111222" comment="MozillaThunderbird-devel-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111223" comment="MozillaThunderbird-translations-common-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111224" comment="MozillaThunderbird-translations-other-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111151" comment="libfreebl3-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111152" comment="libfreebl3-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111153" comment="libsoftokn3-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111154" comment="libsoftokn3-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111155" comment="mozilla-nss-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111156" comment="mozilla-nss-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111157" comment="mozilla-nss-certs-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111158" comment="mozilla-nss-certs-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111159" comment="mozilla-nss-devel-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111160" comment="mozilla-nss-sysinit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111161" comment="mozilla-nss-sysinit-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111162" comment="mozilla-nss-tools-3.19.2-16.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2733</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2733" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2733" source="CVE"/>
    <description>
    Use-after-free vulnerability in the CanonicalizeXPCOMParticipant function in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 allows remote attackers to execute arbitrary code via vectors involving attachment of an XMLHttpRequest object to a dedicated worker.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111145" comment="MozillaFirefox-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111146" comment="MozillaFirefox-branding-upstream-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111147" comment="MozillaFirefox-buildsymbols-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111148" comment="MozillaFirefox-devel-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111149" comment="MozillaFirefox-translations-common-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111150" comment="MozillaFirefox-translations-other-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111220" comment="MozillaThunderbird-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111221" comment="MozillaThunderbird-buildsymbols-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111222" comment="MozillaThunderbird-devel-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111223" comment="MozillaThunderbird-translations-common-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111224" comment="MozillaThunderbird-translations-other-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111151" comment="libfreebl3-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111152" comment="libfreebl3-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111153" comment="libsoftokn3-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111154" comment="libsoftokn3-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111155" comment="mozilla-nss-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111156" comment="mozilla-nss-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111157" comment="mozilla-nss-certs-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111158" comment="mozilla-nss-certs-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111159" comment="mozilla-nss-devel-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111160" comment="mozilla-nss-sysinit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111161" comment="mozilla-nss-sysinit-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111162" comment="mozilla-nss-tools-3.19.2-16.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2734</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2734" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2734" source="CVE"/>
    <description>
    The CairoTextureClientD3D9::BorrowDrawTarget function in the Direct3D 9 implementation in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 reads data from uninitialized memory locations, which has unspecified impact and attack vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111145" comment="MozillaFirefox-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111146" comment="MozillaFirefox-branding-upstream-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111147" comment="MozillaFirefox-buildsymbols-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111148" comment="MozillaFirefox-devel-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111149" comment="MozillaFirefox-translations-common-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111150" comment="MozillaFirefox-translations-other-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111220" comment="MozillaThunderbird-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111221" comment="MozillaThunderbird-buildsymbols-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111222" comment="MozillaThunderbird-devel-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111223" comment="MozillaThunderbird-translations-common-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111224" comment="MozillaThunderbird-translations-other-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111151" comment="libfreebl3-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111152" comment="libfreebl3-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111153" comment="libsoftokn3-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111154" comment="libsoftokn3-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111155" comment="mozilla-nss-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111156" comment="mozilla-nss-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111157" comment="mozilla-nss-certs-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111158" comment="mozilla-nss-certs-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111159" comment="mozilla-nss-devel-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111160" comment="mozilla-nss-sysinit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111161" comment="mozilla-nss-sysinit-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111162" comment="mozilla-nss-tools-3.19.2-16.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2735</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2735" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2735" source="CVE"/>
    <description>
    nsZipArchive.cpp in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 accesses unintended memory locations, which allows remote attackers to have an unspecified impact via a crafted ZIP archive.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111145" comment="MozillaFirefox-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111146" comment="MozillaFirefox-branding-upstream-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111147" comment="MozillaFirefox-buildsymbols-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111148" comment="MozillaFirefox-devel-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111149" comment="MozillaFirefox-translations-common-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111150" comment="MozillaFirefox-translations-other-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111220" comment="MozillaThunderbird-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111221" comment="MozillaThunderbird-buildsymbols-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111222" comment="MozillaThunderbird-devel-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111223" comment="MozillaThunderbird-translations-common-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111224" comment="MozillaThunderbird-translations-other-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111151" comment="libfreebl3-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111152" comment="libfreebl3-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111153" comment="libsoftokn3-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111154" comment="libsoftokn3-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111155" comment="mozilla-nss-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111156" comment="mozilla-nss-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111157" comment="mozilla-nss-certs-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111158" comment="mozilla-nss-certs-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111159" comment="mozilla-nss-devel-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111160" comment="mozilla-nss-sysinit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111161" comment="mozilla-nss-sysinit-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111162" comment="mozilla-nss-tools-3.19.2-16.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2736</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2736" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2736" source="CVE"/>
    <description>
    The nsZipArchive::BuildFileList function in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 accesses unintended memory locations, which allows remote attackers to have an unspecified impact via a crafted ZIP archive.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111145" comment="MozillaFirefox-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111146" comment="MozillaFirefox-branding-upstream-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111147" comment="MozillaFirefox-buildsymbols-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111148" comment="MozillaFirefox-devel-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111149" comment="MozillaFirefox-translations-common-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111150" comment="MozillaFirefox-translations-other-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111220" comment="MozillaThunderbird-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111221" comment="MozillaThunderbird-buildsymbols-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111222" comment="MozillaThunderbird-devel-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111223" comment="MozillaThunderbird-translations-common-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111224" comment="MozillaThunderbird-translations-other-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111151" comment="libfreebl3-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111152" comment="libfreebl3-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111153" comment="libsoftokn3-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111154" comment="libsoftokn3-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111155" comment="mozilla-nss-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111156" comment="mozilla-nss-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111157" comment="mozilla-nss-certs-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111158" comment="mozilla-nss-certs-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111159" comment="mozilla-nss-devel-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111160" comment="mozilla-nss-sysinit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111161" comment="mozilla-nss-sysinit-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111162" comment="mozilla-nss-tools-3.19.2-16.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2737</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2737" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2737" source="CVE"/>
    <description>
    The rx::d3d11::SetBufferData function in the Direct3D 11 implementation in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 reads data from uninitialized memory locations, which has unspecified impact and attack vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111145" comment="MozillaFirefox-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111146" comment="MozillaFirefox-branding-upstream-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111147" comment="MozillaFirefox-buildsymbols-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111148" comment="MozillaFirefox-devel-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111149" comment="MozillaFirefox-translations-common-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111150" comment="MozillaFirefox-translations-other-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111220" comment="MozillaThunderbird-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111221" comment="MozillaThunderbird-buildsymbols-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111222" comment="MozillaThunderbird-devel-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111223" comment="MozillaThunderbird-translations-common-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111224" comment="MozillaThunderbird-translations-other-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111151" comment="libfreebl3-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111152" comment="libfreebl3-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111153" comment="libsoftokn3-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111154" comment="libsoftokn3-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111155" comment="mozilla-nss-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111156" comment="mozilla-nss-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111157" comment="mozilla-nss-certs-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111158" comment="mozilla-nss-certs-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111159" comment="mozilla-nss-devel-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111160" comment="mozilla-nss-sysinit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111161" comment="mozilla-nss-sysinit-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111162" comment="mozilla-nss-tools-3.19.2-16.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2738</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2738" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2738" source="CVE"/>
    <description>
    The YCbCrImageDataDeserializer::ToDataSourceSurface function in the YCbCr implementation in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 reads data from uninitialized memory locations, which has unspecified impact and attack vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111145" comment="MozillaFirefox-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111146" comment="MozillaFirefox-branding-upstream-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111147" comment="MozillaFirefox-buildsymbols-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111148" comment="MozillaFirefox-devel-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111149" comment="MozillaFirefox-translations-common-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111150" comment="MozillaFirefox-translations-other-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111220" comment="MozillaThunderbird-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111221" comment="MozillaThunderbird-buildsymbols-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111222" comment="MozillaThunderbird-devel-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111223" comment="MozillaThunderbird-translations-common-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111224" comment="MozillaThunderbird-translations-other-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111151" comment="libfreebl3-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111152" comment="libfreebl3-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111153" comment="libsoftokn3-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111154" comment="libsoftokn3-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111155" comment="mozilla-nss-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111156" comment="mozilla-nss-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111157" comment="mozilla-nss-certs-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111158" comment="mozilla-nss-certs-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111159" comment="mozilla-nss-devel-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111160" comment="mozilla-nss-sysinit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111161" comment="mozilla-nss-sysinit-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111162" comment="mozilla-nss-tools-3.19.2-16.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2739</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2739" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2739" source="CVE"/>
    <description>
    The ArrayBufferBuilder::append function in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 accesses unintended memory locations, which has unspecified impact and attack vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111145" comment="MozillaFirefox-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111146" comment="MozillaFirefox-branding-upstream-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111147" comment="MozillaFirefox-buildsymbols-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111148" comment="MozillaFirefox-devel-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111149" comment="MozillaFirefox-translations-common-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111150" comment="MozillaFirefox-translations-other-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111220" comment="MozillaThunderbird-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111221" comment="MozillaThunderbird-buildsymbols-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111222" comment="MozillaThunderbird-devel-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111223" comment="MozillaThunderbird-translations-common-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111224" comment="MozillaThunderbird-translations-other-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111151" comment="libfreebl3-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111152" comment="libfreebl3-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111153" comment="libsoftokn3-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111154" comment="libsoftokn3-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111155" comment="mozilla-nss-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111156" comment="mozilla-nss-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111157" comment="mozilla-nss-certs-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111158" comment="mozilla-nss-certs-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111159" comment="mozilla-nss-devel-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111160" comment="mozilla-nss-sysinit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111161" comment="mozilla-nss-sysinit-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111162" comment="mozilla-nss-tools-3.19.2-16.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2740</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2740" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2740" source="CVE"/>
    <description>
    Buffer overflow in the nsXMLHttpRequest::AppendToResponseText function in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 might allow remote attackers to cause a denial of service or have unspecified other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111145" comment="MozillaFirefox-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111146" comment="MozillaFirefox-branding-upstream-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111147" comment="MozillaFirefox-buildsymbols-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111148" comment="MozillaFirefox-devel-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111149" comment="MozillaFirefox-translations-common-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111150" comment="MozillaFirefox-translations-other-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111220" comment="MozillaThunderbird-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111221" comment="MozillaThunderbird-buildsymbols-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111222" comment="MozillaThunderbird-devel-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111223" comment="MozillaThunderbird-translations-common-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111224" comment="MozillaThunderbird-translations-other-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111151" comment="libfreebl3-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111152" comment="libfreebl3-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111153" comment="libsoftokn3-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111154" comment="libsoftokn3-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111155" comment="mozilla-nss-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111156" comment="mozilla-nss-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111157" comment="mozilla-nss-certs-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111158" comment="mozilla-nss-certs-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111159" comment="mozilla-nss-devel-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111160" comment="mozilla-nss-sysinit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111161" comment="mozilla-nss-sysinit-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111162" comment="mozilla-nss-tools-3.19.2-16.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2741</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2741" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2741" source="CVE"/>
    <description>
    Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunderbird before 38.1 do not enforce key pinning upon encountering an X.509 certificate problem that generates a user dialog, which allows user-assisted man-in-the-middle attackers to bypass intended access restrictions by triggering a (1) expired certificate or (2) mismatched hostname for a domain with pinning enabled.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111145" comment="MozillaFirefox-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111146" comment="MozillaFirefox-branding-upstream-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111147" comment="MozillaFirefox-buildsymbols-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111148" comment="MozillaFirefox-devel-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111149" comment="MozillaFirefox-translations-common-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111150" comment="MozillaFirefox-translations-other-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111220" comment="MozillaThunderbird-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111221" comment="MozillaThunderbird-buildsymbols-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111222" comment="MozillaThunderbird-devel-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111223" comment="MozillaThunderbird-translations-common-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111224" comment="MozillaThunderbird-translations-other-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111151" comment="libfreebl3-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111152" comment="libfreebl3-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111153" comment="libsoftokn3-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111154" comment="libsoftokn3-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111155" comment="mozilla-nss-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111156" comment="mozilla-nss-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111157" comment="mozilla-nss-certs-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111158" comment="mozilla-nss-certs-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111159" comment="mozilla-nss-devel-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111160" comment="mozilla-nss-sysinit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111161" comment="mozilla-nss-sysinit-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111162" comment="mozilla-nss-tools-3.19.2-16.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2743</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2743" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2743" source="CVE"/>
    <description>
    PDF.js in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 enables excessive privileges for internal Workers, which might allow remote attackers to execute arbitrary code by leveraging a Same Origin Policy bypass.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111145" comment="MozillaFirefox-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111146" comment="MozillaFirefox-branding-upstream-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111147" comment="MozillaFirefox-buildsymbols-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111148" comment="MozillaFirefox-devel-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111149" comment="MozillaFirefox-translations-common-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111150" comment="MozillaFirefox-translations-other-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111220" comment="MozillaThunderbird-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111221" comment="MozillaThunderbird-buildsymbols-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111222" comment="MozillaThunderbird-devel-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111223" comment="MozillaThunderbird-translations-common-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111224" comment="MozillaThunderbird-translations-other-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111151" comment="libfreebl3-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111152" comment="libfreebl3-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111153" comment="libsoftokn3-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111154" comment="libsoftokn3-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111155" comment="mozilla-nss-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111156" comment="mozilla-nss-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111157" comment="mozilla-nss-certs-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111158" comment="mozilla-nss-certs-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111159" comment="mozilla-nss-devel-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111160" comment="mozilla-nss-sysinit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111161" comment="mozilla-nss-sysinit-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111162" comment="mozilla-nss-tools-3.19.2-16.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2751</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2751" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2751" source="CVE"/>
    <description>
    Xen 4.3.x, 4.4.x, and 4.5.x, when using toolstack disaggregation, allows remote domains with partial management control to cause a denial of service (host lock) via unspecified domctl operations.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110614" comment="xen-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110615" comment="xen-devel-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110619" comment="xen-doc-html-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110620" comment="xen-kmp-default-4.4.2_06_k3.16.7_21-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110621" comment="xen-kmp-desktop-4.4.2_06_k3.16.7_21-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110617" comment="xen-libs-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110616" comment="xen-libs-32bit-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110622" comment="xen-tools-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110618" comment="xen-tools-domU-4.4.2_06-23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2752</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2752" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2752" source="CVE"/>
    <description>
    The XEN_DOMCTL_memory_mapping hypercall in Xen 3.2.x through 4.5.x, when using a PCI passthrough device, is not preemptible, which allows local x86 HVM domain users to cause a denial of service (host CPU consumption) via a crafted request to the device model (qemu-dm).
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110614" comment="xen-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110615" comment="xen-devel-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110619" comment="xen-doc-html-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110620" comment="xen-kmp-default-4.4.2_06_k3.16.7_21-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110621" comment="xen-kmp-desktop-4.4.2_06_k3.16.7_21-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110617" comment="xen-libs-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110616" comment="xen-libs-32bit-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110622" comment="xen-tools-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110618" comment="xen-tools-domU-4.4.2_06-23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2756</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2756" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2756" source="CVE"/>
    <description>
    QEMU, as used in Xen 3.3.x through 4.5.x, does not properly restrict access to PCI command registers, which might allow local HVM guest users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110614" comment="xen-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110615" comment="xen-devel-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110619" comment="xen-doc-html-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110620" comment="xen-kmp-default-4.4.2_06_k3.16.7_21-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110621" comment="xen-kmp-desktop-4.4.2_06_k3.16.7_21-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110617" comment="xen-libs-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110616" comment="xen-libs-32bit-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110622" comment="xen-tools-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110618" comment="xen-tools-domU-4.4.2_06-23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2774</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2774" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2774" source="CVE"/>
    <description>
    Erlang/OTP before 18.0-rc1 does not properly check CBC padding bytes when terminating connections, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, a variant of CVE-2014-3566 (aka POODLE).
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123496" comment="erlang-17.1-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123497" comment="erlang-debugger-17.1-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123498" comment="erlang-debugger-src-17.1-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123499" comment="erlang-dialyzer-17.1-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123500" comment="erlang-dialyzer-src-17.1-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123501" comment="erlang-doc-17.1-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123502" comment="erlang-epmd-17.1-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123503" comment="erlang-et-17.1-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123504" comment="erlang-et-src-17.1-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123505" comment="erlang-gs-17.1-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123506" comment="erlang-gs-src-17.1-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123507" comment="erlang-jinterface-17.1-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123508" comment="erlang-jinterface-src-17.1-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123509" comment="erlang-observer-17.1-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123510" comment="erlang-observer-src-17.1-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123511" comment="erlang-reltool-17.1-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123512" comment="erlang-reltool-src-17.1-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123513" comment="erlang-src-17.1-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123514" comment="erlang-wx-17.1-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123515" comment="erlang-wx-src-17.1-3.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2778</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2778" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2778" source="CVE"/>
    <description>
    Quassel before 0.12-rc1 uses an incorrect data-type size when splitting a message, which allows remote attackers to cause a denial of service (crash) via a long CTCP query containing only multibyte characters.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108605" comment="quassel-0.10.0-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108606" comment="quassel-base-0.10.0-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108607" comment="quassel-client-0.10.0-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108608" comment="quassel-core-0.10.0-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108609" comment="quassel-mono-0.10.0-3.7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2779</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2779" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2779" source="CVE"/>
    <description>
    Stack consumption vulnerability in the message splitting functionality in Quassel before 0.12-rc1 allows remote attackers to cause a denial of service (uncontrolled recursion) via a crafted massage.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108605" comment="quassel-0.10.0-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108606" comment="quassel-base-0.10.0-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108607" comment="quassel-client-0.10.0-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108608" comment="quassel-core-0.10.0-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108609" comment="quassel-mono-0.10.0-3.7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2783</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2783" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2783" source="CVE"/>
    <description>
    ext/phar/phar.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (buffer over-read and application crash) via a crafted length value in conjunction with crafted serialized data in a phar archive, related to the phar_parse_metadata and phar_parse_pharfile functions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109363" comment="apache2-mod_php5-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109364" comment="php5-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109365" comment="php5-bcmath-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109366" comment="php5-bz2-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109367" comment="php5-calendar-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109368" comment="php5-ctype-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109369" comment="php5-curl-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109370" comment="php5-dba-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109371" comment="php5-devel-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109372" comment="php5-dom-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109373" comment="php5-enchant-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109374" comment="php5-exif-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109375" comment="php5-fastcgi-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109376" comment="php5-fileinfo-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109377" comment="php5-firebird-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109378" comment="php5-fpm-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109379" comment="php5-ftp-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109380" comment="php5-gd-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109381" comment="php5-gettext-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109382" comment="php5-gmp-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109383" comment="php5-iconv-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109384" comment="php5-imap-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109385" comment="php5-intl-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109386" comment="php5-json-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109387" comment="php5-ldap-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109388" comment="php5-mbstring-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109389" comment="php5-mcrypt-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109390" comment="php5-mssql-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109391" comment="php5-mysql-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109392" comment="php5-odbc-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109393" comment="php5-opcache-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109394" comment="php5-openssl-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109395" comment="php5-pcntl-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109396" comment="php5-pdo-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109397" comment="php5-pear-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109398" comment="php5-pgsql-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109399" comment="php5-phar-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109400" comment="php5-posix-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109401" comment="php5-pspell-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109402" comment="php5-readline-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109403" comment="php5-shmop-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109404" comment="php5-snmp-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109405" comment="php5-soap-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109406" comment="php5-sockets-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109407" comment="php5-sqlite-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109408" comment="php5-suhosin-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109409" comment="php5-sysvmsg-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109410" comment="php5-sysvsem-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109411" comment="php5-sysvshm-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109412" comment="php5-tidy-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109413" comment="php5-tokenizer-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109414" comment="php5-wddx-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109415" comment="php5-xmlreader-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109416" comment="php5-xmlrpc-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109417" comment="php5-xmlwriter-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109418" comment="php5-xsl-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109419" comment="php5-zip-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109420" comment="php5-zlib-5.6.1-21.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2787</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2787" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2787" source="CVE"/>
    <description>
    Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages use of the unset function within an __wakeup function, a related issue to CVE-2015-0231.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108547" comment="apache2-mod_php5-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108548" comment="php5-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108549" comment="php5-bcmath-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108550" comment="php5-bz2-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108551" comment="php5-calendar-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108552" comment="php5-ctype-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108553" comment="php5-curl-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108554" comment="php5-dba-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108555" comment="php5-devel-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108556" comment="php5-dom-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108557" comment="php5-enchant-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108558" comment="php5-exif-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108559" comment="php5-fastcgi-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108560" comment="php5-fileinfo-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108561" comment="php5-firebird-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108562" comment="php5-fpm-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108563" comment="php5-ftp-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108564" comment="php5-gd-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108565" comment="php5-gettext-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108566" comment="php5-gmp-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108567" comment="php5-iconv-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108568" comment="php5-imap-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108569" comment="php5-intl-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108570" comment="php5-json-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108571" comment="php5-ldap-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108572" comment="php5-mbstring-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108573" comment="php5-mcrypt-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108574" comment="php5-mssql-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108575" comment="php5-mysql-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108576" comment="php5-odbc-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108577" comment="php5-opcache-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108578" comment="php5-openssl-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108579" comment="php5-pcntl-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108580" comment="php5-pdo-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108581" comment="php5-pear-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108582" comment="php5-pgsql-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108583" comment="php5-phar-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108584" comment="php5-posix-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108585" comment="php5-pspell-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108586" comment="php5-readline-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108587" comment="php5-shmop-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108588" comment="php5-snmp-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108589" comment="php5-soap-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108590" comment="php5-sockets-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108591" comment="php5-sqlite-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108592" comment="php5-suhosin-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108593" comment="php5-sysvmsg-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108594" comment="php5-sysvsem-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108595" comment="php5-sysvshm-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108596" comment="php5-tidy-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108597" comment="php5-tokenizer-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108598" comment="php5-wddx-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108599" comment="php5-xmlreader-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108600" comment="php5-xmlrpc-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108601" comment="php5-xmlwriter-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108602" comment="php5-xsl-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108603" comment="php5-zip-5.6.1-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108604" comment="php5-zlib-5.6.1-18.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2806</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2806" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2806" source="CVE"/>
    <description>
    Stack-based buffer overflow in asn1_der_decoding in libtasn1 before 4.4 allows remote attackers to have unspecified impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109356" comment="libtasn1-3.7-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109357" comment="libtasn1-6-3.7-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109358" comment="libtasn1-6-32bit-3.7-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109359" comment="libtasn1-devel-3.7-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109360" comment="libtasn1-devel-32bit-3.7-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2808</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2808" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808" source="CVE"/>
    <description>
    The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111326" comment="java-1_7_0-openjdk-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111327" comment="java-1_7_0-openjdk-accessibility-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111323" comment="java-1_7_0-openjdk-bootstrap-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111324" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111325" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111328" comment="java-1_7_0-openjdk-demo-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111329" comment="java-1_7_0-openjdk-devel-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111330" comment="java-1_7_0-openjdk-headless-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111331" comment="java-1_7_0-openjdk-javadoc-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111332" comment="java-1_7_0-openjdk-src-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111333" comment="java-1_8_0-openjdk-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111334" comment="java-1_8_0-openjdk-accessibility-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111335" comment="java-1_8_0-openjdk-demo-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111336" comment="java-1_8_0-openjdk-devel-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111337" comment="java-1_8_0-openjdk-headless-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111338" comment="java-1_8_0-openjdk-javadoc-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111339" comment="java-1_8_0-openjdk-src-1.8.0.51-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2830</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2830" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2830" source="CVE"/>
    <description>
    arch/x86/kernel/entry_64.S in the Linux kernel before 3.19.2 does not prevent the TS_COMPAT flag from reaching a user-mode task, which might allow local users to bypass the seccomp or audit protection mechanism via a crafted application that uses the (1) fork or (2) close system call, as demonstrated by an attack against seccomp before 3.16.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108989" comment="bbswitch-0.8-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108990" comment="bbswitch-kmp-default-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108991" comment="bbswitch-kmp-desktop-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108992" comment="bbswitch-kmp-pae-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108993" comment="bbswitch-kmp-xen-0.8_k3.16.7_21-3.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108994" comment="cloop-2.639-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108995" comment="cloop-kmp-default-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108996" comment="cloop-kmp-desktop-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108997" comment="cloop-kmp-pae-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108998" comment="cloop-kmp-xen-2.639_k3.16.7_21-14.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108999" comment="crash-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109000" comment="crash-devel-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109001" comment="crash-doc-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109002" comment="crash-eppic-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109003" comment="crash-gcore-7.0.8-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109004" comment="crash-kmp-default-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109005" comment="crash-kmp-desktop-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109006" comment="crash-kmp-pae-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109007" comment="crash-kmp-xen-7.0.8_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109008" comment="hdjmod-1.28-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109009" comment="hdjmod-kmp-default-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109010" comment="hdjmod-kmp-desktop-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109011" comment="hdjmod-kmp-pae-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109012" comment="hdjmod-kmp-xen-1.28_k3.16.7_21-18.10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109013" comment="ipset-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109014" comment="ipset-devel-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109015" comment="ipset-kmp-default-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109016" comment="ipset-kmp-desktop-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109017" comment="ipset-kmp-pae-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109018" comment="ipset-kmp-xen-6.23_k3.16.7_21-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109020" comment="kernel-debug-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109021" comment="kernel-debug-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109022" comment="kernel-debug-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109023" comment="kernel-default-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109024" comment="kernel-default-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109025" comment="kernel-default-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109026" comment="kernel-desktop-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109027" comment="kernel-desktop-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109028" comment="kernel-desktop-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109039" comment="kernel-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109029" comment="kernel-docs-3.16.7-21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109030" comment="kernel-ec2-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109031" comment="kernel-ec2-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109032" comment="kernel-ec2-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109040" comment="kernel-macros-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109033" comment="kernel-obs-build-3.16.7-21.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109035" comment="kernel-obs-qa-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109034" comment="kernel-obs-qa-xen-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109036" comment="kernel-pae-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109037" comment="kernel-pae-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109038" comment="kernel-pae-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109041" comment="kernel-source-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109042" comment="kernel-source-vanilla-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109043" comment="kernel-syms-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109044" comment="kernel-vanilla-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109045" comment="kernel-vanilla-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109046" comment="kernel-xen-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109047" comment="kernel-xen-base-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109048" comment="kernel-xen-devel-3.16.7-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109019" comment="libipset3-6.23-9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109049" comment="pcfclock-0.44-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109050" comment="pcfclock-kmp-default-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109051" comment="pcfclock-kmp-desktop-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109052" comment="pcfclock-kmp-pae-0.44_k3.16.7_21-260.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109058" comment="python-virtualbox-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109053" comment="vhba-kmp-20140629-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109054" comment="vhba-kmp-default-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109055" comment="vhba-kmp-desktop-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109056" comment="vhba-kmp-pae-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109057" comment="vhba-kmp-xen-20140629_k3.16.7_21-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109059" comment="virtualbox-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109060" comment="virtualbox-devel-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109061" comment="virtualbox-guest-desktop-icons-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109062" comment="virtualbox-guest-kmp-default-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109063" comment="virtualbox-guest-kmp-desktop-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109064" comment="virtualbox-guest-kmp-pae-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109065" comment="virtualbox-guest-tools-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109066" comment="virtualbox-guest-x11-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109067" comment="virtualbox-host-kmp-default-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109068" comment="virtualbox-host-kmp-desktop-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109069" comment="virtualbox-host-kmp-pae-4.3.20_k3.16.7_21-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109070" comment="virtualbox-qt-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109071" comment="virtualbox-websrv-4.3.20-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109072" comment="xen-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109073" comment="xen-devel-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109082" comment="xen-doc-html-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109083" comment="xen-kmp-default-4.4.1_08_k3.16.7_21-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109084" comment="xen-kmp-desktop-4.4.1_08_k3.16.7_21-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109075" comment="xen-libs-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109074" comment="xen-libs-32bit-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109085" comment="xen-tools-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109076" comment="xen-tools-domU-4.4.1_08-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109077" comment="xtables-addons-2.6-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109078" comment="xtables-addons-kmp-default-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109079" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109080" comment="xtables-addons-kmp-pae-2.6_k3.16.7_21-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109081" comment="xtables-addons-kmp-xen-2.6_k3.16.7_21-9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2922</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2922" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2922" source="CVE"/>
    <description>
    The ndisc_router_discovery function in net/ipv6/ndisc.c in the Neighbor Discovery (ND) protocol implementation in the IPv6 stack in the Linux kernel before 3.19.6 allows remote attackers to reconfigure a hop-limit setting via a small hop_limit value in a Router Advertisement (RA) message.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113567" comment="bbswitch-0.8-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113568" comment="bbswitch-kmp-default-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113569" comment="bbswitch-kmp-desktop-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113570" comment="bbswitch-kmp-pae-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113571" comment="bbswitch-kmp-xen-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113572" comment="cloop-2.639-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113573" comment="cloop-kmp-default-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113574" comment="cloop-kmp-desktop-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113575" comment="cloop-kmp-pae-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113576" comment="cloop-kmp-xen-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113577" comment="crash-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113578" comment="crash-devel-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113579" comment="crash-doc-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113580" comment="crash-eppic-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113581" comment="crash-gcore-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113582" comment="crash-kmp-default-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113583" comment="crash-kmp-desktop-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113584" comment="crash-kmp-pae-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113585" comment="crash-kmp-xen-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113586" comment="hdjmod-1.28-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113587" comment="hdjmod-kmp-default-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113588" comment="hdjmod-kmp-desktop-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113589" comment="hdjmod-kmp-pae-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113590" comment="hdjmod-kmp-xen-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113591" comment="ipset-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113592" comment="ipset-devel-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113593" comment="ipset-kmp-default-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113594" comment="ipset-kmp-desktop-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113595" comment="ipset-kmp-pae-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113596" comment="ipset-kmp-xen-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113598" comment="kernel-debug-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113599" comment="kernel-debug-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113600" comment="kernel-debug-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113601" comment="kernel-default-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113602" comment="kernel-default-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113603" comment="kernel-default-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113604" comment="kernel-desktop-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113605" comment="kernel-desktop-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113606" comment="kernel-desktop-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113617" comment="kernel-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113607" comment="kernel-docs-3.16.7-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113608" comment="kernel-ec2-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113609" comment="kernel-ec2-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113610" comment="kernel-ec2-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113618" comment="kernel-macros-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113611" comment="kernel-obs-build-3.16.7-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113613" comment="kernel-obs-qa-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113612" comment="kernel-obs-qa-xen-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113614" comment="kernel-pae-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113615" comment="kernel-pae-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113616" comment="kernel-pae-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113619" comment="kernel-source-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113620" comment="kernel-source-vanilla-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113621" comment="kernel-syms-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113622" comment="kernel-vanilla-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113623" comment="kernel-vanilla-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113624" comment="kernel-xen-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113625" comment="kernel-xen-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113626" comment="kernel-xen-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113597" comment="libipset3-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113627" comment="pcfclock-0.44-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113628" comment="pcfclock-kmp-default-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113629" comment="pcfclock-kmp-desktop-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113630" comment="pcfclock-kmp-pae-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113631" comment="vhba-kmp-20140629-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113632" comment="vhba-kmp-default-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113633" comment="vhba-kmp-desktop-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113634" comment="vhba-kmp-pae-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113635" comment="vhba-kmp-xen-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113636" comment="xen-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113637" comment="xen-devel-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113646" comment="xen-doc-html-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113647" comment="xen-kmp-default-4.4.2_06_k3.16.7_24-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113648" comment="xen-kmp-desktop-4.4.2_06_k3.16.7_24-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113639" comment="xen-libs-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113638" comment="xen-libs-32bit-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113649" comment="xen-tools-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113640" comment="xen-tools-domU-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113641" comment="xtables-addons-2.6-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113642" comment="xtables-addons-kmp-default-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113643" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113644" comment="xtables-addons-kmp-pae-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113645" comment="xtables-addons-kmp-xen-2.6_k3.16.7_24-11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2925</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2925" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2925" source="CVE"/>
    <description>
    The prepend_path function in fs/dcache.c in the Linux kernel before 4.2.4 does not properly handle rename actions inside a bind mount, which allows local users to bypass an intended container protection mechanism by renaming a directory, related to a "double-chroot attack."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115288" comment="bbswitch-0.8-3.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115289" comment="bbswitch-kmp-default-0.8_k3.16.7_29-3.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115290" comment="bbswitch-kmp-desktop-0.8_k3.16.7_29-3.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115291" comment="bbswitch-kmp-pae-0.8_k3.16.7_29-3.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115292" comment="bbswitch-kmp-xen-0.8_k3.16.7_29-3.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115293" comment="cloop-2.639-14.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115294" comment="cloop-kmp-default-2.639_k3.16.7_29-14.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115295" comment="cloop-kmp-desktop-2.639_k3.16.7_29-14.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115296" comment="cloop-kmp-pae-2.639_k3.16.7_29-14.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115297" comment="cloop-kmp-xen-2.639_k3.16.7_29-14.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115298" comment="crash-7.0.8-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115299" comment="crash-devel-7.0.8-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115300" comment="crash-doc-7.0.8-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115301" comment="crash-eppic-7.0.8-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115302" comment="crash-gcore-7.0.8-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115303" comment="crash-kmp-default-7.0.8_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115304" comment="crash-kmp-desktop-7.0.8_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115305" comment="crash-kmp-pae-7.0.8_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115306" comment="crash-kmp-xen-7.0.8_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115307" comment="hdjmod-1.28-18.14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115308" comment="hdjmod-kmp-default-1.28_k3.16.7_29-18.14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115309" comment="hdjmod-kmp-desktop-1.28_k3.16.7_29-18.14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115310" comment="hdjmod-kmp-pae-1.28_k3.16.7_29-18.14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115311" comment="hdjmod-kmp-xen-1.28_k3.16.7_29-18.14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115312" comment="ipset-6.23-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115313" comment="ipset-devel-6.23-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115314" comment="ipset-kmp-default-6.23_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115315" comment="ipset-kmp-desktop-6.23_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115316" comment="ipset-kmp-pae-6.23_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115317" comment="ipset-kmp-xen-6.23_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115319" comment="kernel-debug-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115320" comment="kernel-debug-base-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115321" comment="kernel-debug-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115322" comment="kernel-default-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115323" comment="kernel-default-base-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115324" comment="kernel-default-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115325" comment="kernel-desktop-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115326" comment="kernel-desktop-base-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115327" comment="kernel-desktop-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115338" comment="kernel-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115328" comment="kernel-docs-3.16.7-29.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115329" comment="kernel-ec2-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115330" comment="kernel-ec2-base-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115331" comment="kernel-ec2-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115339" comment="kernel-macros-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115332" comment="kernel-obs-build-3.16.7-29.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115334" comment="kernel-obs-qa-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115333" comment="kernel-obs-qa-xen-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115335" comment="kernel-pae-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115336" comment="kernel-pae-base-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115337" comment="kernel-pae-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115340" comment="kernel-source-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115341" comment="kernel-source-vanilla-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115342" comment="kernel-syms-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115343" comment="kernel-vanilla-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115344" comment="kernel-vanilla-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115345" comment="kernel-xen-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115346" comment="kernel-xen-base-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115347" comment="kernel-xen-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115318" comment="libipset3-6.23-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115348" comment="pcfclock-0.44-260.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115349" comment="pcfclock-kmp-default-0.44_k3.16.7_29-260.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115350" comment="pcfclock-kmp-desktop-0.44_k3.16.7_29-260.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115351" comment="pcfclock-kmp-pae-0.44_k3.16.7_29-260.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115352" comment="vhba-kmp-20140629-2.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115353" comment="vhba-kmp-default-20140629_k3.16.7_29-2.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115354" comment="vhba-kmp-desktop-20140629_k3.16.7_29-2.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115355" comment="vhba-kmp-pae-20140629_k3.16.7_29-2.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115356" comment="vhba-kmp-xen-20140629_k3.16.7_29-2.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115357" comment="xen-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115358" comment="xen-devel-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115367" comment="xen-doc-html-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115368" comment="xen-kmp-default-4.4.2_06_k3.16.7_29-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115369" comment="xen-kmp-desktop-4.4.2_06_k3.16.7_29-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115360" comment="xen-libs-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115359" comment="xen-libs-32bit-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115370" comment="xen-tools-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115361" comment="xen-tools-domU-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115362" comment="xtables-addons-2.6-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115363" comment="xtables-addons-kmp-default-2.6_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115364" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115365" comment="xtables-addons-kmp-pae-2.6_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115366" comment="xtables-addons-kmp-xen-2.6_k3.16.7_29-13.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2928</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2928" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2928" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108876" comment="tor-0.2.4.27-13.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2929</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-2929" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2929" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108876" comment="tor-0.2.4.27-13.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3026</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3026" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3026" source="CVE"/>
    <description>
    Icecast before 2.4.2, when a stream_auth handler is defined for URL authentication, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a request without login credentials, as demonstrated by a request to "admin/killsource?mount=/test.ogg."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009108893" comment="icecast-2.4.0-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009108894" comment="icecast-doc-2.4.0-2.11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3038</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-3038" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3038" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3041, CVE-2015-3042, and CVE-2015-3043.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117577" comment="flash-player-11.2.202.457-2.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117578" comment="flash-player-gnome-11.2.202.457-2.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117579" comment="flash-player-kde4-11.2.202.457-2.48.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3039</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-3039" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3039" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0349, CVE-2015-0351, and CVE-2015-0358.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117577" comment="flash-player-11.2.202.457-2.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117578" comment="flash-player-gnome-11.2.202.457-2.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117579" comment="flash-player-kde4-11.2.202.457-2.48.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3040</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-3040" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3040" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux does not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism via unspecified vectors, a different vulnerability than CVE-2015-0357.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117577" comment="flash-player-11.2.202.457-2.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117578" comment="flash-player-gnome-11.2.202.457-2.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117579" comment="flash-player-kde4-11.2.202.457-2.48.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3041</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-3041" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3041" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3042, and CVE-2015-3043.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117577" comment="flash-player-11.2.202.457-2.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117578" comment="flash-player-gnome-11.2.202.457-2.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117579" comment="flash-player-kde4-11.2.202.457-2.48.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3042</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-3042" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3042" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, and CVE-2015-3043.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117577" comment="flash-player-11.2.202.457-2.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117578" comment="flash-player-gnome-11.2.202.457-2.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117579" comment="flash-player-kde4-11.2.202.457-2.48.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3043</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-3043" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3043" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, as exploited in the wild in April 2015, a different vulnerability than CVE-2015-0347, CVE-2015-0350, CVE-2015-0352, CVE-2015-0353, CVE-2015-0354, CVE-2015-0355, CVE-2015-0360, CVE-2015-3038, CVE-2015-3041, and CVE-2015-3042.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117577" comment="flash-player-11.2.202.457-2.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117578" comment="flash-player-gnome-11.2.202.457-2.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117579" comment="flash-player-kde4-11.2.202.457-2.48.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3044</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-3044" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3044" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux allows attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117580" comment="flash-player-11.2.202.460-2.51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117581" comment="flash-player-gnome-11.2.202.460-2.51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117582" comment="flash-player-kde4-11.2.202.460-2.51.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3077</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-3077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3077" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-3084 and CVE-2015-3086.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117580" comment="flash-player-11.2.202.460-2.51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117581" comment="flash-player-gnome-11.2.202.460-2.51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117582" comment="flash-player-kde4-11.2.202.460-2.51.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3078</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-3078" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3078" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-3089, CVE-2015-3090, and CVE-2015-3093.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117580" comment="flash-player-11.2.202.460-2.51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117581" comment="flash-player-gnome-11.2.202.460-2.51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117582" comment="flash-player-kde4-11.2.202.460-2.51.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3079</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-3079" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3079" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 allow attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117580" comment="flash-player-11.2.202.460-2.51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117581" comment="flash-player-gnome-11.2.202.460-2.51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117582" comment="flash-player-kde4-11.2.202.460-2.51.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3080</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-3080" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3080" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117580" comment="flash-player-11.2.202.460-2.51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117581" comment="flash-player-gnome-11.2.202.460-2.51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117582" comment="flash-player-kde4-11.2.202.460-2.51.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3081</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-3081" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3081" source="CVE"/>
    <description>
    Race condition in Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 allows attackers to bypass the Internet Explorer Protected Mode protection mechanism via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117580" comment="flash-player-11.2.202.460-2.51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117581" comment="flash-player-gnome-11.2.202.460-2.51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117582" comment="flash-player-kde4-11.2.202.460-2.51.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3082</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-3082" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3082" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 allow remote attackers to bypass intended restrictions on filesystem write operations via unspecified vectors, a different vulnerability than CVE-2015-3083 and CVE-2015-3085.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117580" comment="flash-player-11.2.202.460-2.51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117581" comment="flash-player-gnome-11.2.202.460-2.51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117582" comment="flash-player-kde4-11.2.202.460-2.51.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3083</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-3083" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3083" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 allow remote attackers to bypass intended restrictions on filesystem write operations via unspecified vectors, a different vulnerability than CVE-2015-3082 and CVE-2015-3085.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117580" comment="flash-player-11.2.202.460-2.51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117581" comment="flash-player-gnome-11.2.202.460-2.51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117582" comment="flash-player-kde4-11.2.202.460-2.51.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3084</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-3084" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3084" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-3077 and CVE-2015-3086.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117580" comment="flash-player-11.2.202.460-2.51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117581" comment="flash-player-gnome-11.2.202.460-2.51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117582" comment="flash-player-kde4-11.2.202.460-2.51.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3085</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-3085" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3085" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 allow remote attackers to bypass intended restrictions on filesystem write operations via unspecified vectors, a different vulnerability than CVE-2015-3082 and CVE-2015-3083.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117580" comment="flash-player-11.2.202.460-2.51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117581" comment="flash-player-gnome-11.2.202.460-2.51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117582" comment="flash-player-kde4-11.2.202.460-2.51.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3086</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-3086" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3086" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-3077 and CVE-2015-3084.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117580" comment="flash-player-11.2.202.460-2.51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117581" comment="flash-player-gnome-11.2.202.460-2.51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117582" comment="flash-player-kde4-11.2.202.460-2.51.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3087</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-3087" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3087" source="CVE"/>
    <description>
    Integer overflow in Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117580" comment="flash-player-11.2.202.460-2.51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117581" comment="flash-player-gnome-11.2.202.460-2.51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117582" comment="flash-player-kde4-11.2.202.460-2.51.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3088</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-3088" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3088" source="CVE"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117580" comment="flash-player-11.2.202.460-2.51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117581" comment="flash-player-gnome-11.2.202.460-2.51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117582" comment="flash-player-kde4-11.2.202.460-2.51.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3089</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-3089" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3089" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-3078, CVE-2015-3090, and CVE-2015-3093.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117580" comment="flash-player-11.2.202.460-2.51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117581" comment="flash-player-gnome-11.2.202.460-2.51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117582" comment="flash-player-kde4-11.2.202.460-2.51.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3090</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-3090" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3090" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-3078, CVE-2015-3089, and CVE-2015-3093.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117580" comment="flash-player-11.2.202.460-2.51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117581" comment="flash-player-gnome-11.2.202.460-2.51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117582" comment="flash-player-kde4-11.2.202.460-2.51.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3091</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-3091" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3091" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 do not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism via unspecified vectors, a different vulnerability than CVE-2015-3092.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117580" comment="flash-player-11.2.202.460-2.51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117581" comment="flash-player-gnome-11.2.202.460-2.51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117582" comment="flash-player-kde4-11.2.202.460-2.51.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3092</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-3092" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3092" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 do not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism via unspecified vectors, a different vulnerability than CVE-2015-3091.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117580" comment="flash-player-11.2.202.460-2.51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117581" comment="flash-player-gnome-11.2.202.460-2.51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117582" comment="flash-player-kde4-11.2.202.460-2.51.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3093</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-3093" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3093" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.289 and 14.x through 17.x before 17.0.0.188 on Windows and OS X and before 11.2.202.460 on Linux, Adobe AIR before 17.0.0.172, Adobe AIR SDK before 17.0.0.172, and Adobe AIR SDK &amp; Compiler before 17.0.0.172 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-3078, CVE-2015-3089, and CVE-2015-3090.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117580" comment="flash-player-11.2.202.460-2.51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117581" comment="flash-player-gnome-11.2.202.460-2.51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117582" comment="flash-player-kde4-11.2.202.460-2.51.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3096</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-3096" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3096" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK &amp; Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allow remote attackers to bypass a CVE-2014-5333 protection mechanism via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117583" comment="flash-player-11.2.202.466-2.55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117584" comment="flash-player-gnome-11.2.202.466-2.55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117585" comment="flash-player-kde4-11.2.202.466-2.55.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3098</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-3098" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3098" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK &amp; Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allow remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2015-3099 and CVE-2015-3102.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117583" comment="flash-player-11.2.202.466-2.55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117584" comment="flash-player-gnome-11.2.202.466-2.55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117585" comment="flash-player-kde4-11.2.202.466-2.55.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3099</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-3099" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3099" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK &amp; Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allow remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2015-3098 and CVE-2015-3102.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117583" comment="flash-player-11.2.202.466-2.55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117584" comment="flash-player-gnome-11.2.202.466-2.55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117585" comment="flash-player-kde4-11.2.202.466-2.55.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3100</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-3100" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3100" source="CVE"/>
    <description>
    Stack-based buffer overflow in Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK &amp; Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allows attackers to execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117583" comment="flash-player-11.2.202.466-2.55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117584" comment="flash-player-gnome-11.2.202.466-2.55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117585" comment="flash-player-kde4-11.2.202.466-2.55.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3102</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-3102" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3102" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK &amp; Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allow remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2015-3098 and CVE-2015-3099.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117583" comment="flash-player-11.2.202.466-2.55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117584" comment="flash-player-gnome-11.2.202.466-2.55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117585" comment="flash-player-kde4-11.2.202.466-2.55.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3103</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-3103" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3103" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK &amp; Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3106 and CVE-2015-3107.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117583" comment="flash-player-11.2.202.466-2.55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117584" comment="flash-player-gnome-11.2.202.466-2.55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117585" comment="flash-player-kde4-11.2.202.466-2.55.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3104</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-3104" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3104" source="CVE"/>
    <description>
    Integer overflow in Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK &amp; Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allows attackers to execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117583" comment="flash-player-11.2.202.466-2.55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117584" comment="flash-player-gnome-11.2.202.466-2.55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117585" comment="flash-player-kde4-11.2.202.466-2.55.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3105</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-3105" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3105" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK &amp; Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117583" comment="flash-player-11.2.202.466-2.55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117584" comment="flash-player-gnome-11.2.202.466-2.55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117585" comment="flash-player-kde4-11.2.202.466-2.55.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3106</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-3106" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3106" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK &amp; Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3103 and CVE-2015-3107.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117583" comment="flash-player-11.2.202.466-2.55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117584" comment="flash-player-gnome-11.2.202.466-2.55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117585" comment="flash-player-kde4-11.2.202.466-2.55.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3107</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-3107" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3107" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK &amp; Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3103 and CVE-2015-3106.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117730" comment="flash-player-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117731" comment="flash-player-gnome-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117732" comment="flash-player-kde4-11.2.202.508-2.67.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3108</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-3108" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3108" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK &amp; Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X do not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117583" comment="flash-player-11.2.202.466-2.55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117584" comment="flash-player-gnome-11.2.202.466-2.55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117585" comment="flash-player-kde4-11.2.202.466-2.55.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3113</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-3113" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3113" source="CVE"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 13.0.0.296 and 14.x through 18.x before 18.0.0.194 on Windows and OS X and before 11.2.202.468 on Linux allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in June 2015.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117586" comment="flash-player-11.2.202.468-2.58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117587" comment="flash-player-gnome-11.2.202.468-2.58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117588" comment="flash-player-kde4-11.2.202.468-2.58.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3143</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3143" source="CVE"/>
    <description>
    cURL and libcurl 7.10.6 through 7.41.0 does not properly re-use NTLM connections, which allows remote attackers to connect as other users via an unauthenticated request, a similar issue to CVE-2014-0015.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109154" comment="curl-7.42.0-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109155" comment="libcurl-devel-7.42.0-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109157" comment="libcurl4-7.42.0-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109156" comment="libcurl4-32bit-7.42.0-7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3144</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3144" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3144" source="CVE"/>
    <description>
    The fix_hostname function in cURL and libcurl 7.37.0 through 7.41.0 does not properly calculate an index, which allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) or possibly have other unspecified impact via a zero-length host name, as demonstrated by "http://:80" and ":80."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109154" comment="curl-7.42.0-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109155" comment="libcurl-devel-7.42.0-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109157" comment="libcurl4-7.42.0-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109156" comment="libcurl4-32bit-7.42.0-7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3145</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3145" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3145" source="CVE"/>
    <description>
    The sanitize_cookie_path function in cURL and libcurl 7.31.0 through 7.41.0 does not properly calculate an index, which allows remote attackers to cause a denial of service (out-of-bounds write and crash) or possibly have other unspecified impact via a cookie path containing only a double-quote character.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109154" comment="curl-7.42.0-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109155" comment="libcurl-devel-7.42.0-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109157" comment="libcurl4-7.42.0-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109156" comment="libcurl4-32bit-7.42.0-7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3146</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3146" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3146" source="CVE"/>
    <description>
    The (1) SSH_MSG_NEWKEYS and (2) SSH_MSG_KEXDH_REPLY packet handlers in package_cb.c in libssh before 0.6.5 do not properly validate state, which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted SSH packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109538" comment="libssh-0.6.3-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109539" comment="libssh-devel-0.6.3-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109540" comment="libssh-devel-doc-0.6.3-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109541" comment="libssh4-0.6.3-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109542" comment="libssh4-32bit-0.6.3-2.7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3148</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3148" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3148" source="CVE"/>
    <description>
    cURL and libcurl 7.10.6 through 7.41.0 do not properly re-use authenticated Negotiate connections, which allows remote attackers to connect as other users via a request.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109154" comment="curl-7.42.0-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109155" comment="libcurl-devel-7.42.0-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109157" comment="libcurl4-7.42.0-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109156" comment="libcurl4-32bit-7.42.0-7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3152</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3152" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3152" source="CVE"/>
    <description>
    Oracle MySQL before 5.7.3, Oracle MySQL Connector/C (aka libmysqlclient) before 6.1.3, and MariaDB before 5.5.44 use the --ssl option to mean that SSL is optional, which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, aka a "BACKRONYM" attack.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118962" comment="libmysql56client18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118963" comment="libmysql56client18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118964" comment="libmysql56client_r18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118965" comment="libmysql56client_r18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111084" comment="libmysqlclient-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111085" comment="libmysqlclient18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111086" comment="libmysqlclient18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111087" comment="libmysqlclient_r18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111088" comment="libmysqlclient_r18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111089" comment="libmysqld-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111090" comment="libmysqld18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111091" comment="mariadb-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111092" comment="mariadb-bench-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111093" comment="mariadb-client-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111094" comment="mariadb-errormessages-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111095" comment="mariadb-test-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111096" comment="mariadb-tools-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118966" comment="mysql-community-server-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118967" comment="mysql-community-server-bench-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118968" comment="mysql-community-server-client-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118969" comment="mysql-community-server-errormessages-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118970" comment="mysql-community-server-test-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118971" comment="mysql-community-server-tools-5.6.27-2.12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3153</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3153" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3153" source="CVE"/>
    <description>
    The default configuration for cURL and libcurl before 7.42.1 sends custom HTTP headers to both the proxy and destination server, which might allow remote proxy servers to obtain sensitive information by reading the header contents.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109515" comment="curl-7.42.1-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109517" comment="libcurl-devel-7.42.1-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109516" comment="libcurl-devel-32bit-7.42.1-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109519" comment="libcurl4-7.42.1-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109518" comment="libcurl4-32bit-7.42.1-11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3164</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3164" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3164" source="CVE"/>
    <description>
    The authentication setup in XWayland 1.16.x and 1.17.x before 1.17.2 starts the server in non-authenticating mode, which allows local users to read from or send information to arbitrary X11 clients via vectors involving a UNIX socket.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110624" comment="xorg-x11-server-7.6_1.16.1-19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110625" comment="xorg-x11-server-extra-7.6_1.16.1-19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110626" comment="xorg-x11-server-sdk-7.6_1.16.1-19.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3183</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3183" source="CVE"/>
    <description>
    The chunked transfer coding implementation in the Apache HTTP Server before 2.4.14 does not properly parse chunk headers, which allows remote attackers to conduct HTTP request smuggling attacks via a crafted request, related to mishandling of large chunk-size values and invalid chunk-extension characters in modules/http/http_filters.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114876" comment="apache2-2.4.10-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114877" comment="apache2-devel-2.4.10-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114878" comment="apache2-doc-2.4.10-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114879" comment="apache2-event-2.4.10-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114880" comment="apache2-example-pages-2.4.10-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114881" comment="apache2-prefork-2.4.10-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114882" comment="apache2-utils-2.4.10-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114883" comment="apache2-worker-2.4.10-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3184</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3184" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3184" source="CVE"/>
    <description>
    mod_authz_svn in Apache Subversion 1.7.x before 1.7.21 and 1.8.x before 1.8.14, when using Apache httpd 2.4.x, does not properly restrict anonymous access, which allows remote anonymous users to read hidden files via the path name.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113809" comment="libsvn_auth_gnome_keyring-1-0-1.8.14-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113810" comment="libsvn_auth_kwallet-1-0-1.8.14-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113811" comment="subversion-1.8.14-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113812" comment="subversion-bash-completion-1.8.14-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113813" comment="subversion-devel-1.8.14-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113814" comment="subversion-perl-1.8.14-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113815" comment="subversion-python-1.8.14-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113816" comment="subversion-python-ctypes-1.8.14-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113817" comment="subversion-ruby-1.8.14-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113818" comment="subversion-server-1.8.14-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113819" comment="subversion-tools-1.8.14-2.17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3185</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3185" source="CVE"/>
    <description>
    The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging the presence of a module that relies on the 2.2 API behavior.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114876" comment="apache2-2.4.10-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114877" comment="apache2-devel-2.4.10-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114878" comment="apache2-doc-2.4.10-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114879" comment="apache2-event-2.4.10-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114880" comment="apache2-example-pages-2.4.10-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114881" comment="apache2-prefork-2.4.10-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114882" comment="apache2-utils-2.4.10-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114883" comment="apache2-worker-2.4.10-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3187</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3187" source="CVE"/>
    <description>
    The svn_repos_trace_node_locations function in Apache Subversion before 1.7.21 and 1.8.x before 1.8.14, when path-based authorization is used, allows remote authenticated users to obtain sensitive path information by reading the history of a node that has been moved from a hidden path.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113809" comment="libsvn_auth_gnome_keyring-1-0-1.8.14-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113810" comment="libsvn_auth_kwallet-1-0-1.8.14-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113811" comment="subversion-1.8.14-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113812" comment="subversion-bash-completion-1.8.14-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113813" comment="subversion-devel-1.8.14-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113814" comment="subversion-perl-1.8.14-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113815" comment="subversion-python-1.8.14-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113816" comment="subversion-python-ctypes-1.8.14-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113817" comment="subversion-ruby-1.8.14-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113818" comment="subversion-server-1.8.14-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113819" comment="subversion-tools-1.8.14-2.17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3194</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3194" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3194" source="CVE"/>
    <description>
    crypto/rsa/rsa_ameth.c in OpenSSL 1.0.1 before 1.0.1q and 1.0.2 before 1.0.2e allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an RSA PSS ASN.1 signature that lacks a mask generation function parameter.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127771" comment="libcrypto34-2.2.7-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127772" comment="libcrypto34-32bit-2.2.7-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127814" comment="libmysql56client18-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127815" comment="libmysql56client18-32bit-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127816" comment="libmysql56client_r18-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127817" comment="libmysql56client_r18-32bit-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119577" comment="libopenssl-devel-1.0.1k-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119578" comment="libopenssl-devel-32bit-1.0.1k-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119579" comment="libopenssl1_0_0-1.0.1k-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119580" comment="libopenssl1_0_0-32bit-1.0.1k-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119581" comment="libopenssl1_0_0-hmac-1.0.1k-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119582" comment="libopenssl1_0_0-hmac-32bit-1.0.1k-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127773" comment="libressl-2.2.7-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127774" comment="libressl-devel-2.2.7-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127775" comment="libressl-devel-32bit-2.2.7-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127776" comment="libressl-devel-doc-2.2.7-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127777" comment="libssl33-2.2.7-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127778" comment="libssl33-32bit-2.2.7-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127779" comment="libtls4-2.2.7-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127780" comment="libtls4-32bit-2.2.7-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127818" comment="mysql-community-server-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127819" comment="mysql-community-server-bench-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127820" comment="mysql-community-server-client-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127821" comment="mysql-community-server-errormessages-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127822" comment="mysql-community-server-test-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127823" comment="mysql-community-server-tools-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119583" comment="openssl-1.0.1k-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119584" comment="openssl-doc-1.0.1k-2.27.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3195</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3195" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3195" source="CVE"/>
    <description>
    The ASN1_TFLG_COMBINE implementation in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zh, 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1q, and 1.0.2 before 1.0.2e mishandles errors caused by malformed X509_ATTRIBUTE data, which allows remote attackers to obtain sensitive information from process memory by triggering a decoding failure in a PKCS#7 or CMS application.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127771" comment="libcrypto34-2.2.7-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127772" comment="libcrypto34-32bit-2.2.7-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119577" comment="libopenssl-devel-1.0.1k-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119578" comment="libopenssl-devel-32bit-1.0.1k-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124418" comment="libopenssl0_9_8-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124419" comment="libopenssl0_9_8-32bit-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119579" comment="libopenssl1_0_0-1.0.1k-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119580" comment="libopenssl1_0_0-32bit-1.0.1k-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119581" comment="libopenssl1_0_0-hmac-1.0.1k-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119582" comment="libopenssl1_0_0-hmac-32bit-1.0.1k-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127773" comment="libressl-2.2.7-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127774" comment="libressl-devel-2.2.7-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127775" comment="libressl-devel-32bit-2.2.7-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127776" comment="libressl-devel-doc-2.2.7-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127777" comment="libssl33-2.2.7-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127778" comment="libssl33-32bit-2.2.7-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127779" comment="libtls4-2.2.7-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127780" comment="libtls4-32bit-2.2.7-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119583" comment="openssl-1.0.1k-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119584" comment="openssl-doc-1.0.1k-2.27.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3196</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3196" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3196" source="CVE"/>
    <description>
    ssl/s3_clnt.c in OpenSSL 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1p, and 1.0.2 before 1.0.2d, when used for a multi-threaded client, writes the PSK identity hint to an incorrect data structure, which allows remote servers to cause a denial of service (race condition and double free) via a crafted ServerKeyExchange message.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119577" comment="libopenssl-devel-1.0.1k-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119578" comment="libopenssl-devel-32bit-1.0.1k-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119579" comment="libopenssl1_0_0-1.0.1k-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119580" comment="libopenssl1_0_0-32bit-1.0.1k-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119581" comment="libopenssl1_0_0-hmac-1.0.1k-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119582" comment="libopenssl1_0_0-hmac-32bit-1.0.1k-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119583" comment="openssl-1.0.1k-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119584" comment="openssl-doc-1.0.1k-2.27.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3197</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3197" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3197" source="CVE"/>
    <description>
    ssl/s2_srvr.c in OpenSSL 1.0.1 before 1.0.1r and 1.0.2 before 1.0.2f does not prevent use of disabled ciphers, which makes it easier for man-in-the-middle attackers to defeat cryptographic protection mechanisms by performing computations on SSLv2 traffic, related to the get_client_master_key and get_client_hello functions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122891" comment="libopenssl-devel-1.0.1k-2.30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122892" comment="libopenssl-devel-32bit-1.0.1k-2.30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124418" comment="libopenssl0_9_8-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124419" comment="libopenssl0_9_8-32bit-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122893" comment="libopenssl1_0_0-1.0.1k-2.30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122894" comment="libopenssl1_0_0-32bit-1.0.1k-2.30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122895" comment="libopenssl1_0_0-hmac-1.0.1k-2.30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122896" comment="libopenssl1_0_0-hmac-32bit-1.0.1k-2.30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122897" comment="openssl-1.0.1k-2.30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122898" comment="openssl-doc-1.0.1k-2.30.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3202</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3202" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3202" source="CVE"/>
    <description>
    fusermount in FUSE before 2.9.3-15 does not properly clear the environment before invoking (1) mount or (2) umount as root, which allows local users to write to arbitrary files via a crafted LIBMOUNT_MTAB environment variable that is used by mount's debugging feature.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110104" comment="fuse-2.9.4-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110105" comment="fuse-devel-2.9.4-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110106" comment="fuse-devel-static-2.9.4-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110107" comment="libfuse2-2.9.4-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110108" comment="libfuse2-32bit-2.9.4-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110109" comment="libulockmgr1-2.9.4-4.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3209</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3209" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209" source="CVE"/>
    <description>
    Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110614" comment="xen-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110615" comment="xen-devel-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110619" comment="xen-doc-html-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110620" comment="xen-kmp-default-4.4.2_06_k3.16.7_21-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110621" comment="xen-kmp-desktop-4.4.2_06_k3.16.7_21-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110617" comment="xen-libs-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110616" comment="xen-libs-32bit-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110622" comment="xen-tools-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110618" comment="xen-tools-domU-4.4.2_06-23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3210</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3210" source="CVE"/>
    <description>
    Heap-based buffer overflow in PCRE 8.34 through 8.37 and PCRE2 10.10 allows remote attackers to execute arbitrary code via a crafted regular expression, as demonstrated by /^(?P=B)((?P=B)(?J:(?P&lt;B&gt;c)(?P&lt;B&gt;a(?P=B)))&gt;WGXCREDITS)/, a different vulnerability than CVE-2015-8384.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135519" comment="libpcre1-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135520" comment="libpcre1-32bit-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135521" comment="libpcre16-0-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135522" comment="libpcre16-0-32bit-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135523" comment="libpcrecpp0-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135524" comment="libpcrecpp0-32bit-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135525" comment="libpcreposix0-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135526" comment="libpcreposix0-32bit-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135527" comment="pcre-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135528" comment="pcre-devel-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135529" comment="pcre-devel-static-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135530" comment="pcre-doc-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135531" comment="pcre-tools-8.39-3.8.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3212</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3212" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3212" source="CVE"/>
    <description>
    Race condition in net/sctp/socket.c in the Linux kernel before 4.1.2 allows local users to cause a denial of service (list corruption and panic) via a rapid series of system calls related to sockets, as demonstrated by setsockopt calls.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113567" comment="bbswitch-0.8-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113568" comment="bbswitch-kmp-default-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113569" comment="bbswitch-kmp-desktop-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113570" comment="bbswitch-kmp-pae-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113571" comment="bbswitch-kmp-xen-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113572" comment="cloop-2.639-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113573" comment="cloop-kmp-default-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113574" comment="cloop-kmp-desktop-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113575" comment="cloop-kmp-pae-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113576" comment="cloop-kmp-xen-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113577" comment="crash-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113578" comment="crash-devel-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113579" comment="crash-doc-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113580" comment="crash-eppic-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113581" comment="crash-gcore-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113582" comment="crash-kmp-default-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113583" comment="crash-kmp-desktop-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113584" comment="crash-kmp-pae-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113585" comment="crash-kmp-xen-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113586" comment="hdjmod-1.28-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113587" comment="hdjmod-kmp-default-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113588" comment="hdjmod-kmp-desktop-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113589" comment="hdjmod-kmp-pae-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113590" comment="hdjmod-kmp-xen-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113591" comment="ipset-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113592" comment="ipset-devel-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113593" comment="ipset-kmp-default-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113594" comment="ipset-kmp-desktop-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113595" comment="ipset-kmp-pae-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113596" comment="ipset-kmp-xen-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113598" comment="kernel-debug-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113599" comment="kernel-debug-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113600" comment="kernel-debug-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113601" comment="kernel-default-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113602" comment="kernel-default-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113603" comment="kernel-default-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113604" comment="kernel-desktop-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113605" comment="kernel-desktop-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113606" comment="kernel-desktop-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113617" comment="kernel-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113607" comment="kernel-docs-3.16.7-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113608" comment="kernel-ec2-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113609" comment="kernel-ec2-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113610" comment="kernel-ec2-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113618" comment="kernel-macros-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113611" comment="kernel-obs-build-3.16.7-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113613" comment="kernel-obs-qa-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113612" comment="kernel-obs-qa-xen-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113614" comment="kernel-pae-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113615" comment="kernel-pae-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113616" comment="kernel-pae-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113619" comment="kernel-source-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113620" comment="kernel-source-vanilla-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113621" comment="kernel-syms-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113622" comment="kernel-vanilla-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113623" comment="kernel-vanilla-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113624" comment="kernel-xen-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113625" comment="kernel-xen-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113626" comment="kernel-xen-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113597" comment="libipset3-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113627" comment="pcfclock-0.44-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113628" comment="pcfclock-kmp-default-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113629" comment="pcfclock-kmp-desktop-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113630" comment="pcfclock-kmp-pae-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113631" comment="vhba-kmp-20140629-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113632" comment="vhba-kmp-default-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113633" comment="vhba-kmp-desktop-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113634" comment="vhba-kmp-pae-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113635" comment="vhba-kmp-xen-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113636" comment="xen-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113637" comment="xen-devel-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113646" comment="xen-doc-html-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113647" comment="xen-kmp-default-4.4.2_06_k3.16.7_24-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113648" comment="xen-kmp-desktop-4.4.2_06_k3.16.7_24-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113639" comment="xen-libs-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113638" comment="xen-libs-32bit-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113649" comment="xen-tools-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113640" comment="xen-tools-domU-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113641" comment="xtables-addons-2.6-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113642" comment="xtables-addons-kmp-default-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113643" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113644" comment="xtables-addons-kmp-pae-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113645" comment="xtables-addons-kmp-xen-2.6_k3.16.7_24-11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3216</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3216" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3216" source="CVE"/>
    <description>
    Race condition in a certain Red Hat patch to the PRNG lock implementation in the ssleay_rand_bytes function in OpenSSL, as distributed in openssl-1.0.1e-25.el7 in Red Hat Enterprise Linux (RHEL) 7 and other products, allows remote attackers to cause a denial of service (application crash) by establishing many TLS sessions to a multithreaded server, leading to use of a negative value for a certain length field.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110688" comment="libopenssl-devel-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110689" comment="libopenssl-devel-32bit-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110690" comment="libopenssl1_0_0-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110691" comment="libopenssl1_0_0-32bit-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110692" comment="libopenssl1_0_0-hmac-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110693" comment="libopenssl1_0_0-hmac-32bit-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110694" comment="openssl-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110695" comment="openssl-doc-1.0.1k-2.24.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3217</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3217" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3217" source="CVE"/>
    <description>
    PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\\.|([^\\\\W_])?)+)+$/.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135519" comment="libpcre1-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135520" comment="libpcre1-32bit-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135521" comment="libpcre16-0-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135522" comment="libpcre16-0-32bit-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135523" comment="libpcrecpp0-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135524" comment="libpcrecpp0-32bit-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135525" comment="libpcreposix0-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135526" comment="libpcreposix0-32bit-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135527" comment="pcre-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135528" comment="pcre-devel-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135529" comment="pcre-devel-static-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135530" comment="pcre-doc-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135531" comment="pcre-tools-8.39-3.8.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3218</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3218" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3218" source="CVE"/>
    <description>
    The authentication_agent_new function in polkitbackend/polkitbackendinteractiveauthority.c in PolicyKit (aka polkit) before 0.113 allows local users to cause a denial of service (NULL pointer dereference and polkitd daemon crash) by calling RegisterAuthenticationAgent with an invalid object path.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115013" comment="libpolkit0-0.113-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115014" comment="libpolkit0-32bit-0.113-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115015" comment="polkit-0.113-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115016" comment="polkit-devel-0.113-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115017" comment="polkit-doc-0.113-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115018" comment="typelib-1_0-Polkit-1_0-0.113-3.8.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3223</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3223" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3223" source="CVE"/>
    <description>
    The ldb_wildcard_compare function in ldb_match.c in ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles certain zero values, which allows remote attackers to cause a denial of service (infinite loop) via crafted packets.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126263" comment="ctdb-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126264" comment="ctdb-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126265" comment="ctdb-pcp-pmda-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126266" comment="ctdb-tests-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120133" comment="ldb-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120134" comment="ldb-tools-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126267" comment="libdcerpc-atsvc-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126268" comment="libdcerpc-atsvc0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126269" comment="libdcerpc-atsvc0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126270" comment="libdcerpc-binding0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126271" comment="libdcerpc-binding0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126272" comment="libdcerpc-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126273" comment="libdcerpc-samr-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126274" comment="libdcerpc-samr0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126275" comment="libdcerpc-samr0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126276" comment="libdcerpc0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126277" comment="libdcerpc0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126278" comment="libgensec-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126279" comment="libgensec0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126280" comment="libgensec0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120149" comment="libldb-devel-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120150" comment="libldb1-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120151" comment="libldb1-32bit-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126281" comment="libndr-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126282" comment="libndr-krb5pac-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126283" comment="libndr-krb5pac0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126284" comment="libndr-krb5pac0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126285" comment="libndr-nbt-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126286" comment="libndr-nbt0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126287" comment="libndr-nbt0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126288" comment="libndr-standard-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126289" comment="libndr-standard0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126290" comment="libndr-standard0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126291" comment="libndr0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126292" comment="libndr0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126293" comment="libnetapi-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126294" comment="libnetapi0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126295" comment="libnetapi0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120167" comment="libpdb-devel-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120168" comment="libpdb0-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120169" comment="libpdb0-32bit-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126296" comment="libregistry-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126297" comment="libregistry0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126298" comment="libregistry0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126299" comment="libsamba-credentials-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126300" comment="libsamba-credentials0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126301" comment="libsamba-credentials0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126302" comment="libsamba-hostconfig-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126303" comment="libsamba-hostconfig0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126304" comment="libsamba-hostconfig0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126305" comment="libsamba-passdb-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126306" comment="libsamba-passdb0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126307" comment="libsamba-passdb0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126308" comment="libsamba-policy-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126309" comment="libsamba-policy0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126310" comment="libsamba-policy0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126311" comment="libsamba-util-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126312" comment="libsamba-util0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126313" comment="libsamba-util0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126314" comment="libsamdb-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126315" comment="libsamdb0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126316" comment="libsamdb0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126317" comment="libsmbclient-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126318" comment="libsmbclient-raw-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126319" comment="libsmbclient-raw0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126320" comment="libsmbclient-raw0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126321" comment="libsmbclient0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126322" comment="libsmbclient0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126323" comment="libsmbconf-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126324" comment="libsmbconf0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126325" comment="libsmbconf0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126326" comment="libsmbldap-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126327" comment="libsmbldap0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126328" comment="libsmbldap0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120200" comment="libsmbsharemodes-devel-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120201" comment="libsmbsharemodes0-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120202" comment="libtalloc-devel-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120203" comment="libtalloc2-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120204" comment="libtalloc2-32bit-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120205" comment="libtdb-devel-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120206" comment="libtdb1-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120207" comment="libtdb1-32bit-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120208" comment="libtevent-devel-0.9.26-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126329" comment="libtevent-util-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126330" comment="libtevent-util0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126331" comment="libtevent-util0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120212" comment="libtevent0-0.9.26-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120213" comment="libtevent0-32bit-0.9.26-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126332" comment="libwbclient-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126333" comment="libwbclient0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126334" comment="libwbclient0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120217" comment="pyldb-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120218" comment="pyldb-32bit-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120219" comment="pyldb-devel-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120220" comment="pytalloc-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120221" comment="pytalloc-32bit-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120222" comment="pytalloc-devel-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120223" comment="python-tdb-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120224" comment="python-tdb-32bit-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120225" comment="python-tevent-0.9.26-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120226" comment="python-tevent-32bit-0.9.26-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126335" comment="samba-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126336" comment="samba-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126337" comment="samba-client-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126338" comment="samba-client-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126339" comment="samba-core-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126340" comment="samba-doc-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126341" comment="samba-libs-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126342" comment="samba-libs-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126343" comment="samba-pidl-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126344" comment="samba-python-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126345" comment="samba-test-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126346" comment="samba-test-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126347" comment="samba-winbind-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126348" comment="samba-winbind-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120241" comment="talloc-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120242" comment="tdb-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120243" comment="tdb-tools-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120244" comment="tevent-0.9.26-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3225</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3225" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3225" source="CVE"/>
    <description>
    lib/rack/utils.rb in Rack before 1.5.4 and 1.6.x before 1.6.2, as used with Ruby on Rails 3.x and 4.x and other products, allows remote attackers to cause a denial of service (SystemStackError) via a request with a large parameter depth.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111209" comment="rubygem-rack-1.5.2-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111212" comment="rubygem-rack-1_3-1.3.10-5.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111213" comment="rubygem-rack-1_3-doc-1.3.10-5.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111214" comment="rubygem-rack-1_3-testsuite-1.3.10-5.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111215" comment="rubygem-rack-1_4-1.4.5-5.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111216" comment="rubygem-rack-1_4-doc-1.4.5-5.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111217" comment="rubygem-rack-1_4-testsuite-1.4.5-5.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111210" comment="rubygem-rack-doc-1.5.2-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111211" comment="rubygem-rack-testsuite-1.5.2-4.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3227</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3227" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3227" source="CVE"/>
    <description>
    The (1) jdom.rb and (2) rexml.rb components in Active Support in Ruby on Rails before 4.1.11 and 4.2.x before 4.2.2, when JDOM or REXML is enabled, allow remote attackers to cause a denial of service (SystemStackError) via a large XML document depth.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111309" comment="rubygem-activesupport-3_2-3.2.17-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111310" comment="rubygem-activesupport-3_2-doc-3.2.17-2.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3228</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3228" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3228" source="CVE"/>
    <description>
    Integer overflow in the gs_heap_alloc_bytes function in base/gsmalloc.c in Ghostscript 9.15 and earlier allows remote attackers to cause a denial of service (crash) via a crafted Postscript (ps) file, as demonstrated by using the ps2pdf command, which triggers an out-of-bounds read or write.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113417" comment="ghostscript-9.15-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113418" comment="ghostscript-devel-9.15-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113415" comment="ghostscript-mini-9.15-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113416" comment="ghostscript-mini-devel-9.15-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113419" comment="ghostscript-x11-9.15-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3236</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3236" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3236" source="CVE"/>
    <description>
    cURL and libcurl 7.40.0 through 7.42.1 send the HTTP Basic authentication credentials for a previous connection when reusing a reset (curl_easy_reset) connection handle to send a request to the same host name, which allows remote attackers to obtain sensitive information via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110648" comment="curl-7.42.1-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110650" comment="libcurl-devel-7.42.1-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110649" comment="libcurl-devel-32bit-7.42.1-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110652" comment="libcurl4-7.42.1-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110651" comment="libcurl4-32bit-7.42.1-16.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3237</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3237" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3237" source="CVE"/>
    <description>
    The smb_request_state function in cURL and libcurl 7.40.0 through 7.42.1 allows remote SMB servers to obtain sensitive information from memory or cause a denial of service (out-of-bounds read and crash) via crafted length and offset values.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110648" comment="curl-7.42.1-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110650" comment="libcurl-devel-7.42.1-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110649" comment="libcurl-devel-32bit-7.42.1-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110652" comment="libcurl4-7.42.1-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110651" comment="libcurl4-32bit-7.42.1-16.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3239</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3239" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3239" source="CVE"/>
    <description>
    Off-by-one error in the dwarf_to_unw_regnum function in include/dwarf_i.h in libunwind 1.1 allows local users to have unspecified impact via invalid dwarf opcodes.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111167" comment="libunwind-1.1-10.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111168" comment="libunwind-32bit-1.1-10.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111169" comment="libunwind-devel-1.1-10.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3246</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3246" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3246" source="CVE"/>
    <description>
    libuser before 0.56.13-8 and 0.60 before 0.60-7, as used in the userhelper program in the usermode package, directly modifies /etc/passwd, which allows local users to cause a denial of service (inconsistent file state) by causing an error during the modification. NOTE: this issue can be combined with CVE-2015-3245 to gain privileges.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113228" comment="libuser-0.60-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113229" comment="libuser-devel-0.60-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113230" comment="libuser-lang-0.60-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113231" comment="libuser-python-0.60-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113232" comment="libuser1-0.60-3.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3247</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3247" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3247" source="CVE"/>
    <description>
    Race condition in the worker_update_monitors_config function in SPICE 0.12.4 allows a remote authenticated guest user to cause a denial of service (heap-based memory corruption and QEMU-KVM crash) or possibly execute arbitrary code on the host via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115042" comment="libspice-server-devel-0.12.4-4.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115043" comment="libspice-server1-0.12.4-4.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115044" comment="spice-0.12.4-4.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115045" comment="spice-client-0.12.4-4.6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3255</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3255" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3255" source="CVE"/>
    <description>
    The polkit_backend_action_pool_init function in polkitbackend/polkitbackendactionpool.c in PolicyKit (aka polkit) before 0.113 might allow local users to gain privileges via duplicate action IDs in action descriptions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115013" comment="libpolkit0-0.113-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115014" comment="libpolkit0-32bit-0.113-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115015" comment="polkit-0.113-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115016" comment="polkit-devel-0.113-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115017" comment="polkit-doc-0.113-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115018" comment="typelib-1_0-Polkit-1_0-0.113-3.8.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3256</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3256" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3256" source="CVE"/>
    <description>
    PolicyKit (aka polkit) before 0.113 allows local users to cause a denial of service (memory corruption and polkitd daemon crash) and possibly gain privileges via unspecified vectors, related to "javascript rule evaluation."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115013" comment="libpolkit0-0.113-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115014" comment="libpolkit0-32bit-0.113-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115015" comment="polkit-0.113-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115016" comment="polkit-devel-0.113-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115017" comment="polkit-doc-0.113-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115018" comment="typelib-1_0-Polkit-1_0-0.113-3.8.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3258</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3258" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3258" source="CVE"/>
    <description>
    Heap-based buffer overflow in the WriteProlog function in filter/texttopdf.c in texttopdf in cups-filters before 1.0.70 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a small line size in a print job.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111170" comment="cups-filters-1.0.58-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111171" comment="cups-filters-cups-browsed-1.0.58-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111172" comment="cups-filters-devel-1.0.58-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111173" comment="cups-filters-foomatic-rip-1.0.58-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111174" comment="cups-filters-ghostscript-1.0.58-2.7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3259</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3259" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3259" source="CVE"/>
    <description>
    Stack-based buffer overflow in the xl command line utility in Xen 4.1.x through 4.5.x allows local guest administrators to gain privileges via a long configuration argument.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117956" comment="xen-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117957" comment="xen-devel-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117958" comment="xen-doc-html-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117959" comment="xen-kmp-default-4.4.3_02_k3.16.7_29-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117960" comment="xen-kmp-desktop-4.4.3_02_k3.16.7_29-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117961" comment="xen-libs-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117962" comment="xen-libs-32bit-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117963" comment="xen-tools-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117964" comment="xen-tools-domU-4.4.3_02-30.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153279" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3279</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3279" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3279" source="CVE"/>
    <description>
    Integer overflow in filter/texttopdf.c in texttopdf in cups-filters before 1.0.71 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted line size in a print job, which triggers a heap-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111170" comment="cups-filters-1.0.58-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111171" comment="cups-filters-cups-browsed-1.0.58-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111172" comment="cups-filters-devel-1.0.58-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111173" comment="cups-filters-foomatic-rip-1.0.58-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111174" comment="cups-filters-ghostscript-1.0.58-2.7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3281</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3281" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3281" source="CVE"/>
    <description>
    The buffer_slow_realign function in HAProxy 1.5.x before 1.5.14 and 1.6-dev does not properly realign a buffer that is used for pending outgoing data, which allows remote attackers to obtain sensitive information (uninitialized memory contents of previous requests) via a crafted request.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115212" comment="haproxy-1.5.5-3.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3288</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3288" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3288" source="CVE"/>
    <description>
    mm/memory.c in the Linux kernel before 4.1.4 mishandles anonymous pages, which allows local users to gain privileges or cause a denial of service (page tainting) via a crafted application that triggers writing to page zero.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3290</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3290" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3290" source="CVE"/>
    <description>
    arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform improperly relies on espfix64 during nested NMI processing, which allows local users to gain privileges by triggering an NMI within a certain instruction window.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115288" comment="bbswitch-0.8-3.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115289" comment="bbswitch-kmp-default-0.8_k3.16.7_29-3.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115290" comment="bbswitch-kmp-desktop-0.8_k3.16.7_29-3.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115291" comment="bbswitch-kmp-pae-0.8_k3.16.7_29-3.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115292" comment="bbswitch-kmp-xen-0.8_k3.16.7_29-3.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115293" comment="cloop-2.639-14.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115294" comment="cloop-kmp-default-2.639_k3.16.7_29-14.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115295" comment="cloop-kmp-desktop-2.639_k3.16.7_29-14.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115296" comment="cloop-kmp-pae-2.639_k3.16.7_29-14.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115297" comment="cloop-kmp-xen-2.639_k3.16.7_29-14.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115298" comment="crash-7.0.8-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115299" comment="crash-devel-7.0.8-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115300" comment="crash-doc-7.0.8-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115301" comment="crash-eppic-7.0.8-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115302" comment="crash-gcore-7.0.8-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115303" comment="crash-kmp-default-7.0.8_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115304" comment="crash-kmp-desktop-7.0.8_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115305" comment="crash-kmp-pae-7.0.8_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115306" comment="crash-kmp-xen-7.0.8_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115307" comment="hdjmod-1.28-18.14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115308" comment="hdjmod-kmp-default-1.28_k3.16.7_29-18.14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115309" comment="hdjmod-kmp-desktop-1.28_k3.16.7_29-18.14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115310" comment="hdjmod-kmp-pae-1.28_k3.16.7_29-18.14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115311" comment="hdjmod-kmp-xen-1.28_k3.16.7_29-18.14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115312" comment="ipset-6.23-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115313" comment="ipset-devel-6.23-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115314" comment="ipset-kmp-default-6.23_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115315" comment="ipset-kmp-desktop-6.23_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115316" comment="ipset-kmp-pae-6.23_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115317" comment="ipset-kmp-xen-6.23_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115319" comment="kernel-debug-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115320" comment="kernel-debug-base-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115321" comment="kernel-debug-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115322" comment="kernel-default-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115323" comment="kernel-default-base-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115324" comment="kernel-default-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115325" comment="kernel-desktop-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115326" comment="kernel-desktop-base-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115327" comment="kernel-desktop-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115338" comment="kernel-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115328" comment="kernel-docs-3.16.7-29.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115329" comment="kernel-ec2-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115330" comment="kernel-ec2-base-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115331" comment="kernel-ec2-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115339" comment="kernel-macros-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115332" comment="kernel-obs-build-3.16.7-29.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115334" comment="kernel-obs-qa-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115333" comment="kernel-obs-qa-xen-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115335" comment="kernel-pae-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115336" comment="kernel-pae-base-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115337" comment="kernel-pae-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115340" comment="kernel-source-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115341" comment="kernel-source-vanilla-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115342" comment="kernel-syms-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115343" comment="kernel-vanilla-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115344" comment="kernel-vanilla-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115345" comment="kernel-xen-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115346" comment="kernel-xen-base-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115347" comment="kernel-xen-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115318" comment="libipset3-6.23-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115348" comment="pcfclock-0.44-260.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115349" comment="pcfclock-kmp-default-0.44_k3.16.7_29-260.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115350" comment="pcfclock-kmp-desktop-0.44_k3.16.7_29-260.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115351" comment="pcfclock-kmp-pae-0.44_k3.16.7_29-260.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115352" comment="vhba-kmp-20140629-2.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115353" comment="vhba-kmp-default-20140629_k3.16.7_29-2.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115354" comment="vhba-kmp-desktop-20140629_k3.16.7_29-2.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115355" comment="vhba-kmp-pae-20140629_k3.16.7_29-2.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115356" comment="vhba-kmp-xen-20140629_k3.16.7_29-2.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115357" comment="xen-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115358" comment="xen-devel-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115367" comment="xen-doc-html-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115368" comment="xen-kmp-default-4.4.2_06_k3.16.7_29-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115369" comment="xen-kmp-desktop-4.4.2_06_k3.16.7_29-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115360" comment="xen-libs-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115359" comment="xen-libs-32bit-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115370" comment="xen-tools-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115361" comment="xen-tools-domU-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115362" comment="xtables-addons-2.6-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115363" comment="xtables-addons-kmp-default-2.6_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115364" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115365" comment="xtables-addons-kmp-pae-2.6_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115366" comment="xtables-addons-kmp-xen-2.6_k3.16.7_29-13.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3294</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3294" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3294" source="CVE"/>
    <description>
    The tcp_request function in Dnsmasq before 2.73rc4 does not properly handle the return value of the setup_reply function, which allows remote attackers to read process memory and cause a denial of service (out-of-bounds read and crash) via a malformed DNS request.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109361" comment="dnsmasq-2.71-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109362" comment="dnsmasq-utils-2.71-3.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3306</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3306" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3306" source="CVE"/>
    <description>
    The mod_copy module in ProFTPD 1.3.5 allows remote attackers to read and write to arbitrary files via the site cpfr and site cpto commands.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110302" comment="proftpd-1.3.5a-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110303" comment="proftpd-devel-1.3.5a-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110304" comment="proftpd-doc-1.3.5a-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110305" comment="proftpd-lang-1.3.5a-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110306" comment="proftpd-ldap-1.3.5a-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110307" comment="proftpd-mysql-1.3.5a-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110308" comment="proftpd-pgsql-1.3.5a-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110309" comment="proftpd-radius-1.3.5a-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110310" comment="proftpd-sqlite-1.3.5a-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3310</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3310" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3310" source="CVE"/>
    <description>
    Buffer overflow in the rc_mksid function in plugins/radius/util.c in Paul's PPP Package (ppp) 2.4.6 and earlier, when the PID for pppd is greater than 65535, allows remote attackers to cause a denial of service (crash) via a start accounting message to the RADIUS server.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118333" comment="ppp-2.4.7-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118334" comment="ppp-devel-2.4.7-2.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3329</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3329" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3329" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in the phar_set_inode function in phar_internal.h in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allow remote attackers to execute arbitrary code via a crafted length value in a (1) tar, (2) phar, or (3) ZIP archive.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109363" comment="apache2-mod_php5-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109364" comment="php5-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109365" comment="php5-bcmath-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109366" comment="php5-bz2-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109367" comment="php5-calendar-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109368" comment="php5-ctype-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109369" comment="php5-curl-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109370" comment="php5-dba-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109371" comment="php5-devel-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109372" comment="php5-dom-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109373" comment="php5-enchant-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109374" comment="php5-exif-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109375" comment="php5-fastcgi-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109376" comment="php5-fileinfo-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109377" comment="php5-firebird-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109378" comment="php5-fpm-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109379" comment="php5-ftp-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109380" comment="php5-gd-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109381" comment="php5-gettext-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109382" comment="php5-gmp-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109383" comment="php5-iconv-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109384" comment="php5-imap-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109385" comment="php5-intl-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109386" comment="php5-json-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109387" comment="php5-ldap-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109388" comment="php5-mbstring-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109389" comment="php5-mcrypt-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109390" comment="php5-mssql-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109391" comment="php5-mysql-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109392" comment="php5-odbc-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109393" comment="php5-opcache-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109394" comment="php5-openssl-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109395" comment="php5-pcntl-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109396" comment="php5-pdo-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109397" comment="php5-pear-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109398" comment="php5-pgsql-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109399" comment="php5-phar-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109400" comment="php5-posix-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109401" comment="php5-pspell-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109402" comment="php5-readline-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109403" comment="php5-shmop-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109404" comment="php5-snmp-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109405" comment="php5-soap-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109406" comment="php5-sockets-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109407" comment="php5-sqlite-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109408" comment="php5-suhosin-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109409" comment="php5-sysvmsg-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109410" comment="php5-sysvsem-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109411" comment="php5-sysvshm-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109412" comment="php5-tidy-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109413" comment="php5-tokenizer-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109414" comment="php5-wddx-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109415" comment="php5-xmlreader-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109416" comment="php5-xmlrpc-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109417" comment="php5-xmlwriter-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109418" comment="php5-xsl-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109419" comment="php5-zip-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109420" comment="php5-zlib-5.6.1-21.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3330</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3330" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3330" source="CVE"/>
    <description>
    The php_handler function in sapi/apache2handler/sapi_apache2.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8, when the Apache HTTP Server 2.4.x is used, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via pipelined HTTP requests that result in a "deconfigured interpreter."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109363" comment="apache2-mod_php5-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109364" comment="php5-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109365" comment="php5-bcmath-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109366" comment="php5-bz2-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109367" comment="php5-calendar-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109368" comment="php5-ctype-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109369" comment="php5-curl-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109370" comment="php5-dba-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109371" comment="php5-devel-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109372" comment="php5-dom-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109373" comment="php5-enchant-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109374" comment="php5-exif-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109375" comment="php5-fastcgi-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109376" comment="php5-fileinfo-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109377" comment="php5-firebird-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109378" comment="php5-fpm-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109379" comment="php5-ftp-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109380" comment="php5-gd-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109381" comment="php5-gettext-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109382" comment="php5-gmp-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109383" comment="php5-iconv-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109384" comment="php5-imap-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109385" comment="php5-intl-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109386" comment="php5-json-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109387" comment="php5-ldap-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109388" comment="php5-mbstring-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109389" comment="php5-mcrypt-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109390" comment="php5-mssql-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109391" comment="php5-mysql-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109392" comment="php5-odbc-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109393" comment="php5-opcache-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109394" comment="php5-openssl-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109395" comment="php5-pcntl-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109396" comment="php5-pdo-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109397" comment="php5-pear-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109398" comment="php5-pgsql-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109399" comment="php5-phar-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109400" comment="php5-posix-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109401" comment="php5-pspell-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109402" comment="php5-readline-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109403" comment="php5-shmop-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109404" comment="php5-snmp-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109405" comment="php5-soap-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109406" comment="php5-sockets-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109407" comment="php5-sqlite-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109408" comment="php5-suhosin-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109409" comment="php5-sysvmsg-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109410" comment="php5-sysvsem-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109411" comment="php5-sysvshm-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109412" comment="php5-tidy-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109413" comment="php5-tokenizer-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109414" comment="php5-wddx-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109415" comment="php5-xmlreader-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109416" comment="php5-xmlrpc-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109417" comment="php5-xmlwriter-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109418" comment="php5-xsl-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109419" comment="php5-zip-5.6.1-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109420" comment="php5-zlib-5.6.1-21.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153333" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3333</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3333" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3333" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google V8 before 4.2.77.14, as used in Google Chrome before 42.0.2311.90, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109086" comment="chromedriver-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109087" comment="chromium-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109088" comment="chromium-desktop-gnome-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109089" comment="chromium-desktop-kde-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109090" comment="chromium-ffmpegsumo-42.0.2311.90-23.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153334" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3334</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3334" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3334" source="CVE"/>
    <description>
    browser/ui/website_settings/website_settings.cc in Google Chrome before 42.0.2311.90 does not always display "Media: Allowed by you" in a Permissions table after the user has granted camera permission to a web site, which might make it easier for user-assisted remote attackers to obtain sensitive video data from a device's physical environment via a crafted web site that turns on the camera at a time when the user believes that camera access is prohibited.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109086" comment="chromedriver-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109087" comment="chromium-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109088" comment="chromium-desktop-gnome-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109089" comment="chromium-desktop-kde-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109090" comment="chromium-ffmpegsumo-42.0.2311.90-23.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3335</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3335" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3335" source="CVE"/>
    <description>
    The NaClSandbox::InitializeLayerTwoSandbox function in components/nacl/loader/sandbox_linux/nacl_sandbox_linux.cc in Google Chrome before 42.0.2311.90 does not have RLIMIT_AS and RLIMIT_DATA limits for Native Client (aka NaCl) processes, which might make it easier for remote attackers to conduct row-hammer attacks or have unspecified other impact by leveraging the ability to run a crafted program in the NaCl sandbox.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109086" comment="chromedriver-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109087" comment="chromium-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109088" comment="chromium-desktop-gnome-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109089" comment="chromium-desktop-kde-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109090" comment="chromium-ffmpegsumo-42.0.2311.90-23.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3336</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3336" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3336" source="CVE"/>
    <description>
    Google Chrome before 42.0.2311.90 does not always ask the user before proceeding with CONTENT_SETTINGS_TYPE_FULLSCREEN and CONTENT_SETTINGS_TYPE_MOUSELOCK changes, which allows user-assisted remote attackers to cause a denial of service (UI disruption) by constructing a crafted HTML document containing JavaScript code with requestFullScreen and requestPointerLock calls, and arranging for the user to access this document with a file: URL.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109086" comment="chromedriver-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109087" comment="chromium-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109088" comment="chromium-desktop-gnome-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109089" comment="chromium-desktop-kde-42.0.2311.90-23.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109090" comment="chromium-ffmpegsumo-42.0.2311.90-23.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3339</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3339" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3339" source="CVE"/>
    <description>
    Race condition in the prepare_binprm function in fs/exec.c in the Linux kernel before 3.19.6 allows local users to gain privileges by executing a setuid program at a time instant when a chown to root is in progress, and the ownership is changed but the setuid bit is not yet stripped.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113567" comment="bbswitch-0.8-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113568" comment="bbswitch-kmp-default-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113569" comment="bbswitch-kmp-desktop-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113570" comment="bbswitch-kmp-pae-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113571" comment="bbswitch-kmp-xen-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113572" comment="cloop-2.639-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113573" comment="cloop-kmp-default-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113574" comment="cloop-kmp-desktop-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113575" comment="cloop-kmp-pae-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113576" comment="cloop-kmp-xen-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113577" comment="crash-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113578" comment="crash-devel-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113579" comment="crash-doc-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113580" comment="crash-eppic-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113581" comment="crash-gcore-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113582" comment="crash-kmp-default-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113583" comment="crash-kmp-desktop-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113584" comment="crash-kmp-pae-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113585" comment="crash-kmp-xen-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113586" comment="hdjmod-1.28-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113587" comment="hdjmod-kmp-default-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113588" comment="hdjmod-kmp-desktop-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113589" comment="hdjmod-kmp-pae-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113590" comment="hdjmod-kmp-xen-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113591" comment="ipset-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113592" comment="ipset-devel-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113593" comment="ipset-kmp-default-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113594" comment="ipset-kmp-desktop-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113595" comment="ipset-kmp-pae-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113596" comment="ipset-kmp-xen-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113598" comment="kernel-debug-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113599" comment="kernel-debug-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113600" comment="kernel-debug-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113601" comment="kernel-default-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113602" comment="kernel-default-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113603" comment="kernel-default-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113604" comment="kernel-desktop-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113605" comment="kernel-desktop-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113606" comment="kernel-desktop-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113617" comment="kernel-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113607" comment="kernel-docs-3.16.7-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113608" comment="kernel-ec2-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113609" comment="kernel-ec2-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113610" comment="kernel-ec2-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113618" comment="kernel-macros-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113611" comment="kernel-obs-build-3.16.7-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113613" comment="kernel-obs-qa-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113612" comment="kernel-obs-qa-xen-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113614" comment="kernel-pae-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113615" comment="kernel-pae-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113616" comment="kernel-pae-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113619" comment="kernel-source-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113620" comment="kernel-source-vanilla-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113621" comment="kernel-syms-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113622" comment="kernel-vanilla-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113623" comment="kernel-vanilla-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113624" comment="kernel-xen-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113625" comment="kernel-xen-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113626" comment="kernel-xen-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113597" comment="libipset3-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113627" comment="pcfclock-0.44-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113628" comment="pcfclock-kmp-default-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113629" comment="pcfclock-kmp-desktop-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113630" comment="pcfclock-kmp-pae-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113631" comment="vhba-kmp-20140629-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113632" comment="vhba-kmp-default-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113633" comment="vhba-kmp-desktop-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113634" comment="vhba-kmp-pae-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113635" comment="vhba-kmp-xen-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113636" comment="xen-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113637" comment="xen-devel-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113646" comment="xen-doc-html-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113647" comment="xen-kmp-default-4.4.2_06_k3.16.7_24-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113648" comment="xen-kmp-desktop-4.4.2_06_k3.16.7_24-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113639" comment="xen-libs-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113638" comment="xen-libs-32bit-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113649" comment="xen-tools-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113640" comment="xen-tools-domU-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113641" comment="xtables-addons-2.6-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113642" comment="xtables-addons-kmp-default-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113643" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113644" comment="xtables-addons-kmp-pae-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113645" comment="xtables-addons-kmp-xen-2.6_k3.16.7_24-11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3340</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3340" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3340" source="CVE"/>
    <description>
    Xen 4.2.x through 4.5.x does not initialize certain fields, which allows certain remote service domains to obtain sensitive information from memory via a (1) XEN_DOMCTL_gettscinfo or (2) XEN_SYSCTL_getdomaininfolist request.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110614" comment="xen-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110615" comment="xen-devel-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110619" comment="xen-doc-html-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110620" comment="xen-kmp-default-4.4.2_06_k3.16.7_21-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110621" comment="xen-kmp-desktop-4.4.2_06_k3.16.7_21-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110617" comment="xen-libs-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110616" comment="xen-libs-32bit-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110622" comment="xen-tools-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110618" comment="xen-tools-domU-4.4.2_06-23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3406</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3406" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3406" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121679" comment="perl-Module-Signature-0.79-4.4.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3407</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3407" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3407" source="CVE"/>
    <description>
    Module::Signature before 0.74 allows remote attackers to bypass signature verification for files via a signature file that does not list the files.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121679" comment="perl-Module-Signature-0.79-4.4.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3408</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3408" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3408" source="CVE"/>
    <description>
    Module::Signature before 0.74 allows remote attackers to execute arbitrary shell commands via a crafted SIGNATURE file which is not properly handled when generating checksums from a signed manifest.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121679" comment="perl-Module-Signature-0.79-4.4.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3409</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3409" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3409" source="CVE"/>
    <description>
    Untrusted search path vulnerability in Module::Signature before 0.75 allows local users to gain privileges via a Trojan horse module under the current working directory, as demonstrated by a Trojan horse Text::Diff module.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121679" comment="perl-Module-Signature-0.79-4.4.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3411</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3411" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3411" source="CVE"/>
    <description>
    PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read or write to arbitrary files via crafted input to an application that calls (1) a DOMDocument load method, (2) the xmlwriter_open_uri function, (3) the finfo_file function, or (4) the hash_hmac_file function, as demonstrated by a filename\0.xml attack that bypasses an intended configuration in which client users may read only .xml files.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110937" comment="apache2-mod_php5-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110938" comment="php5-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110939" comment="php5-bcmath-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110940" comment="php5-bz2-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110941" comment="php5-calendar-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110942" comment="php5-ctype-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110943" comment="php5-curl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110944" comment="php5-dba-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110945" comment="php5-devel-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110946" comment="php5-dom-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110947" comment="php5-enchant-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110948" comment="php5-exif-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110949" comment="php5-fastcgi-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110950" comment="php5-fileinfo-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110951" comment="php5-firebird-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110952" comment="php5-fpm-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110953" comment="php5-ftp-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110954" comment="php5-gd-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110955" comment="php5-gettext-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110956" comment="php5-gmp-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110957" comment="php5-iconv-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110958" comment="php5-imap-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110959" comment="php5-intl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110960" comment="php5-json-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110961" comment="php5-ldap-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110962" comment="php5-mbstring-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110963" comment="php5-mcrypt-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110964" comment="php5-mssql-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110965" comment="php5-mysql-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110966" comment="php5-odbc-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110967" comment="php5-opcache-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110968" comment="php5-openssl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110969" comment="php5-pcntl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110970" comment="php5-pdo-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110971" comment="php5-pear-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110972" comment="php5-pgsql-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110973" comment="php5-phar-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110974" comment="php5-posix-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110975" comment="php5-pspell-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110976" comment="php5-readline-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110977" comment="php5-shmop-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110978" comment="php5-snmp-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110979" comment="php5-soap-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110980" comment="php5-sockets-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110981" comment="php5-sqlite-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110982" comment="php5-suhosin-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110983" comment="php5-sysvmsg-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110984" comment="php5-sysvsem-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110985" comment="php5-sysvshm-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110986" comment="php5-tidy-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110987" comment="php5-tokenizer-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110988" comment="php5-wddx-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110989" comment="php5-xmlreader-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110990" comment="php5-xmlrpc-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110991" comment="php5-xmlwriter-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110992" comment="php5-xsl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110993" comment="php5-zip-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110994" comment="php5-zlib-5.6.1-30.6 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3412</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3412" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3412" source="CVE"/>
    <description>
    PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read arbitrary files via crafted input to an application that calls the stream_resolve_include_path function in ext/standard/streamsfuncs.c, as demonstrated by a filename\0.extension attack that bypasses an intended configuration in which client users may read files with only one specific extension.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110937" comment="apache2-mod_php5-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110938" comment="php5-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110939" comment="php5-bcmath-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110940" comment="php5-bz2-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110941" comment="php5-calendar-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110942" comment="php5-ctype-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110943" comment="php5-curl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110944" comment="php5-dba-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110945" comment="php5-devel-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110946" comment="php5-dom-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110947" comment="php5-enchant-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110948" comment="php5-exif-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110949" comment="php5-fastcgi-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110950" comment="php5-fileinfo-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110951" comment="php5-firebird-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110952" comment="php5-fpm-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110953" comment="php5-ftp-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110954" comment="php5-gd-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110955" comment="php5-gettext-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110956" comment="php5-gmp-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110957" comment="php5-iconv-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110958" comment="php5-imap-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110959" comment="php5-intl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110960" comment="php5-json-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110961" comment="php5-ldap-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110962" comment="php5-mbstring-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110963" comment="php5-mcrypt-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110964" comment="php5-mssql-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110965" comment="php5-mysql-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110966" comment="php5-odbc-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110967" comment="php5-opcache-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110968" comment="php5-openssl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110969" comment="php5-pcntl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110970" comment="php5-pdo-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110971" comment="php5-pear-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110972" comment="php5-pgsql-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110973" comment="php5-phar-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110974" comment="php5-posix-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110975" comment="php5-pspell-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110976" comment="php5-readline-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110977" comment="php5-shmop-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110978" comment="php5-snmp-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110979" comment="php5-soap-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110980" comment="php5-sockets-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110981" comment="php5-sqlite-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110982" comment="php5-suhosin-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110983" comment="php5-sysvmsg-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110984" comment="php5-sysvsem-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110985" comment="php5-sysvshm-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110986" comment="php5-tidy-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110987" comment="php5-tokenizer-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110988" comment="php5-wddx-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110989" comment="php5-xmlreader-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110990" comment="php5-xmlrpc-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110991" comment="php5-xmlwriter-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110992" comment="php5-xsl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110993" comment="php5-zip-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110994" comment="php5-zlib-5.6.1-30.6 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3427</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3427" source="CVE"/>
    <description>
    Quassel before 0.12.2 does not properly re-initialize the database session when the PostgreSQL database is restarted, which allows remote attackers to conduct SQL injection attacks via a \ (backslash) in a message.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4422.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109769" comment="quassel-0.10.0-3.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109770" comment="quassel-base-0.10.0-3.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109771" comment="quassel-client-0.10.0-3.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109772" comment="quassel-core-0.10.0-3.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109773" comment="quassel-mono-0.10.0-3.10.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3451</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3451" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3451" source="CVE"/>
    <description>
    The _clone function in XML::LibXML before 2.0119 does not properly set the expand_entities option, which allows remote attackers to conduct XML external entity (XXE) attacks via crafted XML data to the (1) new or (2) load_xml function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114194" comment="perl-XML-LibXML-2.0121-2.3.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3455</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3455" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3455" source="CVE"/>
    <description>
    Squid 3.2.x before 3.2.14, 3.3.x before 3.3.14, 3.4.x before 3.4.13, and 3.5.x before 3.5.4, when configured with client-first SSL-bump, do not properly validate the domain or hostname fields of X.509 certificates, which allows man-in-the-middle attackers to spoof SSL servers via a valid certificate.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114320" comment="squid-3.4.4-3.7.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3456</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456" source="CVE"/>
    <description>
    The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_COMMAND, or other unspecified commands, aka VENOM.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109813" comment="libcacard-2.1.3-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109814" comment="libcacard-devel-2.1.3-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109815" comment="libcacard0-2.1.3-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113820" comment="python-virtualbox-4.3.30-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109817" comment="qemu-2.1.3-7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109818" comment="qemu-arm-2.1.3-7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109819" comment="qemu-block-curl-2.1.3-7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109820" comment="qemu-extra-2.1.3-7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109821" comment="qemu-guest-agent-2.1.3-7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109822" comment="qemu-ipxe-1.0.0-7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109823" comment="qemu-ksm-2.1.3-7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109824" comment="qemu-kvm-2.1.3-7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109825" comment="qemu-lang-2.1.3-7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109816" comment="qemu-linux-user-2.1.3-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109826" comment="qemu-ppc-2.1.3-7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109827" comment="qemu-s390-2.1.3-7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109828" comment="qemu-seabios-1.7.5-7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109829" comment="qemu-sgabios-8-7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109830" comment="qemu-tools-2.1.3-7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109831" comment="qemu-vgabios-1.7.5-7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109832" comment="qemu-x86-2.1.3-7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113821" comment="virtualbox-4.3.30-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113822" comment="virtualbox-devel-4.3.30-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113823" comment="virtualbox-guest-desktop-icons-4.3.30-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113824" comment="virtualbox-guest-kmp-default-4.3.30_k3.16.7_21-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113825" comment="virtualbox-guest-kmp-desktop-4.3.30_k3.16.7_21-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113826" comment="virtualbox-guest-kmp-pae-4.3.30_k3.16.7_21-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113827" comment="virtualbox-guest-tools-4.3.30-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113828" comment="virtualbox-guest-x11-4.3.30-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113829" comment="virtualbox-host-kmp-default-4.3.30_k3.16.7_21-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113830" comment="virtualbox-host-kmp-desktop-4.3.30_k3.16.7_21-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113831" comment="virtualbox-host-kmp-pae-4.3.30_k3.16.7_21-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113832" comment="virtualbox-host-source-4.3.30-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113833" comment="virtualbox-qt-4.3.30-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113834" comment="virtualbox-websrv-4.3.30-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110614" comment="xen-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110615" comment="xen-devel-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110619" comment="xen-doc-html-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110620" comment="xen-kmp-default-4.4.2_06_k3.16.7_21-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110621" comment="xen-kmp-desktop-4.4.2_06_k3.16.7_21-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110617" comment="xen-libs-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110616" comment="xen-libs-32bit-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110622" comment="xen-tools-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110618" comment="xen-tools-domU-4.4.2_06-23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3622</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3622" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3622" source="CVE"/>
    <description>
    The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.5 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted certificate.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113495" comment="gnutls-3.2.18-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113496" comment="libgnutls-devel-3.2.18-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113497" comment="libgnutls-devel-32bit-3.2.18-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113498" comment="libgnutls-openssl-devel-3.2.18-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113499" comment="libgnutls-openssl27-3.2.18-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113500" comment="libgnutls28-3.2.18-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113501" comment="libgnutls28-32bit-3.2.18-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113502" comment="libgnutlsxx-devel-3.2.18-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113503" comment="libgnutlsxx28-3.2.18-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128875" comment="libtasn1-3.7-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128876" comment="libtasn1-6-3.7-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128877" comment="libtasn1-6-32bit-3.7-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128878" comment="libtasn1-devel-3.7-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128879" comment="libtasn1-devel-32bit-3.7-2.7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3627</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3627" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3627" source="CVE"/>
    <description>
    Libcontainer and Docker Engine before 1.6.1 opens the file-descriptor passed to the pid-1 process before performing the chroot, which allows local users to gain privileges via a symlink attack in an image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109688" comment="docker-1.6.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109689" comment="docker-bash-completion-1.6.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109690" comment="docker-zsh-completion-1.6.1-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3629</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3629" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3629" source="CVE"/>
    <description>
    Libcontainer 1.6.0, as used in Docker Engine, allows local users to escape containerization ("mount namespace breakout") and write to arbitrary file on the host system via a symlink attack in an image when respawning a container.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109688" comment="docker-1.6.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109689" comment="docker-bash-completion-1.6.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109690" comment="docker-zsh-completion-1.6.1-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3630</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3630" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3630" source="CVE"/>
    <description>
    Docker Engine before 1.6.1 uses weak permissions for (1) /proc/asound, (2) /proc/timer_stats, (3) /proc/latency_stats, and (4) /proc/fs, which allows local users to modify the host, obtain sensitive information, and perform protocol downgrade attacks via a crafted image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109688" comment="docker-1.6.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109689" comment="docker-bash-completion-1.6.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109690" comment="docker-zsh-completion-1.6.1-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3631</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3631" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3631" source="CVE"/>
    <description>
    Docker Engine before 1.6.1 allows local users to set arbitrary Linux Security Modules (LSM) and docker_t policies via an image that allows volumes to override files in /proc.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109688" comment="docker-1.6.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109689" comment="docker-bash-completion-1.6.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109690" comment="docker-zsh-completion-1.6.1-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3636</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3636" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3636" source="CVE"/>
    <description>
    The ping_unhash function in net/ipv4/ping.c in the Linux kernel before 4.0.3 does not initialize a certain list data structure during an unhash operation, which allows local users to gain privileges or cause a denial of service (use-after-free and system crash) by leveraging the ability to make a SOCK_DGRAM socket system call for the IPPROTO_ICMP or IPPROTO_ICMPV6 protocol, and then making a connect system call after a disconnect.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113567" comment="bbswitch-0.8-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113568" comment="bbswitch-kmp-default-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113569" comment="bbswitch-kmp-desktop-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113570" comment="bbswitch-kmp-pae-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113571" comment="bbswitch-kmp-xen-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113572" comment="cloop-2.639-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113573" comment="cloop-kmp-default-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113574" comment="cloop-kmp-desktop-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113575" comment="cloop-kmp-pae-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113576" comment="cloop-kmp-xen-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113577" comment="crash-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113578" comment="crash-devel-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113579" comment="crash-doc-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113580" comment="crash-eppic-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113581" comment="crash-gcore-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113582" comment="crash-kmp-default-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113583" comment="crash-kmp-desktop-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113584" comment="crash-kmp-pae-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113585" comment="crash-kmp-xen-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113586" comment="hdjmod-1.28-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113587" comment="hdjmod-kmp-default-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113588" comment="hdjmod-kmp-desktop-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113589" comment="hdjmod-kmp-pae-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113590" comment="hdjmod-kmp-xen-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113591" comment="ipset-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113592" comment="ipset-devel-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113593" comment="ipset-kmp-default-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113594" comment="ipset-kmp-desktop-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113595" comment="ipset-kmp-pae-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113596" comment="ipset-kmp-xen-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113598" comment="kernel-debug-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113599" comment="kernel-debug-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113600" comment="kernel-debug-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113601" comment="kernel-default-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113602" comment="kernel-default-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113603" comment="kernel-default-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113604" comment="kernel-desktop-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113605" comment="kernel-desktop-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113606" comment="kernel-desktop-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113617" comment="kernel-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113607" comment="kernel-docs-3.16.7-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113608" comment="kernel-ec2-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113609" comment="kernel-ec2-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113610" comment="kernel-ec2-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113618" comment="kernel-macros-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113611" comment="kernel-obs-build-3.16.7-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113613" comment="kernel-obs-qa-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113612" comment="kernel-obs-qa-xen-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113614" comment="kernel-pae-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113615" comment="kernel-pae-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113616" comment="kernel-pae-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113619" comment="kernel-source-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113620" comment="kernel-source-vanilla-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113621" comment="kernel-syms-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113622" comment="kernel-vanilla-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113623" comment="kernel-vanilla-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113624" comment="kernel-xen-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113625" comment="kernel-xen-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113626" comment="kernel-xen-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113597" comment="libipset3-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113627" comment="pcfclock-0.44-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113628" comment="pcfclock-kmp-default-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113629" comment="pcfclock-kmp-desktop-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113630" comment="pcfclock-kmp-pae-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113631" comment="vhba-kmp-20140629-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113632" comment="vhba-kmp-default-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113633" comment="vhba-kmp-desktop-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113634" comment="vhba-kmp-pae-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113635" comment="vhba-kmp-xen-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113636" comment="xen-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113637" comment="xen-devel-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113646" comment="xen-doc-html-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113647" comment="xen-kmp-default-4.4.2_06_k3.16.7_24-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113648" comment="xen-kmp-desktop-4.4.2_06_k3.16.7_24-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113639" comment="xen-libs-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113638" comment="xen-libs-32bit-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113649" comment="xen-tools-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113640" comment="xen-tools-domU-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113641" comment="xtables-addons-2.6-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113642" comment="xtables-addons-kmp-default-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113643" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113644" comment="xtables-addons-kmp-pae-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113645" comment="xtables-addons-kmp-xen-2.6_k3.16.7_24-11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3658</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3658" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3658" source="CVE"/>
    <description>
    The Page Loading functionality in WebKit in Apple Safari before 6.2.7, 7.x before 7.1.7, and 8.x before 8.0.7, as used in Apple iOS before 8.4 and other products, does not properly consider redirects during decisions about sending an Origin header, which makes it easier for remote attackers to bypass CSRF protection mechanisms via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125580" comment="libjavascriptcoregtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125581" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125582" comment="libjavascriptcoregtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125583" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125584" comment="libwebkitgtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125585" comment="libwebkitgtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125586" comment="libwebkitgtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125587" comment="libwebkitgtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125588" comment="libwebkitgtk-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125589" comment="libwebkitgtk2-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125590" comment="libwebkitgtk3-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125591" comment="libwebkitgtk3-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125592" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125593" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125594" comment="typelib-1_0-WebKit-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125595" comment="typelib-1_0-WebKit-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125596" comment="webkit-jsc-1-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125597" comment="webkit-jsc-3-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125598" comment="webkitgtk-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125599" comment="webkitgtk3-2.4.10-13.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3659</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3659" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3659" source="CVE"/>
    <description>
    The SQLite authorizer in the Storage functionality in WebKit in Apple Safari before 6.2.7, 7.x before 7.1.7, and 8.x before 8.0.7, as used in Apple iOS before 8.4 and other products, does not properly restrict access to SQL functions, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125580" comment="libjavascriptcoregtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125581" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125582" comment="libjavascriptcoregtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125583" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125584" comment="libwebkitgtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125585" comment="libwebkitgtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125586" comment="libwebkitgtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125587" comment="libwebkitgtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125588" comment="libwebkitgtk-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125589" comment="libwebkitgtk2-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125590" comment="libwebkitgtk3-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125591" comment="libwebkitgtk3-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125592" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125593" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125594" comment="typelib-1_0-WebKit-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125595" comment="typelib-1_0-WebKit-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125596" comment="webkit-jsc-1-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125597" comment="webkit-jsc-3-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125598" comment="webkitgtk-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125599" comment="webkitgtk3-2.4.10-13.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3727</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3727" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3727" source="CVE"/>
    <description>
    WebKit in Apple Safari before 6.2.7, 7.x before 7.1.7, and 8.x before 8.0.7, as used in Apple iOS before 8.4 and other products, does not properly restrict rename operations on WebSQL tables, which allows remote attackers to access an arbitrary web site's database via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125580" comment="libjavascriptcoregtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125581" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125582" comment="libjavascriptcoregtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125583" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125584" comment="libwebkitgtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125585" comment="libwebkitgtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125586" comment="libwebkitgtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125587" comment="libwebkitgtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125588" comment="libwebkitgtk-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125589" comment="libwebkitgtk2-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125590" comment="libwebkitgtk3-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125591" comment="libwebkitgtk3-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125592" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125593" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125594" comment="typelib-1_0-WebKit-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125595" comment="typelib-1_0-WebKit-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125596" comment="webkit-jsc-1-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125597" comment="webkit-jsc-3-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125598" comment="webkitgtk-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125599" comment="webkitgtk3-2.4.10-13.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3731</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3731" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3731" source="CVE"/>
    <description>
    WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125580" comment="libjavascriptcoregtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125581" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125582" comment="libjavascriptcoregtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125583" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125584" comment="libwebkitgtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125585" comment="libwebkitgtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125586" comment="libwebkitgtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125587" comment="libwebkitgtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125588" comment="libwebkitgtk-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125589" comment="libwebkitgtk2-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125590" comment="libwebkitgtk3-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125591" comment="libwebkitgtk3-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125592" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125593" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125594" comment="typelib-1_0-WebKit-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125595" comment="typelib-1_0-WebKit-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125596" comment="webkit-jsc-1-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125597" comment="webkit-jsc-3-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125598" comment="webkitgtk-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125599" comment="webkitgtk3-2.4.10-13.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3741</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3741" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3741" source="CVE"/>
    <description>
    WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125580" comment="libjavascriptcoregtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125581" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125582" comment="libjavascriptcoregtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125583" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125584" comment="libwebkitgtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125585" comment="libwebkitgtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125586" comment="libwebkitgtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125587" comment="libwebkitgtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125588" comment="libwebkitgtk-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125589" comment="libwebkitgtk2-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125590" comment="libwebkitgtk3-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125591" comment="libwebkitgtk3-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125592" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125593" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125594" comment="typelib-1_0-WebKit-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125595" comment="typelib-1_0-WebKit-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125596" comment="webkit-jsc-1-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125597" comment="webkit-jsc-3-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125598" comment="webkitgtk-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125599" comment="webkitgtk3-2.4.10-13.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3743</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3743" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3743" source="CVE"/>
    <description>
    WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125580" comment="libjavascriptcoregtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125581" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125582" comment="libjavascriptcoregtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125583" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125584" comment="libwebkitgtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125585" comment="libwebkitgtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125586" comment="libwebkitgtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125587" comment="libwebkitgtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125588" comment="libwebkitgtk-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125589" comment="libwebkitgtk2-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125590" comment="libwebkitgtk3-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125591" comment="libwebkitgtk3-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125592" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125593" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125594" comment="typelib-1_0-WebKit-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125595" comment="typelib-1_0-WebKit-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125596" comment="webkit-jsc-1-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125597" comment="webkit-jsc-3-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125598" comment="webkitgtk-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125599" comment="webkitgtk3-2.4.10-13.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3745</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3745" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3745" source="CVE"/>
    <description>
    WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125580" comment="libjavascriptcoregtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125581" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125582" comment="libjavascriptcoregtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125583" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125584" comment="libwebkitgtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125585" comment="libwebkitgtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125586" comment="libwebkitgtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125587" comment="libwebkitgtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125588" comment="libwebkitgtk-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125589" comment="libwebkitgtk2-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125590" comment="libwebkitgtk3-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125591" comment="libwebkitgtk3-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125592" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125593" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125594" comment="typelib-1_0-WebKit-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125595" comment="typelib-1_0-WebKit-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125596" comment="webkit-jsc-1-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125597" comment="webkit-jsc-3-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125598" comment="webkitgtk-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125599" comment="webkitgtk3-2.4.10-13.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3747</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3747" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3747" source="CVE"/>
    <description>
    WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125580" comment="libjavascriptcoregtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125581" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125582" comment="libjavascriptcoregtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125583" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125584" comment="libwebkitgtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125585" comment="libwebkitgtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125586" comment="libwebkitgtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125587" comment="libwebkitgtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125588" comment="libwebkitgtk-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125589" comment="libwebkitgtk2-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125590" comment="libwebkitgtk3-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125591" comment="libwebkitgtk3-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125592" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125593" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125594" comment="typelib-1_0-WebKit-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125595" comment="typelib-1_0-WebKit-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125596" comment="webkit-jsc-1-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125597" comment="webkit-jsc-3-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125598" comment="webkitgtk-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125599" comment="webkitgtk3-2.4.10-13.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3748</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3748" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3748" source="CVE"/>
    <description>
    WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125580" comment="libjavascriptcoregtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125581" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125582" comment="libjavascriptcoregtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125583" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125584" comment="libwebkitgtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125585" comment="libwebkitgtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125586" comment="libwebkitgtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125587" comment="libwebkitgtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125588" comment="libwebkitgtk-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125589" comment="libwebkitgtk2-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125590" comment="libwebkitgtk3-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125591" comment="libwebkitgtk3-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125592" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125593" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125594" comment="typelib-1_0-WebKit-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125595" comment="typelib-1_0-WebKit-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125596" comment="webkit-jsc-1-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125597" comment="webkit-jsc-3-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125598" comment="webkitgtk-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125599" comment="webkitgtk3-2.4.10-13.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3749</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3749" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3749" source="CVE"/>
    <description>
    WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125580" comment="libjavascriptcoregtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125581" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125582" comment="libjavascriptcoregtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125583" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125584" comment="libwebkitgtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125585" comment="libwebkitgtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125586" comment="libwebkitgtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125587" comment="libwebkitgtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125588" comment="libwebkitgtk-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125589" comment="libwebkitgtk2-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125590" comment="libwebkitgtk3-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125591" comment="libwebkitgtk3-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125592" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125593" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125594" comment="typelib-1_0-WebKit-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125595" comment="typelib-1_0-WebKit-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125596" comment="webkit-jsc-1-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125597" comment="webkit-jsc-3-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125598" comment="webkitgtk-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125599" comment="webkitgtk3-2.4.10-13.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3752</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3752" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3752" source="CVE"/>
    <description>
    The Content Security Policy implementation in WebKit in Apple Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, as used in iOS before 8.4.1 and other products, does not properly restrict cookie transmission for report requests, which allows remote attackers to obtain sensitive information via vectors involving (1) a cross-origin request or (2) a private-browsing request.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125580" comment="libjavascriptcoregtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125581" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125582" comment="libjavascriptcoregtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125583" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125584" comment="libwebkitgtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125585" comment="libwebkitgtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125586" comment="libwebkitgtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125587" comment="libwebkitgtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125588" comment="libwebkitgtk-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125589" comment="libwebkitgtk2-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125590" comment="libwebkitgtk3-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125591" comment="libwebkitgtk3-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125592" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125593" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125594" comment="typelib-1_0-WebKit-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125595" comment="typelib-1_0-WebKit-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125596" comment="webkit-jsc-1-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125597" comment="webkit-jsc-3-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125598" comment="webkitgtk-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125599" comment="webkitgtk3-2.4.10-13.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3808</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3808" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3808" source="CVE"/>
    <description>
    The dissect_lbmr_pser function in epan/dissectors/packet-lbmr.c in the LBMR dissector in Wireshark 1.12.x before 1.12.5 does not reject a zero length, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109809" comment="wireshark-1.12.5-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109810" comment="wireshark-devel-1.12.5-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109811" comment="wireshark-ui-gtk-1.12.5-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109812" comment="wireshark-ui-qt-1.12.5-15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3809</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3809" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3809" source="CVE"/>
    <description>
    The dissect_lbmr_pser function in epan/dissectors/packet-lbmr.c in the LBMR dissector in Wireshark 1.12.x before 1.12.5 does not properly track the current offset, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109809" comment="wireshark-1.12.5-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109810" comment="wireshark-devel-1.12.5-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109811" comment="wireshark-ui-gtk-1.12.5-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109812" comment="wireshark-ui-qt-1.12.5-15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3810</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3810" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3810" source="CVE"/>
    <description>
    epan/dissectors/packet-websocket.c in the WebSocket dissector in Wireshark 1.12.x before 1.12.5 uses a recursive algorithm, which allows remote attackers to cause a denial of service (CPU consumption) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109809" comment="wireshark-1.12.5-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109810" comment="wireshark-devel-1.12.5-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109811" comment="wireshark-ui-gtk-1.12.5-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109812" comment="wireshark-ui-qt-1.12.5-15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3811</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3811" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3811" source="CVE"/>
    <description>
    epan/dissectors/packet-wcp.c in the WCP dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 improperly refers to previously processed bytes, which allows remote attackers to cause a denial of service (application crash) via a crafted packet, a different vulnerability than CVE-2015-2188.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109809" comment="wireshark-1.12.5-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109810" comment="wireshark-devel-1.12.5-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109811" comment="wireshark-ui-gtk-1.12.5-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109812" comment="wireshark-ui-qt-1.12.5-15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3812</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3812" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3812" source="CVE"/>
    <description>
    Multiple memory leaks in the x11_init_protocol function in epan/dissectors/packet-x11.c in the X11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 allow remote attackers to cause a denial of service (memory consumption) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109809" comment="wireshark-1.12.5-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109810" comment="wireshark-devel-1.12.5-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109811" comment="wireshark-ui-gtk-1.12.5-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109812" comment="wireshark-ui-qt-1.12.5-15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3813</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3813" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3813" source="CVE"/>
    <description>
    The fragment_add_work function in epan/reassemble.c in the packet-reassembly feature in Wireshark 1.12.x before 1.12.5 does not properly determine the defragmentation state in a case of an insufficient snapshot length, which allows remote attackers to cause a denial of service (memory consumption) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109809" comment="wireshark-1.12.5-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109810" comment="wireshark-devel-1.12.5-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109811" comment="wireshark-ui-gtk-1.12.5-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109812" comment="wireshark-ui-qt-1.12.5-15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3814</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3814" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3814" source="CVE"/>
    <description>
    The (1) dissect_tfs_request and (2) dissect_tfs_response functions in epan/dissectors/packet-ieee80211.c in the IEEE 802.11 dissector in Wireshark 1.10.x before 1.10.14 and 1.12.x before 1.12.5 interpret a zero value as a length rather than an error condition, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109809" comment="wireshark-1.12.5-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109810" comment="wireshark-devel-1.12.5-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109811" comment="wireshark-ui-gtk-1.12.5-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109812" comment="wireshark-ui-qt-1.12.5-15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3815</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3815" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3815" source="CVE"/>
    <description>
    The detect_version function in wiretap/logcat.c in the Android Logcat file parser in Wireshark 1.12.x before 1.12.5 does not check the length of the payload, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a packet with a crafted payload, as demonstrated by a length of zero, a different vulnerability than CVE-2015-3906.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109809" comment="wireshark-1.12.5-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109810" comment="wireshark-devel-1.12.5-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109811" comment="wireshark-ui-gtk-1.12.5-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109812" comment="wireshark-ui-qt-1.12.5-15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3885</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3885" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3885" source="CVE"/>
    <description>
    Integer overflow in the ljpeg_start function in dcraw 7.00 and earlier allows remote attackers to cause a denial of service (crash) via a crafted image, which triggers a buffer overflow, related to the len variable.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009109781" comment="libraw-0.16.0-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109782" comment="libraw-devel-0.16.0-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109783" comment="libraw-devel-static-0.16.0-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109784" comment="libraw-tools-0.16.0-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109785" comment="libraw10-0.16.0-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009109743" comment="libraw9-0.15.4-2.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3902</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3902" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3902" source="CVE"/>
    <description>
    Multiple cross-site request forgery (CSRF) vulnerabilities in the setup process in phpMyAdmin 4.0.x before 4.0.10.10, 4.2.x before 4.2.13.3, 4.3.x before 4.3.13.1, and 4.4.x before 4.4.6.1 allow remote attackers to hijack the authentication of administrators for requests that modify the configuration file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110879" comment="phpMyAdmin-4.2.13.3-11.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3903</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3903" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3903" source="CVE"/>
    <description>
    libraries/Config.class.php in phpMyAdmin 4.0.x before 4.0.10.10, 4.2.x before 4.2.13.3, 4.3.x before 4.3.13.1, and 4.4.x before 4.4.6.1 disables X.509 certificate verification for GitHub API calls over SSL, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110879" comment="phpMyAdmin-4.2.13.3-11.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3908</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-3908" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3908" source="CVE"/>
    <description>
    Ansible before 1.9.2 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113965" comment="ansible-1.7.1-2.8.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4000</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4000" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000" source="CVE"/>
    <description>
    The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111145" comment="MozillaFirefox-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111146" comment="MozillaFirefox-branding-upstream-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111147" comment="MozillaFirefox-buildsymbols-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111148" comment="MozillaFirefox-devel-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111149" comment="MozillaFirefox-translations-common-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111150" comment="MozillaFirefox-translations-other-39.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111220" comment="MozillaThunderbird-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111221" comment="MozillaThunderbird-buildsymbols-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111222" comment="MozillaThunderbird-devel-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111223" comment="MozillaThunderbird-translations-common-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111224" comment="MozillaThunderbird-translations-other-38.1.0-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114876" comment="apache2-2.4.10-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114877" comment="apache2-devel-2.4.10-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114878" comment="apache2-doc-2.4.10-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114879" comment="apache2-event-2.4.10-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114880" comment="apache2-example-pages-2.4.10-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114881" comment="apache2-prefork-2.4.10-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114882" comment="apache2-utils-2.4.10-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114883" comment="apache2-worker-2.4.10-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122067" comment="compat-libldap-2_3-0-2.3.37-8.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111326" comment="java-1_7_0-openjdk-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111327" comment="java-1_7_0-openjdk-accessibility-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111323" comment="java-1_7_0-openjdk-bootstrap-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111324" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111325" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111328" comment="java-1_7_0-openjdk-demo-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111329" comment="java-1_7_0-openjdk-devel-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111330" comment="java-1_7_0-openjdk-headless-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111331" comment="java-1_7_0-openjdk-javadoc-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111332" comment="java-1_7_0-openjdk-src-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111333" comment="java-1_8_0-openjdk-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111334" comment="java-1_8_0-openjdk-accessibility-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111335" comment="java-1_8_0-openjdk-demo-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111336" comment="java-1_8_0-openjdk-devel-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111337" comment="java-1_8_0-openjdk-headless-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111338" comment="java-1_8_0-openjdk-javadoc-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111339" comment="java-1_8_0-openjdk-src-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111311" comment="libcrypto34-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111312" comment="libcrypto34-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111151" comment="libfreebl3-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111152" comment="libfreebl3-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122068" comment="libldap-2_4-2-2.4.39-8.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122069" comment="libldap-2_4-2-32bit-2.4.39-8.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111015" comment="libmysql56client18-5.6.25-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111014" comment="libmysql56client18-32bit-5.6.25-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111017" comment="libmysql56client_r18-5.6.25-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111016" comment="libmysql56client_r18-32bit-5.6.25-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111084" comment="libmysqlclient-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111085" comment="libmysqlclient18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111086" comment="libmysqlclient18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111087" comment="libmysqlclient_r18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111088" comment="libmysqlclient_r18-32bit-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111089" comment="libmysqld-devel-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111090" comment="libmysqld18-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110688" comment="libopenssl-devel-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110689" comment="libopenssl-devel-32bit-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110690" comment="libopenssl1_0_0-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110691" comment="libopenssl1_0_0-32bit-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110692" comment="libopenssl1_0_0-hmac-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110693" comment="libopenssl1_0_0-hmac-32bit-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111313" comment="libressl-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111314" comment="libressl-devel-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111315" comment="libressl-devel-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111316" comment="libressl-devel-doc-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111153" comment="libsoftokn3-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111154" comment="libsoftokn3-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111317" comment="libssl33-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111318" comment="libssl33-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111319" comment="libtls4-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111320" comment="libtls4-32bit-2.2.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111091" comment="mariadb-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111092" comment="mariadb-bench-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111093" comment="mariadb-client-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111094" comment="mariadb-errormessages-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111095" comment="mariadb-test-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111096" comment="mariadb-tools-10.0.20-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111155" comment="mozilla-nss-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111156" comment="mozilla-nss-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111157" comment="mozilla-nss-certs-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111158" comment="mozilla-nss-certs-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111159" comment="mozilla-nss-devel-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111160" comment="mozilla-nss-sysinit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111161" comment="mozilla-nss-sysinit-32bit-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111162" comment="mozilla-nss-tools-3.19.2-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111018" comment="mysql-community-server-5.6.25-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111019" comment="mysql-community-server-bench-5.6.25-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111020" comment="mysql-community-server-client-5.6.25-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111021" comment="mysql-community-server-errormessages-5.6.25-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111022" comment="mysql-community-server-test-5.6.25-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111023" comment="mysql-community-server-tools-5.6.25-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122070" comment="openldap2-2.4.39-8.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122071" comment="openldap2-back-meta-2.4.39-8.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122072" comment="openldap2-back-perl-2.4.39-8.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122073" comment="openldap2-back-sql-2.4.39-8.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122074" comment="openldap2-client-2.4.39-8.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122075" comment="openldap2-devel-2.4.39-8.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122076" comment="openldap2-devel-32bit-2.4.39-8.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122077" comment="openldap2-devel-static-2.4.39-8.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122078" comment="openldap2-doc-2.4.39-8.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110694" comment="openssl-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110695" comment="openssl-doc-1.0.1k-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123303" comment="socat-1.7.3.1-2.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4001</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4001" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4001" source="CVE"/>
    <description>
    Integer signedness error in the oz_hcd_get_desc_cnf function in drivers/staging/ozwpan/ozhcd.c in the OZWPAN driver in the Linux kernel through 4.0.5 allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113567" comment="bbswitch-0.8-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113568" comment="bbswitch-kmp-default-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113569" comment="bbswitch-kmp-desktop-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113570" comment="bbswitch-kmp-pae-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113571" comment="bbswitch-kmp-xen-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113572" comment="cloop-2.639-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113573" comment="cloop-kmp-default-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113574" comment="cloop-kmp-desktop-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113575" comment="cloop-kmp-pae-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113576" comment="cloop-kmp-xen-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113577" comment="crash-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113578" comment="crash-devel-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113579" comment="crash-doc-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113580" comment="crash-eppic-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113581" comment="crash-gcore-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113582" comment="crash-kmp-default-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113583" comment="crash-kmp-desktop-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113584" comment="crash-kmp-pae-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113585" comment="crash-kmp-xen-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113586" comment="hdjmod-1.28-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113587" comment="hdjmod-kmp-default-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113588" comment="hdjmod-kmp-desktop-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113589" comment="hdjmod-kmp-pae-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113590" comment="hdjmod-kmp-xen-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113591" comment="ipset-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113592" comment="ipset-devel-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113593" comment="ipset-kmp-default-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113594" comment="ipset-kmp-desktop-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113595" comment="ipset-kmp-pae-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113596" comment="ipset-kmp-xen-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113598" comment="kernel-debug-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113599" comment="kernel-debug-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113600" comment="kernel-debug-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113601" comment="kernel-default-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113602" comment="kernel-default-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113603" comment="kernel-default-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113604" comment="kernel-desktop-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113605" comment="kernel-desktop-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113606" comment="kernel-desktop-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113617" comment="kernel-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113607" comment="kernel-docs-3.16.7-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113608" comment="kernel-ec2-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113609" comment="kernel-ec2-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113610" comment="kernel-ec2-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113618" comment="kernel-macros-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113611" comment="kernel-obs-build-3.16.7-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113613" comment="kernel-obs-qa-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113612" comment="kernel-obs-qa-xen-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113614" comment="kernel-pae-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113615" comment="kernel-pae-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113616" comment="kernel-pae-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113619" comment="kernel-source-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113620" comment="kernel-source-vanilla-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113621" comment="kernel-syms-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113622" comment="kernel-vanilla-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113623" comment="kernel-vanilla-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113624" comment="kernel-xen-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113625" comment="kernel-xen-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113626" comment="kernel-xen-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113597" comment="libipset3-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113627" comment="pcfclock-0.44-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113628" comment="pcfclock-kmp-default-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113629" comment="pcfclock-kmp-desktop-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113630" comment="pcfclock-kmp-pae-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113631" comment="vhba-kmp-20140629-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113632" comment="vhba-kmp-default-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113633" comment="vhba-kmp-desktop-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113634" comment="vhba-kmp-pae-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113635" comment="vhba-kmp-xen-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113636" comment="xen-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113637" comment="xen-devel-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113646" comment="xen-doc-html-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113647" comment="xen-kmp-default-4.4.2_06_k3.16.7_24-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113648" comment="xen-kmp-desktop-4.4.2_06_k3.16.7_24-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113639" comment="xen-libs-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113638" comment="xen-libs-32bit-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113649" comment="xen-tools-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113640" comment="xen-tools-domU-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113641" comment="xtables-addons-2.6-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113642" comment="xtables-addons-kmp-default-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113643" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113644" comment="xtables-addons-kmp-pae-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113645" comment="xtables-addons-kmp-xen-2.6_k3.16.7_24-11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4002</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4002" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4002" source="CVE"/>
    <description>
    drivers/staging/ozwpan/ozusbsvc1.c in the OZWPAN driver in the Linux kernel through 4.0.5 does not ensure that certain length values are sufficiently large, which allows remote attackers to cause a denial of service (system crash or large loop) or possibly execute arbitrary code via a crafted packet, related to the (1) oz_usb_rx and (2) oz_usb_handle_ep_data functions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113567" comment="bbswitch-0.8-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113568" comment="bbswitch-kmp-default-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113569" comment="bbswitch-kmp-desktop-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113570" comment="bbswitch-kmp-pae-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113571" comment="bbswitch-kmp-xen-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113572" comment="cloop-2.639-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113573" comment="cloop-kmp-default-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113574" comment="cloop-kmp-desktop-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113575" comment="cloop-kmp-pae-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113576" comment="cloop-kmp-xen-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113577" comment="crash-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113578" comment="crash-devel-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113579" comment="crash-doc-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113580" comment="crash-eppic-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113581" comment="crash-gcore-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113582" comment="crash-kmp-default-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113583" comment="crash-kmp-desktop-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113584" comment="crash-kmp-pae-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113585" comment="crash-kmp-xen-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113586" comment="hdjmod-1.28-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113587" comment="hdjmod-kmp-default-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113588" comment="hdjmod-kmp-desktop-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113589" comment="hdjmod-kmp-pae-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113590" comment="hdjmod-kmp-xen-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113591" comment="ipset-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113592" comment="ipset-devel-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113593" comment="ipset-kmp-default-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113594" comment="ipset-kmp-desktop-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113595" comment="ipset-kmp-pae-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113596" comment="ipset-kmp-xen-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113598" comment="kernel-debug-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113599" comment="kernel-debug-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113600" comment="kernel-debug-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113601" comment="kernel-default-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113602" comment="kernel-default-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113603" comment="kernel-default-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113604" comment="kernel-desktop-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113605" comment="kernel-desktop-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113606" comment="kernel-desktop-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113617" comment="kernel-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113607" comment="kernel-docs-3.16.7-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113608" comment="kernel-ec2-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113609" comment="kernel-ec2-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113610" comment="kernel-ec2-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113618" comment="kernel-macros-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113611" comment="kernel-obs-build-3.16.7-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113613" comment="kernel-obs-qa-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113612" comment="kernel-obs-qa-xen-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113614" comment="kernel-pae-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113615" comment="kernel-pae-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113616" comment="kernel-pae-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113619" comment="kernel-source-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113620" comment="kernel-source-vanilla-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113621" comment="kernel-syms-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113622" comment="kernel-vanilla-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113623" comment="kernel-vanilla-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113624" comment="kernel-xen-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113625" comment="kernel-xen-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113626" comment="kernel-xen-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113597" comment="libipset3-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113627" comment="pcfclock-0.44-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113628" comment="pcfclock-kmp-default-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113629" comment="pcfclock-kmp-desktop-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113630" comment="pcfclock-kmp-pae-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113631" comment="vhba-kmp-20140629-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113632" comment="vhba-kmp-default-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113633" comment="vhba-kmp-desktop-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113634" comment="vhba-kmp-pae-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113635" comment="vhba-kmp-xen-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113636" comment="xen-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113637" comment="xen-devel-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113646" comment="xen-doc-html-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113647" comment="xen-kmp-default-4.4.2_06_k3.16.7_24-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113648" comment="xen-kmp-desktop-4.4.2_06_k3.16.7_24-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113639" comment="xen-libs-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113638" comment="xen-libs-32bit-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113649" comment="xen-tools-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113640" comment="xen-tools-domU-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113641" comment="xtables-addons-2.6-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113642" comment="xtables-addons-kmp-default-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113643" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113644" comment="xtables-addons-kmp-pae-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113645" comment="xtables-addons-kmp-xen-2.6_k3.16.7_24-11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4003</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4003" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4003" source="CVE"/>
    <description>
    The oz_usb_handle_ep_data function in drivers/staging/ozwpan/ozusbsvc1.c in the OZWPAN driver in the Linux kernel through 4.0.5 allows remote attackers to cause a denial of service (divide-by-zero error and system crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113567" comment="bbswitch-0.8-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113568" comment="bbswitch-kmp-default-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113569" comment="bbswitch-kmp-desktop-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113570" comment="bbswitch-kmp-pae-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113571" comment="bbswitch-kmp-xen-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113572" comment="cloop-2.639-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113573" comment="cloop-kmp-default-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113574" comment="cloop-kmp-desktop-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113575" comment="cloop-kmp-pae-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113576" comment="cloop-kmp-xen-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113577" comment="crash-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113578" comment="crash-devel-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113579" comment="crash-doc-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113580" comment="crash-eppic-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113581" comment="crash-gcore-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113582" comment="crash-kmp-default-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113583" comment="crash-kmp-desktop-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113584" comment="crash-kmp-pae-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113585" comment="crash-kmp-xen-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113586" comment="hdjmod-1.28-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113587" comment="hdjmod-kmp-default-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113588" comment="hdjmod-kmp-desktop-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113589" comment="hdjmod-kmp-pae-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113590" comment="hdjmod-kmp-xen-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113591" comment="ipset-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113592" comment="ipset-devel-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113593" comment="ipset-kmp-default-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113594" comment="ipset-kmp-desktop-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113595" comment="ipset-kmp-pae-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113596" comment="ipset-kmp-xen-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113598" comment="kernel-debug-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113599" comment="kernel-debug-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113600" comment="kernel-debug-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113601" comment="kernel-default-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113602" comment="kernel-default-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113603" comment="kernel-default-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113604" comment="kernel-desktop-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113605" comment="kernel-desktop-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113606" comment="kernel-desktop-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113617" comment="kernel-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113607" comment="kernel-docs-3.16.7-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113608" comment="kernel-ec2-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113609" comment="kernel-ec2-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113610" comment="kernel-ec2-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113618" comment="kernel-macros-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113611" comment="kernel-obs-build-3.16.7-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113613" comment="kernel-obs-qa-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113612" comment="kernel-obs-qa-xen-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113614" comment="kernel-pae-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113615" comment="kernel-pae-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113616" comment="kernel-pae-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113619" comment="kernel-source-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113620" comment="kernel-source-vanilla-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113621" comment="kernel-syms-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113622" comment="kernel-vanilla-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113623" comment="kernel-vanilla-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113624" comment="kernel-xen-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113625" comment="kernel-xen-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113626" comment="kernel-xen-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113597" comment="libipset3-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113627" comment="pcfclock-0.44-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113628" comment="pcfclock-kmp-default-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113629" comment="pcfclock-kmp-desktop-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113630" comment="pcfclock-kmp-pae-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113631" comment="vhba-kmp-20140629-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113632" comment="vhba-kmp-default-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113633" comment="vhba-kmp-desktop-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113634" comment="vhba-kmp-pae-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113635" comment="vhba-kmp-xen-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113636" comment="xen-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113637" comment="xen-devel-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113646" comment="xen-doc-html-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113647" comment="xen-kmp-default-4.4.2_06_k3.16.7_24-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113648" comment="xen-kmp-desktop-4.4.2_06_k3.16.7_24-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113639" comment="xen-libs-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113638" comment="xen-libs-32bit-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113649" comment="xen-tools-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113640" comment="xen-tools-domU-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113641" comment="xtables-addons-2.6-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113642" comment="xtables-addons-kmp-default-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113643" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113644" comment="xtables-addons-kmp-pae-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113645" comment="xtables-addons-kmp-xen-2.6_k3.16.7_24-11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4021</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4021" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4021" source="CVE"/>
    <description>
    The phar_parse_tarfile function in ext/phar/tar.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 does not verify that the first character of a filename is different from the \0 character, which allows remote attackers to cause a denial of service (integer underflow and memory corruption) via a crafted entry in a tar archive.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110110" comment="apache2-mod_php5-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110111" comment="php5-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110112" comment="php5-bcmath-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110113" comment="php5-bz2-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110114" comment="php5-calendar-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110115" comment="php5-ctype-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110116" comment="php5-curl-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110117" comment="php5-dba-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110118" comment="php5-devel-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110119" comment="php5-dom-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110120" comment="php5-enchant-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110121" comment="php5-exif-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110122" comment="php5-fastcgi-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110123" comment="php5-fileinfo-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110124" comment="php5-firebird-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110125" comment="php5-fpm-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110126" comment="php5-ftp-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110127" comment="php5-gd-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110128" comment="php5-gettext-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110129" comment="php5-gmp-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110130" comment="php5-iconv-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110131" comment="php5-imap-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110132" comment="php5-intl-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110133" comment="php5-json-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110134" comment="php5-ldap-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110135" comment="php5-mbstring-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110136" comment="php5-mcrypt-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110137" comment="php5-mssql-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110138" comment="php5-mysql-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110139" comment="php5-odbc-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110140" comment="php5-opcache-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110141" comment="php5-openssl-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110142" comment="php5-pcntl-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110143" comment="php5-pdo-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110144" comment="php5-pear-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110145" comment="php5-pgsql-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110146" comment="php5-phar-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110147" comment="php5-posix-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110148" comment="php5-pspell-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110149" comment="php5-readline-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110150" comment="php5-shmop-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110151" comment="php5-snmp-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110152" comment="php5-soap-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110153" comment="php5-sockets-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110154" comment="php5-sqlite-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110155" comment="php5-suhosin-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110156" comment="php5-sysvmsg-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110157" comment="php5-sysvsem-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110158" comment="php5-sysvshm-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110159" comment="php5-tidy-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110160" comment="php5-tokenizer-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110161" comment="php5-wddx-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110162" comment="php5-xmlreader-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110163" comment="php5-xmlrpc-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110164" comment="php5-xmlwriter-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110165" comment="php5-xsl-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110166" comment="php5-zip-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110167" comment="php5-zlib-5.6.1-24.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4022</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4022" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4022" source="CVE"/>
    <description>
    Integer overflow in the ftp_genlist function in ext/ftp/ftp.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 allows remote FTP servers to execute arbitrary code via a long reply to a LIST command, leading to a heap-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110110" comment="apache2-mod_php5-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110111" comment="php5-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110112" comment="php5-bcmath-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110113" comment="php5-bz2-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110114" comment="php5-calendar-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110115" comment="php5-ctype-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110116" comment="php5-curl-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110117" comment="php5-dba-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110118" comment="php5-devel-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110119" comment="php5-dom-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110120" comment="php5-enchant-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110121" comment="php5-exif-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110122" comment="php5-fastcgi-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110123" comment="php5-fileinfo-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110124" comment="php5-firebird-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110125" comment="php5-fpm-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110126" comment="php5-ftp-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110127" comment="php5-gd-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110128" comment="php5-gettext-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110129" comment="php5-gmp-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110130" comment="php5-iconv-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110131" comment="php5-imap-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110132" comment="php5-intl-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110133" comment="php5-json-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110134" comment="php5-ldap-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110135" comment="php5-mbstring-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110136" comment="php5-mcrypt-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110137" comment="php5-mssql-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110138" comment="php5-mysql-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110139" comment="php5-odbc-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110140" comment="php5-opcache-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110141" comment="php5-openssl-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110142" comment="php5-pcntl-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110143" comment="php5-pdo-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110144" comment="php5-pear-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110145" comment="php5-pgsql-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110146" comment="php5-phar-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110147" comment="php5-posix-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110148" comment="php5-pspell-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110149" comment="php5-readline-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110150" comment="php5-shmop-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110151" comment="php5-snmp-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110152" comment="php5-soap-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110153" comment="php5-sockets-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110154" comment="php5-sqlite-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110155" comment="php5-suhosin-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110156" comment="php5-sysvmsg-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110157" comment="php5-sysvsem-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110158" comment="php5-sysvshm-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110159" comment="php5-tidy-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110160" comment="php5-tokenizer-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110161" comment="php5-wddx-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110162" comment="php5-xmlreader-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110163" comment="php5-xmlrpc-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110164" comment="php5-xmlwriter-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110165" comment="php5-xsl-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110166" comment="php5-zip-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110167" comment="php5-zlib-5.6.1-24.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4024</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4024" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4024" source="CVE"/>
    <description>
    Algorithmic complexity vulnerability in the multipart_buffer_headers function in main/rfc1867.c in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 allows remote attackers to cause a denial of service (CPU consumption) via crafted form data that triggers an improper order-of-growth outcome.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110110" comment="apache2-mod_php5-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110111" comment="php5-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110112" comment="php5-bcmath-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110113" comment="php5-bz2-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110114" comment="php5-calendar-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110115" comment="php5-ctype-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110116" comment="php5-curl-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110117" comment="php5-dba-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110118" comment="php5-devel-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110119" comment="php5-dom-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110120" comment="php5-enchant-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110121" comment="php5-exif-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110122" comment="php5-fastcgi-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110123" comment="php5-fileinfo-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110124" comment="php5-firebird-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110125" comment="php5-fpm-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110126" comment="php5-ftp-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110127" comment="php5-gd-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110128" comment="php5-gettext-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110129" comment="php5-gmp-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110130" comment="php5-iconv-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110131" comment="php5-imap-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110132" comment="php5-intl-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110133" comment="php5-json-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110134" comment="php5-ldap-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110135" comment="php5-mbstring-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110136" comment="php5-mcrypt-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110137" comment="php5-mssql-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110138" comment="php5-mysql-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110139" comment="php5-odbc-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110140" comment="php5-opcache-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110141" comment="php5-openssl-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110142" comment="php5-pcntl-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110143" comment="php5-pdo-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110144" comment="php5-pear-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110145" comment="php5-pgsql-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110146" comment="php5-phar-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110147" comment="php5-posix-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110148" comment="php5-pspell-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110149" comment="php5-readline-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110150" comment="php5-shmop-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110151" comment="php5-snmp-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110152" comment="php5-soap-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110153" comment="php5-sockets-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110154" comment="php5-sqlite-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110155" comment="php5-suhosin-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110156" comment="php5-sysvmsg-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110157" comment="php5-sysvsem-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110158" comment="php5-sysvshm-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110159" comment="php5-tidy-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110160" comment="php5-tokenizer-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110161" comment="php5-wddx-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110162" comment="php5-xmlreader-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110163" comment="php5-xmlrpc-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110164" comment="php5-xmlwriter-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110165" comment="php5-xsl-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110166" comment="php5-zip-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110167" comment="php5-zlib-5.6.1-24.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4026</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4026" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4026" source="CVE"/>
    <description>
    The pcntl_exec implementation in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \x00 character, which might allow remote attackers to bypass intended extension restrictions and execute files with unexpected names via a crafted first argument.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110110" comment="apache2-mod_php5-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110111" comment="php5-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110112" comment="php5-bcmath-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110113" comment="php5-bz2-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110114" comment="php5-calendar-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110115" comment="php5-ctype-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110116" comment="php5-curl-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110117" comment="php5-dba-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110118" comment="php5-devel-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110119" comment="php5-dom-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110120" comment="php5-enchant-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110121" comment="php5-exif-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110122" comment="php5-fastcgi-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110123" comment="php5-fileinfo-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110124" comment="php5-firebird-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110125" comment="php5-fpm-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110126" comment="php5-ftp-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110127" comment="php5-gd-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110128" comment="php5-gettext-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110129" comment="php5-gmp-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110130" comment="php5-iconv-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110131" comment="php5-imap-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110132" comment="php5-intl-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110133" comment="php5-json-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110134" comment="php5-ldap-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110135" comment="php5-mbstring-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110136" comment="php5-mcrypt-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110137" comment="php5-mssql-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110138" comment="php5-mysql-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110139" comment="php5-odbc-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110140" comment="php5-opcache-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110141" comment="php5-openssl-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110142" comment="php5-pcntl-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110143" comment="php5-pdo-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110144" comment="php5-pear-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110145" comment="php5-pgsql-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110146" comment="php5-phar-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110147" comment="php5-posix-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110148" comment="php5-pspell-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110149" comment="php5-readline-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110150" comment="php5-shmop-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110151" comment="php5-snmp-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110152" comment="php5-soap-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110153" comment="php5-sockets-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110154" comment="php5-sqlite-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110155" comment="php5-suhosin-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110156" comment="php5-sysvmsg-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110157" comment="php5-sysvsem-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110158" comment="php5-sysvshm-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110159" comment="php5-tidy-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110160" comment="php5-tokenizer-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110161" comment="php5-wddx-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110162" comment="php5-xmlreader-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110163" comment="php5-xmlrpc-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110164" comment="php5-xmlwriter-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110165" comment="php5-xsl-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110166" comment="php5-zip-5.6.1-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110167" comment="php5-zlib-5.6.1-24.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154036" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4036</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4036" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4036" source="CVE"/>
    <description>
    Array index error in the tcm_vhost_make_tpg function in drivers/vhost/scsi.c in the Linux kernel before 4.0 might allow guest OS users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted VHOST_SCSI_SET_ENDPOINT ioctl call.  NOTE: the affected function was renamed to vhost_scsi_make_tpg before the vulnerability was announced.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113567" comment="bbswitch-0.8-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113568" comment="bbswitch-kmp-default-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113569" comment="bbswitch-kmp-desktop-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113570" comment="bbswitch-kmp-pae-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113571" comment="bbswitch-kmp-xen-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113572" comment="cloop-2.639-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113573" comment="cloop-kmp-default-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113574" comment="cloop-kmp-desktop-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113575" comment="cloop-kmp-pae-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113576" comment="cloop-kmp-xen-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113577" comment="crash-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113578" comment="crash-devel-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113579" comment="crash-doc-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113580" comment="crash-eppic-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113581" comment="crash-gcore-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113582" comment="crash-kmp-default-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113583" comment="crash-kmp-desktop-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113584" comment="crash-kmp-pae-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113585" comment="crash-kmp-xen-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113586" comment="hdjmod-1.28-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113587" comment="hdjmod-kmp-default-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113588" comment="hdjmod-kmp-desktop-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113589" comment="hdjmod-kmp-pae-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113590" comment="hdjmod-kmp-xen-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113591" comment="ipset-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113592" comment="ipset-devel-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113593" comment="ipset-kmp-default-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113594" comment="ipset-kmp-desktop-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113595" comment="ipset-kmp-pae-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113596" comment="ipset-kmp-xen-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113598" comment="kernel-debug-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113599" comment="kernel-debug-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113600" comment="kernel-debug-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113601" comment="kernel-default-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113602" comment="kernel-default-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113603" comment="kernel-default-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113604" comment="kernel-desktop-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113605" comment="kernel-desktop-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113606" comment="kernel-desktop-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113617" comment="kernel-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113607" comment="kernel-docs-3.16.7-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113608" comment="kernel-ec2-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113609" comment="kernel-ec2-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113610" comment="kernel-ec2-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113618" comment="kernel-macros-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113611" comment="kernel-obs-build-3.16.7-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113613" comment="kernel-obs-qa-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113612" comment="kernel-obs-qa-xen-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113614" comment="kernel-pae-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113615" comment="kernel-pae-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113616" comment="kernel-pae-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113619" comment="kernel-source-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113620" comment="kernel-source-vanilla-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113621" comment="kernel-syms-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113622" comment="kernel-vanilla-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113623" comment="kernel-vanilla-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113624" comment="kernel-xen-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113625" comment="kernel-xen-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113626" comment="kernel-xen-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113597" comment="libipset3-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113627" comment="pcfclock-0.44-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113628" comment="pcfclock-kmp-default-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113629" comment="pcfclock-kmp-desktop-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113630" comment="pcfclock-kmp-pae-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113631" comment="vhba-kmp-20140629-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113632" comment="vhba-kmp-default-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113633" comment="vhba-kmp-desktop-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113634" comment="vhba-kmp-pae-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113635" comment="vhba-kmp-xen-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113636" comment="xen-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113637" comment="xen-devel-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113646" comment="xen-doc-html-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113647" comment="xen-kmp-default-4.4.2_06_k3.16.7_24-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113648" comment="xen-kmp-desktop-4.4.2_06_k3.16.7_24-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113639" comment="xen-libs-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113638" comment="xen-libs-32bit-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113649" comment="xen-tools-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113640" comment="xen-tools-domU-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113641" comment="xtables-addons-2.6-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113642" comment="xtables-addons-kmp-default-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113643" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113644" comment="xtables-addons-kmp-pae-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113645" comment="xtables-addons-kmp-xen-2.6_k3.16.7_24-11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4037</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4037" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4037" source="CVE"/>
    <description>
    The slirp_smb function in net/slirp.c in QEMU 2.3.0 and earlier creates temporary files with predictable names, which allows local users to cause a denial of service (instantiation failure) by creating /tmp/qemu-smb.*-* files before the program.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117956" comment="xen-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117957" comment="xen-devel-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117958" comment="xen-doc-html-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117959" comment="xen-kmp-default-4.4.3_02_k3.16.7_29-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117960" comment="xen-kmp-desktop-4.4.3_02_k3.16.7_29-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117961" comment="xen-libs-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117962" comment="xen-libs-32bit-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117963" comment="xen-tools-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117964" comment="xen-tools-domU-4.4.3_02-30.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4041</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4041" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4041" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110476" comment="coreutils-8.23-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110477" comment="coreutils-lang-8.23-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110475" comment="coreutils-testsuite-8.23-2.12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4042</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4042" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4042" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110476" comment="coreutils-8.23-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110477" comment="coreutils-lang-8.23-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110475" comment="coreutils-testsuite-8.23-2.12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4103</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4103" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4103" source="CVE"/>
    <description>
    Xen 3.3.x through 4.5.x does not properly restrict write access to the host MSI message data field, which allows local x86 HVM guest administrators to cause a denial of service (host interrupt handling confusion) via vectors related to qemu and accessing spanning multiple fields.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110614" comment="xen-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110615" comment="xen-devel-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110619" comment="xen-doc-html-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110620" comment="xen-kmp-default-4.4.2_06_k3.16.7_21-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110621" comment="xen-kmp-desktop-4.4.2_06_k3.16.7_21-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110617" comment="xen-libs-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110616" comment="xen-libs-32bit-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110622" comment="xen-tools-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110618" comment="xen-tools-domU-4.4.2_06-23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4104</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4104" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4104" source="CVE"/>
    <description>
    Xen 3.3.x through 4.5.x does not properly restrict access to PCI MSI mask bits, which allows local x86 HVM guest users to cause a denial of service (unexpected interrupt and host crash) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110614" comment="xen-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110615" comment="xen-devel-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110619" comment="xen-doc-html-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110620" comment="xen-kmp-default-4.4.2_06_k3.16.7_21-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110621" comment="xen-kmp-desktop-4.4.2_06_k3.16.7_21-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110617" comment="xen-libs-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110616" comment="xen-libs-32bit-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110622" comment="xen-tools-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110618" comment="xen-tools-domU-4.4.2_06-23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4105</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4105" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4105" source="CVE"/>
    <description>
    Xen 3.3.x through 4.5.x enables logging for PCI MSI-X pass-through error messages, which allows local x86 HVM guests to cause a denial of service (host disk consumption) via certain invalid operations.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110614" comment="xen-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110615" comment="xen-devel-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110619" comment="xen-doc-html-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110620" comment="xen-kmp-default-4.4.2_06_k3.16.7_21-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110621" comment="xen-kmp-desktop-4.4.2_06_k3.16.7_21-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110617" comment="xen-libs-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110616" comment="xen-libs-32bit-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110622" comment="xen-tools-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110618" comment="xen-tools-domU-4.4.2_06-23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4106</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4106" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4106" source="CVE"/>
    <description>
    QEMU does not properly restrict write access to the PCI config space for certain PCI pass-through devices, which might allow local x86 HVM guests to gain privileges, cause a denial of service (host crash), obtain sensitive information, or possibly have other unspecified impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110614" comment="xen-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110615" comment="xen-devel-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110619" comment="xen-doc-html-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110620" comment="xen-kmp-default-4.4.2_06_k3.16.7_21-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110621" comment="xen-kmp-desktop-4.4.2_06_k3.16.7_21-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110617" comment="xen-libs-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110616" comment="xen-libs-32bit-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110622" comment="xen-tools-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110618" comment="xen-tools-domU-4.4.2_06-23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4116</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4116" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4116" source="CVE"/>
    <description>
    Use-after-free vulnerability in the spl_ptr_heap_insert function in ext/spl/spl_heap.c in PHP before 5.5.27 and 5.6.x before 5.6.11 allows remote attackers to execute arbitrary code by triggering a failed SplMinHeap::compare operation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128692" comment="apache2-mod_php5-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128693" comment="php5-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128694" comment="php5-bcmath-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128695" comment="php5-bz2-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128696" comment="php5-calendar-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128697" comment="php5-ctype-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128698" comment="php5-curl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128699" comment="php5-dba-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128700" comment="php5-devel-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128701" comment="php5-dom-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128702" comment="php5-enchant-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128703" comment="php5-exif-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128704" comment="php5-fastcgi-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128705" comment="php5-fileinfo-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128706" comment="php5-firebird-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128707" comment="php5-fpm-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128708" comment="php5-ftp-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128709" comment="php5-gd-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128710" comment="php5-gettext-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128711" comment="php5-gmp-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128712" comment="php5-iconv-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128713" comment="php5-imap-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128714" comment="php5-intl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128715" comment="php5-json-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128716" comment="php5-ldap-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128717" comment="php5-mbstring-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128718" comment="php5-mcrypt-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128719" comment="php5-mssql-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128720" comment="php5-mysql-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128721" comment="php5-odbc-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128722" comment="php5-opcache-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128723" comment="php5-openssl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128724" comment="php5-pcntl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128725" comment="php5-pdo-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128726" comment="php5-pear-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128727" comment="php5-pgsql-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128728" comment="php5-phar-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128729" comment="php5-posix-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128730" comment="php5-pspell-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128731" comment="php5-readline-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128732" comment="php5-shmop-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128733" comment="php5-snmp-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128734" comment="php5-soap-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128735" comment="php5-sockets-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128736" comment="php5-sqlite-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128737" comment="php5-suhosin-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128738" comment="php5-sysvmsg-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128739" comment="php5-sysvsem-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128740" comment="php5-sysvshm-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128741" comment="php5-tidy-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128742" comment="php5-tokenizer-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128743" comment="php5-wddx-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128744" comment="php5-xmlreader-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128745" comment="php5-xmlrpc-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128746" comment="php5-xmlwriter-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128747" comment="php5-xsl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128748" comment="php5-zip-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128749" comment="php5-zlib-5.6.1-66.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4141</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4141" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4141" source="CVE"/>
    <description>
    The WPS UPnP function in hostapd, when using WPS AP, and wpa_supplicant, when using WPS external registrar (ER), 0.7.0 through 2.4 allows remote attackers to cause a denial of service (crash) via a negative chunk length, which triggers an out-of-bounds read or heap-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110300" comment="wpa_supplicant-2.2-5.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110301" comment="wpa_supplicant-gui-2.2-5.7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4142</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4142" source="CVE"/>
    <description>
    Integer underflow in the WMM Action frame parser in hostapd 0.5.5 through 2.4 and wpa_supplicant 0.7.0 through 2.4, when used for AP mode MLME/SME functionality, allows remote attackers to cause a denial of service (crash) via a crafted frame, which triggers an out-of-bounds read.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110300" comment="wpa_supplicant-2.2-5.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110301" comment="wpa_supplicant-gui-2.2-5.7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4143</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4143" source="CVE"/>
    <description>
    The EAP-pwd server and peer implementation in hostapd and wpa_supplicant 1.0 through 2.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted (1) Commit or (2) Confirm message payload.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110300" comment="wpa_supplicant-2.2-5.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110301" comment="wpa_supplicant-gui-2.2-5.7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4148</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4148" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4148" source="CVE"/>
    <description>
    The do_soap_call function in ext/soap/soap.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 does not verify that the uri property is a string, which allows remote attackers to obtain sensitive information by providing crafted serialized data with an int data type, related to a "type confusion" issue.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110417" comment="apache2-mod_php5-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110418" comment="php5-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110419" comment="php5-bcmath-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110420" comment="php5-bz2-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110421" comment="php5-calendar-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110422" comment="php5-ctype-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110423" comment="php5-curl-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110424" comment="php5-dba-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110425" comment="php5-devel-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110426" comment="php5-dom-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110427" comment="php5-enchant-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110428" comment="php5-exif-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110429" comment="php5-fastcgi-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110430" comment="php5-fileinfo-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110431" comment="php5-firebird-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110432" comment="php5-fpm-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110433" comment="php5-ftp-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110434" comment="php5-gd-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110435" comment="php5-gettext-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110436" comment="php5-gmp-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110437" comment="php5-iconv-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110438" comment="php5-imap-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110439" comment="php5-intl-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110440" comment="php5-json-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110441" comment="php5-ldap-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110442" comment="php5-mbstring-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110443" comment="php5-mcrypt-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110444" comment="php5-mssql-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110445" comment="php5-mysql-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110446" comment="php5-odbc-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110447" comment="php5-opcache-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110448" comment="php5-openssl-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110449" comment="php5-pcntl-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110450" comment="php5-pdo-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110451" comment="php5-pear-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110452" comment="php5-pgsql-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110453" comment="php5-phar-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110454" comment="php5-posix-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110455" comment="php5-pspell-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110456" comment="php5-readline-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110457" comment="php5-shmop-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110458" comment="php5-snmp-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110459" comment="php5-soap-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110460" comment="php5-sockets-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110461" comment="php5-sqlite-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110462" comment="php5-suhosin-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110463" comment="php5-sysvmsg-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110464" comment="php5-sysvsem-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110465" comment="php5-sysvshm-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110466" comment="php5-tidy-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110467" comment="php5-tokenizer-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110468" comment="php5-wddx-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110469" comment="php5-xmlreader-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110470" comment="php5-xmlrpc-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110471" comment="php5-xmlwriter-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110472" comment="php5-xsl-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110473" comment="php5-zip-5.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110474" comment="php5-zlib-5.6.1-27.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4163</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4163" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4163" source="CVE"/>
    <description>
    GNTTABOP_swap_grant_ref in Xen 4.2 through 4.5 does not check the grant table operation version, which allows local guest domains to cause a denial of service (NULL pointer dereference) via a hypercall without a GNTTABOP_setup_table or GNTTABOP_set_version.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110614" comment="xen-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110615" comment="xen-devel-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110619" comment="xen-doc-html-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110620" comment="xen-kmp-default-4.4.2_06_k3.16.7_21-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110621" comment="xen-kmp-desktop-4.4.2_06_k3.16.7_21-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110617" comment="xen-libs-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110616" comment="xen-libs-32bit-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110622" comment="xen-tools-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110618" comment="xen-tools-domU-4.4.2_06-23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4164</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4164" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4164" source="CVE"/>
    <description>
    The compat_iret function in Xen 3.1 through 4.5 iterates the wrong way through a loop, which allows local 32-bit PV guest administrators to cause a denial of service (large loop and system hang) via a hypercall_iret call with EFLAGS.VM set.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110614" comment="xen-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110615" comment="xen-devel-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110619" comment="xen-doc-html-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110620" comment="xen-kmp-default-4.4.2_06_k3.16.7_21-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110621" comment="xen-kmp-desktop-4.4.2_06_k3.16.7_21-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110617" comment="xen-libs-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110616" comment="xen-libs-32bit-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110622" comment="xen-tools-4.4.2_06-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110618" comment="xen-tools-domU-4.4.2_06-23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4167</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4167" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4167" source="CVE"/>
    <description>
    The udf_read_inode function in fs/udf/inode.c in the Linux kernel before 3.19.1 does not validate certain length values, which allows local users to cause a denial of service (incorrect data representation or integer overflow, and OOPS) via a crafted UDF filesystem.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113567" comment="bbswitch-0.8-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113568" comment="bbswitch-kmp-default-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113569" comment="bbswitch-kmp-desktop-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113570" comment="bbswitch-kmp-pae-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113571" comment="bbswitch-kmp-xen-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113572" comment="cloop-2.639-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113573" comment="cloop-kmp-default-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113574" comment="cloop-kmp-desktop-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113575" comment="cloop-kmp-pae-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113576" comment="cloop-kmp-xen-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113577" comment="crash-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113578" comment="crash-devel-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113579" comment="crash-doc-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113580" comment="crash-eppic-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113581" comment="crash-gcore-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113582" comment="crash-kmp-default-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113583" comment="crash-kmp-desktop-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113584" comment="crash-kmp-pae-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113585" comment="crash-kmp-xen-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113586" comment="hdjmod-1.28-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113587" comment="hdjmod-kmp-default-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113588" comment="hdjmod-kmp-desktop-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113589" comment="hdjmod-kmp-pae-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113590" comment="hdjmod-kmp-xen-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113591" comment="ipset-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113592" comment="ipset-devel-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113593" comment="ipset-kmp-default-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113594" comment="ipset-kmp-desktop-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113595" comment="ipset-kmp-pae-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113596" comment="ipset-kmp-xen-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113598" comment="kernel-debug-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113599" comment="kernel-debug-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113600" comment="kernel-debug-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113601" comment="kernel-default-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113602" comment="kernel-default-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113603" comment="kernel-default-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113604" comment="kernel-desktop-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113605" comment="kernel-desktop-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113606" comment="kernel-desktop-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113617" comment="kernel-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113607" comment="kernel-docs-3.16.7-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113608" comment="kernel-ec2-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113609" comment="kernel-ec2-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113610" comment="kernel-ec2-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113618" comment="kernel-macros-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113611" comment="kernel-obs-build-3.16.7-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113613" comment="kernel-obs-qa-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113612" comment="kernel-obs-qa-xen-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113614" comment="kernel-pae-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113615" comment="kernel-pae-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113616" comment="kernel-pae-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113619" comment="kernel-source-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113620" comment="kernel-source-vanilla-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113621" comment="kernel-syms-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113622" comment="kernel-vanilla-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113623" comment="kernel-vanilla-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113624" comment="kernel-xen-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113625" comment="kernel-xen-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113626" comment="kernel-xen-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113597" comment="libipset3-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113627" comment="pcfclock-0.44-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113628" comment="pcfclock-kmp-default-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113629" comment="pcfclock-kmp-desktop-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113630" comment="pcfclock-kmp-pae-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113631" comment="vhba-kmp-20140629-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113632" comment="vhba-kmp-default-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113633" comment="vhba-kmp-desktop-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113634" comment="vhba-kmp-pae-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113635" comment="vhba-kmp-xen-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113636" comment="xen-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113637" comment="xen-devel-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113646" comment="xen-doc-html-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113647" comment="xen-kmp-default-4.4.2_06_k3.16.7_24-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113648" comment="xen-kmp-desktop-4.4.2_06_k3.16.7_24-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113639" comment="xen-libs-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113638" comment="xen-libs-32bit-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113649" comment="xen-tools-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113640" comment="xen-tools-domU-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113641" comment="xtables-addons-2.6-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113642" comment="xtables-addons-kmp-default-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113643" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113644" comment="xtables-addons-kmp-pae-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113645" comment="xtables-addons-kmp-xen-2.6_k3.16.7_24-11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4171</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4171" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4171" source="CVE"/>
    <description>
    strongSwan 4.3.0 through 5.x before 5.3.2 and strongSwan VPN Client before 1.4.6, when using EAP or pre-shared keys for authenticating an IKEv2 connection, does not enforce server authentication restrictions until the entire authentication process is complete, which allows remote servers to obtain credentials by using a valid certificate and then reading the responses.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110551" comment="strongswan-5.1.3-4.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110552" comment="strongswan-doc-5.1.3-4.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110553" comment="strongswan-ipsec-5.1.3-4.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110554" comment="strongswan-libs0-5.1.3-4.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110555" comment="strongswan-mysql-5.1.3-4.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110556" comment="strongswan-nm-5.1.3-4.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110557" comment="strongswan-sqlite-5.1.3-4.11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4335</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4335" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4335" source="CVE"/>
    <description>
    Redis before 2.8.1 and 3.x before 3.0.2 allows remote attackers to execute arbitrary Lua bytecode via the eval command.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114851" comment="libipa_hbac-devel-1.12.2-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114852" comment="libipa_hbac0-1.12.2-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114853" comment="libnfsidmap-sss-1.12.2-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114854" comment="libsss_idmap-devel-1.12.2-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114855" comment="libsss_idmap0-1.12.2-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114856" comment="libsss_nss_idmap-devel-1.12.2-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114857" comment="libsss_nss_idmap0-1.12.2-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114858" comment="libsss_simpleifp-devel-1.12.2-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114859" comment="libsss_simpleifp0-1.12.2-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114860" comment="libsss_sudo-1.12.2-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114861" comment="python-ipa_hbac-1.12.2-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114862" comment="python-sss_nss_idmap-1.12.2-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114863" comment="python-sssd-config-1.12.2-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114850" comment="redis-2.8.22-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114864" comment="sssd-1.12.2-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114865" comment="sssd-32bit-1.12.2-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114866" comment="sssd-ad-1.12.2-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114867" comment="sssd-dbus-1.12.2-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114868" comment="sssd-ipa-1.12.2-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114869" comment="sssd-krb5-1.12.2-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114870" comment="sssd-krb5-common-1.12.2-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114871" comment="sssd-ldap-1.12.2-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114872" comment="sssd-proxy-1.12.2-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114873" comment="sssd-tools-1.12.2-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114874" comment="sssd-wbclient-1.12.2-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114875" comment="sssd-wbclient-devel-1.12.2-3.11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4342</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4342" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4342" source="CVE"/>
    <description>
    SQL injection vulnerability in Cacti before 0.8.8d allows remote attackers to execute arbitrary SQL commands via unspecified vectors involving a cdef id.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110660" comment="cacti-0.8.8d-4.7.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4473</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4473" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113651" comment="MozillaFirefox-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113650" comment="MozillaFirefox-branding-openSUSE-40-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113652" comment="MozillaFirefox-branding-upstream-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113653" comment="MozillaFirefox-buildsymbols-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113654" comment="MozillaFirefox-devel-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113655" comment="MozillaFirefox-translations-common-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113656" comment="MozillaFirefox-translations-other-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113966" comment="MozillaThunderbird-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113967" comment="MozillaThunderbird-buildsymbols-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113968" comment="MozillaThunderbird-devel-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113969" comment="MozillaThunderbird-translations-common-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113970" comment="MozillaThunderbird-translations-other-38.2.0-25.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4474</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4474" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4474" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 40.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113651" comment="MozillaFirefox-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113650" comment="MozillaFirefox-branding-openSUSE-40-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113652" comment="MozillaFirefox-branding-upstream-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113653" comment="MozillaFirefox-buildsymbols-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113654" comment="MozillaFirefox-devel-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113655" comment="MozillaFirefox-translations-common-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113656" comment="MozillaFirefox-translations-other-40.0-38.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4475</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4475" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475" source="CVE"/>
    <description>
    The mozilla::AudioSink function in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 mishandles inconsistent sample formats within MP3 audio data, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via a malformed file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113651" comment="MozillaFirefox-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113650" comment="MozillaFirefox-branding-openSUSE-40-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113652" comment="MozillaFirefox-branding-upstream-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113653" comment="MozillaFirefox-buildsymbols-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113654" comment="MozillaFirefox-devel-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113655" comment="MozillaFirefox-translations-common-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113656" comment="MozillaFirefox-translations-other-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113966" comment="MozillaThunderbird-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113967" comment="MozillaThunderbird-buildsymbols-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113968" comment="MozillaThunderbird-devel-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113969" comment="MozillaThunderbird-translations-common-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113970" comment="MozillaThunderbird-translations-other-38.2.0-25.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4476</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4476" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4476" source="CVE"/>
    <description>
    Mozilla Firefox before 41.0 on Android allows user-assisted remote attackers to spoof address-bar attributes by leveraging lack of navigation after a paste of a URL with a nonstandard scheme, as demonstrated by spoofing an SSL attribute.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114737" comment="MozillaFirefox-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114738" comment="MozillaFirefox-branding-upstream-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114739" comment="MozillaFirefox-buildsymbols-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114740" comment="MozillaFirefox-devel-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114741" comment="MozillaFirefox-translations-common-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114742" comment="MozillaFirefox-translations-other-41.0-44.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4477</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4477" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4477" source="CVE"/>
    <description>
    Use-after-free vulnerability in the MediaStream playback feature in Mozilla Firefox before 40.0 allows remote attackers to execute arbitrary code via unspecified use of the Web Audio API.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113651" comment="MozillaFirefox-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113650" comment="MozillaFirefox-branding-openSUSE-40-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113652" comment="MozillaFirefox-branding-upstream-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113653" comment="MozillaFirefox-buildsymbols-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113654" comment="MozillaFirefox-devel-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113655" comment="MozillaFirefox-translations-common-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113656" comment="MozillaFirefox-translations-other-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125364" comment="MozillaThunderbird-38.7.0-40.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125365" comment="MozillaThunderbird-buildsymbols-38.7.0-40.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125366" comment="MozillaThunderbird-devel-38.7.0-40.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125367" comment="MozillaThunderbird-translations-common-38.7.0-40.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125368" comment="MozillaThunderbird-translations-other-38.7.0-40.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4478</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4478" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478" source="CVE"/>
    <description>
    Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 do not impose certain ECMAScript 6 requirements on JavaScript object properties, which allows remote attackers to bypass the Same Origin Policy via the reviver parameter to the JSON.parse method.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113651" comment="MozillaFirefox-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113650" comment="MozillaFirefox-branding-openSUSE-40-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113652" comment="MozillaFirefox-branding-upstream-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113653" comment="MozillaFirefox-buildsymbols-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113654" comment="MozillaFirefox-devel-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113655" comment="MozillaFirefox-translations-common-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113656" comment="MozillaFirefox-translations-other-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113966" comment="MozillaThunderbird-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113967" comment="MozillaThunderbird-buildsymbols-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113968" comment="MozillaThunderbird-devel-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113969" comment="MozillaThunderbird-translations-common-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113970" comment="MozillaThunderbird-translations-other-38.2.0-25.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4479</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4479" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479" source="CVE"/>
    <description>
    Multiple integer overflows in libstagefright in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allow remote attackers to execute arbitrary code via a crafted saio chunk in MPEG-4 video data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113651" comment="MozillaFirefox-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113650" comment="MozillaFirefox-branding-openSUSE-40-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113652" comment="MozillaFirefox-branding-upstream-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113653" comment="MozillaFirefox-buildsymbols-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113654" comment="MozillaFirefox-devel-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113655" comment="MozillaFirefox-translations-common-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113656" comment="MozillaFirefox-translations-other-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113966" comment="MozillaThunderbird-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113967" comment="MozillaThunderbird-buildsymbols-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113968" comment="MozillaThunderbird-devel-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113969" comment="MozillaThunderbird-translations-common-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113970" comment="MozillaThunderbird-translations-other-38.2.0-25.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4480</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4480" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4480" source="CVE"/>
    <description>
    Integer overflow in the stagefright::SampleTable::isValid function in libstagefright in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code via crafted MPEG-4 video data with H.264 encoding.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113651" comment="MozillaFirefox-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113650" comment="MozillaFirefox-branding-openSUSE-40-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113652" comment="MozillaFirefox-branding-upstream-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113653" comment="MozillaFirefox-buildsymbols-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113654" comment="MozillaFirefox-devel-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113655" comment="MozillaFirefox-translations-common-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113656" comment="MozillaFirefox-translations-other-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113966" comment="MozillaThunderbird-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113967" comment="MozillaThunderbird-buildsymbols-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113968" comment="MozillaThunderbird-devel-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113969" comment="MozillaThunderbird-translations-common-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113970" comment="MozillaThunderbird-translations-other-38.2.0-25.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4481</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4481" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4481" source="CVE"/>
    <description>
    Race condition in the Mozilla Maintenance Service in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 on Windows allows local users to write to arbitrary files and consequently gain privileges via vectors involving a hard link to a log file during an update.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113651" comment="MozillaFirefox-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113650" comment="MozillaFirefox-branding-openSUSE-40-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113652" comment="MozillaFirefox-branding-upstream-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113653" comment="MozillaFirefox-buildsymbols-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113654" comment="MozillaFirefox-devel-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113655" comment="MozillaFirefox-translations-common-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113656" comment="MozillaFirefox-translations-other-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113966" comment="MozillaThunderbird-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113967" comment="MozillaThunderbird-buildsymbols-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113968" comment="MozillaThunderbird-devel-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113969" comment="MozillaThunderbird-translations-common-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113970" comment="MozillaThunderbird-translations-other-38.2.0-25.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4482</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4482" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4482" source="CVE"/>
    <description>
    mar_read.c in the Updater in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows local users to gain privileges or cause a denial of service (out-of-bounds write) via a crafted name of a Mozilla Archive (aka MAR) file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113651" comment="MozillaFirefox-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113650" comment="MozillaFirefox-branding-openSUSE-40-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113652" comment="MozillaFirefox-branding-upstream-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113653" comment="MozillaFirefox-buildsymbols-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113654" comment="MozillaFirefox-devel-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113655" comment="MozillaFirefox-translations-common-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113656" comment="MozillaFirefox-translations-other-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113966" comment="MozillaThunderbird-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113967" comment="MozillaThunderbird-buildsymbols-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113968" comment="MozillaThunderbird-devel-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113969" comment="MozillaThunderbird-translations-common-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113970" comment="MozillaThunderbird-translations-other-38.2.0-25.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4483</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4483" source="CVE"/>
    <description>
    Mozilla Firefox before 40.0 allows man-in-the-middle attackers to bypass a mixed-content protection mechanism via a feed: URL in a POST request.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113651" comment="MozillaFirefox-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113650" comment="MozillaFirefox-branding-openSUSE-40-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113652" comment="MozillaFirefox-branding-upstream-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113653" comment="MozillaFirefox-buildsymbols-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113654" comment="MozillaFirefox-devel-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113655" comment="MozillaFirefox-translations-common-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113656" comment="MozillaFirefox-translations-other-40.0-38.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4484</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4484" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484" source="CVE"/>
    <description>
    The js::jit::AssemblerX86Shared::lock_addl function in the JavaScript implementation in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to cause a denial of service (application crash) by leveraging the use of shared memory and accessing (1) an Atomics object or (2) a SharedArrayBuffer object.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113651" comment="MozillaFirefox-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113650" comment="MozillaFirefox-branding-openSUSE-40-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113652" comment="MozillaFirefox-branding-upstream-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113653" comment="MozillaFirefox-buildsymbols-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113654" comment="MozillaFirefox-devel-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113655" comment="MozillaFirefox-translations-common-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113656" comment="MozillaFirefox-translations-other-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113966" comment="MozillaThunderbird-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113967" comment="MozillaThunderbird-buildsymbols-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113968" comment="MozillaThunderbird-devel-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113969" comment="MozillaThunderbird-translations-common-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113970" comment="MozillaThunderbird-translations-other-38.2.0-25.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4485</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4485" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4485" source="CVE"/>
    <description>
    Heap-based buffer overflow in the resize_context_buffers function in libvpx in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code via malformed WebM video data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113651" comment="MozillaFirefox-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113650" comment="MozillaFirefox-branding-openSUSE-40-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113652" comment="MozillaFirefox-branding-upstream-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113653" comment="MozillaFirefox-buildsymbols-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113654" comment="MozillaFirefox-devel-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113655" comment="MozillaFirefox-translations-common-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113656" comment="MozillaFirefox-translations-other-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113966" comment="MozillaThunderbird-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113967" comment="MozillaThunderbird-buildsymbols-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113968" comment="MozillaThunderbird-devel-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113969" comment="MozillaThunderbird-translations-common-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113970" comment="MozillaThunderbird-translations-other-38.2.0-25.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4486</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4486" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4486" source="CVE"/>
    <description>
    The decrease_ref_count function in libvpx in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via malformed WebM video data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113651" comment="MozillaFirefox-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113650" comment="MozillaFirefox-branding-openSUSE-40-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113652" comment="MozillaFirefox-branding-upstream-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113653" comment="MozillaFirefox-buildsymbols-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113654" comment="MozillaFirefox-devel-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113655" comment="MozillaFirefox-translations-common-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113656" comment="MozillaFirefox-translations-other-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113966" comment="MozillaThunderbird-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113967" comment="MozillaThunderbird-buildsymbols-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113968" comment="MozillaThunderbird-devel-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113969" comment="MozillaThunderbird-translations-common-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113970" comment="MozillaThunderbird-translations-other-38.2.0-25.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4487</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4487" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487" source="CVE"/>
    <description>
    The nsTSubstring::ReplacePrep function in Mozilla Firefox before 40.0, Firefox ESR 38.x before 38.2, and Firefox OS before 2.2 might allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors, related to an "overflow."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113651" comment="MozillaFirefox-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113650" comment="MozillaFirefox-branding-openSUSE-40-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113652" comment="MozillaFirefox-branding-upstream-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113653" comment="MozillaFirefox-buildsymbols-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113654" comment="MozillaFirefox-devel-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113655" comment="MozillaFirefox-translations-common-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113656" comment="MozillaFirefox-translations-other-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113966" comment="MozillaThunderbird-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113967" comment="MozillaThunderbird-buildsymbols-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113968" comment="MozillaThunderbird-devel-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113969" comment="MozillaThunderbird-translations-common-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113970" comment="MozillaThunderbird-translations-other-38.2.0-25.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4488</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4488" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488" source="CVE"/>
    <description>
    Use-after-free vulnerability in the StyleAnimationValue class in Mozilla Firefox before 40.0, Firefox ESR 38.x before 38.2, and Firefox OS before 2.2 allows remote attackers to have an unspecified impact by leveraging a StyleAnimationValue::operator self assignment.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113651" comment="MozillaFirefox-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113650" comment="MozillaFirefox-branding-openSUSE-40-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113652" comment="MozillaFirefox-branding-upstream-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113653" comment="MozillaFirefox-buildsymbols-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113654" comment="MozillaFirefox-devel-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113655" comment="MozillaFirefox-translations-common-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113656" comment="MozillaFirefox-translations-other-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113966" comment="MozillaThunderbird-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113967" comment="MozillaThunderbird-buildsymbols-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113968" comment="MozillaThunderbird-devel-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113969" comment="MozillaThunderbird-translations-common-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113970" comment="MozillaThunderbird-translations-other-38.2.0-25.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4489</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4489" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489" source="CVE"/>
    <description>
    The nsTArray_Impl class in Mozilla Firefox before 40.0, Firefox ESR 38.x before 38.2, and Firefox OS before 2.2 might allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging a self assignment.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113651" comment="MozillaFirefox-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113650" comment="MozillaFirefox-branding-openSUSE-40-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113652" comment="MozillaFirefox-branding-upstream-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113653" comment="MozillaFirefox-buildsymbols-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113654" comment="MozillaFirefox-devel-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113655" comment="MozillaFirefox-translations-common-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113656" comment="MozillaFirefox-translations-other-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113966" comment="MozillaThunderbird-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113967" comment="MozillaThunderbird-buildsymbols-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113968" comment="MozillaThunderbird-devel-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113969" comment="MozillaThunderbird-translations-common-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113970" comment="MozillaThunderbird-translations-other-38.2.0-25.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4490</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4490" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4490" source="CVE"/>
    <description>
    The nsCSPHostSrc::permits function in dom/security/nsCSPUtils.cpp in Mozilla Firefox before 40.0 does not implement the Content Security Policy Level 2 exceptions for the blob, data, and filesystem URL schemes during wildcard source-expression matching, which might make it easier for remote attackers to conduct cross-site scripting (XSS) attacks by leveraging unexpected policy-enforcement behavior.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113651" comment="MozillaFirefox-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113650" comment="MozillaFirefox-branding-openSUSE-40-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113652" comment="MozillaFirefox-branding-upstream-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113653" comment="MozillaFirefox-buildsymbols-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113654" comment="MozillaFirefox-devel-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113655" comment="MozillaFirefox-translations-common-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113656" comment="MozillaFirefox-translations-other-40.0-38.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4491</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4491" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4491" source="CVE"/>
    <description>
    Integer overflow in the make_filter_table function in pixops/pixops.c in gdk-pixbuf before 2.31.5, as used in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 on Linux, Google Chrome on Linux, and other products, allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and application crash) via crafted bitmap dimensions that are mishandled during scaling.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113651" comment="MozillaFirefox-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113650" comment="MozillaFirefox-branding-openSUSE-40-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113652" comment="MozillaFirefox-branding-upstream-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113653" comment="MozillaFirefox-buildsymbols-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113654" comment="MozillaFirefox-devel-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113655" comment="MozillaFirefox-translations-common-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113656" comment="MozillaFirefox-translations-other-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113966" comment="MozillaThunderbird-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113967" comment="MozillaThunderbird-buildsymbols-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113968" comment="MozillaThunderbird-devel-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113969" comment="MozillaThunderbird-translations-common-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113970" comment="MozillaThunderbird-translations-other-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114221" comment="gdk-pixbuf-2.31.6-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114222" comment="gdk-pixbuf-devel-2.31.6-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114223" comment="gdk-pixbuf-devel-32bit-2.31.6-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114224" comment="gdk-pixbuf-lang-2.31.6-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114225" comment="gdk-pixbuf-query-loaders-2.31.6-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114226" comment="gdk-pixbuf-query-loaders-32bit-2.31.6-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114227" comment="libgdk_pixbuf-2_0-0-2.31.6-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114228" comment="libgdk_pixbuf-2_0-0-32bit-2.31.6-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114229" comment="typelib-1_0-GdkPixbuf-2_0-2.31.6-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4492</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4492" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492" source="CVE"/>
    <description>
    Use-after-free vulnerability in the XMLHttpRequest::Open implementation in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 might allow remote attackers to execute arbitrary code via a SharedWorker object that makes recursive calls to the open method of an XMLHttpRequest object.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113651" comment="MozillaFirefox-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113650" comment="MozillaFirefox-branding-openSUSE-40-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113652" comment="MozillaFirefox-branding-upstream-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113653" comment="MozillaFirefox-buildsymbols-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113654" comment="MozillaFirefox-devel-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113655" comment="MozillaFirefox-translations-common-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113656" comment="MozillaFirefox-translations-other-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113966" comment="MozillaThunderbird-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113967" comment="MozillaThunderbird-buildsymbols-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113968" comment="MozillaThunderbird-devel-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113969" comment="MozillaThunderbird-translations-common-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113970" comment="MozillaThunderbird-translations-other-38.2.0-25.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4493</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4493" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4493" source="CVE"/>
    <description>
    Heap-based buffer overflow in the stagefright::ESDS::parseESDescriptor function in libstagefright in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code via an invalid size field in an esds chunk in MPEG-4 video data, a related issue to CVE-2015-1539.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113651" comment="MozillaFirefox-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113650" comment="MozillaFirefox-branding-openSUSE-40-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113652" comment="MozillaFirefox-branding-upstream-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113653" comment="MozillaFirefox-buildsymbols-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113654" comment="MozillaFirefox-devel-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113655" comment="MozillaFirefox-translations-common-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113656" comment="MozillaFirefox-translations-other-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113966" comment="MozillaThunderbird-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113967" comment="MozillaThunderbird-buildsymbols-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113968" comment="MozillaThunderbird-devel-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113969" comment="MozillaThunderbird-translations-common-38.2.0-25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113970" comment="MozillaThunderbird-translations-other-38.2.0-25.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4495</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4495" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4495" source="CVE"/>
    <description>
    The PDF reader in Mozilla Firefox before 39.0.3, Firefox ESR 38.x before 38.1.1, and Firefox OS before 2.2 allows remote attackers to bypass the Same Origin Policy, and read arbitrary files or gain privileges, via vectors involving crafted JavaScript code and a native setter, as exploited in the wild in August 2015.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113651" comment="MozillaFirefox-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113650" comment="MozillaFirefox-branding-openSUSE-40-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113652" comment="MozillaFirefox-branding-upstream-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113653" comment="MozillaFirefox-buildsymbols-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113654" comment="MozillaFirefox-devel-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113655" comment="MozillaFirefox-translations-common-40.0-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113656" comment="MozillaFirefox-translations-other-40.0-38.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4497</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4497" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4497" source="CVE"/>
    <description>
    Use-after-free vulnerability in the CanvasRenderingContext2D implementation in Mozilla Firefox before 40.0.3 and Firefox ESR 38.x before 38.2.1 allows remote attackers to execute arbitrary code by leveraging improper interaction between resize events and changes to Cascading Style Sheets (CSS) token sequences for a CANVAS element.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114143" comment="MozillaFirefox-40.0.3-41.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114144" comment="MozillaFirefox-branding-upstream-40.0.3-41.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114145" comment="MozillaFirefox-buildsymbols-40.0.3-41.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114146" comment="MozillaFirefox-devel-40.0.3-41.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114147" comment="MozillaFirefox-translations-common-40.0.3-41.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114148" comment="MozillaFirefox-translations-other-40.0.3-41.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4498</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4498" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4498" source="CVE"/>
    <description>
    The add-on installation feature in Mozilla Firefox before 40.0.3 and Firefox ESR 38.x before 38.2.1 allows remote attackers to bypass an intended user-confirmation requirement by constructing a crafted data: URL and triggering navigation to an arbitrary http: or https: URL at a certain early point in the installation process.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114143" comment="MozillaFirefox-40.0.3-41.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114144" comment="MozillaFirefox-branding-upstream-40.0.3-41.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114145" comment="MozillaFirefox-buildsymbols-40.0.3-41.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114146" comment="MozillaFirefox-devel-40.0.3-41.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114147" comment="MozillaFirefox-translations-common-40.0.3-41.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114148" comment="MozillaFirefox-translations-other-40.0.3-41.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4500</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114737" comment="MozillaFirefox-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114738" comment="MozillaFirefox-branding-upstream-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114739" comment="MozillaFirefox-buildsymbols-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114740" comment="MozillaFirefox-devel-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114741" comment="MozillaFirefox-translations-common-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114742" comment="MozillaFirefox-translations-other-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114757" comment="MozillaThunderbird-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114758" comment="MozillaThunderbird-buildsymbols-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114759" comment="MozillaThunderbird-devel-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114760" comment="MozillaThunderbird-translations-common-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114761" comment="MozillaThunderbird-translations-other-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114762" comment="seamonkey-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114763" comment="seamonkey-dom-inspector-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114764" comment="seamonkey-irc-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114765" comment="seamonkey-translations-common-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114766" comment="seamonkey-translations-other-2.38-20.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4501</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4501" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4501" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 41.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114737" comment="MozillaFirefox-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114738" comment="MozillaFirefox-branding-upstream-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114739" comment="MozillaFirefox-buildsymbols-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114740" comment="MozillaFirefox-devel-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114741" comment="MozillaFirefox-translations-common-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114742" comment="MozillaFirefox-translations-other-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114762" comment="seamonkey-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114763" comment="seamonkey-dom-inspector-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114764" comment="seamonkey-irc-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114765" comment="seamonkey-translations-common-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114766" comment="seamonkey-translations-other-2.38-20.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4502</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4502" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4502" source="CVE"/>
    <description>
    js/src/proxy/Proxy.cpp in Mozilla Firefox before 41.0 mishandles certain receiver arguments, which allows remote attackers to bypass intended window access restrictions via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114737" comment="MozillaFirefox-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114738" comment="MozillaFirefox-branding-upstream-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114739" comment="MozillaFirefox-buildsymbols-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114740" comment="MozillaFirefox-devel-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114741" comment="MozillaFirefox-translations-common-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114742" comment="MozillaFirefox-translations-other-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114762" comment="seamonkey-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114763" comment="seamonkey-dom-inspector-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114764" comment="seamonkey-irc-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114765" comment="seamonkey-translations-common-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114766" comment="seamonkey-translations-other-2.38-20.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4503</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4503" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4503" source="CVE"/>
    <description>
    The TCP Socket API implementation in Mozilla Firefox before 41.0 mishandles array boundaries that were established with a navigator.mozTCPSocket.open method call and send method calls, which allows remote TCP servers to obtain sensitive information from process memory by reading packet data, as demonstrated by availability of this API in a Firefox OS application.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114737" comment="MozillaFirefox-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114738" comment="MozillaFirefox-branding-upstream-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114739" comment="MozillaFirefox-buildsymbols-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114740" comment="MozillaFirefox-devel-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114741" comment="MozillaFirefox-translations-common-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114742" comment="MozillaFirefox-translations-other-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114762" comment="seamonkey-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114763" comment="seamonkey-dom-inspector-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114764" comment="seamonkey-irc-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114765" comment="seamonkey-translations-common-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114766" comment="seamonkey-translations-other-2.38-20.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4504</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4504" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4504" source="CVE"/>
    <description>
    The lut_inverse_interp16 function in the QCMS library in Mozilla Firefox before 41.0 allows remote attackers to obtain sensitive information or cause a denial of service (buffer over-read and application crash) via crafted attributes in the ICC 4 profile of an image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114737" comment="MozillaFirefox-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114738" comment="MozillaFirefox-branding-upstream-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114739" comment="MozillaFirefox-buildsymbols-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114740" comment="MozillaFirefox-devel-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114741" comment="MozillaFirefox-translations-common-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114742" comment="MozillaFirefox-translations-other-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114762" comment="seamonkey-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114763" comment="seamonkey-dom-inspector-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114764" comment="seamonkey-irc-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114765" comment="seamonkey-translations-common-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114766" comment="seamonkey-translations-other-2.38-20.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4505</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4505" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4505" source="CVE"/>
    <description>
    updater.exe in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 on Windows allows local users to write to arbitrary files by conducting a junction attack and waiting for an update operation by the Mozilla Maintenance Service.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114737" comment="MozillaFirefox-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114738" comment="MozillaFirefox-branding-upstream-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114739" comment="MozillaFirefox-buildsymbols-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114740" comment="MozillaFirefox-devel-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114741" comment="MozillaFirefox-translations-common-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114742" comment="MozillaFirefox-translations-other-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114757" comment="MozillaThunderbird-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114758" comment="MozillaThunderbird-buildsymbols-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114759" comment="MozillaThunderbird-devel-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114760" comment="MozillaThunderbird-translations-common-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114761" comment="MozillaThunderbird-translations-other-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114762" comment="seamonkey-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114763" comment="seamonkey-dom-inspector-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114764" comment="seamonkey-irc-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114765" comment="seamonkey-translations-common-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114766" comment="seamonkey-translations-other-2.38-20.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4506</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4506" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506" source="CVE"/>
    <description>
    Buffer overflow in the vp9_init_context_buffers function in libvpx, as used in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3, allows remote attackers to execute arbitrary code via a crafted VP9 file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114737" comment="MozillaFirefox-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114738" comment="MozillaFirefox-branding-upstream-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114739" comment="MozillaFirefox-buildsymbols-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114740" comment="MozillaFirefox-devel-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114741" comment="MozillaFirefox-translations-common-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114742" comment="MozillaFirefox-translations-other-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114757" comment="MozillaThunderbird-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114758" comment="MozillaThunderbird-buildsymbols-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114759" comment="MozillaThunderbird-devel-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114760" comment="MozillaThunderbird-translations-common-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114761" comment="MozillaThunderbird-translations-other-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114762" comment="seamonkey-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114763" comment="seamonkey-dom-inspector-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114764" comment="seamonkey-irc-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114765" comment="seamonkey-translations-common-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114766" comment="seamonkey-translations-other-2.38-20.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4507</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4507" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4507" source="CVE"/>
    <description>
    The SavedStacks class in the JavaScript implementation in Mozilla Firefox before 41.0, when the Debugger API is enabled, allows remote attackers to cause a denial of service (getSlotRef assertion failure and application exit) or possibly execute arbitrary code via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114737" comment="MozillaFirefox-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114738" comment="MozillaFirefox-branding-upstream-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114739" comment="MozillaFirefox-buildsymbols-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114740" comment="MozillaFirefox-devel-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114741" comment="MozillaFirefox-translations-common-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114742" comment="MozillaFirefox-translations-other-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114762" comment="seamonkey-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114763" comment="seamonkey-dom-inspector-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114764" comment="seamonkey-irc-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114765" comment="seamonkey-translations-common-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114766" comment="seamonkey-translations-other-2.38-20.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4508</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4508" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4508" source="CVE"/>
    <description>
    Mozilla Firefox before 41.0, when reader mode is enabled, allows remote attackers to spoof the relationship between address-bar URLs and web content via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114737" comment="MozillaFirefox-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114738" comment="MozillaFirefox-branding-upstream-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114739" comment="MozillaFirefox-buildsymbols-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114740" comment="MozillaFirefox-devel-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114741" comment="MozillaFirefox-translations-common-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114742" comment="MozillaFirefox-translations-other-41.0-44.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4509</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4509" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509" source="CVE"/>
    <description>
    Use-after-free vulnerability in the HTMLVideoElement interface in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allows remote attackers to execute arbitrary code via crafted JavaScript code that modifies the URI table of a media element, aka ZDI-CAN-3176.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114737" comment="MozillaFirefox-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114738" comment="MozillaFirefox-branding-upstream-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114739" comment="MozillaFirefox-buildsymbols-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114740" comment="MozillaFirefox-devel-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114741" comment="MozillaFirefox-translations-common-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114742" comment="MozillaFirefox-translations-other-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114757" comment="MozillaThunderbird-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114758" comment="MozillaThunderbird-buildsymbols-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114759" comment="MozillaThunderbird-devel-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114760" comment="MozillaThunderbird-translations-common-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114761" comment="MozillaThunderbird-translations-other-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114762" comment="seamonkey-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114763" comment="seamonkey-dom-inspector-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114764" comment="seamonkey-irc-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114765" comment="seamonkey-translations-common-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114766" comment="seamonkey-translations-other-2.38-20.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4510</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4510" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4510" source="CVE"/>
    <description>
    Race condition in the WorkerPrivate::NotifyFeatures function in Mozilla Firefox before 41.0 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and application crash) by leveraging improper interaction between shared workers and the IndexedDB implementation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114737" comment="MozillaFirefox-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114738" comment="MozillaFirefox-branding-upstream-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114739" comment="MozillaFirefox-buildsymbols-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114740" comment="MozillaFirefox-devel-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114741" comment="MozillaFirefox-translations-common-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114742" comment="MozillaFirefox-translations-other-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114762" comment="seamonkey-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114763" comment="seamonkey-dom-inspector-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114764" comment="seamonkey-irc-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114765" comment="seamonkey-translations-common-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114766" comment="seamonkey-translations-other-2.38-20.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4511</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511" source="CVE"/>
    <description>
    Heap-based buffer overflow in the nestegg_track_codec_data function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allows remote attackers to execute arbitrary code via a crafted header in a WebM video.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114737" comment="MozillaFirefox-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114738" comment="MozillaFirefox-branding-upstream-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114739" comment="MozillaFirefox-buildsymbols-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114740" comment="MozillaFirefox-devel-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114741" comment="MozillaFirefox-translations-common-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114742" comment="MozillaFirefox-translations-other-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114757" comment="MozillaThunderbird-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114758" comment="MozillaThunderbird-buildsymbols-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114759" comment="MozillaThunderbird-devel-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114760" comment="MozillaThunderbird-translations-common-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114761" comment="MozillaThunderbird-translations-other-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114762" comment="seamonkey-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114763" comment="seamonkey-dom-inspector-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114764" comment="seamonkey-irc-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114765" comment="seamonkey-translations-common-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114766" comment="seamonkey-translations-other-2.38-20.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4512</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4512" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4512" source="CVE"/>
    <description>
    gfx/2d/DataSurfaceHelpers.cpp in Mozilla Firefox before 41.0 on Linux improperly attempts to use the Cairo library with 32-bit color-depth surface creation followed by 16-bit color-depth surface display, which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) by using a CANVAS element to trigger 2D rendering.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114737" comment="MozillaFirefox-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114738" comment="MozillaFirefox-branding-upstream-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114739" comment="MozillaFirefox-buildsymbols-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114740" comment="MozillaFirefox-devel-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114741" comment="MozillaFirefox-translations-common-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114742" comment="MozillaFirefox-translations-other-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114762" comment="seamonkey-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114763" comment="seamonkey-dom-inspector-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114764" comment="seamonkey-irc-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114765" comment="seamonkey-translations-common-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114766" comment="seamonkey-translations-other-2.38-20.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4513</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4513" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009116086" comment="MozillaFirefox-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116087" comment="MozillaFirefox-branding-upstream-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116088" comment="MozillaFirefox-buildsymbols-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116089" comment="MozillaFirefox-devel-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116090" comment="MozillaFirefox-translations-common-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116091" comment="MozillaFirefox-translations-other-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118894" comment="MozillaThunderbird-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118895" comment="MozillaThunderbird-buildsymbols-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118896" comment="MozillaThunderbird-devel-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118897" comment="MozillaThunderbird-translations-common-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118898" comment="MozillaThunderbird-translations-other-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116092" comment="libfreebl3-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116093" comment="libfreebl3-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116094" comment="libsoftokn3-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116095" comment="libsoftokn3-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116016" comment="mozilla-nspr-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116015" comment="mozilla-nspr-32bit-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116017" comment="mozilla-nspr-devel-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116096" comment="mozilla-nss-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116097" comment="mozilla-nss-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116098" comment="mozilla-nss-certs-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116099" comment="mozilla-nss-certs-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116100" comment="mozilla-nss-devel-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116101" comment="mozilla-nss-sysinit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116102" comment="mozilla-nss-sysinit-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116103" comment="mozilla-nss-tools-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116104" comment="seamonkey-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116105" comment="seamonkey-dom-inspector-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116106" comment="seamonkey-irc-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116107" comment="seamonkey-translations-common-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116108" comment="seamonkey-translations-other-2.39-23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4514</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4514" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4514" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 42.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009116086" comment="MozillaFirefox-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116087" comment="MozillaFirefox-branding-upstream-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116088" comment="MozillaFirefox-buildsymbols-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116089" comment="MozillaFirefox-devel-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116090" comment="MozillaFirefox-translations-common-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116091" comment="MozillaFirefox-translations-other-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118894" comment="MozillaThunderbird-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118895" comment="MozillaThunderbird-buildsymbols-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118896" comment="MozillaThunderbird-devel-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118897" comment="MozillaThunderbird-translations-common-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118898" comment="MozillaThunderbird-translations-other-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116092" comment="libfreebl3-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116093" comment="libfreebl3-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116094" comment="libsoftokn3-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116095" comment="libsoftokn3-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116016" comment="mozilla-nspr-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116015" comment="mozilla-nspr-32bit-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116017" comment="mozilla-nspr-devel-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116096" comment="mozilla-nss-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116097" comment="mozilla-nss-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116098" comment="mozilla-nss-certs-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116099" comment="mozilla-nss-certs-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116100" comment="mozilla-nss-devel-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116101" comment="mozilla-nss-sysinit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116102" comment="mozilla-nss-sysinit-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116103" comment="mozilla-nss-tools-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116104" comment="seamonkey-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116105" comment="seamonkey-dom-inspector-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116106" comment="seamonkey-irc-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116107" comment="seamonkey-translations-common-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116108" comment="seamonkey-translations-other-2.39-23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4515</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4515" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4515" source="CVE"/>
    <description>
    Mozilla Firefox before 42.0, when NTLM v1 is enabled for HTTP authentication, allows remote attackers to obtain sensitive hostname information by constructing a crafted web site that sends an NTLM request and reads the Workstation field of an NTLM type 3 message.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009116086" comment="MozillaFirefox-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116087" comment="MozillaFirefox-branding-upstream-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116088" comment="MozillaFirefox-buildsymbols-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116089" comment="MozillaFirefox-devel-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116090" comment="MozillaFirefox-translations-common-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116091" comment="MozillaFirefox-translations-other-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116092" comment="libfreebl3-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116093" comment="libfreebl3-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116094" comment="libsoftokn3-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116095" comment="libsoftokn3-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116016" comment="mozilla-nspr-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116015" comment="mozilla-nspr-32bit-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116017" comment="mozilla-nspr-devel-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116096" comment="mozilla-nss-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116097" comment="mozilla-nss-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116098" comment="mozilla-nss-certs-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116099" comment="mozilla-nss-certs-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116100" comment="mozilla-nss-devel-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116101" comment="mozilla-nss-sysinit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116102" comment="mozilla-nss-sysinit-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116103" comment="mozilla-nss-tools-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116104" comment="seamonkey-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116105" comment="seamonkey-dom-inspector-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116106" comment="seamonkey-irc-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116107" comment="seamonkey-translations-common-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116108" comment="seamonkey-translations-other-2.39-23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4516</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4516" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4516" source="CVE"/>
    <description>
    Mozilla Firefox before 41.0 allows remote attackers to bypass certain ECMAScript 5 (aka ES5) API protection mechanisms and modify immutable properties, and consequently execute arbitrary JavaScript code with chrome privileges, via a crafted web page that does not use ES5 APIs.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114737" comment="MozillaFirefox-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114738" comment="MozillaFirefox-branding-upstream-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114739" comment="MozillaFirefox-buildsymbols-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114740" comment="MozillaFirefox-devel-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114741" comment="MozillaFirefox-translations-common-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114742" comment="MozillaFirefox-translations-other-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114762" comment="seamonkey-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114763" comment="seamonkey-dom-inspector-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114764" comment="seamonkey-irc-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114765" comment="seamonkey-translations-common-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114766" comment="seamonkey-translations-other-2.38-20.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4517</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4517" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517" source="CVE"/>
    <description>
    NetworkUtils.cpp in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114737" comment="MozillaFirefox-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114738" comment="MozillaFirefox-branding-upstream-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114739" comment="MozillaFirefox-buildsymbols-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114740" comment="MozillaFirefox-devel-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114741" comment="MozillaFirefox-translations-common-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114742" comment="MozillaFirefox-translations-other-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114757" comment="MozillaThunderbird-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114758" comment="MozillaThunderbird-buildsymbols-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114759" comment="MozillaThunderbird-devel-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114760" comment="MozillaThunderbird-translations-common-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114761" comment="MozillaThunderbird-translations-other-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114762" comment="seamonkey-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114763" comment="seamonkey-dom-inspector-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114764" comment="seamonkey-irc-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114765" comment="seamonkey-translations-common-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114766" comment="seamonkey-translations-other-2.38-20.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4518</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4518" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4518" source="CVE"/>
    <description>
    The Reader View implementation in Mozilla Firefox before 42.0 has an improper whitelist, which makes it easier for remote attackers to bypass the Content Security Policy (CSP) protection mechanism and conduct cross-site scripting (XSS) attacks via vectors involving SVG animations and the about:reader URL.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009116086" comment="MozillaFirefox-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116087" comment="MozillaFirefox-branding-upstream-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116088" comment="MozillaFirefox-buildsymbols-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116089" comment="MozillaFirefox-devel-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116090" comment="MozillaFirefox-translations-common-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116091" comment="MozillaFirefox-translations-other-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116092" comment="libfreebl3-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116093" comment="libfreebl3-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116094" comment="libsoftokn3-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116095" comment="libsoftokn3-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116016" comment="mozilla-nspr-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116015" comment="mozilla-nspr-32bit-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116017" comment="mozilla-nspr-devel-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116096" comment="mozilla-nss-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116097" comment="mozilla-nss-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116098" comment="mozilla-nss-certs-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116099" comment="mozilla-nss-certs-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116100" comment="mozilla-nss-devel-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116101" comment="mozilla-nss-sysinit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116102" comment="mozilla-nss-sysinit-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116103" comment="mozilla-nss-tools-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116104" comment="seamonkey-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116105" comment="seamonkey-dom-inspector-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116106" comment="seamonkey-irc-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116107" comment="seamonkey-translations-common-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116108" comment="seamonkey-translations-other-2.39-23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4519</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4519" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519" source="CVE"/>
    <description>
    Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allow user-assisted remote attackers to bypass intended access restrictions and discover a redirect's target URL via crafted JavaScript code that executes after a drag-and-drop action of an image into a TEXTBOX element.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114737" comment="MozillaFirefox-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114738" comment="MozillaFirefox-branding-upstream-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114739" comment="MozillaFirefox-buildsymbols-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114740" comment="MozillaFirefox-devel-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114741" comment="MozillaFirefox-translations-common-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114742" comment="MozillaFirefox-translations-other-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114757" comment="MozillaThunderbird-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114758" comment="MozillaThunderbird-buildsymbols-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114759" comment="MozillaThunderbird-devel-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114760" comment="MozillaThunderbird-translations-common-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114761" comment="MozillaThunderbird-translations-other-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114762" comment="seamonkey-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114763" comment="seamonkey-dom-inspector-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114764" comment="seamonkey-irc-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114765" comment="seamonkey-translations-common-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114766" comment="seamonkey-translations-other-2.38-20.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4520</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4520" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520" source="CVE"/>
    <description>
    Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allow remote attackers to bypass CORS preflight protection mechanisms by leveraging (1) duplicate cache-key generation or (2) retrieval of a value from an incorrect HTTP Access-Control-* response header.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114737" comment="MozillaFirefox-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114738" comment="MozillaFirefox-branding-upstream-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114739" comment="MozillaFirefox-buildsymbols-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114740" comment="MozillaFirefox-devel-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114741" comment="MozillaFirefox-translations-common-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114742" comment="MozillaFirefox-translations-other-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114757" comment="MozillaThunderbird-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114758" comment="MozillaThunderbird-buildsymbols-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114759" comment="MozillaThunderbird-devel-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114760" comment="MozillaThunderbird-translations-common-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114761" comment="MozillaThunderbird-translations-other-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114762" comment="seamonkey-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114763" comment="seamonkey-dom-inspector-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114764" comment="seamonkey-irc-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114765" comment="seamonkey-translations-common-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114766" comment="seamonkey-translations-other-2.38-20.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4521</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4521" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521" source="CVE"/>
    <description>
    The ConvertDialogOptions function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114737" comment="MozillaFirefox-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114738" comment="MozillaFirefox-branding-upstream-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114739" comment="MozillaFirefox-buildsymbols-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114740" comment="MozillaFirefox-devel-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114741" comment="MozillaFirefox-translations-common-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114742" comment="MozillaFirefox-translations-other-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114757" comment="MozillaThunderbird-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114758" comment="MozillaThunderbird-buildsymbols-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114759" comment="MozillaThunderbird-devel-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114760" comment="MozillaThunderbird-translations-common-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114761" comment="MozillaThunderbird-translations-other-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114762" comment="seamonkey-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114763" comment="seamonkey-dom-inspector-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114764" comment="seamonkey-irc-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114765" comment="seamonkey-translations-common-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114766" comment="seamonkey-translations-other-2.38-20.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4522</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4522" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522" source="CVE"/>
    <description>
    The nsUnicodeToUTF8::GetMaxLength function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors, related to an "overflow."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114737" comment="MozillaFirefox-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114738" comment="MozillaFirefox-branding-upstream-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114739" comment="MozillaFirefox-buildsymbols-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114740" comment="MozillaFirefox-devel-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114741" comment="MozillaFirefox-translations-common-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114742" comment="MozillaFirefox-translations-other-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114757" comment="MozillaThunderbird-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114758" comment="MozillaThunderbird-buildsymbols-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114759" comment="MozillaThunderbird-devel-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114760" comment="MozillaThunderbird-translations-common-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114761" comment="MozillaThunderbird-translations-other-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114762" comment="seamonkey-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114763" comment="seamonkey-dom-inspector-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114764" comment="seamonkey-irc-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114765" comment="seamonkey-translations-common-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114766" comment="seamonkey-translations-other-2.38-20.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4551</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4551" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4551" source="CVE"/>
    <description>
    LibreOffice before 4.4.5 and Apache OpenOffice before 4.1.2 uses the stored LinkUpdateMode configuration information in OpenDocument Format files and templates when handling links, which might allow remote attackers to obtain sensitive information via a crafted document, which embeds data from local files into (1) Calc or (2) Writer.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123705" comment="cmis-client-0.5.0-4.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123706" comment="libcmis-0_5-5-0.5.0-4.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123707" comment="libcmis-c-0_5-5-0.5.0-4.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123708" comment="libcmis-c-devel-0.5.0-4.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123709" comment="libcmis-devel-0.5.0-4.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123710" comment="libetonyek-0.1.3-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123711" comment="libetonyek-0_1-1-0.1.3-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123712" comment="libetonyek-devel-0.1.3-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123713" comment="libetonyek-devel-doc-0.1.3-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123714" comment="libetonyek-tools-0.1.3-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123715" comment="libmwaw-0.3.6-2.7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123716" comment="libmwaw-0_3-3-0.3.6-2.7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123717" comment="libmwaw-devel-0.3.6-2.7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123718" comment="libmwaw-devel-doc-0.3.6-2.7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123719" comment="libmwaw-tools-0.3.6-2.7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123720" comment="libodfgen-0.1.4-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123721" comment="libodfgen-0_1-1-0.1.4-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123722" comment="libodfgen-devel-0.1.4-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123723" comment="libodfgen-devel-doc-0.1.4-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123724" comment="libpagemaker-0.0.2-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123725" comment="libpagemaker-0_0-0-0.0.2-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123726" comment="libpagemaker-devel-0.0.2-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123727" comment="libpagemaker-devel-doc-0.0.2-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123728" comment="libpagemaker-tools-0.0.2-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123729" comment="libreoffice-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123730" comment="libreoffice-base-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123731" comment="libreoffice-base-drivers-mysql-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123732" comment="libreoffice-base-drivers-postgresql-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123733" comment="libreoffice-branding-upstream-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123734" comment="libreoffice-calc-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123735" comment="libreoffice-calc-extensions-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123736" comment="libreoffice-draw-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123737" comment="libreoffice-filters-optional-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123738" comment="libreoffice-gnome-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123739" comment="libreoffice-gtk3-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123740" comment="libreoffice-icon-theme-breeze-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123741" comment="libreoffice-icon-theme-galaxy-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123742" comment="libreoffice-icon-theme-hicontrast-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123743" comment="libreoffice-icon-theme-oxygen-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123744" comment="libreoffice-icon-theme-sifr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123745" comment="libreoffice-icon-theme-tango-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123746" comment="libreoffice-impress-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123747" comment="libreoffice-kde4-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123748" comment="libreoffice-l10n-af-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123749" comment="libreoffice-l10n-ar-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123750" comment="libreoffice-l10n-as-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123751" comment="libreoffice-l10n-bg-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123752" comment="libreoffice-l10n-bn-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123753" comment="libreoffice-l10n-br-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123754" comment="libreoffice-l10n-ca-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123755" comment="libreoffice-l10n-cs-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123756" comment="libreoffice-l10n-cy-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123757" comment="libreoffice-l10n-da-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123758" comment="libreoffice-l10n-de-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123759" comment="libreoffice-l10n-dz-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123760" comment="libreoffice-l10n-el-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123761" comment="libreoffice-l10n-en-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123762" comment="libreoffice-l10n-es-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123763" comment="libreoffice-l10n-et-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123764" comment="libreoffice-l10n-eu-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123765" comment="libreoffice-l10n-fa-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123766" comment="libreoffice-l10n-fi-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123767" comment="libreoffice-l10n-fr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123768" comment="libreoffice-l10n-ga-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123769" comment="libreoffice-l10n-gl-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123770" comment="libreoffice-l10n-gu-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123771" comment="libreoffice-l10n-he-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123772" comment="libreoffice-l10n-hi-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123773" comment="libreoffice-l10n-hr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123774" comment="libreoffice-l10n-hu-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123775" comment="libreoffice-l10n-it-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123776" comment="libreoffice-l10n-ja-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123777" comment="libreoffice-l10n-kk-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123778" comment="libreoffice-l10n-kn-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123779" comment="libreoffice-l10n-ko-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123780" comment="libreoffice-l10n-lt-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123781" comment="libreoffice-l10n-lv-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123782" comment="libreoffice-l10n-mai-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123783" comment="libreoffice-l10n-ml-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123784" comment="libreoffice-l10n-mr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123785" comment="libreoffice-l10n-nb-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123786" comment="libreoffice-l10n-nl-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123787" comment="libreoffice-l10n-nn-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123788" comment="libreoffice-l10n-nr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123789" comment="libreoffice-l10n-nso-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123790" comment="libreoffice-l10n-or-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123791" comment="libreoffice-l10n-pa-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123792" comment="libreoffice-l10n-pl-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123793" comment="libreoffice-l10n-pt-BR-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123794" comment="libreoffice-l10n-pt-PT-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123795" comment="libreoffice-l10n-ro-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123796" comment="libreoffice-l10n-ru-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123797" comment="libreoffice-l10n-si-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123798" comment="libreoffice-l10n-sk-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123799" comment="libreoffice-l10n-sl-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123800" comment="libreoffice-l10n-sr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123801" comment="libreoffice-l10n-ss-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123802" comment="libreoffice-l10n-st-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123803" comment="libreoffice-l10n-sv-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123804" comment="libreoffice-l10n-ta-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123805" comment="libreoffice-l10n-te-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123806" comment="libreoffice-l10n-th-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123807" comment="libreoffice-l10n-tn-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123808" comment="libreoffice-l10n-tr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123809" comment="libreoffice-l10n-ts-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123810" comment="libreoffice-l10n-uk-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123811" comment="libreoffice-l10n-ve-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123812" comment="libreoffice-l10n-xh-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123813" comment="libreoffice-l10n-zh-Hans-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123814" comment="libreoffice-l10n-zh-Hant-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123815" comment="libreoffice-l10n-zu-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123816" comment="libreoffice-mailmerge-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123817" comment="libreoffice-math-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123818" comment="libreoffice-officebean-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123819" comment="libreoffice-pyuno-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123820" comment="libreoffice-sdk-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123821" comment="libreoffice-sdk-doc-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123822" comment="libreoffice-share-linker-1-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123823" comment="libreoffice-writer-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123824" comment="libreoffice-writer-extensions-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123825" comment="libwps-0.4.1-2.4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123826" comment="libwps-0_4-4-0.4.1-2.4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123827" comment="libwps-devel-0.4.1-2.4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123828" comment="libwps-tools-0.4.1-2.4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123829" comment="mdds-0.12.1-2.4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123830" comment="mdds-devel-0.12.1-2.4.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4588</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4588" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4588" source="CVE"/>
    <description>
    Heap-based buffer overflow in the DecodeImage function in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted "run-length count" in an image in a WMF file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111102" comment="libwmf-0.2.8.4-239.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111103" comment="libwmf-0_2-7-0.2.8.4-239.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111104" comment="libwmf-0_2-7-32bit-0.2.8.4-239.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111105" comment="libwmf-devel-0.2.8.4-239.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111106" comment="libwmf-gnome-0.2.8.4-239.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111107" comment="libwmf-gnome-32bit-0.2.8.4-239.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111108" comment="libwmf-tools-0.2.8.4-239.7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4598</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4598" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4598" source="CVE"/>
    <description>
    PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read or write to arbitrary files via crafted input to an application that calls (1) a DOMDocument save method or (2) the GD imagepsloadfont function, as demonstrated by a filename\0.html attack that bypasses an intended configuration in which client users may write to only .html files.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110937" comment="apache2-mod_php5-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110938" comment="php5-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110939" comment="php5-bcmath-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110940" comment="php5-bz2-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110941" comment="php5-calendar-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110942" comment="php5-ctype-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110943" comment="php5-curl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110944" comment="php5-dba-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110945" comment="php5-devel-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110946" comment="php5-dom-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110947" comment="php5-enchant-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110948" comment="php5-exif-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110949" comment="php5-fastcgi-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110950" comment="php5-fileinfo-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110951" comment="php5-firebird-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110952" comment="php5-fpm-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110953" comment="php5-ftp-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110954" comment="php5-gd-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110955" comment="php5-gettext-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110956" comment="php5-gmp-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110957" comment="php5-iconv-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110958" comment="php5-imap-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110959" comment="php5-intl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110960" comment="php5-json-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110961" comment="php5-ldap-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110962" comment="php5-mbstring-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110963" comment="php5-mcrypt-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110964" comment="php5-mssql-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110965" comment="php5-mysql-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110966" comment="php5-odbc-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110967" comment="php5-opcache-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110968" comment="php5-openssl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110969" comment="php5-pcntl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110970" comment="php5-pdo-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110971" comment="php5-pear-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110972" comment="php5-pgsql-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110973" comment="php5-phar-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110974" comment="php5-posix-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110975" comment="php5-pspell-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110976" comment="php5-readline-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110977" comment="php5-shmop-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110978" comment="php5-snmp-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110979" comment="php5-soap-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110980" comment="php5-sockets-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110981" comment="php5-sqlite-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110982" comment="php5-suhosin-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110983" comment="php5-sysvmsg-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110984" comment="php5-sysvsem-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110985" comment="php5-sysvshm-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110986" comment="php5-tidy-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110987" comment="php5-tokenizer-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110988" comment="php5-wddx-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110989" comment="php5-xmlreader-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110990" comment="php5-xmlrpc-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110991" comment="php5-xmlwriter-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110992" comment="php5-xsl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110993" comment="php5-zip-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110994" comment="php5-zlib-5.6.1-30.6 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4599</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4599" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4599" source="CVE"/>
    <description>
    The SoapFault::__toString method in ext/soap/soap.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to obtain sensitive information, cause a denial of service (application crash), or possibly execute arbitrary code via an unexpected data type, related to a "type confusion" issue.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110937" comment="apache2-mod_php5-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110938" comment="php5-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110939" comment="php5-bcmath-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110940" comment="php5-bz2-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110941" comment="php5-calendar-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110942" comment="php5-ctype-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110943" comment="php5-curl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110944" comment="php5-dba-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110945" comment="php5-devel-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110946" comment="php5-dom-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110947" comment="php5-enchant-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110948" comment="php5-exif-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110949" comment="php5-fastcgi-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110950" comment="php5-fileinfo-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110951" comment="php5-firebird-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110952" comment="php5-fpm-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110953" comment="php5-ftp-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110954" comment="php5-gd-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110955" comment="php5-gettext-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110956" comment="php5-gmp-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110957" comment="php5-iconv-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110958" comment="php5-imap-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110959" comment="php5-intl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110960" comment="php5-json-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110961" comment="php5-ldap-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110962" comment="php5-mbstring-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110963" comment="php5-mcrypt-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110964" comment="php5-mssql-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110965" comment="php5-mysql-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110966" comment="php5-odbc-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110967" comment="php5-opcache-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110968" comment="php5-openssl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110969" comment="php5-pcntl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110970" comment="php5-pdo-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110971" comment="php5-pear-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110972" comment="php5-pgsql-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110973" comment="php5-phar-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110974" comment="php5-posix-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110975" comment="php5-pspell-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110976" comment="php5-readline-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110977" comment="php5-shmop-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110978" comment="php5-snmp-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110979" comment="php5-soap-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110980" comment="php5-sockets-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110981" comment="php5-sqlite-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110982" comment="php5-suhosin-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110983" comment="php5-sysvmsg-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110984" comment="php5-sysvsem-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110985" comment="php5-sysvshm-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110986" comment="php5-tidy-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110987" comment="php5-tokenizer-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110988" comment="php5-wddx-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110989" comment="php5-xmlreader-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110990" comment="php5-xmlrpc-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110991" comment="php5-xmlwriter-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110992" comment="php5-xsl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110993" comment="php5-zip-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110994" comment="php5-zlib-5.6.1-30.6 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4600</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4600" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4600" source="CVE"/>
    <description>
    The SoapClient implementation in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to "type confusion" issues in the (1) SoapClient::__getLastRequest, (2) SoapClient::__getLastResponse, (3) SoapClient::__getLastRequestHeaders, (4) SoapClient::__getLastResponseHeaders, (5) SoapClient::__getCookies, and (6) SoapClient::__setCookie methods.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110937" comment="apache2-mod_php5-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110938" comment="php5-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110939" comment="php5-bcmath-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110940" comment="php5-bz2-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110941" comment="php5-calendar-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110942" comment="php5-ctype-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110943" comment="php5-curl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110944" comment="php5-dba-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110945" comment="php5-devel-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110946" comment="php5-dom-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110947" comment="php5-enchant-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110948" comment="php5-exif-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110949" comment="php5-fastcgi-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110950" comment="php5-fileinfo-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110951" comment="php5-firebird-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110952" comment="php5-fpm-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110953" comment="php5-ftp-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110954" comment="php5-gd-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110955" comment="php5-gettext-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110956" comment="php5-gmp-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110957" comment="php5-iconv-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110958" comment="php5-imap-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110959" comment="php5-intl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110960" comment="php5-json-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110961" comment="php5-ldap-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110962" comment="php5-mbstring-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110963" comment="php5-mcrypt-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110964" comment="php5-mssql-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110965" comment="php5-mysql-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110966" comment="php5-odbc-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110967" comment="php5-opcache-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110968" comment="php5-openssl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110969" comment="php5-pcntl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110970" comment="php5-pdo-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110971" comment="php5-pear-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110972" comment="php5-pgsql-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110973" comment="php5-phar-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110974" comment="php5-posix-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110975" comment="php5-pspell-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110976" comment="php5-readline-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110977" comment="php5-shmop-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110978" comment="php5-snmp-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110979" comment="php5-soap-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110980" comment="php5-sockets-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110981" comment="php5-sqlite-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110982" comment="php5-suhosin-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110983" comment="php5-sysvmsg-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110984" comment="php5-sysvsem-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110985" comment="php5-sysvshm-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110986" comment="php5-tidy-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110987" comment="php5-tokenizer-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110988" comment="php5-wddx-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110989" comment="php5-xmlreader-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110990" comment="php5-xmlrpc-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110991" comment="php5-xmlwriter-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110992" comment="php5-xsl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110993" comment="php5-zip-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110994" comment="php5-zlib-5.6.1-30.6 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4601</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4601" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4601" source="CVE"/>
    <description>
    PHP before 5.6.7 might allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to "type confusion" issues in (1) ext/soap/php_encoding.c, (2) ext/soap/php_http.c, and (3) ext/soap/soap.c, a different issue than CVE-2015-4600.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110937" comment="apache2-mod_php5-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110938" comment="php5-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110939" comment="php5-bcmath-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110940" comment="php5-bz2-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110941" comment="php5-calendar-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110942" comment="php5-ctype-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110943" comment="php5-curl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110944" comment="php5-dba-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110945" comment="php5-devel-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110946" comment="php5-dom-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110947" comment="php5-enchant-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110948" comment="php5-exif-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110949" comment="php5-fastcgi-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110950" comment="php5-fileinfo-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110951" comment="php5-firebird-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110952" comment="php5-fpm-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110953" comment="php5-ftp-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110954" comment="php5-gd-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110955" comment="php5-gettext-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110956" comment="php5-gmp-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110957" comment="php5-iconv-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110958" comment="php5-imap-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110959" comment="php5-intl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110960" comment="php5-json-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110961" comment="php5-ldap-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110962" comment="php5-mbstring-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110963" comment="php5-mcrypt-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110964" comment="php5-mssql-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110965" comment="php5-mysql-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110966" comment="php5-odbc-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110967" comment="php5-opcache-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110968" comment="php5-openssl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110969" comment="php5-pcntl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110970" comment="php5-pdo-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110971" comment="php5-pear-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110972" comment="php5-pgsql-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110973" comment="php5-phar-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110974" comment="php5-posix-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110975" comment="php5-pspell-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110976" comment="php5-readline-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110977" comment="php5-shmop-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110978" comment="php5-snmp-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110979" comment="php5-soap-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110980" comment="php5-sockets-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110981" comment="php5-sqlite-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110982" comment="php5-suhosin-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110983" comment="php5-sysvmsg-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110984" comment="php5-sysvsem-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110985" comment="php5-sysvshm-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110986" comment="php5-tidy-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110987" comment="php5-tokenizer-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110988" comment="php5-wddx-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110989" comment="php5-xmlreader-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110990" comment="php5-xmlrpc-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110991" comment="php5-xmlwriter-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110992" comment="php5-xsl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110993" comment="php5-zip-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110994" comment="php5-zlib-5.6.1-30.6 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4602</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4602" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4602" source="CVE"/>
    <description>
    The __PHP_Incomplete_Class function in ext/standard/incomplete_class.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unexpected data type, related to a "type confusion" issue.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110937" comment="apache2-mod_php5-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110938" comment="php5-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110939" comment="php5-bcmath-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110940" comment="php5-bz2-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110941" comment="php5-calendar-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110942" comment="php5-ctype-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110943" comment="php5-curl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110944" comment="php5-dba-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110945" comment="php5-devel-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110946" comment="php5-dom-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110947" comment="php5-enchant-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110948" comment="php5-exif-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110949" comment="php5-fastcgi-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110950" comment="php5-fileinfo-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110951" comment="php5-firebird-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110952" comment="php5-fpm-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110953" comment="php5-ftp-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110954" comment="php5-gd-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110955" comment="php5-gettext-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110956" comment="php5-gmp-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110957" comment="php5-iconv-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110958" comment="php5-imap-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110959" comment="php5-intl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110960" comment="php5-json-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110961" comment="php5-ldap-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110962" comment="php5-mbstring-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110963" comment="php5-mcrypt-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110964" comment="php5-mssql-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110965" comment="php5-mysql-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110966" comment="php5-odbc-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110967" comment="php5-opcache-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110968" comment="php5-openssl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110969" comment="php5-pcntl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110970" comment="php5-pdo-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110971" comment="php5-pear-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110972" comment="php5-pgsql-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110973" comment="php5-phar-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110974" comment="php5-posix-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110975" comment="php5-pspell-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110976" comment="php5-readline-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110977" comment="php5-shmop-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110978" comment="php5-snmp-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110979" comment="php5-soap-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110980" comment="php5-sockets-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110981" comment="php5-sqlite-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110982" comment="php5-suhosin-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110983" comment="php5-sysvmsg-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110984" comment="php5-sysvsem-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110985" comment="php5-sysvshm-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110986" comment="php5-tidy-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110987" comment="php5-tokenizer-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110988" comment="php5-wddx-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110989" comment="php5-xmlreader-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110990" comment="php5-xmlrpc-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110991" comment="php5-xmlwriter-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110992" comment="php5-xsl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110993" comment="php5-zip-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110994" comment="php5-zlib-5.6.1-30.6 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4603</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4603" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4603" source="CVE"/>
    <description>
    The exception::getTraceAsString function in Zend/zend_exceptions.c in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 allows remote attackers to execute arbitrary code via an unexpected data type, related to a "type confusion" issue.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110937" comment="apache2-mod_php5-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110938" comment="php5-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110939" comment="php5-bcmath-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110940" comment="php5-bz2-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110941" comment="php5-calendar-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110942" comment="php5-ctype-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110943" comment="php5-curl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110944" comment="php5-dba-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110945" comment="php5-devel-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110946" comment="php5-dom-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110947" comment="php5-enchant-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110948" comment="php5-exif-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110949" comment="php5-fastcgi-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110950" comment="php5-fileinfo-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110951" comment="php5-firebird-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110952" comment="php5-fpm-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110953" comment="php5-ftp-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110954" comment="php5-gd-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110955" comment="php5-gettext-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110956" comment="php5-gmp-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110957" comment="php5-iconv-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110958" comment="php5-imap-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110959" comment="php5-intl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110960" comment="php5-json-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110961" comment="php5-ldap-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110962" comment="php5-mbstring-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110963" comment="php5-mcrypt-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110964" comment="php5-mssql-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110965" comment="php5-mysql-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110966" comment="php5-odbc-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110967" comment="php5-opcache-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110968" comment="php5-openssl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110969" comment="php5-pcntl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110970" comment="php5-pdo-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110971" comment="php5-pear-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110972" comment="php5-pgsql-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110973" comment="php5-phar-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110974" comment="php5-posix-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110975" comment="php5-pspell-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110976" comment="php5-readline-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110977" comment="php5-shmop-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110978" comment="php5-snmp-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110979" comment="php5-soap-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110980" comment="php5-sockets-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110981" comment="php5-sqlite-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110982" comment="php5-suhosin-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110983" comment="php5-sysvmsg-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110984" comment="php5-sysvsem-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110985" comment="php5-sysvshm-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110986" comment="php5-tidy-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110987" comment="php5-tokenizer-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110988" comment="php5-wddx-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110989" comment="php5-xmlreader-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110990" comment="php5-xmlrpc-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110991" comment="php5-xmlwriter-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110992" comment="php5-xsl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110993" comment="php5-zip-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110994" comment="php5-zlib-5.6.1-30.6 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4604</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4604" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4604" source="CVE"/>
    <description>
    The mget function in softmagic.c in file 5.x, as used in the Fileinfo component in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8, does not properly maintain a certain pointer relationship, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted string that is mishandled by a "Python script text executable" rule.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110937" comment="apache2-mod_php5-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110938" comment="php5-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110939" comment="php5-bcmath-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110940" comment="php5-bz2-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110941" comment="php5-calendar-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110942" comment="php5-ctype-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110943" comment="php5-curl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110944" comment="php5-dba-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110945" comment="php5-devel-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110946" comment="php5-dom-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110947" comment="php5-enchant-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110948" comment="php5-exif-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110949" comment="php5-fastcgi-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110950" comment="php5-fileinfo-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110951" comment="php5-firebird-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110952" comment="php5-fpm-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110953" comment="php5-ftp-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110954" comment="php5-gd-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110955" comment="php5-gettext-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110956" comment="php5-gmp-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110957" comment="php5-iconv-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110958" comment="php5-imap-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110959" comment="php5-intl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110960" comment="php5-json-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110961" comment="php5-ldap-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110962" comment="php5-mbstring-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110963" comment="php5-mcrypt-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110964" comment="php5-mssql-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110965" comment="php5-mysql-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110966" comment="php5-odbc-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110967" comment="php5-opcache-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110968" comment="php5-openssl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110969" comment="php5-pcntl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110970" comment="php5-pdo-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110971" comment="php5-pear-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110972" comment="php5-pgsql-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110973" comment="php5-phar-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110974" comment="php5-posix-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110975" comment="php5-pspell-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110976" comment="php5-readline-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110977" comment="php5-shmop-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110978" comment="php5-snmp-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110979" comment="php5-soap-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110980" comment="php5-sockets-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110981" comment="php5-sqlite-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110982" comment="php5-suhosin-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110983" comment="php5-sysvmsg-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110984" comment="php5-sysvsem-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110985" comment="php5-sysvshm-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110986" comment="php5-tidy-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110987" comment="php5-tokenizer-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110988" comment="php5-wddx-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110989" comment="php5-xmlreader-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110990" comment="php5-xmlrpc-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110991" comment="php5-xmlwriter-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110992" comment="php5-xsl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110993" comment="php5-zip-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110994" comment="php5-zlib-5.6.1-30.6 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4605</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4605" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4605" source="CVE"/>
    <description>
    The mcopy function in softmagic.c in file 5.x, as used in the Fileinfo component in PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8, does not properly restrict a certain offset value, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted string that is mishandled by a "Python script text executable" rule.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110937" comment="apache2-mod_php5-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110938" comment="php5-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110939" comment="php5-bcmath-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110940" comment="php5-bz2-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110941" comment="php5-calendar-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110942" comment="php5-ctype-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110943" comment="php5-curl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110944" comment="php5-dba-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110945" comment="php5-devel-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110946" comment="php5-dom-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110947" comment="php5-enchant-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110948" comment="php5-exif-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110949" comment="php5-fastcgi-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110950" comment="php5-fileinfo-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110951" comment="php5-firebird-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110952" comment="php5-fpm-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110953" comment="php5-ftp-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110954" comment="php5-gd-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110955" comment="php5-gettext-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110956" comment="php5-gmp-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110957" comment="php5-iconv-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110958" comment="php5-imap-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110959" comment="php5-intl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110960" comment="php5-json-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110961" comment="php5-ldap-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110962" comment="php5-mbstring-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110963" comment="php5-mcrypt-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110964" comment="php5-mssql-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110965" comment="php5-mysql-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110966" comment="php5-odbc-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110967" comment="php5-opcache-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110968" comment="php5-openssl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110969" comment="php5-pcntl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110970" comment="php5-pdo-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110971" comment="php5-pear-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110972" comment="php5-pgsql-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110973" comment="php5-phar-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110974" comment="php5-posix-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110975" comment="php5-pspell-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110976" comment="php5-readline-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110977" comment="php5-shmop-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110978" comment="php5-snmp-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110979" comment="php5-soap-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110980" comment="php5-sockets-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110981" comment="php5-sqlite-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110982" comment="php5-suhosin-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110983" comment="php5-sysvmsg-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110984" comment="php5-sysvsem-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110985" comment="php5-sysvshm-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110986" comment="php5-tidy-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110987" comment="php5-tokenizer-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110988" comment="php5-wddx-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110989" comment="php5-xmlreader-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110990" comment="php5-xmlrpc-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110991" comment="php5-xmlwriter-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110992" comment="php5-xsl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110993" comment="php5-zip-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110994" comment="php5-zlib-5.6.1-30.6 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4620</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4620" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4620" source="CVE"/>
    <description>
    name.c in named in ISC BIND 9.7.x through 9.9.x before 9.9.7-P1 and 9.10.x before 9.10.2-P2, when configured as a recursive resolver with DNSSEC validation, allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) by constructing crafted zone data and then making a query for a name in that zone.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111175" comment="bind-9.9.6P1-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111176" comment="bind-chrootenv-9.9.6P1-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111177" comment="bind-devel-9.9.6P1-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111178" comment="bind-doc-9.9.6P1-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111180" comment="bind-libs-9.9.6P1-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111179" comment="bind-libs-32bit-9.9.6P1-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111181" comment="bind-lwresd-9.9.6P1-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111182" comment="bind-utils-9.9.6P1-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4625</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4625" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4625" source="CVE"/>
    <description>
    Integer overflow in the authentication_agent_new_cookie function in PolicyKit (aka polkit) before 0.113 allows local users to gain privileges by creating a large number of connections, which triggers the issuance of a duplicate cookie value.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115013" comment="libpolkit0-0.113-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115014" comment="libpolkit0-32bit-0.113-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115015" comment="polkit-0.113-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115016" comment="polkit-devel-0.113-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115017" comment="polkit-doc-0.113-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115018" comment="typelib-1_0-Polkit-1_0-0.113-3.8.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4634</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4634" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4634" source="CVE"/>
    <description>
    SQL injection vulnerability in graphs.php in Cacti before 0.8.8e allows remote attackers to execute arbitrary SQL commands via the local_graph_id parameter.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111322" comment="cacti-0.8.8e-4.10.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4643</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4643" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4643" source="CVE"/>
    <description>
    Integer overflow in the ftp_genlist function in ext/ftp/ftp.c in PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 allows remote FTP servers to execute arbitrary code via a long reply to a LIST command, leading to a heap-based buffer overflow.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-4022.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110937" comment="apache2-mod_php5-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110938" comment="php5-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110939" comment="php5-bcmath-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110940" comment="php5-bz2-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110941" comment="php5-calendar-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110942" comment="php5-ctype-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110943" comment="php5-curl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110944" comment="php5-dba-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110945" comment="php5-devel-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110946" comment="php5-dom-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110947" comment="php5-enchant-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110948" comment="php5-exif-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110949" comment="php5-fastcgi-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110950" comment="php5-fileinfo-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110951" comment="php5-firebird-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110952" comment="php5-fpm-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110953" comment="php5-ftp-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110954" comment="php5-gd-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110955" comment="php5-gettext-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110956" comment="php5-gmp-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110957" comment="php5-iconv-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110958" comment="php5-imap-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110959" comment="php5-intl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110960" comment="php5-json-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110961" comment="php5-ldap-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110962" comment="php5-mbstring-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110963" comment="php5-mcrypt-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110964" comment="php5-mssql-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110965" comment="php5-mysql-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110966" comment="php5-odbc-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110967" comment="php5-opcache-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110968" comment="php5-openssl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110969" comment="php5-pcntl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110970" comment="php5-pdo-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110971" comment="php5-pear-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110972" comment="php5-pgsql-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110973" comment="php5-phar-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110974" comment="php5-posix-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110975" comment="php5-pspell-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110976" comment="php5-readline-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110977" comment="php5-shmop-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110978" comment="php5-snmp-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110979" comment="php5-soap-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110980" comment="php5-sockets-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110981" comment="php5-sqlite-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110982" comment="php5-suhosin-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110983" comment="php5-sysvmsg-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110984" comment="php5-sysvsem-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110985" comment="php5-sysvshm-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110986" comment="php5-tidy-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110987" comment="php5-tokenizer-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110988" comment="php5-wddx-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110989" comment="php5-xmlreader-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110990" comment="php5-xmlrpc-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110991" comment="php5-xmlwriter-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110992" comment="php5-xsl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110993" comment="php5-zip-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110994" comment="php5-zlib-5.6.1-30.6 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4644</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4644" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4644" source="CVE"/>
    <description>
    The php_pgsql_meta_data function in pgsql.c in the PostgreSQL (aka pgsql) extension in PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 does not validate token extraction for table names, which might allow remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted name.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1352.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009110937" comment="apache2-mod_php5-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110938" comment="php5-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110939" comment="php5-bcmath-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110940" comment="php5-bz2-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110941" comment="php5-calendar-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110942" comment="php5-ctype-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110943" comment="php5-curl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110944" comment="php5-dba-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110945" comment="php5-devel-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110946" comment="php5-dom-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110947" comment="php5-enchant-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110948" comment="php5-exif-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110949" comment="php5-fastcgi-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110950" comment="php5-fileinfo-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110951" comment="php5-firebird-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110952" comment="php5-fpm-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110953" comment="php5-ftp-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110954" comment="php5-gd-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110955" comment="php5-gettext-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110956" comment="php5-gmp-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110957" comment="php5-iconv-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110958" comment="php5-imap-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110959" comment="php5-intl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110960" comment="php5-json-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110961" comment="php5-ldap-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110962" comment="php5-mbstring-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110963" comment="php5-mcrypt-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110964" comment="php5-mssql-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110965" comment="php5-mysql-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110966" comment="php5-odbc-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110967" comment="php5-opcache-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110968" comment="php5-openssl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110969" comment="php5-pcntl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110970" comment="php5-pdo-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110971" comment="php5-pear-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110972" comment="php5-pgsql-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110973" comment="php5-phar-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110974" comment="php5-posix-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110975" comment="php5-pspell-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110976" comment="php5-readline-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110977" comment="php5-shmop-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110978" comment="php5-snmp-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110979" comment="php5-soap-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110980" comment="php5-sockets-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110981" comment="php5-sqlite-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110982" comment="php5-suhosin-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110983" comment="php5-sysvmsg-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110984" comment="php5-sysvsem-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110985" comment="php5-sysvshm-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110986" comment="php5-tidy-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110987" comment="php5-tokenizer-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110988" comment="php5-wddx-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110989" comment="php5-xmlreader-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110990" comment="php5-xmlrpc-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110991" comment="php5-xmlwriter-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110992" comment="php5-xsl-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110993" comment="php5-zip-5.6.1-30.6 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009110994" comment="php5-zlib-5.6.1-30.6 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4651</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4651" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4651" source="CVE"/>
    <description>
    The dissect_wccp2r1_address_table_info function in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.12.x before 1.12.6 does not properly determine whether enough memory is available for storing IP address strings, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111109" comment="wireshark-1.12.6-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111110" comment="wireshark-devel-1.12.6-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111111" comment="wireshark-ui-gtk-1.12.6-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111112" comment="wireshark-ui-qt-1.12.6-18.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4652</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4652" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4652" source="CVE"/>
    <description>
    epan/dissectors/packet-gsm_a_dtap.c in the GSM DTAP dissector in Wireshark 1.12.x before 1.12.6 does not properly validate digit characters, which allows remote attackers to cause a denial of service (application crash) via a crafted packet, related to the de_emerg_num_list and de_bcd_num functions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111109" comment="wireshark-1.12.6-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111110" comment="wireshark-devel-1.12.6-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111111" comment="wireshark-ui-gtk-1.12.6-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111112" comment="wireshark-ui-qt-1.12.6-18.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4692</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4692" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4692" source="CVE"/>
    <description>
    The kvm_apic_has_events function in arch/x86/kvm/lapic.h in the Linux kernel through 4.1.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by leveraging /dev/kvm access for an ioctl call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113567" comment="bbswitch-0.8-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113568" comment="bbswitch-kmp-default-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113569" comment="bbswitch-kmp-desktop-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113570" comment="bbswitch-kmp-pae-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113571" comment="bbswitch-kmp-xen-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113572" comment="cloop-2.639-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113573" comment="cloop-kmp-default-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113574" comment="cloop-kmp-desktop-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113575" comment="cloop-kmp-pae-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113576" comment="cloop-kmp-xen-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113577" comment="crash-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113578" comment="crash-devel-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113579" comment="crash-doc-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113580" comment="crash-eppic-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113581" comment="crash-gcore-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113582" comment="crash-kmp-default-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113583" comment="crash-kmp-desktop-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113584" comment="crash-kmp-pae-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113585" comment="crash-kmp-xen-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113586" comment="hdjmod-1.28-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113587" comment="hdjmod-kmp-default-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113588" comment="hdjmod-kmp-desktop-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113589" comment="hdjmod-kmp-pae-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113590" comment="hdjmod-kmp-xen-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113591" comment="ipset-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113592" comment="ipset-devel-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113593" comment="ipset-kmp-default-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113594" comment="ipset-kmp-desktop-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113595" comment="ipset-kmp-pae-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113596" comment="ipset-kmp-xen-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113598" comment="kernel-debug-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113599" comment="kernel-debug-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113600" comment="kernel-debug-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113601" comment="kernel-default-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113602" comment="kernel-default-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113603" comment="kernel-default-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113604" comment="kernel-desktop-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113605" comment="kernel-desktop-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113606" comment="kernel-desktop-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113617" comment="kernel-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113607" comment="kernel-docs-3.16.7-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113608" comment="kernel-ec2-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113609" comment="kernel-ec2-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113610" comment="kernel-ec2-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113618" comment="kernel-macros-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113611" comment="kernel-obs-build-3.16.7-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113613" comment="kernel-obs-qa-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113612" comment="kernel-obs-qa-xen-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113614" comment="kernel-pae-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113615" comment="kernel-pae-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113616" comment="kernel-pae-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113619" comment="kernel-source-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113620" comment="kernel-source-vanilla-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113621" comment="kernel-syms-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113622" comment="kernel-vanilla-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113623" comment="kernel-vanilla-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113624" comment="kernel-xen-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113625" comment="kernel-xen-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113626" comment="kernel-xen-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113597" comment="libipset3-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113627" comment="pcfclock-0.44-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113628" comment="pcfclock-kmp-default-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113629" comment="pcfclock-kmp-desktop-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113630" comment="pcfclock-kmp-pae-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113631" comment="vhba-kmp-20140629-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113632" comment="vhba-kmp-default-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113633" comment="vhba-kmp-desktop-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113634" comment="vhba-kmp-pae-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113635" comment="vhba-kmp-xen-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113636" comment="xen-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113637" comment="xen-devel-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113646" comment="xen-doc-html-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113647" comment="xen-kmp-default-4.4.2_06_k3.16.7_24-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113648" comment="xen-kmp-desktop-4.4.2_06_k3.16.7_24-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113639" comment="xen-libs-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113638" comment="xen-libs-32bit-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113649" comment="xen-tools-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113640" comment="xen-tools-domU-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113641" comment="xtables-addons-2.6-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113642" comment="xtables-addons-kmp-default-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113643" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113644" comment="xtables-addons-kmp-pae-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113645" comment="xtables-addons-kmp-xen-2.6_k3.16.7_24-11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4695</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4695" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4695" source="CVE"/>
    <description>
    meta.h in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WMF file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111102" comment="libwmf-0.2.8.4-239.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111103" comment="libwmf-0_2-7-0.2.8.4-239.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111104" comment="libwmf-0_2-7-32bit-0.2.8.4-239.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111105" comment="libwmf-devel-0.2.8.4-239.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111106" comment="libwmf-gnome-0.2.8.4-239.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111107" comment="libwmf-gnome-32bit-0.2.8.4-239.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111108" comment="libwmf-tools-0.2.8.4-239.7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4696</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4696" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4696" source="CVE"/>
    <description>
    Use-after-free vulnerability in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (crash) via a crafted WMF file to the (1) wmf2gd or (2) wmf2eps command.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111102" comment="libwmf-0.2.8.4-239.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111103" comment="libwmf-0_2-7-0.2.8.4-239.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111104" comment="libwmf-0_2-7-32bit-0.2.8.4-239.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111105" comment="libwmf-devel-0.2.8.4-239.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111106" comment="libwmf-gnome-0.2.8.4-239.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111107" comment="libwmf-gnome-32bit-0.2.8.4-239.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111108" comment="libwmf-tools-0.2.8.4-239.7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4700</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4700" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4700" source="CVE"/>
    <description>
    The bpf_int_jit_compile function in arch/x86/net/bpf_jit_comp.c in the Linux kernel before 4.0.6 allows local users to cause a denial of service (system crash) by creating a packet filter and then loading crafted BPF instructions that trigger late convergence by the JIT compiler.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113567" comment="bbswitch-0.8-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113568" comment="bbswitch-kmp-default-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113569" comment="bbswitch-kmp-desktop-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113570" comment="bbswitch-kmp-pae-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113571" comment="bbswitch-kmp-xen-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113572" comment="cloop-2.639-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113573" comment="cloop-kmp-default-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113574" comment="cloop-kmp-desktop-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113575" comment="cloop-kmp-pae-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113576" comment="cloop-kmp-xen-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113577" comment="crash-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113578" comment="crash-devel-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113579" comment="crash-doc-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113580" comment="crash-eppic-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113581" comment="crash-gcore-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113582" comment="crash-kmp-default-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113583" comment="crash-kmp-desktop-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113584" comment="crash-kmp-pae-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113585" comment="crash-kmp-xen-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113586" comment="hdjmod-1.28-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113587" comment="hdjmod-kmp-default-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113588" comment="hdjmod-kmp-desktop-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113589" comment="hdjmod-kmp-pae-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113590" comment="hdjmod-kmp-xen-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113591" comment="ipset-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113592" comment="ipset-devel-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113593" comment="ipset-kmp-default-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113594" comment="ipset-kmp-desktop-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113595" comment="ipset-kmp-pae-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113596" comment="ipset-kmp-xen-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113598" comment="kernel-debug-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113599" comment="kernel-debug-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113600" comment="kernel-debug-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113601" comment="kernel-default-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113602" comment="kernel-default-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113603" comment="kernel-default-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113604" comment="kernel-desktop-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113605" comment="kernel-desktop-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113606" comment="kernel-desktop-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113617" comment="kernel-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113607" comment="kernel-docs-3.16.7-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113608" comment="kernel-ec2-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113609" comment="kernel-ec2-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113610" comment="kernel-ec2-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113618" comment="kernel-macros-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113611" comment="kernel-obs-build-3.16.7-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113613" comment="kernel-obs-qa-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113612" comment="kernel-obs-qa-xen-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113614" comment="kernel-pae-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113615" comment="kernel-pae-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113616" comment="kernel-pae-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113619" comment="kernel-source-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113620" comment="kernel-source-vanilla-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113621" comment="kernel-syms-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113622" comment="kernel-vanilla-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113623" comment="kernel-vanilla-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113624" comment="kernel-xen-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113625" comment="kernel-xen-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113626" comment="kernel-xen-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113597" comment="libipset3-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113627" comment="pcfclock-0.44-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113628" comment="pcfclock-kmp-default-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113629" comment="pcfclock-kmp-desktop-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113630" comment="pcfclock-kmp-pae-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113631" comment="vhba-kmp-20140629-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113632" comment="vhba-kmp-default-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113633" comment="vhba-kmp-desktop-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113634" comment="vhba-kmp-pae-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113635" comment="vhba-kmp-xen-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113636" comment="xen-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113637" comment="xen-devel-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113646" comment="xen-doc-html-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113647" comment="xen-kmp-default-4.4.2_06_k3.16.7_24-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113648" comment="xen-kmp-desktop-4.4.2_06_k3.16.7_24-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113639" comment="xen-libs-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113638" comment="xen-libs-32bit-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113649" comment="xen-tools-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113640" comment="xen-tools-domU-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113641" comment="xtables-addons-2.6-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113642" comment="xtables-addons-kmp-default-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113643" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113644" comment="xtables-addons-kmp-pae-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113645" comment="xtables-addons-kmp-xen-2.6_k3.16.7_24-11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4729</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4729" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4729" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u80 and 8u45 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Deployment.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111326" comment="java-1_7_0-openjdk-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111327" comment="java-1_7_0-openjdk-accessibility-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111323" comment="java-1_7_0-openjdk-bootstrap-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111324" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111325" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111328" comment="java-1_7_0-openjdk-demo-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111329" comment="java-1_7_0-openjdk-devel-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111330" comment="java-1_7_0-openjdk-headless-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111331" comment="java-1_7_0-openjdk-javadoc-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111332" comment="java-1_7_0-openjdk-src-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111333" comment="java-1_8_0-openjdk-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111334" comment="java-1_8_0-openjdk-accessibility-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111335" comment="java-1_8_0-openjdk-demo-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111336" comment="java-1_8_0-openjdk-devel-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111337" comment="java-1_8_0-openjdk-headless-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111338" comment="java-1_8_0-openjdk-javadoc-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111339" comment="java-1_8_0-openjdk-src-1.8.0.51-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4730</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4730" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4730" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.20 and earlier allows remote authenticated users to affect availability via unknown vectors related to Types.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118962" comment="libmysql56client18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118963" comment="libmysql56client18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118964" comment="libmysql56client_r18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118965" comment="libmysql56client_r18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118966" comment="mysql-community-server-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118967" comment="mysql-community-server-bench-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118968" comment="mysql-community-server-client-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118969" comment="mysql-community-server-errormessages-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118970" comment="mysql-community-server-test-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118971" comment="mysql-community-server-tools-5.6.27-2.12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4731</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4731" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4731" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; Java SE Embedded 7u75; and Java SE Embedded 8u33 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111326" comment="java-1_7_0-openjdk-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111327" comment="java-1_7_0-openjdk-accessibility-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111323" comment="java-1_7_0-openjdk-bootstrap-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111324" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111325" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111328" comment="java-1_7_0-openjdk-demo-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111329" comment="java-1_7_0-openjdk-devel-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111330" comment="java-1_7_0-openjdk-headless-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111331" comment="java-1_7_0-openjdk-javadoc-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111332" comment="java-1_7_0-openjdk-src-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111333" comment="java-1_8_0-openjdk-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111334" comment="java-1_8_0-openjdk-accessibility-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111335" comment="java-1_8_0-openjdk-demo-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111336" comment="java-1_8_0-openjdk-devel-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111337" comment="java-1_8_0-openjdk-headless-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111338" comment="java-1_8_0-openjdk-javadoc-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111339" comment="java-1_8_0-openjdk-src-1.8.0.51-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4732</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4732" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4732" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2015-2590.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111326" comment="java-1_7_0-openjdk-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111327" comment="java-1_7_0-openjdk-accessibility-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111323" comment="java-1_7_0-openjdk-bootstrap-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111324" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111325" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111328" comment="java-1_7_0-openjdk-demo-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111329" comment="java-1_7_0-openjdk-devel-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111330" comment="java-1_7_0-openjdk-headless-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111331" comment="java-1_7_0-openjdk-javadoc-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111332" comment="java-1_7_0-openjdk-src-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111333" comment="java-1_8_0-openjdk-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111334" comment="java-1_8_0-openjdk-accessibility-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111335" comment="java-1_8_0-openjdk-demo-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111336" comment="java-1_8_0-openjdk-devel-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111337" comment="java-1_8_0-openjdk-headless-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111338" comment="java-1_8_0-openjdk-javadoc-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111339" comment="java-1_8_0-openjdk-src-1.8.0.51-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4733</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4733" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4733" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111326" comment="java-1_7_0-openjdk-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111327" comment="java-1_7_0-openjdk-accessibility-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111323" comment="java-1_7_0-openjdk-bootstrap-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111324" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111325" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111328" comment="java-1_7_0-openjdk-demo-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111329" comment="java-1_7_0-openjdk-devel-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111330" comment="java-1_7_0-openjdk-headless-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111331" comment="java-1_7_0-openjdk-javadoc-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111332" comment="java-1_7_0-openjdk-src-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111333" comment="java-1_8_0-openjdk-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111334" comment="java-1_8_0-openjdk-accessibility-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111335" comment="java-1_8_0-openjdk-demo-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111336" comment="java-1_8_0-openjdk-devel-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111337" comment="java-1_8_0-openjdk-headless-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111338" comment="java-1_8_0-openjdk-javadoc-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111339" comment="java-1_8_0-openjdk-src-1.8.0.51-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4734</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4734" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85 and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via vectors related to JGSS.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115543" comment="java-1_7_0-openjdk-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115544" comment="java-1_7_0-openjdk-accessibility-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115540" comment="java-1_7_0-openjdk-bootstrap-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115541" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115542" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115545" comment="java-1_7_0-openjdk-demo-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115546" comment="java-1_7_0-openjdk-devel-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115547" comment="java-1_7_0-openjdk-headless-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115548" comment="java-1_7_0-openjdk-javadoc-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115549" comment="java-1_7_0-openjdk-src-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115531" comment="java-1_8_0-openjdk-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115532" comment="java-1_8_0-openjdk-accessibility-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115533" comment="java-1_8_0-openjdk-demo-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115534" comment="java-1_8_0-openjdk-devel-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115535" comment="java-1_8_0-openjdk-headless-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115536" comment="java-1_8_0-openjdk-javadoc-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115537" comment="java-1_8_0-openjdk-src-1.8.0.65-18.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4736</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4736" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4736" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u80 and 8u45 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111326" comment="java-1_7_0-openjdk-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111327" comment="java-1_7_0-openjdk-accessibility-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111323" comment="java-1_7_0-openjdk-bootstrap-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111324" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111325" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111328" comment="java-1_7_0-openjdk-demo-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111329" comment="java-1_7_0-openjdk-devel-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111330" comment="java-1_7_0-openjdk-headless-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111331" comment="java-1_7_0-openjdk-javadoc-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111332" comment="java-1_7_0-openjdk-src-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111333" comment="java-1_8_0-openjdk-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111334" comment="java-1_8_0-openjdk-accessibility-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111335" comment="java-1_8_0-openjdk-demo-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111336" comment="java-1_8_0-openjdk-devel-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111337" comment="java-1_8_0-openjdk-headless-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111338" comment="java-1_8_0-openjdk-javadoc-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111339" comment="java-1_8_0-openjdk-src-1.8.0.51-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4737</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4737" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4737" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier, and 5.6.23 and earlier, allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Pluggable Auth.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114573" comment="libmysql56client18-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114572" comment="libmysql56client18-32bit-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114575" comment="libmysql56client_r18-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114574" comment="libmysql56client_r18-32bit-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114576" comment="mysql-community-server-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114577" comment="mysql-community-server-bench-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114578" comment="mysql-community-server-client-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114579" comment="mysql-community-server-errormessages-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114580" comment="mysql-community-server-test-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114581" comment="mysql-community-server-tools-5.6.26-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4748</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4748" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4748" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and Embedded 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Security.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111326" comment="java-1_7_0-openjdk-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111327" comment="java-1_7_0-openjdk-accessibility-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111323" comment="java-1_7_0-openjdk-bootstrap-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111324" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111325" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111328" comment="java-1_7_0-openjdk-demo-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111329" comment="java-1_7_0-openjdk-devel-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111330" comment="java-1_7_0-openjdk-headless-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111331" comment="java-1_7_0-openjdk-javadoc-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111332" comment="java-1_7_0-openjdk-src-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111333" comment="java-1_8_0-openjdk-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111334" comment="java-1_8_0-openjdk-accessibility-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111335" comment="java-1_8_0-openjdk-demo-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111336" comment="java-1_8_0-openjdk-devel-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111337" comment="java-1_8_0-openjdk-headless-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111338" comment="java-1_8_0-openjdk-javadoc-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111339" comment="java-1_8_0-openjdk-src-1.8.0.51-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4749</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4749" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4749" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect availability via vectors related to JNDI.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111326" comment="java-1_7_0-openjdk-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111327" comment="java-1_7_0-openjdk-accessibility-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111323" comment="java-1_7_0-openjdk-bootstrap-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111324" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111325" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111328" comment="java-1_7_0-openjdk-demo-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111329" comment="java-1_7_0-openjdk-devel-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111330" comment="java-1_7_0-openjdk-headless-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111331" comment="java-1_7_0-openjdk-javadoc-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111332" comment="java-1_7_0-openjdk-src-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111333" comment="java-1_8_0-openjdk-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111334" comment="java-1_8_0-openjdk-accessibility-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111335" comment="java-1_8_0-openjdk-demo-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111336" comment="java-1_8_0-openjdk-devel-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111337" comment="java-1_8_0-openjdk-headless-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111338" comment="java-1_8_0-openjdk-javadoc-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111339" comment="java-1_8_0-openjdk-src-1.8.0.51-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4752</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4752" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4752" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to Server : I_S.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114573" comment="libmysql56client18-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114572" comment="libmysql56client18-32bit-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114575" comment="libmysql56client_r18-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114574" comment="libmysql56client_r18-32bit-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114576" comment="mysql-community-server-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114577" comment="mysql-community-server-bench-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114578" comment="mysql-community-server-client-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114579" comment="mysql-community-server-errormessages-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114580" comment="mysql-community-server-test-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114581" comment="mysql-community-server-tools-5.6.26-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4756</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4756" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4756" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.22 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB, a different vulnerability than CVE-2015-0439.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114573" comment="libmysql56client18-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114572" comment="libmysql56client18-32bit-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114575" comment="libmysql56client_r18-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114574" comment="libmysql56client_r18-32bit-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114576" comment="mysql-community-server-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114577" comment="mysql-community-server-bench-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114578" comment="mysql-community-server-client-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114579" comment="mysql-community-server-errormessages-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114580" comment="mysql-community-server-test-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114581" comment="mysql-community-server-tools-5.6.26-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4757</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4757" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4757" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.42 and earlier and 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114573" comment="libmysql56client18-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114572" comment="libmysql56client18-32bit-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114575" comment="libmysql56client_r18-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114574" comment="libmysql56client_r18-32bit-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114576" comment="mysql-community-server-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114577" comment="mysql-community-server-bench-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114578" comment="mysql-community-server-client-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114579" comment="mysql-community-server-errormessages-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114580" comment="mysql-community-server-test-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114581" comment="mysql-community-server-tools-5.6.26-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4760</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4760" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4760" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111326" comment="java-1_7_0-openjdk-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111327" comment="java-1_7_0-openjdk-accessibility-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111323" comment="java-1_7_0-openjdk-bootstrap-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111324" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111325" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.85-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111328" comment="java-1_7_0-openjdk-demo-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111329" comment="java-1_7_0-openjdk-devel-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111330" comment="java-1_7_0-openjdk-headless-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111331" comment="java-1_7_0-openjdk-javadoc-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111332" comment="java-1_7_0-openjdk-src-1.7.0.85-10.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111333" comment="java-1_8_0-openjdk-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111334" comment="java-1_8_0-openjdk-accessibility-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111335" comment="java-1_8_0-openjdk-demo-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111336" comment="java-1_8_0-openjdk-devel-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111337" comment="java-1_8_0-openjdk-headless-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111338" comment="java-1_8_0-openjdk-javadoc-1.8.0.51-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111339" comment="java-1_8_0-openjdk-src-1.8.0.51-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4761</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4761" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4761" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Memcached.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114573" comment="libmysql56client18-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114572" comment="libmysql56client18-32bit-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114575" comment="libmysql56client_r18-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114574" comment="libmysql56client_r18-32bit-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114576" comment="mysql-community-server-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114577" comment="mysql-community-server-bench-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114578" comment="mysql-community-server-client-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114579" comment="mysql-community-server-errormessages-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114580" comment="mysql-community-server-test-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114581" comment="mysql-community-server-tools-5.6.26-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4766</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4766" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4766" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.25 and earlier allows local users to affect availability via unknown vectors related to Server : Security : Firewall.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118962" comment="libmysql56client18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118963" comment="libmysql56client18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118964" comment="libmysql56client_r18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118965" comment="libmysql56client_r18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118966" comment="mysql-community-server-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118967" comment="mysql-community-server-bench-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118968" comment="mysql-community-server-client-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118969" comment="mysql-community-server-errormessages-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118970" comment="mysql-community-server-test-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118971" comment="mysql-community-server-tools-5.6.27-2.12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4767</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4767" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4767" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Security : Firewall, a different vulnerability than CVE-2015-4769.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114573" comment="libmysql56client18-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114572" comment="libmysql56client18-32bit-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114575" comment="libmysql56client_r18-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114574" comment="libmysql56client_r18-32bit-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114576" comment="mysql-community-server-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114577" comment="mysql-community-server-bench-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114578" comment="mysql-community-server-client-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114579" comment="mysql-community-server-errormessages-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114580" comment="mysql-community-server-test-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114581" comment="mysql-community-server-tools-5.6.26-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4769</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4769" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4769" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Security : Firewall, a different vulnerability than CVE-2015-4767.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114573" comment="libmysql56client18-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114572" comment="libmysql56client18-32bit-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114575" comment="libmysql56client_r18-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114574" comment="libmysql56client_r18-32bit-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114576" comment="mysql-community-server-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114577" comment="mysql-community-server-bench-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114578" comment="mysql-community-server-client-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114579" comment="mysql-community-server-errormessages-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114580" comment="mysql-community-server-test-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114581" comment="mysql-community-server-tools-5.6.26-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4771</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4771" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4771" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect availability via vectors related to RBR.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114573" comment="libmysql56client18-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114572" comment="libmysql56client18-32bit-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114575" comment="libmysql56client_r18-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114574" comment="libmysql56client_r18-32bit-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114576" comment="mysql-community-server-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114577" comment="mysql-community-server-bench-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114578" comment="mysql-community-server-client-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114579" comment="mysql-community-server-errormessages-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114580" comment="mysql-community-server-test-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114581" comment="mysql-community-server-tools-5.6.26-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4772</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4772" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114573" comment="libmysql56client18-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114572" comment="libmysql56client18-32bit-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114575" comment="libmysql56client_r18-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114574" comment="libmysql56client_r18-32bit-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114576" comment="mysql-community-server-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114577" comment="mysql-community-server-bench-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114578" comment="mysql-community-server-client-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114579" comment="mysql-community-server-errormessages-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114580" comment="mysql-community-server-test-5.6.26-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114581" comment="mysql-community-server-tools-5.6.26-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4792</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4792" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition, a different vulnerability than CVE-2015-4802.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118962" comment="libmysql56client18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118963" comment="libmysql56client18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118964" comment="libmysql56client_r18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118965" comment="libmysql56client_r18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118940" comment="libmysqlclient-devel-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118941" comment="libmysqlclient18-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118942" comment="libmysqlclient18-32bit-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118943" comment="libmysqlclient_r18-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118944" comment="libmysqlclient_r18-32bit-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118945" comment="libmysqld-devel-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118946" comment="libmysqld18-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118947" comment="mariadb-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118948" comment="mariadb-bench-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118949" comment="mariadb-client-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118950" comment="mariadb-errormessages-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118951" comment="mariadb-test-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118952" comment="mariadb-tools-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118966" comment="mysql-community-server-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118967" comment="mysql-community-server-bench-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118968" comment="mysql-community-server-client-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118969" comment="mysql-community-server-errormessages-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118970" comment="mysql-community-server-test-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118971" comment="mysql-community-server-tools-5.6.27-2.12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4800</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4800" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Optimizer.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118962" comment="libmysql56client18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118963" comment="libmysql56client18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118964" comment="libmysql56client_r18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118965" comment="libmysql56client_r18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118966" comment="mysql-community-server-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118967" comment="mysql-community-server-bench-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118968" comment="mysql-community-server-client-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118969" comment="mysql-community-server-errormessages-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118970" comment="mysql-community-server-test-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118971" comment="mysql-community-server-tools-5.6.27-2.12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4802</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4802" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition, a different vulnerability than CVE-2015-4792.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118962" comment="libmysql56client18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118963" comment="libmysql56client18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118964" comment="libmysql56client_r18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118965" comment="libmysql56client_r18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118940" comment="libmysqlclient-devel-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118941" comment="libmysqlclient18-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118942" comment="libmysqlclient18-32bit-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118943" comment="libmysqlclient_r18-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118944" comment="libmysqlclient_r18-32bit-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118945" comment="libmysqld-devel-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118946" comment="libmysqld18-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118947" comment="mariadb-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118948" comment="mariadb-bench-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118949" comment="mariadb-client-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118950" comment="mariadb-errormessages-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118951" comment="mariadb-test-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118952" comment="mariadb-tools-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118966" comment="mysql-community-server-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118967" comment="mysql-community-server-bench-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118968" comment="mysql-community-server-client-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118969" comment="mysql-community-server-errormessages-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118970" comment="mysql-community-server-test-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118971" comment="mysql-community-server-tools-5.6.27-2.12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4803</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4803" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allows remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2015-4893 and CVE-2015-4911.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115543" comment="java-1_7_0-openjdk-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115544" comment="java-1_7_0-openjdk-accessibility-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115540" comment="java-1_7_0-openjdk-bootstrap-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115541" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115542" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115545" comment="java-1_7_0-openjdk-demo-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115546" comment="java-1_7_0-openjdk-devel-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115547" comment="java-1_7_0-openjdk-headless-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115548" comment="java-1_7_0-openjdk-javadoc-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115549" comment="java-1_7_0-openjdk-src-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115531" comment="java-1_8_0-openjdk-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115532" comment="java-1_8_0-openjdk-accessibility-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115533" comment="java-1_8_0-openjdk-demo-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115534" comment="java-1_8_0-openjdk-devel-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115535" comment="java-1_8_0-openjdk-headless-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115536" comment="java-1_8_0-openjdk-javadoc-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115537" comment="java-1_8_0-openjdk-src-1.8.0.65-18.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4805</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4805" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Serialization.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115543" comment="java-1_7_0-openjdk-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115544" comment="java-1_7_0-openjdk-accessibility-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115540" comment="java-1_7_0-openjdk-bootstrap-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115541" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115542" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115545" comment="java-1_7_0-openjdk-demo-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115546" comment="java-1_7_0-openjdk-devel-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115547" comment="java-1_7_0-openjdk-headless-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115548" comment="java-1_7_0-openjdk-javadoc-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115549" comment="java-1_7_0-openjdk-src-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115531" comment="java-1_8_0-openjdk-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115532" comment="java-1_8_0-openjdk-accessibility-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115533" comment="java-1_8_0-openjdk-demo-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115534" comment="java-1_8_0-openjdk-devel-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115535" comment="java-1_8_0-openjdk-headless-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115536" comment="java-1_8_0-openjdk-javadoc-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115537" comment="java-1_8_0-openjdk-src-1.8.0.65-18.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4806</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4806" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115543" comment="java-1_7_0-openjdk-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115544" comment="java-1_7_0-openjdk-accessibility-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115540" comment="java-1_7_0-openjdk-bootstrap-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115541" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115542" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115545" comment="java-1_7_0-openjdk-demo-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115546" comment="java-1_7_0-openjdk-devel-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115547" comment="java-1_7_0-openjdk-headless-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115548" comment="java-1_7_0-openjdk-javadoc-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115549" comment="java-1_7_0-openjdk-src-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115531" comment="java-1_8_0-openjdk-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115532" comment="java-1_8_0-openjdk-accessibility-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115533" comment="java-1_8_0-openjdk-demo-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115534" comment="java-1_8_0-openjdk-devel-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115535" comment="java-1_8_0-openjdk-headless-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115536" comment="java-1_8_0-openjdk-javadoc-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115537" comment="java-1_8_0-openjdk-src-1.8.0.65-18.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4807</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4807" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4807" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier, when running on Windows, allows remote authenticated users to affect availability via unknown vectors related to Server : Query Cache.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118940" comment="libmysqlclient-devel-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118941" comment="libmysqlclient18-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118942" comment="libmysqlclient18-32bit-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118943" comment="libmysqlclient_r18-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118944" comment="libmysqlclient_r18-32bit-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118945" comment="libmysqld-devel-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118946" comment="libmysqld18-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118947" comment="mariadb-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118948" comment="mariadb-bench-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118949" comment="mariadb-client-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118950" comment="mariadb-errormessages-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118951" comment="mariadb-test-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118952" comment="mariadb-tools-10.0.22-2.18.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4810</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4810" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4810" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u85 and 8u60 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115531" comment="java-1_8_0-openjdk-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115532" comment="java-1_8_0-openjdk-accessibility-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115533" comment="java-1_8_0-openjdk-demo-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115534" comment="java-1_8_0-openjdk-devel-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115535" comment="java-1_8_0-openjdk-headless-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115536" comment="java-1_8_0-openjdk-javadoc-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115537" comment="java-1_8_0-openjdk-src-1.8.0.65-18.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4813</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4813" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4813" source="CVE"/>
    <description>
    Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox prior to 4.0.34, 4.1.42, 4.2.34, 4.3.32, and 5.0.8, when using a Windows guest, allows local users to affect availability via unknown vectors related to Core.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115421" comment="python-virtualbox-4.3.32-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115422" comment="virtualbox-4.3.32-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115423" comment="virtualbox-devel-4.3.32-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115424" comment="virtualbox-guest-desktop-icons-4.3.32-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115425" comment="virtualbox-guest-kmp-default-4.3.32_k3.16.7_29-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115426" comment="virtualbox-guest-kmp-desktop-4.3.32_k3.16.7_29-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115427" comment="virtualbox-guest-kmp-pae-4.3.32_k3.16.7_29-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115428" comment="virtualbox-guest-tools-4.3.32-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115429" comment="virtualbox-guest-x11-4.3.32-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115430" comment="virtualbox-host-kmp-default-4.3.32_k3.16.7_29-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115431" comment="virtualbox-host-kmp-desktop-4.3.32_k3.16.7_29-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115432" comment="virtualbox-host-kmp-pae-4.3.32_k3.16.7_29-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115433" comment="virtualbox-host-source-4.3.32-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115434" comment="virtualbox-qt-4.3.32-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115435" comment="virtualbox-websrv-4.3.32-32.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4815</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4815" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via vectors related to Server : DDL.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118962" comment="libmysql56client18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118963" comment="libmysql56client18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118964" comment="libmysql56client_r18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118965" comment="libmysql56client_r18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118940" comment="libmysqlclient-devel-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118941" comment="libmysqlclient18-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118942" comment="libmysqlclient18-32bit-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118943" comment="libmysqlclient_r18-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118944" comment="libmysqlclient_r18-32bit-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118945" comment="libmysqld-devel-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118946" comment="libmysqld18-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118947" comment="mariadb-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118948" comment="mariadb-bench-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118949" comment="mariadb-client-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118950" comment="mariadb-errormessages-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118951" comment="mariadb-test-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118952" comment="mariadb-tools-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118966" comment="mysql-community-server-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118967" comment="mysql-community-server-bench-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118968" comment="mysql-community-server-client-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118969" comment="mysql-community-server-errormessages-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118970" comment="mysql-community-server-test-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118971" comment="mysql-community-server-tools-5.6.27-2.12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4816</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4816" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118962" comment="libmysql56client18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118963" comment="libmysql56client18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118964" comment="libmysql56client_r18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118965" comment="libmysql56client_r18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118966" comment="mysql-community-server-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118967" comment="mysql-community-server-bench-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118968" comment="mysql-community-server-client-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118969" comment="mysql-community-server-errormessages-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118970" comment="mysql-community-server-test-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118971" comment="mysql-community-server-tools-5.6.27-2.12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4819</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4819" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 5.6.25 and earlier, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client programs.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118962" comment="libmysql56client18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118963" comment="libmysql56client18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118964" comment="libmysql56client_r18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118965" comment="libmysql56client_r18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118966" comment="mysql-community-server-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118967" comment="mysql-community-server-bench-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118968" comment="mysql-community-server-client-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118969" comment="mysql-community-server-errormessages-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118970" comment="mysql-community-server-test-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118971" comment="mysql-community-server-tools-5.6.27-2.12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4826</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4826" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect confidentiality via unknown vectors related to Server : Types.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118962" comment="libmysql56client18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118963" comment="libmysql56client18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118964" comment="libmysql56client_r18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118965" comment="libmysql56client_r18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118940" comment="libmysqlclient-devel-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118941" comment="libmysqlclient18-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118942" comment="libmysqlclient18-32bit-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118943" comment="libmysqlclient_r18-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118944" comment="libmysqlclient_r18-32bit-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118945" comment="libmysqld-devel-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118946" comment="libmysqld18-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118947" comment="mariadb-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118948" comment="mariadb-bench-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118949" comment="mariadb-client-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118950" comment="mariadb-errormessages-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118951" comment="mariadb-test-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118952" comment="mariadb-tools-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118966" comment="mysql-community-server-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118967" comment="mysql-community-server-bench-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118968" comment="mysql-community-server-client-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118969" comment="mysql-community-server-errormessages-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118970" comment="mysql-community-server-test-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118971" comment="mysql-community-server-tools-5.6.27-2.12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4830</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4830" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Server : Security : Privileges.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118962" comment="libmysql56client18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118963" comment="libmysql56client18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118964" comment="libmysql56client_r18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118965" comment="libmysql56client_r18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118940" comment="libmysqlclient-devel-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118941" comment="libmysqlclient18-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118942" comment="libmysqlclient18-32bit-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118943" comment="libmysqlclient_r18-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118944" comment="libmysqlclient_r18-32bit-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118945" comment="libmysqld-devel-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118946" comment="libmysqld18-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118947" comment="mariadb-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118948" comment="mariadb-bench-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118949" comment="mariadb-client-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118950" comment="mariadb-errormessages-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118951" comment="mariadb-test-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118952" comment="mariadb-tools-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118966" comment="mysql-community-server-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118967" comment="mysql-community-server-bench-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118968" comment="mysql-community-server-client-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118969" comment="mysql-community-server-errormessages-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118970" comment="mysql-community-server-test-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118971" comment="mysql-community-server-tools-5.6.27-2.12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4833</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4833" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4833" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.25 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Partition.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118962" comment="libmysql56client18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118963" comment="libmysql56client18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118964" comment="libmysql56client_r18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118965" comment="libmysql56client_r18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118966" comment="mysql-community-server-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118967" comment="mysql-community-server-bench-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118968" comment="mysql-community-server-client-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118969" comment="mysql-community-server-errormessages-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118970" comment="mysql-community-server-test-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118971" comment="mysql-community-server-tools-5.6.27-2.12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4835</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2015-4881.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115543" comment="java-1_7_0-openjdk-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115544" comment="java-1_7_0-openjdk-accessibility-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115540" comment="java-1_7_0-openjdk-bootstrap-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115541" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115542" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115545" comment="java-1_7_0-openjdk-demo-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115546" comment="java-1_7_0-openjdk-devel-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115547" comment="java-1_7_0-openjdk-headless-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115548" comment="java-1_7_0-openjdk-javadoc-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115549" comment="java-1_7_0-openjdk-src-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115531" comment="java-1_8_0-openjdk-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115532" comment="java-1_8_0-openjdk-accessibility-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115533" comment="java-1_8_0-openjdk-demo-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115534" comment="java-1_8_0-openjdk-devel-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115535" comment="java-1_8_0-openjdk-headless-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115536" comment="java-1_8_0-openjdk-javadoc-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115537" comment="java-1_8_0-openjdk-src-1.8.0.65-18.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4836</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : SP.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118962" comment="libmysql56client18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118963" comment="libmysql56client18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118964" comment="libmysql56client_r18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118965" comment="libmysql56client_r18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118940" comment="libmysqlclient-devel-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118941" comment="libmysqlclient18-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118942" comment="libmysqlclient18-32bit-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118943" comment="libmysqlclient_r18-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118944" comment="libmysqlclient_r18-32bit-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118945" comment="libmysqld-devel-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118946" comment="libmysqld18-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118947" comment="mariadb-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118948" comment="mariadb-bench-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118949" comment="mariadb-client-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118950" comment="mariadb-errormessages-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118951" comment="mariadb-test-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118952" comment="mariadb-tools-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118966" comment="mysql-community-server-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118967" comment="mysql-community-server-bench-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118968" comment="mysql-community-server-client-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118969" comment="mysql-community-server-errormessages-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118970" comment="mysql-community-server-test-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118971" comment="mysql-community-server-tools-5.6.27-2.12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4840</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4840" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u85 and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via unknown vectors related to 2D.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115543" comment="java-1_7_0-openjdk-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115544" comment="java-1_7_0-openjdk-accessibility-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115540" comment="java-1_7_0-openjdk-bootstrap-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115541" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115542" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115545" comment="java-1_7_0-openjdk-demo-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115546" comment="java-1_7_0-openjdk-devel-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115547" comment="java-1_7_0-openjdk-headless-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115548" comment="java-1_7_0-openjdk-javadoc-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115549" comment="java-1_7_0-openjdk-src-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115531" comment="java-1_8_0-openjdk-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115532" comment="java-1_8_0-openjdk-accessibility-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115533" comment="java-1_8_0-openjdk-demo-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115534" comment="java-1_8_0-openjdk-devel-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115535" comment="java-1_8_0-openjdk-headless-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115536" comment="java-1_8_0-openjdk-javadoc-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115537" comment="java-1_8_0-openjdk-src-1.8.0.65-18.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4842</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4842" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via vectors related to JAXP.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115543" comment="java-1_7_0-openjdk-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115544" comment="java-1_7_0-openjdk-accessibility-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115540" comment="java-1_7_0-openjdk-bootstrap-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115541" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115542" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115545" comment="java-1_7_0-openjdk-demo-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115546" comment="java-1_7_0-openjdk-devel-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115547" comment="java-1_7_0-openjdk-headless-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115548" comment="java-1_7_0-openjdk-javadoc-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115549" comment="java-1_7_0-openjdk-src-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115531" comment="java-1_8_0-openjdk-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115532" comment="java-1_8_0-openjdk-accessibility-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115533" comment="java-1_8_0-openjdk-demo-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115534" comment="java-1_8_0-openjdk-devel-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115535" comment="java-1_8_0-openjdk-headless-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115536" comment="java-1_8_0-openjdk-javadoc-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115537" comment="java-1_8_0-openjdk-src-1.8.0.65-18.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4843</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4843" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115543" comment="java-1_7_0-openjdk-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115544" comment="java-1_7_0-openjdk-accessibility-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115540" comment="java-1_7_0-openjdk-bootstrap-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115541" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115542" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115545" comment="java-1_7_0-openjdk-demo-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115546" comment="java-1_7_0-openjdk-devel-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115547" comment="java-1_7_0-openjdk-headless-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115548" comment="java-1_7_0-openjdk-javadoc-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115549" comment="java-1_7_0-openjdk-src-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115531" comment="java-1_8_0-openjdk-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115532" comment="java-1_8_0-openjdk-accessibility-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115533" comment="java-1_8_0-openjdk-demo-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115534" comment="java-1_8_0-openjdk-devel-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115535" comment="java-1_8_0-openjdk-headless-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115536" comment="java-1_8_0-openjdk-javadoc-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115537" comment="java-1_8_0-openjdk-src-1.8.0.65-18.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4844</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4844" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115543" comment="java-1_7_0-openjdk-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115544" comment="java-1_7_0-openjdk-accessibility-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115540" comment="java-1_7_0-openjdk-bootstrap-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115541" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115542" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115545" comment="java-1_7_0-openjdk-demo-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115546" comment="java-1_7_0-openjdk-devel-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115547" comment="java-1_7_0-openjdk-headless-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115548" comment="java-1_7_0-openjdk-javadoc-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115549" comment="java-1_7_0-openjdk-src-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115531" comment="java-1_8_0-openjdk-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115532" comment="java-1_8_0-openjdk-accessibility-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115533" comment="java-1_8_0-openjdk-demo-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115534" comment="java-1_8_0-openjdk-devel-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115535" comment="java-1_8_0-openjdk-headless-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115536" comment="java-1_8_0-openjdk-javadoc-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115537" comment="java-1_8_0-openjdk-src-1.8.0.65-18.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4858</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4858" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via vectors related to DML, a different vulnerability than CVE-2015-4913.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118962" comment="libmysql56client18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118963" comment="libmysql56client18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118964" comment="libmysql56client_r18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118965" comment="libmysql56client_r18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118940" comment="libmysqlclient-devel-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118941" comment="libmysqlclient18-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118942" comment="libmysqlclient18-32bit-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118943" comment="libmysqlclient_r18-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118944" comment="libmysqlclient_r18-32bit-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118945" comment="libmysqld-devel-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118946" comment="libmysqld18-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118947" comment="mariadb-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118948" comment="mariadb-bench-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118949" comment="mariadb-client-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118950" comment="mariadb-errormessages-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118951" comment="mariadb-test-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118952" comment="mariadb-tools-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118966" comment="mysql-community-server-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118967" comment="mysql-community-server-bench-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118968" comment="mysql-community-server-client-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118969" comment="mysql-community-server-errormessages-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118970" comment="mysql-community-server-test-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118971" comment="mysql-community-server-tools-5.6.27-2.12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4860</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4860" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI, a different vulnerability than CVE-2015-4883.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115543" comment="java-1_7_0-openjdk-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115544" comment="java-1_7_0-openjdk-accessibility-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115540" comment="java-1_7_0-openjdk-bootstrap-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115541" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115542" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115545" comment="java-1_7_0-openjdk-demo-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115546" comment="java-1_7_0-openjdk-devel-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115547" comment="java-1_7_0-openjdk-headless-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115548" comment="java-1_7_0-openjdk-javadoc-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115549" comment="java-1_7_0-openjdk-src-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115531" comment="java-1_8_0-openjdk-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115532" comment="java-1_8_0-openjdk-accessibility-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115533" comment="java-1_8_0-openjdk-demo-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115534" comment="java-1_8_0-openjdk-devel-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115535" comment="java-1_8_0-openjdk-headless-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115536" comment="java-1_8_0-openjdk-javadoc-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115537" comment="java-1_8_0-openjdk-src-1.8.0.65-18.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4861</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4861" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118962" comment="libmysql56client18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118963" comment="libmysql56client18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118964" comment="libmysql56client_r18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118965" comment="libmysql56client_r18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118940" comment="libmysqlclient-devel-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118941" comment="libmysqlclient18-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118942" comment="libmysqlclient18-32bit-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118943" comment="libmysqlclient_r18-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118944" comment="libmysqlclient_r18-32bit-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118945" comment="libmysqld-devel-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118946" comment="libmysqld18-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118947" comment="mariadb-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118948" comment="mariadb-bench-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118949" comment="mariadb-client-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118950" comment="mariadb-errormessages-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118951" comment="mariadb-test-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118952" comment="mariadb-tools-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118966" comment="mysql-community-server-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118967" comment="mysql-community-server-bench-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118968" comment="mysql-community-server-client-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118969" comment="mysql-community-server-errormessages-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118970" comment="mysql-community-server-test-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118971" comment="mysql-community-server-tools-5.6.27-2.12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4862</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4862" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4862" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.26 and earlier allows remote authenticated users to affect availability via vectors related to DML.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118962" comment="libmysql56client18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118963" comment="libmysql56client18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118964" comment="libmysql56client_r18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118965" comment="libmysql56client_r18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118966" comment="mysql-community-server-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118967" comment="mysql-community-server-bench-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118968" comment="mysql-community-server-client-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118969" comment="mysql-community-server-errormessages-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118970" comment="mysql-community-server-test-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118971" comment="mysql-community-server-tools-5.6.27-2.12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4864</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4864" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4864" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.43 and earlier and 5.6.24 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Server : Security : Privileges.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118962" comment="libmysql56client18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118963" comment="libmysql56client18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118964" comment="libmysql56client_r18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118965" comment="libmysql56client_r18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118966" comment="mysql-community-server-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118967" comment="mysql-community-server-bench-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118968" comment="mysql-community-server-client-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118969" comment="mysql-community-server-errormessages-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118970" comment="mysql-community-server-test-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118971" comment="mysql-community-server-tools-5.6.27-2.12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4866</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4866" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4866" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118962" comment="libmysql56client18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118963" comment="libmysql56client18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118964" comment="libmysql56client_r18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118965" comment="libmysql56client_r18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118966" comment="mysql-community-server-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118967" comment="mysql-community-server-bench-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118968" comment="mysql-community-server-client-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118969" comment="mysql-community-server-errormessages-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118970" comment="mysql-community-server-test-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118971" comment="mysql-community-server-tools-5.6.27-2.12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4868</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4868" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4868" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u60 and Java SE Embedded 8u51 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115531" comment="java-1_8_0-openjdk-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115532" comment="java-1_8_0-openjdk-accessibility-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115533" comment="java-1_8_0-openjdk-demo-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115534" comment="java-1_8_0-openjdk-devel-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115535" comment="java-1_8_0-openjdk-headless-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115536" comment="java-1_8_0-openjdk-javadoc-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115537" comment="java-1_8_0-openjdk-src-1.8.0.65-18.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4870</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4870" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier, and 5.6.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server : Parser.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118962" comment="libmysql56client18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118963" comment="libmysql56client18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118964" comment="libmysql56client_r18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118965" comment="libmysql56client_r18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118940" comment="libmysqlclient-devel-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118941" comment="libmysqlclient18-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118942" comment="libmysqlclient18-32bit-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118943" comment="libmysqlclient_r18-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118944" comment="libmysqlclient_r18-32bit-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118945" comment="libmysqld-devel-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118946" comment="libmysqld18-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118947" comment="mariadb-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118948" comment="mariadb-bench-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118949" comment="mariadb-client-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118950" comment="mariadb-errormessages-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118951" comment="mariadb-test-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118952" comment="mariadb-tools-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118966" comment="mysql-community-server-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118967" comment="mysql-community-server-bench-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118968" comment="mysql-community-server-client-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118969" comment="mysql-community-server-errormessages-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118970" comment="mysql-community-server-test-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118971" comment="mysql-community-server-tools-5.6.27-2.12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4871</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4871" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4871" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u85 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122295" comment="java-1_7_0-openjdk-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122296" comment="java-1_7_0-openjdk-accessibility-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122297" comment="java-1_7_0-openjdk-bootstrap-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122298" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122299" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122300" comment="java-1_7_0-openjdk-demo-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122301" comment="java-1_7_0-openjdk-devel-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122302" comment="java-1_7_0-openjdk-headless-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122303" comment="java-1_7_0-openjdk-javadoc-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122304" comment="java-1_7_0-openjdk-src-1.7.0.95-16.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4872</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4872" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allows remote attackers to affect integrity via unknown vectors related to Security.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115543" comment="java-1_7_0-openjdk-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115544" comment="java-1_7_0-openjdk-accessibility-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115540" comment="java-1_7_0-openjdk-bootstrap-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115541" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115542" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115545" comment="java-1_7_0-openjdk-demo-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115546" comment="java-1_7_0-openjdk-devel-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115547" comment="java-1_7_0-openjdk-headless-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115548" comment="java-1_7_0-openjdk-javadoc-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115549" comment="java-1_7_0-openjdk-src-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115531" comment="java-1_8_0-openjdk-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115532" comment="java-1_8_0-openjdk-accessibility-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115533" comment="java-1_8_0-openjdk-demo-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115534" comment="java-1_8_0-openjdk-devel-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115535" comment="java-1_8_0-openjdk-headless-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115536" comment="java-1_8_0-openjdk-javadoc-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115537" comment="java-1_8_0-openjdk-src-1.8.0.65-18.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4879</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4879" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.44 and earlier, and 5.6.25 and earlier, allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to DML.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118962" comment="libmysql56client18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118963" comment="libmysql56client18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118964" comment="libmysql56client_r18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118965" comment="libmysql56client_r18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118966" comment="mysql-community-server-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118967" comment="mysql-community-server-bench-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118968" comment="mysql-community-server-client-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118969" comment="mysql-community-server-errormessages-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118970" comment="mysql-community-server-test-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118971" comment="mysql-community-server-tools-5.6.27-2.12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4881</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4881" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2015-4835.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115543" comment="java-1_7_0-openjdk-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115544" comment="java-1_7_0-openjdk-accessibility-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115540" comment="java-1_7_0-openjdk-bootstrap-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115541" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115542" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115545" comment="java-1_7_0-openjdk-demo-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115546" comment="java-1_7_0-openjdk-devel-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115547" comment="java-1_7_0-openjdk-headless-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115548" comment="java-1_7_0-openjdk-javadoc-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115549" comment="java-1_7_0-openjdk-src-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115531" comment="java-1_8_0-openjdk-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115532" comment="java-1_8_0-openjdk-accessibility-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115533" comment="java-1_8_0-openjdk-demo-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115534" comment="java-1_8_0-openjdk-devel-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115535" comment="java-1_8_0-openjdk-headless-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115536" comment="java-1_8_0-openjdk-javadoc-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115537" comment="java-1_8_0-openjdk-src-1.8.0.65-18.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4882</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4882" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect availability via vectors related to CORBA.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115543" comment="java-1_7_0-openjdk-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115544" comment="java-1_7_0-openjdk-accessibility-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115540" comment="java-1_7_0-openjdk-bootstrap-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115541" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115542" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115545" comment="java-1_7_0-openjdk-demo-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115546" comment="java-1_7_0-openjdk-devel-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115547" comment="java-1_7_0-openjdk-headless-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115548" comment="java-1_7_0-openjdk-javadoc-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115549" comment="java-1_7_0-openjdk-src-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115531" comment="java-1_8_0-openjdk-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115532" comment="java-1_8_0-openjdk-accessibility-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115533" comment="java-1_8_0-openjdk-demo-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115534" comment="java-1_8_0-openjdk-devel-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115535" comment="java-1_8_0-openjdk-headless-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115536" comment="java-1_8_0-openjdk-javadoc-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115537" comment="java-1_8_0-openjdk-src-1.8.0.65-18.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4883</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4883" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI, a different vulnerability than CVE-2015-4860.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115543" comment="java-1_7_0-openjdk-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115544" comment="java-1_7_0-openjdk-accessibility-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115540" comment="java-1_7_0-openjdk-bootstrap-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115541" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115542" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115545" comment="java-1_7_0-openjdk-demo-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115546" comment="java-1_7_0-openjdk-devel-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115547" comment="java-1_7_0-openjdk-headless-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115548" comment="java-1_7_0-openjdk-javadoc-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115549" comment="java-1_7_0-openjdk-src-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115531" comment="java-1_8_0-openjdk-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115532" comment="java-1_8_0-openjdk-accessibility-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115533" comment="java-1_8_0-openjdk-demo-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115534" comment="java-1_8_0-openjdk-devel-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115535" comment="java-1_8_0-openjdk-headless-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115536" comment="java-1_8_0-openjdk-javadoc-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115537" comment="java-1_8_0-openjdk-src-1.8.0.65-18.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4890</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4890" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4890" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Replication.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118962" comment="libmysql56client18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118963" comment="libmysql56client18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118964" comment="libmysql56client_r18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118965" comment="libmysql56client_r18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118966" comment="mysql-community-server-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118967" comment="mysql-community-server-bench-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118968" comment="mysql-community-server-client-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118969" comment="mysql-community-server-errormessages-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118970" comment="mysql-community-server-test-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118971" comment="mysql-community-server-tools-5.6.27-2.12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4893</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4893" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allows remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2015-4803 and CVE-2015-4911.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115543" comment="java-1_7_0-openjdk-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115544" comment="java-1_7_0-openjdk-accessibility-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115540" comment="java-1_7_0-openjdk-bootstrap-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115541" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115542" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115545" comment="java-1_7_0-openjdk-demo-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115546" comment="java-1_7_0-openjdk-devel-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115547" comment="java-1_7_0-openjdk-headless-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115548" comment="java-1_7_0-openjdk-javadoc-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115549" comment="java-1_7_0-openjdk-src-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115531" comment="java-1_8_0-openjdk-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115532" comment="java-1_8_0-openjdk-accessibility-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115533" comment="java-1_8_0-openjdk-demo-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115534" comment="java-1_8_0-openjdk-devel-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115535" comment="java-1_8_0-openjdk-headless-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115536" comment="java-1_8_0-openjdk-javadoc-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115537" comment="java-1_8_0-openjdk-src-1.8.0.65-18.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4895</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4895" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4895" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.25 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : InnoDB.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118962" comment="libmysql56client18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118963" comment="libmysql56client18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118964" comment="libmysql56client_r18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118965" comment="libmysql56client_r18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118966" comment="mysql-community-server-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118967" comment="mysql-community-server-bench-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118968" comment="mysql-community-server-client-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118969" comment="mysql-community-server-errormessages-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118970" comment="mysql-community-server-test-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118971" comment="mysql-community-server-tools-5.6.27-2.12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4896</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4896" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4896" source="CVE"/>
    <description>
    Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 4.0.34, 4.1.42, 4.2.34, 4.3.32, and 5.0.8, when a VM has the Remote Display feature (RDP) enabled, allows remote attackers to affect availability via unknown vectors related to Core.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115421" comment="python-virtualbox-4.3.32-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115422" comment="virtualbox-4.3.32-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115423" comment="virtualbox-devel-4.3.32-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115424" comment="virtualbox-guest-desktop-icons-4.3.32-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115425" comment="virtualbox-guest-kmp-default-4.3.32_k3.16.7_29-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115426" comment="virtualbox-guest-kmp-desktop-4.3.32_k3.16.7_29-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115427" comment="virtualbox-guest-kmp-pae-4.3.32_k3.16.7_29-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115428" comment="virtualbox-guest-tools-4.3.32-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115429" comment="virtualbox-guest-x11-4.3.32-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115430" comment="virtualbox-host-kmp-default-4.3.32_k3.16.7_29-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115431" comment="virtualbox-host-kmp-desktop-4.3.32_k3.16.7_29-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115432" comment="virtualbox-host-kmp-pae-4.3.32_k3.16.7_29-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115433" comment="virtualbox-host-source-4.3.32-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115434" comment="virtualbox-qt-4.3.32-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115435" comment="virtualbox-websrv-4.3.32-32.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4901</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4901" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4901" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u60 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to JavaFX.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115531" comment="java-1_8_0-openjdk-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115532" comment="java-1_8_0-openjdk-accessibility-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115533" comment="java-1_8_0-openjdk-demo-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115534" comment="java-1_8_0-openjdk-devel-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115535" comment="java-1_8_0-openjdk-headless-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115536" comment="java-1_8_0-openjdk-javadoc-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115537" comment="java-1_8_0-openjdk-src-1.8.0.65-18.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4902</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4902" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4902" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60 allows remote attackers to affect integrity via unknown vectors related to Deployment.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115531" comment="java-1_8_0-openjdk-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115532" comment="java-1_8_0-openjdk-accessibility-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115533" comment="java-1_8_0-openjdk-demo-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115534" comment="java-1_8_0-openjdk-devel-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115535" comment="java-1_8_0-openjdk-headless-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115536" comment="java-1_8_0-openjdk-javadoc-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115537" comment="java-1_8_0-openjdk-src-1.8.0.65-18.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4903</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4903" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via vectors related to RMI.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115543" comment="java-1_7_0-openjdk-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115544" comment="java-1_7_0-openjdk-accessibility-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115540" comment="java-1_7_0-openjdk-bootstrap-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115541" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115542" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115545" comment="java-1_7_0-openjdk-demo-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115546" comment="java-1_7_0-openjdk-devel-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115547" comment="java-1_7_0-openjdk-headless-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115548" comment="java-1_7_0-openjdk-javadoc-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115549" comment="java-1_7_0-openjdk-src-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115531" comment="java-1_8_0-openjdk-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115532" comment="java-1_8_0-openjdk-accessibility-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115533" comment="java-1_8_0-openjdk-demo-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115534" comment="java-1_8_0-openjdk-devel-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115535" comment="java-1_8_0-openjdk-headless-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115536" comment="java-1_8_0-openjdk-javadoc-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115537" comment="java-1_8_0-openjdk-src-1.8.0.65-18.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4904</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4904" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4904" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.25 and earlier allows remote authenticated users to affect availability via unknown vectors related to libmysqld.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118962" comment="libmysql56client18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118963" comment="libmysql56client18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118964" comment="libmysql56client_r18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118965" comment="libmysql56client_r18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118966" comment="mysql-community-server-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118967" comment="mysql-community-server-bench-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118968" comment="mysql-community-server-client-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118969" comment="mysql-community-server-errormessages-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118970" comment="mysql-community-server-test-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118971" comment="mysql-community-server-tools-5.6.27-2.12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4905</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4905" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4905" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.23 and earlier allows remote authenticated users to affect availability via vectors related to Server : DML.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118962" comment="libmysql56client18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118963" comment="libmysql56client18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118964" comment="libmysql56client_r18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118965" comment="libmysql56client_r18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118966" comment="mysql-community-server-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118967" comment="mysql-community-server-bench-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118968" comment="mysql-community-server-client-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118969" comment="mysql-community-server-errormessages-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118970" comment="mysql-community-server-test-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118971" comment="mysql-community-server-tools-5.6.27-2.12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4906</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4906" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4906" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u60 and JavaFX 2.2.85 allows remote attackers to affect confidentiality via unknown vectors related to JavaFX, a different vulnerability than CVE-2015-4908 and CVE-2015-4916.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115531" comment="java-1_8_0-openjdk-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115532" comment="java-1_8_0-openjdk-accessibility-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115533" comment="java-1_8_0-openjdk-demo-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115534" comment="java-1_8_0-openjdk-devel-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115535" comment="java-1_8_0-openjdk-headless-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115536" comment="java-1_8_0-openjdk-javadoc-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115537" comment="java-1_8_0-openjdk-src-1.8.0.65-18.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4908</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4908" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4908" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u60 and JavaFX 2.2.85 allows remote attackers to affect confidentiality via unknown vectors, a different vulnerability than CVE-2015-4906 and CVE-2015-4916.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115531" comment="java-1_8_0-openjdk-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115532" comment="java-1_8_0-openjdk-accessibility-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115533" comment="java-1_8_0-openjdk-demo-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115534" comment="java-1_8_0-openjdk-devel-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115535" comment="java-1_8_0-openjdk-headless-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115536" comment="java-1_8_0-openjdk-javadoc-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115537" comment="java-1_8_0-openjdk-src-1.8.0.65-18.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4910</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4910" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4910" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server : Memcached.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118962" comment="libmysql56client18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118963" comment="libmysql56client18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118964" comment="libmysql56client_r18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118965" comment="libmysql56client_r18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118966" comment="mysql-community-server-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118967" comment="mysql-community-server-bench-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118968" comment="mysql-community-server-client-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118969" comment="mysql-community-server-errormessages-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118970" comment="mysql-community-server-test-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118971" comment="mysql-community-server-tools-5.6.27-2.12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4911</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4911" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allows remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2015-4803 and CVE-2015-4893.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115543" comment="java-1_7_0-openjdk-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115544" comment="java-1_7_0-openjdk-accessibility-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115540" comment="java-1_7_0-openjdk-bootstrap-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115541" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115542" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115545" comment="java-1_7_0-openjdk-demo-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115546" comment="java-1_7_0-openjdk-devel-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115547" comment="java-1_7_0-openjdk-headless-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115548" comment="java-1_7_0-openjdk-javadoc-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115549" comment="java-1_7_0-openjdk-src-1.7.0.91-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115531" comment="java-1_8_0-openjdk-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115532" comment="java-1_8_0-openjdk-accessibility-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115533" comment="java-1_8_0-openjdk-demo-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115534" comment="java-1_8_0-openjdk-devel-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115535" comment="java-1_8_0-openjdk-headless-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115536" comment="java-1_8_0-openjdk-javadoc-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115537" comment="java-1_8_0-openjdk-src-1.8.0.65-18.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4913</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4913" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL Server 5.5.45 and earlier and 5.6.26 and earlier allows remote authenticated users to affect availability via vectors related to Server : DML, a different vulnerability than CVE-2015-4858.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118962" comment="libmysql56client18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118963" comment="libmysql56client18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118964" comment="libmysql56client_r18-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118965" comment="libmysql56client_r18-32bit-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118940" comment="libmysqlclient-devel-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118941" comment="libmysqlclient18-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118942" comment="libmysqlclient18-32bit-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118943" comment="libmysqlclient_r18-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118944" comment="libmysqlclient_r18-32bit-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118945" comment="libmysqld-devel-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118946" comment="libmysqld18-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118947" comment="mariadb-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118948" comment="mariadb-bench-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118949" comment="mariadb-client-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118950" comment="mariadb-errormessages-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118951" comment="mariadb-test-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118952" comment="mariadb-tools-10.0.22-2.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118966" comment="mysql-community-server-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118967" comment="mysql-community-server-bench-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118968" comment="mysql-community-server-client-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118969" comment="mysql-community-server-errormessages-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118970" comment="mysql-community-server-test-5.6.27-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118971" comment="mysql-community-server-tools-5.6.27-2.12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4916</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-4916" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4916" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u60 and JavaFX 2.2.85 allows remote attackers to affect confidentiality via unknown vectors, a different vulnerability than CVE-2015-4906 and CVE-2015-4908.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115531" comment="java-1_8_0-openjdk-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115532" comment="java-1_8_0-openjdk-accessibility-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115533" comment="java-1_8_0-openjdk-demo-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115534" comment="java-1_8_0-openjdk-devel-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115535" comment="java-1_8_0-openjdk-headless-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115536" comment="java-1_8_0-openjdk-javadoc-1.8.0.65-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115537" comment="java-1_8_0-openjdk-src-1.8.0.65-18.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5073</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5073" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5073" source="CVE"/>
    <description>
    Heap-based buffer overflow in the find_fixedlength function in pcre_compile.c in PCRE before 8.38 allows remote attackers to cause a denial of service (crash) or obtain sensitive information from heap memory and possibly bypass the ASLR protection mechanism via a crafted regular expression with an excess closing parenthesis.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135519" comment="libpcre1-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135520" comment="libpcre1-32bit-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135521" comment="libpcre16-0-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135522" comment="libpcre16-0-32bit-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135523" comment="libpcrecpp0-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135524" comment="libpcrecpp0-32bit-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135525" comment="libpcreposix0-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135526" comment="libpcreposix0-32bit-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135527" comment="pcre-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135528" comment="pcre-devel-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135529" comment="pcre-devel-static-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135530" comment="pcre-doc-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135531" comment="pcre-tools-8.39-3.8.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5119</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5119" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5119" source="CVE"/>
    <description>
    Use-after-free vulnerability in the ByteArray class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.296 and 14.x through 18.0.0.194 on Windows and OS X and 11.x through 11.2.202.468 on Linux allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that overrides a valueOf function, as exploited in the wild in July 2015.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117589" comment="flash-player-11.2.202.481-2.61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117590" comment="flash-player-gnome-11.2.202.481-2.61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117591" comment="flash-player-kde4-11.2.202.481-2.61.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5122</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5122" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5122" source="CVE"/>
    <description>
    Use-after-free vulnerability in the DisplayObject class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.302 on Windows and OS X, 14.x through 18.0.0.203 on Windows and OS X, 11.x through 11.2.202.481 on Linux, and 12.x through 18.0.0.204 on Linux Chrome installations allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that leverages improper handling of the opaqueBackground property, as exploited in the wild in July 2015.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117595" comment="flash-player-11.2.202.491-2.64.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117596" comment="flash-player-gnome-11.2.202.491-2.64.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117597" comment="flash-player-kde4-11.2.202.491-2.64.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5123</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5123" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5123" source="CVE"/>
    <description>
    Use-after-free vulnerability in the BitmapData class in the ActionScript 3 (AS3) implementation in Adobe Flash Player 13.x through 13.0.0.302 on Windows and OS X, 14.x through 18.0.0.203 on Windows and OS X, 11.x through 11.2.202.481 on Linux, and 12.x through 18.0.0.204 on Linux Chrome installations allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that overrides a valueOf function, as exploited in the wild in July 2015.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117595" comment="flash-player-11.2.202.491-2.64.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117596" comment="flash-player-gnome-11.2.202.491-2.64.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117597" comment="flash-player-kde4-11.2.202.491-2.64.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5124</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5124" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5124" source="CVE"/>
    <description>
    Adobe Flash Player before 13.0.0.302 and 14.x through 18.x before 18.0.0.203 on Windows and OS X and before 11.2.202.481 on Linux, Adobe AIR before 18.0.0.180, Adobe AIR SDK before 18.0.0.180, and Adobe AIR SDK &amp; Compiler before 18.0.0.180 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-3117, CVE-2015-3123, CVE-2015-3130, CVE-2015-3133, CVE-2015-3134, and CVE-2015-4431.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117730" comment="flash-player-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117731" comment="flash-player-gnome-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117732" comment="flash-player-kde4-11.2.202.508-2.67.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5125</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5125" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5125" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allow attackers to cause a denial of service (vector-length corruption) or possibly have unspecified other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117730" comment="flash-player-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117731" comment="flash-player-gnome-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117732" comment="flash-player-kde4-11.2.202.508-2.67.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5127</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5127" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5127" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5130, CVE-2015-5134, CVE-2015-5539, CVE-2015-5540, CVE-2015-5550, CVE-2015-5551, CVE-2015-5556, CVE-2015-5557, CVE-2015-5559, CVE-2015-5561, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117730" comment="flash-player-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117731" comment="flash-player-gnome-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117732" comment="flash-player-kde4-11.2.202.508-2.67.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5128</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5128" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5128" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA.  Further investigation showed that it was not a security issue.  Notes: none.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117730" comment="flash-player-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117731" comment="flash-player-gnome-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117732" comment="flash-player-kde4-11.2.202.508-2.67.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5129</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5129" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5129" source="CVE"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5541.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117730" comment="flash-player-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117731" comment="flash-player-gnome-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117732" comment="flash-player-kde4-11.2.202.508-2.67.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5130</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5130" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5130" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5134, CVE-2015-5539, CVE-2015-5540, CVE-2015-5550, CVE-2015-5551, CVE-2015-5556, CVE-2015-5557, CVE-2015-5559, CVE-2015-5561, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117730" comment="flash-player-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117731" comment="flash-player-gnome-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117732" comment="flash-player-kde4-11.2.202.508-2.67.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5131</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5131" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5131" source="CVE"/>
    <description>
    Buffer overflow in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5132 and CVE-2015-5133.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117730" comment="flash-player-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117731" comment="flash-player-gnome-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117732" comment="flash-player-kde4-11.2.202.508-2.67.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5132</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5132" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5132" source="CVE"/>
    <description>
    Buffer overflow in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5131 and CVE-2015-5133.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117730" comment="flash-player-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117731" comment="flash-player-gnome-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117732" comment="flash-player-kde4-11.2.202.508-2.67.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5133</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5133" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5133" source="CVE"/>
    <description>
    Buffer overflow in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5131 and CVE-2015-5132.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117730" comment="flash-player-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117731" comment="flash-player-gnome-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117732" comment="flash-player-kde4-11.2.202.508-2.67.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5134</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5134" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5134" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5130, CVE-2015-5539, CVE-2015-5540, CVE-2015-5550, CVE-2015-5551, CVE-2015-5556, CVE-2015-5557, CVE-2015-5559, CVE-2015-5561, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117730" comment="flash-player-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117731" comment="flash-player-gnome-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117732" comment="flash-player-kde4-11.2.202.508-2.67.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5143</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5143" source="CVE"/>
    <description>
    The session backends in Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 allows remote attackers to cause a denial of service (session store consumption) via multiple requests with unique session keys.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115118" comment="python-Django-1.6.11-3.10.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5144</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5144" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5144" source="CVE"/>
    <description>
    Django before 1.4.21, 1.5.x through 1.6.x, 1.7.x before 1.7.9, and 1.8.x before 1.8.3 uses an incorrect regular expression, which allows remote attackers to inject arbitrary headers and conduct HTTP response splitting attacks via a newline character in an (1) email message to the EmailValidator, a (2) URL to the URLValidator, or unspecified vectors to the (3) validate_ipv4_address or (4) validate_slug validator.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115118" comment="python-Django-1.6.11-3.10.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5154</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5154" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5154" source="CVE"/>
    <description>
    Heap-based buffer overflow in the IDE subsystem in QEMU, as used in Xen 4.5.x and earlier, when the container has a CDROM drive enabled, allows local guest users to execute arbitrary code on the host via unspecified ATAPI commands.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117956" comment="xen-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117957" comment="xen-devel-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117958" comment="xen-doc-html-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117959" comment="xen-kmp-default-4.4.3_02_k3.16.7_29-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117960" comment="xen-kmp-desktop-4.4.3_02_k3.16.7_29-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117961" comment="xen-libs-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117962" comment="xen-libs-32bit-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117963" comment="xen-tools-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117964" comment="xen-tools-domU-4.4.3_02-30.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5157</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5157" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5157" source="CVE"/>
    <description>
    arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform mishandles IRET faults in processing NMIs that occurred during userspace execution, which might allow local users to gain privileges by triggering an NMI.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122787" comment="bbswitch-0.8-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122788" comment="bbswitch-kmp-default-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122789" comment="bbswitch-kmp-desktop-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122790" comment="bbswitch-kmp-pae-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122791" comment="bbswitch-kmp-xen-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122792" comment="cloop-2.639-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122793" comment="cloop-kmp-default-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122794" comment="cloop-kmp-desktop-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122795" comment="cloop-kmp-pae-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122796" comment="cloop-kmp-xen-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122797" comment="crash-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122798" comment="crash-devel-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122799" comment="crash-doc-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122800" comment="crash-eppic-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122801" comment="crash-gcore-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122802" comment="crash-kmp-default-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122803" comment="crash-kmp-desktop-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122804" comment="crash-kmp-pae-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122805" comment="crash-kmp-xen-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122806" comment="hdjmod-1.28-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122807" comment="hdjmod-kmp-default-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122808" comment="hdjmod-kmp-desktop-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122809" comment="hdjmod-kmp-pae-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122810" comment="hdjmod-kmp-xen-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122811" comment="ipset-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122812" comment="ipset-devel-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122813" comment="ipset-kmp-default-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122814" comment="ipset-kmp-desktop-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122815" comment="ipset-kmp-pae-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122816" comment="ipset-kmp-xen-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122817" comment="kernel-debug-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122818" comment="kernel-debug-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122819" comment="kernel-debug-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122820" comment="kernel-default-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122821" comment="kernel-default-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122822" comment="kernel-default-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122823" comment="kernel-desktop-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122824" comment="kernel-desktop-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122825" comment="kernel-desktop-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122826" comment="kernel-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122827" comment="kernel-docs-3.16.7-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122828" comment="kernel-ec2-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122829" comment="kernel-ec2-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122830" comment="kernel-ec2-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122831" comment="kernel-macros-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122832" comment="kernel-obs-build-3.16.7-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122833" comment="kernel-obs-qa-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122834" comment="kernel-obs-qa-xen-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122835" comment="kernel-pae-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122836" comment="kernel-pae-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122837" comment="kernel-pae-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122838" comment="kernel-source-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122839" comment="kernel-source-vanilla-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122840" comment="kernel-syms-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122841" comment="kernel-vanilla-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122842" comment="kernel-vanilla-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122843" comment="kernel-xen-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122844" comment="kernel-xen-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122845" comment="kernel-xen-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122846" comment="libipset3-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122847" comment="pcfclock-0.44-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122848" comment="pcfclock-kmp-default-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122849" comment="pcfclock-kmp-desktop-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122850" comment="pcfclock-kmp-pae-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122851" comment="python-virtualbox-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122852" comment="vhba-kmp-20140629-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122853" comment="vhba-kmp-default-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122854" comment="vhba-kmp-desktop-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122855" comment="vhba-kmp-pae-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122856" comment="vhba-kmp-xen-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122857" comment="virtualbox-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122858" comment="virtualbox-devel-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122859" comment="virtualbox-guest-desktop-icons-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122860" comment="virtualbox-guest-kmp-default-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122861" comment="virtualbox-guest-kmp-desktop-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122862" comment="virtualbox-guest-kmp-pae-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122863" comment="virtualbox-guest-tools-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122864" comment="virtualbox-guest-x11-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122865" comment="virtualbox-host-kmp-default-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122866" comment="virtualbox-host-kmp-desktop-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122867" comment="virtualbox-host-kmp-pae-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122868" comment="virtualbox-host-source-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122869" comment="virtualbox-qt-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122870" comment="virtualbox-websrv-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122871" comment="xen-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122872" comment="xen-devel-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122873" comment="xen-doc-html-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122874" comment="xen-kmp-default-4.4.3_08_k3.16.7_32-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122875" comment="xen-kmp-desktop-4.4.3_08_k3.16.7_32-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122876" comment="xen-libs-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122877" comment="xen-libs-32bit-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122878" comment="xen-tools-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122879" comment="xen-tools-domU-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122880" comment="xtables-addons-2.6-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122881" comment="xtables-addons-kmp-default-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122882" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122883" comment="xtables-addons-kmp-pae-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122884" comment="xtables-addons-kmp-xen-2.6_k3.16.7_32-15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5165</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5165" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5165" source="CVE"/>
    <description>
    The C+ mode offload emulation in the RTL8139 network card device model in QEMU, as used in Xen 4.5.x and earlier, allows remote attackers to read process heap memory via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117956" comment="xen-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117957" comment="xen-devel-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117958" comment="xen-doc-html-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117959" comment="xen-kmp-default-4.4.3_02_k3.16.7_29-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117960" comment="xen-kmp-desktop-4.4.3_02_k3.16.7_29-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117961" comment="xen-libs-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117962" comment="xen-libs-32bit-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117963" comment="xen-tools-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117964" comment="xen-tools-domU-4.4.3_02-30.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5166</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5166" source="CVE"/>
    <description>
    Use-after-free vulnerability in QEMU in Xen 4.5.x and earlier does not completely unplug emulated block devices, which allows local HVM guest users to gain privileges by unplugging a block device twice.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117956" comment="xen-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117957" comment="xen-devel-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117958" comment="xen-doc-html-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117959" comment="xen-kmp-default-4.4.3_02_k3.16.7_29-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117960" comment="xen-kmp-desktop-4.4.3_02_k3.16.7_29-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117961" comment="xen-libs-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117962" comment="xen-libs-32bit-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117963" comment="xen-tools-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117964" comment="xen-tools-domU-4.4.3_02-30.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5185</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5185" source="CVE"/>
    <description>
    The lookupProviders function in providerMgr.c in sblim-sfcb 1.3.4 and 1.3.18 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty className in a packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114356" comment="sblim-sfcb-1.4.8-4.4.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5198</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5198" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5198" source="CVE"/>
    <description>
    libvdpau before 1.1.1, when used in a setuid or setgid application, allows local users to gain privileges via unspecified vectors, related to the VDPAU_DRIVER_PATH environment variable.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114313" comment="libvdpau-0.8-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114314" comment="libvdpau-devel-0.8-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114315" comment="libvdpau-devel-32bit-0.8-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114316" comment="libvdpau1-0.8-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114317" comment="libvdpau1-32bit-0.8-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114318" comment="libvdpau_trace1-0.8-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114319" comment="libvdpau_trace1-32bit-0.8-2.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5199</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5199" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5199" source="CVE"/>
    <description>
    Directory traversal vulnerability in dlopen in libvdpau before 1.1.1 allows local users to gain privileges via the VDPAU_DRIVER environment variable.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114313" comment="libvdpau-0.8-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114314" comment="libvdpau-devel-0.8-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114315" comment="libvdpau-devel-32bit-0.8-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114316" comment="libvdpau1-0.8-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114317" comment="libvdpau1-32bit-0.8-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114318" comment="libvdpau_trace1-0.8-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114319" comment="libvdpau_trace1-32bit-0.8-2.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5200</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5200" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5200" source="CVE"/>
    <description>
    The trace functionality in libvdpau before 1.1.1, when used in a setuid or setgid application, allows local users to write to arbitrary files via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114313" comment="libvdpau-0.8-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114314" comment="libvdpau-devel-0.8-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114315" comment="libvdpau-devel-32bit-0.8-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114316" comment="libvdpau1-0.8-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114317" comment="libvdpau1-32bit-0.8-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114318" comment="libvdpau_trace1-0.8-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114319" comment="libvdpau_trace1-32bit-0.8-2.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5203</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5203" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5203" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135287" comment="jasper-1.900.14-163.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135288" comment="libjasper-devel-1.900.14-163.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135289" comment="libjasper1-1.900.14-163.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135290" comment="libjasper1-32bit-1.900.14-163.24.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5212</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5212" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5212" source="CVE"/>
    <description>
    Integer underflow in LibreOffice before 4.4.5 and Apache OpenOffice before 4.1.2, when the configuration setting "Load printer settings with the document" is enabled, allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via crafted PrinterSetup data in an ODF document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123705" comment="cmis-client-0.5.0-4.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123706" comment="libcmis-0_5-5-0.5.0-4.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123707" comment="libcmis-c-0_5-5-0.5.0-4.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123708" comment="libcmis-c-devel-0.5.0-4.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123709" comment="libcmis-devel-0.5.0-4.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123710" comment="libetonyek-0.1.3-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123711" comment="libetonyek-0_1-1-0.1.3-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123712" comment="libetonyek-devel-0.1.3-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123713" comment="libetonyek-devel-doc-0.1.3-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123714" comment="libetonyek-tools-0.1.3-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123715" comment="libmwaw-0.3.6-2.7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123716" comment="libmwaw-0_3-3-0.3.6-2.7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123717" comment="libmwaw-devel-0.3.6-2.7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123718" comment="libmwaw-devel-doc-0.3.6-2.7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123719" comment="libmwaw-tools-0.3.6-2.7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123720" comment="libodfgen-0.1.4-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123721" comment="libodfgen-0_1-1-0.1.4-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123722" comment="libodfgen-devel-0.1.4-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123723" comment="libodfgen-devel-doc-0.1.4-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123724" comment="libpagemaker-0.0.2-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123725" comment="libpagemaker-0_0-0-0.0.2-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123726" comment="libpagemaker-devel-0.0.2-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123727" comment="libpagemaker-devel-doc-0.0.2-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123728" comment="libpagemaker-tools-0.0.2-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123729" comment="libreoffice-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123730" comment="libreoffice-base-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123731" comment="libreoffice-base-drivers-mysql-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123732" comment="libreoffice-base-drivers-postgresql-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123733" comment="libreoffice-branding-upstream-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123734" comment="libreoffice-calc-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123735" comment="libreoffice-calc-extensions-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123736" comment="libreoffice-draw-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123737" comment="libreoffice-filters-optional-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123738" comment="libreoffice-gnome-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123739" comment="libreoffice-gtk3-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123740" comment="libreoffice-icon-theme-breeze-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123741" comment="libreoffice-icon-theme-galaxy-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123742" comment="libreoffice-icon-theme-hicontrast-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123743" comment="libreoffice-icon-theme-oxygen-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123744" comment="libreoffice-icon-theme-sifr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123745" comment="libreoffice-icon-theme-tango-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123746" comment="libreoffice-impress-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123747" comment="libreoffice-kde4-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123748" comment="libreoffice-l10n-af-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123749" comment="libreoffice-l10n-ar-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123750" comment="libreoffice-l10n-as-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123751" comment="libreoffice-l10n-bg-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123752" comment="libreoffice-l10n-bn-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123753" comment="libreoffice-l10n-br-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123754" comment="libreoffice-l10n-ca-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123755" comment="libreoffice-l10n-cs-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123756" comment="libreoffice-l10n-cy-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123757" comment="libreoffice-l10n-da-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123758" comment="libreoffice-l10n-de-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123759" comment="libreoffice-l10n-dz-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123760" comment="libreoffice-l10n-el-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123761" comment="libreoffice-l10n-en-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123762" comment="libreoffice-l10n-es-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123763" comment="libreoffice-l10n-et-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123764" comment="libreoffice-l10n-eu-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123765" comment="libreoffice-l10n-fa-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123766" comment="libreoffice-l10n-fi-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123767" comment="libreoffice-l10n-fr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123768" comment="libreoffice-l10n-ga-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123769" comment="libreoffice-l10n-gl-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123770" comment="libreoffice-l10n-gu-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123771" comment="libreoffice-l10n-he-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123772" comment="libreoffice-l10n-hi-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123773" comment="libreoffice-l10n-hr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123774" comment="libreoffice-l10n-hu-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123775" comment="libreoffice-l10n-it-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123776" comment="libreoffice-l10n-ja-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123777" comment="libreoffice-l10n-kk-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123778" comment="libreoffice-l10n-kn-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123779" comment="libreoffice-l10n-ko-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123780" comment="libreoffice-l10n-lt-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123781" comment="libreoffice-l10n-lv-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123782" comment="libreoffice-l10n-mai-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123783" comment="libreoffice-l10n-ml-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123784" comment="libreoffice-l10n-mr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123785" comment="libreoffice-l10n-nb-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123786" comment="libreoffice-l10n-nl-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123787" comment="libreoffice-l10n-nn-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123788" comment="libreoffice-l10n-nr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123789" comment="libreoffice-l10n-nso-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123790" comment="libreoffice-l10n-or-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123791" comment="libreoffice-l10n-pa-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123792" comment="libreoffice-l10n-pl-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123793" comment="libreoffice-l10n-pt-BR-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123794" comment="libreoffice-l10n-pt-PT-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123795" comment="libreoffice-l10n-ro-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123796" comment="libreoffice-l10n-ru-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123797" comment="libreoffice-l10n-si-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123798" comment="libreoffice-l10n-sk-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123799" comment="libreoffice-l10n-sl-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123800" comment="libreoffice-l10n-sr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123801" comment="libreoffice-l10n-ss-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123802" comment="libreoffice-l10n-st-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123803" comment="libreoffice-l10n-sv-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123804" comment="libreoffice-l10n-ta-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123805" comment="libreoffice-l10n-te-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123806" comment="libreoffice-l10n-th-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123807" comment="libreoffice-l10n-tn-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123808" comment="libreoffice-l10n-tr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123809" comment="libreoffice-l10n-ts-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123810" comment="libreoffice-l10n-uk-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123811" comment="libreoffice-l10n-ve-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123812" comment="libreoffice-l10n-xh-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123813" comment="libreoffice-l10n-zh-Hans-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123814" comment="libreoffice-l10n-zh-Hant-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123815" comment="libreoffice-l10n-zu-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123816" comment="libreoffice-mailmerge-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123817" comment="libreoffice-math-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123818" comment="libreoffice-officebean-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123819" comment="libreoffice-pyuno-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123820" comment="libreoffice-sdk-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123821" comment="libreoffice-sdk-doc-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123822" comment="libreoffice-share-linker-1-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123823" comment="libreoffice-writer-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123824" comment="libreoffice-writer-extensions-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123825" comment="libwps-0.4.1-2.4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123826" comment="libwps-0_4-4-0.4.1-2.4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123827" comment="libwps-devel-0.4.1-2.4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123828" comment="libwps-tools-0.4.1-2.4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123829" comment="mdds-0.12.1-2.4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123830" comment="mdds-devel-0.12.1-2.4.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5213</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5213" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5213" source="CVE"/>
    <description>
    Integer overflow in LibreOffice before 4.4.5 and Apache OpenOffice before 4.1.2 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a long DOC file, which triggers a buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123705" comment="cmis-client-0.5.0-4.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123706" comment="libcmis-0_5-5-0.5.0-4.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123707" comment="libcmis-c-0_5-5-0.5.0-4.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123708" comment="libcmis-c-devel-0.5.0-4.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123709" comment="libcmis-devel-0.5.0-4.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123710" comment="libetonyek-0.1.3-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123711" comment="libetonyek-0_1-1-0.1.3-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123712" comment="libetonyek-devel-0.1.3-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123713" comment="libetonyek-devel-doc-0.1.3-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123714" comment="libetonyek-tools-0.1.3-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123715" comment="libmwaw-0.3.6-2.7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123716" comment="libmwaw-0_3-3-0.3.6-2.7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123717" comment="libmwaw-devel-0.3.6-2.7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123718" comment="libmwaw-devel-doc-0.3.6-2.7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123719" comment="libmwaw-tools-0.3.6-2.7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123720" comment="libodfgen-0.1.4-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123721" comment="libodfgen-0_1-1-0.1.4-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123722" comment="libodfgen-devel-0.1.4-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123723" comment="libodfgen-devel-doc-0.1.4-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123724" comment="libpagemaker-0.0.2-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123725" comment="libpagemaker-0_0-0-0.0.2-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123726" comment="libpagemaker-devel-0.0.2-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123727" comment="libpagemaker-devel-doc-0.0.2-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123728" comment="libpagemaker-tools-0.0.2-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123729" comment="libreoffice-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123730" comment="libreoffice-base-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123731" comment="libreoffice-base-drivers-mysql-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123732" comment="libreoffice-base-drivers-postgresql-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123733" comment="libreoffice-branding-upstream-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123734" comment="libreoffice-calc-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123735" comment="libreoffice-calc-extensions-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123736" comment="libreoffice-draw-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123737" comment="libreoffice-filters-optional-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123738" comment="libreoffice-gnome-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123739" comment="libreoffice-gtk3-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123740" comment="libreoffice-icon-theme-breeze-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123741" comment="libreoffice-icon-theme-galaxy-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123742" comment="libreoffice-icon-theme-hicontrast-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123743" comment="libreoffice-icon-theme-oxygen-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123744" comment="libreoffice-icon-theme-sifr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123745" comment="libreoffice-icon-theme-tango-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123746" comment="libreoffice-impress-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123747" comment="libreoffice-kde4-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123748" comment="libreoffice-l10n-af-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123749" comment="libreoffice-l10n-ar-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123750" comment="libreoffice-l10n-as-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123751" comment="libreoffice-l10n-bg-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123752" comment="libreoffice-l10n-bn-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123753" comment="libreoffice-l10n-br-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123754" comment="libreoffice-l10n-ca-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123755" comment="libreoffice-l10n-cs-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123756" comment="libreoffice-l10n-cy-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123757" comment="libreoffice-l10n-da-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123758" comment="libreoffice-l10n-de-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123759" comment="libreoffice-l10n-dz-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123760" comment="libreoffice-l10n-el-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123761" comment="libreoffice-l10n-en-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123762" comment="libreoffice-l10n-es-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123763" comment="libreoffice-l10n-et-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123764" comment="libreoffice-l10n-eu-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123765" comment="libreoffice-l10n-fa-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123766" comment="libreoffice-l10n-fi-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123767" comment="libreoffice-l10n-fr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123768" comment="libreoffice-l10n-ga-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123769" comment="libreoffice-l10n-gl-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123770" comment="libreoffice-l10n-gu-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123771" comment="libreoffice-l10n-he-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123772" comment="libreoffice-l10n-hi-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123773" comment="libreoffice-l10n-hr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123774" comment="libreoffice-l10n-hu-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123775" comment="libreoffice-l10n-it-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123776" comment="libreoffice-l10n-ja-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123777" comment="libreoffice-l10n-kk-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123778" comment="libreoffice-l10n-kn-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123779" comment="libreoffice-l10n-ko-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123780" comment="libreoffice-l10n-lt-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123781" comment="libreoffice-l10n-lv-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123782" comment="libreoffice-l10n-mai-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123783" comment="libreoffice-l10n-ml-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123784" comment="libreoffice-l10n-mr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123785" comment="libreoffice-l10n-nb-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123786" comment="libreoffice-l10n-nl-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123787" comment="libreoffice-l10n-nn-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123788" comment="libreoffice-l10n-nr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123789" comment="libreoffice-l10n-nso-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123790" comment="libreoffice-l10n-or-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123791" comment="libreoffice-l10n-pa-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123792" comment="libreoffice-l10n-pl-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123793" comment="libreoffice-l10n-pt-BR-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123794" comment="libreoffice-l10n-pt-PT-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123795" comment="libreoffice-l10n-ro-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123796" comment="libreoffice-l10n-ru-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123797" comment="libreoffice-l10n-si-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123798" comment="libreoffice-l10n-sk-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123799" comment="libreoffice-l10n-sl-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123800" comment="libreoffice-l10n-sr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123801" comment="libreoffice-l10n-ss-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123802" comment="libreoffice-l10n-st-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123803" comment="libreoffice-l10n-sv-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123804" comment="libreoffice-l10n-ta-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123805" comment="libreoffice-l10n-te-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123806" comment="libreoffice-l10n-th-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123807" comment="libreoffice-l10n-tn-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123808" comment="libreoffice-l10n-tr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123809" comment="libreoffice-l10n-ts-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123810" comment="libreoffice-l10n-uk-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123811" comment="libreoffice-l10n-ve-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123812" comment="libreoffice-l10n-xh-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123813" comment="libreoffice-l10n-zh-Hans-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123814" comment="libreoffice-l10n-zh-Hant-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123815" comment="libreoffice-l10n-zu-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123816" comment="libreoffice-mailmerge-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123817" comment="libreoffice-math-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123818" comment="libreoffice-officebean-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123819" comment="libreoffice-pyuno-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123820" comment="libreoffice-sdk-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123821" comment="libreoffice-sdk-doc-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123822" comment="libreoffice-share-linker-1-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123823" comment="libreoffice-writer-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123824" comment="libreoffice-writer-extensions-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123825" comment="libwps-0.4.1-2.4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123826" comment="libwps-0_4-4-0.4.1-2.4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123827" comment="libwps-devel-0.4.1-2.4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123828" comment="libwps-tools-0.4.1-2.4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123829" comment="mdds-0.12.1-2.4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123830" comment="mdds-devel-0.12.1-2.4.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5214</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5214" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5214" source="CVE"/>
    <description>
    LibreOffice before 4.4.6 and 5.x before 5.0.1 and Apache OpenOffice before 4.1.2 allows remote attackers to cause a denial of service (memory corruption and application crash) or execute arbitrary code via an index to a non-existent bookmark in a DOC file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123705" comment="cmis-client-0.5.0-4.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123706" comment="libcmis-0_5-5-0.5.0-4.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123707" comment="libcmis-c-0_5-5-0.5.0-4.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123708" comment="libcmis-c-devel-0.5.0-4.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123709" comment="libcmis-devel-0.5.0-4.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123710" comment="libetonyek-0.1.3-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123711" comment="libetonyek-0_1-1-0.1.3-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123712" comment="libetonyek-devel-0.1.3-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123713" comment="libetonyek-devel-doc-0.1.3-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123714" comment="libetonyek-tools-0.1.3-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123715" comment="libmwaw-0.3.6-2.7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123716" comment="libmwaw-0_3-3-0.3.6-2.7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123717" comment="libmwaw-devel-0.3.6-2.7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123718" comment="libmwaw-devel-doc-0.3.6-2.7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123719" comment="libmwaw-tools-0.3.6-2.7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123720" comment="libodfgen-0.1.4-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123721" comment="libodfgen-0_1-1-0.1.4-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123722" comment="libodfgen-devel-0.1.4-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123723" comment="libodfgen-devel-doc-0.1.4-2.3.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123724" comment="libpagemaker-0.0.2-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123725" comment="libpagemaker-0_0-0-0.0.2-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123726" comment="libpagemaker-devel-0.0.2-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123727" comment="libpagemaker-devel-doc-0.0.2-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123728" comment="libpagemaker-tools-0.0.2-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123729" comment="libreoffice-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123730" comment="libreoffice-base-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123731" comment="libreoffice-base-drivers-mysql-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123732" comment="libreoffice-base-drivers-postgresql-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123733" comment="libreoffice-branding-upstream-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123734" comment="libreoffice-calc-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123735" comment="libreoffice-calc-extensions-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123736" comment="libreoffice-draw-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123737" comment="libreoffice-filters-optional-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123738" comment="libreoffice-gnome-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123739" comment="libreoffice-gtk3-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123740" comment="libreoffice-icon-theme-breeze-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123741" comment="libreoffice-icon-theme-galaxy-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123742" comment="libreoffice-icon-theme-hicontrast-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123743" comment="libreoffice-icon-theme-oxygen-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123744" comment="libreoffice-icon-theme-sifr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123745" comment="libreoffice-icon-theme-tango-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123746" comment="libreoffice-impress-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123747" comment="libreoffice-kde4-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123748" comment="libreoffice-l10n-af-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123749" comment="libreoffice-l10n-ar-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123750" comment="libreoffice-l10n-as-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123751" comment="libreoffice-l10n-bg-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123752" comment="libreoffice-l10n-bn-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123753" comment="libreoffice-l10n-br-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123754" comment="libreoffice-l10n-ca-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123755" comment="libreoffice-l10n-cs-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123756" comment="libreoffice-l10n-cy-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123757" comment="libreoffice-l10n-da-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123758" comment="libreoffice-l10n-de-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123759" comment="libreoffice-l10n-dz-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123760" comment="libreoffice-l10n-el-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123761" comment="libreoffice-l10n-en-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123762" comment="libreoffice-l10n-es-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123763" comment="libreoffice-l10n-et-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123764" comment="libreoffice-l10n-eu-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123765" comment="libreoffice-l10n-fa-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123766" comment="libreoffice-l10n-fi-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123767" comment="libreoffice-l10n-fr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123768" comment="libreoffice-l10n-ga-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123769" comment="libreoffice-l10n-gl-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123770" comment="libreoffice-l10n-gu-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123771" comment="libreoffice-l10n-he-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123772" comment="libreoffice-l10n-hi-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123773" comment="libreoffice-l10n-hr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123774" comment="libreoffice-l10n-hu-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123775" comment="libreoffice-l10n-it-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123776" comment="libreoffice-l10n-ja-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123777" comment="libreoffice-l10n-kk-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123778" comment="libreoffice-l10n-kn-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123779" comment="libreoffice-l10n-ko-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123780" comment="libreoffice-l10n-lt-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123781" comment="libreoffice-l10n-lv-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123782" comment="libreoffice-l10n-mai-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123783" comment="libreoffice-l10n-ml-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123784" comment="libreoffice-l10n-mr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123785" comment="libreoffice-l10n-nb-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123786" comment="libreoffice-l10n-nl-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123787" comment="libreoffice-l10n-nn-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123788" comment="libreoffice-l10n-nr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123789" comment="libreoffice-l10n-nso-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123790" comment="libreoffice-l10n-or-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123791" comment="libreoffice-l10n-pa-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123792" comment="libreoffice-l10n-pl-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123793" comment="libreoffice-l10n-pt-BR-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123794" comment="libreoffice-l10n-pt-PT-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123795" comment="libreoffice-l10n-ro-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123796" comment="libreoffice-l10n-ru-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123797" comment="libreoffice-l10n-si-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123798" comment="libreoffice-l10n-sk-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123799" comment="libreoffice-l10n-sl-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123800" comment="libreoffice-l10n-sr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123801" comment="libreoffice-l10n-ss-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123802" comment="libreoffice-l10n-st-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123803" comment="libreoffice-l10n-sv-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123804" comment="libreoffice-l10n-ta-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123805" comment="libreoffice-l10n-te-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123806" comment="libreoffice-l10n-th-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123807" comment="libreoffice-l10n-tn-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123808" comment="libreoffice-l10n-tr-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123809" comment="libreoffice-l10n-ts-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123810" comment="libreoffice-l10n-uk-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123811" comment="libreoffice-l10n-ve-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123812" comment="libreoffice-l10n-xh-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123813" comment="libreoffice-l10n-zh-Hans-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123814" comment="libreoffice-l10n-zh-Hant-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123815" comment="libreoffice-l10n-zu-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123816" comment="libreoffice-mailmerge-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123817" comment="libreoffice-math-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123818" comment="libreoffice-officebean-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123819" comment="libreoffice-pyuno-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123820" comment="libreoffice-sdk-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123821" comment="libreoffice-sdk-doc-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123822" comment="libreoffice-share-linker-1-2.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123823" comment="libreoffice-writer-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123824" comment="libreoffice-writer-extensions-5.0.4.2-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123825" comment="libwps-0.4.1-2.4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123826" comment="libwps-0_4-4-0.4.1-2.4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123827" comment="libwps-devel-0.4.1-2.4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123828" comment="libwps-tools-0.4.1-2.4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123829" comment="mdds-0.12.1-2.4.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123830" comment="mdds-devel-0.12.1-2.4.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5218</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5218" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5218" source="CVE"/>
    <description>
    Buffer overflow in text-utils/colcrt.c in colcrt in util-linux before 2.27 allows local users to cause a denial of service (crash) via a crafted file, related to the page global variable.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115497" comment="libblkid-devel-2.25.1-20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115498" comment="libblkid-devel-32bit-2.25.1-20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115499" comment="libblkid-devel-static-2.25.1-20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115500" comment="libblkid1-2.25.1-20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115501" comment="libblkid1-32bit-2.25.1-20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115502" comment="libmount-devel-2.25.1-20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115503" comment="libmount-devel-32bit-2.25.1-20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115504" comment="libmount-devel-static-2.25.1-20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115505" comment="libmount1-2.25.1-20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115506" comment="libmount1-32bit-2.25.1-20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115507" comment="libsmartcols-devel-2.25.1-20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115508" comment="libsmartcols-devel-static-2.25.1-20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115509" comment="libsmartcols1-2.25.1-20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115510" comment="libuuid-devel-2.25.1-20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115511" comment="libuuid-devel-32bit-2.25.1-20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115512" comment="libuuid-devel-static-2.25.1-20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115513" comment="libuuid1-2.25.1-20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115514" comment="libuuid1-32bit-2.25.1-20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115494" comment="python-libmount-2.25.1-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115515" comment="util-linux-2.25.1-20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115516" comment="util-linux-lang-2.25.1-20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115495" comment="util-linux-systemd-2.25.1-20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115496" comment="uuidd-2.25.1-20.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5221</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5221" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5221" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135287" comment="jasper-1.900.14-163.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135288" comment="libjasper-devel-1.900.14-163.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135289" comment="libjasper1-1.900.14-163.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135290" comment="libjasper1-32bit-1.900.14-163.24.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5228</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5228" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5228" source="CVE"/>
    <description>
    The service daemon in CRIU creates log and dump files insecurely, which allows local users to create arbitrary files and take ownership of existing files via unspecified vectors related to a directory path.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114408" comment="criu-1.3.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114409" comment="criu-devel-1.3.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114410" comment="libcriu1-1.3.1-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5231</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5231" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5231" source="CVE"/>
    <description>
    The service daemon in CRIU does not properly restrict access to non-dumpable processes, which allows local users to obtain sensitive information via (1) process dumps or (2) ptrace access.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114408" comment="criu-1.3.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114409" comment="criu-devel-1.3.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114410" comment="libcriu1-1.3.1-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5234</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5234" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5234" source="CVE"/>
    <description>
    IcedTea-Web before 1.5.3 and 1.6.x before 1.6.1 does not properly sanitize applet URLs, which allows remote attackers to inject applets into the .appletTrustSettings configuration file and bypass user approval to execute the applet via a crafted web page, possibly related to line breaks.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114419" comment="icedtea-web-1.6.1-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114420" comment="icedtea-web-javadoc-1.6.1-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114421" comment="java-1_7_0-openjdk-plugin-1.6.1-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114422" comment="java-1_8_0-openjdk-plugin-1.6.1-6.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5235</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5235" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5235" source="CVE"/>
    <description>
    IcedTea-Web before 1.5.3 and 1.6.x before 1.6.1 does not properly determine the origin of unsigned applets, which allows remote attackers to bypass the approval process or trick users into approving applet execution via a crafted web page.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114419" comment="icedtea-web-1.6.1-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114420" comment="icedtea-web-javadoc-1.6.1-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114421" comment="java-1_7_0-openjdk-plugin-1.6.1-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114422" comment="java-1_8_0-openjdk-plugin-1.6.1-6.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5239</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5239" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5239" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126020" comment="xen-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126021" comment="xen-devel-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126022" comment="xen-doc-html-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126023" comment="xen-kmp-default-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126024" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126025" comment="xen-libs-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126026" comment="xen-libs-32bit-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126027" comment="xen-tools-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126028" comment="xen-tools-domU-4.4.4_02-43.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5252</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5252" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252" source="CVE"/>
    <description>
    vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126263" comment="ctdb-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126264" comment="ctdb-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126265" comment="ctdb-pcp-pmda-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126266" comment="ctdb-tests-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120133" comment="ldb-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120134" comment="ldb-tools-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126267" comment="libdcerpc-atsvc-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126268" comment="libdcerpc-atsvc0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126269" comment="libdcerpc-atsvc0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126270" comment="libdcerpc-binding0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126271" comment="libdcerpc-binding0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126272" comment="libdcerpc-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126273" comment="libdcerpc-samr-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126274" comment="libdcerpc-samr0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126275" comment="libdcerpc-samr0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126276" comment="libdcerpc0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126277" comment="libdcerpc0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126278" comment="libgensec-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126279" comment="libgensec0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126280" comment="libgensec0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120149" comment="libldb-devel-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120150" comment="libldb1-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120151" comment="libldb1-32bit-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126281" comment="libndr-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126282" comment="libndr-krb5pac-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126283" comment="libndr-krb5pac0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126284" comment="libndr-krb5pac0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126285" comment="libndr-nbt-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126286" comment="libndr-nbt0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126287" comment="libndr-nbt0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126288" comment="libndr-standard-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126289" comment="libndr-standard0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126290" comment="libndr-standard0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126291" comment="libndr0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126292" comment="libndr0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126293" comment="libnetapi-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126294" comment="libnetapi0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126295" comment="libnetapi0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120167" comment="libpdb-devel-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120168" comment="libpdb0-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120169" comment="libpdb0-32bit-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126296" comment="libregistry-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126297" comment="libregistry0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126298" comment="libregistry0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126299" comment="libsamba-credentials-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126300" comment="libsamba-credentials0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126301" comment="libsamba-credentials0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126302" comment="libsamba-hostconfig-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126303" comment="libsamba-hostconfig0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126304" comment="libsamba-hostconfig0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126305" comment="libsamba-passdb-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126306" comment="libsamba-passdb0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126307" comment="libsamba-passdb0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126308" comment="libsamba-policy-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126309" comment="libsamba-policy0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126310" comment="libsamba-policy0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126311" comment="libsamba-util-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126312" comment="libsamba-util0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126313" comment="libsamba-util0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126314" comment="libsamdb-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126315" comment="libsamdb0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126316" comment="libsamdb0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126317" comment="libsmbclient-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126318" comment="libsmbclient-raw-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126319" comment="libsmbclient-raw0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126320" comment="libsmbclient-raw0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126321" comment="libsmbclient0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126322" comment="libsmbclient0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126323" comment="libsmbconf-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126324" comment="libsmbconf0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126325" comment="libsmbconf0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126326" comment="libsmbldap-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126327" comment="libsmbldap0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126328" comment="libsmbldap0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120200" comment="libsmbsharemodes-devel-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120201" comment="libsmbsharemodes0-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120202" comment="libtalloc-devel-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120203" comment="libtalloc2-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120204" comment="libtalloc2-32bit-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120205" comment="libtdb-devel-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120206" comment="libtdb1-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120207" comment="libtdb1-32bit-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120208" comment="libtevent-devel-0.9.26-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126329" comment="libtevent-util-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126330" comment="libtevent-util0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126331" comment="libtevent-util0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120212" comment="libtevent0-0.9.26-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120213" comment="libtevent0-32bit-0.9.26-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126332" comment="libwbclient-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126333" comment="libwbclient0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126334" comment="libwbclient0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120217" comment="pyldb-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120218" comment="pyldb-32bit-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120219" comment="pyldb-devel-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120220" comment="pytalloc-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120221" comment="pytalloc-32bit-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120222" comment="pytalloc-devel-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120223" comment="python-tdb-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120224" comment="python-tdb-32bit-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120225" comment="python-tevent-0.9.26-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120226" comment="python-tevent-32bit-0.9.26-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126335" comment="samba-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126336" comment="samba-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126337" comment="samba-client-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126338" comment="samba-client-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126339" comment="samba-core-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126340" comment="samba-doc-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126341" comment="samba-libs-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126342" comment="samba-libs-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126343" comment="samba-pidl-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126344" comment="samba-python-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126345" comment="samba-test-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126346" comment="samba-test-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126347" comment="samba-winbind-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126348" comment="samba-winbind-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120241" comment="talloc-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120242" comment="tdb-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120243" comment="tdb-tools-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120244" comment="tevent-0.9.26-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155260" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5260</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5260" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5260" source="CVE"/>
    <description>
    Heap-based buffer overflow in SPICE before 0.12.6 allows guest OS users to cause a denial of service (heap-based memory corruption and QEMU-KVM crash) or possibly execute arbitrary code on the host via QXL commands related to the surface_id parameter.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115042" comment="libspice-server-devel-0.12.4-4.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115043" comment="libspice-server1-0.12.4-4.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115044" comment="spice-0.12.4-4.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115045" comment="spice-client-0.12.4-4.6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5261</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5261" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5261" source="CVE"/>
    <description>
    Heap-based buffer overflow in SPICE before 0.12.6 allows guest OS users to read and write to arbitrary memory locations on the host via guest QXL commands related to surface creation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115042" comment="libspice-server-devel-0.12.4-4.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115043" comment="libspice-server1-0.12.4-4.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115044" comment="spice-0.12.4-4.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115045" comment="spice-client-0.12.4-4.6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5278</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5278" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5278" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126020" comment="xen-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126021" comment="xen-devel-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126022" comment="xen-doc-html-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126023" comment="xen-kmp-default-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126024" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126025" comment="xen-libs-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126026" comment="xen-libs-32bit-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126027" comment="xen-tools-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126028" comment="xen-tools-domU-4.4.4_02-43.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5283</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5283" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5283" source="CVE"/>
    <description>
    The sctp_init function in net/sctp/protocol.c in the Linux kernel before 4.2.3 has an incorrect sequence of protocol-initialization steps, which allows local users to cause a denial of service (panic or memory corruption) by creating SCTP sockets before all of the steps have finished.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115288" comment="bbswitch-0.8-3.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115289" comment="bbswitch-kmp-default-0.8_k3.16.7_29-3.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115290" comment="bbswitch-kmp-desktop-0.8_k3.16.7_29-3.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115291" comment="bbswitch-kmp-pae-0.8_k3.16.7_29-3.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115292" comment="bbswitch-kmp-xen-0.8_k3.16.7_29-3.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115293" comment="cloop-2.639-14.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115294" comment="cloop-kmp-default-2.639_k3.16.7_29-14.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115295" comment="cloop-kmp-desktop-2.639_k3.16.7_29-14.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115296" comment="cloop-kmp-pae-2.639_k3.16.7_29-14.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115297" comment="cloop-kmp-xen-2.639_k3.16.7_29-14.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115298" comment="crash-7.0.8-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115299" comment="crash-devel-7.0.8-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115300" comment="crash-doc-7.0.8-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115301" comment="crash-eppic-7.0.8-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115302" comment="crash-gcore-7.0.8-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115303" comment="crash-kmp-default-7.0.8_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115304" comment="crash-kmp-desktop-7.0.8_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115305" comment="crash-kmp-pae-7.0.8_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115306" comment="crash-kmp-xen-7.0.8_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115307" comment="hdjmod-1.28-18.14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115308" comment="hdjmod-kmp-default-1.28_k3.16.7_29-18.14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115309" comment="hdjmod-kmp-desktop-1.28_k3.16.7_29-18.14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115310" comment="hdjmod-kmp-pae-1.28_k3.16.7_29-18.14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115311" comment="hdjmod-kmp-xen-1.28_k3.16.7_29-18.14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115312" comment="ipset-6.23-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115313" comment="ipset-devel-6.23-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115314" comment="ipset-kmp-default-6.23_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115315" comment="ipset-kmp-desktop-6.23_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115316" comment="ipset-kmp-pae-6.23_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115317" comment="ipset-kmp-xen-6.23_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115319" comment="kernel-debug-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115320" comment="kernel-debug-base-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115321" comment="kernel-debug-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115322" comment="kernel-default-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115323" comment="kernel-default-base-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115324" comment="kernel-default-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115325" comment="kernel-desktop-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115326" comment="kernel-desktop-base-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115327" comment="kernel-desktop-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115338" comment="kernel-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115328" comment="kernel-docs-3.16.7-29.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115329" comment="kernel-ec2-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115330" comment="kernel-ec2-base-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115331" comment="kernel-ec2-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115339" comment="kernel-macros-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115332" comment="kernel-obs-build-3.16.7-29.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115334" comment="kernel-obs-qa-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115333" comment="kernel-obs-qa-xen-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115335" comment="kernel-pae-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115336" comment="kernel-pae-base-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115337" comment="kernel-pae-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115340" comment="kernel-source-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115341" comment="kernel-source-vanilla-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115342" comment="kernel-syms-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115343" comment="kernel-vanilla-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115344" comment="kernel-vanilla-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115345" comment="kernel-xen-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115346" comment="kernel-xen-base-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115347" comment="kernel-xen-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115318" comment="libipset3-6.23-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115348" comment="pcfclock-0.44-260.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115349" comment="pcfclock-kmp-default-0.44_k3.16.7_29-260.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115350" comment="pcfclock-kmp-desktop-0.44_k3.16.7_29-260.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115351" comment="pcfclock-kmp-pae-0.44_k3.16.7_29-260.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115352" comment="vhba-kmp-20140629-2.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115353" comment="vhba-kmp-default-20140629_k3.16.7_29-2.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115354" comment="vhba-kmp-desktop-20140629_k3.16.7_29-2.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115355" comment="vhba-kmp-pae-20140629_k3.16.7_29-2.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115356" comment="vhba-kmp-xen-20140629_k3.16.7_29-2.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115357" comment="xen-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115358" comment="xen-devel-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115367" comment="xen-doc-html-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115368" comment="xen-kmp-default-4.4.2_06_k3.16.7_29-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115369" comment="xen-kmp-desktop-4.4.2_06_k3.16.7_29-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115360" comment="xen-libs-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115359" comment="xen-libs-32bit-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115370" comment="xen-tools-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115361" comment="xen-tools-domU-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115362" comment="xtables-addons-2.6-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115363" comment="xtables-addons-kmp-default-2.6_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115364" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115365" comment="xtables-addons-kmp-pae-2.6_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115366" comment="xtables-addons-kmp-xen-2.6_k3.16.7_29-13.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5288</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5288" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5288" source="CVE"/>
    <description>
    The crypt function in contrib/pgcrypto in PostgreSQL before 9.0.23, 9.1.x before 9.1.19, 9.2.x before 9.2.14, 9.3.x before 9.3.10, and 9.4.x before 9.4.5 allows attackers to cause a denial of service (server crash) or read arbitrary server memory via a "too-short" salt.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115518" comment="libecpg6-9.3.10-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115517" comment="libecpg6-32bit-9.3.10-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115520" comment="libpq5-9.3.10-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115519" comment="libpq5-32bit-9.3.10-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115523" comment="postgresql93-9.3.10-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115524" comment="postgresql93-contrib-9.3.10-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115521" comment="postgresql93-devel-9.3.10-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115525" comment="postgresql93-docs-9.3.10-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115522" comment="postgresql93-libs-9.3.10-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115526" comment="postgresql93-plperl-9.3.10-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115527" comment="postgresql93-plpython-9.3.10-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115528" comment="postgresql93-pltcl-9.3.10-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115529" comment="postgresql93-server-9.3.10-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115530" comment="postgresql93-test-9.3.10-2.7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5289</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5289" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5289" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in json parsing in PostgreSQL before 9.3.x before 9.3.10 and 9.4.x before 9.4.5 allow attackers to cause a denial of service (server crash) via unspecified vectors, which are not properly handled in (1) json or (2) jsonb values.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115518" comment="libecpg6-9.3.10-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115517" comment="libecpg6-32bit-9.3.10-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115520" comment="libpq5-9.3.10-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115519" comment="libpq5-32bit-9.3.10-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115523" comment="postgresql93-9.3.10-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115524" comment="postgresql93-contrib-9.3.10-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115521" comment="postgresql93-devel-9.3.10-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115525" comment="postgresql93-docs-9.3.10-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115522" comment="postgresql93-libs-9.3.10-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115526" comment="postgresql93-plperl-9.3.10-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115527" comment="postgresql93-plpython-9.3.10-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115528" comment="postgresql93-pltcl-9.3.10-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115529" comment="postgresql93-server-9.3.10-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115530" comment="postgresql93-test-9.3.10-2.7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5291</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5291" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5291" source="CVE"/>
    <description>
    Heap-based buffer overflow in PolarSSL 1.x before 1.2.17 and ARM mbed TLS (formerly PolarSSL) 1.3.x before 1.3.14 and 2.x before 2.1.2 allows remote SSL servers to cause a denial of service (client crash) and possibly execute arbitrary code via a long hostname to the server name indication (SNI) extension, which is not properly handled when creating a ClientHello message.  NOTE: this identifier has been SPLIT per ADT3 due to different affected version ranges. See CVE-2015-8036 for the session ticket issue that was introduced in 1.3.0.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009120447" comment="libpolarssl7-1.3.9-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120448" comment="polarssl-1.3.9-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120449" comment="polarssl-devel-1.3.9-11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5296</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5296" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5296" source="CVE"/>
    <description>
    Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 supports connections that are encrypted but unsigned, which allows man-in-the-middle attackers to conduct encrypted-to-unencrypted downgrade attacks by modifying the client-server data stream, related to clidfs.c, libsmb_server.c, and smbXcli_base.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126263" comment="ctdb-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126264" comment="ctdb-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126265" comment="ctdb-pcp-pmda-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126266" comment="ctdb-tests-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120133" comment="ldb-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120134" comment="ldb-tools-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126267" comment="libdcerpc-atsvc-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126268" comment="libdcerpc-atsvc0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126269" comment="libdcerpc-atsvc0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126270" comment="libdcerpc-binding0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126271" comment="libdcerpc-binding0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126272" comment="libdcerpc-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126273" comment="libdcerpc-samr-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126274" comment="libdcerpc-samr0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126275" comment="libdcerpc-samr0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126276" comment="libdcerpc0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126277" comment="libdcerpc0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126278" comment="libgensec-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126279" comment="libgensec0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126280" comment="libgensec0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120149" comment="libldb-devel-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120150" comment="libldb1-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120151" comment="libldb1-32bit-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126281" comment="libndr-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126282" comment="libndr-krb5pac-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126283" comment="libndr-krb5pac0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126284" comment="libndr-krb5pac0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126285" comment="libndr-nbt-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126286" comment="libndr-nbt0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126287" comment="libndr-nbt0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126288" comment="libndr-standard-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126289" comment="libndr-standard0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126290" comment="libndr-standard0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126291" comment="libndr0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126292" comment="libndr0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126293" comment="libnetapi-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126294" comment="libnetapi0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126295" comment="libnetapi0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120167" comment="libpdb-devel-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120168" comment="libpdb0-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120169" comment="libpdb0-32bit-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126296" comment="libregistry-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126297" comment="libregistry0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126298" comment="libregistry0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126299" comment="libsamba-credentials-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126300" comment="libsamba-credentials0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126301" comment="libsamba-credentials0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126302" comment="libsamba-hostconfig-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126303" comment="libsamba-hostconfig0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126304" comment="libsamba-hostconfig0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126305" comment="libsamba-passdb-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126306" comment="libsamba-passdb0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126307" comment="libsamba-passdb0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126308" comment="libsamba-policy-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126309" comment="libsamba-policy0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126310" comment="libsamba-policy0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126311" comment="libsamba-util-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126312" comment="libsamba-util0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126313" comment="libsamba-util0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126314" comment="libsamdb-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126315" comment="libsamdb0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126316" comment="libsamdb0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126317" comment="libsmbclient-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126318" comment="libsmbclient-raw-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126319" comment="libsmbclient-raw0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126320" comment="libsmbclient-raw0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126321" comment="libsmbclient0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126322" comment="libsmbclient0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126323" comment="libsmbconf-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126324" comment="libsmbconf0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126325" comment="libsmbconf0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126326" comment="libsmbldap-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126327" comment="libsmbldap0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126328" comment="libsmbldap0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120200" comment="libsmbsharemodes-devel-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120201" comment="libsmbsharemodes0-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120202" comment="libtalloc-devel-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120203" comment="libtalloc2-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120204" comment="libtalloc2-32bit-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120205" comment="libtdb-devel-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120206" comment="libtdb1-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120207" comment="libtdb1-32bit-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120208" comment="libtevent-devel-0.9.26-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126329" comment="libtevent-util-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126330" comment="libtevent-util0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126331" comment="libtevent-util0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120212" comment="libtevent0-0.9.26-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120213" comment="libtevent0-32bit-0.9.26-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126332" comment="libwbclient-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126333" comment="libwbclient0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126334" comment="libwbclient0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120217" comment="pyldb-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120218" comment="pyldb-32bit-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120219" comment="pyldb-devel-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120220" comment="pytalloc-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120221" comment="pytalloc-32bit-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120222" comment="pytalloc-devel-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120223" comment="python-tdb-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120224" comment="python-tdb-32bit-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120225" comment="python-tevent-0.9.26-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120226" comment="python-tevent-32bit-0.9.26-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126335" comment="samba-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126336" comment="samba-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126337" comment="samba-client-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126338" comment="samba-client-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126339" comment="samba-core-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126340" comment="samba-doc-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126341" comment="samba-libs-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126342" comment="samba-libs-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126343" comment="samba-pidl-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126344" comment="samba-python-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126345" comment="samba-test-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126346" comment="samba-test-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126347" comment="samba-winbind-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126348" comment="samba-winbind-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120241" comment="talloc-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120242" comment="tdb-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120243" comment="tdb-tools-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120244" comment="tevent-0.9.26-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5299</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5299" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5299" source="CVE"/>
    <description>
    The shadow_copy2_get_shadow_copy_data function in modules/vfs_shadow_copy2.c in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 does not verify that the DIRECTORY_LIST access right has been granted, which allows remote attackers to access snapshots by visiting a shadow copy directory.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126263" comment="ctdb-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126264" comment="ctdb-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126265" comment="ctdb-pcp-pmda-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126266" comment="ctdb-tests-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120133" comment="ldb-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120134" comment="ldb-tools-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126267" comment="libdcerpc-atsvc-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126268" comment="libdcerpc-atsvc0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126269" comment="libdcerpc-atsvc0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126270" comment="libdcerpc-binding0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126271" comment="libdcerpc-binding0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126272" comment="libdcerpc-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126273" comment="libdcerpc-samr-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126274" comment="libdcerpc-samr0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126275" comment="libdcerpc-samr0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126276" comment="libdcerpc0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126277" comment="libdcerpc0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126278" comment="libgensec-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126279" comment="libgensec0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126280" comment="libgensec0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120149" comment="libldb-devel-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120150" comment="libldb1-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120151" comment="libldb1-32bit-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126281" comment="libndr-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126282" comment="libndr-krb5pac-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126283" comment="libndr-krb5pac0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126284" comment="libndr-krb5pac0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126285" comment="libndr-nbt-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126286" comment="libndr-nbt0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126287" comment="libndr-nbt0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126288" comment="libndr-standard-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126289" comment="libndr-standard0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126290" comment="libndr-standard0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126291" comment="libndr0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126292" comment="libndr0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126293" comment="libnetapi-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126294" comment="libnetapi0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126295" comment="libnetapi0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120167" comment="libpdb-devel-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120168" comment="libpdb0-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120169" comment="libpdb0-32bit-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126296" comment="libregistry-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126297" comment="libregistry0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126298" comment="libregistry0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126299" comment="libsamba-credentials-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126300" comment="libsamba-credentials0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126301" comment="libsamba-credentials0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126302" comment="libsamba-hostconfig-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126303" comment="libsamba-hostconfig0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126304" comment="libsamba-hostconfig0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126305" comment="libsamba-passdb-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126306" comment="libsamba-passdb0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126307" comment="libsamba-passdb0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126308" comment="libsamba-policy-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126309" comment="libsamba-policy0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126310" comment="libsamba-policy0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126311" comment="libsamba-util-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126312" comment="libsamba-util0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126313" comment="libsamba-util0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126314" comment="libsamdb-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126315" comment="libsamdb0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126316" comment="libsamdb0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126317" comment="libsmbclient-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126318" comment="libsmbclient-raw-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126319" comment="libsmbclient-raw0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126320" comment="libsmbclient-raw0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126321" comment="libsmbclient0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126322" comment="libsmbclient0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126323" comment="libsmbconf-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126324" comment="libsmbconf0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126325" comment="libsmbconf0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126326" comment="libsmbldap-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126327" comment="libsmbldap0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126328" comment="libsmbldap0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120200" comment="libsmbsharemodes-devel-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120201" comment="libsmbsharemodes0-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120202" comment="libtalloc-devel-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120203" comment="libtalloc2-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120204" comment="libtalloc2-32bit-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120205" comment="libtdb-devel-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120206" comment="libtdb1-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120207" comment="libtdb1-32bit-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120208" comment="libtevent-devel-0.9.26-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126329" comment="libtevent-util-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126330" comment="libtevent-util0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126331" comment="libtevent-util0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120212" comment="libtevent0-0.9.26-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120213" comment="libtevent0-32bit-0.9.26-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126332" comment="libwbclient-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126333" comment="libwbclient0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126334" comment="libwbclient0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120217" comment="pyldb-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120218" comment="pyldb-32bit-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120219" comment="pyldb-devel-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120220" comment="pytalloc-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120221" comment="pytalloc-32bit-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120222" comment="pytalloc-devel-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120223" comment="python-tdb-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120224" comment="python-tdb-32bit-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120225" comment="python-tevent-0.9.26-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120226" comment="python-tevent-32bit-0.9.26-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126335" comment="samba-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126336" comment="samba-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126337" comment="samba-client-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126338" comment="samba-client-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126339" comment="samba-core-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126340" comment="samba-doc-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126341" comment="samba-libs-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126342" comment="samba-libs-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126343" comment="samba-pidl-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126344" comment="samba-python-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126345" comment="samba-test-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126346" comment="samba-test-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126347" comment="samba-winbind-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126348" comment="samba-winbind-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120241" comment="talloc-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120242" comment="tdb-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120243" comment="tdb-tools-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120244" comment="tevent-0.9.26-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5300</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5300" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128159" comment="ntp-4.2.8p7-25.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128160" comment="ntp-doc-4.2.8p7-25.15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5307</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5307" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307" source="CVE"/>
    <description>
    The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122787" comment="bbswitch-0.8-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122788" comment="bbswitch-kmp-default-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122789" comment="bbswitch-kmp-desktop-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122790" comment="bbswitch-kmp-pae-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122791" comment="bbswitch-kmp-xen-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122792" comment="cloop-2.639-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122793" comment="cloop-kmp-default-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122794" comment="cloop-kmp-desktop-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122795" comment="cloop-kmp-pae-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122796" comment="cloop-kmp-xen-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122797" comment="crash-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122798" comment="crash-devel-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122799" comment="crash-doc-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122800" comment="crash-eppic-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122801" comment="crash-gcore-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122802" comment="crash-kmp-default-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122803" comment="crash-kmp-desktop-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122804" comment="crash-kmp-pae-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122805" comment="crash-kmp-xen-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122806" comment="hdjmod-1.28-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122807" comment="hdjmod-kmp-default-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122808" comment="hdjmod-kmp-desktop-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122809" comment="hdjmod-kmp-pae-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122810" comment="hdjmod-kmp-xen-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122811" comment="ipset-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122812" comment="ipset-devel-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122813" comment="ipset-kmp-default-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122814" comment="ipset-kmp-desktop-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122815" comment="ipset-kmp-pae-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122816" comment="ipset-kmp-xen-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122817" comment="kernel-debug-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122818" comment="kernel-debug-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122819" comment="kernel-debug-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122820" comment="kernel-default-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122821" comment="kernel-default-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122822" comment="kernel-default-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122823" comment="kernel-desktop-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122824" comment="kernel-desktop-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122825" comment="kernel-desktop-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122826" comment="kernel-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122827" comment="kernel-docs-3.16.7-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122828" comment="kernel-ec2-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122829" comment="kernel-ec2-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122830" comment="kernel-ec2-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122831" comment="kernel-macros-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122832" comment="kernel-obs-build-3.16.7-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122833" comment="kernel-obs-qa-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122834" comment="kernel-obs-qa-xen-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122835" comment="kernel-pae-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122836" comment="kernel-pae-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122837" comment="kernel-pae-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122838" comment="kernel-source-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122839" comment="kernel-source-vanilla-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122840" comment="kernel-syms-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122841" comment="kernel-vanilla-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122842" comment="kernel-vanilla-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122843" comment="kernel-xen-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122844" comment="kernel-xen-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122845" comment="kernel-xen-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122846" comment="libipset3-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122847" comment="pcfclock-0.44-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122848" comment="pcfclock-kmp-default-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122849" comment="pcfclock-kmp-desktop-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122850" comment="pcfclock-kmp-pae-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122851" comment="python-virtualbox-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122852" comment="vhba-kmp-20140629-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122853" comment="vhba-kmp-default-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122854" comment="vhba-kmp-desktop-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122855" comment="vhba-kmp-pae-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122856" comment="vhba-kmp-xen-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122857" comment="virtualbox-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122858" comment="virtualbox-devel-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122859" comment="virtualbox-guest-desktop-icons-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122860" comment="virtualbox-guest-kmp-default-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122861" comment="virtualbox-guest-kmp-desktop-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122862" comment="virtualbox-guest-kmp-pae-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122863" comment="virtualbox-guest-tools-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122864" comment="virtualbox-guest-x11-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122865" comment="virtualbox-host-kmp-default-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122866" comment="virtualbox-host-kmp-desktop-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122867" comment="virtualbox-host-kmp-pae-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122868" comment="virtualbox-host-source-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122869" comment="virtualbox-qt-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122870" comment="virtualbox-websrv-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122871" comment="xen-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122872" comment="xen-devel-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122873" comment="xen-doc-html-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122874" comment="xen-kmp-default-4.4.3_08_k3.16.7_32-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122875" comment="xen-kmp-desktop-4.4.3_08_k3.16.7_32-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122876" comment="xen-libs-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122877" comment="xen-libs-32bit-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122878" comment="xen-tools-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122879" comment="xen-tools-domU-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122880" comment="xtables-addons-2.6-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122881" comment="xtables-addons-kmp-default-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122882" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122883" comment="xtables-addons-kmp-pae-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122884" comment="xtables-addons-kmp-xen-2.6_k3.16.7_32-15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5309</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5309" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5309" source="CVE"/>
    <description>
    Integer overflow in the terminal emulator in PuTTY before 0.66 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via an ECH (erase characters) escape sequence with a large parameter value, which triggers a buffer underflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118001" comment="putty-0.66-4.7.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5312</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5312" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5312" source="CVE"/>
    <description>
    The xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.3 does not properly prevent entity expansion, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data, a different vulnerability than CVE-2014-3660.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009120421" comment="libxml2-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120422" comment="libxml2-2-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120423" comment="libxml2-2-32bit-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120424" comment="libxml2-devel-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120425" comment="libxml2-devel-32bit-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120426" comment="libxml2-doc-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120427" comment="libxml2-tools-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120428" comment="python-libxml2-2.9.3-7.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5313</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5313" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5313" source="CVE"/>
    <description>
    Directory traversal vulnerability in the virStorageBackendFileSystemVolCreate function in storage/storage_backend_fs.c in libvirt, when fine-grained Access Control Lists (ACL) are in effect, allows local users with storage_vol:create ACL but not domain:write permission to write to arbitrary files via a .. (dot dot) in a volume name.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122027" comment="libvirt-1.2.9-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122028" comment="libvirt-client-1.2.9-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122029" comment="libvirt-client-32bit-1.2.9-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122030" comment="libvirt-daemon-1.2.9-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122031" comment="libvirt-daemon-config-network-1.2.9-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122032" comment="libvirt-daemon-config-nwfilter-1.2.9-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122033" comment="libvirt-daemon-driver-interface-1.2.9-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122034" comment="libvirt-daemon-driver-libxl-1.2.9-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122035" comment="libvirt-daemon-driver-lxc-1.2.9-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122036" comment="libvirt-daemon-driver-network-1.2.9-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122037" comment="libvirt-daemon-driver-nodedev-1.2.9-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122038" comment="libvirt-daemon-driver-nwfilter-1.2.9-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122039" comment="libvirt-daemon-driver-qemu-1.2.9-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122040" comment="libvirt-daemon-driver-secret-1.2.9-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122041" comment="libvirt-daemon-driver-storage-1.2.9-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122042" comment="libvirt-daemon-driver-uml-1.2.9-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122043" comment="libvirt-daemon-driver-vbox-1.2.9-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122006" comment="libvirt-daemon-driver-xen-1.2.9-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122044" comment="libvirt-daemon-lxc-1.2.9-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122045" comment="libvirt-daemon-qemu-1.2.9-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122046" comment="libvirt-daemon-uml-1.2.9-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122047" comment="libvirt-daemon-vbox-1.2.9-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122048" comment="libvirt-daemon-xen-1.2.9-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122049" comment="libvirt-devel-1.2.9-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122050" comment="libvirt-devel-32bit-1.2.9-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122051" comment="libvirt-doc-1.2.9-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122052" comment="libvirt-lock-sanlock-1.2.9-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122053" comment="libvirt-login-shell-1.2.9-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5330</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5330" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5330" source="CVE"/>
    <description>
    ldb before 1.1.24, as used in the AD LDAP server in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, mishandles string lengths, which allows remote attackers to obtain sensitive information from daemon heap memory by sending crafted packets and then reading (1) an error message or (2) a database value.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126263" comment="ctdb-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126264" comment="ctdb-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126265" comment="ctdb-pcp-pmda-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126266" comment="ctdb-tests-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120133" comment="ldb-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120134" comment="ldb-tools-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126267" comment="libdcerpc-atsvc-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126268" comment="libdcerpc-atsvc0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126269" comment="libdcerpc-atsvc0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126270" comment="libdcerpc-binding0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126271" comment="libdcerpc-binding0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126272" comment="libdcerpc-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126273" comment="libdcerpc-samr-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126274" comment="libdcerpc-samr0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126275" comment="libdcerpc-samr0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126276" comment="libdcerpc0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126277" comment="libdcerpc0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126278" comment="libgensec-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126279" comment="libgensec0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126280" comment="libgensec0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120149" comment="libldb-devel-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120150" comment="libldb1-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120151" comment="libldb1-32bit-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126281" comment="libndr-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126282" comment="libndr-krb5pac-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126283" comment="libndr-krb5pac0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126284" comment="libndr-krb5pac0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126285" comment="libndr-nbt-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126286" comment="libndr-nbt0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126287" comment="libndr-nbt0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126288" comment="libndr-standard-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126289" comment="libndr-standard0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126290" comment="libndr-standard0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126291" comment="libndr0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126292" comment="libndr0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126293" comment="libnetapi-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126294" comment="libnetapi0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126295" comment="libnetapi0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120167" comment="libpdb-devel-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120168" comment="libpdb0-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120169" comment="libpdb0-32bit-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126296" comment="libregistry-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126297" comment="libregistry0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126298" comment="libregistry0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126299" comment="libsamba-credentials-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126300" comment="libsamba-credentials0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126301" comment="libsamba-credentials0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126302" comment="libsamba-hostconfig-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126303" comment="libsamba-hostconfig0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126304" comment="libsamba-hostconfig0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126305" comment="libsamba-passdb-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126306" comment="libsamba-passdb0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126307" comment="libsamba-passdb0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126308" comment="libsamba-policy-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126309" comment="libsamba-policy0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126310" comment="libsamba-policy0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126311" comment="libsamba-util-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126312" comment="libsamba-util0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126313" comment="libsamba-util0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126314" comment="libsamdb-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126315" comment="libsamdb0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126316" comment="libsamdb0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126317" comment="libsmbclient-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126318" comment="libsmbclient-raw-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126319" comment="libsmbclient-raw0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126320" comment="libsmbclient-raw0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126321" comment="libsmbclient0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126322" comment="libsmbclient0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126323" comment="libsmbconf-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126324" comment="libsmbconf0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126325" comment="libsmbconf0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126326" comment="libsmbldap-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126327" comment="libsmbldap0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126328" comment="libsmbldap0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120200" comment="libsmbsharemodes-devel-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120201" comment="libsmbsharemodes0-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120202" comment="libtalloc-devel-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120203" comment="libtalloc2-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120204" comment="libtalloc2-32bit-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120205" comment="libtdb-devel-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120206" comment="libtdb1-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120207" comment="libtdb1-32bit-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120208" comment="libtevent-devel-0.9.26-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126329" comment="libtevent-util-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126330" comment="libtevent-util0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126331" comment="libtevent-util0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120212" comment="libtevent0-0.9.26-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120213" comment="libtevent0-32bit-0.9.26-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126332" comment="libwbclient-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126333" comment="libwbclient0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126334" comment="libwbclient0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120217" comment="pyldb-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120218" comment="pyldb-32bit-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120219" comment="pyldb-devel-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120220" comment="pytalloc-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120221" comment="pytalloc-32bit-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120222" comment="pytalloc-devel-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120223" comment="python-tdb-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120224" comment="python-tdb-32bit-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120225" comment="python-tevent-0.9.26-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120226" comment="python-tevent-32bit-0.9.26-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126335" comment="samba-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126336" comment="samba-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126337" comment="samba-client-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126338" comment="samba-client-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126339" comment="samba-core-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126340" comment="samba-doc-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126341" comment="samba-libs-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126342" comment="samba-libs-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126343" comment="samba-pidl-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126344" comment="samba-python-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126345" comment="samba-test-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126346" comment="samba-test-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126347" comment="samba-winbind-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126348" comment="samba-winbind-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120241" comment="talloc-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120242" comment="tdb-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120243" comment="tdb-tools-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120244" comment="tevent-0.9.26-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155333" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5333</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5333" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5333" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127771" comment="libcrypto34-2.2.7-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127772" comment="libcrypto34-32bit-2.2.7-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127773" comment="libressl-2.2.7-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127774" comment="libressl-devel-2.2.7-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127775" comment="libressl-devel-32bit-2.2.7-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127776" comment="libressl-devel-doc-2.2.7-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127777" comment="libssl33-2.2.7-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127778" comment="libssl33-32bit-2.2.7-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127779" comment="libtls4-2.2.7-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127780" comment="libtls4-32bit-2.2.7-2.13.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155334" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5334</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5334" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5334" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127771" comment="libcrypto34-2.2.7-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127772" comment="libcrypto34-32bit-2.2.7-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127773" comment="libressl-2.2.7-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127774" comment="libressl-devel-2.2.7-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127775" comment="libressl-devel-32bit-2.2.7-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127776" comment="libressl-devel-doc-2.2.7-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127777" comment="libssl33-2.2.7-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127778" comment="libssl33-32bit-2.2.7-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127779" comment="libtls4-2.2.7-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127780" comment="libtls4-32bit-2.2.7-2.13.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5343</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5343" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5343" source="CVE"/>
    <description>
    Integer overflow in util.c in mod_dav_svn in Apache Subversion 1.7.x, 1.8.x before 1.8.15, and 1.9.x before 1.9.3 allows remote authenticated users to cause a denial of service (subversion server crash or memory consumption) and possibly execute arbitrary code via a skel-encoded request body, which triggers an out-of-bounds read and heap-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009120357" comment="libsvn_auth_gnome_keyring-1-0-1.8.15-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120358" comment="libsvn_auth_kwallet-1-0-1.8.15-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120359" comment="subversion-1.8.15-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120360" comment="subversion-bash-completion-1.8.15-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120361" comment="subversion-devel-1.8.15-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120362" comment="subversion-perl-1.8.15-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120363" comment="subversion-python-1.8.15-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120364" comment="subversion-python-ctypes-1.8.15-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120365" comment="subversion-ruby-1.8.15-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120366" comment="subversion-server-1.8.15-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120367" comment="subversion-tools-1.8.15-2.23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5364</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5364" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5364" source="CVE"/>
    <description>
    The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 do not properly consider yielding a processor, which allows remote attackers to cause a denial of service (system hang) via incorrect checksums within a UDP packet flood.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113567" comment="bbswitch-0.8-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113568" comment="bbswitch-kmp-default-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113569" comment="bbswitch-kmp-desktop-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113570" comment="bbswitch-kmp-pae-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113571" comment="bbswitch-kmp-xen-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113572" comment="cloop-2.639-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113573" comment="cloop-kmp-default-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113574" comment="cloop-kmp-desktop-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113575" comment="cloop-kmp-pae-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113576" comment="cloop-kmp-xen-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113577" comment="crash-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113578" comment="crash-devel-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113579" comment="crash-doc-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113580" comment="crash-eppic-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113581" comment="crash-gcore-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113582" comment="crash-kmp-default-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113583" comment="crash-kmp-desktop-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113584" comment="crash-kmp-pae-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113585" comment="crash-kmp-xen-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113586" comment="hdjmod-1.28-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113587" comment="hdjmod-kmp-default-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113588" comment="hdjmod-kmp-desktop-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113589" comment="hdjmod-kmp-pae-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113590" comment="hdjmod-kmp-xen-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113591" comment="ipset-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113592" comment="ipset-devel-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113593" comment="ipset-kmp-default-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113594" comment="ipset-kmp-desktop-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113595" comment="ipset-kmp-pae-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113596" comment="ipset-kmp-xen-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113598" comment="kernel-debug-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113599" comment="kernel-debug-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113600" comment="kernel-debug-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113601" comment="kernel-default-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113602" comment="kernel-default-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113603" comment="kernel-default-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113604" comment="kernel-desktop-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113605" comment="kernel-desktop-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113606" comment="kernel-desktop-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113617" comment="kernel-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113607" comment="kernel-docs-3.16.7-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113608" comment="kernel-ec2-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113609" comment="kernel-ec2-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113610" comment="kernel-ec2-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113618" comment="kernel-macros-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113611" comment="kernel-obs-build-3.16.7-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113613" comment="kernel-obs-qa-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113612" comment="kernel-obs-qa-xen-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113614" comment="kernel-pae-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113615" comment="kernel-pae-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113616" comment="kernel-pae-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113619" comment="kernel-source-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113620" comment="kernel-source-vanilla-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113621" comment="kernel-syms-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113622" comment="kernel-vanilla-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113623" comment="kernel-vanilla-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113624" comment="kernel-xen-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113625" comment="kernel-xen-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113626" comment="kernel-xen-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113597" comment="libipset3-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113627" comment="pcfclock-0.44-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113628" comment="pcfclock-kmp-default-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113629" comment="pcfclock-kmp-desktop-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113630" comment="pcfclock-kmp-pae-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113631" comment="vhba-kmp-20140629-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113632" comment="vhba-kmp-default-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113633" comment="vhba-kmp-desktop-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113634" comment="vhba-kmp-pae-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113635" comment="vhba-kmp-xen-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113636" comment="xen-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113637" comment="xen-devel-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113646" comment="xen-doc-html-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113647" comment="xen-kmp-default-4.4.2_06_k3.16.7_24-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113648" comment="xen-kmp-desktop-4.4.2_06_k3.16.7_24-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113639" comment="xen-libs-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113638" comment="xen-libs-32bit-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113649" comment="xen-tools-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113640" comment="xen-tools-domU-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113641" comment="xtables-addons-2.6-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113642" comment="xtables-addons-kmp-default-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113643" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113644" comment="xtables-addons-kmp-pae-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113645" comment="xtables-addons-kmp-xen-2.6_k3.16.7_24-11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155366" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5366</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5366" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5366" source="CVE"/>
    <description>
    The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 provide inappropriate -EAGAIN return values, which allows remote attackers to cause a denial of service (EPOLLET epoll application read outage) via an incorrect checksum in a UDP packet, a different vulnerability than CVE-2015-5364.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113567" comment="bbswitch-0.8-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113568" comment="bbswitch-kmp-default-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113569" comment="bbswitch-kmp-desktop-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113570" comment="bbswitch-kmp-pae-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113571" comment="bbswitch-kmp-xen-0.8_k3.16.7_24-3.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113572" comment="cloop-2.639-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113573" comment="cloop-kmp-default-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113574" comment="cloop-kmp-desktop-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113575" comment="cloop-kmp-pae-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113576" comment="cloop-kmp-xen-2.639_k3.16.7_24-14.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113577" comment="crash-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113578" comment="crash-devel-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113579" comment="crash-doc-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113580" comment="crash-eppic-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113581" comment="crash-gcore-7.0.8-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113582" comment="crash-kmp-default-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113583" comment="crash-kmp-desktop-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113584" comment="crash-kmp-pae-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113585" comment="crash-kmp-xen-7.0.8_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113586" comment="hdjmod-1.28-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113587" comment="hdjmod-kmp-default-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113588" comment="hdjmod-kmp-desktop-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113589" comment="hdjmod-kmp-pae-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113590" comment="hdjmod-kmp-xen-1.28_k3.16.7_24-18.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113591" comment="ipset-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113592" comment="ipset-devel-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113593" comment="ipset-kmp-default-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113594" comment="ipset-kmp-desktop-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113595" comment="ipset-kmp-pae-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113596" comment="ipset-kmp-xen-6.23_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113598" comment="kernel-debug-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113599" comment="kernel-debug-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113600" comment="kernel-debug-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113601" comment="kernel-default-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113602" comment="kernel-default-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113603" comment="kernel-default-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113604" comment="kernel-desktop-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113605" comment="kernel-desktop-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113606" comment="kernel-desktop-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113617" comment="kernel-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113607" comment="kernel-docs-3.16.7-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113608" comment="kernel-ec2-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113609" comment="kernel-ec2-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113610" comment="kernel-ec2-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113618" comment="kernel-macros-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113611" comment="kernel-obs-build-3.16.7-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113613" comment="kernel-obs-qa-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113612" comment="kernel-obs-qa-xen-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113614" comment="kernel-pae-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113615" comment="kernel-pae-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113616" comment="kernel-pae-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113619" comment="kernel-source-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113620" comment="kernel-source-vanilla-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113621" comment="kernel-syms-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113622" comment="kernel-vanilla-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113623" comment="kernel-vanilla-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113624" comment="kernel-xen-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113625" comment="kernel-xen-base-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113626" comment="kernel-xen-devel-3.16.7-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113597" comment="libipset3-6.23-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113627" comment="pcfclock-0.44-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113628" comment="pcfclock-kmp-default-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113629" comment="pcfclock-kmp-desktop-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113630" comment="pcfclock-kmp-pae-0.44_k3.16.7_24-260.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113631" comment="vhba-kmp-20140629-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113632" comment="vhba-kmp-default-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113633" comment="vhba-kmp-desktop-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113634" comment="vhba-kmp-pae-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113635" comment="vhba-kmp-xen-20140629_k3.16.7_24-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113636" comment="xen-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113637" comment="xen-devel-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113646" comment="xen-doc-html-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113647" comment="xen-kmp-default-4.4.2_06_k3.16.7_24-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113648" comment="xen-kmp-desktop-4.4.2_06_k3.16.7_24-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113639" comment="xen-libs-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113638" comment="xen-libs-32bit-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113649" comment="xen-tools-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113640" comment="xen-tools-domU-4.4.2_06-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113641" comment="xtables-addons-2.6-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113642" comment="xtables-addons-kmp-default-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113643" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113644" comment="xtables-addons-kmp-pae-2.6_k3.16.7_24-11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113645" comment="xtables-addons-kmp-xen-2.6_k3.16.7_24-11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5370</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5370" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370" source="CVE"/>
    <description>
    Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not properly implement the DCE-RPC layer, which allows remote attackers to perform protocol-downgrade attacks, cause a denial of service (application crash or CPU consumption), or possibly execute arbitrary code on a client system via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126263" comment="ctdb-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126264" comment="ctdb-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126265" comment="ctdb-pcp-pmda-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126266" comment="ctdb-tests-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126267" comment="libdcerpc-atsvc-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126268" comment="libdcerpc-atsvc0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126269" comment="libdcerpc-atsvc0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126270" comment="libdcerpc-binding0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126271" comment="libdcerpc-binding0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126272" comment="libdcerpc-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126273" comment="libdcerpc-samr-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126274" comment="libdcerpc-samr0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126275" comment="libdcerpc-samr0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126276" comment="libdcerpc0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126277" comment="libdcerpc0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126278" comment="libgensec-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126279" comment="libgensec0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126280" comment="libgensec0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126281" comment="libndr-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126282" comment="libndr-krb5pac-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126283" comment="libndr-krb5pac0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126284" comment="libndr-krb5pac0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126285" comment="libndr-nbt-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126286" comment="libndr-nbt0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126287" comment="libndr-nbt0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126288" comment="libndr-standard-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126289" comment="libndr-standard0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126290" comment="libndr-standard0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126291" comment="libndr0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126292" comment="libndr0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126293" comment="libnetapi-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126294" comment="libnetapi0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126295" comment="libnetapi0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126296" comment="libregistry-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126297" comment="libregistry0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126298" comment="libregistry0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126299" comment="libsamba-credentials-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126300" comment="libsamba-credentials0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126301" comment="libsamba-credentials0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126302" comment="libsamba-hostconfig-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126303" comment="libsamba-hostconfig0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126304" comment="libsamba-hostconfig0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126305" comment="libsamba-passdb-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126306" comment="libsamba-passdb0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126307" comment="libsamba-passdb0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126308" comment="libsamba-policy-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126309" comment="libsamba-policy0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126310" comment="libsamba-policy0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126311" comment="libsamba-util-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126312" comment="libsamba-util0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126313" comment="libsamba-util0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126314" comment="libsamdb-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126315" comment="libsamdb0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126316" comment="libsamdb0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126317" comment="libsmbclient-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126318" comment="libsmbclient-raw-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126319" comment="libsmbclient-raw0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126320" comment="libsmbclient-raw0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126321" comment="libsmbclient0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126322" comment="libsmbclient0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126323" comment="libsmbconf-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126324" comment="libsmbconf0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126325" comment="libsmbconf0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126326" comment="libsmbldap-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126327" comment="libsmbldap0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126328" comment="libsmbldap0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126329" comment="libtevent-util-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126330" comment="libtevent-util0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126331" comment="libtevent-util0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126332" comment="libwbclient-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126333" comment="libwbclient0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126334" comment="libwbclient0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126335" comment="samba-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126336" comment="samba-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126337" comment="samba-client-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126338" comment="samba-client-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126339" comment="samba-core-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126340" comment="samba-doc-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126341" comment="samba-libs-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126342" comment="samba-libs-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126343" comment="samba-pidl-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126344" comment="samba-python-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126345" comment="samba-test-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126346" comment="samba-test-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126347" comment="samba-winbind-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126348" comment="samba-winbind-32bit-4.2.4-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5470</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5470" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5470" source="CVE"/>
    <description>
    The label decompression functionality in PowerDNS Recursor before 3.6.4 and 3.7.x before 3.7.3 and Authoritative (Auth) Server before 3.3.3 and 3.4.x before 3.4.5 allows remote attackers to cause a denial of service (CPU consumption or crash) via a request with a long name that refers to itself.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1868.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111302" comment="pdns-3.3.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111303" comment="pdns-backend-ldap-3.3.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111304" comment="pdns-backend-lua-3.3.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111305" comment="pdns-backend-mydns-3.3.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111306" comment="pdns-backend-mysql-3.3.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111307" comment="pdns-backend-postgresql-3.3.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111308" comment="pdns-backend-sqlite3-3.3.1-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111286" comment="pdns-recursor-3.6.2-8.7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5477</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5477" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5477" source="CVE"/>
    <description>
    named in ISC BIND 9.x before 9.9.7-P2 and 9.10.x before 9.10.2-P3 allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via TKEY queries.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113233" comment="bind-9.9.6P1-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113234" comment="bind-chrootenv-9.9.6P1-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113235" comment="bind-devel-9.9.6P1-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113236" comment="bind-doc-9.9.6P1-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113238" comment="bind-libs-9.9.6P1-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113237" comment="bind-libs-32bit-9.9.6P1-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113239" comment="bind-lwresd-9.9.6P1-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113240" comment="bind-utils-9.9.6P1-2.7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5539</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5539" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5539" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5130, CVE-2015-5134, CVE-2015-5540, CVE-2015-5550, CVE-2015-5551, CVE-2015-5556, CVE-2015-5557, CVE-2015-5559, CVE-2015-5561, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117730" comment="flash-player-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117731" comment="flash-player-gnome-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117732" comment="flash-player-kde4-11.2.202.508-2.67.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5540</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5540" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5540" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5130, CVE-2015-5134, CVE-2015-5539, CVE-2015-5550, CVE-2015-5551, CVE-2015-5556, CVE-2015-5557, CVE-2015-5559, CVE-2015-5561, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117730" comment="flash-player-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117731" comment="flash-player-gnome-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117732" comment="flash-player-kde4-11.2.202.508-2.67.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5541</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5541" source="CVE"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5129.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117730" comment="flash-player-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117731" comment="flash-player-gnome-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117732" comment="flash-player-kde4-11.2.202.508-2.67.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5544</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5544" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5544" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5545, CVE-2015-5546, CVE-2015-5547, CVE-2015-5548, CVE-2015-5549, CVE-2015-5552, and CVE-2015-5553.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117730" comment="flash-player-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117731" comment="flash-player-gnome-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117732" comment="flash-player-kde4-11.2.202.508-2.67.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5545</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5545" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5545" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5544, CVE-2015-5546, CVE-2015-5547, CVE-2015-5548, CVE-2015-5549, CVE-2015-5552, and CVE-2015-5553.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117730" comment="flash-player-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117731" comment="flash-player-gnome-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117732" comment="flash-player-kde4-11.2.202.508-2.67.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5546</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5546" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5546" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5544, CVE-2015-5545, CVE-2015-5547, CVE-2015-5548, CVE-2015-5549, CVE-2015-5552, and CVE-2015-5553.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117730" comment="flash-player-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117731" comment="flash-player-gnome-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117732" comment="flash-player-kde4-11.2.202.508-2.67.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5547</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5547" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5544, CVE-2015-5545, CVE-2015-5546, CVE-2015-5548, CVE-2015-5549, CVE-2015-5552, and CVE-2015-5553.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117730" comment="flash-player-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117731" comment="flash-player-gnome-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117732" comment="flash-player-kde4-11.2.202.508-2.67.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5548</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5548" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5548" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5544, CVE-2015-5545, CVE-2015-5546, CVE-2015-5547, CVE-2015-5549, CVE-2015-5552, and CVE-2015-5553.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117730" comment="flash-player-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117731" comment="flash-player-gnome-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117732" comment="flash-player-kde4-11.2.202.508-2.67.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5549</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5549" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5549" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5544, CVE-2015-5545, CVE-2015-5546, CVE-2015-5547, CVE-2015-5548, CVE-2015-5552, and CVE-2015-5553.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117730" comment="flash-player-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117731" comment="flash-player-gnome-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117732" comment="flash-player-kde4-11.2.202.508-2.67.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5550</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5550" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5550" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5130, CVE-2015-5134, CVE-2015-5539, CVE-2015-5540, CVE-2015-5551, CVE-2015-5556, CVE-2015-5557, CVE-2015-5559, CVE-2015-5561, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117730" comment="flash-player-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117731" comment="flash-player-gnome-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117732" comment="flash-player-kde4-11.2.202.508-2.67.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5551</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5551" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5551" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5130, CVE-2015-5134, CVE-2015-5539, CVE-2015-5540, CVE-2015-5550, CVE-2015-5556, CVE-2015-5557, CVE-2015-5559, CVE-2015-5561, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117730" comment="flash-player-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117731" comment="flash-player-gnome-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117732" comment="flash-player-kde4-11.2.202.508-2.67.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5552</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5552" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5552" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5544, CVE-2015-5545, CVE-2015-5546, CVE-2015-5547, CVE-2015-5548, CVE-2015-5549, and CVE-2015-5553.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117730" comment="flash-player-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117731" comment="flash-player-gnome-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117732" comment="flash-player-kde4-11.2.202.508-2.67.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5553</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5553" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5553" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5544, CVE-2015-5545, CVE-2015-5546, CVE-2015-5547, CVE-2015-5548, CVE-2015-5549, and CVE-2015-5552.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117730" comment="flash-player-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117731" comment="flash-player-gnome-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117732" comment="flash-player-kde4-11.2.202.508-2.67.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5554</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5554" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5554" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-5555, CVE-2015-5558, and CVE-2015-5562.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117730" comment="flash-player-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117731" comment="flash-player-gnome-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117732" comment="flash-player-kde4-11.2.202.508-2.67.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5555</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5555" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-5554, CVE-2015-5558, and CVE-2015-5562.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117730" comment="flash-player-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117731" comment="flash-player-gnome-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117732" comment="flash-player-kde4-11.2.202.508-2.67.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5556</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5556" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5556" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5130, CVE-2015-5134, CVE-2015-5539, CVE-2015-5540, CVE-2015-5550, CVE-2015-5551, CVE-2015-5557, CVE-2015-5559, CVE-2015-5561, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117730" comment="flash-player-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117731" comment="flash-player-gnome-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117732" comment="flash-player-kde4-11.2.202.508-2.67.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5557</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5557" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5557" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5130, CVE-2015-5134, CVE-2015-5539, CVE-2015-5540, CVE-2015-5550, CVE-2015-5551, CVE-2015-5556, CVE-2015-5559, CVE-2015-5561, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117730" comment="flash-player-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117731" comment="flash-player-gnome-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117732" comment="flash-player-kde4-11.2.202.508-2.67.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5558</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5558" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5558" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-5554, CVE-2015-5555, and CVE-2015-5562.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117730" comment="flash-player-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117731" comment="flash-player-gnome-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117732" comment="flash-player-kde4-11.2.202.508-2.67.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5559</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5559" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5559" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5130, CVE-2015-5134, CVE-2015-5539, CVE-2015-5540, CVE-2015-5550, CVE-2015-5551, CVE-2015-5556, CVE-2015-5557, CVE-2015-5561, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117730" comment="flash-player-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117731" comment="flash-player-gnome-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117732" comment="flash-player-kde4-11.2.202.508-2.67.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5560</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5560" source="CVE"/>
    <description>
    Integer overflow in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117730" comment="flash-player-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117731" comment="flash-player-gnome-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117732" comment="flash-player-kde4-11.2.202.508-2.67.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5561</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5561" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5561" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5130, CVE-2015-5134, CVE-2015-5539, CVE-2015-5540, CVE-2015-5550, CVE-2015-5551, CVE-2015-5556, CVE-2015-5557, CVE-2015-5559, CVE-2015-5563, CVE-2015-5564, and CVE-2015-5565.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117730" comment="flash-player-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117731" comment="flash-player-gnome-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117732" comment="flash-player-kde4-11.2.202.508-2.67.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5562</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5562" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5562" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2015-5554, CVE-2015-5555, and CVE-2015-5558.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117730" comment="flash-player-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117731" comment="flash-player-gnome-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117732" comment="flash-player-kde4-11.2.202.508-2.67.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5563</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5563" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.232 on Windows and OS X and before 11.2.202.508 on Linux, Adobe AIR before 18.0.0.199, Adobe AIR SDK before 18.0.0.199, and Adobe AIR SDK &amp; Compiler before 18.0.0.199 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5127, CVE-2015-5130, CVE-2015-5134, CVE-2015-5539, CVE-2015-5540, CVE-2015-5550, CVE-2015-5551, CVE-2015-5556, CVE-2015-5557, CVE-2015-5559, CVE-2015-5561, CVE-2015-5564, and CVE-2015-5565.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117730" comment="flash-player-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117731" comment="flash-player-gnome-11.2.202.508-2.67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117732" comment="flash-player-kde4-11.2.202.508-2.67.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5567</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5567" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5567" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allow attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5579.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117601" comment="flash-player-11.2.202.521-2.70.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117602" comment="flash-player-gnome-11.2.202.521-2.70.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117603" comment="flash-player-kde4-11.2.202.521-2.70.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5568</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5568" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5568" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allow attackers to cause a denial of service (vector-length corruption) or possibly have unspecified other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117601" comment="flash-player-11.2.202.521-2.70.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117602" comment="flash-player-gnome-11.2.202.521-2.70.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117603" comment="flash-player-kde4-11.2.202.521-2.70.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5569</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5569" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5569" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK &amp; Compiler before 19.0.0.213 improperly implement the Flash broker API, which has unspecified impact and attack vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117604" comment="flash-player-11.2.202.535-2.73.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117605" comment="flash-player-gnome-11.2.202.535-2.73.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117606" comment="flash-player-kde4-11.2.202.535-2.73.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5570</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5570" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5570" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5574, CVE-2015-5581, CVE-2015-5584, and CVE-2015-6682.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117601" comment="flash-player-11.2.202.521-2.70.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117602" comment="flash-player-gnome-11.2.202.521-2.70.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117603" comment="flash-player-kde4-11.2.202.521-2.70.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5571</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5571" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 do not properly restrict the SWF file format, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks against JSONP endpoints, and obtain sensitive information, via a crafted OBJECT element with SWF content satisfying the character-set requirements of a callback API.  NOTE: this issue exists because of an incomplete fix for CVE-2014-4671 and CVE-2014-5333.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117601" comment="flash-player-11.2.202.521-2.70.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117602" comment="flash-player-gnome-11.2.202.521-2.70.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117603" comment="flash-player-kde4-11.2.202.521-2.70.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5572</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5572" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5572" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allow attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117601" comment="flash-player-11.2.202.521-2.70.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117602" comment="flash-player-gnome-11.2.202.521-2.70.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117603" comment="flash-player-kde4-11.2.202.521-2.70.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5573</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5573" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5573" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117601" comment="flash-player-11.2.202.521-2.70.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117602" comment="flash-player-gnome-11.2.202.521-2.70.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117603" comment="flash-player-kde4-11.2.202.521-2.70.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5574</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5574" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5574" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5570, CVE-2015-5581, CVE-2015-5584, and CVE-2015-6682.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117601" comment="flash-player-11.2.202.521-2.70.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117602" comment="flash-player-gnome-11.2.202.521-2.70.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117603" comment="flash-player-kde4-11.2.202.521-2.70.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5575</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5575" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5575" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5577, CVE-2015-5578, CVE-2015-5580, CVE-2015-5582, CVE-2015-5588, and CVE-2015-6677.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117601" comment="flash-player-11.2.202.521-2.70.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117602" comment="flash-player-gnome-11.2.202.521-2.70.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117603" comment="flash-player-kde4-11.2.202.521-2.70.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5576</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5576" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5576" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 do not properly restrict discovery of memory addresses, which allows attackers to bypass the ASLR protection mechanism via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117601" comment="flash-player-11.2.202.521-2.70.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117602" comment="flash-player-gnome-11.2.202.521-2.70.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117603" comment="flash-player-kde4-11.2.202.521-2.70.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5577</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5577" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5577" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5575, CVE-2015-5578, CVE-2015-5580, CVE-2015-5582, CVE-2015-5588, and CVE-2015-6677.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117601" comment="flash-player-11.2.202.521-2.70.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117602" comment="flash-player-gnome-11.2.202.521-2.70.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117603" comment="flash-player-kde4-11.2.202.521-2.70.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5578</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5578" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5578" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5575, CVE-2015-5577, CVE-2015-5580, CVE-2015-5582, CVE-2015-5588, and CVE-2015-6677.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117601" comment="flash-player-11.2.202.521-2.70.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117602" comment="flash-player-gnome-11.2.202.521-2.70.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117603" comment="flash-player-kde4-11.2.202.521-2.70.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5579</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5579" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5579" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allow attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5567.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117601" comment="flash-player-11.2.202.521-2.70.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117602" comment="flash-player-gnome-11.2.202.521-2.70.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117603" comment="flash-player-kde4-11.2.202.521-2.70.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5580</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5580" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5580" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5575, CVE-2015-5577, CVE-2015-5578, CVE-2015-5582, CVE-2015-5588, and CVE-2015-6677.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117601" comment="flash-player-11.2.202.521-2.70.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117602" comment="flash-player-gnome-11.2.202.521-2.70.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117603" comment="flash-player-kde4-11.2.202.521-2.70.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5581</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5581" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5581" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5570, CVE-2015-5574, CVE-2015-5584, and CVE-2015-6682.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117601" comment="flash-player-11.2.202.521-2.70.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117602" comment="flash-player-gnome-11.2.202.521-2.70.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117603" comment="flash-player-kde4-11.2.202.521-2.70.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5582</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5582" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5582" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5575, CVE-2015-5577, CVE-2015-5578, CVE-2015-5580, CVE-2015-5588, and CVE-2015-6677.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117601" comment="flash-player-11.2.202.521-2.70.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117602" comment="flash-player-gnome-11.2.202.521-2.70.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117603" comment="flash-player-kde4-11.2.202.521-2.70.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5584</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5584" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5584" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5570, CVE-2015-5574, CVE-2015-5581, and CVE-2015-6682.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117601" comment="flash-player-11.2.202.521-2.70.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117602" comment="flash-player-gnome-11.2.202.521-2.70.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117603" comment="flash-player-kde4-11.2.202.521-2.70.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5587</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5587" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5587" source="CVE"/>
    <description>
    Stack-based buffer overflow in Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117601" comment="flash-player-11.2.202.521-2.70.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117602" comment="flash-player-gnome-11.2.202.521-2.70.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117603" comment="flash-player-kde4-11.2.202.521-2.70.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5588</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-5588" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5588" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5575, CVE-2015-5577, CVE-2015-5578, CVE-2015-5580, CVE-2015-5582, and CVE-2015-6677.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117601" comment="flash-player-11.2.202.521-2.70.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117602" comment="flash-player-gnome-11.2.202.521-2.70.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117603" comment="flash-player-kde4-11.2.202.521-2.70.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5589</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5589" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5589" source="CVE"/>
    <description>
    The phar_convert_to_other function in ext/phar/phar_object.c in PHP before 5.4.43, 5.5.x before 5.5.27, and 5.6.x before 5.6.11 does not validate a file pointer before a close operation, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted TAR archive that is mishandled in a Phar::convertToData call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113357" comment="apache2-mod_php5-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113358" comment="php5-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113359" comment="php5-bcmath-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113360" comment="php5-bz2-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113361" comment="php5-calendar-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113362" comment="php5-ctype-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113363" comment="php5-curl-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113364" comment="php5-dba-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113365" comment="php5-devel-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113366" comment="php5-dom-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113367" comment="php5-enchant-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113368" comment="php5-exif-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113369" comment="php5-fastcgi-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113370" comment="php5-fileinfo-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113371" comment="php5-firebird-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113372" comment="php5-fpm-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113373" comment="php5-ftp-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113374" comment="php5-gd-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113375" comment="php5-gettext-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113376" comment="php5-gmp-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113377" comment="php5-iconv-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113378" comment="php5-imap-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113379" comment="php5-intl-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113380" comment="php5-json-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113381" comment="php5-ldap-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113382" comment="php5-mbstring-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113383" comment="php5-mcrypt-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113384" comment="php5-mssql-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113385" comment="php5-mysql-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113386" comment="php5-odbc-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113387" comment="php5-opcache-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113388" comment="php5-openssl-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113389" comment="php5-pcntl-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113390" comment="php5-pdo-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113391" comment="php5-pear-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113392" comment="php5-pgsql-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113393" comment="php5-phar-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113394" comment="php5-posix-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113395" comment="php5-pspell-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113396" comment="php5-readline-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113397" comment="php5-shmop-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113398" comment="php5-snmp-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113399" comment="php5-soap-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113400" comment="php5-sockets-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113401" comment="php5-sqlite-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113402" comment="php5-suhosin-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113403" comment="php5-sysvmsg-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113404" comment="php5-sysvsem-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113405" comment="php5-sysvshm-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113406" comment="php5-tidy-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113407" comment="php5-tokenizer-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113408" comment="php5-wddx-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113409" comment="php5-xmlreader-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113410" comment="php5-xmlrpc-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113411" comment="php5-xmlwriter-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113412" comment="php5-xsl-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113413" comment="php5-zip-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113414" comment="php5-zlib-5.6.1-33.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5590</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5590" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5590" source="CVE"/>
    <description>
    Stack-based buffer overflow in the phar_fix_filepath function in ext/phar/phar.c in PHP before 5.4.43, 5.5.x before 5.5.27, and 5.6.x before 5.6.11 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large length value, as demonstrated by mishandling of an e-mail attachment by the imap PHP extension.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009113357" comment="apache2-mod_php5-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113358" comment="php5-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113359" comment="php5-bcmath-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113360" comment="php5-bz2-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113361" comment="php5-calendar-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113362" comment="php5-ctype-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113363" comment="php5-curl-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113364" comment="php5-dba-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113365" comment="php5-devel-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113366" comment="php5-dom-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113367" comment="php5-enchant-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113368" comment="php5-exif-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113369" comment="php5-fastcgi-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113370" comment="php5-fileinfo-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113371" comment="php5-firebird-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113372" comment="php5-fpm-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113373" comment="php5-ftp-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113374" comment="php5-gd-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113375" comment="php5-gettext-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113376" comment="php5-gmp-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113377" comment="php5-iconv-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113378" comment="php5-imap-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113379" comment="php5-intl-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113380" comment="php5-json-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113381" comment="php5-ldap-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113382" comment="php5-mbstring-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113383" comment="php5-mcrypt-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113384" comment="php5-mssql-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113385" comment="php5-mysql-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113386" comment="php5-odbc-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113387" comment="php5-opcache-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113388" comment="php5-openssl-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113389" comment="php5-pcntl-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113390" comment="php5-pdo-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113391" comment="php5-pear-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113392" comment="php5-pgsql-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113393" comment="php5-phar-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113394" comment="php5-posix-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113395" comment="php5-pspell-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113396" comment="php5-readline-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113397" comment="php5-shmop-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113398" comment="php5-snmp-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113399" comment="php5-soap-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113400" comment="php5-sockets-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113401" comment="php5-sqlite-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113402" comment="php5-suhosin-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113403" comment="php5-sysvmsg-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113404" comment="php5-sysvsem-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113405" comment="php5-sysvshm-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113406" comment="php5-tidy-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113407" comment="php5-tokenizer-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113408" comment="php5-wddx-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113409" comment="php5-xmlreader-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113410" comment="php5-xmlrpc-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113411" comment="php5-xmlwriter-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113412" comment="php5-xsl-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113413" comment="php5-zip-5.6.1-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009113414" comment="php5-zlib-5.6.1-33.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5605</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5605" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5605" source="CVE"/>
    <description>
    The regular-expression implementation in Google V8, as used in Google Chrome before 44.0.2403.89, mishandles interrupts, which allows remote attackers to cause a denial of service (application crash) via crafted JavaScript code, as demonstrated by an error in garbage collection during allocation of a stack-overflow exception message.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009111340" comment="chromedriver-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111341" comment="chromium-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111342" comment="chromium-desktop-gnome-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111343" comment="chromium-desktop-kde-44.0.2403.89-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009111344" comment="chromium-ffmpegsumo-44.0.2403.89-38.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5621</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5621" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5621" source="CVE"/>
    <description>
    The snmp_pdu_parse function in snmp_api.c in net-snmp 5.7.2 and earlier does not remove the varBind variable in a netsnmp_variable_list item when parsing of the SNMP PDU fails, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114213" comment="libsnmp30-5.7.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114212" comment="libsnmp30-32bit-5.7.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114214" comment="net-snmp-5.7.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114216" comment="net-snmp-devel-5.7.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114215" comment="net-snmp-devel-32bit-5.7.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114217" comment="net-snmp-python-5.7.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114218" comment="perl-SNMP-5.7.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114219" comment="snmp-mibs-5.7.3-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5707</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5707" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5707" source="CVE"/>
    <description>
    Integer overflow in the sg_start_req function in drivers/scsi/sg.c in the Linux kernel 2.6.x through 4.x before 4.1 allows local users to cause a denial of service or possibly have unspecified other impact via a large iov_count value in a write request.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115288" comment="bbswitch-0.8-3.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115289" comment="bbswitch-kmp-default-0.8_k3.16.7_29-3.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115290" comment="bbswitch-kmp-desktop-0.8_k3.16.7_29-3.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115291" comment="bbswitch-kmp-pae-0.8_k3.16.7_29-3.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115292" comment="bbswitch-kmp-xen-0.8_k3.16.7_29-3.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115293" comment="cloop-2.639-14.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115294" comment="cloop-kmp-default-2.639_k3.16.7_29-14.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115295" comment="cloop-kmp-desktop-2.639_k3.16.7_29-14.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115296" comment="cloop-kmp-pae-2.639_k3.16.7_29-14.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115297" comment="cloop-kmp-xen-2.639_k3.16.7_29-14.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115298" comment="crash-7.0.8-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115299" comment="crash-devel-7.0.8-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115300" comment="crash-doc-7.0.8-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115301" comment="crash-eppic-7.0.8-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115302" comment="crash-gcore-7.0.8-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115303" comment="crash-kmp-default-7.0.8_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115304" comment="crash-kmp-desktop-7.0.8_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115305" comment="crash-kmp-pae-7.0.8_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115306" comment="crash-kmp-xen-7.0.8_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115307" comment="hdjmod-1.28-18.14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115308" comment="hdjmod-kmp-default-1.28_k3.16.7_29-18.14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115309" comment="hdjmod-kmp-desktop-1.28_k3.16.7_29-18.14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115310" comment="hdjmod-kmp-pae-1.28_k3.16.7_29-18.14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115311" comment="hdjmod-kmp-xen-1.28_k3.16.7_29-18.14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115312" comment="ipset-6.23-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115313" comment="ipset-devel-6.23-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115314" comment="ipset-kmp-default-6.23_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115315" comment="ipset-kmp-desktop-6.23_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115316" comment="ipset-kmp-pae-6.23_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115317" comment="ipset-kmp-xen-6.23_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115319" comment="kernel-debug-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115320" comment="kernel-debug-base-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115321" comment="kernel-debug-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115322" comment="kernel-default-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115323" comment="kernel-default-base-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115324" comment="kernel-default-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115325" comment="kernel-desktop-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115326" comment="kernel-desktop-base-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115327" comment="kernel-desktop-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115338" comment="kernel-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115328" comment="kernel-docs-3.16.7-29.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115329" comment="kernel-ec2-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115330" comment="kernel-ec2-base-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115331" comment="kernel-ec2-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115339" comment="kernel-macros-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115332" comment="kernel-obs-build-3.16.7-29.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115334" comment="kernel-obs-qa-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115333" comment="kernel-obs-qa-xen-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115335" comment="kernel-pae-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115336" comment="kernel-pae-base-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115337" comment="kernel-pae-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115340" comment="kernel-source-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115341" comment="kernel-source-vanilla-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115342" comment="kernel-syms-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115343" comment="kernel-vanilla-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115344" comment="kernel-vanilla-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115345" comment="kernel-xen-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115346" comment="kernel-xen-base-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115347" comment="kernel-xen-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115318" comment="libipset3-6.23-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115348" comment="pcfclock-0.44-260.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115349" comment="pcfclock-kmp-default-0.44_k3.16.7_29-260.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115350" comment="pcfclock-kmp-desktop-0.44_k3.16.7_29-260.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115351" comment="pcfclock-kmp-pae-0.44_k3.16.7_29-260.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115352" comment="vhba-kmp-20140629-2.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115353" comment="vhba-kmp-default-20140629_k3.16.7_29-2.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115354" comment="vhba-kmp-desktop-20140629_k3.16.7_29-2.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115355" comment="vhba-kmp-pae-20140629_k3.16.7_29-2.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115356" comment="vhba-kmp-xen-20140629_k3.16.7_29-2.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115357" comment="xen-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115358" comment="xen-devel-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115367" comment="xen-doc-html-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115368" comment="xen-kmp-default-4.4.2_06_k3.16.7_29-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115369" comment="xen-kmp-desktop-4.4.2_06_k3.16.7_29-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115360" comment="xen-libs-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115359" comment="xen-libs-32bit-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115370" comment="xen-tools-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115361" comment="xen-tools-domU-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115362" comment="xtables-addons-2.6-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115363" comment="xtables-addons-kmp-default-2.6_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115364" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115365" comment="xtables-addons-kmp-pae-2.6_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115366" comment="xtables-addons-kmp-xen-2.6_k3.16.7_29-13.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5722</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5722" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5722" source="CVE"/>
    <description>
    buffer.c in named in ISC BIND 9.x before 9.9.7-P3 and 9.10.x before 9.10.2-P4 allows remote attackers to cause a denial of service (assertion failure and daemon exit) by creating a zone containing a malformed DNSSEC key and issuing a query for a name in that zone.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114411" comment="bind-9.9.6P1-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114412" comment="bind-chrootenv-9.9.6P1-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114413" comment="bind-devel-9.9.6P1-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114414" comment="bind-doc-9.9.6P1-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114416" comment="bind-libs-9.9.6P1-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114415" comment="bind-libs-32bit-9.9.6P1-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114417" comment="bind-lwresd-9.9.6P1-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114418" comment="bind-utils-9.9.6P1-2.10.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5739</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5739" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5739" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130690" comment="go-1.4.3-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130691" comment="go-doc-1.4.3-15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5740</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5740" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5740" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130690" comment="go-1.4.3-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130691" comment="go-doc-1.4.3-15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5741</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5741" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5741" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130690" comment="go-1.4.3-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130691" comment="go-doc-1.4.3-15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5788</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5788" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5788" source="CVE"/>
    <description>
    The WebKit Canvas implementation in Apple iOS before 9 allows remote attackers to bypass the Same Origin Policy and obtain sensitive image information via vectors involving a CANVAS element.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125580" comment="libjavascriptcoregtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125581" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125582" comment="libjavascriptcoregtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125583" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125584" comment="libwebkitgtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125585" comment="libwebkitgtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125586" comment="libwebkitgtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125587" comment="libwebkitgtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125588" comment="libwebkitgtk-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125589" comment="libwebkitgtk2-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125590" comment="libwebkitgtk3-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125591" comment="libwebkitgtk3-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125592" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125593" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125594" comment="typelib-1_0-WebKit-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125595" comment="typelib-1_0-WebKit-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125596" comment="webkit-jsc-1-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125597" comment="webkit-jsc-3-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125598" comment="webkitgtk-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125599" comment="webkitgtk3-2.4.10-13.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5794</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5794" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5794" source="CVE"/>
    <description>
    WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125580" comment="libjavascriptcoregtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125581" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125582" comment="libjavascriptcoregtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125583" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125584" comment="libwebkitgtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125585" comment="libwebkitgtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125586" comment="libwebkitgtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125587" comment="libwebkitgtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125588" comment="libwebkitgtk-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125589" comment="libwebkitgtk2-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125590" comment="libwebkitgtk3-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125591" comment="libwebkitgtk3-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125592" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125593" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125594" comment="typelib-1_0-WebKit-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125595" comment="typelib-1_0-WebKit-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125596" comment="webkit-jsc-1-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125597" comment="webkit-jsc-3-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125598" comment="webkitgtk-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125599" comment="webkitgtk3-2.4.10-13.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5801</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5801" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5801" source="CVE"/>
    <description>
    WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125580" comment="libjavascriptcoregtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125581" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125582" comment="libjavascriptcoregtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125583" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125584" comment="libwebkitgtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125585" comment="libwebkitgtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125586" comment="libwebkitgtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125587" comment="libwebkitgtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125588" comment="libwebkitgtk-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125589" comment="libwebkitgtk2-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125590" comment="libwebkitgtk3-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125591" comment="libwebkitgtk3-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125592" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125593" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125594" comment="typelib-1_0-WebKit-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125595" comment="typelib-1_0-WebKit-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125596" comment="webkit-jsc-1-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125597" comment="webkit-jsc-3-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125598" comment="webkitgtk-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125599" comment="webkitgtk3-2.4.10-13.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5809</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5809" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5809" source="CVE"/>
    <description>
    WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125580" comment="libjavascriptcoregtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125581" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125582" comment="libjavascriptcoregtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125583" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125584" comment="libwebkitgtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125585" comment="libwebkitgtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125586" comment="libwebkitgtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125587" comment="libwebkitgtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125588" comment="libwebkitgtk-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125589" comment="libwebkitgtk2-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125590" comment="libwebkitgtk3-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125591" comment="libwebkitgtk3-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125592" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125593" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125594" comment="typelib-1_0-WebKit-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125595" comment="typelib-1_0-WebKit-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125596" comment="webkit-jsc-1-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125597" comment="webkit-jsc-3-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125598" comment="webkitgtk-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125599" comment="webkitgtk3-2.4.10-13.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5822</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5822" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5822" source="CVE"/>
    <description>
    WebKit, as used in JavaScriptCore in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125580" comment="libjavascriptcoregtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125581" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125582" comment="libjavascriptcoregtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125583" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125584" comment="libwebkitgtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125585" comment="libwebkitgtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125586" comment="libwebkitgtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125587" comment="libwebkitgtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125588" comment="libwebkitgtk-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125589" comment="libwebkitgtk2-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125590" comment="libwebkitgtk3-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125591" comment="libwebkitgtk3-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125592" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125593" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125594" comment="typelib-1_0-WebKit-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125595" comment="typelib-1_0-WebKit-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125596" comment="webkit-jsc-1-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125597" comment="webkit-jsc-3-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125598" comment="webkitgtk-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125599" comment="webkitgtk3-2.4.10-13.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5928</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5928" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5928" source="CVE"/>
    <description>
    WebKit, as used in Apple iOS before 9.1, Safari before 9.0.1, and iTunes before 12.3.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-10-21-1, APPLE-SA-2015-10-21-3, and APPLE-SA-2015-10-21-5.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125580" comment="libjavascriptcoregtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125581" comment="libjavascriptcoregtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125582" comment="libjavascriptcoregtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125583" comment="libjavascriptcoregtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125584" comment="libwebkitgtk-1_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125585" comment="libwebkitgtk-1_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125586" comment="libwebkitgtk-3_0-0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125587" comment="libwebkitgtk-3_0-0-32bit-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125588" comment="libwebkitgtk-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125589" comment="libwebkitgtk2-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125590" comment="libwebkitgtk3-devel-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125591" comment="libwebkitgtk3-lang-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125592" comment="typelib-1_0-JavaScriptCore-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125593" comment="typelib-1_0-JavaScriptCore-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125594" comment="typelib-1_0-WebKit-1_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125595" comment="typelib-1_0-WebKit-3_0-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125596" comment="webkit-jsc-1-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125597" comment="webkit-jsc-3-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125598" comment="webkitgtk-2.4.10-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125599" comment="webkitgtk3-2.4.10-13.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5957</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5957" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5957" source="CVE"/>
    <description>
    Buffer overflow in the DumpSysVar function in var.c in Remind before 3.1.15 allows attackers to have unspecified impact via a long name.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114369" comment="remind-3.1.13-4.3.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5963</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5963" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5963" source="CVE"/>
    <description>
    contrib.sessions.middleware.SessionMiddleware in Django 1.8.x before 1.8.4, 1.7.x before 1.7.10, 1.4.x before 1.4.22, and possibly other versions allows remote attackers to cause a denial of service (session store consumption or session record removal) via a large number of requests to contrib.auth.views.logout, which triggers the creation of an empty session record.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114370" comment="python-Django-1.6.11-3.7.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5969</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-5969" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5969" source="CVE"/>
    <description>
    The mysql-systemd-helper script in the mysql-community-server package before 5.6.28-2.17.1 in openSUSE 13.2 and before 5.6.28-13.1 in openSUSE Leap 42.1 and the mariadb package before 10.0.22-2.21.2 in openSUSE 13.2 and before 10.0.22-3.1 in SUSE Linux Enterprise (SLE) 12.1 and openSUSE Leap 42.1 allows local users to discover database credentials by listing a process and its arguments.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122915" comment="libmysql56client18-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122916" comment="libmysql56client18-32bit-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122917" comment="libmysql56client_r18-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122918" comment="libmysql56client_r18-32bit-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123151" comment="libmysqlclient-devel-10.0.22-2.21.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123152" comment="libmysqlclient18-10.0.22-2.21.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123153" comment="libmysqlclient18-32bit-10.0.22-2.21.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123154" comment="libmysqlclient_r18-10.0.22-2.21.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123155" comment="libmysqlclient_r18-32bit-10.0.22-2.21.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123156" comment="libmysqld-devel-10.0.22-2.21.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123157" comment="libmysqld18-10.0.22-2.21.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123158" comment="mariadb-10.0.22-2.21.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123159" comment="mariadb-bench-10.0.22-2.21.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123160" comment="mariadb-client-10.0.22-2.21.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123161" comment="mariadb-errormessages-10.0.22-2.21.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123162" comment="mariadb-test-10.0.22-2.21.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123163" comment="mariadb-tools-10.0.22-2.21.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122919" comment="mysql-community-server-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122920" comment="mysql-community-server-bench-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122921" comment="mysql-community-server-client-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122922" comment="mysql-community-server-errormessages-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122923" comment="mysql-community-server-test-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122924" comment="mysql-community-server-tools-5.6.28-2.17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6031</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6031" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6031" source="CVE"/>
    <description>
    Buffer overflow in the IGDstartelt function in igd_desc_parse.c in the MiniUPnP client (aka MiniUPnPc) before 1.9.20150917 allows remote UPNP servers to cause a denial of service (application crash) and possibly execute arbitrary code via an "oversized" XML element name.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118066" comment="libminiupnpc-devel-1.9-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118067" comment="libminiupnpc10-1.9-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118068" comment="miniupnpc-1.9-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118069" comment="python-miniupnpc-1.9-2.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6241</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6241" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6241" source="CVE"/>
    <description>
    The proto_tree_add_bytes_item function in epan/proto.c in the protocol-tree implementation in Wireshark 1.12.x before 1.12.7 does not properly terminate a data structure after a failure to locate a number within a string, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115283" comment="wireshark-1.12.8-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115284" comment="wireshark-devel-1.12.8-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115285" comment="wireshark-ui-gtk-1.12.8-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115286" comment="wireshark-ui-qt-1.12.8-25.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6242</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6242" source="CVE"/>
    <description>
    The wmem_block_split_free_chunk function in epan/wmem/wmem_allocator_block.c in the wmem block allocator in the memory manager in Wireshark 1.12.x before 1.12.7 does not properly consider a certain case of multiple realloc operations that restore a memory chunk to its original size, which allows remote attackers to cause a denial of service (incorrect free operation and application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115283" comment="wireshark-1.12.8-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115284" comment="wireshark-devel-1.12.8-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115285" comment="wireshark-ui-gtk-1.12.8-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115286" comment="wireshark-ui-qt-1.12.8-25.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6243</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6243" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6243" source="CVE"/>
    <description>
    The dissector-table implementation in epan/packet.c in Wireshark 1.12.x before 1.12.7 mishandles table searches for empty strings, which allows remote attackers to cause a denial of service (application crash) via a crafted packet, related to the (1) dissector_get_string_handle and (2) dissector_get_default_string_handle functions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115283" comment="wireshark-1.12.8-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115284" comment="wireshark-devel-1.12.8-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115285" comment="wireshark-ui-gtk-1.12.8-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115286" comment="wireshark-ui-qt-1.12.8-25.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6244</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6244" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6244" source="CVE"/>
    <description>
    The dissect_zbee_secure function in epan/dissectors/packet-zbee-security.c in the ZigBee dissector in Wireshark 1.12.x before 1.12.7 improperly relies on length fields contained in packet data, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115283" comment="wireshark-1.12.8-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115284" comment="wireshark-devel-1.12.8-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115285" comment="wireshark-ui-gtk-1.12.8-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115286" comment="wireshark-ui-qt-1.12.8-25.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6245</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6245" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6245" source="CVE"/>
    <description>
    epan/dissectors/packet-gsm_rlcmac.c in the GSM RLC/MAC dissector in Wireshark 1.12.x before 1.12.7 uses incorrect integer data types, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115283" comment="wireshark-1.12.8-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115284" comment="wireshark-devel-1.12.8-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115285" comment="wireshark-ui-gtk-1.12.8-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115286" comment="wireshark-ui-qt-1.12.8-25.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6246</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6246" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6246" source="CVE"/>
    <description>
    The dissect_wa_payload function in epan/dissectors/packet-waveagent.c in the WaveAgent dissector in Wireshark 1.12.x before 1.12.7 mishandles large tag values, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115283" comment="wireshark-1.12.8-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115284" comment="wireshark-devel-1.12.8-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115285" comment="wireshark-ui-gtk-1.12.8-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115286" comment="wireshark-ui-qt-1.12.8-25.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6247</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6247" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6247" source="CVE"/>
    <description>
    The dissect_openflow_tablemod_v5 function in epan/dissectors/packet-openflow_v5.c in the OpenFlow dissector in Wireshark 1.12.x before 1.12.7 does not validate a certain offset value, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115283" comment="wireshark-1.12.8-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115284" comment="wireshark-devel-1.12.8-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115285" comment="wireshark-ui-gtk-1.12.8-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115286" comment="wireshark-ui-qt-1.12.8-25.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6248</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6248" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6248" source="CVE"/>
    <description>
    The ptvcursor_add function in the ptvcursor implementation in epan/proto.c in Wireshark 1.12.x before 1.12.7 does not check whether the expected amount of data is available, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115283" comment="wireshark-1.12.8-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115284" comment="wireshark-devel-1.12.8-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115285" comment="wireshark-ui-gtk-1.12.8-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115286" comment="wireshark-ui-qt-1.12.8-25.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6249</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6249" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6249" source="CVE"/>
    <description>
    The dissect_wccp2r1_address_table_info function in epan/dissectors/packet-wccp.c in the WCCP dissector in Wireshark 1.12.x before 1.12.7 does not prevent the conflicting use of a table for both IPv4 and IPv6 addresses, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115283" comment="wireshark-1.12.8-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115284" comment="wireshark-devel-1.12.8-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115285" comment="wireshark-ui-gtk-1.12.8-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115286" comment="wireshark-ui-qt-1.12.8-25.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6251</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6251" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6251" source="CVE"/>
    <description>
    Double free vulnerability in GnuTLS before 3.3.17 and 3.4.x before 3.4.4 allows remote attackers to cause a denial of service via a long DistinguishedName (DN) entry in a certificate.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114203" comment="gnutls-3.2.18-14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114204" comment="libgnutls-devel-3.2.18-14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114205" comment="libgnutls-devel-32bit-3.2.18-14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114206" comment="libgnutls-openssl-devel-3.2.18-14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114207" comment="libgnutls-openssl27-3.2.18-14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114208" comment="libgnutls28-3.2.18-14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114209" comment="libgnutls28-32bit-3.2.18-14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114210" comment="libgnutlsxx-devel-3.2.18-14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114211" comment="libgnutlsxx28-3.2.18-14.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6496</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6496" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6496" source="CVE"/>
    <description>
    conntrackd in conntrack-tools 1.4.2 and earlier does not ensure that the optional kernel modules are loaded before using them, which allows remote attackers to cause a denial of service (crash) via a (1) DCCP, (2) SCTP, or (3) ICMPv6 packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114885" comment="conntrack-tools-1.4.2-4.4.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6526</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6526" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6526" source="CVE"/>
    <description>
    The perf_callchain_user_64 function in arch/powerpc/perf/callchain.c in the Linux kernel before 4.0.2 on ppc64 platforms allows local users to cause a denial of service (infinite loop) via a deep 64-bit userspace backtrace.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6676</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-6676" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6676" source="CVE"/>
    <description>
    Buffer overflow in Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-6678.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117601" comment="flash-player-11.2.202.521-2.70.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117602" comment="flash-player-gnome-11.2.202.521-2.70.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117603" comment="flash-player-kde4-11.2.202.521-2.70.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6677</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-6677" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6677" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-5575, CVE-2015-5577, CVE-2015-5578, CVE-2015-5580, CVE-2015-5582, and CVE-2015-5588.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117601" comment="flash-player-11.2.202.521-2.70.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117602" comment="flash-player-gnome-11.2.202.521-2.70.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117603" comment="flash-player-kde4-11.2.202.521-2.70.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6678</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-6678" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6678" source="CVE"/>
    <description>
    Buffer overflow in Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-6676.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117601" comment="flash-player-11.2.202.521-2.70.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117602" comment="flash-player-gnome-11.2.202.521-2.70.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117603" comment="flash-player-kde4-11.2.202.521-2.70.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6679</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-6679" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6679" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allow attackers to bypass the Same Origin Policy and obtain sensitive information via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117601" comment="flash-player-11.2.202.521-2.70.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117602" comment="flash-player-gnome-11.2.202.521-2.70.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117603" comment="flash-player-kde4-11.2.202.521-2.70.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6682</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-6682" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6682" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.241 and 19.x before 19.0.0.185 on Windows and OS X and before 11.2.202.521 on Linux, Adobe AIR before 19.0.0.190, Adobe AIR SDK before 19.0.0.190, and Adobe AIR SDK &amp; Compiler before 19.0.0.190 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-5570, CVE-2015-5574, CVE-2015-5581, and CVE-2015-5584.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117601" comment="flash-player-11.2.202.521-2.70.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117602" comment="flash-player-gnome-11.2.202.521-2.70.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117603" comment="flash-player-kde4-11.2.202.521-2.70.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6749</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6749" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6749" source="CVE"/>
    <description>
    Buffer overflow in the aiff_open function in oggenc/audio.c in vorbis-tools 1.4.0 and earlier allows remote attackers to cause a denial of service (crash) via a crafted AIFF file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114823" comment="libipa_hbac-devel-1.12.2-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114824" comment="libipa_hbac0-1.12.2-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114825" comment="libnfsidmap-sss-1.12.2-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114826" comment="libsss_idmap-devel-1.12.2-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114827" comment="libsss_idmap0-1.12.2-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114828" comment="libsss_nss_idmap-devel-1.12.2-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114829" comment="libsss_nss_idmap0-1.12.2-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114830" comment="libsss_simpleifp-devel-1.12.2-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114831" comment="libsss_simpleifp0-1.12.2-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114832" comment="libsss_sudo-1.12.2-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114833" comment="python-ipa_hbac-1.12.2-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114834" comment="python-sss_nss_idmap-1.12.2-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114835" comment="python-sssd-config-1.12.2-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114836" comment="sssd-1.12.2-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114837" comment="sssd-32bit-1.12.2-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114838" comment="sssd-ad-1.12.2-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114839" comment="sssd-dbus-1.12.2-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114840" comment="sssd-ipa-1.12.2-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114841" comment="sssd-krb5-1.12.2-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114842" comment="sssd-krb5-common-1.12.2-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114843" comment="sssd-ldap-1.12.2-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114844" comment="sssd-proxy-1.12.2-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114845" comment="sssd-tools-1.12.2-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114846" comment="sssd-wbclient-1.12.2-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114847" comment="sssd-wbclient-devel-1.12.2-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114848" comment="vorbis-tools-1.4.0-17.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114849" comment="vorbis-tools-lang-1.4.0-17.11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6755</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6755" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6755" source="CVE"/>
    <description>
    The ContainerNode::parserInsertBefore function in core/dom/ContainerNode.cpp in Blink, as used in Google Chrome before 46.0.2490.71, proceeds with a DOM tree insertion in certain cases where a parent node no longer contains a child node, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115136" comment="chromedriver-46.0.2490.71-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115137" comment="chromium-46.0.2490.71-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115138" comment="chromium-desktop-gnome-46.0.2490.71-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115139" comment="chromium-desktop-kde-46.0.2490.71-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115140" comment="chromium-ffmpegsumo-46.0.2490.71-54.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6756</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6756" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6756" source="CVE"/>
    <description>
    Use-after-free vulnerability in the CPDFSDK_PageView implementation in fpdfsdk/src/fsdk_mgr.cpp in PDFium, as used in Google Chrome before 46.0.2490.71, allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact by leveraging mishandling of a focused annotation in a PDF document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115136" comment="chromedriver-46.0.2490.71-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115137" comment="chromium-46.0.2490.71-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115138" comment="chromium-desktop-gnome-46.0.2490.71-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115139" comment="chromium-desktop-kde-46.0.2490.71-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115140" comment="chromium-ffmpegsumo-46.0.2490.71-54.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6757</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6757" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6757" source="CVE"/>
    <description>
    Use-after-free vulnerability in content/browser/service_worker/embedded_worker_instance.cc in the ServiceWorker implementation in Google Chrome before 46.0.2490.71 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging object destruction in a callback.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115136" comment="chromedriver-46.0.2490.71-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115137" comment="chromium-46.0.2490.71-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115138" comment="chromium-desktop-gnome-46.0.2490.71-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115139" comment="chromium-desktop-kde-46.0.2490.71-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115140" comment="chromium-ffmpegsumo-46.0.2490.71-54.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6758</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6758" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6758" source="CVE"/>
    <description>
    The CPDF_Document::GetPage function in fpdfapi/fpdf_parser/fpdf_parser_document.cpp in PDFium, as used in Google Chrome before 46.0.2490.71, does not properly perform a cast of a dictionary object, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted PDF document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115136" comment="chromedriver-46.0.2490.71-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115137" comment="chromium-46.0.2490.71-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115138" comment="chromium-desktop-gnome-46.0.2490.71-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115139" comment="chromium-desktop-kde-46.0.2490.71-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115140" comment="chromium-ffmpegsumo-46.0.2490.71-54.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6759</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6759" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6759" source="CVE"/>
    <description>
    The shouldTreatAsUniqueOrigin function in platform/weborigin/SecurityOrigin.cpp in Blink, as used in Google Chrome before 46.0.2490.71, does not ensure that the origin of a LocalStorage resource is considered unique, which allows remote attackers to obtain sensitive information via vectors involving a blob: URL.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115136" comment="chromedriver-46.0.2490.71-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115137" comment="chromium-46.0.2490.71-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115138" comment="chromium-desktop-gnome-46.0.2490.71-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115139" comment="chromium-desktop-kde-46.0.2490.71-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115140" comment="chromium-ffmpegsumo-46.0.2490.71-54.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6760</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6760" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6760" source="CVE"/>
    <description>
    The Image11::map function in renderer/d3d/d3d11/Image11.cpp in libANGLE, as used in Google Chrome before 46.0.2490.71, mishandles mapping failures after device-lost events, which allows remote attackers to cause a denial of service (invalid read or write) or possibly have unspecified other impact via vectors involving a removed device.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115136" comment="chromedriver-46.0.2490.71-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115137" comment="chromium-46.0.2490.71-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115138" comment="chromium-desktop-gnome-46.0.2490.71-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115139" comment="chromium-desktop-kde-46.0.2490.71-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115140" comment="chromium-ffmpegsumo-46.0.2490.71-54.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6761</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6761" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6761" source="CVE"/>
    <description>
    The update_dimensions function in libavcodec/vp8.c in FFmpeg through 2.8.1, as used in Google Chrome before 46.0.2490.71 and other products, relies on a coefficient-partition count during multi-threaded operation, which allows remote attackers to cause a denial of service (race condition and memory corruption) or possibly have unspecified other impact via a crafted WebM file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115136" comment="chromedriver-46.0.2490.71-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115137" comment="chromium-46.0.2490.71-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115138" comment="chromium-desktop-gnome-46.0.2490.71-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115139" comment="chromium-desktop-kde-46.0.2490.71-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115140" comment="chromium-ffmpegsumo-46.0.2490.71-54.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6762</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6762" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6762" source="CVE"/>
    <description>
    The CSSFontFaceSrcValue::fetch function in core/css/CSSFontFaceSrcValue.cpp in the Cascading Style Sheets (CSS) implementation in Blink, as used in Google Chrome before 46.0.2490.71, does not use the CORS cross-origin request algorithm when a font's URL appears to be a same-origin URL, which allows remote web servers to bypass the Same Origin Policy via a redirect.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115136" comment="chromedriver-46.0.2490.71-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115137" comment="chromium-46.0.2490.71-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115138" comment="chromium-desktop-gnome-46.0.2490.71-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115139" comment="chromium-desktop-kde-46.0.2490.71-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115140" comment="chromium-ffmpegsumo-46.0.2490.71-54.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6763</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6763" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6763" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 46.0.2490.71 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115136" comment="chromedriver-46.0.2490.71-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115137" comment="chromium-46.0.2490.71-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115138" comment="chromium-desktop-gnome-46.0.2490.71-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115139" comment="chromium-desktop-kde-46.0.2490.71-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115140" comment="chromium-ffmpegsumo-46.0.2490.71-54.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6764</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6764" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6764" source="CVE"/>
    <description>
    The BasicJsonStringifier::SerializeJSArray function in json-stringifier.h in the JSON stringifier in Google V8, as used in Google Chrome before 47.0.2526.73, improperly loads array elements, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via crafted JavaScript code.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119596" comment="chromedriver-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119597" comment="chromium-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119598" comment="chromium-desktop-gnome-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119599" comment="chromium-desktop-kde-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119600" comment="chromium-ffmpegsumo-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121523" comment="nodejs-4.2.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121524" comment="nodejs-devel-4.2.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121520" comment="nodejs-doc-4.2.4-9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6765</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6765" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6765" source="CVE"/>
    <description>
    Use-after-free vulnerability in content/browser/appcache/appcache_update_job.cc in Google Chrome before 47.0.2526.73 allows remote attackers to execute arbitrary code or cause a denial of service by leveraging the mishandling of AppCache update jobs.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119596" comment="chromedriver-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119597" comment="chromium-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119598" comment="chromium-desktop-gnome-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119599" comment="chromium-desktop-kde-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119600" comment="chromium-ffmpegsumo-47.0.2526.80-61.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6766</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6766" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6766" source="CVE"/>
    <description>
    Use-after-free vulnerability in the AppCache implementation in Google Chrome before 47.0.2526.73 allows remote attackers with renderer access to cause a denial of service or possibly have unspecified other impact by leveraging incorrect AppCacheUpdateJob behavior associated with duplicate cache selection.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119596" comment="chromedriver-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119597" comment="chromium-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119598" comment="chromium-desktop-gnome-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119599" comment="chromium-desktop-kde-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119600" comment="chromium-ffmpegsumo-47.0.2526.80-61.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6767</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6767" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6767" source="CVE"/>
    <description>
    Use-after-free vulnerability in content/browser/appcache/appcache_dispatcher_host.cc in the AppCache implementation in Google Chrome before 47.0.2526.73 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging incorrect pointer maintenance associated with certain callbacks.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119596" comment="chromedriver-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119597" comment="chromium-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119598" comment="chromium-desktop-gnome-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119599" comment="chromium-desktop-kde-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119600" comment="chromium-ffmpegsumo-47.0.2526.80-61.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6768</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6768" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6768" source="CVE"/>
    <description>
    The DOM implementation in Google Chrome before 47.0.2526.73 allows remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2015-6770.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119596" comment="chromedriver-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119597" comment="chromium-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119598" comment="chromium-desktop-gnome-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119599" comment="chromium-desktop-kde-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119600" comment="chromium-ffmpegsumo-47.0.2526.80-61.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6769</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6769" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6769" source="CVE"/>
    <description>
    The provisional-load commit implementation in WebKit/Source/bindings/core/v8/WindowProxy.cpp in Google Chrome before 47.0.2526.73 allows remote attackers to bypass the Same Origin Policy by leveraging a delay in window proxy clearing.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119596" comment="chromedriver-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119597" comment="chromium-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119598" comment="chromium-desktop-gnome-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119599" comment="chromium-desktop-kde-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119600" comment="chromium-ffmpegsumo-47.0.2526.80-61.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6770</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6770" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6770" source="CVE"/>
    <description>
    The DOM implementation in Google Chrome before 47.0.2526.73 allows remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2015-6768.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119596" comment="chromedriver-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119597" comment="chromium-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119598" comment="chromium-desktop-gnome-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119599" comment="chromium-desktop-kde-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119600" comment="chromium-ffmpegsumo-47.0.2526.80-61.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6771</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6771" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6771" source="CVE"/>
    <description>
    js/array.js in Google V8, as used in Google Chrome before 47.0.2526.73, improperly implements certain map and filter operations for arrays, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via crafted JavaScript code.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119596" comment="chromedriver-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119597" comment="chromium-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119598" comment="chromium-desktop-gnome-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119599" comment="chromium-desktop-kde-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119600" comment="chromium-ffmpegsumo-47.0.2526.80-61.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6772</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6772" source="CVE"/>
    <description>
    The DOM implementation in Blink, as used in Google Chrome before 47.0.2526.73, does not prevent javascript: URL navigation while a document is being detached, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code that improperly interacts with a plugin.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119596" comment="chromedriver-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119597" comment="chromium-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119598" comment="chromium-desktop-gnome-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119599" comment="chromium-desktop-kde-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119600" comment="chromium-ffmpegsumo-47.0.2526.80-61.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6773</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6773" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6773" source="CVE"/>
    <description>
    The convolution implementation in Skia, as used in Google Chrome before 47.0.2526.73, does not properly constrain row lengths, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via crafted graphics data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119596" comment="chromedriver-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119597" comment="chromium-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119598" comment="chromium-desktop-gnome-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119599" comment="chromium-desktop-kde-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119600" comment="chromium-ffmpegsumo-47.0.2526.80-61.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6774</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6774" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6774" source="CVE"/>
    <description>
    Use-after-free vulnerability in the GetLoadTimes function in renderer/loadtimes_extension_bindings.cc in the Extensions implementation in Google Chrome before 47.0.2526.73 allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that modifies a pointer used for reporting loadTimes data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119596" comment="chromedriver-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119597" comment="chromium-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119598" comment="chromium-desktop-gnome-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119599" comment="chromium-desktop-kde-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119600" comment="chromium-ffmpegsumo-47.0.2526.80-61.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6775</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6775" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6775" source="CVE"/>
    <description>
    fpdfsdk/src/jsapi/fxjs_v8.cpp in PDFium, as used in Google Chrome before 47.0.2526.73, does not use signatures, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage "type confusion."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119596" comment="chromedriver-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119597" comment="chromium-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119598" comment="chromium-desktop-gnome-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119599" comment="chromium-desktop-kde-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119600" comment="chromium-ffmpegsumo-47.0.2526.80-61.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6776</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6776" source="CVE"/>
    <description>
    The opj_dwt_decode_1* functions in dwt.c in OpenJPEG, as used in PDFium in Google Chrome before 47.0.2526.73, allow remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted JPEG 2000 data that is mishandled during a discrete wavelet transform.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119596" comment="chromedriver-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119597" comment="chromium-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119598" comment="chromium-desktop-gnome-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119599" comment="chromium-desktop-kde-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119600" comment="chromium-ffmpegsumo-47.0.2526.80-61.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6777</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6777" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6777" source="CVE"/>
    <description>
    Use-after-free vulnerability in the ContainerNode::notifyNodeInsertedInternal function in WebKit/Source/core/dom/ContainerNode.cpp in the DOM implementation in Google Chrome before 47.0.2526.73 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to DOMCharacterDataModified events for certain detached-subtree insertions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119596" comment="chromedriver-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119597" comment="chromium-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119598" comment="chromium-desktop-gnome-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119599" comment="chromium-desktop-kde-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119600" comment="chromium-ffmpegsumo-47.0.2526.80-61.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6778</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6778" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6778" source="CVE"/>
    <description>
    The CJBig2_SymbolDict class in fxcodec/jbig2/JBig2_SymbolDict.cpp in PDFium, as used in Google Chrome before 47.0.2526.73, allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via a PDF document containing crafted data with JBIG2 compression.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119596" comment="chromedriver-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119597" comment="chromium-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119598" comment="chromium-desktop-gnome-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119599" comment="chromium-desktop-kde-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119600" comment="chromium-ffmpegsumo-47.0.2526.80-61.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6779</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6779" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6779" source="CVE"/>
    <description>
    PDFium, as used in Google Chrome before 47.0.2526.73, does not properly restrict use of chrome: URLs, which allows remote attackers to bypass intended scheme restrictions via a crafted PDF document, as demonstrated by a document with a link to a chrome://settings URL.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119596" comment="chromedriver-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119597" comment="chromium-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119598" comment="chromium-desktop-gnome-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119599" comment="chromium-desktop-kde-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119600" comment="chromium-ffmpegsumo-47.0.2526.80-61.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6780</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6780" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6780" source="CVE"/>
    <description>
    Use-after-free vulnerability in the Infobars implementation in Google Chrome before 47.0.2526.73 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted web site, related to browser/ui/views/website_settings/website_settings_popup_view.cc.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119596" comment="chromedriver-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119597" comment="chromium-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119598" comment="chromium-desktop-gnome-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119599" comment="chromium-desktop-kde-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119600" comment="chromium-ffmpegsumo-47.0.2526.80-61.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6781</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6781" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6781" source="CVE"/>
    <description>
    Integer overflow in the FontData::Bound function in data/font_data.cc in Google sfntly, as used in Google Chrome before 47.0.2526.73, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted offset or length value within font data in an SFNT container.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119596" comment="chromedriver-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119597" comment="chromium-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119598" comment="chromium-desktop-gnome-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119599" comment="chromium-desktop-kde-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119600" comment="chromium-ffmpegsumo-47.0.2526.80-61.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6782</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6782" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6782" source="CVE"/>
    <description>
    The Document::open function in WebKit/Source/core/dom/Document.cpp in Google Chrome before 47.0.2526.73 does not ensure that page-dismissal event handling is compatible with modal-dialog blocking, which makes it easier for remote attackers to spoof Omnibox content via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119596" comment="chromedriver-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119597" comment="chromium-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119598" comment="chromium-desktop-gnome-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119599" comment="chromium-desktop-kde-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119600" comment="chromium-ffmpegsumo-47.0.2526.80-61.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6783</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6783" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6783" source="CVE"/>
    <description>
    The FindStartOffsetOfFileInZipFile function in crazy_linker_zip.cpp in crazy_linker (aka Crazy Linker) in Android 5.x and 6.x, as used in Google Chrome before 47.0.2526.73, improperly searches for an EOCD record, which allows attackers to bypass a signature-validation requirement via a crafted ZIP archive.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119596" comment="chromedriver-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119597" comment="chromium-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119598" comment="chromium-desktop-gnome-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119599" comment="chromium-desktop-kde-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119600" comment="chromium-ffmpegsumo-47.0.2526.80-61.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6784</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6784" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6784" source="CVE"/>
    <description>
    The page serializer in Google Chrome before 47.0.2526.73 mishandles Mark of the Web (MOTW) comments for URLs containing a "--" sequence, which might allow remote attackers to inject HTML via a crafted URL, as demonstrated by an initial http://example.com?-- substring.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119596" comment="chromedriver-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119597" comment="chromium-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119598" comment="chromium-desktop-gnome-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119599" comment="chromium-desktop-kde-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119600" comment="chromium-ffmpegsumo-47.0.2526.80-61.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6785</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6785" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6785" source="CVE"/>
    <description>
    The CSPSource::hostMatches function in WebKit/Source/core/frame/csp/CSPSource.cpp in the Content Security Policy (CSP) implementation in Google Chrome before 47.0.2526.73 accepts an x.y hostname as a match for a *.x.y pattern, which might allow remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging a policy that was intended to be specific to subdomains.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119596" comment="chromedriver-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119597" comment="chromium-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119598" comment="chromium-desktop-gnome-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119599" comment="chromium-desktop-kde-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119600" comment="chromium-ffmpegsumo-47.0.2526.80-61.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6786</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6786" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6786" source="CVE"/>
    <description>
    The CSPSourceList::matches function in WebKit/Source/core/frame/csp/CSPSourceList.cpp in the Content Security Policy (CSP) implementation in Google Chrome before 47.0.2526.73 accepts a blob:, data:, or filesystem: URL as a match for a * pattern, which allows remote attackers to bypass intended scheme restrictions in opportunistic circumstances by leveraging a policy that relies on this pattern.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119596" comment="chromedriver-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119597" comment="chromium-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119598" comment="chromium-desktop-gnome-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119599" comment="chromium-desktop-kde-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119600" comment="chromium-ffmpegsumo-47.0.2526.80-61.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6787</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6787" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6787" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 47.0.2526.73 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119596" comment="chromedriver-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119597" comment="chromium-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119598" comment="chromium-desktop-gnome-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119599" comment="chromium-desktop-kde-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119600" comment="chromium-ffmpegsumo-47.0.2526.80-61.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6788</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6788" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6788" source="CVE"/>
    <description>
    The ObjectBackedNativeHandler class in extensions/renderer/object_backed_native_handler.cc in the extensions subsystem in Google Chrome before 47.0.2526.80 improperly implements handler functions, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage "type confusion."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119596" comment="chromedriver-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119597" comment="chromium-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119598" comment="chromium-desktop-gnome-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119599" comment="chromium-desktop-kde-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119600" comment="chromium-ffmpegsumo-47.0.2526.80-61.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6789</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6789" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6789" source="CVE"/>
    <description>
    Race condition in the MutationObserver implementation in Blink, as used in Google Chrome before 47.0.2526.80, allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact by leveraging unanticipated object deletion.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119596" comment="chromedriver-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119597" comment="chromium-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119598" comment="chromium-desktop-gnome-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119599" comment="chromium-desktop-kde-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119600" comment="chromium-ffmpegsumo-47.0.2526.80-61.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6790</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6790" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6790" source="CVE"/>
    <description>
    The WebPageSerializerImpl::openTagToString function in WebKit/Source/web/WebPageSerializerImpl.cpp in the page serializer in Google Chrome before 47.0.2526.80 does not properly use HTML entities, which might allow remote attackers to inject arbitrary web script or HTML via a crafted document, as demonstrated by a double-quote character inside a single-quoted string.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119596" comment="chromedriver-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119597" comment="chromium-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119598" comment="chromium-desktop-gnome-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119599" comment="chromium-desktop-kde-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119600" comment="chromium-ffmpegsumo-47.0.2526.80-61.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6791</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6791" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6791" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 47.0.2526.80 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119596" comment="chromedriver-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119597" comment="chromium-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119598" comment="chromium-desktop-gnome-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119599" comment="chromium-desktop-kde-47.0.2526.80-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119600" comment="chromium-ffmpegsumo-47.0.2526.80-61.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6792</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6792" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6792" source="CVE"/>
    <description>
    The MIDI subsystem in Google Chrome before 47.0.2526.106 does not properly handle the sending of data, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors, related to midi_manager.cc, midi_manager_alsa.cc, and midi_manager_mac.cc, a different vulnerability than CVE-2015-8664.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119883" comment="chromedriver-47.0.2526.106-64.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119884" comment="chromium-47.0.2526.106-64.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119885" comment="chromium-desktop-gnome-47.0.2526.106-64.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119886" comment="chromium-desktop-kde-47.0.2526.106-64.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119887" comment="chromium-ffmpegsumo-47.0.2526.106-64.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6815</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6815" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6815" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126020" comment="xen-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126021" comment="xen-devel-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126022" comment="xen-doc-html-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126023" comment="xen-kmp-default-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126024" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126025" comment="xen-libs-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126026" comment="xen-libs-32bit-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126027" comment="xen-tools-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126028" comment="xen-tools-domU-4.4.4_02-43.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6830</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6830" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6830" source="CVE"/>
    <description>
    libraries/plugins/auth/AuthenticationCookie.class.php in phpMyAdmin 4.3.x before 4.3.13.2 and 4.4.x before 4.4.14.1 allows remote attackers to bypass a multiple-reCaptcha protection mechanism against brute-force credential guessing by providing a correct response to a single reCaptcha.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114756" comment="phpMyAdmin-4.4.15-14.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6831</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6831" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6831" source="CVE"/>
    <description>
    Multiple use-after-free vulnerabilities in SPL in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allow remote attackers to execute arbitrary code via vectors involving (1) ArrayObject, (2) SplObjectStorage, and (3) SplDoublyLinkedList, which are mishandled during unserialization.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114582" comment="apache2-mod_php5-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114583" comment="php5-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114584" comment="php5-bcmath-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114585" comment="php5-bz2-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114586" comment="php5-calendar-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114587" comment="php5-ctype-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114588" comment="php5-curl-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114589" comment="php5-dba-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114590" comment="php5-devel-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114591" comment="php5-dom-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114592" comment="php5-enchant-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114593" comment="php5-exif-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114594" comment="php5-fastcgi-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114595" comment="php5-fileinfo-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114596" comment="php5-firebird-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114597" comment="php5-fpm-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114598" comment="php5-ftp-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114599" comment="php5-gd-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114600" comment="php5-gettext-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114601" comment="php5-gmp-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114602" comment="php5-iconv-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114603" comment="php5-imap-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114604" comment="php5-intl-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114605" comment="php5-json-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114606" comment="php5-ldap-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114607" comment="php5-mbstring-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114608" comment="php5-mcrypt-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114609" comment="php5-mssql-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114610" comment="php5-mysql-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114611" comment="php5-odbc-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114612" comment="php5-opcache-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114613" comment="php5-openssl-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114614" comment="php5-pcntl-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114615" comment="php5-pdo-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114616" comment="php5-pear-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114617" comment="php5-pgsql-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114618" comment="php5-phar-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114619" comment="php5-posix-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114620" comment="php5-pspell-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114621" comment="php5-readline-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114622" comment="php5-shmop-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114623" comment="php5-snmp-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114624" comment="php5-soap-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114625" comment="php5-sockets-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114626" comment="php5-sqlite-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114627" comment="php5-suhosin-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114628" comment="php5-sysvmsg-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114629" comment="php5-sysvsem-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114630" comment="php5-sysvshm-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114631" comment="php5-tidy-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114632" comment="php5-tokenizer-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114633" comment="php5-wddx-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114634" comment="php5-xmlreader-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114635" comment="php5-xmlrpc-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114636" comment="php5-xmlwriter-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114637" comment="php5-xsl-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114638" comment="php5-zip-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114639" comment="php5-zlib-5.6.1-36.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6832</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6832" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6832" source="CVE"/>
    <description>
    Use-after-free vulnerability in the SPL unserialize implementation in ext/spl/spl_array.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allows remote attackers to execute arbitrary code via crafted serialized data that triggers misuse of an array field.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114582" comment="apache2-mod_php5-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114583" comment="php5-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114584" comment="php5-bcmath-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114585" comment="php5-bz2-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114586" comment="php5-calendar-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114587" comment="php5-ctype-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114588" comment="php5-curl-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114589" comment="php5-dba-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114590" comment="php5-devel-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114591" comment="php5-dom-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114592" comment="php5-enchant-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114593" comment="php5-exif-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114594" comment="php5-fastcgi-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114595" comment="php5-fileinfo-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114596" comment="php5-firebird-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114597" comment="php5-fpm-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114598" comment="php5-ftp-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114599" comment="php5-gd-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114600" comment="php5-gettext-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114601" comment="php5-gmp-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114602" comment="php5-iconv-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114603" comment="php5-imap-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114604" comment="php5-intl-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114605" comment="php5-json-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114606" comment="php5-ldap-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114607" comment="php5-mbstring-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114608" comment="php5-mcrypt-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114609" comment="php5-mssql-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114610" comment="php5-mysql-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114611" comment="php5-odbc-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114612" comment="php5-opcache-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114613" comment="php5-openssl-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114614" comment="php5-pcntl-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114615" comment="php5-pdo-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114616" comment="php5-pear-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114617" comment="php5-pgsql-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114618" comment="php5-phar-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114619" comment="php5-posix-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114620" comment="php5-pspell-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114621" comment="php5-readline-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114622" comment="php5-shmop-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114623" comment="php5-snmp-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114624" comment="php5-soap-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114625" comment="php5-sockets-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114626" comment="php5-sqlite-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114627" comment="php5-suhosin-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114628" comment="php5-sysvmsg-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114629" comment="php5-sysvsem-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114630" comment="php5-sysvshm-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114631" comment="php5-tidy-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114632" comment="php5-tokenizer-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114633" comment="php5-wddx-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114634" comment="php5-xmlreader-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114635" comment="php5-xmlrpc-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114636" comment="php5-xmlwriter-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114637" comment="php5-xsl-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114638" comment="php5-zip-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114639" comment="php5-zlib-5.6.1-36.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6833</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6833" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6833" source="CVE"/>
    <description>
    Directory traversal vulnerability in the PharData class in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allows remote attackers to write to arbitrary files via a .. (dot dot) in a ZIP archive entry that is mishandled during an extractTo call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114582" comment="apache2-mod_php5-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114583" comment="php5-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114584" comment="php5-bcmath-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114585" comment="php5-bz2-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114586" comment="php5-calendar-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114587" comment="php5-ctype-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114588" comment="php5-curl-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114589" comment="php5-dba-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114590" comment="php5-devel-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114591" comment="php5-dom-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114592" comment="php5-enchant-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114593" comment="php5-exif-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114594" comment="php5-fastcgi-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114595" comment="php5-fileinfo-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114596" comment="php5-firebird-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114597" comment="php5-fpm-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114598" comment="php5-ftp-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114599" comment="php5-gd-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114600" comment="php5-gettext-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114601" comment="php5-gmp-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114602" comment="php5-iconv-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114603" comment="php5-imap-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114604" comment="php5-intl-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114605" comment="php5-json-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114606" comment="php5-ldap-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114607" comment="php5-mbstring-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114608" comment="php5-mcrypt-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114609" comment="php5-mssql-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114610" comment="php5-mysql-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114611" comment="php5-odbc-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114612" comment="php5-opcache-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114613" comment="php5-openssl-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114614" comment="php5-pcntl-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114615" comment="php5-pdo-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114616" comment="php5-pear-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114617" comment="php5-pgsql-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114618" comment="php5-phar-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114619" comment="php5-posix-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114620" comment="php5-pspell-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114621" comment="php5-readline-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114622" comment="php5-shmop-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114623" comment="php5-snmp-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114624" comment="php5-soap-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114625" comment="php5-sockets-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114626" comment="php5-sqlite-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114627" comment="php5-suhosin-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114628" comment="php5-sysvmsg-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114629" comment="php5-sysvsem-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114630" comment="php5-sysvshm-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114631" comment="php5-tidy-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114632" comment="php5-tokenizer-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114633" comment="php5-wddx-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114634" comment="php5-xmlreader-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114635" comment="php5-xmlrpc-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114636" comment="php5-xmlwriter-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114637" comment="php5-xsl-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114638" comment="php5-zip-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114639" comment="php5-zlib-5.6.1-36.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6834</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6834" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6834" source="CVE"/>
    <description>
    Multiple use-after-free vulnerabilities in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 allow remote attackers to execute arbitrary code via vectors related to (1) the Serializable interface, (2) the SplObjectStorage class, and (3) the SplDoublyLinkedList class, which are mishandled during unserialization.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114582" comment="apache2-mod_php5-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114583" comment="php5-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114584" comment="php5-bcmath-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114585" comment="php5-bz2-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114586" comment="php5-calendar-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114587" comment="php5-ctype-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114588" comment="php5-curl-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114589" comment="php5-dba-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114590" comment="php5-devel-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114591" comment="php5-dom-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114592" comment="php5-enchant-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114593" comment="php5-exif-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114594" comment="php5-fastcgi-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114595" comment="php5-fileinfo-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114596" comment="php5-firebird-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114597" comment="php5-fpm-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114598" comment="php5-ftp-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114599" comment="php5-gd-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114600" comment="php5-gettext-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114601" comment="php5-gmp-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114602" comment="php5-iconv-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114603" comment="php5-imap-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114604" comment="php5-intl-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114605" comment="php5-json-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114606" comment="php5-ldap-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114607" comment="php5-mbstring-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114608" comment="php5-mcrypt-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114609" comment="php5-mssql-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114610" comment="php5-mysql-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114611" comment="php5-odbc-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114612" comment="php5-opcache-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114613" comment="php5-openssl-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114614" comment="php5-pcntl-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114615" comment="php5-pdo-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114616" comment="php5-pear-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114617" comment="php5-pgsql-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114618" comment="php5-phar-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114619" comment="php5-posix-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114620" comment="php5-pspell-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114621" comment="php5-readline-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114622" comment="php5-shmop-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114623" comment="php5-snmp-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114624" comment="php5-soap-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114625" comment="php5-sockets-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114626" comment="php5-sqlite-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114627" comment="php5-suhosin-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114628" comment="php5-sysvmsg-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114629" comment="php5-sysvsem-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114630" comment="php5-sysvshm-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114631" comment="php5-tidy-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114632" comment="php5-tokenizer-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114633" comment="php5-wddx-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114634" comment="php5-xmlreader-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114635" comment="php5-xmlrpc-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114636" comment="php5-xmlwriter-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114637" comment="php5-xsl-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114638" comment="php5-zip-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114639" comment="php5-zlib-5.6.1-36.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6835</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6835" source="CVE"/>
    <description>
    The session deserializer in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 mishandles multiple php_var_unserialize calls, which allow remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via crafted session content.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114582" comment="apache2-mod_php5-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114583" comment="php5-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114584" comment="php5-bcmath-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114585" comment="php5-bz2-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114586" comment="php5-calendar-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114587" comment="php5-ctype-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114588" comment="php5-curl-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114589" comment="php5-dba-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114590" comment="php5-devel-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114591" comment="php5-dom-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114592" comment="php5-enchant-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114593" comment="php5-exif-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114594" comment="php5-fastcgi-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114595" comment="php5-fileinfo-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114596" comment="php5-firebird-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114597" comment="php5-fpm-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114598" comment="php5-ftp-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114599" comment="php5-gd-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114600" comment="php5-gettext-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114601" comment="php5-gmp-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114602" comment="php5-iconv-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114603" comment="php5-imap-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114604" comment="php5-intl-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114605" comment="php5-json-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114606" comment="php5-ldap-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114607" comment="php5-mbstring-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114608" comment="php5-mcrypt-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114609" comment="php5-mssql-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114610" comment="php5-mysql-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114611" comment="php5-odbc-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114612" comment="php5-opcache-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114613" comment="php5-openssl-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114614" comment="php5-pcntl-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114615" comment="php5-pdo-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114616" comment="php5-pear-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114617" comment="php5-pgsql-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114618" comment="php5-phar-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114619" comment="php5-posix-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114620" comment="php5-pspell-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114621" comment="php5-readline-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114622" comment="php5-shmop-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114623" comment="php5-snmp-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114624" comment="php5-soap-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114625" comment="php5-sockets-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114626" comment="php5-sqlite-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114627" comment="php5-suhosin-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114628" comment="php5-sysvmsg-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114629" comment="php5-sysvsem-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114630" comment="php5-sysvshm-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114631" comment="php5-tidy-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114632" comment="php5-tokenizer-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114633" comment="php5-wddx-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114634" comment="php5-xmlreader-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114635" comment="php5-xmlrpc-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114636" comment="php5-xmlwriter-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114637" comment="php5-xsl-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114638" comment="php5-zip-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114639" comment="php5-zlib-5.6.1-36.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6836</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6836" source="CVE"/>
    <description>
    The SoapClient __call method in ext/soap/soap.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 does not properly manage headers, which allows remote attackers to execute arbitrary code via crafted serialized data that triggers a "type confusion" in the serialize_function_call function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114582" comment="apache2-mod_php5-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114583" comment="php5-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114584" comment="php5-bcmath-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114585" comment="php5-bz2-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114586" comment="php5-calendar-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114587" comment="php5-ctype-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114588" comment="php5-curl-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114589" comment="php5-dba-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114590" comment="php5-devel-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114591" comment="php5-dom-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114592" comment="php5-enchant-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114593" comment="php5-exif-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114594" comment="php5-fastcgi-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114595" comment="php5-fileinfo-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114596" comment="php5-firebird-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114597" comment="php5-fpm-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114598" comment="php5-ftp-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114599" comment="php5-gd-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114600" comment="php5-gettext-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114601" comment="php5-gmp-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114602" comment="php5-iconv-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114603" comment="php5-imap-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114604" comment="php5-intl-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114605" comment="php5-json-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114606" comment="php5-ldap-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114607" comment="php5-mbstring-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114608" comment="php5-mcrypt-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114609" comment="php5-mssql-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114610" comment="php5-mysql-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114611" comment="php5-odbc-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114612" comment="php5-opcache-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114613" comment="php5-openssl-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114614" comment="php5-pcntl-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114615" comment="php5-pdo-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114616" comment="php5-pear-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114617" comment="php5-pgsql-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114618" comment="php5-phar-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114619" comment="php5-posix-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114620" comment="php5-pspell-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114621" comment="php5-readline-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114622" comment="php5-shmop-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114623" comment="php5-snmp-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114624" comment="php5-soap-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114625" comment="php5-sockets-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114626" comment="php5-sqlite-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114627" comment="php5-suhosin-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114628" comment="php5-sysvmsg-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114629" comment="php5-sysvsem-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114630" comment="php5-sysvshm-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114631" comment="php5-tidy-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114632" comment="php5-tokenizer-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114633" comment="php5-wddx-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114634" comment="php5-xmlreader-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114635" comment="php5-xmlrpc-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114636" comment="php5-xmlwriter-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114637" comment="php5-xsl-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114638" comment="php5-zip-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114639" comment="php5-zlib-5.6.1-36.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6837</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6837" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6837" source="CVE"/>
    <description>
    The xsl_ext_function_php function in ext/xsl/xsltprocessor.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13, when libxml2 before 2.9.2 is used, does not consider the possibility of a NULL valuePop return value before proceeding with a free operation during initial error checking, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted XML document, a different vulnerability than CVE-2015-6838.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114582" comment="apache2-mod_php5-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114583" comment="php5-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114584" comment="php5-bcmath-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114585" comment="php5-bz2-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114586" comment="php5-calendar-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114587" comment="php5-ctype-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114588" comment="php5-curl-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114589" comment="php5-dba-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114590" comment="php5-devel-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114591" comment="php5-dom-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114592" comment="php5-enchant-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114593" comment="php5-exif-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114594" comment="php5-fastcgi-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114595" comment="php5-fileinfo-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114596" comment="php5-firebird-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114597" comment="php5-fpm-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114598" comment="php5-ftp-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114599" comment="php5-gd-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114600" comment="php5-gettext-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114601" comment="php5-gmp-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114602" comment="php5-iconv-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114603" comment="php5-imap-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114604" comment="php5-intl-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114605" comment="php5-json-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114606" comment="php5-ldap-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114607" comment="php5-mbstring-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114608" comment="php5-mcrypt-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114609" comment="php5-mssql-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114610" comment="php5-mysql-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114611" comment="php5-odbc-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114612" comment="php5-opcache-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114613" comment="php5-openssl-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114614" comment="php5-pcntl-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114615" comment="php5-pdo-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114616" comment="php5-pear-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114617" comment="php5-pgsql-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114618" comment="php5-phar-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114619" comment="php5-posix-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114620" comment="php5-pspell-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114621" comment="php5-readline-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114622" comment="php5-shmop-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114623" comment="php5-snmp-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114624" comment="php5-soap-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114625" comment="php5-sockets-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114626" comment="php5-sqlite-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114627" comment="php5-suhosin-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114628" comment="php5-sysvmsg-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114629" comment="php5-sysvsem-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114630" comment="php5-sysvshm-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114631" comment="php5-tidy-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114632" comment="php5-tokenizer-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114633" comment="php5-wddx-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114634" comment="php5-xmlreader-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114635" comment="php5-xmlrpc-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114636" comment="php5-xmlwriter-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114637" comment="php5-xsl-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114638" comment="php5-zip-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114639" comment="php5-zlib-5.6.1-36.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6838</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6838" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6838" source="CVE"/>
    <description>
    The xsl_ext_function_php function in ext/xsl/xsltprocessor.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13, when libxml2 before 2.9.2 is used, does not consider the possibility of a NULL valuePop return value before proceeding with a free operation after the principal argument loop, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted XML document, a different vulnerability than CVE-2015-6837.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114582" comment="apache2-mod_php5-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114583" comment="php5-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114584" comment="php5-bcmath-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114585" comment="php5-bz2-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114586" comment="php5-calendar-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114587" comment="php5-ctype-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114588" comment="php5-curl-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114589" comment="php5-dba-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114590" comment="php5-devel-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114591" comment="php5-dom-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114592" comment="php5-enchant-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114593" comment="php5-exif-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114594" comment="php5-fastcgi-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114595" comment="php5-fileinfo-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114596" comment="php5-firebird-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114597" comment="php5-fpm-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114598" comment="php5-ftp-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114599" comment="php5-gd-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114600" comment="php5-gettext-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114601" comment="php5-gmp-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114602" comment="php5-iconv-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114603" comment="php5-imap-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114604" comment="php5-intl-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114605" comment="php5-json-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114606" comment="php5-ldap-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114607" comment="php5-mbstring-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114608" comment="php5-mcrypt-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114609" comment="php5-mssql-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114610" comment="php5-mysql-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114611" comment="php5-odbc-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114612" comment="php5-opcache-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114613" comment="php5-openssl-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114614" comment="php5-pcntl-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114615" comment="php5-pdo-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114616" comment="php5-pear-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114617" comment="php5-pgsql-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114618" comment="php5-phar-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114619" comment="php5-posix-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114620" comment="php5-pspell-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114621" comment="php5-readline-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114622" comment="php5-shmop-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114623" comment="php5-snmp-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114624" comment="php5-soap-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114625" comment="php5-sockets-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114626" comment="php5-sqlite-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114627" comment="php5-suhosin-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114628" comment="php5-sysvmsg-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114629" comment="php5-sysvsem-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114630" comment="php5-sysvshm-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114631" comment="php5-tidy-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114632" comment="php5-tokenizer-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114633" comment="php5-wddx-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114634" comment="php5-xmlreader-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114635" comment="php5-xmlrpc-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114636" comment="php5-xmlwriter-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114637" comment="php5-xsl-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114638" comment="php5-zip-5.6.1-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114639" comment="php5-zlib-5.6.1-36.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6855</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6855" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6855" source="CVE"/>
    <description>
    hw/ide/core.c in QEMU does not properly restrict the commands accepted by an ATAPI device, which allows guest users to cause a denial of service or possibly have unspecified other impact via certain IDE commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty drive, which triggers a divide-by-zero error and instance crash.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126020" comment="xen-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126021" comment="xen-devel-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126022" comment="xen-doc-html-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126023" comment="xen-kmp-default-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126024" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126025" comment="xen-libs-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126026" comment="xen-libs-32bit-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126027" comment="xen-tools-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126028" comment="xen-tools-domU-4.4.4_02-43.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6908</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6908" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6908" source="CVE"/>
    <description>
    The ber_get_next function in libraries/liblber/io.c in OpenLDAP 2.4.42 and earlier allows remote attackers to cause a denial of service (reachable assertion and application crash) via crafted BER data, as demonstrated by an attack against slapd.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122067" comment="compat-libldap-2_3-0-2.3.37-8.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122068" comment="libldap-2_4-2-2.4.39-8.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122069" comment="libldap-2_4-2-32bit-2.4.39-8.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122070" comment="openldap2-2.4.39-8.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122071" comment="openldap2-back-meta-2.4.39-8.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122072" comment="openldap2-back-perl-2.4.39-8.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122073" comment="openldap2-back-sql-2.4.39-8.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122074" comment="openldap2-client-2.4.39-8.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122075" comment="openldap2-devel-2.4.39-8.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122076" comment="openldap2-devel-32bit-2.4.39-8.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122077" comment="openldap2-devel-static-2.4.39-8.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122078" comment="openldap2-doc-2.4.39-8.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6937</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6937" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6937" source="CVE"/>
    <description>
    The __rds_conn_create function in net/rds/connection.c in the Linux kernel through 4.2.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122787" comment="bbswitch-0.8-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122788" comment="bbswitch-kmp-default-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122789" comment="bbswitch-kmp-desktop-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122790" comment="bbswitch-kmp-pae-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122791" comment="bbswitch-kmp-xen-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122792" comment="cloop-2.639-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122793" comment="cloop-kmp-default-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122794" comment="cloop-kmp-desktop-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122795" comment="cloop-kmp-pae-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122796" comment="cloop-kmp-xen-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122797" comment="crash-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122798" comment="crash-devel-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122799" comment="crash-doc-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122800" comment="crash-eppic-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122801" comment="crash-gcore-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122802" comment="crash-kmp-default-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122803" comment="crash-kmp-desktop-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122804" comment="crash-kmp-pae-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122805" comment="crash-kmp-xen-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122806" comment="hdjmod-1.28-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122807" comment="hdjmod-kmp-default-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122808" comment="hdjmod-kmp-desktop-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122809" comment="hdjmod-kmp-pae-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122810" comment="hdjmod-kmp-xen-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122811" comment="ipset-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122812" comment="ipset-devel-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122813" comment="ipset-kmp-default-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122814" comment="ipset-kmp-desktop-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122815" comment="ipset-kmp-pae-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122816" comment="ipset-kmp-xen-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122817" comment="kernel-debug-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122818" comment="kernel-debug-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122819" comment="kernel-debug-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122820" comment="kernel-default-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122821" comment="kernel-default-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122822" comment="kernel-default-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122823" comment="kernel-desktop-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122824" comment="kernel-desktop-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122825" comment="kernel-desktop-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122826" comment="kernel-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122827" comment="kernel-docs-3.16.7-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122828" comment="kernel-ec2-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122829" comment="kernel-ec2-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122830" comment="kernel-ec2-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122831" comment="kernel-macros-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122832" comment="kernel-obs-build-3.16.7-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122833" comment="kernel-obs-qa-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122834" comment="kernel-obs-qa-xen-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122835" comment="kernel-pae-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122836" comment="kernel-pae-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122837" comment="kernel-pae-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122838" comment="kernel-source-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122839" comment="kernel-source-vanilla-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122840" comment="kernel-syms-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122841" comment="kernel-vanilla-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122842" comment="kernel-vanilla-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122843" comment="kernel-xen-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122844" comment="kernel-xen-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122845" comment="kernel-xen-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122846" comment="libipset3-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122847" comment="pcfclock-0.44-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122848" comment="pcfclock-kmp-default-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122849" comment="pcfclock-kmp-desktop-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122850" comment="pcfclock-kmp-pae-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122851" comment="python-virtualbox-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122852" comment="vhba-kmp-20140629-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122853" comment="vhba-kmp-default-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122854" comment="vhba-kmp-desktop-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122855" comment="vhba-kmp-pae-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122856" comment="vhba-kmp-xen-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122857" comment="virtualbox-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122858" comment="virtualbox-devel-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122859" comment="virtualbox-guest-desktop-icons-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122860" comment="virtualbox-guest-kmp-default-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122861" comment="virtualbox-guest-kmp-desktop-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122862" comment="virtualbox-guest-kmp-pae-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122863" comment="virtualbox-guest-tools-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122864" comment="virtualbox-guest-x11-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122865" comment="virtualbox-host-kmp-default-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122866" comment="virtualbox-host-kmp-desktop-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122867" comment="virtualbox-host-kmp-pae-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122868" comment="virtualbox-host-source-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122869" comment="virtualbox-qt-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122870" comment="virtualbox-websrv-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122871" comment="xen-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122872" comment="xen-devel-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122873" comment="xen-doc-html-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122874" comment="xen-kmp-default-4.4.3_08_k3.16.7_32-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122875" comment="xen-kmp-desktop-4.4.3_08_k3.16.7_32-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122876" comment="xen-libs-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122877" comment="xen-libs-32bit-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122878" comment="xen-tools-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122879" comment="xen-tools-domU-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122880" comment="xtables-addons-2.6-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122881" comment="xtables-addons-kmp-default-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122882" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122883" comment="xtables-addons-kmp-pae-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122884" comment="xtables-addons-kmp-xen-2.6_k3.16.7_32-15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20156938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-6938</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-6938" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6938" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the file browser in notebook/notebookapp.py in IPython Notebook before 3.2.2 and Jupyter Notebook 4.0.x before 4.0.5 allows remote attackers to inject arbitrary web script or HTML via a folder name.  NOTE: this was originally reported as a cross-site request forgery (CSRF) vulnerability, but this may be inaccurate.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114896" comment="IPython-2.2.0-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114897" comment="IPython-doc-2.2.0-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114898" comment="python3-IPython-2.2.0-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114899" comment="python3-IPython-doc-2.2.0-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7174</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174" source="CVE"/>
    <description>
    The nsAttrAndChildArray::GrowBy function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors, related to an "overflow."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114737" comment="MozillaFirefox-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114738" comment="MozillaFirefox-branding-upstream-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114739" comment="MozillaFirefox-buildsymbols-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114740" comment="MozillaFirefox-devel-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114741" comment="MozillaFirefox-translations-common-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114742" comment="MozillaFirefox-translations-other-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114757" comment="MozillaThunderbird-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114758" comment="MozillaThunderbird-buildsymbols-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114759" comment="MozillaThunderbird-devel-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114760" comment="MozillaThunderbird-translations-common-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114761" comment="MozillaThunderbird-translations-other-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114762" comment="seamonkey-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114763" comment="seamonkey-dom-inspector-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114764" comment="seamonkey-irc-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114765" comment="seamonkey-translations-common-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114766" comment="seamonkey-translations-other-2.38-20.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7175</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7175" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175" source="CVE"/>
    <description>
    The XULContentSinkImpl::AddText function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors, related to an "overflow."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114737" comment="MozillaFirefox-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114738" comment="MozillaFirefox-branding-upstream-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114739" comment="MozillaFirefox-buildsymbols-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114740" comment="MozillaFirefox-devel-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114741" comment="MozillaFirefox-translations-common-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114742" comment="MozillaFirefox-translations-other-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114757" comment="MozillaThunderbird-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114758" comment="MozillaThunderbird-buildsymbols-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114759" comment="MozillaThunderbird-devel-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114760" comment="MozillaThunderbird-translations-common-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114761" comment="MozillaThunderbird-translations-other-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114762" comment="seamonkey-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114763" comment="seamonkey-dom-inspector-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114764" comment="seamonkey-irc-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114765" comment="seamonkey-translations-common-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114766" comment="seamonkey-translations-other-2.38-20.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7176</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7176" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176" source="CVE"/>
    <description>
    The AnimationThread function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 uses an incorrect argument to the sscanf function, which might allow remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114737" comment="MozillaFirefox-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114738" comment="MozillaFirefox-branding-upstream-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114739" comment="MozillaFirefox-buildsymbols-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114740" comment="MozillaFirefox-devel-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114741" comment="MozillaFirefox-translations-common-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114742" comment="MozillaFirefox-translations-other-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114757" comment="MozillaThunderbird-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114758" comment="MozillaThunderbird-buildsymbols-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114759" comment="MozillaThunderbird-devel-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114760" comment="MozillaThunderbird-translations-common-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114761" comment="MozillaThunderbird-translations-other-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114762" comment="seamonkey-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114763" comment="seamonkey-dom-inspector-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114764" comment="seamonkey-irc-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114765" comment="seamonkey-translations-common-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114766" comment="seamonkey-translations-other-2.38-20.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7177</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7177" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177" source="CVE"/>
    <description>
    The InitTextures function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114737" comment="MozillaFirefox-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114738" comment="MozillaFirefox-branding-upstream-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114739" comment="MozillaFirefox-buildsymbols-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114740" comment="MozillaFirefox-devel-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114741" comment="MozillaFirefox-translations-common-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114742" comment="MozillaFirefox-translations-other-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114757" comment="MozillaThunderbird-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114758" comment="MozillaThunderbird-buildsymbols-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114759" comment="MozillaThunderbird-devel-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114760" comment="MozillaThunderbird-translations-common-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114761" comment="MozillaThunderbird-translations-other-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114762" comment="seamonkey-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114763" comment="seamonkey-dom-inspector-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114764" comment="seamonkey-irc-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114765" comment="seamonkey-translations-common-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114766" comment="seamonkey-translations-other-2.38-20.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7178</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7178" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7178" source="CVE"/>
    <description>
    The ProgramBinary::linkAttributes function in libGLES in ANGLE, as used in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 on Windows, mishandles shader access, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via crafted (1) OpenGL or (2) WebGL content.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114737" comment="MozillaFirefox-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114738" comment="MozillaFirefox-branding-upstream-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114739" comment="MozillaFirefox-buildsymbols-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114740" comment="MozillaFirefox-devel-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114741" comment="MozillaFirefox-translations-common-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114742" comment="MozillaFirefox-translations-other-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114757" comment="MozillaThunderbird-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114758" comment="MozillaThunderbird-buildsymbols-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114759" comment="MozillaThunderbird-devel-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114760" comment="MozillaThunderbird-translations-common-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114761" comment="MozillaThunderbird-translations-other-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114762" comment="seamonkey-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114763" comment="seamonkey-dom-inspector-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114764" comment="seamonkey-irc-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114765" comment="seamonkey-translations-common-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114766" comment="seamonkey-translations-other-2.38-20.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7179</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7179" source="CVE"/>
    <description>
    The VertexBufferInterface::reserveVertexSpace function in libGLES in ANGLE, as used in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 on Windows, incorrectly allocates memory for shader attribute arrays, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via crafted (1) OpenGL or (2) WebGL content.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114737" comment="MozillaFirefox-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114738" comment="MozillaFirefox-branding-upstream-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114739" comment="MozillaFirefox-buildsymbols-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114740" comment="MozillaFirefox-devel-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114741" comment="MozillaFirefox-translations-common-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114742" comment="MozillaFirefox-translations-other-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114757" comment="MozillaThunderbird-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114758" comment="MozillaThunderbird-buildsymbols-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114759" comment="MozillaThunderbird-devel-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114760" comment="MozillaThunderbird-translations-common-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114761" comment="MozillaThunderbird-translations-other-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114762" comment="seamonkey-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114763" comment="seamonkey-dom-inspector-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114764" comment="seamonkey-irc-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114765" comment="seamonkey-translations-common-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114766" comment="seamonkey-translations-other-2.38-20.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7180</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180" source="CVE"/>
    <description>
    The ReadbackResultWriterD3D11::Run function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 misinterprets the return value of a function call, which might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009114737" comment="MozillaFirefox-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114738" comment="MozillaFirefox-branding-upstream-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114739" comment="MozillaFirefox-buildsymbols-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114740" comment="MozillaFirefox-devel-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114741" comment="MozillaFirefox-translations-common-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114742" comment="MozillaFirefox-translations-other-41.0-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114757" comment="MozillaThunderbird-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114758" comment="MozillaThunderbird-buildsymbols-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114759" comment="MozillaThunderbird-devel-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114760" comment="MozillaThunderbird-translations-common-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114761" comment="MozillaThunderbird-translations-other-38.3.0-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114762" comment="seamonkey-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114763" comment="seamonkey-dom-inspector-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114764" comment="seamonkey-irc-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114765" comment="seamonkey-translations-common-2.38-20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009114766" comment="seamonkey-translations-other-2.38-20.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7181</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7181" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181" source="CVE"/>
    <description>
    The sec_asn1d_parse_leaf function in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, improperly restricts access to an unspecified data structure, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OCTET STRING data, related to a "use-after-poison" issue.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009116086" comment="MozillaFirefox-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116087" comment="MozillaFirefox-branding-upstream-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116088" comment="MozillaFirefox-buildsymbols-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116089" comment="MozillaFirefox-devel-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116090" comment="MozillaFirefox-translations-common-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116091" comment="MozillaFirefox-translations-other-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118894" comment="MozillaThunderbird-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118895" comment="MozillaThunderbird-buildsymbols-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118896" comment="MozillaThunderbird-devel-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118897" comment="MozillaThunderbird-translations-common-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118898" comment="MozillaThunderbird-translations-other-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116092" comment="libfreebl3-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116093" comment="libfreebl3-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116094" comment="libsoftokn3-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116095" comment="libsoftokn3-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116016" comment="mozilla-nspr-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116015" comment="mozilla-nspr-32bit-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116017" comment="mozilla-nspr-devel-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116096" comment="mozilla-nss-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116097" comment="mozilla-nss-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116098" comment="mozilla-nss-certs-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116099" comment="mozilla-nss-certs-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116100" comment="mozilla-nss-devel-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116101" comment="mozilla-nss-sysinit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116102" comment="mozilla-nss-sysinit-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116103" comment="mozilla-nss-tools-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116104" comment="seamonkey-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116105" comment="seamonkey-dom-inspector-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116106" comment="seamonkey-irc-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116107" comment="seamonkey-translations-common-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116108" comment="seamonkey-translations-other-2.39-23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7182</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182" source="CVE"/>
    <description>
    Heap-based buffer overflow in the ASN.1 decoder in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OCTET STRING data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009116086" comment="MozillaFirefox-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116087" comment="MozillaFirefox-branding-upstream-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116088" comment="MozillaFirefox-buildsymbols-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116089" comment="MozillaFirefox-devel-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116090" comment="MozillaFirefox-translations-common-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116091" comment="MozillaFirefox-translations-other-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118894" comment="MozillaThunderbird-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118895" comment="MozillaThunderbird-buildsymbols-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118896" comment="MozillaThunderbird-devel-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118897" comment="MozillaThunderbird-translations-common-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118898" comment="MozillaThunderbird-translations-other-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116092" comment="libfreebl3-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116093" comment="libfreebl3-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116094" comment="libsoftokn3-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116095" comment="libsoftokn3-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116016" comment="mozilla-nspr-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116015" comment="mozilla-nspr-32bit-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116017" comment="mozilla-nspr-devel-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116096" comment="mozilla-nss-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116097" comment="mozilla-nss-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116098" comment="mozilla-nss-certs-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116099" comment="mozilla-nss-certs-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116100" comment="mozilla-nss-devel-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116101" comment="mozilla-nss-sysinit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116102" comment="mozilla-nss-sysinit-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116103" comment="mozilla-nss-tools-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116104" comment="seamonkey-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116105" comment="seamonkey-dom-inspector-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116106" comment="seamonkey-irc-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116107" comment="seamonkey-translations-common-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116108" comment="seamonkey-translations-other-2.39-23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7183</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183" source="CVE"/>
    <description>
    Integer overflow in the PL_ARENA_ALLOCATE implementation in Netscape Portable Runtime (NSPR) in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009116086" comment="MozillaFirefox-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116087" comment="MozillaFirefox-branding-upstream-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116088" comment="MozillaFirefox-buildsymbols-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116089" comment="MozillaFirefox-devel-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116090" comment="MozillaFirefox-translations-common-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116091" comment="MozillaFirefox-translations-other-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118894" comment="MozillaThunderbird-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118895" comment="MozillaThunderbird-buildsymbols-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118896" comment="MozillaThunderbird-devel-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118897" comment="MozillaThunderbird-translations-common-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118898" comment="MozillaThunderbird-translations-other-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116092" comment="libfreebl3-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116093" comment="libfreebl3-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116094" comment="libsoftokn3-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116095" comment="libsoftokn3-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116016" comment="mozilla-nspr-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116015" comment="mozilla-nspr-32bit-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116017" comment="mozilla-nspr-devel-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116096" comment="mozilla-nss-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116097" comment="mozilla-nss-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116098" comment="mozilla-nss-certs-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116099" comment="mozilla-nss-certs-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116100" comment="mozilla-nss-devel-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116101" comment="mozilla-nss-sysinit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116102" comment="mozilla-nss-sysinit-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116103" comment="mozilla-nss-tools-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116104" comment="seamonkey-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116105" comment="seamonkey-dom-inspector-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116106" comment="seamonkey-irc-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116107" comment="seamonkey-translations-common-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116108" comment="seamonkey-translations-other-2.39-23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7184</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7184" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7184" source="CVE"/>
    <description>
    The fetch API implementation in Mozilla Firefox before 41.0.2 does not restrict access to the HTTP response body in certain situations where user credentials are supplied but the CORS cross-origin request algorithm is improperly followed, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115130" comment="MozillaFirefox-41.0.2-47.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115131" comment="MozillaFirefox-branding-upstream-41.0.2-47.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115132" comment="MozillaFirefox-buildsymbols-41.0.2-47.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115133" comment="MozillaFirefox-devel-41.0.2-47.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115134" comment="MozillaFirefox-translations-common-41.0.2-47.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115135" comment="MozillaFirefox-translations-other-41.0.2-47.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7185</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7185" source="CVE"/>
    <description>
    Mozilla Firefox before 42.0 on Android does not ensure that the address bar is restored upon fullscreen-mode exit, which allows remote attackers to spoof the address bar via crafted JavaScript code.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009116086" comment="MozillaFirefox-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116087" comment="MozillaFirefox-branding-upstream-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116088" comment="MozillaFirefox-buildsymbols-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116089" comment="MozillaFirefox-devel-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116090" comment="MozillaFirefox-translations-common-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116091" comment="MozillaFirefox-translations-other-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116092" comment="libfreebl3-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116093" comment="libfreebl3-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116094" comment="libsoftokn3-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116095" comment="libsoftokn3-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116016" comment="mozilla-nspr-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116015" comment="mozilla-nspr-32bit-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116017" comment="mozilla-nspr-devel-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116096" comment="mozilla-nss-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116097" comment="mozilla-nss-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116098" comment="mozilla-nss-certs-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116099" comment="mozilla-nss-certs-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116100" comment="mozilla-nss-devel-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116101" comment="mozilla-nss-sysinit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116102" comment="mozilla-nss-sysinit-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116103" comment="mozilla-nss-tools-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116104" comment="seamonkey-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116105" comment="seamonkey-dom-inspector-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116106" comment="seamonkey-irc-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116107" comment="seamonkey-translations-common-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116108" comment="seamonkey-translations-other-2.39-23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7186</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7186" source="CVE"/>
    <description>
    Mozilla Firefox before 42.0 on Android allows user-assisted remote attackers to bypass the Same Origin Policy and trigger (1) a download or (2) cached profile-data reading via a file: URL in a saved HTML document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009116086" comment="MozillaFirefox-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116087" comment="MozillaFirefox-branding-upstream-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116088" comment="MozillaFirefox-buildsymbols-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116089" comment="MozillaFirefox-devel-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116090" comment="MozillaFirefox-translations-common-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116091" comment="MozillaFirefox-translations-other-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116092" comment="libfreebl3-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116093" comment="libfreebl3-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116094" comment="libsoftokn3-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116095" comment="libsoftokn3-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116016" comment="mozilla-nspr-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116015" comment="mozilla-nspr-32bit-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116017" comment="mozilla-nspr-devel-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116096" comment="mozilla-nss-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116097" comment="mozilla-nss-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116098" comment="mozilla-nss-certs-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116099" comment="mozilla-nss-certs-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116100" comment="mozilla-nss-devel-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116101" comment="mozilla-nss-sysinit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116102" comment="mozilla-nss-sysinit-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116103" comment="mozilla-nss-tools-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116104" comment="seamonkey-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116105" comment="seamonkey-dom-inspector-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116106" comment="seamonkey-irc-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116107" comment="seamonkey-translations-common-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116108" comment="seamonkey-translations-other-2.39-23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7187</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7187" source="CVE"/>
    <description>
    The Add-on SDK in Mozilla Firefox before 42.0 misinterprets a "script: false" panel setting, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via inline JavaScript code that is executed within a third-party extension.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009116086" comment="MozillaFirefox-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116087" comment="MozillaFirefox-branding-upstream-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116088" comment="MozillaFirefox-buildsymbols-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116089" comment="MozillaFirefox-devel-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116090" comment="MozillaFirefox-translations-common-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116091" comment="MozillaFirefox-translations-other-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116092" comment="libfreebl3-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116093" comment="libfreebl3-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116094" comment="libsoftokn3-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116095" comment="libsoftokn3-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116016" comment="mozilla-nspr-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116015" comment="mozilla-nspr-32bit-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116017" comment="mozilla-nspr-devel-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116096" comment="mozilla-nss-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116097" comment="mozilla-nss-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116098" comment="mozilla-nss-certs-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116099" comment="mozilla-nss-certs-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116100" comment="mozilla-nss-devel-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116101" comment="mozilla-nss-sysinit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116102" comment="mozilla-nss-sysinit-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116103" comment="mozilla-nss-tools-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116104" comment="seamonkey-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116105" comment="seamonkey-dom-inspector-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116106" comment="seamonkey-irc-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116107" comment="seamonkey-translations-common-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116108" comment="seamonkey-translations-other-2.39-23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7188</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188" source="CVE"/>
    <description>
    Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 allow remote attackers to bypass the Same Origin Policy for an IP address origin, and conduct cross-site scripting (XSS) attacks, by appending whitespace characters to an IP address string.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009116086" comment="MozillaFirefox-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116087" comment="MozillaFirefox-branding-upstream-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116088" comment="MozillaFirefox-buildsymbols-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116089" comment="MozillaFirefox-devel-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116090" comment="MozillaFirefox-translations-common-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116091" comment="MozillaFirefox-translations-other-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118894" comment="MozillaThunderbird-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118895" comment="MozillaThunderbird-buildsymbols-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118896" comment="MozillaThunderbird-devel-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118897" comment="MozillaThunderbird-translations-common-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118898" comment="MozillaThunderbird-translations-other-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116092" comment="libfreebl3-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116093" comment="libfreebl3-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116094" comment="libsoftokn3-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116095" comment="libsoftokn3-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116016" comment="mozilla-nspr-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116015" comment="mozilla-nspr-32bit-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116017" comment="mozilla-nspr-devel-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116096" comment="mozilla-nss-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116097" comment="mozilla-nss-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116098" comment="mozilla-nss-certs-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116099" comment="mozilla-nss-certs-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116100" comment="mozilla-nss-devel-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116101" comment="mozilla-nss-sysinit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116102" comment="mozilla-nss-sysinit-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116103" comment="mozilla-nss-tools-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116104" comment="seamonkey-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116105" comment="seamonkey-dom-inspector-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116106" comment="seamonkey-irc-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116107" comment="seamonkey-translations-common-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116108" comment="seamonkey-translations-other-2.39-23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7189</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7189" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189" source="CVE"/>
    <description>
    Race condition in the JPEGEncoder function in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow) via vectors involving a CANVAS element and crafted JavaScript code.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009116086" comment="MozillaFirefox-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116087" comment="MozillaFirefox-branding-upstream-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116088" comment="MozillaFirefox-buildsymbols-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116089" comment="MozillaFirefox-devel-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116090" comment="MozillaFirefox-translations-common-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116091" comment="MozillaFirefox-translations-other-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118894" comment="MozillaThunderbird-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118895" comment="MozillaThunderbird-buildsymbols-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118896" comment="MozillaThunderbird-devel-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118897" comment="MozillaThunderbird-translations-common-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118898" comment="MozillaThunderbird-translations-other-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116092" comment="libfreebl3-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116093" comment="libfreebl3-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116094" comment="libsoftokn3-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116095" comment="libsoftokn3-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116016" comment="mozilla-nspr-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116015" comment="mozilla-nspr-32bit-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116017" comment="mozilla-nspr-devel-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116096" comment="mozilla-nss-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116097" comment="mozilla-nss-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116098" comment="mozilla-nss-certs-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116099" comment="mozilla-nss-certs-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116100" comment="mozilla-nss-devel-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116101" comment="mozilla-nss-sysinit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116102" comment="mozilla-nss-sysinit-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116103" comment="mozilla-nss-tools-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116104" comment="seamonkey-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116105" comment="seamonkey-dom-inspector-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116106" comment="seamonkey-irc-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116107" comment="seamonkey-translations-common-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116108" comment="seamonkey-translations-other-2.39-23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7190</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7190" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7190" source="CVE"/>
    <description>
    The Search feature in Mozilla Firefox before 42.0 on Android through 4.4 supports search-engine URL registration through an intent and can access this URL in a privileged context in conjunction with the crash reporter, which allows attackers to read log files and visit file: URLs of HTML documents via a crafted application.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009116086" comment="MozillaFirefox-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116087" comment="MozillaFirefox-branding-upstream-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116088" comment="MozillaFirefox-buildsymbols-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116089" comment="MozillaFirefox-devel-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116090" comment="MozillaFirefox-translations-common-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116091" comment="MozillaFirefox-translations-other-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116092" comment="libfreebl3-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116093" comment="libfreebl3-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116094" comment="libsoftokn3-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116095" comment="libsoftokn3-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116016" comment="mozilla-nspr-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116015" comment="mozilla-nspr-32bit-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116017" comment="mozilla-nspr-devel-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116096" comment="mozilla-nss-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116097" comment="mozilla-nss-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116098" comment="mozilla-nss-certs-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116099" comment="mozilla-nss-certs-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116100" comment="mozilla-nss-devel-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116101" comment="mozilla-nss-sysinit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116102" comment="mozilla-nss-sysinit-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116103" comment="mozilla-nss-tools-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116104" comment="seamonkey-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116105" comment="seamonkey-dom-inspector-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116106" comment="seamonkey-irc-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116107" comment="seamonkey-translations-common-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116108" comment="seamonkey-translations-other-2.39-23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7191</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7191" source="CVE"/>
    <description>
    Mozilla Firefox before 42.0 on Android improperly restricts URL strings in intents, which allows attackers to conduct cross-site scripting (XSS) attacks via vectors involving an intent: URL and fallback navigation, aka "Universal XSS (UXSS)."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009116086" comment="MozillaFirefox-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116087" comment="MozillaFirefox-branding-upstream-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116088" comment="MozillaFirefox-buildsymbols-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116089" comment="MozillaFirefox-devel-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116090" comment="MozillaFirefox-translations-common-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116091" comment="MozillaFirefox-translations-other-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116092" comment="libfreebl3-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116093" comment="libfreebl3-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116094" comment="libsoftokn3-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116095" comment="libsoftokn3-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116016" comment="mozilla-nspr-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116015" comment="mozilla-nspr-32bit-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116017" comment="mozilla-nspr-devel-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116096" comment="mozilla-nss-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116097" comment="mozilla-nss-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116098" comment="mozilla-nss-certs-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116099" comment="mozilla-nss-certs-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116100" comment="mozilla-nss-devel-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116101" comment="mozilla-nss-sysinit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116102" comment="mozilla-nss-sysinit-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116103" comment="mozilla-nss-tools-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116104" comment="seamonkey-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116105" comment="seamonkey-dom-inspector-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116106" comment="seamonkey-irc-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116107" comment="seamonkey-translations-common-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116108" comment="seamonkey-translations-other-2.39-23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7192</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7192" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7192" source="CVE"/>
    <description>
    The accessibility-tools feature in Mozilla Firefox before 42.0 on OS X improperly interacts with the implementation of the TABLE element, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code by using an NSAccessibilityIndexAttribute value to reference a row index.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009116086" comment="MozillaFirefox-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116087" comment="MozillaFirefox-branding-upstream-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116088" comment="MozillaFirefox-buildsymbols-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116089" comment="MozillaFirefox-devel-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116090" comment="MozillaFirefox-translations-common-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116091" comment="MozillaFirefox-translations-other-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116092" comment="libfreebl3-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116093" comment="libfreebl3-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116094" comment="libsoftokn3-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116095" comment="libsoftokn3-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116016" comment="mozilla-nspr-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116015" comment="mozilla-nspr-32bit-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116017" comment="mozilla-nspr-devel-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116096" comment="mozilla-nss-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116097" comment="mozilla-nss-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116098" comment="mozilla-nss-certs-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116099" comment="mozilla-nss-certs-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116100" comment="mozilla-nss-devel-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116101" comment="mozilla-nss-sysinit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116102" comment="mozilla-nss-sysinit-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116103" comment="mozilla-nss-tools-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116104" comment="seamonkey-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116105" comment="seamonkey-dom-inspector-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116106" comment="seamonkey-irc-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116107" comment="seamonkey-translations-common-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116108" comment="seamonkey-translations-other-2.39-23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7193</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7193" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193" source="CVE"/>
    <description>
    Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 improperly follow the CORS cross-origin request algorithm for the POST method in situations involving an unspecified Content-Type header manipulation, which allows remote attackers to bypass the Same Origin Policy by leveraging the lack of a preflight-request step.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009116086" comment="MozillaFirefox-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116087" comment="MozillaFirefox-branding-upstream-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116088" comment="MozillaFirefox-buildsymbols-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116089" comment="MozillaFirefox-devel-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116090" comment="MozillaFirefox-translations-common-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116091" comment="MozillaFirefox-translations-other-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118894" comment="MozillaThunderbird-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118895" comment="MozillaThunderbird-buildsymbols-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118896" comment="MozillaThunderbird-devel-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118897" comment="MozillaThunderbird-translations-common-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118898" comment="MozillaThunderbird-translations-other-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116092" comment="libfreebl3-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116093" comment="libfreebl3-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116094" comment="libsoftokn3-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116095" comment="libsoftokn3-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116016" comment="mozilla-nspr-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116015" comment="mozilla-nspr-32bit-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116017" comment="mozilla-nspr-devel-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116096" comment="mozilla-nss-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116097" comment="mozilla-nss-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116098" comment="mozilla-nss-certs-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116099" comment="mozilla-nss-certs-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116100" comment="mozilla-nss-devel-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116101" comment="mozilla-nss-sysinit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116102" comment="mozilla-nss-sysinit-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116103" comment="mozilla-nss-tools-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116104" comment="seamonkey-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116105" comment="seamonkey-dom-inspector-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116106" comment="seamonkey-irc-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116107" comment="seamonkey-translations-common-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116108" comment="seamonkey-translations-other-2.39-23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7194</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7194" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194" source="CVE"/>
    <description>
    Buffer underflow in libjar in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted ZIP archive.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009116086" comment="MozillaFirefox-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116087" comment="MozillaFirefox-branding-upstream-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116088" comment="MozillaFirefox-buildsymbols-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116089" comment="MozillaFirefox-devel-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116090" comment="MozillaFirefox-translations-common-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116091" comment="MozillaFirefox-translations-other-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118894" comment="MozillaThunderbird-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118895" comment="MozillaThunderbird-buildsymbols-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118896" comment="MozillaThunderbird-devel-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118897" comment="MozillaThunderbird-translations-common-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118898" comment="MozillaThunderbird-translations-other-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116092" comment="libfreebl3-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116093" comment="libfreebl3-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116094" comment="libsoftokn3-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116095" comment="libsoftokn3-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116016" comment="mozilla-nspr-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116015" comment="mozilla-nspr-32bit-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116017" comment="mozilla-nspr-devel-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116096" comment="mozilla-nss-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116097" comment="mozilla-nss-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116098" comment="mozilla-nss-certs-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116099" comment="mozilla-nss-certs-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116100" comment="mozilla-nss-devel-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116101" comment="mozilla-nss-sysinit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116102" comment="mozilla-nss-sysinit-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116103" comment="mozilla-nss-tools-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116104" comment="seamonkey-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116105" comment="seamonkey-dom-inspector-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116106" comment="seamonkey-irc-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116107" comment="seamonkey-translations-common-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116108" comment="seamonkey-translations-other-2.39-23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7195</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7195" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7195" source="CVE"/>
    <description>
    The URL parsing implementation in Mozilla Firefox before 42.0 improperly recognizes escaped characters in hostnames within Location headers, which allows remote attackers to obtain sensitive information via vectors involving a redirect.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009116086" comment="MozillaFirefox-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116087" comment="MozillaFirefox-branding-upstream-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116088" comment="MozillaFirefox-buildsymbols-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116089" comment="MozillaFirefox-devel-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116090" comment="MozillaFirefox-translations-common-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116091" comment="MozillaFirefox-translations-other-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116092" comment="libfreebl3-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116093" comment="libfreebl3-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116094" comment="libsoftokn3-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116095" comment="libsoftokn3-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116016" comment="mozilla-nspr-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116015" comment="mozilla-nspr-32bit-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116017" comment="mozilla-nspr-devel-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116096" comment="mozilla-nss-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116097" comment="mozilla-nss-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116098" comment="mozilla-nss-certs-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116099" comment="mozilla-nss-certs-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116100" comment="mozilla-nss-devel-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116101" comment="mozilla-nss-sysinit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116102" comment="mozilla-nss-sysinit-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116103" comment="mozilla-nss-tools-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116104" comment="seamonkey-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116105" comment="seamonkey-dom-inspector-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116106" comment="seamonkey-irc-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116107" comment="seamonkey-translations-common-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116108" comment="seamonkey-translations-other-2.39-23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7196</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7196" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196" source="CVE"/>
    <description>
    Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4, when a Java plugin is enabled, allow remote attackers to cause a denial of service (incorrect garbage collection and application crash) or possibly execute arbitrary code via a crafted Java applet that deallocates an in-use JavaScript wrapper.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009116086" comment="MozillaFirefox-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116087" comment="MozillaFirefox-branding-upstream-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116088" comment="MozillaFirefox-buildsymbols-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116089" comment="MozillaFirefox-devel-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116090" comment="MozillaFirefox-translations-common-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116091" comment="MozillaFirefox-translations-other-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118894" comment="MozillaThunderbird-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118895" comment="MozillaThunderbird-buildsymbols-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118896" comment="MozillaThunderbird-devel-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118897" comment="MozillaThunderbird-translations-common-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118898" comment="MozillaThunderbird-translations-other-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116092" comment="libfreebl3-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116093" comment="libfreebl3-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116094" comment="libsoftokn3-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116095" comment="libsoftokn3-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116016" comment="mozilla-nspr-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116015" comment="mozilla-nspr-32bit-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116017" comment="mozilla-nspr-devel-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116096" comment="mozilla-nss-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116097" comment="mozilla-nss-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116098" comment="mozilla-nss-certs-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116099" comment="mozilla-nss-certs-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116100" comment="mozilla-nss-devel-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116101" comment="mozilla-nss-sysinit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116102" comment="mozilla-nss-sysinit-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116103" comment="mozilla-nss-tools-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116104" comment="seamonkey-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116105" comment="seamonkey-dom-inspector-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116106" comment="seamonkey-irc-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116107" comment="seamonkey-translations-common-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116108" comment="seamonkey-translations-other-2.39-23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7197</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7197" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197" source="CVE"/>
    <description>
    Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 improperly control the ability of a web worker to create a WebSocket object, which allows remote attackers to bypass intended mixed-content restrictions via crafted JavaScript code.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009116086" comment="MozillaFirefox-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116087" comment="MozillaFirefox-branding-upstream-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116088" comment="MozillaFirefox-buildsymbols-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116089" comment="MozillaFirefox-devel-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116090" comment="MozillaFirefox-translations-common-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116091" comment="MozillaFirefox-translations-other-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118894" comment="MozillaThunderbird-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118895" comment="MozillaThunderbird-buildsymbols-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118896" comment="MozillaThunderbird-devel-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118897" comment="MozillaThunderbird-translations-common-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118898" comment="MozillaThunderbird-translations-other-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116092" comment="libfreebl3-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116093" comment="libfreebl3-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116094" comment="libsoftokn3-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116095" comment="libsoftokn3-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116016" comment="mozilla-nspr-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116015" comment="mozilla-nspr-32bit-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116017" comment="mozilla-nspr-devel-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116096" comment="mozilla-nss-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116097" comment="mozilla-nss-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116098" comment="mozilla-nss-certs-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116099" comment="mozilla-nss-certs-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116100" comment="mozilla-nss-devel-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116101" comment="mozilla-nss-sysinit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116102" comment="mozilla-nss-sysinit-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116103" comment="mozilla-nss-tools-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116104" comment="seamonkey-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116105" comment="seamonkey-dom-inspector-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116106" comment="seamonkey-irc-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116107" comment="seamonkey-translations-common-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116108" comment="seamonkey-translations-other-2.39-23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7198</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7198" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198" source="CVE"/>
    <description>
    Buffer overflow in the rx::TextureStorage11 class in ANGLE, as used in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted texture data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009116086" comment="MozillaFirefox-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116087" comment="MozillaFirefox-branding-upstream-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116088" comment="MozillaFirefox-buildsymbols-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116089" comment="MozillaFirefox-devel-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116090" comment="MozillaFirefox-translations-common-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116091" comment="MozillaFirefox-translations-other-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118894" comment="MozillaThunderbird-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118895" comment="MozillaThunderbird-buildsymbols-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118896" comment="MozillaThunderbird-devel-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118897" comment="MozillaThunderbird-translations-common-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118898" comment="MozillaThunderbird-translations-other-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116092" comment="libfreebl3-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116093" comment="libfreebl3-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116094" comment="libsoftokn3-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116095" comment="libsoftokn3-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116016" comment="mozilla-nspr-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116015" comment="mozilla-nspr-32bit-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116017" comment="mozilla-nspr-devel-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116096" comment="mozilla-nss-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116097" comment="mozilla-nss-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116098" comment="mozilla-nss-certs-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116099" comment="mozilla-nss-certs-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116100" comment="mozilla-nss-devel-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116101" comment="mozilla-nss-sysinit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116102" comment="mozilla-nss-sysinit-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116103" comment="mozilla-nss-tools-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116104" comment="seamonkey-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116105" comment="seamonkey-dom-inspector-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116106" comment="seamonkey-irc-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116107" comment="seamonkey-translations-common-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116108" comment="seamonkey-translations-other-2.39-23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7199</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7199" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199" source="CVE"/>
    <description>
    The (1) AddWeightedPathSegLists and (2) SVGPathSegListSMILType::Interpolate functions in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 lack status checking, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted SVG document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009116086" comment="MozillaFirefox-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116087" comment="MozillaFirefox-branding-upstream-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116088" comment="MozillaFirefox-buildsymbols-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116089" comment="MozillaFirefox-devel-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116090" comment="MozillaFirefox-translations-common-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116091" comment="MozillaFirefox-translations-other-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118894" comment="MozillaThunderbird-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118895" comment="MozillaThunderbird-buildsymbols-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118896" comment="MozillaThunderbird-devel-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118897" comment="MozillaThunderbird-translations-common-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118898" comment="MozillaThunderbird-translations-other-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116092" comment="libfreebl3-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116093" comment="libfreebl3-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116094" comment="libsoftokn3-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116095" comment="libsoftokn3-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116016" comment="mozilla-nspr-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116015" comment="mozilla-nspr-32bit-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116017" comment="mozilla-nspr-devel-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116096" comment="mozilla-nss-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116097" comment="mozilla-nss-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116098" comment="mozilla-nss-certs-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116099" comment="mozilla-nss-certs-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116100" comment="mozilla-nss-devel-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116101" comment="mozilla-nss-sysinit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116102" comment="mozilla-nss-sysinit-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116103" comment="mozilla-nss-tools-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116104" comment="seamonkey-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116105" comment="seamonkey-dom-inspector-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116106" comment="seamonkey-irc-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116107" comment="seamonkey-translations-common-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116108" comment="seamonkey-translations-other-2.39-23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7200</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7200" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200" source="CVE"/>
    <description>
    The CryptoKey interface implementation in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 lacks status checking, which allows attackers to have an unspecified impact via vectors related to a cryptographic key.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009116086" comment="MozillaFirefox-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116087" comment="MozillaFirefox-branding-upstream-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116088" comment="MozillaFirefox-buildsymbols-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116089" comment="MozillaFirefox-devel-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116090" comment="MozillaFirefox-translations-common-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116091" comment="MozillaFirefox-translations-other-42.0-50.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118894" comment="MozillaThunderbird-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118895" comment="MozillaThunderbird-buildsymbols-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118896" comment="MozillaThunderbird-devel-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118897" comment="MozillaThunderbird-translations-common-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118898" comment="MozillaThunderbird-translations-other-38.4.0-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116092" comment="libfreebl3-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116093" comment="libfreebl3-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116094" comment="libsoftokn3-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116095" comment="libsoftokn3-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116016" comment="mozilla-nspr-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116015" comment="mozilla-nspr-32bit-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116017" comment="mozilla-nspr-devel-4.10.10-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116096" comment="mozilla-nss-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116097" comment="mozilla-nss-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116098" comment="mozilla-nss-certs-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116099" comment="mozilla-nss-certs-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116100" comment="mozilla-nss-devel-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116101" comment="mozilla-nss-sysinit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116102" comment="mozilla-nss-sysinit-32bit-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116103" comment="mozilla-nss-tools-3.20.1-19.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116104" comment="seamonkey-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116105" comment="seamonkey-dom-inspector-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116106" comment="seamonkey-irc-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116107" comment="seamonkey-translations-common-2.39-23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116108" comment="seamonkey-translations-other-2.39-23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7201</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7201" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119922" comment="MozillaFirefox-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119923" comment="MozillaFirefox-branding-upstream-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119924" comment="MozillaFirefox-buildsymbols-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119925" comment="MozillaFirefox-devel-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119926" comment="MozillaFirefox-translations-common-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119927" comment="MozillaFirefox-translations-other-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120945" comment="MozillaThunderbird-38.5.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120946" comment="MozillaThunderbird-buildsymbols-38.5.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120947" comment="MozillaThunderbird-devel-38.5.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120948" comment="MozillaThunderbird-translations-common-38.5.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120949" comment="MozillaThunderbird-translations-other-38.5.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122722" comment="seamonkey-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122723" comment="seamonkey-dom-inspector-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122724" comment="seamonkey-irc-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122725" comment="seamonkey-translations-common-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122726" comment="seamonkey-translations-other-2.40-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7202</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7202" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7202" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 43.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119922" comment="MozillaFirefox-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119923" comment="MozillaFirefox-branding-upstream-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119924" comment="MozillaFirefox-buildsymbols-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119925" comment="MozillaFirefox-devel-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119926" comment="MozillaFirefox-translations-common-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119927" comment="MozillaFirefox-translations-other-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122722" comment="seamonkey-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122723" comment="seamonkey-dom-inspector-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122724" comment="seamonkey-irc-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122725" comment="seamonkey-translations-common-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122726" comment="seamonkey-translations-other-2.40-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7203</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7203" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7203" source="CVE"/>
    <description>
    Buffer overflow in the DirectWriteFontInfo::LoadFontFamilyData function in gfx/thebes/gfxDWriteFontList.cpp in Mozilla Firefox before 43.0 might allow remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted font-family name.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119922" comment="MozillaFirefox-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119923" comment="MozillaFirefox-branding-upstream-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119924" comment="MozillaFirefox-buildsymbols-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119925" comment="MozillaFirefox-devel-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119926" comment="MozillaFirefox-translations-common-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119927" comment="MozillaFirefox-translations-other-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122722" comment="seamonkey-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122723" comment="seamonkey-dom-inspector-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122724" comment="seamonkey-irc-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122725" comment="seamonkey-translations-common-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122726" comment="seamonkey-translations-other-2.40-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7204</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7204" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7204" source="CVE"/>
    <description>
    Mozilla Firefox before 43.0 does not properly store the properties of unboxed objects, which allows remote attackers to execute arbitrary code via crafted JavaScript variable assignments.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119922" comment="MozillaFirefox-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119923" comment="MozillaFirefox-branding-upstream-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119924" comment="MozillaFirefox-buildsymbols-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119925" comment="MozillaFirefox-devel-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119926" comment="MozillaFirefox-translations-common-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119927" comment="MozillaFirefox-translations-other-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122722" comment="seamonkey-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122723" comment="seamonkey-dom-inspector-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122724" comment="seamonkey-irc-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122725" comment="seamonkey-translations-common-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122726" comment="seamonkey-translations-other-2.40-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7205</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7205" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205" source="CVE"/>
    <description>
    Integer underflow in the RTPReceiverVideo::ParseRtpPacket function in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 might allow remote attackers to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a crafted WebRTC RTP packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119922" comment="MozillaFirefox-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119923" comment="MozillaFirefox-branding-upstream-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119924" comment="MozillaFirefox-buildsymbols-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119925" comment="MozillaFirefox-devel-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119926" comment="MozillaFirefox-translations-common-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119927" comment="MozillaFirefox-translations-other-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120945" comment="MozillaThunderbird-38.5.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120946" comment="MozillaThunderbird-buildsymbols-38.5.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120947" comment="MozillaThunderbird-devel-38.5.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120948" comment="MozillaThunderbird-translations-common-38.5.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120949" comment="MozillaThunderbird-translations-other-38.5.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122722" comment="seamonkey-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122723" comment="seamonkey-dom-inspector-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122724" comment="seamonkey-irc-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122725" comment="seamonkey-translations-common-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122726" comment="seamonkey-translations-other-2.40-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7207</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7207" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7207" source="CVE"/>
    <description>
    Mozilla Firefox before 43.0 does not properly restrict the availability of IFRAME Resource Timing API times, which allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via crafted JavaScript code that leverages history.back and performance.getEntries calls, a related issue to CVE-2015-1300.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119922" comment="MozillaFirefox-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119923" comment="MozillaFirefox-branding-upstream-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119924" comment="MozillaFirefox-buildsymbols-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119925" comment="MozillaFirefox-devel-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119926" comment="MozillaFirefox-translations-common-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119927" comment="MozillaFirefox-translations-other-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125364" comment="MozillaThunderbird-38.7.0-40.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125365" comment="MozillaThunderbird-buildsymbols-38.7.0-40.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125366" comment="MozillaThunderbird-devel-38.7.0-40.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125367" comment="MozillaThunderbird-translations-common-38.7.0-40.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125368" comment="MozillaThunderbird-translations-other-38.7.0-40.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122722" comment="seamonkey-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122723" comment="seamonkey-dom-inspector-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122724" comment="seamonkey-irc-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122725" comment="seamonkey-translations-common-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122726" comment="seamonkey-translations-other-2.40-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7208</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7208" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7208" source="CVE"/>
    <description>
    Mozilla Firefox before 43.0 stores cookies containing vertical tab characters, which allows remote attackers to obtain sensitive information by reading HTTP Cookie headers.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122727" comment="MozillaFirefox-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122728" comment="MozillaFirefox-branding-upstream-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122729" comment="MozillaFirefox-buildsymbols-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122730" comment="MozillaFirefox-devel-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122731" comment="MozillaFirefox-translations-common-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122732" comment="MozillaFirefox-translations-other-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122733" comment="libfreebl3-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122734" comment="libfreebl3-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122735" comment="libsoftokn3-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122736" comment="libsoftokn3-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122737" comment="mozilla-nspr-4.11-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122738" comment="mozilla-nspr-32bit-4.11-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122739" comment="mozilla-nspr-devel-4.11-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122740" comment="mozilla-nss-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122741" comment="mozilla-nss-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122742" comment="mozilla-nss-certs-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122743" comment="mozilla-nss-certs-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122744" comment="mozilla-nss-devel-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122745" comment="mozilla-nss-sysinit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122746" comment="mozilla-nss-sysinit-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122747" comment="mozilla-nss-tools-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122722" comment="seamonkey-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122723" comment="seamonkey-dom-inspector-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122724" comment="seamonkey-irc-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122725" comment="seamonkey-translations-common-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122726" comment="seamonkey-translations-other-2.40-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7210</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7210" source="CVE"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 allows remote attackers to execute arbitrary code by triggering attempted use of a data channel that has been closed by a WebRTC function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119922" comment="MozillaFirefox-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119923" comment="MozillaFirefox-branding-upstream-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119924" comment="MozillaFirefox-buildsymbols-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119925" comment="MozillaFirefox-devel-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119926" comment="MozillaFirefox-translations-common-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119927" comment="MozillaFirefox-translations-other-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120945" comment="MozillaThunderbird-38.5.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120946" comment="MozillaThunderbird-buildsymbols-38.5.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120947" comment="MozillaThunderbird-devel-38.5.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120948" comment="MozillaThunderbird-translations-common-38.5.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120949" comment="MozillaThunderbird-translations-other-38.5.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122722" comment="seamonkey-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122723" comment="seamonkey-dom-inspector-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122724" comment="seamonkey-irc-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122725" comment="seamonkey-translations-common-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122726" comment="seamonkey-translations-other-2.40-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7211</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7211" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7211" source="CVE"/>
    <description>
    Mozilla Firefox before 43.0 mishandles the # (number sign) character in a data: URI, which allows remote attackers to spoof web sites via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119922" comment="MozillaFirefox-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119923" comment="MozillaFirefox-branding-upstream-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119924" comment="MozillaFirefox-buildsymbols-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119925" comment="MozillaFirefox-devel-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119926" comment="MozillaFirefox-translations-common-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119927" comment="MozillaFirefox-translations-other-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122722" comment="seamonkey-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122723" comment="seamonkey-dom-inspector-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122724" comment="seamonkey-irc-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122725" comment="seamonkey-translations-common-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122726" comment="seamonkey-translations-other-2.40-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7212</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7212" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212" source="CVE"/>
    <description>
    Integer overflow in the mozilla::layers::BufferTextureClient::AllocateForSurface function in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 allows remote attackers to execute arbitrary code by triggering a graphics operation that requires a large texture allocation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119922" comment="MozillaFirefox-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119923" comment="MozillaFirefox-branding-upstream-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119924" comment="MozillaFirefox-buildsymbols-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119925" comment="MozillaFirefox-devel-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119926" comment="MozillaFirefox-translations-common-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119927" comment="MozillaFirefox-translations-other-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120945" comment="MozillaThunderbird-38.5.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120946" comment="MozillaThunderbird-buildsymbols-38.5.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120947" comment="MozillaThunderbird-devel-38.5.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120948" comment="MozillaThunderbird-translations-common-38.5.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120949" comment="MozillaThunderbird-translations-other-38.5.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122722" comment="seamonkey-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122723" comment="seamonkey-dom-inspector-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122724" comment="seamonkey-irc-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122725" comment="seamonkey-translations-common-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122726" comment="seamonkey-translations-other-2.40-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7213</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7213" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213" source="CVE"/>
    <description>
    Integer overflow in the MPEG4Extractor::readMetaData function in MPEG4Extractor.cpp in libstagefright in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 on 64-bit platforms allows remote attackers to execute arbitrary code via a crafted MP4 video file that triggers a buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119922" comment="MozillaFirefox-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119923" comment="MozillaFirefox-branding-upstream-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119924" comment="MozillaFirefox-buildsymbols-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119925" comment="MozillaFirefox-devel-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119926" comment="MozillaFirefox-translations-common-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119927" comment="MozillaFirefox-translations-other-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120945" comment="MozillaThunderbird-38.5.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120946" comment="MozillaThunderbird-buildsymbols-38.5.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120947" comment="MozillaThunderbird-devel-38.5.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120948" comment="MozillaThunderbird-translations-common-38.5.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120949" comment="MozillaThunderbird-translations-other-38.5.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122722" comment="seamonkey-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122723" comment="seamonkey-dom-inspector-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122724" comment="seamonkey-irc-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122725" comment="seamonkey-translations-common-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122726" comment="seamonkey-translations-other-2.40-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7214</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7214" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214" source="CVE"/>
    <description>
    Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 allow remote attackers to bypass the Same Origin Policy via data: and view-source: URIs.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119922" comment="MozillaFirefox-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119923" comment="MozillaFirefox-branding-upstream-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119924" comment="MozillaFirefox-buildsymbols-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119925" comment="MozillaFirefox-devel-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119926" comment="MozillaFirefox-translations-common-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119927" comment="MozillaFirefox-translations-other-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120945" comment="MozillaThunderbird-38.5.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120946" comment="MozillaThunderbird-buildsymbols-38.5.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120947" comment="MozillaThunderbird-devel-38.5.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120948" comment="MozillaThunderbird-translations-common-38.5.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120949" comment="MozillaThunderbird-translations-other-38.5.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122722" comment="seamonkey-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122723" comment="seamonkey-dom-inspector-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122724" comment="seamonkey-irc-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122725" comment="seamonkey-translations-common-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122726" comment="seamonkey-translations-other-2.40-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7215</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7215" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7215" source="CVE"/>
    <description>
    The importScripts function in the Web Workers API implementation in Mozilla Firefox before 43.0 allows remote attackers to bypass the Same Origin Policy by triggering use of the no-cors mode in the fetch API to attempt resource access that throws an exception, leading to information disclosure after a rethrow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119922" comment="MozillaFirefox-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119923" comment="MozillaFirefox-branding-upstream-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119924" comment="MozillaFirefox-buildsymbols-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119925" comment="MozillaFirefox-devel-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119926" comment="MozillaFirefox-translations-common-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119927" comment="MozillaFirefox-translations-other-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122722" comment="seamonkey-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122723" comment="seamonkey-dom-inspector-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122724" comment="seamonkey-irc-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122725" comment="seamonkey-translations-common-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122726" comment="seamonkey-translations-other-2.40-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7216</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7216" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7216" source="CVE"/>
    <description>
    The gdk-pixbuf configuration in Mozilla Firefox before 43.0 on Linux GNOME platforms incorrectly enables the JasPer decoder, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted JPEG 2000 image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119922" comment="MozillaFirefox-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119923" comment="MozillaFirefox-branding-upstream-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119924" comment="MozillaFirefox-buildsymbols-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119925" comment="MozillaFirefox-devel-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119926" comment="MozillaFirefox-translations-common-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119927" comment="MozillaFirefox-translations-other-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122722" comment="seamonkey-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122723" comment="seamonkey-dom-inspector-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122724" comment="seamonkey-irc-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122725" comment="seamonkey-translations-common-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122726" comment="seamonkey-translations-other-2.40-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7217</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7217" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7217" source="CVE"/>
    <description>
    The gdk-pixbuf configuration in Mozilla Firefox before 43.0 on Linux GNOME platforms incorrectly enables the TGA decoder, which allows remote attackers to cause a denial of service (heap-based buffer overflow) via a crafted Truevision TGA image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119922" comment="MozillaFirefox-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119923" comment="MozillaFirefox-branding-upstream-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119924" comment="MozillaFirefox-buildsymbols-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119925" comment="MozillaFirefox-devel-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119926" comment="MozillaFirefox-translations-common-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119927" comment="MozillaFirefox-translations-other-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122722" comment="seamonkey-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122723" comment="seamonkey-dom-inspector-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122724" comment="seamonkey-irc-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122725" comment="seamonkey-translations-common-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122726" comment="seamonkey-translations-other-2.40-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7218</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7218" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7218" source="CVE"/>
    <description>
    The HTTP/2 implementation in Mozilla Firefox before 43.0 allows remote attackers to cause a denial of service (integer underflow, assertion failure, and application exit) via a single-byte header frame that triggers incorrect memory allocation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119922" comment="MozillaFirefox-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119923" comment="MozillaFirefox-branding-upstream-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119924" comment="MozillaFirefox-buildsymbols-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119925" comment="MozillaFirefox-devel-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119926" comment="MozillaFirefox-translations-common-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119927" comment="MozillaFirefox-translations-other-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122722" comment="seamonkey-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122723" comment="seamonkey-dom-inspector-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122724" comment="seamonkey-irc-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122725" comment="seamonkey-translations-common-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122726" comment="seamonkey-translations-other-2.40-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7219</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7219" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7219" source="CVE"/>
    <description>
    The HTTP/2 implementation in Mozilla Firefox before 43.0 allows remote attackers to cause a denial of service (integer underflow, assertion failure, and application exit) via a malformed PushPromise frame that triggers decompressed-buffer length miscalculation and incorrect memory allocation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119922" comment="MozillaFirefox-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119923" comment="MozillaFirefox-branding-upstream-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119924" comment="MozillaFirefox-buildsymbols-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119925" comment="MozillaFirefox-devel-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119926" comment="MozillaFirefox-translations-common-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119927" comment="MozillaFirefox-translations-other-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122722" comment="seamonkey-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122723" comment="seamonkey-dom-inspector-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122724" comment="seamonkey-irc-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122725" comment="seamonkey-translations-common-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122726" comment="seamonkey-translations-other-2.40-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7220</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7220" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7220" source="CVE"/>
    <description>
    Buffer overflow in the XDRBuffer::grow function in js/src/vm/Xdr.cpp in Mozilla Firefox before 43.0 might allow remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119922" comment="MozillaFirefox-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119923" comment="MozillaFirefox-branding-upstream-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119924" comment="MozillaFirefox-buildsymbols-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119925" comment="MozillaFirefox-devel-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119926" comment="MozillaFirefox-translations-common-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119927" comment="MozillaFirefox-translations-other-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122722" comment="seamonkey-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122723" comment="seamonkey-dom-inspector-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122724" comment="seamonkey-irc-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122725" comment="seamonkey-translations-common-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122726" comment="seamonkey-translations-other-2.40-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7221</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7221" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7221" source="CVE"/>
    <description>
    Buffer overflow in the nsDeque::GrowCapacity function in xpcom/glue/nsDeque.cpp in Mozilla Firefox before 43.0 might allow remote attackers to cause a denial of service or possibly have unspecified other impact by triggering a deque size change.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119922" comment="MozillaFirefox-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119923" comment="MozillaFirefox-branding-upstream-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119924" comment="MozillaFirefox-buildsymbols-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119925" comment="MozillaFirefox-devel-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119926" comment="MozillaFirefox-translations-common-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119927" comment="MozillaFirefox-translations-other-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122722" comment="seamonkey-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122723" comment="seamonkey-dom-inspector-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122724" comment="seamonkey-irc-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122725" comment="seamonkey-translations-common-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122726" comment="seamonkey-translations-other-2.40-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7222</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7222" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7222" source="CVE"/>
    <description>
    Integer underflow in the Metadata::setData function in MetaData.cpp in libstagefright in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.5 allows remote attackers to execute arbitrary code or cause a denial of service (incorrect memory allocation and application crash) via an MP4 video file with crafted covr metadata that triggers a buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119922" comment="MozillaFirefox-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119923" comment="MozillaFirefox-branding-upstream-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119924" comment="MozillaFirefox-buildsymbols-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119925" comment="MozillaFirefox-devel-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119926" comment="MozillaFirefox-translations-common-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119927" comment="MozillaFirefox-translations-other-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120945" comment="MozillaThunderbird-38.5.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120946" comment="MozillaThunderbird-buildsymbols-38.5.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120947" comment="MozillaThunderbird-devel-38.5.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120948" comment="MozillaThunderbird-translations-common-38.5.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120949" comment="MozillaThunderbird-translations-other-38.5.0-34.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122722" comment="seamonkey-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122723" comment="seamonkey-dom-inspector-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122724" comment="seamonkey-irc-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122725" comment="seamonkey-translations-common-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122726" comment="seamonkey-translations-other-2.40-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7223</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7223" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7223" source="CVE"/>
    <description>
    The WebExtension APIs in Mozilla Firefox before 43.0 allow remote attackers to gain privileges, and possibly obtain sensitive information or conduct cross-site scripting (XSS) attacks, via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119922" comment="MozillaFirefox-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119923" comment="MozillaFirefox-branding-upstream-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119924" comment="MozillaFirefox-buildsymbols-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119925" comment="MozillaFirefox-devel-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119926" comment="MozillaFirefox-translations-common-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119927" comment="MozillaFirefox-translations-other-43.0-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122722" comment="seamonkey-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122723" comment="seamonkey-dom-inspector-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122724" comment="seamonkey-irc-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122725" comment="seamonkey-translations-common-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122726" comment="seamonkey-translations-other-2.40-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7311</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7311" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7311" source="CVE"/>
    <description>
    libxl in Xen 4.1.x through 4.6.x does not properly handle the readonly flag on disks when using the qemu-xen device model, which allows local guest users to write to a read-only disk image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118953" comment="xen-4.4.3_04-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118954" comment="xen-devel-4.4.3_04-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118955" comment="xen-doc-html-4.4.3_04-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118956" comment="xen-kmp-default-4.4.3_04_k3.16.7_29-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118957" comment="xen-kmp-desktop-4.4.3_04_k3.16.7_29-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118958" comment="xen-libs-4.4.3_04-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118959" comment="xen-libs-32bit-4.4.3_04-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118960" comment="xen-tools-4.4.3_04-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118961" comment="xen-tools-domU-4.4.3_04-33.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7384</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7384" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7384" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117997" comment="nodejs-4.2.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117998" comment="nodejs-devel-4.2.1-4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117992" comment="nodejs-doc-4.2.1-4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7497</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7497" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7497" source="CVE"/>
    <description>
    Heap-based buffer overflow in the xmlDictComputeFastQKey function in dict.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009120421" comment="libxml2-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120422" comment="libxml2-2-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120423" comment="libxml2-2-32bit-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120424" comment="libxml2-devel-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120425" comment="libxml2-devel-32bit-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120426" comment="libxml2-doc-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120427" comment="libxml2-tools-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120428" comment="python-libxml2-2.9.3-7.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7498</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7498" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7498" source="CVE"/>
    <description>
    Heap-based buffer overflow in the xmlParseXmlDecl function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service via unspecified vectors related to extracting errors after an encoding conversion failure.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009120421" comment="libxml2-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120422" comment="libxml2-2-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120423" comment="libxml2-2-32bit-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120424" comment="libxml2-devel-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120425" comment="libxml2-devel-32bit-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120426" comment="libxml2-doc-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120427" comment="libxml2-tools-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120428" comment="python-libxml2-2.9.3-7.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7499</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7499" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7499" source="CVE"/>
    <description>
    Heap-based buffer overflow in the xmlGROW function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive process memory information via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009120421" comment="libxml2-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120422" comment="libxml2-2-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120423" comment="libxml2-2-32bit-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120424" comment="libxml2-devel-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120425" comment="libxml2-devel-32bit-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120426" comment="libxml2-doc-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120427" comment="libxml2-tools-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120428" comment="python-libxml2-2.9.3-7.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7500</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7500" source="CVE"/>
    <description>
    The xmlParseMisc function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service (out-of-bounds heap read) via unspecified vectors related to incorrect entities boundaries and start tags.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009120421" comment="libxml2-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120422" comment="libxml2-2-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120423" comment="libxml2-2-32bit-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120424" comment="libxml2-devel-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120425" comment="libxml2-devel-32bit-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120426" comment="libxml2-doc-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120427" comment="libxml2-tools-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120428" comment="python-libxml2-2.9.3-7.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7504</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7504" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009121479" comment="xen-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121480" comment="xen-devel-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121481" comment="xen-doc-html-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121482" comment="xen-kmp-default-4.4.3_08_k3.16.7_29-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121483" comment="xen-kmp-desktop-4.4.3_08_k3.16.7_29-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121484" comment="xen-libs-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121485" comment="xen-libs-32bit-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121486" comment="xen-tools-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121487" comment="xen-tools-domU-4.4.3_08-36.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7511</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7511" source="CVE"/>
    <description>
    Libgcrypt before 1.6.5 does not properly perform elliptic-point curve multiplication during decryption, which makes it easier for physically proximate attackers to extract ECDH keys by measuring electromagnetic emanations.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123697" comment="libgcrypt-1.6.1-8.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123698" comment="libgcrypt-cavs-1.6.1-8.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123699" comment="libgcrypt-devel-1.6.1-8.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123700" comment="libgcrypt-devel-32bit-1.6.1-8.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123701" comment="libgcrypt20-1.6.1-8.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123702" comment="libgcrypt20-32bit-1.6.1-8.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123703" comment="libgcrypt20-hmac-1.6.1-8.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123704" comment="libgcrypt20-hmac-32bit-1.6.1-8.13.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7512</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7512" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512" source="CVE"/>
    <description>
    Buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU, when a guest NIC has a larger MTU, allows remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126020" comment="xen-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126021" comment="xen-devel-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126022" comment="xen-doc-html-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126023" comment="xen-kmp-default-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126024" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126025" comment="xen-libs-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126026" comment="xen-libs-32bit-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126027" comment="xen-tools-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126028" comment="xen-tools-domU-4.4.4_02-43.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7513</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7513" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7513" source="CVE"/>
    <description>
    arch/x86/kvm/x86.c in the Linux kernel before 4.4 does not reset the PIT counter values during state restoration, which allows guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via a zero value, related to the kvm_vm_ioctl_set_pit and kvm_vm_ioctl_set_pit2 functions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133865" comment="bbswitch-0.8-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133866" comment="bbswitch-kmp-default-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133867" comment="bbswitch-kmp-desktop-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133868" comment="bbswitch-kmp-pae-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133869" comment="bbswitch-kmp-xen-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133870" comment="cloop-2.639-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133871" comment="cloop-kmp-default-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133872" comment="cloop-kmp-desktop-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133873" comment="cloop-kmp-pae-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133874" comment="cloop-kmp-xen-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133875" comment="crash-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133876" comment="crash-devel-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133877" comment="crash-doc-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133878" comment="crash-eppic-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133879" comment="crash-gcore-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133880" comment="crash-kmp-default-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133881" comment="crash-kmp-desktop-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133882" comment="crash-kmp-pae-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133883" comment="crash-kmp-xen-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133884" comment="hdjmod-1.28-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133885" comment="hdjmod-kmp-default-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133886" comment="hdjmod-kmp-desktop-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133887" comment="hdjmod-kmp-pae-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133888" comment="hdjmod-kmp-xen-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133889" comment="ipset-6.23-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133890" comment="ipset-devel-6.23-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133891" comment="ipset-kmp-default-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133892" comment="ipset-kmp-desktop-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133893" comment="ipset-kmp-pae-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133894" comment="ipset-kmp-xen-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133895" comment="kernel-debug-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133896" comment="kernel-debug-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133897" comment="kernel-debug-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133898" comment="kernel-default-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133899" comment="kernel-default-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133900" comment="kernel-default-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133901" comment="kernel-desktop-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133902" comment="kernel-desktop-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133903" comment="kernel-desktop-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133904" comment="kernel-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133905" comment="kernel-docs-3.16.7-45.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133906" comment="kernel-ec2-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133907" comment="kernel-ec2-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133908" comment="kernel-ec2-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133909" comment="kernel-macros-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133910" comment="kernel-obs-build-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133911" comment="kernel-obs-qa-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133912" comment="kernel-obs-qa-xen-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133913" comment="kernel-pae-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133914" comment="kernel-pae-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133915" comment="kernel-pae-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133916" comment="kernel-source-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133917" comment="kernel-source-vanilla-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133918" comment="kernel-syms-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133919" comment="kernel-vanilla-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133920" comment="kernel-vanilla-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133921" comment="kernel-xen-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133922" comment="kernel-xen-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133923" comment="kernel-xen-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133924" comment="libipset3-6.23-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133925" comment="pcfclock-0.44-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133926" comment="pcfclock-kmp-default-0.44_k3.16.7_45-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133927" comment="pcfclock-kmp-desktop-0.44_k3.16.7_45-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133928" comment="pcfclock-kmp-pae-0.44_k3.16.7_45-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133929" comment="python-virtualbox-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133930" comment="vhba-kmp-20140629-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133931" comment="vhba-kmp-default-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133932" comment="vhba-kmp-desktop-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133933" comment="vhba-kmp-pae-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133934" comment="vhba-kmp-xen-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133935" comment="virtualbox-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133936" comment="virtualbox-devel-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133937" comment="virtualbox-guest-desktop-icons-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133938" comment="virtualbox-guest-kmp-default-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133939" comment="virtualbox-guest-kmp-desktop-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133940" comment="virtualbox-guest-kmp-pae-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133941" comment="virtualbox-guest-tools-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133942" comment="virtualbox-guest-x11-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133943" comment="virtualbox-host-kmp-default-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133944" comment="virtualbox-host-kmp-desktop-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133945" comment="virtualbox-host-kmp-pae-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133946" comment="virtualbox-host-source-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133947" comment="virtualbox-qt-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133948" comment="virtualbox-websrv-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133949" comment="xen-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133950" comment="xen-devel-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133951" comment="xen-doc-html-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133952" comment="xen-kmp-default-4.4.4_05_k3.16.7_45-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133953" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_45-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133954" comment="xen-libs-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133955" comment="xen-libs-32bit-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133956" comment="xen-tools-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133957" comment="xen-tools-domU-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133958" comment="xtables-addons-2.6-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133959" comment="xtables-addons-kmp-default-2.6_k3.16.7_45-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133960" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_45-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133961" comment="xtables-addons-kmp-pae-2.6_k3.16.7_45-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133962" comment="xtables-addons-kmp-xen-2.6_k3.16.7_45-24.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7540</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7540" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7540" source="CVE"/>
    <description>
    The LDAP server in the AD domain controller in Samba 4.x before 4.1.22 does not check return values to ensure successful ASN.1 memory allocation, which allows remote attackers to cause a denial of service (memory consumption and daemon crash) via crafted packets.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009120133" comment="ldb-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120134" comment="ldb-tools-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120135" comment="libdcerpc-atsvc-devel-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120136" comment="libdcerpc-atsvc0-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120137" comment="libdcerpc-atsvc0-32bit-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120138" comment="libdcerpc-binding0-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120139" comment="libdcerpc-binding0-32bit-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120140" comment="libdcerpc-devel-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120141" comment="libdcerpc-samr-devel-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120142" comment="libdcerpc-samr0-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120143" comment="libdcerpc-samr0-32bit-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120144" comment="libdcerpc0-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120145" comment="libdcerpc0-32bit-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120146" comment="libgensec-devel-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120147" comment="libgensec0-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120148" comment="libgensec0-32bit-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120149" comment="libldb-devel-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120150" comment="libldb1-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120151" comment="libldb1-32bit-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120152" comment="libndr-devel-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120153" comment="libndr-krb5pac-devel-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120154" comment="libndr-krb5pac0-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120155" comment="libndr-krb5pac0-32bit-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120156" comment="libndr-nbt-devel-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120157" comment="libndr-nbt0-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120158" comment="libndr-nbt0-32bit-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120159" comment="libndr-standard-devel-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120160" comment="libndr-standard0-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120161" comment="libndr-standard0-32bit-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120162" comment="libndr0-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120163" comment="libndr0-32bit-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120164" comment="libnetapi-devel-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120165" comment="libnetapi0-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120166" comment="libnetapi0-32bit-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120167" comment="libpdb-devel-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120168" comment="libpdb0-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120169" comment="libpdb0-32bit-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120170" comment="libregistry-devel-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120171" comment="libregistry0-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120172" comment="libregistry0-32bit-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120173" comment="libsamba-credentials-devel-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120174" comment="libsamba-credentials0-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120175" comment="libsamba-credentials0-32bit-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120176" comment="libsamba-hostconfig-devel-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120177" comment="libsamba-hostconfig0-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120178" comment="libsamba-hostconfig0-32bit-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120179" comment="libsamba-policy-devel-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120180" comment="libsamba-policy0-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120181" comment="libsamba-policy0-32bit-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120182" comment="libsamba-util-devel-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120183" comment="libsamba-util0-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120184" comment="libsamba-util0-32bit-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120185" comment="libsamdb-devel-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120186" comment="libsamdb0-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120187" comment="libsamdb0-32bit-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120188" comment="libsmbclient-devel-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120189" comment="libsmbclient-raw-devel-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120190" comment="libsmbclient-raw0-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120191" comment="libsmbclient-raw0-32bit-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120192" comment="libsmbclient0-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120193" comment="libsmbclient0-32bit-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120194" comment="libsmbconf-devel-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120195" comment="libsmbconf0-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120196" comment="libsmbconf0-32bit-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120197" comment="libsmbldap-devel-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120198" comment="libsmbldap0-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120199" comment="libsmbldap0-32bit-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120200" comment="libsmbsharemodes-devel-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120201" comment="libsmbsharemodes0-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120202" comment="libtalloc-devel-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120203" comment="libtalloc2-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120204" comment="libtalloc2-32bit-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120205" comment="libtdb-devel-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120206" comment="libtdb1-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120207" comment="libtdb1-32bit-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120208" comment="libtevent-devel-0.9.26-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120209" comment="libtevent-util-devel-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120210" comment="libtevent-util0-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120211" comment="libtevent-util0-32bit-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120212" comment="libtevent0-0.9.26-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120213" comment="libtevent0-32bit-0.9.26-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120214" comment="libwbclient-devel-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120215" comment="libwbclient0-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120216" comment="libwbclient0-32bit-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120217" comment="pyldb-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120218" comment="pyldb-32bit-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120219" comment="pyldb-devel-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120220" comment="pytalloc-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120221" comment="pytalloc-32bit-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120222" comment="pytalloc-devel-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120223" comment="python-tdb-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120224" comment="python-tdb-32bit-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120225" comment="python-tevent-0.9.26-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120226" comment="python-tevent-32bit-0.9.26-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120227" comment="samba-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120228" comment="samba-32bit-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120229" comment="samba-client-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120230" comment="samba-client-32bit-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120231" comment="samba-core-devel-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120232" comment="samba-doc-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120233" comment="samba-libs-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120234" comment="samba-libs-32bit-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120235" comment="samba-pidl-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120236" comment="samba-python-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120237" comment="samba-test-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120238" comment="samba-test-devel-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120239" comment="samba-winbind-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120240" comment="samba-winbind-32bit-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120241" comment="talloc-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120242" comment="tdb-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120243" comment="tdb-tools-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120244" comment="tevent-0.9.26-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7547</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123373" comment="glibc-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123374" comment="glibc-32bit-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123375" comment="glibc-devel-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123376" comment="glibc-devel-32bit-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123377" comment="glibc-devel-static-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123378" comment="glibc-devel-static-32bit-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123379" comment="glibc-extra-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123380" comment="glibc-html-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123381" comment="glibc-i18ndata-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123382" comment="glibc-info-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123383" comment="glibc-locale-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123384" comment="glibc-locale-32bit-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123385" comment="glibc-obsolete-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123386" comment="glibc-profile-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123387" comment="glibc-profile-32bit-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123388" comment="glibc-testsuite-2.19-16.22.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123389" comment="glibc-utils-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123390" comment="glibc-utils-32bit-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123391" comment="nscd-2.19-16.22.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7549</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7549" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009121479" comment="xen-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121480" comment="xen-devel-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121481" comment="xen-doc-html-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121482" comment="xen-kmp-default-4.4.3_08_k3.16.7_29-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121483" comment="xen-kmp-desktop-4.4.3_08_k3.16.7_29-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121484" comment="xen-libs-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121485" comment="xen-libs-32bit-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121486" comment="xen-tools-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121487" comment="xen-tools-domU-4.4.3_08-36.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7550</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7550" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7550" source="CVE"/>
    <description>
    The keyctl_read_key function in security/keys/keyctl.c in the Linux kernel before 4.3.4 does not properly use a semaphore, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted application that leverages a race condition between keyctl_revoke and keyctl_read calls.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122787" comment="bbswitch-0.8-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122788" comment="bbswitch-kmp-default-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122789" comment="bbswitch-kmp-desktop-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122790" comment="bbswitch-kmp-pae-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122791" comment="bbswitch-kmp-xen-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122792" comment="cloop-2.639-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122793" comment="cloop-kmp-default-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122794" comment="cloop-kmp-desktop-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122795" comment="cloop-kmp-pae-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122796" comment="cloop-kmp-xen-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122797" comment="crash-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122798" comment="crash-devel-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122799" comment="crash-doc-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122800" comment="crash-eppic-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122801" comment="crash-gcore-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122802" comment="crash-kmp-default-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122803" comment="crash-kmp-desktop-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122804" comment="crash-kmp-pae-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122805" comment="crash-kmp-xen-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122806" comment="hdjmod-1.28-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122807" comment="hdjmod-kmp-default-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122808" comment="hdjmod-kmp-desktop-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122809" comment="hdjmod-kmp-pae-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122810" comment="hdjmod-kmp-xen-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122811" comment="ipset-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122812" comment="ipset-devel-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122813" comment="ipset-kmp-default-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122814" comment="ipset-kmp-desktop-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122815" comment="ipset-kmp-pae-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122816" comment="ipset-kmp-xen-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122817" comment="kernel-debug-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122818" comment="kernel-debug-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122819" comment="kernel-debug-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122820" comment="kernel-default-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122821" comment="kernel-default-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122822" comment="kernel-default-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122823" comment="kernel-desktop-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122824" comment="kernel-desktop-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122825" comment="kernel-desktop-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122826" comment="kernel-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122827" comment="kernel-docs-3.16.7-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122828" comment="kernel-ec2-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122829" comment="kernel-ec2-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122830" comment="kernel-ec2-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122831" comment="kernel-macros-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122832" comment="kernel-obs-build-3.16.7-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122833" comment="kernel-obs-qa-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122834" comment="kernel-obs-qa-xen-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122835" comment="kernel-pae-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122836" comment="kernel-pae-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122837" comment="kernel-pae-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122838" comment="kernel-source-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122839" comment="kernel-source-vanilla-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122840" comment="kernel-syms-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122841" comment="kernel-vanilla-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122842" comment="kernel-vanilla-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122843" comment="kernel-xen-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122844" comment="kernel-xen-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122845" comment="kernel-xen-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122846" comment="libipset3-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122847" comment="pcfclock-0.44-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122848" comment="pcfclock-kmp-default-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122849" comment="pcfclock-kmp-desktop-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122850" comment="pcfclock-kmp-pae-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122851" comment="python-virtualbox-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122852" comment="vhba-kmp-20140629-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122853" comment="vhba-kmp-default-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122854" comment="vhba-kmp-desktop-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122855" comment="vhba-kmp-pae-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122856" comment="vhba-kmp-xen-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122857" comment="virtualbox-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122858" comment="virtualbox-devel-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122859" comment="virtualbox-guest-desktop-icons-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122860" comment="virtualbox-guest-kmp-default-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122861" comment="virtualbox-guest-kmp-desktop-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122862" comment="virtualbox-guest-kmp-pae-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122863" comment="virtualbox-guest-tools-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122864" comment="virtualbox-guest-x11-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122865" comment="virtualbox-host-kmp-default-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122866" comment="virtualbox-host-kmp-desktop-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122867" comment="virtualbox-host-kmp-pae-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122868" comment="virtualbox-host-source-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122869" comment="virtualbox-qt-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122870" comment="virtualbox-websrv-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122871" comment="xen-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122872" comment="xen-devel-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122873" comment="xen-doc-html-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122874" comment="xen-kmp-default-4.4.3_08_k3.16.7_32-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122875" comment="xen-kmp-desktop-4.4.3_08_k3.16.7_32-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122876" comment="xen-libs-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122877" comment="xen-libs-32bit-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122878" comment="xen-tools-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122879" comment="xen-tools-domU-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122880" comment="xtables-addons-2.6-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122881" comment="xtables-addons-kmp-default-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122882" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122883" comment="xtables-addons-kmp-pae-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122884" comment="xtables-addons-kmp-xen-2.6_k3.16.7_32-15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7552</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7552" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7552" source="CVE"/>
    <description>
    Heap-based buffer overflow in the gdk_pixbuf_flip function in gdk-pixbuf-scale.c in gdk-pixbuf 2.30.x allows remote attackers to cause a denial of service or possibly execute arbitrary code via a crafted BMP file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125467" comment="gdk-pixbuf-2.31.6-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125468" comment="gdk-pixbuf-devel-2.31.6-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125469" comment="gdk-pixbuf-devel-32bit-2.31.6-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125470" comment="gdk-pixbuf-lang-2.31.6-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125471" comment="gdk-pixbuf-query-loaders-2.31.6-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125472" comment="gdk-pixbuf-query-loaders-32bit-2.31.6-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125473" comment="libgdk_pixbuf-2_0-0-2.31.6-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125474" comment="libgdk_pixbuf-2_0-0-32bit-2.31.6-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125475" comment="typelib-1_0-GdkPixbuf-2_0-2.31.6-6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7554</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7554" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7554" source="CVE"/>
    <description>
    The _TIFFVGetField function in tif_dir.c in libtiff 4.0.6 allows attackers to cause a denial of service (invalid memory write and crash) or possibly have unspecified other impact via crafted field data in an extension tag in a TIFF image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136807" comment="libtiff-devel-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136808" comment="libtiff-devel-32bit-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136809" comment="libtiff5-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136810" comment="libtiff5-32bit-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136811" comment="tiff-4.0.7-10.35.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7555</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7555" source="CVE"/>
    <description>
    Heap-based buffer overflow in giffix.c in giffix in giflib 5.1.1 allows attackers to cause a denial of service (program crash) via crafted image and logical screen width fields in a GIF file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009121934" comment="giflib-5.0.5-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121935" comment="giflib-devel-5.0.5-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121936" comment="giflib-devel-32bit-5.0.5-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121937" comment="giflib-progs-5.0.5-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121938" comment="libgif6-5.0.5-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121939" comment="libgif6-32bit-5.0.5-4.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7560</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7560" source="CVE"/>
    <description>
    The SMB1 implementation in smbd in Samba 3.x and 4.x before 4.1.23, 4.2.x before 4.2.9, 4.3.x before 4.3.6, and 4.4.x before 4.4.0rc4 allows remote authenticated users to modify arbitrary ACLs by using a UNIX SMB1 call to create a symlink, and then using a non-UNIX SMB1 call to write to the ACL content.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126263" comment="ctdb-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126264" comment="ctdb-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126265" comment="ctdb-pcp-pmda-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126266" comment="ctdb-tests-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126267" comment="libdcerpc-atsvc-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126268" comment="libdcerpc-atsvc0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126269" comment="libdcerpc-atsvc0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126270" comment="libdcerpc-binding0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126271" comment="libdcerpc-binding0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126272" comment="libdcerpc-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126273" comment="libdcerpc-samr-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126274" comment="libdcerpc-samr0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126275" comment="libdcerpc-samr0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126276" comment="libdcerpc0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126277" comment="libdcerpc0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126278" comment="libgensec-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126279" comment="libgensec0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126280" comment="libgensec0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126281" comment="libndr-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126282" comment="libndr-krb5pac-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126283" comment="libndr-krb5pac0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126284" comment="libndr-krb5pac0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126285" comment="libndr-nbt-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126286" comment="libndr-nbt0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126287" comment="libndr-nbt0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126288" comment="libndr-standard-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126289" comment="libndr-standard0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126290" comment="libndr-standard0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126291" comment="libndr0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126292" comment="libndr0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126293" comment="libnetapi-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126294" comment="libnetapi0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126295" comment="libnetapi0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125079" comment="libpdb-devel-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125080" comment="libpdb0-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125081" comment="libpdb0-32bit-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126296" comment="libregistry-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126297" comment="libregistry0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126298" comment="libregistry0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126299" comment="libsamba-credentials-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126300" comment="libsamba-credentials0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126301" comment="libsamba-credentials0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126302" comment="libsamba-hostconfig-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126303" comment="libsamba-hostconfig0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126304" comment="libsamba-hostconfig0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126305" comment="libsamba-passdb-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126306" comment="libsamba-passdb0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126307" comment="libsamba-passdb0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126308" comment="libsamba-policy-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126309" comment="libsamba-policy0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126310" comment="libsamba-policy0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126311" comment="libsamba-util-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126312" comment="libsamba-util0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126313" comment="libsamba-util0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126314" comment="libsamdb-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126315" comment="libsamdb0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126316" comment="libsamdb0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126317" comment="libsmbclient-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126318" comment="libsmbclient-raw-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126319" comment="libsmbclient-raw0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126320" comment="libsmbclient-raw0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126321" comment="libsmbclient0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126322" comment="libsmbclient0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126323" comment="libsmbconf-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126324" comment="libsmbconf0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126325" comment="libsmbconf0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126326" comment="libsmbldap-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126327" comment="libsmbldap0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126328" comment="libsmbldap0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125112" comment="libsmbsharemodes-devel-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125113" comment="libsmbsharemodes0-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126329" comment="libtevent-util-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126330" comment="libtevent-util0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126331" comment="libtevent-util0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126332" comment="libwbclient-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126333" comment="libwbclient0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126334" comment="libwbclient0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126335" comment="samba-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126336" comment="samba-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126337" comment="samba-client-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126338" comment="samba-client-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126339" comment="samba-core-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126340" comment="samba-doc-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126341" comment="samba-libs-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126342" comment="samba-libs-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126343" comment="samba-pidl-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126344" comment="samba-python-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126345" comment="samba-test-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126346" comment="samba-test-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126347" comment="samba-winbind-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126348" comment="samba-winbind-32bit-4.2.4-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7566</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7566" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7566" source="CVE"/>
    <description>
    The clie_5_attach function in drivers/usb/serial/visor.c in the Linux kernel through 4.4.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a bulk-out endpoint.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7575</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7575" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575" source="CVE"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.20.2, as used in Mozilla Firefox before 43.0.2 and Firefox ESR 38.x before 38.5.2, does not reject MD5 signatures in Server Key Exchange messages in TLS 1.2 Handshake Protocol traffic, which makes it easier for man-in-the-middle attackers to spoof servers by triggering a collision.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009120985" comment="MozillaFirefox-43.0.3-56.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120986" comment="MozillaFirefox-branding-upstream-43.0.3-56.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120987" comment="MozillaFirefox-buildsymbols-43.0.3-56.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120988" comment="MozillaFirefox-devel-43.0.3-56.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120989" comment="MozillaFirefox-translations-common-43.0.3-56.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120990" comment="MozillaFirefox-translations-other-43.0.3-56.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123859" comment="bouncycastle-1.54-13.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123860" comment="bouncycastle-javadoc-1.54-13.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122295" comment="java-1_7_0-openjdk-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122296" comment="java-1_7_0-openjdk-accessibility-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122297" comment="java-1_7_0-openjdk-bootstrap-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122298" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122299" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122300" comment="java-1_7_0-openjdk-demo-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122301" comment="java-1_7_0-openjdk-devel-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122302" comment="java-1_7_0-openjdk-headless-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122303" comment="java-1_7_0-openjdk-javadoc-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122304" comment="java-1_7_0-openjdk-src-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122288" comment="java-1_8_0-openjdk-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122289" comment="java-1_8_0-openjdk-accessibility-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122290" comment="java-1_8_0-openjdk-demo-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122291" comment="java-1_8_0-openjdk-devel-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122292" comment="java-1_8_0-openjdk-headless-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122293" comment="java-1_8_0-openjdk-javadoc-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122294" comment="java-1_8_0-openjdk-src-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120950" comment="libfreebl3-3.20.2-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120951" comment="libfreebl3-32bit-3.20.2-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121681" comment="libpolarssl7-1.3.9-14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120952" comment="libsoftokn3-3.20.2-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120953" comment="libsoftokn3-32bit-3.20.2-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120954" comment="mozilla-nss-3.20.2-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120955" comment="mozilla-nss-32bit-3.20.2-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120956" comment="mozilla-nss-certs-3.20.2-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120957" comment="mozilla-nss-certs-32bit-3.20.2-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120958" comment="mozilla-nss-devel-3.20.2-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120959" comment="mozilla-nss-sysinit-3.20.2-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120960" comment="mozilla-nss-sysinit-32bit-3.20.2-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120961" comment="mozilla-nss-tools-3.20.2-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121682" comment="polarssl-1.3.9-14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121683" comment="polarssl-devel-1.3.9-14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122722" comment="seamonkey-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122723" comment="seamonkey-dom-inspector-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122724" comment="seamonkey-irc-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122725" comment="seamonkey-translations-common-2.40-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122726" comment="seamonkey-translations-other-2.40-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7576</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7576" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7576" source="CVE"/>
    <description>
    The http_basic_authenticate_with method in actionpack/lib/action_controller/metal/http_authentication.rb in the Basic Authentication implementation in Action Controller in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not use a constant-time algorithm for verifying credentials, which makes it easier for remote attackers to bypass authentication by measuring timing differences.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122899" comment="rubygem-actionpack-3_2-3.2.17-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122900" comment="rubygem-actionpack-3_2-doc-3.2.17-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122901" comment="rubygem-activerecord-3_2-3.2.17-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122902" comment="rubygem-activerecord-3_2-doc-3.2.17-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122903" comment="rubygem-activesupport-3_2-3.2.17-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122904" comment="rubygem-activesupport-3_2-doc-3.2.17-2.6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7577</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7577" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7577" source="CVE"/>
    <description>
    activerecord/lib/active_record/nested_attributes.rb in Active Record in Ruby on Rails 3.1.x and 3.2.x before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly implement a certain destroy option, which allows remote attackers to bypass intended change restrictions by leveraging use of the nested attributes feature.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122899" comment="rubygem-actionpack-3_2-3.2.17-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122900" comment="rubygem-actionpack-3_2-doc-3.2.17-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122901" comment="rubygem-activerecord-3_2-3.2.17-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122902" comment="rubygem-activerecord-3_2-doc-3.2.17-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122903" comment="rubygem-activesupport-3_2-3.2.17-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122904" comment="rubygem-activesupport-3_2-doc-3.2.17-2.6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7625</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-7625" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7625" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK &amp; Compiler before 19.0.0.213 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-7626, CVE-2015-7627, CVE-2015-7630, CVE-2015-7633, and CVE-2015-7634.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117604" comment="flash-player-11.2.202.535-2.73.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117605" comment="flash-player-gnome-11.2.202.535-2.73.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117606" comment="flash-player-kde4-11.2.202.535-2.73.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7626</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-7626" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7626" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK &amp; Compiler before 19.0.0.213 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-7625, CVE-2015-7627, CVE-2015-7630, CVE-2015-7633, and CVE-2015-7634.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117604" comment="flash-player-11.2.202.535-2.73.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117605" comment="flash-player-gnome-11.2.202.535-2.73.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117606" comment="flash-player-kde4-11.2.202.535-2.73.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7627</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-7627" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7627" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK &amp; Compiler before 19.0.0.213 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-7625, CVE-2015-7626, CVE-2015-7630, CVE-2015-7633, and CVE-2015-7634.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117604" comment="flash-player-11.2.202.535-2.73.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117605" comment="flash-player-gnome-11.2.202.535-2.73.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117606" comment="flash-player-kde4-11.2.202.535-2.73.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7628</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-7628" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7628" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK &amp; Compiler before 19.0.0.213 allow remote attackers to bypass the Same Origin Policy and obtain sensitive information via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117604" comment="flash-player-11.2.202.535-2.73.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117605" comment="flash-player-gnome-11.2.202.535-2.73.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117606" comment="flash-player-kde4-11.2.202.535-2.73.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7629</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-7629" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7629" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK &amp; Compiler before 19.0.0.213 allows attackers to execute arbitrary code via a TextFormat object with a crafted tabStops property, a different vulnerability than CVE-2015-7631, CVE-2015-7643, and CVE-2015-7644.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117604" comment="flash-player-11.2.202.535-2.73.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117605" comment="flash-player-gnome-11.2.202.535-2.73.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117606" comment="flash-player-kde4-11.2.202.535-2.73.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7630</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-7630" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7630" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK &amp; Compiler before 19.0.0.213 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-7625, CVE-2015-7626, CVE-2015-7627, CVE-2015-7633, and CVE-2015-7634.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117604" comment="flash-player-11.2.202.535-2.73.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117605" comment="flash-player-gnome-11.2.202.535-2.73.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117606" comment="flash-player-kde4-11.2.202.535-2.73.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7631</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-7631" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7631" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK &amp; Compiler before 19.0.0.213 allows attackers to execute arbitrary code via a TextLine object with a crafted validity property, a different vulnerability than CVE-2015-7629, CVE-2015-7643, and CVE-2015-7644.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117604" comment="flash-player-11.2.202.535-2.73.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117605" comment="flash-player-gnome-11.2.202.535-2.73.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117606" comment="flash-player-kde4-11.2.202.535-2.73.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7632</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-7632" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7632" source="CVE"/>
    <description>
    Buffer overflow in Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK &amp; Compiler before 19.0.0.213 allows attackers to execute arbitrary code via a Loader object with a crafted loaderBytes property.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117604" comment="flash-player-11.2.202.535-2.73.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117605" comment="flash-player-gnome-11.2.202.535-2.73.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117606" comment="flash-player-kde4-11.2.202.535-2.73.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7633</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-7633" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7633" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK &amp; Compiler before 19.0.0.213 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-7625, CVE-2015-7626, CVE-2015-7627, CVE-2015-7630, and CVE-2015-7634.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117604" comment="flash-player-11.2.202.535-2.73.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117605" comment="flash-player-gnome-11.2.202.535-2.73.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117606" comment="flash-player-kde4-11.2.202.535-2.73.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7634</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-7634" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7634" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK &amp; Compiler before 19.0.0.213 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-7625, CVE-2015-7626, CVE-2015-7627, CVE-2015-7630, and CVE-2015-7633.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117604" comment="flash-player-11.2.202.535-2.73.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117605" comment="flash-player-gnome-11.2.202.535-2.73.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117606" comment="flash-player-kde4-11.2.202.535-2.73.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7643</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-7643" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7643" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK &amp; Compiler before 19.0.0.213 allows attackers to execute arbitrary code via a Video object with a crafted deblocking property, a different vulnerability than CVE-2015-7629, CVE-2015-7631, and CVE-2015-7644.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117604" comment="flash-player-11.2.202.535-2.73.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117605" comment="flash-player-gnome-11.2.202.535-2.73.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117606" comment="flash-player-kde4-11.2.202.535-2.73.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7644</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-7644" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7644" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.252 and 19.x before 19.0.0.207 on Windows and OS X and before 11.2.202.535 on Linux, Adobe AIR before 19.0.0.213, Adobe AIR SDK before 19.0.0.213, and Adobe AIR SDK &amp; Compiler before 19.0.0.213 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-7629, CVE-2015-7631, and CVE-2015-7643.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117604" comment="flash-player-11.2.202.535-2.73.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117605" comment="flash-player-gnome-11.2.202.535-2.73.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117606" comment="flash-player-kde4-11.2.202.535-2.73.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7645</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-7645" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7645" source="CVE"/>
    <description>
    Adobe Flash Player 18.x through 18.0.0.252 and 19.x through 19.0.0.207 on Windows and OS X and 11.x through 11.2.202.535 on Linux allows remote attackers to execute arbitrary code via a crafted SWF file, as exploited in the wild in October 2015.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117607" comment="flash-player-11.2.202.540-2.76.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117608" comment="flash-player-gnome-11.2.202.540-2.76.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117609" comment="flash-player-kde4-11.2.202.540-2.76.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7651</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-7651" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7651" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allows attackers to execute arbitrary code via crafted DefineFunction atoms, a different vulnerability than CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, and CVE-2015-8046.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117858" comment="flash-player-11.2.202.548-2.79.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117859" comment="flash-player-gnome-11.2.202.548-2.79.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117860" comment="flash-player-kde4-11.2.202.548-2.79.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7652</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-7652" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7652" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allows attackers to execute arbitrary code via a crafted gridFitType property value, a different vulnerability than CVE-2015-7651, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, and CVE-2015-8046.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117858" comment="flash-player-11.2.202.548-2.79.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117859" comment="flash-player-gnome-11.2.202.548-2.79.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117860" comment="flash-player-kde4-11.2.202.548-2.79.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7653</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-7653" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7653" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allows attackers to execute arbitrary code via crafted globalToLocal arguments, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, and CVE-2015-8046.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117858" comment="flash-player-11.2.202.548-2.79.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117859" comment="flash-player-gnome-11.2.202.548-2.79.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117860" comment="flash-player-kde4-11.2.202.548-2.79.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7654</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-7654" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7654" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allows attackers to execute arbitrary code via crafted attachSound arguments, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, and CVE-2015-8046.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117858" comment="flash-player-11.2.202.548-2.79.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117859" comment="flash-player-gnome-11.2.202.548-2.79.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117860" comment="flash-player-kde4-11.2.202.548-2.79.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7655</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-7655" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7655" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allows attackers to execute arbitrary code via crafted actionExtends arguments, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, and CVE-2015-8046.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117858" comment="flash-player-11.2.202.548-2.79.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117859" comment="flash-player-gnome-11.2.202.548-2.79.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117860" comment="flash-player-kde4-11.2.202.548-2.79.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7656</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-7656" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7656" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allows attackers to execute arbitrary code via crafted actionImplementsOp arguments, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, and CVE-2015-8046.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117858" comment="flash-player-11.2.202.548-2.79.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117859" comment="flash-player-gnome-11.2.202.548-2.79.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117860" comment="flash-player-kde4-11.2.202.548-2.79.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7657</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-7657" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7657" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allows attackers to execute arbitrary code via crafted actionCallMethod arguments, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, and CVE-2015-8046.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117858" comment="flash-player-11.2.202.548-2.79.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117859" comment="flash-player-gnome-11.2.202.548-2.79.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117860" comment="flash-player-kde4-11.2.202.548-2.79.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7658</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-7658" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7658" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allows attackers to execute arbitrary code via crafted actionInstanceOf arguments, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, and CVE-2015-8046.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117858" comment="flash-player-11.2.202.548-2.79.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117859" comment="flash-player-gnome-11.2.202.548-2.79.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117860" comment="flash-player-kde4-11.2.202.548-2.79.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7659</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-7659" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7659" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion" in the NetConnection object implementation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117858" comment="flash-player-11.2.202.548-2.79.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117859" comment="flash-player-gnome-11.2.202.548-2.79.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117860" comment="flash-player-kde4-11.2.202.548-2.79.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7660</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-7660" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7660" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allows attackers to execute arbitrary code via crafted setMask arguments, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, and CVE-2015-8046.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117858" comment="flash-player-11.2.202.548-2.79.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117859" comment="flash-player-gnome-11.2.202.548-2.79.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117860" comment="flash-player-kde4-11.2.202.548-2.79.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7661</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-7661" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7661" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allows attackers to execute arbitrary code via a crafted getBounds call, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, and CVE-2015-8046.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117858" comment="flash-player-11.2.202.548-2.79.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117859" comment="flash-player-gnome-11.2.202.548-2.79.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117860" comment="flash-player-kde4-11.2.202.548-2.79.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7662</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-7662" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7662" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allow remote attackers to bypass intended access restrictions and write to files via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117858" comment="flash-player-11.2.202.548-2.79.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117859" comment="flash-player-gnome-11.2.202.548-2.79.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117860" comment="flash-player-kde4-11.2.202.548-2.79.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7663</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-7663" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7663" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, and CVE-2015-8046.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117858" comment="flash-player-11.2.202.548-2.79.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117859" comment="flash-player-gnome-11.2.202.548-2.79.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117860" comment="flash-player-kde4-11.2.202.548-2.79.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7673</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7673" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7673" source="CVE"/>
    <description>
    io-tga.c in gdk-pixbuf before 2.32.0 uses heap memory after its allocation failed, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) and possibly execute arbitrary code via a crafted Truevision TGA (TARGA) file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125467" comment="gdk-pixbuf-2.31.6-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125468" comment="gdk-pixbuf-devel-2.31.6-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125469" comment="gdk-pixbuf-devel-32bit-2.31.6-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125470" comment="gdk-pixbuf-lang-2.31.6-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125471" comment="gdk-pixbuf-query-loaders-2.31.6-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125472" comment="gdk-pixbuf-query-loaders-32bit-2.31.6-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125473" comment="libgdk_pixbuf-2_0-0-2.31.6-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125474" comment="libgdk_pixbuf-2_0-0-32bit-2.31.6-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125475" comment="typelib-1_0-GdkPixbuf-2_0-2.31.6-6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7674</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7674" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7674" source="CVE"/>
    <description>
    Integer overflow in the pixops_scale_nearest function in pixops/pixops.c in gdk-pixbuf before 2.32.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted GIF image file, which triggers a heap-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125467" comment="gdk-pixbuf-2.31.6-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125468" comment="gdk-pixbuf-devel-2.31.6-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125469" comment="gdk-pixbuf-devel-32bit-2.31.6-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125470" comment="gdk-pixbuf-lang-2.31.6-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125471" comment="gdk-pixbuf-query-loaders-2.31.6-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125472" comment="gdk-pixbuf-query-loaders-32bit-2.31.6-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125473" comment="libgdk_pixbuf-2_0-0-2.31.6-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125474" comment="libgdk_pixbuf-2_0-0-32bit-2.31.6-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125475" comment="typelib-1_0-GdkPixbuf-2_0-2.31.6-6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7691</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7691" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128159" comment="ntp-4.2.8p7-25.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128160" comment="ntp-doc-4.2.8p7-25.15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7692</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7692" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128159" comment="ntp-4.2.8p7-25.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128160" comment="ntp-doc-4.2.8p7-25.15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7696</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7696" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7696" source="CVE"/>
    <description>
    Info-ZIP UnZip 6.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly execute arbitrary code via a crafted password-protected ZIP archive, possibly related to an Extra-Field size value.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133767" comment="unzip-6.00-26.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133768" comment="unzip-doc-6.00-26.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133769" comment="unzip-rcc-6.00-26.7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7697</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7697" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7697" source="CVE"/>
    <description>
    Info-ZIP UnZip 6.0 allows remote attackers to cause a denial of service (infinite loop) via empty bzip2 data in a ZIP archive.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133767" comment="unzip-6.00-26.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133768" comment="unzip-doc-6.00-26.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133769" comment="unzip-rcc-6.00-26.7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7701</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7701" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128159" comment="ntp-4.2.8p7-25.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128160" comment="ntp-doc-4.2.8p7-25.15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7702</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7702" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128159" comment="ntp-4.2.8p7-25.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128160" comment="ntp-doc-4.2.8p7-25.15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7703</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7703" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7703" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128159" comment="ntp-4.2.8p7-25.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128160" comment="ntp-doc-4.2.8p7-25.15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7704</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7704" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128159" comment="ntp-4.2.8p7-25.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128160" comment="ntp-doc-4.2.8p7-25.15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7705</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7705" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7705" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128159" comment="ntp-4.2.8p7-25.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128160" comment="ntp-doc-4.2.8p7-25.15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7744</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7744" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7744" source="CVE"/>
    <description>
    wolfSSL (formerly CyaSSL) before 3.6.8 does not properly handle faults associated with the Chinese Remainder Theorem (CRT) process when allowing ephemeral key exchange without low memory optimizations on a server, which makes it easier for remote attackers to obtain private RSA keys by capturing TLS handshakes, aka a Lenstra attack.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122915" comment="libmysql56client18-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122916" comment="libmysql56client18-32bit-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122917" comment="libmysql56client_r18-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122918" comment="libmysql56client_r18-32bit-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122919" comment="mysql-community-server-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122920" comment="mysql-community-server-bench-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122921" comment="mysql-community-server-client-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122922" comment="mysql-community-server-errormessages-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122923" comment="mysql-community-server-test-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122924" comment="mysql-community-server-tools-5.6.28-2.17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7747</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7747" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7747" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115553" comment="audiofile-0.3.6-6.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115554" comment="audiofile-devel-0.3.6-6.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115555" comment="audiofile-devel-32bit-0.3.6-6.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115556" comment="audiofile-doc-0.3.6-6.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115557" comment="libaudiofile1-0.3.6-6.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115558" comment="libaudiofile1-32bit-0.3.6-6.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7758</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7758" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7758" source="CVE"/>
    <description>
    Gummi 0.6.5 allows local users to write to arbitrary files via a symlink attack on a temporary dot file that uses the name of an existing file and a (1) .aux, (2) .log, (3) .out, (4) .pdf, or (5) .toc extension for the file name, as demonstrated by .thesis.tex.aux.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123831" comment="gummi-0.6.5-5.6.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7799</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7799" source="CVE"/>
    <description>
    The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel through 4.2.3 does not ensure that certain slot numbers are valid, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122787" comment="bbswitch-0.8-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122788" comment="bbswitch-kmp-default-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122789" comment="bbswitch-kmp-desktop-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122790" comment="bbswitch-kmp-pae-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122791" comment="bbswitch-kmp-xen-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122792" comment="cloop-2.639-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122793" comment="cloop-kmp-default-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122794" comment="cloop-kmp-desktop-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122795" comment="cloop-kmp-pae-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122796" comment="cloop-kmp-xen-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122797" comment="crash-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122798" comment="crash-devel-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122799" comment="crash-doc-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122800" comment="crash-eppic-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122801" comment="crash-gcore-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122802" comment="crash-kmp-default-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122803" comment="crash-kmp-desktop-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122804" comment="crash-kmp-pae-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122805" comment="crash-kmp-xen-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122806" comment="hdjmod-1.28-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122807" comment="hdjmod-kmp-default-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122808" comment="hdjmod-kmp-desktop-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122809" comment="hdjmod-kmp-pae-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122810" comment="hdjmod-kmp-xen-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122811" comment="ipset-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122812" comment="ipset-devel-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122813" comment="ipset-kmp-default-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122814" comment="ipset-kmp-desktop-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122815" comment="ipset-kmp-pae-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122816" comment="ipset-kmp-xen-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122817" comment="kernel-debug-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122818" comment="kernel-debug-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122819" comment="kernel-debug-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122820" comment="kernel-default-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122821" comment="kernel-default-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122822" comment="kernel-default-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122823" comment="kernel-desktop-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122824" comment="kernel-desktop-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122825" comment="kernel-desktop-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122826" comment="kernel-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122827" comment="kernel-docs-3.16.7-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122828" comment="kernel-ec2-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122829" comment="kernel-ec2-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122830" comment="kernel-ec2-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122831" comment="kernel-macros-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122832" comment="kernel-obs-build-3.16.7-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122833" comment="kernel-obs-qa-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122834" comment="kernel-obs-qa-xen-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122835" comment="kernel-pae-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122836" comment="kernel-pae-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122837" comment="kernel-pae-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122838" comment="kernel-source-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122839" comment="kernel-source-vanilla-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122840" comment="kernel-syms-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122841" comment="kernel-vanilla-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122842" comment="kernel-vanilla-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122843" comment="kernel-xen-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122844" comment="kernel-xen-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122845" comment="kernel-xen-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122846" comment="libipset3-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122847" comment="pcfclock-0.44-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122848" comment="pcfclock-kmp-default-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122849" comment="pcfclock-kmp-desktop-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122850" comment="pcfclock-kmp-pae-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122851" comment="python-virtualbox-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122852" comment="vhba-kmp-20140629-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122853" comment="vhba-kmp-default-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122854" comment="vhba-kmp-desktop-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122855" comment="vhba-kmp-pae-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122856" comment="vhba-kmp-xen-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122857" comment="virtualbox-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122858" comment="virtualbox-devel-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122859" comment="virtualbox-guest-desktop-icons-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122860" comment="virtualbox-guest-kmp-default-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122861" comment="virtualbox-guest-kmp-desktop-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122862" comment="virtualbox-guest-kmp-pae-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122863" comment="virtualbox-guest-tools-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122864" comment="virtualbox-guest-x11-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122865" comment="virtualbox-host-kmp-default-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122866" comment="virtualbox-host-kmp-desktop-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122867" comment="virtualbox-host-kmp-pae-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122868" comment="virtualbox-host-source-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122869" comment="virtualbox-qt-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122870" comment="virtualbox-websrv-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122871" comment="xen-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122872" comment="xen-devel-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122873" comment="xen-doc-html-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122874" comment="xen-kmp-default-4.4.3_08_k3.16.7_32-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122875" comment="xen-kmp-desktop-4.4.3_08_k3.16.7_32-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122876" comment="xen-libs-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122877" comment="xen-libs-32bit-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122878" comment="xen-tools-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122879" comment="xen-tools-domU-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122880" comment="xtables-addons-2.6-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122881" comment="xtables-addons-kmp-default-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122882" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122883" comment="xtables-addons-kmp-pae-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122884" comment="xtables-addons-kmp-xen-2.6_k3.16.7_32-15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7803</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7803" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7803" source="CVE"/>
    <description>
    The phar_get_entry_data function in ext/phar/util.c in PHP before 5.5.30 and 5.6.x before 5.6.14 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a .phar file with a crafted TAR archive entry in which the Link indicator references a file that does not exist.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122130" comment="apache2-mod_php5-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122131" comment="php5-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122132" comment="php5-bcmath-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122133" comment="php5-bz2-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122134" comment="php5-calendar-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122135" comment="php5-ctype-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122136" comment="php5-curl-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122137" comment="php5-dba-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122138" comment="php5-devel-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122139" comment="php5-dom-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122140" comment="php5-enchant-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122141" comment="php5-exif-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122142" comment="php5-fastcgi-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122143" comment="php5-fileinfo-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122144" comment="php5-firebird-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122145" comment="php5-fpm-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122146" comment="php5-ftp-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122147" comment="php5-gd-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122148" comment="php5-gettext-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122149" comment="php5-gmp-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122150" comment="php5-iconv-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122151" comment="php5-imap-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122152" comment="php5-intl-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122153" comment="php5-json-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122154" comment="php5-ldap-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122155" comment="php5-mbstring-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122156" comment="php5-mcrypt-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122157" comment="php5-mssql-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122158" comment="php5-mysql-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122159" comment="php5-odbc-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122160" comment="php5-opcache-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122161" comment="php5-openssl-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122162" comment="php5-pcntl-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122163" comment="php5-pdo-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122164" comment="php5-pear-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122165" comment="php5-pgsql-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122166" comment="php5-phar-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122167" comment="php5-posix-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122168" comment="php5-pspell-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122169" comment="php5-readline-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122170" comment="php5-shmop-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122171" comment="php5-snmp-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122172" comment="php5-soap-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122173" comment="php5-sockets-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122174" comment="php5-sqlite-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122175" comment="php5-suhosin-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122176" comment="php5-sysvmsg-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122177" comment="php5-sysvsem-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122178" comment="php5-sysvshm-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122179" comment="php5-tidy-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122180" comment="php5-tokenizer-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122181" comment="php5-wddx-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122182" comment="php5-xmlreader-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122183" comment="php5-xmlrpc-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122184" comment="php5-xmlwriter-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122185" comment="php5-xsl-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122186" comment="php5-zip-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122187" comment="php5-zlib-5.6.1-39.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7804</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7804" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7804" source="CVE"/>
    <description>
    Off-by-one error in the phar_parse_zipfile function in ext/phar/zip.c in PHP before 5.5.30 and 5.6.x before 5.6.14 allows remote attackers to cause a denial of service (uninitialized pointer dereference and application crash) by including the / filename in a .zip PHAR archive.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122130" comment="apache2-mod_php5-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122131" comment="php5-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122132" comment="php5-bcmath-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122133" comment="php5-bz2-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122134" comment="php5-calendar-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122135" comment="php5-ctype-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122136" comment="php5-curl-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122137" comment="php5-dba-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122138" comment="php5-devel-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122139" comment="php5-dom-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122140" comment="php5-enchant-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122141" comment="php5-exif-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122142" comment="php5-fastcgi-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122143" comment="php5-fileinfo-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122144" comment="php5-firebird-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122145" comment="php5-fpm-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122146" comment="php5-ftp-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122147" comment="php5-gd-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122148" comment="php5-gettext-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122149" comment="php5-gmp-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122150" comment="php5-iconv-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122151" comment="php5-imap-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122152" comment="php5-intl-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122153" comment="php5-json-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122154" comment="php5-ldap-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122155" comment="php5-mbstring-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122156" comment="php5-mcrypt-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122157" comment="php5-mssql-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122158" comment="php5-mysql-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122159" comment="php5-odbc-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122160" comment="php5-opcache-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122161" comment="php5-openssl-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122162" comment="php5-pcntl-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122163" comment="php5-pdo-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122164" comment="php5-pear-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122165" comment="php5-pgsql-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122166" comment="php5-phar-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122167" comment="php5-posix-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122168" comment="php5-pspell-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122169" comment="php5-readline-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122170" comment="php5-shmop-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122171" comment="php5-snmp-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122172" comment="php5-soap-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122173" comment="php5-sockets-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122174" comment="php5-sqlite-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122175" comment="php5-suhosin-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122176" comment="php5-sysvmsg-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122177" comment="php5-sysvsem-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122178" comment="php5-sysvshm-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122179" comment="php5-tidy-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122180" comment="php5-tokenizer-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122181" comment="php5-wddx-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122182" comment="php5-xmlreader-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122183" comment="php5-xmlrpc-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122184" comment="php5-xmlwriter-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122185" comment="php5-xsl-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122186" comment="php5-zip-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122187" comment="php5-zlib-5.6.1-39.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7805</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7805" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7805" source="CVE"/>
    <description>
    Heap-based buffer overflow in libsndfile 1.0.25 allows remote attackers to have unspecified impact via the headindex value in the header in an AIFF file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117876" comment="libsndfile-1.0.25-19.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117877" comment="libsndfile-devel-1.0.25-19.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117878" comment="libsndfile-progs-1.0.25-19.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117879" comment="libsndfile1-1.0.25-19.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117880" comment="libsndfile1-32bit-1.0.25-19.7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7830</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7830" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7830" source="CVE"/>
    <description>
    The pcapng_read_if_descr_block function in wiretap/pcapng.c in the pcapng parser in Wireshark 1.12.x before 1.12.8 uses too many levels of pointer indirection, which allows remote attackers to cause a denial of service (incorrect free and application crash) via a crafted packet that triggers interface-filter copying.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115283" comment="wireshark-1.12.8-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115284" comment="wireshark-devel-1.12.8-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115285" comment="wireshark-ui-gtk-1.12.8-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115286" comment="wireshark-ui-qt-1.12.8-25.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7834</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7834" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7834" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google V8 before 4.6.85.23, as used in Google Chrome before 46.0.2490.71, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115136" comment="chromedriver-46.0.2490.71-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115137" comment="chromium-46.0.2490.71-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115138" comment="chromium-desktop-gnome-46.0.2490.71-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115139" comment="chromium-desktop-kde-46.0.2490.71-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115140" comment="chromium-ffmpegsumo-46.0.2490.71-54.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7835</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7835" source="CVE"/>
    <description>
    The mod_l2_entry function in arch/x86/mm.c in Xen 3.4 through 4.6.x does not properly validate level 2 page table entries, which allows local PV guest administrators to gain privileges via a crafted superpage mapping.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118953" comment="xen-4.4.3_04-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118954" comment="xen-devel-4.4.3_04-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118955" comment="xen-doc-html-4.4.3_04-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118956" comment="xen-kmp-default-4.4.3_04_k3.16.7_29-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118957" comment="xen-kmp-desktop-4.4.3_04_k3.16.7_29-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118958" comment="xen-libs-4.4.3_04-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118959" comment="xen-libs-32bit-4.4.3_04-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118960" comment="xen-tools-4.4.3_04-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118961" comment="xen-tools-domU-4.4.3_04-33.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7848</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7848" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7848" source="CVE"/>
    <description>
    An integer overflow can occur in NTP-dev.4.3.70 leading to an out-of-bounds memory copy operation when processing a specially crafted private mode packet. The crafted packet needs to have the correct message authentication code and a valid timestamp. When processed by the NTP daemon, it leads to an immediate crash.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128159" comment="ntp-4.2.8p7-25.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128160" comment="ntp-doc-4.2.8p7-25.15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7849</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7849" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7849" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128159" comment="ntp-4.2.8p7-25.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128160" comment="ntp-doc-4.2.8p7-25.15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7850</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7850" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128159" comment="ntp-4.2.8p7-25.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128160" comment="ntp-doc-4.2.8p7-25.15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7851</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7851" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7851" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128159" comment="ntp-4.2.8p7-25.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128160" comment="ntp-doc-4.2.8p7-25.15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7852</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7852" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128159" comment="ntp-4.2.8p7-25.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128160" comment="ntp-doc-4.2.8p7-25.15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7853</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7853" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7853" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128159" comment="ntp-4.2.8p7-25.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128160" comment="ntp-doc-4.2.8p7-25.15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7854</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7854" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7854" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128159" comment="ntp-4.2.8p7-25.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128160" comment="ntp-doc-4.2.8p7-25.15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7855</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7855" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128159" comment="ntp-4.2.8p7-25.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128160" comment="ntp-doc-4.2.8p7-25.15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7871</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7871" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128159" comment="ntp-4.2.8p7-25.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128160" comment="ntp-doc-4.2.8p7-25.15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7872</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7872" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7872" source="CVE"/>
    <description>
    The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115288" comment="bbswitch-0.8-3.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115289" comment="bbswitch-kmp-default-0.8_k3.16.7_29-3.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115290" comment="bbswitch-kmp-desktop-0.8_k3.16.7_29-3.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115291" comment="bbswitch-kmp-pae-0.8_k3.16.7_29-3.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115292" comment="bbswitch-kmp-xen-0.8_k3.16.7_29-3.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115293" comment="cloop-2.639-14.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115294" comment="cloop-kmp-default-2.639_k3.16.7_29-14.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115295" comment="cloop-kmp-desktop-2.639_k3.16.7_29-14.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115296" comment="cloop-kmp-pae-2.639_k3.16.7_29-14.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115297" comment="cloop-kmp-xen-2.639_k3.16.7_29-14.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115298" comment="crash-7.0.8-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115299" comment="crash-devel-7.0.8-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115300" comment="crash-doc-7.0.8-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115301" comment="crash-eppic-7.0.8-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115302" comment="crash-gcore-7.0.8-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115303" comment="crash-kmp-default-7.0.8_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115304" comment="crash-kmp-desktop-7.0.8_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115305" comment="crash-kmp-pae-7.0.8_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115306" comment="crash-kmp-xen-7.0.8_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115307" comment="hdjmod-1.28-18.14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115308" comment="hdjmod-kmp-default-1.28_k3.16.7_29-18.14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115309" comment="hdjmod-kmp-desktop-1.28_k3.16.7_29-18.14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115310" comment="hdjmod-kmp-pae-1.28_k3.16.7_29-18.14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115311" comment="hdjmod-kmp-xen-1.28_k3.16.7_29-18.14.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115312" comment="ipset-6.23-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115313" comment="ipset-devel-6.23-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115314" comment="ipset-kmp-default-6.23_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115315" comment="ipset-kmp-desktop-6.23_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115316" comment="ipset-kmp-pae-6.23_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115317" comment="ipset-kmp-xen-6.23_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115319" comment="kernel-debug-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115320" comment="kernel-debug-base-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115321" comment="kernel-debug-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115322" comment="kernel-default-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115323" comment="kernel-default-base-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115324" comment="kernel-default-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115325" comment="kernel-desktop-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115326" comment="kernel-desktop-base-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115327" comment="kernel-desktop-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115338" comment="kernel-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115328" comment="kernel-docs-3.16.7-29.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115329" comment="kernel-ec2-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115330" comment="kernel-ec2-base-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115331" comment="kernel-ec2-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115339" comment="kernel-macros-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115332" comment="kernel-obs-build-3.16.7-29.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115334" comment="kernel-obs-qa-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115333" comment="kernel-obs-qa-xen-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115335" comment="kernel-pae-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115336" comment="kernel-pae-base-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115337" comment="kernel-pae-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115340" comment="kernel-source-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115341" comment="kernel-source-vanilla-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115342" comment="kernel-syms-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115343" comment="kernel-vanilla-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115344" comment="kernel-vanilla-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115345" comment="kernel-xen-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115346" comment="kernel-xen-base-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115347" comment="kernel-xen-devel-3.16.7-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115318" comment="libipset3-6.23-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115348" comment="pcfclock-0.44-260.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115349" comment="pcfclock-kmp-default-0.44_k3.16.7_29-260.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115350" comment="pcfclock-kmp-desktop-0.44_k3.16.7_29-260.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115351" comment="pcfclock-kmp-pae-0.44_k3.16.7_29-260.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115352" comment="vhba-kmp-20140629-2.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115353" comment="vhba-kmp-default-20140629_k3.16.7_29-2.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115354" comment="vhba-kmp-desktop-20140629_k3.16.7_29-2.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115355" comment="vhba-kmp-pae-20140629_k3.16.7_29-2.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115356" comment="vhba-kmp-xen-20140629_k3.16.7_29-2.13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115357" comment="xen-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115358" comment="xen-devel-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115367" comment="xen-doc-html-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115368" comment="xen-kmp-default-4.4.2_06_k3.16.7_29-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115369" comment="xen-kmp-desktop-4.4.2_06_k3.16.7_29-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115360" comment="xen-libs-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115359" comment="xen-libs-32bit-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115370" comment="xen-tools-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115361" comment="xen-tools-domU-4.4.2_06-27.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115362" comment="xtables-addons-2.6-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115363" comment="xtables-addons-kmp-default-2.6_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115364" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115365" comment="xtables-addons-kmp-pae-2.6_k3.16.7_29-13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115366" comment="xtables-addons-kmp-xen-2.6_k3.16.7_29-13.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7873</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7873" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7873" source="CVE"/>
    <description>
    The redirection feature in url.php in phpMyAdmin 4.4.x before 4.4.15.1 and 4.5.x before 4.5.1 allows remote attackers to spoof content via the url parameter.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009116009" comment="phpMyAdmin-4.4.15.1-17.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7885</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7885" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7885" source="CVE"/>
    <description>
    The dgnc_mgmt_ioctl function in drivers/staging/dgnc/dgnc_mgmt.c in the Linux kernel through 4.3.3 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a crafted application.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122787" comment="bbswitch-0.8-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122788" comment="bbswitch-kmp-default-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122789" comment="bbswitch-kmp-desktop-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122790" comment="bbswitch-kmp-pae-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122791" comment="bbswitch-kmp-xen-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122792" comment="cloop-2.639-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122793" comment="cloop-kmp-default-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122794" comment="cloop-kmp-desktop-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122795" comment="cloop-kmp-pae-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122796" comment="cloop-kmp-xen-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122797" comment="crash-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122798" comment="crash-devel-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122799" comment="crash-doc-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122800" comment="crash-eppic-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122801" comment="crash-gcore-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122802" comment="crash-kmp-default-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122803" comment="crash-kmp-desktop-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122804" comment="crash-kmp-pae-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122805" comment="crash-kmp-xen-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122806" comment="hdjmod-1.28-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122807" comment="hdjmod-kmp-default-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122808" comment="hdjmod-kmp-desktop-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122809" comment="hdjmod-kmp-pae-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122810" comment="hdjmod-kmp-xen-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122811" comment="ipset-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122812" comment="ipset-devel-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122813" comment="ipset-kmp-default-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122814" comment="ipset-kmp-desktop-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122815" comment="ipset-kmp-pae-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122816" comment="ipset-kmp-xen-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122817" comment="kernel-debug-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122818" comment="kernel-debug-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122819" comment="kernel-debug-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122820" comment="kernel-default-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122821" comment="kernel-default-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122822" comment="kernel-default-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122823" comment="kernel-desktop-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122824" comment="kernel-desktop-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122825" comment="kernel-desktop-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122826" comment="kernel-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122827" comment="kernel-docs-3.16.7-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122828" comment="kernel-ec2-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122829" comment="kernel-ec2-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122830" comment="kernel-ec2-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122831" comment="kernel-macros-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122832" comment="kernel-obs-build-3.16.7-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122833" comment="kernel-obs-qa-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122834" comment="kernel-obs-qa-xen-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122835" comment="kernel-pae-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122836" comment="kernel-pae-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122837" comment="kernel-pae-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122838" comment="kernel-source-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122839" comment="kernel-source-vanilla-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122840" comment="kernel-syms-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122841" comment="kernel-vanilla-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122842" comment="kernel-vanilla-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122843" comment="kernel-xen-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122844" comment="kernel-xen-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122845" comment="kernel-xen-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122846" comment="libipset3-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122847" comment="pcfclock-0.44-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122848" comment="pcfclock-kmp-default-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122849" comment="pcfclock-kmp-desktop-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122850" comment="pcfclock-kmp-pae-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122851" comment="python-virtualbox-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122852" comment="vhba-kmp-20140629-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122853" comment="vhba-kmp-default-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122854" comment="vhba-kmp-desktop-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122855" comment="vhba-kmp-pae-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122856" comment="vhba-kmp-xen-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122857" comment="virtualbox-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122858" comment="virtualbox-devel-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122859" comment="virtualbox-guest-desktop-icons-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122860" comment="virtualbox-guest-kmp-default-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122861" comment="virtualbox-guest-kmp-desktop-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122862" comment="virtualbox-guest-kmp-pae-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122863" comment="virtualbox-guest-tools-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122864" comment="virtualbox-guest-x11-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122865" comment="virtualbox-host-kmp-default-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122866" comment="virtualbox-host-kmp-desktop-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122867" comment="virtualbox-host-kmp-pae-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122868" comment="virtualbox-host-source-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122869" comment="virtualbox-qt-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122870" comment="virtualbox-websrv-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122871" comment="xen-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122872" comment="xen-devel-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122873" comment="xen-doc-html-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122874" comment="xen-kmp-default-4.4.3_08_k3.16.7_32-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122875" comment="xen-kmp-desktop-4.4.3_08_k3.16.7_32-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122876" comment="xen-libs-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122877" comment="xen-libs-32bit-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122878" comment="xen-tools-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122879" comment="xen-tools-domU-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122880" comment="xtables-addons-2.6-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122881" comment="xtables-addons-kmp-default-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122882" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122883" comment="xtables-addons-kmp-pae-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122884" comment="xtables-addons-kmp-xen-2.6_k3.16.7_32-15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7940</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7940" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7940" source="CVE"/>
    <description>
    The Bouncy Castle Java library before 1.51 does not validate a point is withing the elliptic curve, which makes it easier for remote attackers to obtain private keys via a series of crafted elliptic curve Diffie Hellman (ECDH) key exchanges, aka an "invalid curve attack."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009115538" comment="bouncycastle-1.53-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009115539" comment="bouncycastle-javadoc-1.53-13.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7941</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7941" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7941" source="CVE"/>
    <description>
    libxml2 2.9.2 does not properly stop parsing invalid input, which allows context-dependent attackers to cause a denial of service (out-of-bounds read and libxml2 crash) via crafted XML data to the (1) xmlParseEntityDecl or (2) xmlParseConditionalSections function in parser.c, as demonstrated by non-terminated entities.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009120421" comment="libxml2-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120422" comment="libxml2-2-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120423" comment="libxml2-2-32bit-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120424" comment="libxml2-devel-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120425" comment="libxml2-devel-32bit-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120426" comment="libxml2-doc-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120427" comment="libxml2-tools-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120428" comment="python-libxml2-2.9.3-7.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7942</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7942" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7942" source="CVE"/>
    <description>
    The xmlParseConditionalSections function in parser.c in libxml2 does not properly skip intermediary entities when it stops parsing invalid input, which allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via crafted XML data, a different vulnerability than CVE-2015-7941.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009120421" comment="libxml2-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120422" comment="libxml2-2-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120423" comment="libxml2-2-32bit-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120424" comment="libxml2-devel-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120425" comment="libxml2-devel-32bit-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120426" comment="libxml2-doc-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120427" comment="libxml2-tools-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120428" comment="python-libxml2-2.9.3-7.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7969</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7969" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7969" source="CVE"/>
    <description>
    Multiple memory leaks in Xen 4.0 through 4.6.x allow local guest administrators or domains with certain permission to cause a denial of service (memory consumption) via a large number of "teardowns" of domains with the vcpu pointer array allocated using the (1) XEN_DOMCTL_max_vcpus hypercall or the xenoprofile state vcpu pointer array allocated using the (2) XENOPROF_get_buffer or (3) XENOPROF_set_passive hypercall.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117956" comment="xen-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117957" comment="xen-devel-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117958" comment="xen-doc-html-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117959" comment="xen-kmp-default-4.4.3_02_k3.16.7_29-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117960" comment="xen-kmp-desktop-4.4.3_02_k3.16.7_29-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117961" comment="xen-libs-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117962" comment="xen-libs-32bit-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117963" comment="xen-tools-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117964" comment="xen-tools-domU-4.4.3_02-30.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7970</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7970" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7970" source="CVE"/>
    <description>
    The p2m_pod_emergency_sweep function in arch/x86/mm/p2m-pod.c in Xen 3.4.x, 3.5.x, and 3.6.x is not preemptible, which allows local x86 HVM guest administrators to cause a denial of service (CPU consumption and possibly reboot) via crafted memory contents that triggers a "time-consuming linear scan," related to Populate-on-Demand.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118953" comment="xen-4.4.3_04-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118954" comment="xen-devel-4.4.3_04-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118955" comment="xen-doc-html-4.4.3_04-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118956" comment="xen-kmp-default-4.4.3_04_k3.16.7_29-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118957" comment="xen-kmp-desktop-4.4.3_04_k3.16.7_29-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118958" comment="xen-libs-4.4.3_04-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118959" comment="xen-libs-32bit-4.4.3_04-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118960" comment="xen-tools-4.4.3_04-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118961" comment="xen-tools-domU-4.4.3_04-33.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7971</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7971" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7971" source="CVE"/>
    <description>
    Xen 3.2.x through 4.6.x does not limit the number of printk console messages when logging certain pmu and profiling hypercalls, which allows local guests to cause a denial of service via a sequence of crafted (1) HYPERCALL_xenoprof_op hypercalls, which are not properly handled in the do_xenoprof_op function in common/xenoprof.c, or (2) HYPERVISOR_xenpmu_op hypercalls, which are not properly handled in the do_xenpmu_op function in arch/x86/cpu/vpmu.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117956" comment="xen-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117957" comment="xen-devel-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117958" comment="xen-doc-html-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117959" comment="xen-kmp-default-4.4.3_02_k3.16.7_29-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117960" comment="xen-kmp-desktop-4.4.3_02_k3.16.7_29-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117961" comment="xen-libs-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117962" comment="xen-libs-32bit-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117963" comment="xen-tools-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117964" comment="xen-tools-domU-4.4.3_02-30.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7972</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7972" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7972" source="CVE"/>
    <description>
    The (1) libxl_set_memory_target function in tools/libxl/libxl.c and (2) libxl__build_post function in tools/libxl/libxl_dom.c in Xen 3.4.x through 4.6.x do not properly calculate the balloon size when using the populate-on-demand (PoD) system, which allows local HVM guest users to cause a denial of service (guest crash) via unspecified vectors related to "heavy memory pressure."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117956" comment="xen-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117957" comment="xen-devel-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117958" comment="xen-doc-html-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117959" comment="xen-kmp-default-4.4.3_02_k3.16.7_29-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117960" comment="xen-kmp-desktop-4.4.3_02_k3.16.7_29-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117961" comment="xen-libs-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117962" comment="xen-libs-32bit-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117963" comment="xen-tools-4.4.3_02-30.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117964" comment="xen-tools-domU-4.4.3_02-30.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7973</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7973" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7973" source="CVE"/>
    <description>
    NTP before 4.2.8p6 and 4.3.x before 4.3.90, when configured in broadcast mode, allows man-in-the-middle attackers to conduct replay attacks by sniffing the network.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128159" comment="ntp-4.2.8p7-25.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128160" comment="ntp-doc-4.2.8p7-25.15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7974</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7974" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974" source="CVE"/>
    <description>
    NTP 4.x before 4.2.8p6 and 4.3.x before 4.3.90 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a "skeleton key."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128159" comment="ntp-4.2.8p7-25.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128160" comment="ntp-doc-4.2.8p7-25.15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7975</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7975" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7975" source="CVE"/>
    <description>
    The nextvar function in NTP before 4.2.8p6 and 4.3.x before 4.3.90 does not properly validate the length of its input, which allows an attacker to cause a denial of service (application crash).
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128159" comment="ntp-4.2.8p7-25.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128160" comment="ntp-doc-4.2.8p7-25.15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7976</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7976" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7976" source="CVE"/>
    <description>
    The ntpq saveconfig command in NTP 4.1.2, 4.2.x before 4.2.8p6, 4.3, 4.3.25, 4.3.70, and 4.3.77 does not properly filter special characters, which allows attackers to cause unspecified impact via a crafted filename.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128159" comment="ntp-4.2.8p7-25.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128160" comment="ntp-doc-4.2.8p7-25.15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7977</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7977" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977" source="CVE"/>
    <description>
    ntpd in NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (NULL pointer dereference) via a ntpdc reslist command.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128159" comment="ntp-4.2.8p7-25.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128160" comment="ntp-doc-4.2.8p7-25.15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7978</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7978" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978" source="CVE"/>
    <description>
    NTP before 4.2.8p6 and 4.3.0 before 4.3.90 allows a remote attackers to cause a denial of service (stack exhaustion) via an ntpdc relist command, which triggers recursive traversal of the restriction list.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128159" comment="ntp-4.2.8p7-25.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128160" comment="ntp-doc-4.2.8p7-25.15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7979</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7979" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979" source="CVE"/>
    <description>
    NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (client-server association tear down) by sending broadcast packets with invalid authentication to a broadcast client.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128159" comment="ntp-4.2.8p7-25.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128160" comment="ntp-doc-4.2.8p7-25.15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7981</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7981" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7981" source="CVE"/>
    <description>
    The png_convert_to_rfc1123 function in png.c in libpng 1.0.x before 1.0.64, 1.2.x before 1.2.54, and 1.4.x before 1.4.17 allows remote attackers to obtain sensitive process memory information via crafted tIME chunk data in an image file, which triggers an out-of-bounds read.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118110" comment="libpng12-1.2.51-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118111" comment="libpng12-0-1.2.51-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118112" comment="libpng12-0-32bit-1.2.51-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118113" comment="libpng12-compat-devel-1.2.51-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118114" comment="libpng12-compat-devel-32bit-1.2.51-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118115" comment="libpng12-devel-1.2.51-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118116" comment="libpng12-devel-32bit-1.2.51-3.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7990</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7990" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7990" source="CVE"/>
    <description>
    Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket that was not properly bound.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-6937.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122787" comment="bbswitch-0.8-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122788" comment="bbswitch-kmp-default-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122789" comment="bbswitch-kmp-desktop-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122790" comment="bbswitch-kmp-pae-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122791" comment="bbswitch-kmp-xen-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122792" comment="cloop-2.639-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122793" comment="cloop-kmp-default-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122794" comment="cloop-kmp-desktop-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122795" comment="cloop-kmp-pae-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122796" comment="cloop-kmp-xen-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122797" comment="crash-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122798" comment="crash-devel-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122799" comment="crash-doc-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122800" comment="crash-eppic-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122801" comment="crash-gcore-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122802" comment="crash-kmp-default-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122803" comment="crash-kmp-desktop-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122804" comment="crash-kmp-pae-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122805" comment="crash-kmp-xen-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122806" comment="hdjmod-1.28-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122807" comment="hdjmod-kmp-default-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122808" comment="hdjmod-kmp-desktop-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122809" comment="hdjmod-kmp-pae-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122810" comment="hdjmod-kmp-xen-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122811" comment="ipset-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122812" comment="ipset-devel-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122813" comment="ipset-kmp-default-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122814" comment="ipset-kmp-desktop-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122815" comment="ipset-kmp-pae-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122816" comment="ipset-kmp-xen-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122817" comment="kernel-debug-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122818" comment="kernel-debug-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122819" comment="kernel-debug-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122820" comment="kernel-default-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122821" comment="kernel-default-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122822" comment="kernel-default-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122823" comment="kernel-desktop-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122824" comment="kernel-desktop-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122825" comment="kernel-desktop-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122826" comment="kernel-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122827" comment="kernel-docs-3.16.7-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122828" comment="kernel-ec2-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122829" comment="kernel-ec2-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122830" comment="kernel-ec2-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122831" comment="kernel-macros-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122832" comment="kernel-obs-build-3.16.7-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122833" comment="kernel-obs-qa-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122834" comment="kernel-obs-qa-xen-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122835" comment="kernel-pae-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122836" comment="kernel-pae-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122837" comment="kernel-pae-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122838" comment="kernel-source-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122839" comment="kernel-source-vanilla-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122840" comment="kernel-syms-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122841" comment="kernel-vanilla-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122842" comment="kernel-vanilla-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122843" comment="kernel-xen-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122844" comment="kernel-xen-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122845" comment="kernel-xen-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122846" comment="libipset3-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122847" comment="pcfclock-0.44-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122848" comment="pcfclock-kmp-default-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122849" comment="pcfclock-kmp-desktop-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122850" comment="pcfclock-kmp-pae-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122851" comment="python-virtualbox-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122852" comment="vhba-kmp-20140629-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122853" comment="vhba-kmp-default-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122854" comment="vhba-kmp-desktop-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122855" comment="vhba-kmp-pae-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122856" comment="vhba-kmp-xen-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122857" comment="virtualbox-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122858" comment="virtualbox-devel-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122859" comment="virtualbox-guest-desktop-icons-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122860" comment="virtualbox-guest-kmp-default-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122861" comment="virtualbox-guest-kmp-desktop-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122862" comment="virtualbox-guest-kmp-pae-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122863" comment="virtualbox-guest-tools-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122864" comment="virtualbox-guest-x11-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122865" comment="virtualbox-host-kmp-default-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122866" comment="virtualbox-host-kmp-desktop-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122867" comment="virtualbox-host-kmp-pae-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122868" comment="virtualbox-host-source-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122869" comment="virtualbox-qt-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122870" comment="virtualbox-websrv-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122871" comment="xen-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122872" comment="xen-devel-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122873" comment="xen-doc-html-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122874" comment="xen-kmp-default-4.4.3_08_k3.16.7_32-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122875" comment="xen-kmp-desktop-4.4.3_08_k3.16.7_32-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122876" comment="xen-libs-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122877" comment="xen-libs-32bit-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122878" comment="xen-tools-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122879" comment="xen-tools-domU-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122880" comment="xtables-addons-2.6-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122881" comment="xtables-addons-kmp-default-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122882" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122883" comment="xtables-addons-kmp-pae-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122884" comment="xtables-addons-kmp-xen-2.6_k3.16.7_32-15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7995</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-7995" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7995" source="CVE"/>
    <description>
    The xsltStylePreCompute function in preproc.c in libxslt 1.1.28 does not check if the parent node is an element, which allows attackers to cause a denial of service via a crafted XML file, related to a "type confusion" issue.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128284" comment="libxslt-1.1.28-7.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128285" comment="libxslt-devel-1.1.28-7.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128286" comment="libxslt-devel-32bit-1.1.28-7.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128287" comment="libxslt-python-1.1.28-7.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128288" comment="libxslt-tools-1.1.28-7.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128289" comment="libxslt1-1.1.28-7.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128290" comment="libxslt1-32bit-1.1.28-7.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8000</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8000" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8000" source="CVE"/>
    <description>
    db.c in named in ISC BIND 9.x before 9.9.8-P2 and 9.10.x before 9.10.3-P2 allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via a malformed class attribute.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009120368" comment="bind-9.9.6P1-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120369" comment="bind-chrootenv-9.9.6P1-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120370" comment="bind-devel-9.9.6P1-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120371" comment="bind-doc-9.9.6P1-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120372" comment="bind-libs-9.9.6P1-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120373" comment="bind-libs-32bit-9.9.6P1-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120374" comment="bind-lwresd-9.9.6P1-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120375" comment="bind-utils-9.9.6P1-2.13.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8023</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8023" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8023" source="CVE"/>
    <description>
    The server implementation of the EAP-MSCHAPv2 protocol in the eap-mschapv2 plugin in strongSwan 4.2.12 through 5.x before 5.3.4 does not properly validate local state, which allows remote attackers to bypass authentication via an empty Success message in response to an initial Challenge message.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118147" comment="strongswan-5.1.3-4.14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118148" comment="strongswan-doc-5.1.3-4.14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118149" comment="strongswan-ipsec-5.1.3-4.14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118150" comment="strongswan-libs0-5.1.3-4.14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118151" comment="strongswan-mysql-5.1.3-4.14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118152" comment="strongswan-nm-5.1.3-4.14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118153" comment="strongswan-sqlite-5.1.3-4.14.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8025</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8025" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8025" source="CVE"/>
    <description>
    driver/subprocs.c in XScreenSaver before 5.34 does not properly perform an internal consistency check, which allows physically proximate attackers to bypass the lock screen by hot swapping monitors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118010" comment="xscreensaver-5.29-2.4.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118011" comment="xscreensaver-data-5.29-2.4.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118012" comment="xscreensaver-data-extra-5.29-2.4.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8027</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8027" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8027" source="CVE"/>
    <description>
    Node.js 0.12.x before 0.12.9, 4.x before 4.2.3, and 5.x before 5.1.1 does not ensure the availability of a parser for each HTTP socket, which allows remote attackers to cause a denial of service (uncaughtException and service outage) via a pipelined HTTP request.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009121523" comment="nodejs-4.2.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121524" comment="nodejs-devel-4.2.4-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121520" comment="nodejs-doc-4.2.4-9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8035</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8035" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8035" source="CVE"/>
    <description>
    The xz_decomp function in xzlib.c in libxml2 2.9.1 does not properly detect compression errors, which allows context-dependent attackers to cause a denial of service (process hang) via crafted XML data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009120421" comment="libxml2-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120422" comment="libxml2-2-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120423" comment="libxml2-2-32bit-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120424" comment="libxml2-devel-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120425" comment="libxml2-devel-32bit-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120426" comment="libxml2-doc-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120427" comment="libxml2-tools-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120428" comment="python-libxml2-2.9.3-7.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158036" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8036</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8036" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8036" source="CVE"/>
    <description>
    Heap-based buffer overflow in ARM mbed TLS (formerly PolarSSL) 1.3.x before 1.3.14 and 2.x before 2.1.2 allows remote SSL servers to cause a denial of service (client crash) and possibly execute arbitrary code via a long session ticket name to the session ticket extension, which is not properly handled when creating a ClientHello message to resume a session.  NOTE: this identifier was SPLIT from CVE-2015-5291 per ADT3 due to different affected version ranges.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130746" comment="libpolarssl7-1.3.9-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130747" comment="polarssl-1.3.9-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130748" comment="polarssl-devel-1.3.9-17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8042</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8042" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8042" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allows attackers to execute arbitrary code via a crafted loadSound call, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8043, CVE-2015-8044, and CVE-2015-8046.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117858" comment="flash-player-11.2.202.548-2.79.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117859" comment="flash-player-gnome-11.2.202.548-2.79.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117860" comment="flash-player-kde4-11.2.202.548-2.79.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8043</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8043" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8043" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8044, and CVE-2015-8046.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117858" comment="flash-player-11.2.202.548-2.79.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117859" comment="flash-player-gnome-11.2.202.548-2.79.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117860" comment="flash-player-kde4-11.2.202.548-2.79.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8044</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8044" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8044" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, and CVE-2015-8046.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117858" comment="flash-player-11.2.202.548-2.79.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117859" comment="flash-player-gnome-11.2.202.548-2.79.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117860" comment="flash-player-kde4-11.2.202.548-2.79.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8045</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8045" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8045" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8047, CVE-2015-8060, CVE-2015-8408, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8443, CVE-2015-8444, CVE-2015-8451, and CVE-2015-8455.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8046</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8046" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8046" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK &amp; Compiler before 19.0.0.241 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, and CVE-2015-8044.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117858" comment="flash-player-11.2.202.548-2.79.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117859" comment="flash-player-gnome-11.2.202.548-2.79.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117860" comment="flash-player-kde4-11.2.202.548-2.79.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8047</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8047" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8047" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8045, CVE-2015-8060, CVE-2015-8408, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8443, CVE-2015-8444, CVE-2015-8451, and CVE-2015-8455.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8048</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8048" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8048" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8049</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8049" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8049" source="CVE"/>
    <description>
    Use-after-free vulnerability in the TextField object implementation in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via a crafted autoSize property value, a different vulnerability than CVE-2015-8048, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8050</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8050" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8050" source="CVE"/>
    <description>
    Use-after-free vulnerability in the MovieClip object implementation in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via a crafted beginGradientFill call, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8055</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8055" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8055" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8056</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8056" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8056" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8057</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8057" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8057" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8058</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8058" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8058" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8059</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8059" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8059" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8060</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8060" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8060" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8045, CVE-2015-8047, CVE-2015-8408, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8443, CVE-2015-8444, CVE-2015-8451, and CVE-2015-8455.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8061</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8061" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8061" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8062</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8062" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8062" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8063</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8063" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8064</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8064" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8064" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8065</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8065" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8065" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8066</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8066" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8066" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8067</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8067" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8067" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8068</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8068" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8068" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8069</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8069" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8069" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8070</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8070" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8070" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8071</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8071" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8071" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8075</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8075" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8075" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA.  Further investigation showed that it was not a security issue.  Notes: none.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009117876" comment="libsndfile-1.0.25-19.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117877" comment="libsndfile-devel-1.0.25-19.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117878" comment="libsndfile-progs-1.0.25-19.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117879" comment="libsndfile1-1.0.25-19.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009117880" comment="libsndfile1-32bit-1.0.25-19.7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8077</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8077" source="CVE"/>
    <description>
    Integer overflow in the index_urlfetch function in imap/index.c in Cyrus IMAP 2.3.19, 2.4.18, and 2.5.6 allows remote attackers to have unspecified impact via vectors related to urlfetch range checks and the start_octet variable.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8076.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118335" comment="cyradm-2.4.18-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118336" comment="cyrus-imapd-2.4.18-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118337" comment="cyrus-imapd-devel-2.4.18-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118338" comment="cyrus-imapd-snmp-2.4.18-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118339" comment="cyrus-imapd-snmp-mibs-2.4.18-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118340" comment="cyrus-imapd-utils-2.4.18-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118341" comment="perl-Cyrus-IMAP-2.4.18-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118342" comment="perl-Cyrus-SIEVE-managesieve-2.4.18-2.10.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8078</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8078" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8078" source="CVE"/>
    <description>
    Integer overflow in the index_urlfetch function in imap/index.c in Cyrus IMAP 2.3.19, 2.4.18, and 2.5.6 allows remote attackers to have unspecified impact via vectors related to urlfetch range checks and the section_offset variable.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8076.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118335" comment="cyradm-2.4.18-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118336" comment="cyrus-imapd-2.4.18-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118337" comment="cyrus-imapd-devel-2.4.18-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118338" comment="cyrus-imapd-snmp-2.4.18-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118339" comment="cyrus-imapd-snmp-mibs-2.4.18-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118340" comment="cyrus-imapd-utils-2.4.18-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118341" comment="perl-Cyrus-IMAP-2.4.18-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118342" comment="perl-Cyrus-SIEVE-managesieve-2.4.18-2.10.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8080</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8080" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8080" source="CVE"/>
    <description>
    Integer overflow in the getnum function in lua_struct.c in Redis 2.8.x before 2.8.24 and 3.0.x before 3.0.6 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128300" comment="redis-2.8.22-2.9.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8104</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8104" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104" source="CVE"/>
    <description>
    The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122787" comment="bbswitch-0.8-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122788" comment="bbswitch-kmp-default-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122789" comment="bbswitch-kmp-desktop-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122790" comment="bbswitch-kmp-pae-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122791" comment="bbswitch-kmp-xen-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122792" comment="cloop-2.639-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122793" comment="cloop-kmp-default-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122794" comment="cloop-kmp-desktop-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122795" comment="cloop-kmp-pae-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122796" comment="cloop-kmp-xen-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122797" comment="crash-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122798" comment="crash-devel-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122799" comment="crash-doc-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122800" comment="crash-eppic-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122801" comment="crash-gcore-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122802" comment="crash-kmp-default-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122803" comment="crash-kmp-desktop-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122804" comment="crash-kmp-pae-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122805" comment="crash-kmp-xen-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122806" comment="hdjmod-1.28-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122807" comment="hdjmod-kmp-default-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122808" comment="hdjmod-kmp-desktop-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122809" comment="hdjmod-kmp-pae-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122810" comment="hdjmod-kmp-xen-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122811" comment="ipset-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122812" comment="ipset-devel-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122813" comment="ipset-kmp-default-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122814" comment="ipset-kmp-desktop-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122815" comment="ipset-kmp-pae-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122816" comment="ipset-kmp-xen-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122817" comment="kernel-debug-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122818" comment="kernel-debug-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122819" comment="kernel-debug-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122820" comment="kernel-default-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122821" comment="kernel-default-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122822" comment="kernel-default-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122823" comment="kernel-desktop-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122824" comment="kernel-desktop-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122825" comment="kernel-desktop-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122826" comment="kernel-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122827" comment="kernel-docs-3.16.7-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122828" comment="kernel-ec2-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122829" comment="kernel-ec2-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122830" comment="kernel-ec2-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122831" comment="kernel-macros-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122832" comment="kernel-obs-build-3.16.7-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122833" comment="kernel-obs-qa-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122834" comment="kernel-obs-qa-xen-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122835" comment="kernel-pae-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122836" comment="kernel-pae-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122837" comment="kernel-pae-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122838" comment="kernel-source-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122839" comment="kernel-source-vanilla-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122840" comment="kernel-syms-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122841" comment="kernel-vanilla-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122842" comment="kernel-vanilla-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122843" comment="kernel-xen-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122844" comment="kernel-xen-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122845" comment="kernel-xen-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122846" comment="libipset3-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122847" comment="pcfclock-0.44-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122848" comment="pcfclock-kmp-default-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122849" comment="pcfclock-kmp-desktop-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122850" comment="pcfclock-kmp-pae-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122851" comment="python-virtualbox-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122852" comment="vhba-kmp-20140629-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122853" comment="vhba-kmp-default-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122854" comment="vhba-kmp-desktop-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122855" comment="vhba-kmp-pae-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122856" comment="vhba-kmp-xen-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122857" comment="virtualbox-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122858" comment="virtualbox-devel-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122859" comment="virtualbox-guest-desktop-icons-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122860" comment="virtualbox-guest-kmp-default-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122861" comment="virtualbox-guest-kmp-desktop-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122862" comment="virtualbox-guest-kmp-pae-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122863" comment="virtualbox-guest-tools-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122864" comment="virtualbox-guest-x11-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122865" comment="virtualbox-host-kmp-default-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122866" comment="virtualbox-host-kmp-desktop-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122867" comment="virtualbox-host-kmp-pae-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122868" comment="virtualbox-host-source-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122869" comment="virtualbox-qt-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122870" comment="virtualbox-websrv-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122871" comment="xen-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122872" comment="xen-devel-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122873" comment="xen-doc-html-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122874" comment="xen-kmp-default-4.4.3_08_k3.16.7_32-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122875" comment="xen-kmp-desktop-4.4.3_08_k3.16.7_32-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122876" comment="xen-libs-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122877" comment="xen-libs-32bit-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122878" comment="xen-tools-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122879" comment="xen-tools-domU-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122880" comment="xtables-addons-2.6-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122881" comment="xtables-addons-kmp-default-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122882" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122883" comment="xtables-addons-kmp-pae-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122884" comment="xtables-addons-kmp-xen-2.6_k3.16.7_32-15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8126</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8126" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126" source="CVE"/>
    <description>
    Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE functions in libpng before 1.0.64, 1.1.x and 1.2.x before 1.2.54, 1.3.x and 1.4.x before 1.4.17, 1.5.x before 1.5.24, and 1.6.x before 1.6.19 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124631" comment="chromedriver-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124632" comment="chromium-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124633" comment="chromium-desktop-gnome-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124634" comment="chromium-desktop-kde-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124635" comment="chromium-ffmpegsumo-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122295" comment="java-1_7_0-openjdk-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122296" comment="java-1_7_0-openjdk-accessibility-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122297" comment="java-1_7_0-openjdk-bootstrap-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122298" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122299" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122300" comment="java-1_7_0-openjdk-demo-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122301" comment="java-1_7_0-openjdk-devel-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122302" comment="java-1_7_0-openjdk-headless-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122303" comment="java-1_7_0-openjdk-javadoc-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122304" comment="java-1_7_0-openjdk-src-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122288" comment="java-1_8_0-openjdk-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122289" comment="java-1_8_0-openjdk-accessibility-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122290" comment="java-1_8_0-openjdk-demo-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122291" comment="java-1_8_0-openjdk-devel-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122292" comment="java-1_8_0-openjdk-headless-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122293" comment="java-1_8_0-openjdk-javadoc-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122294" comment="java-1_8_0-openjdk-src-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119240" comment="libpng12-1.2.51-3.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119241" comment="libpng12-0-1.2.51-3.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119242" comment="libpng12-0-32bit-1.2.51-3.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119243" comment="libpng12-compat-devel-1.2.51-3.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119244" comment="libpng12-compat-devel-32bit-1.2.51-3.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119245" comment="libpng12-devel-1.2.51-3.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119246" comment="libpng12-devel-32bit-1.2.51-3.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119247" comment="libpng16-1.6.13-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119248" comment="libpng16-16-1.6.13-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119249" comment="libpng16-16-32bit-1.6.13-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119250" comment="libpng16-compat-devel-1.6.13-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119251" comment="libpng16-compat-devel-32bit-1.6.13-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119252" comment="libpng16-devel-1.6.13-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119253" comment="libpng16-devel-32bit-1.6.13-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119254" comment="libpng16-tools-1.6.13-2.10.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8138</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8138" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138" source="CVE"/>
    <description>
    NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to bypass the origin timestamp validation via a packet with an origin timestamp set to zero.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128159" comment="ntp-4.2.8p7-25.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128160" comment="ntp-doc-4.2.8p7-25.15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8139</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8139" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8139" source="CVE"/>
    <description>
    ntpq in NTP before 4.2.8p7 allows remote attackers to obtain origin timestamps and then impersonate peers via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128159" comment="ntp-4.2.8p7-25.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128160" comment="ntp-doc-4.2.8p7-25.15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8140</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8140" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8140" source="CVE"/>
    <description>
    The ntpq protocol in NTP before 4.2.8p7 allows remote attackers to conduct replay attacks by sniffing the network.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128159" comment="ntp-4.2.8p7-25.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128160" comment="ntp-doc-4.2.8p7-25.15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8158</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8158" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158" source="CVE"/>
    <description>
    The getresponse function in ntpq in NTP versions before 4.2.8p9 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (infinite loop) via crafted packets with incorrect values.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128159" comment="ntp-4.2.8p7-25.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128160" comment="ntp-doc-4.2.8p7-25.15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8213</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8213" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8213" source="CVE"/>
    <description>
    The get_format function in utils/formats.py in Django before 1.7.x before 1.7.11, 1.8.x before 1.8.7, and 1.9.x before 1.9rc2 might allow remote attackers to obtain sensitive application secrets via a settings key in place of a date/time format setting, as demonstrated by SECRET_KEY.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118827" comment="python-Django-1.6.11-3.13.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8215</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8215" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8215" source="CVE"/>
    <description>
    net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel before 4.0 does not validate attempted changes to the MTU value, which allows context-dependent attackers to cause a denial of service (packet loss) via a value that is (1) smaller than the minimum compliant value or (2) larger than the MTU of an interface, as demonstrated by a Router Advertisement (RA) message that is not validated by a daemon, a different vulnerability than CVE-2015-0272.  NOTE: the scope of CVE-2015-0272 is limited to the NetworkManager product.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122787" comment="bbswitch-0.8-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122788" comment="bbswitch-kmp-default-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122789" comment="bbswitch-kmp-desktop-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122790" comment="bbswitch-kmp-pae-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122791" comment="bbswitch-kmp-xen-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122792" comment="cloop-2.639-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122793" comment="cloop-kmp-default-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122794" comment="cloop-kmp-desktop-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122795" comment="cloop-kmp-pae-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122796" comment="cloop-kmp-xen-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122797" comment="crash-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122798" comment="crash-devel-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122799" comment="crash-doc-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122800" comment="crash-eppic-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122801" comment="crash-gcore-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122802" comment="crash-kmp-default-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122803" comment="crash-kmp-desktop-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122804" comment="crash-kmp-pae-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122805" comment="crash-kmp-xen-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122806" comment="hdjmod-1.28-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122807" comment="hdjmod-kmp-default-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122808" comment="hdjmod-kmp-desktop-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122809" comment="hdjmod-kmp-pae-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122810" comment="hdjmod-kmp-xen-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122811" comment="ipset-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122812" comment="ipset-devel-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122813" comment="ipset-kmp-default-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122814" comment="ipset-kmp-desktop-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122815" comment="ipset-kmp-pae-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122816" comment="ipset-kmp-xen-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122817" comment="kernel-debug-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122818" comment="kernel-debug-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122819" comment="kernel-debug-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122820" comment="kernel-default-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122821" comment="kernel-default-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122822" comment="kernel-default-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122823" comment="kernel-desktop-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122824" comment="kernel-desktop-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122825" comment="kernel-desktop-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122826" comment="kernel-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122827" comment="kernel-docs-3.16.7-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122828" comment="kernel-ec2-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122829" comment="kernel-ec2-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122830" comment="kernel-ec2-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122831" comment="kernel-macros-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122832" comment="kernel-obs-build-3.16.7-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122833" comment="kernel-obs-qa-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122834" comment="kernel-obs-qa-xen-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122835" comment="kernel-pae-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122836" comment="kernel-pae-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122837" comment="kernel-pae-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122838" comment="kernel-source-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122839" comment="kernel-source-vanilla-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122840" comment="kernel-syms-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122841" comment="kernel-vanilla-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122842" comment="kernel-vanilla-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122843" comment="kernel-xen-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122844" comment="kernel-xen-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122845" comment="kernel-xen-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122846" comment="libipset3-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122847" comment="pcfclock-0.44-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122848" comment="pcfclock-kmp-default-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122849" comment="pcfclock-kmp-desktop-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122850" comment="pcfclock-kmp-pae-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122851" comment="python-virtualbox-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122852" comment="vhba-kmp-20140629-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122853" comment="vhba-kmp-default-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122854" comment="vhba-kmp-desktop-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122855" comment="vhba-kmp-pae-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122856" comment="vhba-kmp-xen-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122857" comment="virtualbox-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122858" comment="virtualbox-devel-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122859" comment="virtualbox-guest-desktop-icons-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122860" comment="virtualbox-guest-kmp-default-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122861" comment="virtualbox-guest-kmp-desktop-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122862" comment="virtualbox-guest-kmp-pae-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122863" comment="virtualbox-guest-tools-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122864" comment="virtualbox-guest-x11-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122865" comment="virtualbox-host-kmp-default-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122866" comment="virtualbox-host-kmp-desktop-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122867" comment="virtualbox-host-kmp-pae-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122868" comment="virtualbox-host-source-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122869" comment="virtualbox-qt-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122870" comment="virtualbox-websrv-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122871" comment="xen-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122872" comment="xen-devel-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122873" comment="xen-doc-html-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122874" comment="xen-kmp-default-4.4.3_08_k3.16.7_32-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122875" comment="xen-kmp-desktop-4.4.3_08_k3.16.7_32-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122876" comment="xen-libs-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122877" comment="xen-libs-32bit-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122878" comment="xen-tools-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122879" comment="xen-tools-domU-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122880" comment="xtables-addons-2.6-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122881" comment="xtables-addons-kmp-default-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122882" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122883" comment="xtables-addons-kmp-pae-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122884" comment="xtables-addons-kmp-xen-2.6_k3.16.7_32-15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8241</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8241" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8241" source="CVE"/>
    <description>
    The xmlNextChar function in libxml2 2.9.2 does not properly check the state, which allows context-dependent attackers to cause a denial of service (heap-based buffer over-read and application crash) or obtain sensitive information via crafted XML data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009120421" comment="libxml2-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120422" comment="libxml2-2-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120423" comment="libxml2-2-32bit-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120424" comment="libxml2-devel-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120425" comment="libxml2-devel-32bit-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120426" comment="libxml2-doc-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120427" comment="libxml2-tools-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120428" comment="python-libxml2-2.9.3-7.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8242</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8242" source="CVE"/>
    <description>
    The xmlSAX2TextNode function in SAX2.c in the push interface in the HTML parser in libxml2 before 2.9.3 allows context-dependent attackers to cause a denial of service (stack-based buffer over-read and application crash) or obtain sensitive information via crafted XML data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009120421" comment="libxml2-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120422" comment="libxml2-2-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120423" comment="libxml2-2-32bit-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120424" comment="libxml2-devel-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120425" comment="libxml2-devel-32bit-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120426" comment="libxml2-doc-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120427" comment="libxml2-tools-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120428" comment="python-libxml2-2.9.3-7.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8317</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8317" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8317" source="CVE"/>
    <description>
    The xmlParseXMLDecl function in parser.c in libxml2 before 2.9.3 allows context-dependent attackers to obtain sensitive information via an (1) unterminated encoding value or (2) incomplete XML declaration in XML data, which triggers an out-of-bounds heap read.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009120421" comment="libxml2-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120422" comment="libxml2-2-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120423" comment="libxml2-2-32bit-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120424" comment="libxml2-devel-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120425" comment="libxml2-devel-32bit-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120426" comment="libxml2-doc-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120427" comment="libxml2-tools-2.9.3-7.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120428" comment="python-libxml2-2.9.3-7.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8327</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8327" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8327" source="CVE"/>
    <description>
    Incomplete blacklist vulnerability in util.c in foomatic-rip in cups-filters 1.0.42 before 1.2.0 and in foomatic-filters in Foomatic 4.0.x allows remote attackers to execute arbitrary commands via ` (backtick) characters in a print job.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009120442" comment="cups-filters-1.0.58-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120443" comment="cups-filters-cups-browsed-1.0.58-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120444" comment="cups-filters-devel-1.0.58-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120445" comment="cups-filters-foomatic-rip-1.0.58-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120446" comment="cups-filters-ghostscript-1.0.58-2.11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8339</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8339" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8339" source="CVE"/>
    <description>
    The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly hand back pages to a domain, which might allow guest OS administrators to cause a denial of service (host crash) via unspecified vectors related to domain teardown.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009121479" comment="xen-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121480" comment="xen-devel-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121481" comment="xen-doc-html-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121482" comment="xen-kmp-default-4.4.3_08_k3.16.7_29-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121483" comment="xen-kmp-desktop-4.4.3_08_k3.16.7_29-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121484" comment="xen-libs-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121485" comment="xen-libs-32bit-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121486" comment="xen-tools-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121487" comment="xen-tools-domU-4.4.3_08-36.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8340</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8340" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8340" source="CVE"/>
    <description>
    The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly release locks, which might allow guest OS administrators to cause a denial of service (deadlock or host crash) via unspecified vectors, related to XENMEM_exchange error handling.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009121479" comment="xen-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121480" comment="xen-devel-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121481" comment="xen-doc-html-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121482" comment="xen-kmp-default-4.4.3_08_k3.16.7_29-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121483" comment="xen-kmp-desktop-4.4.3_08_k3.16.7_29-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121484" comment="xen-libs-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121485" comment="xen-libs-32bit-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121486" comment="xen-tools-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121487" comment="xen-tools-domU-4.4.3_08-36.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8341</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8341" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8341" source="CVE"/>
    <description>
    The libxl toolstack library in Xen 4.1.x through 4.6.x does not properly release mappings of files used as kernels and initial ramdisks when managing multiple domains in the same process, which allows attackers to cause a denial of service (memory and disk consumption) by starting domains.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009121479" comment="xen-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121480" comment="xen-devel-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121481" comment="xen-doc-html-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121482" comment="xen-kmp-default-4.4.3_08_k3.16.7_29-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121483" comment="xen-kmp-desktop-4.4.3_08_k3.16.7_29-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121484" comment="xen-libs-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121485" comment="xen-libs-32bit-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121486" comment="xen-tools-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121487" comment="xen-tools-domU-4.4.3_08-36.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8345</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8345" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8345" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126020" comment="xen-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126021" comment="xen-devel-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126022" comment="xen-doc-html-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126023" comment="xen-kmp-default-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126024" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126025" comment="xen-libs-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126026" comment="xen-libs-32bit-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126027" comment="xen-tools-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126028" comment="xen-tools-domU-4.4.4_02-43.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8367</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8367" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8367" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119206" comment="libraw-0.16.0-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119207" comment="libraw-devel-0.16.0-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119208" comment="libraw-devel-static-0.16.0-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119209" comment="libraw-tools-0.16.0-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119210" comment="libraw10-0.16.0-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119211" comment="libraw9-0.15.4-2.6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8369</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8369" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8369" source="CVE"/>
    <description>
    SQL injection vulnerability in include/top_graph_header.php in Cacti 0.8.8f and earlier allows remote attackers to execute arbitrary SQL commands via the rra_id parameter in a properties action to graph.php.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123266" comment="cacti-0.8.8f-4.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123267" comment="cacti-spine-0.8.8f-4.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8370</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8370" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8370" source="CVE"/>
    <description>
    Multiple integer underflows in Grub2 1.98 through 2.02 allow physically proximate attackers to bypass authentication, obtain sensitive information, or cause a denial of service (disk corruption) via backspace characters in the (1) grub_username_get function in grub-core/normal/auth.c or the (2) grub_password_get function in lib/crypto.c, which trigger an "Off-by-two" or "Out of bounds overwrite" memory error.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009120414" comment="grub2-2.02~beta2-20.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120415" comment="grub2-branding-upstream-2.02~beta2-20.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120416" comment="grub2-i386-efi-2.02~beta2-20.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120417" comment="grub2-i386-pc-2.02~beta2-20.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120418" comment="grub2-snapper-plugin-2.02~beta2-20.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120419" comment="grub2-x86_64-efi-2.02~beta2-20.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120420" comment="grub2-x86_64-xen-2.02~beta2-20.13.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8377</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8377" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8377" source="CVE"/>
    <description>
    SQL injection vulnerability in the host_new_graphs_save function in graphs_new.php in Cacti 0.8.8f and earlier allows remote authenticated users to execute arbitrary SQL commands via crafted serialized data in the selected_graphs_array parameter in a save action.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123266" comment="cacti-0.8.8f-4.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123267" comment="cacti-spine-0.8.8f-4.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8380</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8380" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8380" source="CVE"/>
    <description>
    The pcre_exec function in pcre_exec.c in PCRE before 8.38 mishandles a // pattern with a \01 string, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135519" comment="libpcre1-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135520" comment="libpcre1-32bit-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135521" comment="libpcre16-0-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135522" comment="libpcre16-0-32bit-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135523" comment="libpcrecpp0-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135524" comment="libpcrecpp0-32bit-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135525" comment="libpcreposix0-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135526" comment="libpcreposix0-32bit-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135527" comment="pcre-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135528" comment="pcre-devel-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135529" comment="pcre-devel-static-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135530" comment="pcre-doc-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135531" comment="pcre-tools-8.39-3.8.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8400</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8400" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8400" source="CVE"/>
    <description>
    The HTTPS fallback implementation in Shell In A Box (aka shellinabox) before 2.19 makes it easier for remote attackers to conduct DNS rebinding attacks via the "/plain" URL.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009144697" comment="shellinabox-2.20-5.3.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8401</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8401" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8401" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8402</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8402" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8402" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8403</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8403" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8403" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8404</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8404" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8404" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8405</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8405" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8405" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8406</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8406" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8406" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8407</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8407" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8407" source="CVE"/>
    <description>
    Stack-based buffer overflow in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8457.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8408</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8408" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8408" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8045, CVE-2015-8047, CVE-2015-8060, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8443, CVE-2015-8444, CVE-2015-8451, and CVE-2015-8455.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8409</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8409" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8409" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allow attackers to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2015-8440 and CVE-2015-8453.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8410</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8410" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8410" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8411</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8411" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8411" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8412</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8412" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8412" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158413" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8413</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8413" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8413" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8414</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8414" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8414" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8415</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8415" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8415" source="CVE"/>
    <description>
    Buffer overflow in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8416</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8416" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8416" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8045, CVE-2015-8047, CVE-2015-8060, CVE-2015-8408, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8443, CVE-2015-8444, CVE-2015-8451, and CVE-2015-8455.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8417</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8417" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8417" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8045, CVE-2015-8047, CVE-2015-8060, CVE-2015-8408, CVE-2015-8416, CVE-2015-8418, CVE-2015-8419, CVE-2015-8443, CVE-2015-8444, CVE-2015-8451, and CVE-2015-8455.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8418</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8418" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8418" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8045, CVE-2015-8047, CVE-2015-8060, CVE-2015-8408, CVE-2015-8416, CVE-2015-8417, CVE-2015-8419, CVE-2015-8443, CVE-2015-8444, CVE-2015-8451, and CVE-2015-8455.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8419</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8419" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8419" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8045, CVE-2015-8047, CVE-2015-8060, CVE-2015-8408, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8443, CVE-2015-8444, CVE-2015-8451, and CVE-2015-8455.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8420</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8420" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8421</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8421" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8421" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8422</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8422" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8422" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8423</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8423" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8424</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8424" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8424" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8425</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8425" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8425" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8426</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8426" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8426" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8427</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8427" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8428</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8428" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8428" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8429</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8429" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8429" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8430</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8430" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8430" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8431</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8431" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8431" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8432</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8432" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8432" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8433</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8433" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8433" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8434</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8434" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8434" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8435</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8435" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8435" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8436</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8436" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8436" source="CVE"/>
    <description>
    Use-after-free vulnerability in the PrintJob object implementation in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via crafted addPage arguments, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8437</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8437" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8437" source="CVE"/>
    <description>
    Use-after-free vulnerability in the Selection object implementation in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via a crafted setFocus call, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8438</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8438" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8438" source="CVE"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via a crafted XML object that is mishandled during a toString call, a different vulnerability than CVE-2015-8446.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8439</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8439" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8439" source="CVE"/>
    <description>
    The SharedObject object implementation in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code by leveraging an unspecified "type confusion" during a getRemote call, a different vulnerability than CVE-2015-8456.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8440</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8440" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8440" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allow attackers to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2015-8409 and CVE-2015-8453.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8441</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8441" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8441" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8442</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8442" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8442" source="CVE"/>
    <description>
    Use-after-free vulnerability in the MovieClip object implementation in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via a crafted filters property value, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8443</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8443" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8443" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8045, CVE-2015-8047, CVE-2015-8060, CVE-2015-8408, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8444, CVE-2015-8451, and CVE-2015-8455.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8444</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8444" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8444" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8045, CVE-2015-8047, CVE-2015-8060, CVE-2015-8408, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8443, CVE-2015-8451, and CVE-2015-8455.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8445</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8445" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8445" source="CVE"/>
    <description>
    Integer overflow in the Shader filter implementation in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via a large BitmapData source object.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8446</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8446" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8446" source="CVE"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via an MP3 file with COMM tags that are mishandled during memory allocation, a different vulnerability than CVE-2015-8438.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8447</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8447" source="CVE"/>
    <description>
    Use-after-free vulnerability in the Color object implementation in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via crafted setTransform arguments, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8448</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8448" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8448" source="CVE"/>
    <description>
    Use-after-free vulnerability in the DisplacementMapFilter object implementation in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via a crafted mapBitmap property value, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8449, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8449</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8449" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8449" source="CVE"/>
    <description>
    Use-after-free vulnerability in the MovieClip object implementation in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via a crafted lineTo method call, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8450, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8450</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8450" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8450" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via a crafted filters property value in a TextField object, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8452, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8451</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8451" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8451" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8045, CVE-2015-8047, CVE-2015-8060, CVE-2015-8408, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8443, CVE-2015-8444, and CVE-2015-8455.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8452</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8452" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8452" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, and CVE-2015-8454.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8453</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8453" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8453" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allow attackers to bypass the ASLR protection mechanism via JIT data, a different vulnerability than CVE-2015-8409 and CVE-2015-8440.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8454</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8454" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8454" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8450, and CVE-2015-8452.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8455</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8455" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8455" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK &amp; Compiler before 20.0.0.204 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8045, CVE-2015-8047, CVE-2015-8060, CVE-2015-8408, CVE-2015-8416, CVE-2015-8417, CVE-2015-8418, CVE-2015-8419, CVE-2015-8443, CVE-2015-8444, and CVE-2015-8451.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009118891" comment="flash-player-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118892" comment="flash-player-gnome-11.2.202.554-2.82.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009118893" comment="flash-player-kde4-11.2.202.554-2.82.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8459</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8459" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8459" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8460, CVE-2015-8636, and CVE-2015-8645.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009120905" comment="flash-player-11.2.202.559-2.85.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120906" comment="flash-player-gnome-11.2.202.559-2.85.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120907" comment="flash-player-kde4-11.2.202.559-2.85.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8460</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8460" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8460" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8459, CVE-2015-8636, and CVE-2015-8645.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009120905" comment="flash-player-11.2.202.559-2.85.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120906" comment="flash-player-gnome-11.2.202.559-2.85.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120907" comment="flash-player-kde4-11.2.202.559-2.85.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8467</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8467" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8467" source="CVE"/>
    <description>
    The samldb_check_user_account_control_acl function in dsdb/samdb/ldb_modules/samldb.c in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 does not properly check for administrative privileges during creation of machine accounts, which allows remote authenticated users to bypass intended access restrictions by leveraging the existence of a domain with both a Samba DC and a Windows DC, a similar issue to CVE-2015-2535.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126263" comment="ctdb-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126264" comment="ctdb-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126265" comment="ctdb-pcp-pmda-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126266" comment="ctdb-tests-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120133" comment="ldb-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120134" comment="ldb-tools-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126267" comment="libdcerpc-atsvc-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126268" comment="libdcerpc-atsvc0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126269" comment="libdcerpc-atsvc0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126270" comment="libdcerpc-binding0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126271" comment="libdcerpc-binding0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126272" comment="libdcerpc-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126273" comment="libdcerpc-samr-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126274" comment="libdcerpc-samr0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126275" comment="libdcerpc-samr0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126276" comment="libdcerpc0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126277" comment="libdcerpc0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126278" comment="libgensec-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126279" comment="libgensec0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126280" comment="libgensec0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120149" comment="libldb-devel-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120150" comment="libldb1-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120151" comment="libldb1-32bit-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126281" comment="libndr-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126282" comment="libndr-krb5pac-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126283" comment="libndr-krb5pac0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126284" comment="libndr-krb5pac0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126285" comment="libndr-nbt-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126286" comment="libndr-nbt0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126287" comment="libndr-nbt0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126288" comment="libndr-standard-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126289" comment="libndr-standard0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126290" comment="libndr-standard0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126291" comment="libndr0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126292" comment="libndr0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126293" comment="libnetapi-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126294" comment="libnetapi0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126295" comment="libnetapi0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120167" comment="libpdb-devel-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120168" comment="libpdb0-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120169" comment="libpdb0-32bit-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126296" comment="libregistry-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126297" comment="libregistry0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126298" comment="libregistry0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126299" comment="libsamba-credentials-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126300" comment="libsamba-credentials0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126301" comment="libsamba-credentials0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126302" comment="libsamba-hostconfig-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126303" comment="libsamba-hostconfig0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126304" comment="libsamba-hostconfig0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126305" comment="libsamba-passdb-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126306" comment="libsamba-passdb0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126307" comment="libsamba-passdb0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126308" comment="libsamba-policy-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126309" comment="libsamba-policy0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126310" comment="libsamba-policy0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126311" comment="libsamba-util-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126312" comment="libsamba-util0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126313" comment="libsamba-util0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126314" comment="libsamdb-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126315" comment="libsamdb0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126316" comment="libsamdb0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126317" comment="libsmbclient-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126318" comment="libsmbclient-raw-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126319" comment="libsmbclient-raw0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126320" comment="libsmbclient-raw0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126321" comment="libsmbclient0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126322" comment="libsmbclient0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126323" comment="libsmbconf-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126324" comment="libsmbconf0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126325" comment="libsmbconf0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126326" comment="libsmbldap-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126327" comment="libsmbldap0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126328" comment="libsmbldap0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120200" comment="libsmbsharemodes-devel-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120201" comment="libsmbsharemodes0-4.1.22-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120202" comment="libtalloc-devel-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120203" comment="libtalloc2-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120204" comment="libtalloc2-32bit-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120205" comment="libtdb-devel-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120206" comment="libtdb1-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120207" comment="libtdb1-32bit-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120208" comment="libtevent-devel-0.9.26-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126329" comment="libtevent-util-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126330" comment="libtevent-util0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126331" comment="libtevent-util0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120212" comment="libtevent0-0.9.26-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120213" comment="libtevent0-32bit-0.9.26-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126332" comment="libwbclient-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126333" comment="libwbclient0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126334" comment="libwbclient0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120217" comment="pyldb-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120218" comment="pyldb-32bit-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120219" comment="pyldb-devel-1.1.24-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120220" comment="pytalloc-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120221" comment="pytalloc-32bit-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120222" comment="pytalloc-devel-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120223" comment="python-tdb-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120224" comment="python-tdb-32bit-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120225" comment="python-tevent-0.9.26-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120226" comment="python-tevent-32bit-0.9.26-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126335" comment="samba-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126336" comment="samba-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126337" comment="samba-client-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126338" comment="samba-client-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126339" comment="samba-core-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126340" comment="samba-doc-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126341" comment="samba-libs-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126342" comment="samba-libs-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126343" comment="samba-pidl-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126344" comment="samba-python-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126345" comment="samba-test-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126346" comment="samba-test-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126347" comment="samba-winbind-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126348" comment="samba-winbind-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120241" comment="talloc-2.1.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120242" comment="tdb-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120243" comment="tdb-tools-1.3.8-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120244" comment="tevent-0.9.26-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8472</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8472" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8472" source="CVE"/>
    <description>
    Buffer overflow in the png_set_PLTE function in libpng before 1.0.65, 1.1.x and 1.2.x before 1.2.55, 1.3.x, 1.4.x before 1.4.18, 1.5.x before 1.5.25, and 1.6.x before 1.6.20 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8126.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122295" comment="java-1_7_0-openjdk-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122296" comment="java-1_7_0-openjdk-accessibility-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122297" comment="java-1_7_0-openjdk-bootstrap-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122298" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122299" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122300" comment="java-1_7_0-openjdk-demo-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122301" comment="java-1_7_0-openjdk-devel-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122302" comment="java-1_7_0-openjdk-headless-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122303" comment="java-1_7_0-openjdk-javadoc-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122304" comment="java-1_7_0-openjdk-src-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122288" comment="java-1_8_0-openjdk-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122289" comment="java-1_8_0-openjdk-accessibility-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122290" comment="java-1_8_0-openjdk-demo-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122291" comment="java-1_8_0-openjdk-devel-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122292" comment="java-1_8_0-openjdk-headless-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122293" comment="java-1_8_0-openjdk-javadoc-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122294" comment="java-1_8_0-openjdk-src-1.8.0.72-21.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8504</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8504" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009121479" comment="xen-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121480" comment="xen-devel-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121481" comment="xen-doc-html-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121482" comment="xen-kmp-default-4.4.3_08_k3.16.7_29-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121483" comment="xen-kmp-desktop-4.4.3_08_k3.16.7_29-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121484" comment="xen-libs-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121485" comment="xen-libs-32bit-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121486" comment="xen-tools-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121487" comment="xen-tools-domU-4.4.3_08-36.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8540</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8540" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8540" source="CVE"/>
    <description>
    Integer underflow in the png_check_keyword function in pngwutil.c in libpng 0.90 through 0.99, 1.0.x before 1.0.66, 1.1.x and 1.2.x before 1.2.56, 1.3.x and 1.4.x before 1.4.19, and 1.5.x before 1.5.26 allows remote attackers to have unspecified impact via a space character as a keyword in a PNG image, which triggers an out-of-bounds read.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134004" comment="libpng12-1.2.51-3.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134005" comment="libpng12-0-1.2.51-3.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134006" comment="libpng12-0-32bit-1.2.51-3.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134007" comment="libpng12-compat-devel-1.2.51-3.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134008" comment="libpng12-compat-devel-32bit-1.2.51-3.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134009" comment="libpng12-devel-1.2.51-3.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134010" comment="libpng12-devel-32bit-1.2.51-3.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8543</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8543" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8543" source="CVE"/>
    <description>
    The networking implementation in the Linux kernel through 4.3.3, as used in Android and other products, does not validate protocol identifiers for certain protocol families, which allows local users to cause a denial of service (NULL function pointer dereference and system crash) or possibly gain privileges by leveraging CLONE_NEWUSER support to execute a crafted SOCK_RAW application.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122787" comment="bbswitch-0.8-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122788" comment="bbswitch-kmp-default-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122789" comment="bbswitch-kmp-desktop-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122790" comment="bbswitch-kmp-pae-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122791" comment="bbswitch-kmp-xen-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122792" comment="cloop-2.639-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122793" comment="cloop-kmp-default-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122794" comment="cloop-kmp-desktop-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122795" comment="cloop-kmp-pae-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122796" comment="cloop-kmp-xen-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122797" comment="crash-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122798" comment="crash-devel-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122799" comment="crash-doc-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122800" comment="crash-eppic-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122801" comment="crash-gcore-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122802" comment="crash-kmp-default-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122803" comment="crash-kmp-desktop-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122804" comment="crash-kmp-pae-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122805" comment="crash-kmp-xen-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122806" comment="hdjmod-1.28-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122807" comment="hdjmod-kmp-default-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122808" comment="hdjmod-kmp-desktop-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122809" comment="hdjmod-kmp-pae-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122810" comment="hdjmod-kmp-xen-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122811" comment="ipset-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122812" comment="ipset-devel-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122813" comment="ipset-kmp-default-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122814" comment="ipset-kmp-desktop-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122815" comment="ipset-kmp-pae-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122816" comment="ipset-kmp-xen-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122817" comment="kernel-debug-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122818" comment="kernel-debug-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122819" comment="kernel-debug-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122820" comment="kernel-default-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122821" comment="kernel-default-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122822" comment="kernel-default-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122823" comment="kernel-desktop-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122824" comment="kernel-desktop-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122825" comment="kernel-desktop-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122826" comment="kernel-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122827" comment="kernel-docs-3.16.7-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122828" comment="kernel-ec2-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122829" comment="kernel-ec2-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122830" comment="kernel-ec2-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122831" comment="kernel-macros-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122832" comment="kernel-obs-build-3.16.7-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122833" comment="kernel-obs-qa-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122834" comment="kernel-obs-qa-xen-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122835" comment="kernel-pae-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122836" comment="kernel-pae-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122837" comment="kernel-pae-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122838" comment="kernel-source-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122839" comment="kernel-source-vanilla-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122840" comment="kernel-syms-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122841" comment="kernel-vanilla-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122842" comment="kernel-vanilla-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122843" comment="kernel-xen-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122844" comment="kernel-xen-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122845" comment="kernel-xen-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122846" comment="libipset3-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122847" comment="pcfclock-0.44-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122848" comment="pcfclock-kmp-default-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122849" comment="pcfclock-kmp-desktop-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122850" comment="pcfclock-kmp-pae-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122851" comment="python-virtualbox-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122852" comment="vhba-kmp-20140629-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122853" comment="vhba-kmp-default-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122854" comment="vhba-kmp-desktop-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122855" comment="vhba-kmp-pae-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122856" comment="vhba-kmp-xen-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122857" comment="virtualbox-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122858" comment="virtualbox-devel-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122859" comment="virtualbox-guest-desktop-icons-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122860" comment="virtualbox-guest-kmp-default-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122861" comment="virtualbox-guest-kmp-desktop-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122862" comment="virtualbox-guest-kmp-pae-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122863" comment="virtualbox-guest-tools-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122864" comment="virtualbox-guest-x11-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122865" comment="virtualbox-host-kmp-default-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122866" comment="virtualbox-host-kmp-desktop-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122867" comment="virtualbox-host-kmp-pae-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122868" comment="virtualbox-host-source-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122869" comment="virtualbox-qt-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122870" comment="virtualbox-websrv-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122871" comment="xen-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122872" comment="xen-devel-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122873" comment="xen-doc-html-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122874" comment="xen-kmp-default-4.4.3_08_k3.16.7_32-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122875" comment="xen-kmp-desktop-4.4.3_08_k3.16.7_32-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122876" comment="xen-libs-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122877" comment="xen-libs-32bit-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122878" comment="xen-tools-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122879" comment="xen-tools-domU-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122880" comment="xtables-addons-2.6-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122881" comment="xtables-addons-kmp-default-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122882" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122883" comment="xtables-addons-kmp-pae-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122884" comment="xtables-addons-kmp-xen-2.6_k3.16.7_32-15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8547</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8547" source="CVE"/>
    <description>
    The CoreUserInputHandler::doMode function in core/coreuserinputhandler.cpp in Quassel 0.10.0 allows remote attackers to cause a denial of service (application crash) via the "/op *" command in a query.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009119888" comment="quassel-0.10.0-3.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119889" comment="quassel-base-0.10.0-3.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119890" comment="quassel-client-0.10.0-3.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119891" comment="quassel-core-0.10.0-3.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009119892" comment="quassel-mono-0.10.0-3.13.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8550</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8550" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550" source="CVE"/>
    <description>
    Xen, when used on a system providing PV backends, allows local guest OS administrators to cause a denial of service (host OS crash) or gain privileges by writing to memory shared between the frontend and backend, aka a double fetch vulnerability.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122787" comment="bbswitch-0.8-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122788" comment="bbswitch-kmp-default-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122789" comment="bbswitch-kmp-desktop-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122790" comment="bbswitch-kmp-pae-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122791" comment="bbswitch-kmp-xen-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122792" comment="cloop-2.639-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122793" comment="cloop-kmp-default-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122794" comment="cloop-kmp-desktop-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122795" comment="cloop-kmp-pae-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122796" comment="cloop-kmp-xen-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122797" comment="crash-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122798" comment="crash-devel-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122799" comment="crash-doc-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122800" comment="crash-eppic-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122801" comment="crash-gcore-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122802" comment="crash-kmp-default-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122803" comment="crash-kmp-desktop-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122804" comment="crash-kmp-pae-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122805" comment="crash-kmp-xen-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122806" comment="hdjmod-1.28-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122807" comment="hdjmod-kmp-default-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122808" comment="hdjmod-kmp-desktop-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122809" comment="hdjmod-kmp-pae-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122810" comment="hdjmod-kmp-xen-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122811" comment="ipset-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122812" comment="ipset-devel-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122813" comment="ipset-kmp-default-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122814" comment="ipset-kmp-desktop-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122815" comment="ipset-kmp-pae-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122816" comment="ipset-kmp-xen-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122817" comment="kernel-debug-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122818" comment="kernel-debug-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122819" comment="kernel-debug-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122820" comment="kernel-default-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122821" comment="kernel-default-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122822" comment="kernel-default-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122823" comment="kernel-desktop-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122824" comment="kernel-desktop-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122825" comment="kernel-desktop-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122826" comment="kernel-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122827" comment="kernel-docs-3.16.7-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122828" comment="kernel-ec2-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122829" comment="kernel-ec2-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122830" comment="kernel-ec2-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122831" comment="kernel-macros-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122832" comment="kernel-obs-build-3.16.7-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122833" comment="kernel-obs-qa-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122834" comment="kernel-obs-qa-xen-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122835" comment="kernel-pae-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122836" comment="kernel-pae-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122837" comment="kernel-pae-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122838" comment="kernel-source-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122839" comment="kernel-source-vanilla-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122840" comment="kernel-syms-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122841" comment="kernel-vanilla-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122842" comment="kernel-vanilla-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122843" comment="kernel-xen-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122844" comment="kernel-xen-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122845" comment="kernel-xen-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122846" comment="libipset3-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122847" comment="pcfclock-0.44-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122848" comment="pcfclock-kmp-default-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122849" comment="pcfclock-kmp-desktop-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122850" comment="pcfclock-kmp-pae-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122851" comment="python-virtualbox-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122852" comment="vhba-kmp-20140629-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122853" comment="vhba-kmp-default-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122854" comment="vhba-kmp-desktop-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122855" comment="vhba-kmp-pae-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122856" comment="vhba-kmp-xen-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122857" comment="virtualbox-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122858" comment="virtualbox-devel-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122859" comment="virtualbox-guest-desktop-icons-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122860" comment="virtualbox-guest-kmp-default-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122861" comment="virtualbox-guest-kmp-desktop-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122862" comment="virtualbox-guest-kmp-pae-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122863" comment="virtualbox-guest-tools-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122864" comment="virtualbox-guest-x11-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122865" comment="virtualbox-host-kmp-default-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122866" comment="virtualbox-host-kmp-desktop-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122867" comment="virtualbox-host-kmp-pae-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122868" comment="virtualbox-host-source-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122869" comment="virtualbox-qt-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122870" comment="virtualbox-websrv-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122871" comment="xen-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122872" comment="xen-devel-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122873" comment="xen-doc-html-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122874" comment="xen-kmp-default-4.4.3_08_k3.16.7_32-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122875" comment="xen-kmp-desktop-4.4.3_08_k3.16.7_32-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122876" comment="xen-libs-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122877" comment="xen-libs-32bit-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122878" comment="xen-tools-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122879" comment="xen-tools-domU-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122880" comment="xtables-addons-2.6-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122881" comment="xtables-addons-kmp-default-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122882" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122883" comment="xtables-addons-kmp-pae-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122884" comment="xtables-addons-kmp-xen-2.6_k3.16.7_32-15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8551</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8551" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8551" source="CVE"/>
    <description>
    The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and a crafted sequence of XEN_PCI_OP_* operations, aka "Linux pciback missing sanity checks."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122787" comment="bbswitch-0.8-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122788" comment="bbswitch-kmp-default-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122789" comment="bbswitch-kmp-desktop-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122790" comment="bbswitch-kmp-pae-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122791" comment="bbswitch-kmp-xen-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122792" comment="cloop-2.639-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122793" comment="cloop-kmp-default-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122794" comment="cloop-kmp-desktop-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122795" comment="cloop-kmp-pae-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122796" comment="cloop-kmp-xen-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122797" comment="crash-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122798" comment="crash-devel-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122799" comment="crash-doc-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122800" comment="crash-eppic-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122801" comment="crash-gcore-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122802" comment="crash-kmp-default-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122803" comment="crash-kmp-desktop-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122804" comment="crash-kmp-pae-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122805" comment="crash-kmp-xen-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122806" comment="hdjmod-1.28-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122807" comment="hdjmod-kmp-default-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122808" comment="hdjmod-kmp-desktop-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122809" comment="hdjmod-kmp-pae-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122810" comment="hdjmod-kmp-xen-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122811" comment="ipset-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122812" comment="ipset-devel-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122813" comment="ipset-kmp-default-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122814" comment="ipset-kmp-desktop-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122815" comment="ipset-kmp-pae-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122816" comment="ipset-kmp-xen-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122817" comment="kernel-debug-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122818" comment="kernel-debug-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122819" comment="kernel-debug-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122820" comment="kernel-default-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122821" comment="kernel-default-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122822" comment="kernel-default-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122823" comment="kernel-desktop-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122824" comment="kernel-desktop-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122825" comment="kernel-desktop-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122826" comment="kernel-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122827" comment="kernel-docs-3.16.7-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122828" comment="kernel-ec2-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122829" comment="kernel-ec2-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122830" comment="kernel-ec2-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122831" comment="kernel-macros-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122832" comment="kernel-obs-build-3.16.7-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122833" comment="kernel-obs-qa-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122834" comment="kernel-obs-qa-xen-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122835" comment="kernel-pae-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122836" comment="kernel-pae-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122837" comment="kernel-pae-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122838" comment="kernel-source-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122839" comment="kernel-source-vanilla-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122840" comment="kernel-syms-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122841" comment="kernel-vanilla-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122842" comment="kernel-vanilla-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122843" comment="kernel-xen-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122844" comment="kernel-xen-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122845" comment="kernel-xen-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122846" comment="libipset3-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122847" comment="pcfclock-0.44-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122848" comment="pcfclock-kmp-default-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122849" comment="pcfclock-kmp-desktop-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122850" comment="pcfclock-kmp-pae-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122851" comment="python-virtualbox-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122852" comment="vhba-kmp-20140629-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122853" comment="vhba-kmp-default-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122854" comment="vhba-kmp-desktop-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122855" comment="vhba-kmp-pae-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122856" comment="vhba-kmp-xen-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122857" comment="virtualbox-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122858" comment="virtualbox-devel-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122859" comment="virtualbox-guest-desktop-icons-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122860" comment="virtualbox-guest-kmp-default-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122861" comment="virtualbox-guest-kmp-desktop-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122862" comment="virtualbox-guest-kmp-pae-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122863" comment="virtualbox-guest-tools-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122864" comment="virtualbox-guest-x11-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122865" comment="virtualbox-host-kmp-default-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122866" comment="virtualbox-host-kmp-desktop-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122867" comment="virtualbox-host-kmp-pae-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122868" comment="virtualbox-host-source-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122869" comment="virtualbox-qt-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122870" comment="virtualbox-websrv-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122871" comment="xen-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122872" comment="xen-devel-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122873" comment="xen-doc-html-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122874" comment="xen-kmp-default-4.4.3_08_k3.16.7_32-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122875" comment="xen-kmp-desktop-4.4.3_08_k3.16.7_32-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122876" comment="xen-libs-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122877" comment="xen-libs-32bit-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122878" comment="xen-tools-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122879" comment="xen-tools-domU-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122880" comment="xtables-addons-2.6-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122881" comment="xtables-addons-kmp-default-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122882" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122883" comment="xtables-addons-kmp-pae-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122884" comment="xtables-addons-kmp-xen-2.6_k3.16.7_32-15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8552</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8552" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8552" source="CVE"/>
    <description>
    The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka "Linux pciback missing sanity checks."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122787" comment="bbswitch-0.8-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122788" comment="bbswitch-kmp-default-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122789" comment="bbswitch-kmp-desktop-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122790" comment="bbswitch-kmp-pae-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122791" comment="bbswitch-kmp-xen-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122792" comment="cloop-2.639-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122793" comment="cloop-kmp-default-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122794" comment="cloop-kmp-desktop-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122795" comment="cloop-kmp-pae-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122796" comment="cloop-kmp-xen-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122797" comment="crash-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122798" comment="crash-devel-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122799" comment="crash-doc-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122800" comment="crash-eppic-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122801" comment="crash-gcore-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122802" comment="crash-kmp-default-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122803" comment="crash-kmp-desktop-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122804" comment="crash-kmp-pae-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122805" comment="crash-kmp-xen-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122806" comment="hdjmod-1.28-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122807" comment="hdjmod-kmp-default-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122808" comment="hdjmod-kmp-desktop-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122809" comment="hdjmod-kmp-pae-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122810" comment="hdjmod-kmp-xen-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122811" comment="ipset-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122812" comment="ipset-devel-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122813" comment="ipset-kmp-default-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122814" comment="ipset-kmp-desktop-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122815" comment="ipset-kmp-pae-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122816" comment="ipset-kmp-xen-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122817" comment="kernel-debug-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122818" comment="kernel-debug-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122819" comment="kernel-debug-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122820" comment="kernel-default-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122821" comment="kernel-default-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122822" comment="kernel-default-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122823" comment="kernel-desktop-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122824" comment="kernel-desktop-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122825" comment="kernel-desktop-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122826" comment="kernel-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122827" comment="kernel-docs-3.16.7-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122828" comment="kernel-ec2-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122829" comment="kernel-ec2-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122830" comment="kernel-ec2-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122831" comment="kernel-macros-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122832" comment="kernel-obs-build-3.16.7-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122833" comment="kernel-obs-qa-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122834" comment="kernel-obs-qa-xen-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122835" comment="kernel-pae-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122836" comment="kernel-pae-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122837" comment="kernel-pae-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122838" comment="kernel-source-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122839" comment="kernel-source-vanilla-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122840" comment="kernel-syms-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122841" comment="kernel-vanilla-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122842" comment="kernel-vanilla-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122843" comment="kernel-xen-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122844" comment="kernel-xen-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122845" comment="kernel-xen-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122846" comment="libipset3-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122847" comment="pcfclock-0.44-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122848" comment="pcfclock-kmp-default-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122849" comment="pcfclock-kmp-desktop-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122850" comment="pcfclock-kmp-pae-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122851" comment="python-virtualbox-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122852" comment="vhba-kmp-20140629-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122853" comment="vhba-kmp-default-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122854" comment="vhba-kmp-desktop-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122855" comment="vhba-kmp-pae-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122856" comment="vhba-kmp-xen-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122857" comment="virtualbox-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122858" comment="virtualbox-devel-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122859" comment="virtualbox-guest-desktop-icons-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122860" comment="virtualbox-guest-kmp-default-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122861" comment="virtualbox-guest-kmp-desktop-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122862" comment="virtualbox-guest-kmp-pae-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122863" comment="virtualbox-guest-tools-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122864" comment="virtualbox-guest-x11-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122865" comment="virtualbox-host-kmp-default-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122866" comment="virtualbox-host-kmp-desktop-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122867" comment="virtualbox-host-kmp-pae-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122868" comment="virtualbox-host-source-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122869" comment="virtualbox-qt-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122870" comment="virtualbox-websrv-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122871" comment="xen-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122872" comment="xen-devel-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122873" comment="xen-doc-html-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122874" comment="xen-kmp-default-4.4.3_08_k3.16.7_32-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122875" comment="xen-kmp-desktop-4.4.3_08_k3.16.7_32-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122876" comment="xen-libs-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122877" comment="xen-libs-32bit-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122878" comment="xen-tools-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122879" comment="xen-tools-domU-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122880" comment="xtables-addons-2.6-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122881" comment="xtables-addons-kmp-default-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122882" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122883" comment="xtables-addons-kmp-pae-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122884" comment="xtables-addons-kmp-xen-2.6_k3.16.7_32-15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8554</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8554" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8554" source="CVE"/>
    <description>
    Buffer overflow in hw/pt-msi.c in Xen 4.6.x and earlier, when using the qemu-xen-traditional (aka qemu-dm) device model, allows local x86 HVM guest administrators to gain privileges by leveraging a system with access to a passed-through MSI-X capable physical PCI device and MSI-X table entries, related to a "write path."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009121479" comment="xen-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121480" comment="xen-devel-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121481" comment="xen-doc-html-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121482" comment="xen-kmp-default-4.4.3_08_k3.16.7_29-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121483" comment="xen-kmp-desktop-4.4.3_08_k3.16.7_29-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121484" comment="xen-libs-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121485" comment="xen-libs-32bit-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121486" comment="xen-tools-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121487" comment="xen-tools-domU-4.4.3_08-36.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8555</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8555" source="CVE"/>
    <description>
    Xen 4.6.x, 4.5.x, 4.4.x, 4.3.x, and earlier do not initialize x86 FPU stack and XMM registers when XSAVE/XRSTOR are not used to manage guest extended register state, which allows local guest domains to obtain sensitive information from other domains via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009121479" comment="xen-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121480" comment="xen-devel-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121481" comment="xen-doc-html-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121482" comment="xen-kmp-default-4.4.3_08_k3.16.7_29-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121483" comment="xen-kmp-desktop-4.4.3_08_k3.16.7_29-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121484" comment="xen-libs-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121485" comment="xen-libs-32bit-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121486" comment="xen-tools-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121487" comment="xen-tools-domU-4.4.3_08-36.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8558</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8558" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558" source="CVE"/>
    <description>
    The ehci_process_itd function in hw/usb/hcd-ehci.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular isochronous transfer descriptor (iTD) list.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009121479" comment="xen-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121480" comment="xen-devel-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121481" comment="xen-doc-html-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121482" comment="xen-kmp-default-4.4.3_08_k3.16.7_29-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121483" comment="xen-kmp-desktop-4.4.3_08_k3.16.7_29-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121484" comment="xen-libs-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121485" comment="xen-libs-32bit-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121486" comment="xen-tools-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121487" comment="xen-tools-domU-4.4.3_08-36.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8560</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8560" source="CVE"/>
    <description>
    Incomplete blacklist vulnerability in util.c in foomatic-rip in cups-filters 1.0.42 before 1.4.0 and in foomatic-filters in Foomatic 4.0.x allows remote attackers to execute arbitrary commands via a ; (semicolon) character in a print job, a different vulnerability than CVE-2015-8327.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009120442" comment="cups-filters-1.0.58-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120443" comment="cups-filters-cups-browsed-1.0.58-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120444" comment="cups-filters-devel-1.0.58-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120445" comment="cups-filters-foomatic-rip-1.0.58-2.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120446" comment="cups-filters-ghostscript-1.0.58-2.11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8567</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8567" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009121479" comment="xen-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121480" comment="xen-devel-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121481" comment="xen-doc-html-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121482" comment="xen-kmp-default-4.4.3_08_k3.16.7_29-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121483" comment="xen-kmp-desktop-4.4.3_08_k3.16.7_29-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121484" comment="xen-libs-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121485" comment="xen-libs-32bit-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121486" comment="xen-tools-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121487" comment="xen-tools-domU-4.4.3_08-36.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8568</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8568" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009121479" comment="xen-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121480" comment="xen-devel-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121481" comment="xen-doc-html-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121482" comment="xen-kmp-default-4.4.3_08_k3.16.7_29-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121483" comment="xen-kmp-desktop-4.4.3_08_k3.16.7_29-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121484" comment="xen-libs-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121485" comment="xen-libs-32bit-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121486" comment="xen-tools-4.4.3_08-36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121487" comment="xen-tools-domU-4.4.3_08-36.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8569</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8569" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8569" source="CVE"/>
    <description>
    The (1) pptp_bind and (2) pptp_connect functions in drivers/net/ppp/pptp.c in the Linux kernel through 4.3.3 do not verify an address length, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122787" comment="bbswitch-0.8-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122788" comment="bbswitch-kmp-default-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122789" comment="bbswitch-kmp-desktop-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122790" comment="bbswitch-kmp-pae-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122791" comment="bbswitch-kmp-xen-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122792" comment="cloop-2.639-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122793" comment="cloop-kmp-default-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122794" comment="cloop-kmp-desktop-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122795" comment="cloop-kmp-pae-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122796" comment="cloop-kmp-xen-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122797" comment="crash-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122798" comment="crash-devel-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122799" comment="crash-doc-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122800" comment="crash-eppic-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122801" comment="crash-gcore-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122802" comment="crash-kmp-default-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122803" comment="crash-kmp-desktop-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122804" comment="crash-kmp-pae-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122805" comment="crash-kmp-xen-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122806" comment="hdjmod-1.28-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122807" comment="hdjmod-kmp-default-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122808" comment="hdjmod-kmp-desktop-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122809" comment="hdjmod-kmp-pae-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122810" comment="hdjmod-kmp-xen-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122811" comment="ipset-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122812" comment="ipset-devel-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122813" comment="ipset-kmp-default-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122814" comment="ipset-kmp-desktop-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122815" comment="ipset-kmp-pae-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122816" comment="ipset-kmp-xen-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122817" comment="kernel-debug-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122818" comment="kernel-debug-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122819" comment="kernel-debug-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122820" comment="kernel-default-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122821" comment="kernel-default-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122822" comment="kernel-default-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122823" comment="kernel-desktop-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122824" comment="kernel-desktop-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122825" comment="kernel-desktop-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122826" comment="kernel-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122827" comment="kernel-docs-3.16.7-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122828" comment="kernel-ec2-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122829" comment="kernel-ec2-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122830" comment="kernel-ec2-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122831" comment="kernel-macros-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122832" comment="kernel-obs-build-3.16.7-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122833" comment="kernel-obs-qa-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122834" comment="kernel-obs-qa-xen-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122835" comment="kernel-pae-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122836" comment="kernel-pae-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122837" comment="kernel-pae-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122838" comment="kernel-source-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122839" comment="kernel-source-vanilla-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122840" comment="kernel-syms-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122841" comment="kernel-vanilla-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122842" comment="kernel-vanilla-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122843" comment="kernel-xen-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122844" comment="kernel-xen-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122845" comment="kernel-xen-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122846" comment="libipset3-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122847" comment="pcfclock-0.44-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122848" comment="pcfclock-kmp-default-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122849" comment="pcfclock-kmp-desktop-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122850" comment="pcfclock-kmp-pae-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122851" comment="python-virtualbox-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122852" comment="vhba-kmp-20140629-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122853" comment="vhba-kmp-default-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122854" comment="vhba-kmp-desktop-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122855" comment="vhba-kmp-pae-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122856" comment="vhba-kmp-xen-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122857" comment="virtualbox-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122858" comment="virtualbox-devel-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122859" comment="virtualbox-guest-desktop-icons-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122860" comment="virtualbox-guest-kmp-default-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122861" comment="virtualbox-guest-kmp-desktop-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122862" comment="virtualbox-guest-kmp-pae-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122863" comment="virtualbox-guest-tools-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122864" comment="virtualbox-guest-x11-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122865" comment="virtualbox-host-kmp-default-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122866" comment="virtualbox-host-kmp-desktop-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122867" comment="virtualbox-host-kmp-pae-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122868" comment="virtualbox-host-source-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122869" comment="virtualbox-qt-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122870" comment="virtualbox-websrv-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122871" comment="xen-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122872" comment="xen-devel-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122873" comment="xen-doc-html-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122874" comment="xen-kmp-default-4.4.3_08_k3.16.7_32-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122875" comment="xen-kmp-desktop-4.4.3_08_k3.16.7_32-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122876" comment="xen-libs-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122877" comment="xen-libs-32bit-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122878" comment="xen-tools-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122879" comment="xen-tools-domU-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122880" comment="xtables-addons-2.6-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122881" comment="xtables-addons-kmp-default-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122882" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122883" comment="xtables-addons-kmp-pae-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122884" comment="xtables-addons-kmp-xen-2.6_k3.16.7_32-15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8575</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8575" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8575" source="CVE"/>
    <description>
    The sco_sock_bind function in net/bluetooth/sco.c in the Linux kernel before 4.3.4 does not verify an address length, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted application.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122787" comment="bbswitch-0.8-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122788" comment="bbswitch-kmp-default-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122789" comment="bbswitch-kmp-desktop-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122790" comment="bbswitch-kmp-pae-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122791" comment="bbswitch-kmp-xen-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122792" comment="cloop-2.639-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122793" comment="cloop-kmp-default-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122794" comment="cloop-kmp-desktop-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122795" comment="cloop-kmp-pae-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122796" comment="cloop-kmp-xen-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122797" comment="crash-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122798" comment="crash-devel-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122799" comment="crash-doc-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122800" comment="crash-eppic-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122801" comment="crash-gcore-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122802" comment="crash-kmp-default-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122803" comment="crash-kmp-desktop-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122804" comment="crash-kmp-pae-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122805" comment="crash-kmp-xen-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122806" comment="hdjmod-1.28-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122807" comment="hdjmod-kmp-default-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122808" comment="hdjmod-kmp-desktop-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122809" comment="hdjmod-kmp-pae-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122810" comment="hdjmod-kmp-xen-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122811" comment="ipset-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122812" comment="ipset-devel-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122813" comment="ipset-kmp-default-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122814" comment="ipset-kmp-desktop-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122815" comment="ipset-kmp-pae-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122816" comment="ipset-kmp-xen-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122817" comment="kernel-debug-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122818" comment="kernel-debug-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122819" comment="kernel-debug-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122820" comment="kernel-default-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122821" comment="kernel-default-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122822" comment="kernel-default-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122823" comment="kernel-desktop-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122824" comment="kernel-desktop-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122825" comment="kernel-desktop-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122826" comment="kernel-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122827" comment="kernel-docs-3.16.7-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122828" comment="kernel-ec2-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122829" comment="kernel-ec2-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122830" comment="kernel-ec2-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122831" comment="kernel-macros-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122832" comment="kernel-obs-build-3.16.7-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122833" comment="kernel-obs-qa-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122834" comment="kernel-obs-qa-xen-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122835" comment="kernel-pae-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122836" comment="kernel-pae-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122837" comment="kernel-pae-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122838" comment="kernel-source-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122839" comment="kernel-source-vanilla-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122840" comment="kernel-syms-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122841" comment="kernel-vanilla-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122842" comment="kernel-vanilla-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122843" comment="kernel-xen-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122844" comment="kernel-xen-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122845" comment="kernel-xen-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122846" comment="libipset3-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122847" comment="pcfclock-0.44-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122848" comment="pcfclock-kmp-default-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122849" comment="pcfclock-kmp-desktop-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122850" comment="pcfclock-kmp-pae-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122851" comment="python-virtualbox-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122852" comment="vhba-kmp-20140629-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122853" comment="vhba-kmp-default-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122854" comment="vhba-kmp-desktop-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122855" comment="vhba-kmp-pae-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122856" comment="vhba-kmp-xen-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122857" comment="virtualbox-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122858" comment="virtualbox-devel-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122859" comment="virtualbox-guest-desktop-icons-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122860" comment="virtualbox-guest-kmp-default-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122861" comment="virtualbox-guest-kmp-desktop-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122862" comment="virtualbox-guest-kmp-pae-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122863" comment="virtualbox-guest-tools-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122864" comment="virtualbox-guest-x11-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122865" comment="virtualbox-host-kmp-default-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122866" comment="virtualbox-host-kmp-desktop-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122867" comment="virtualbox-host-kmp-pae-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122868" comment="virtualbox-host-source-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122869" comment="virtualbox-qt-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122870" comment="virtualbox-websrv-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122871" comment="xen-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122872" comment="xen-devel-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122873" comment="xen-doc-html-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122874" comment="xen-kmp-default-4.4.3_08_k3.16.7_32-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122875" comment="xen-kmp-desktop-4.4.3_08_k3.16.7_32-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122876" comment="xen-libs-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122877" comment="xen-libs-32bit-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122878" comment="xen-tools-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122879" comment="xen-tools-domU-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122880" comment="xtables-addons-2.6-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122881" comment="xtables-addons-kmp-default-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122882" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122883" comment="xtables-addons-kmp-pae-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122884" comment="xtables-addons-kmp-xen-2.6_k3.16.7_32-15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8604</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8604" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8604" source="CVE"/>
    <description>
    SQL injection vulnerability in the host_new_graphs function in graphs_new.php in Cacti 0.8.8f and earlier allows remote authenticated users to execute arbitrary SQL commands via the cg_g parameter in a save action.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123266" comment="cacti-0.8.8f-4.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123267" comment="cacti-spine-0.8.8f-4.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8605</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8605" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8605" source="CVE"/>
    <description>
    ISC DHCP 4.x before 4.1-ESV-R12-P1, 4.2.x, and 4.3.x before 4.3.3-P1 allows remote attackers to cause a denial of service (application crash) via an invalid length field in a UDP IPv4 packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123846" comment="dhcp-4.2.6-9.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123847" comment="dhcp-client-4.2.6-9.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123848" comment="dhcp-devel-4.2.6-9.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123849" comment="dhcp-doc-4.2.6-9.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123850" comment="dhcp-relay-4.2.6-9.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123851" comment="dhcp-server-4.2.6-9.16.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8607</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8607" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8607" source="CVE"/>
    <description>
    The canonpath function in the File::Spec module in PathTools before 3.62, as used in Perl, does not properly preserve the taint attribute of data, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125347" comment="perl-5.20.1-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125348" comment="perl-32bit-5.20.1-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125349" comment="perl-base-5.20.1-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125350" comment="perl-base-32bit-5.20.1-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125351" comment="perl-doc-5.20.1-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8613</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8613" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8613" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126020" comment="xen-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126021" comment="xen-devel-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126022" comment="xen-doc-html-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126023" comment="xen-kmp-default-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126024" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126025" comment="xen-libs-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126026" comment="xen-libs-32bit-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126027" comment="xen-tools-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126028" comment="xen-tools-domU-4.4.4_02-43.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8614</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8614" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8614" source="CVE"/>
    <description>
    Multiple stack-based buffer overflows in the (1) conv_jistoeuc, (2) conv_euctojis, and (3) conv_sjistoeuc functions in codeconv.c in Claws Mail before 3.13.1 allow remote attackers to have unspecified impact via a crafted email, involving Japanese character set conversion.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123304" comment="claws-mail-3.11.0-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123305" comment="claws-mail-devel-3.11.0-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123306" comment="claws-mail-lang-3.11.0-2.10.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8619</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8619" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8619" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126020" comment="xen-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126021" comment="xen-devel-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126022" comment="xen-doc-html-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126023" comment="xen-kmp-default-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126024" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126025" comment="xen-libs-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126026" comment="xen-libs-32bit-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126027" comment="xen-tools-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126028" comment="xen-tools-domU-4.4.4_02-43.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8629</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8629" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8629" source="CVE"/>
    <description>
    The xdr_nullstring function in lib/kadm5/kadm_rpc_xdr.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13.4 and 1.14.x before 1.14.1 does not verify whether '\0' characters exist as expected, which allows remote authenticated users to obtain sensitive information or cause a denial of service (out-of-bounds read) via a crafted string.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123206" comment="krb5-1.12.2-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123207" comment="krb5-32bit-1.12.2-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123208" comment="krb5-client-1.12.2-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123209" comment="krb5-devel-1.12.2-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123210" comment="krb5-devel-32bit-1.12.2-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123211" comment="krb5-doc-1.12.2-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123212" comment="krb5-mini-1.12.2-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123213" comment="krb5-mini-devel-1.12.2-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123214" comment="krb5-plugin-kdb-ldap-1.12.2-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123215" comment="krb5-plugin-preauth-otp-1.12.2-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123216" comment="krb5-plugin-preauth-pkinit-1.12.2-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123217" comment="krb5-server-1.12.2-21.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8630</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8630" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8630" source="CVE"/>
    <description>
    The (1) kadm5_create_principal_3 and (2) kadm5_modify_principal functions in lib/kadm5/srv/svr_principal.c in kadmind in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.4 and 1.14.x before 1.14.1 allow remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) by specifying KADM5_POLICY with a NULL policy name.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123206" comment="krb5-1.12.2-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123207" comment="krb5-32bit-1.12.2-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123208" comment="krb5-client-1.12.2-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123209" comment="krb5-devel-1.12.2-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123210" comment="krb5-devel-32bit-1.12.2-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123211" comment="krb5-doc-1.12.2-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123212" comment="krb5-mini-1.12.2-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123213" comment="krb5-mini-devel-1.12.2-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123214" comment="krb5-plugin-kdb-ldap-1.12.2-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123215" comment="krb5-plugin-preauth-otp-1.12.2-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123216" comment="krb5-plugin-preauth-pkinit-1.12.2-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123217" comment="krb5-server-1.12.2-21.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8631</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8631" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8631" source="CVE"/>
    <description>
    Multiple memory leaks in kadmin/server/server_stubs.c in kadmind in MIT Kerberos 5 (aka krb5) before 1.13.4 and 1.14.x before 1.14.1 allow remote authenticated users to cause a denial of service (memory consumption) via a request specifying a NULL principal name.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123206" comment="krb5-1.12.2-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123207" comment="krb5-32bit-1.12.2-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123208" comment="krb5-client-1.12.2-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123209" comment="krb5-devel-1.12.2-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123210" comment="krb5-devel-32bit-1.12.2-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123211" comment="krb5-doc-1.12.2-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123212" comment="krb5-mini-1.12.2-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123213" comment="krb5-mini-devel-1.12.2-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123214" comment="krb5-plugin-kdb-ldap-1.12.2-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123215" comment="krb5-plugin-preauth-otp-1.12.2-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123216" comment="krb5-plugin-preauth-pkinit-1.12.2-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123217" comment="krb5-server-1.12.2-21.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8634</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8634" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8634" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009120905" comment="flash-player-11.2.202.559-2.85.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120906" comment="flash-player-gnome-11.2.202.559-2.85.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120907" comment="flash-player-kde4-11.2.202.559-2.85.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8635</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8635" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8635" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009120905" comment="flash-player-11.2.202.559-2.85.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120906" comment="flash-player-gnome-11.2.202.559-2.85.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120907" comment="flash-player-kde4-11.2.202.559-2.85.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8636</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8636" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8636" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8459, CVE-2015-8460, and CVE-2015-8645.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009120905" comment="flash-player-11.2.202.559-2.85.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120906" comment="flash-player-gnome-11.2.202.559-2.85.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120907" comment="flash-player-kde4-11.2.202.559-2.85.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8638</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8638" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8638" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009120905" comment="flash-player-11.2.202.559-2.85.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120906" comment="flash-player-gnome-11.2.202.559-2.85.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120907" comment="flash-player-kde4-11.2.202.559-2.85.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8639</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8639" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8639" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009120905" comment="flash-player-11.2.202.559-2.85.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120906" comment="flash-player-gnome-11.2.202.559-2.85.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120907" comment="flash-player-kde4-11.2.202.559-2.85.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8640</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8640" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009120905" comment="flash-player-11.2.202.559-2.85.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120906" comment="flash-player-gnome-11.2.202.559-2.85.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120907" comment="flash-player-kde4-11.2.202.559-2.85.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8641</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8641" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8641" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009120905" comment="flash-player-11.2.202.559-2.85.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120906" comment="flash-player-gnome-11.2.202.559-2.85.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120907" comment="flash-player-kde4-11.2.202.559-2.85.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8642</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8642" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8642" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009120905" comment="flash-player-11.2.202.559-2.85.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120906" comment="flash-player-gnome-11.2.202.559-2.85.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120907" comment="flash-player-kde4-11.2.202.559-2.85.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8643</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8643" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8643" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009120905" comment="flash-player-11.2.202.559-2.85.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120906" comment="flash-player-gnome-11.2.202.559-2.85.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120907" comment="flash-player-kde4-11.2.202.559-2.85.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8644</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8644" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8644" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009120905" comment="flash-player-11.2.202.559-2.85.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120906" comment="flash-player-gnome-11.2.202.559-2.85.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120907" comment="flash-player-kde4-11.2.202.559-2.85.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8645</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8645" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8645" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-8459, CVE-2015-8460, and CVE-2015-8636.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009120905" comment="flash-player-11.2.202.559-2.85.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120906" comment="flash-player-gnome-11.2.202.559-2.85.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120907" comment="flash-player-kde4-11.2.202.559-2.85.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8646</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8646" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8646" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009120905" comment="flash-player-11.2.202.559-2.85.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120906" comment="flash-player-gnome-11.2.202.559-2.85.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120907" comment="flash-player-kde4-11.2.202.559-2.85.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8647</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8647" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8647" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009120905" comment="flash-player-11.2.202.559-2.85.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120906" comment="flash-player-gnome-11.2.202.559-2.85.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120907" comment="flash-player-kde4-11.2.202.559-2.85.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8648</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8648" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8648" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8649, and CVE-2015-8650.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009120905" comment="flash-player-11.2.202.559-2.85.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120906" comment="flash-player-gnome-11.2.202.559-2.85.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120907" comment="flash-player-kde4-11.2.202.559-2.85.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8649</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8649" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8649" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, and CVE-2015-8650.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009120905" comment="flash-player-11.2.202.559-2.85.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120906" comment="flash-player-gnome-11.2.202.559-2.85.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120907" comment="flash-player-kde4-11.2.202.559-2.85.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8650</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8650" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8650" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, and CVE-2015-8649.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009120905" comment="flash-player-11.2.202.559-2.85.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120906" comment="flash-player-gnome-11.2.202.559-2.85.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120907" comment="flash-player-kde4-11.2.202.559-2.85.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8651</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2015-8651" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8651" source="CVE"/>
    <description>
    Integer overflow in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK &amp; Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009120905" comment="flash-player-11.2.202.559-2.85.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120906" comment="flash-player-gnome-11.2.202.559-2.85.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009120907" comment="flash-player-kde4-11.2.202.559-2.85.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8665</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8665" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8665" source="CVE"/>
    <description>
    tif_getimage.c in LibTIFF 4.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) via the SamplesPerPixel tag in a TIFF image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136807" comment="libtiff-devel-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136808" comment="libtiff-devel-32bit-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136809" comment="libtiff5-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136810" comment="libtiff5-32bit-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136811" comment="tiff-4.0.7-10.35.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8669</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8669" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8669" source="CVE"/>
    <description>
    libraries/config/messages.inc.php in phpMyAdmin 4.0.x before 4.0.10.12, 4.4.x before 4.4.15.2, and 4.5.x before 4.5.3.1 allows remote attackers to obtain sensitive information via a crafted request, which reveals the full path in an error message.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121330" comment="phpMyAdmin-4.4.15.2-22.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8683</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8683" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8683" source="CVE"/>
    <description>
    The putcontig8bitCIELab function in tif_getimage.c in LibTIFF 4.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) via a packed TIFF image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136807" comment="libtiff-devel-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136808" comment="libtiff-devel-32bit-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136809" comment="libtiff5-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136810" comment="libtiff5-32bit-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136811" comment="tiff-4.0.7-10.35.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8704</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8704" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8704" source="CVE"/>
    <description>
    apl_42.c in ISC BIND 9.x before 9.9.8-P3, 9.9.x, and 9.10.x before 9.10.3-P3 allows remote authenticated users to cause a denial of service (INSIST assertion failure and daemon exit) via a malformed Address Prefix List (APL) record.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009121926" comment="bind-9.9.6P1-2.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121927" comment="bind-chrootenv-9.9.6P1-2.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121928" comment="bind-devel-9.9.6P1-2.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121929" comment="bind-doc-9.9.6P1-2.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121930" comment="bind-libs-9.9.6P1-2.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121931" comment="bind-libs-32bit-9.9.6P1-2.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121932" comment="bind-lwresd-9.9.6P1-2.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121933" comment="bind-utils-9.9.6P1-2.16.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8709</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8709" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8709" source="CVE"/>
    <description>
    ** DISPUTED ** kernel/ptrace.c in the Linux kernel through 4.4.1 mishandles uid and gid mappings, which allows local users to gain privileges by establishing a user namespace, waiting for a root process to enter that namespace with an unsafe uid or gid, and then using the ptrace system call.  NOTE: the vendor states "there is no kernel bug here."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8711</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8711" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8711" source="CVE"/>
    <description>
    epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate conversation data, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009121179" comment="wireshark-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121180" comment="wireshark-devel-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121181" comment="wireshark-ui-gtk-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121182" comment="wireshark-ui-qt-1.12.9-29.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8712</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8712" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8712" source="CVE"/>
    <description>
    The dissect_hsdsch_channel_info function in epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not validate the number of PDUs, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009121179" comment="wireshark-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121180" comment="wireshark-devel-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121181" comment="wireshark-ui-gtk-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121182" comment="wireshark-ui-qt-1.12.9-29.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8713</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8713" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8713" source="CVE"/>
    <description>
    epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.9 does not properly reserve memory for channel ID mappings, which allows remote attackers to cause a denial of service (out-of-bounds memory access and application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009121179" comment="wireshark-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121180" comment="wireshark-devel-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121181" comment="wireshark-ui-gtk-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121182" comment="wireshark-ui-qt-1.12.9-29.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8714</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8714" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8714" source="CVE"/>
    <description>
    The dissect_dcom_OBJREF function in epan/dissectors/packet-dcom.c in the DCOM dissector in Wireshark 1.12.x before 1.12.9 does not initialize a certain IPv4 data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009121179" comment="wireshark-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121180" comment="wireshark-devel-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121181" comment="wireshark-ui-gtk-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121182" comment="wireshark-ui-qt-1.12.9-29.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8715</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8715" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8715" source="CVE"/>
    <description>
    epan/dissectors/packet-alljoyn.c in the AllJoyn dissector in Wireshark 1.12.x before 1.12.9 does not check for empty arguments, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009121179" comment="wireshark-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121180" comment="wireshark-devel-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121181" comment="wireshark-ui-gtk-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121182" comment="wireshark-ui-qt-1.12.9-29.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8716</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8716" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8716" source="CVE"/>
    <description>
    The init_t38_info_conv function in epan/dissectors/packet-t38.c in the T.38 dissector in Wireshark 1.12.x before 1.12.9 does not ensure that a conversation exists, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009121179" comment="wireshark-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121180" comment="wireshark-devel-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121181" comment="wireshark-ui-gtk-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121182" comment="wireshark-ui-qt-1.12.9-29.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8717</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8717" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8717" source="CVE"/>
    <description>
    The dissect_sdp function in epan/dissectors/packet-sdp.c in the SDP dissector in Wireshark 1.12.x before 1.12.9 does not prevent use of a negative media count, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009121179" comment="wireshark-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121180" comment="wireshark-devel-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121181" comment="wireshark-ui-gtk-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121182" comment="wireshark-ui-qt-1.12.9-29.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8718</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8718" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8718" source="CVE"/>
    <description>
    Double free vulnerability in epan/dissectors/packet-nlm.c in the NLM dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1, when the "Match MSG/RES packets for async NLM" option is enabled, allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009121179" comment="wireshark-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121180" comment="wireshark-devel-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121181" comment="wireshark-ui-gtk-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121182" comment="wireshark-ui-qt-1.12.9-29.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8719</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8719" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8719" source="CVE"/>
    <description>
    The dissect_dns_answer function in epan/dissectors/packet-dns.c in the DNS dissector in Wireshark 1.12.x before 1.12.9 mishandles the EDNS0 Client Subnet option, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009121179" comment="wireshark-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121180" comment="wireshark-devel-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121181" comment="wireshark-ui-gtk-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121182" comment="wireshark-ui-qt-1.12.9-29.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8720</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8720" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8720" source="CVE"/>
    <description>
    The dissect_ber_GeneralizedTime function in epan/dissectors/packet-ber.c in the BER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly checks an sscanf return value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009121179" comment="wireshark-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121180" comment="wireshark-devel-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121181" comment="wireshark-ui-gtk-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121182" comment="wireshark-ui-qt-1.12.9-29.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8721</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8721" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8721" source="CVE"/>
    <description>
    Buffer overflow in the tvb_uncompress function in epan/tvbuff_zlib.c in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 allows remote attackers to cause a denial of service (application crash) via a crafted packet with zlib compression.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009121179" comment="wireshark-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121180" comment="wireshark-devel-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121181" comment="wireshark-ui-gtk-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121182" comment="wireshark-ui-qt-1.12.9-29.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8722</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8722" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8722" source="CVE"/>
    <description>
    epan/dissectors/packet-sctp.c in the SCTP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the frame pointer, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009121179" comment="wireshark-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121180" comment="wireshark-devel-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121181" comment="wireshark-ui-gtk-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121182" comment="wireshark-ui-qt-1.12.9-29.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8723</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8723" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8723" source="CVE"/>
    <description>
    The AirPDcapPacketProcess function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationship between the total length and the capture length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009121179" comment="wireshark-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121180" comment="wireshark-devel-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121181" comment="wireshark-ui-gtk-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121182" comment="wireshark-ui-qt-1.12.9-29.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8724</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8724" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8724" source="CVE"/>
    <description>
    The AirPDcapDecryptWPABroadcastKey function in epan/crypt/airpdcap.c in the 802.11 dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not verify the WPA broadcast key length, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009121179" comment="wireshark-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121180" comment="wireshark-devel-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121181" comment="wireshark-ui-gtk-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121182" comment="wireshark-ui-qt-1.12.9-29.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8725</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8725" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8725" source="CVE"/>
    <description>
    The dissect_diameter_base_framed_ipv6_prefix function in epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the IPv6 prefix length, which allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009121179" comment="wireshark-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121180" comment="wireshark-devel-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121181" comment="wireshark-ui-gtk-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121182" comment="wireshark-ui-qt-1.12.9-29.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8726</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8726" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8726" source="CVE"/>
    <description>
    wiretap/vwr.c in the VeriWave file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate certain signature and Modulation and Coding Scheme (MCS) data, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009121179" comment="wireshark-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121180" comment="wireshark-devel-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121181" comment="wireshark-ui-gtk-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121182" comment="wireshark-ui-qt-1.12.9-29.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8727</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8727" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8727" source="CVE"/>
    <description>
    The dissect_rsvp_common function in epan/dissectors/packet-rsvp.c in the RSVP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not properly maintain request-key data, which allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009121179" comment="wireshark-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121180" comment="wireshark-devel-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121181" comment="wireshark-ui-gtk-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121182" comment="wireshark-ui-qt-1.12.9-29.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8728</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8728" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8728" source="CVE"/>
    <description>
    The Mobile Identity parser in (1) epan/dissectors/packet-ansi_a.c in the ANSI A dissector and (2) epan/dissectors/packet-gsm_a_common.c in the GSM A dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 improperly uses the tvb_bcd_dig_to_wmem_packet_str function, which allows remote attackers to cause a denial of service (buffer overflow and application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009121179" comment="wireshark-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121180" comment="wireshark-devel-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121181" comment="wireshark-ui-gtk-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121182" comment="wireshark-ui-qt-1.12.9-29.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8729</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8729" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8729" source="CVE"/>
    <description>
    The ascend_seek function in wiretap/ascendtext.c in the Ascend file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not ensure the presence of a '\0' character at the end of a date string, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009121179" comment="wireshark-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121180" comment="wireshark-devel-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121181" comment="wireshark-ui-gtk-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121182" comment="wireshark-ui-qt-1.12.9-29.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8730</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8730" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8730" source="CVE"/>
    <description>
    epan/dissectors/packet-nbap.c in the NBAP dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the number of items, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009121179" comment="wireshark-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121180" comment="wireshark-devel-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121181" comment="wireshark-ui-gtk-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121182" comment="wireshark-ui-qt-1.12.9-29.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8731</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8731" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8731" source="CVE"/>
    <description>
    The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not reject unknown TLV types, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009121179" comment="wireshark-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121180" comment="wireshark-devel-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121181" comment="wireshark-ui-gtk-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121182" comment="wireshark-ui-qt-1.12.9-29.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8732</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8732" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8732" source="CVE"/>
    <description>
    The dissect_zcl_pwr_prof_pwrprofstatersp function in epan/dissectors/packet-zbee-zcl-general.c in the ZigBee ZCL dissector in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the Total Profile Number field, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009121179" comment="wireshark-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121180" comment="wireshark-devel-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121181" comment="wireshark-ui-gtk-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121182" comment="wireshark-ui-qt-1.12.9-29.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8733</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8733" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8733" source="CVE"/>
    <description>
    The ngsniffer_process_record function in wiretap/ngsniffer.c in the Sniffer file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate the relationships between record lengths and record header lengths, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009121179" comment="wireshark-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121180" comment="wireshark-devel-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121181" comment="wireshark-ui-gtk-1.12.9-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121182" comment="wireshark-ui-qt-1.12.9-29.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8743</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8743" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743" source="CVE"/>
    <description>
    QEMU (aka Quick Emulator) built with the NE2000 device emulation support is vulnerable to an OOB r/w access issue. It could occur while performing 'ioport' r/w operations. A privileged (CAP_SYS_RAWIO) user/process could use this flaw to leak or corrupt QEMU memory bytes.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126020" comment="xen-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126021" comment="xen-devel-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126022" comment="xen-doc-html-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126023" comment="xen-kmp-default-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126024" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126025" comment="xen-libs-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126026" comment="xen-libs-32bit-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126027" comment="xen-tools-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126028" comment="xen-tools-domU-4.4.4_02-43.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8744</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8744" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744" source="CVE"/>
    <description>
    QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It occurs when a guest sends a Layer-2 packet smaller than 22 bytes. A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126020" comment="xen-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126021" comment="xen-devel-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126022" comment="xen-doc-html-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126023" comment="xen-kmp-default-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126024" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126025" comment="xen-libs-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126026" comment="xen-libs-32bit-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126027" comment="xen-tools-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126028" comment="xen-tools-domU-4.4.4_02-43.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8745</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8745" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745" source="CVE"/>
    <description>
    QEMU (aka Quick Emulator) built with a VMWARE VMXNET3 paravirtual NIC emulator support is vulnerable to crash issue. It could occur while reading Interrupt Mask Registers (IMR). A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance resulting in DoS.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126020" comment="xen-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126021" comment="xen-devel-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126022" comment="xen-doc-html-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126023" comment="xen-kmp-default-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126024" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126025" comment="xen-libs-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126026" comment="xen-libs-32bit-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126027" comment="xen-tools-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126028" comment="xen-tools-domU-4.4.4_02-43.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8767</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8767" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8767" source="CVE"/>
    <description>
    net/sctp/sm_sideeffect.c in the Linux kernel before 4.3 does not properly manage the relationship between a lock and a socket, which allows local users to cause a denial of service (deadlock) via a crafted sctp_accept call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122787" comment="bbswitch-0.8-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122788" comment="bbswitch-kmp-default-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122789" comment="bbswitch-kmp-desktop-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122790" comment="bbswitch-kmp-pae-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122791" comment="bbswitch-kmp-xen-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122792" comment="cloop-2.639-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122793" comment="cloop-kmp-default-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122794" comment="cloop-kmp-desktop-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122795" comment="cloop-kmp-pae-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122796" comment="cloop-kmp-xen-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122797" comment="crash-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122798" comment="crash-devel-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122799" comment="crash-doc-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122800" comment="crash-eppic-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122801" comment="crash-gcore-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122802" comment="crash-kmp-default-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122803" comment="crash-kmp-desktop-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122804" comment="crash-kmp-pae-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122805" comment="crash-kmp-xen-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122806" comment="hdjmod-1.28-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122807" comment="hdjmod-kmp-default-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122808" comment="hdjmod-kmp-desktop-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122809" comment="hdjmod-kmp-pae-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122810" comment="hdjmod-kmp-xen-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122811" comment="ipset-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122812" comment="ipset-devel-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122813" comment="ipset-kmp-default-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122814" comment="ipset-kmp-desktop-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122815" comment="ipset-kmp-pae-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122816" comment="ipset-kmp-xen-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122817" comment="kernel-debug-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122818" comment="kernel-debug-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122819" comment="kernel-debug-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122820" comment="kernel-default-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122821" comment="kernel-default-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122822" comment="kernel-default-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122823" comment="kernel-desktop-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122824" comment="kernel-desktop-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122825" comment="kernel-desktop-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122826" comment="kernel-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122827" comment="kernel-docs-3.16.7-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122828" comment="kernel-ec2-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122829" comment="kernel-ec2-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122830" comment="kernel-ec2-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122831" comment="kernel-macros-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122832" comment="kernel-obs-build-3.16.7-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122833" comment="kernel-obs-qa-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122834" comment="kernel-obs-qa-xen-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122835" comment="kernel-pae-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122836" comment="kernel-pae-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122837" comment="kernel-pae-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122838" comment="kernel-source-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122839" comment="kernel-source-vanilla-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122840" comment="kernel-syms-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122841" comment="kernel-vanilla-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122842" comment="kernel-vanilla-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122843" comment="kernel-xen-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122844" comment="kernel-xen-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122845" comment="kernel-xen-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122846" comment="libipset3-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122847" comment="pcfclock-0.44-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122848" comment="pcfclock-kmp-default-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122849" comment="pcfclock-kmp-desktop-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122850" comment="pcfclock-kmp-pae-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122851" comment="python-virtualbox-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122852" comment="vhba-kmp-20140629-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122853" comment="vhba-kmp-default-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122854" comment="vhba-kmp-desktop-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122855" comment="vhba-kmp-pae-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122856" comment="vhba-kmp-xen-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122857" comment="virtualbox-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122858" comment="virtualbox-devel-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122859" comment="virtualbox-guest-desktop-icons-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122860" comment="virtualbox-guest-kmp-default-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122861" comment="virtualbox-guest-kmp-desktop-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122862" comment="virtualbox-guest-kmp-pae-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122863" comment="virtualbox-guest-tools-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122864" comment="virtualbox-guest-x11-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122865" comment="virtualbox-host-kmp-default-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122866" comment="virtualbox-host-kmp-desktop-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122867" comment="virtualbox-host-kmp-pae-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122868" comment="virtualbox-host-source-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122869" comment="virtualbox-qt-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122870" comment="virtualbox-websrv-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122871" comment="xen-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122872" comment="xen-devel-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122873" comment="xen-doc-html-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122874" comment="xen-kmp-default-4.4.3_08_k3.16.7_32-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122875" comment="xen-kmp-desktop-4.4.3_08_k3.16.7_32-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122876" comment="xen-libs-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122877" comment="xen-libs-32bit-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122878" comment="xen-tools-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122879" comment="xen-tools-domU-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122880" comment="xtables-addons-2.6-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122881" comment="xtables-addons-kmp-default-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122882" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122883" comment="xtables-addons-kmp-pae-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122884" comment="xtables-addons-kmp-xen-2.6_k3.16.7_32-15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8770</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8770" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8770" source="CVE"/>
    <description>
    Directory traversal vulnerability in the set_skin function in program/include/rcmail_output_html.php in Roundcube before 1.0.8 and 1.1.x before 1.1.4 allows remote authenticated users with certain permissions to read arbitrary files or possibly execute arbitrary code via a .. (dot dot) in the _skin parameter to index.php.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122026" comment="roundcubemail-1.0.8-17.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8776</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776" source="CVE"/>
    <description>
    The strftime function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly obtain sensitive information via an out-of-range time value.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123373" comment="glibc-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123374" comment="glibc-32bit-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123375" comment="glibc-devel-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123376" comment="glibc-devel-32bit-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123377" comment="glibc-devel-static-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123378" comment="glibc-devel-static-32bit-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123379" comment="glibc-extra-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123380" comment="glibc-html-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123381" comment="glibc-i18ndata-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123382" comment="glibc-info-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123383" comment="glibc-locale-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123384" comment="glibc-locale-32bit-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123385" comment="glibc-obsolete-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123386" comment="glibc-profile-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123387" comment="glibc-profile-32bit-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123388" comment="glibc-testsuite-2.19-16.22.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123389" comment="glibc-utils-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123390" comment="glibc-utils-32bit-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123391" comment="nscd-2.19-16.22.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8778</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8778" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778" source="CVE"/>
    <description>
    Integer overflow in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via the size argument to the __hcreate_r function, which triggers out-of-bounds heap-memory access.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123373" comment="glibc-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123374" comment="glibc-32bit-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123375" comment="glibc-devel-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123376" comment="glibc-devel-32bit-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123377" comment="glibc-devel-static-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123378" comment="glibc-devel-static-32bit-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123379" comment="glibc-extra-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123380" comment="glibc-html-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123381" comment="glibc-i18ndata-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123382" comment="glibc-info-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123383" comment="glibc-locale-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123384" comment="glibc-locale-32bit-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123385" comment="glibc-obsolete-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123386" comment="glibc-profile-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123387" comment="glibc-profile-32bit-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123388" comment="glibc-testsuite-2.19-16.22.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123389" comment="glibc-utils-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123390" comment="glibc-utils-32bit-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123391" comment="nscd-2.19-16.22.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8779</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8779" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779" source="CVE"/>
    <description>
    Stack-based buffer overflow in the catopen function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long catalog name.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123373" comment="glibc-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123374" comment="glibc-32bit-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123375" comment="glibc-devel-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123376" comment="glibc-devel-32bit-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123377" comment="glibc-devel-static-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123378" comment="glibc-devel-static-32bit-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123379" comment="glibc-extra-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123380" comment="glibc-html-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123381" comment="glibc-i18ndata-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123382" comment="glibc-info-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123383" comment="glibc-locale-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123384" comment="glibc-locale-32bit-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123385" comment="glibc-obsolete-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123386" comment="glibc-profile-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123387" comment="glibc-profile-32bit-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123388" comment="glibc-testsuite-2.19-16.22.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123389" comment="glibc-utils-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123390" comment="glibc-utils-32bit-2.19-16.22.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123391" comment="nscd-2.19-16.22.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8781</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8781" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8781" source="CVE"/>
    <description>
    tif_luv.c in libtiff allows attackers to cause a denial of service (out-of-bounds write) via an invalid number of samples per pixel in a LogL compressed TIFF image, a different vulnerability than CVE-2015-8782.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123197" comment="libtiff-devel-4.0.6-10.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123198" comment="libtiff-devel-32bit-4.0.6-10.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123199" comment="libtiff5-4.0.6-10.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123200" comment="libtiff5-32bit-4.0.6-10.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123201" comment="tiff-4.0.6-10.20.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8782</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8782" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8782" source="CVE"/>
    <description>
    tif_luv.c in libtiff allows attackers to cause a denial of service (out-of-bounds writes) via a crafted TIFF image, a different vulnerability than CVE-2015-8781.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123197" comment="libtiff-devel-4.0.6-10.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123198" comment="libtiff-devel-32bit-4.0.6-10.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123199" comment="libtiff5-4.0.6-10.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123200" comment="libtiff5-32bit-4.0.6-10.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123201" comment="tiff-4.0.6-10.20.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8783</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8783" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8783" source="CVE"/>
    <description>
    tif_luv.c in libtiff allows attackers to cause a denial of service (out-of-bounds reads) via a crafted TIFF image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123197" comment="libtiff-devel-4.0.6-10.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123198" comment="libtiff-devel-32bit-4.0.6-10.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123199" comment="libtiff5-4.0.6-10.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123200" comment="libtiff5-32bit-4.0.6-10.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123201" comment="tiff-4.0.6-10.20.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8785</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8785" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8785" source="CVE"/>
    <description>
    The fuse_fill_write_pages function in fs/fuse/file.c in the Linux kernel before 4.4 allows local users to cause a denial of service (infinite loop) via a writev system call that triggers a zero length for the first segment of an iov.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8803</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8803" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8803" source="CVE"/>
    <description>
    The ecc_256_modp function in ecc-256.c in Nettle before 3.2 does not properly handle carry propagation and produces incorrect output in its implementation of the P-256 NIST elliptic curve, which allows attackers to have unspecified impact via unknown vectors, a different vulnerability than CVE-2015-8805.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123291" comment="libhogweed2-2.7.1-6.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123292" comment="libhogweed2-32bit-2.7.1-6.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123293" comment="libnettle-2.7.1-6.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123294" comment="libnettle-devel-2.7.1-6.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123295" comment="libnettle-devel-32bit-2.7.1-6.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123296" comment="libnettle4-2.7.1-6.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123297" comment="libnettle4-32bit-2.7.1-6.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123298" comment="nettle-2.7.1-6.5.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8804</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8804" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8804" source="CVE"/>
    <description>
    x86_64/ecc-384-modp.asm in Nettle before 3.2 does not properly handle carry propagation and produces incorrect output in its implementation of the P-384 NIST elliptic curve, which allows attackers to have unspecified impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123291" comment="libhogweed2-2.7.1-6.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123292" comment="libhogweed2-32bit-2.7.1-6.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123293" comment="libnettle-2.7.1-6.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123294" comment="libnettle-devel-2.7.1-6.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123295" comment="libnettle-devel-32bit-2.7.1-6.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123296" comment="libnettle4-2.7.1-6.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123297" comment="libnettle4-32bit-2.7.1-6.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123298" comment="nettle-2.7.1-6.5.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8805</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8805" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8805" source="CVE"/>
    <description>
    The ecc_256_modq function in ecc-256.c in Nettle before 3.2 does not properly handle carry propagation and produces incorrect output in its implementation of the P-256 NIST elliptic curve, which allows attackers to have unspecified impact via unknown vectors, a different vulnerability than CVE-2015-8803.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123291" comment="libhogweed2-2.7.1-6.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123292" comment="libhogweed2-32bit-2.7.1-6.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123293" comment="libnettle-2.7.1-6.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123294" comment="libnettle-devel-2.7.1-6.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123295" comment="libnettle-devel-32bit-2.7.1-6.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123296" comment="libnettle4-2.7.1-6.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123297" comment="libnettle4-32bit-2.7.1-6.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123298" comment="nettle-2.7.1-6.5.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8812</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8812" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8812" source="CVE"/>
    <description>
    drivers/infiniband/hw/cxgb3/iwch_cm.c in the Linux kernel before 4.5 does not properly identify error conditions, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via crafted packets.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8816</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8816" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8816" source="CVE"/>
    <description>
    The hub_activate function in drivers/usb/core/hub.c in the Linux kernel before 4.3.5 does not properly maintain a hub-interface data structure, which allows physically proximate attackers to cause a denial of service (invalid memory access and system crash) or possibly have unspecified other impact by unplugging a USB hub device.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8830</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8830" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8830" source="CVE"/>
    <description>
    Integer overflow in the aio_setup_single_vector function in fs/aio.c in the Linux kernel 4.0 allows local users to cause a denial of service or possibly have unspecified other impact via a large AIO iovec.  NOTE: this vulnerability exists because of a CVE-2012-6701 regression.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8833</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8833" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8833" source="CVE"/>
    <description>
    Use-after-free vulnerability in the create_smp_dialog function in gtk-dialog.c in the Off-the-Record Messaging (OTR) pidgin-otr plugin before 4.0.2 for Pidgin allows remote attackers to execute arbitrary code via vectors related to the "Authenticate buddy" menu item.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125369" comment="pidgin-otr-4.0.2-7.8.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8835</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8835" source="CVE"/>
    <description>
    The make_http_soap_request function in ext/soap/php_http.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 does not properly retrieve keys, which allows remote attackers to cause a denial of service (NULL pointer dereference, type confusion, and application crash) or possibly execute arbitrary code via crafted serialized data representing a numerically indexed _cookies array, related to the SoapClient::__call method in ext/soap/soap.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126844" comment="apache2-mod_php5-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126845" comment="php5-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126846" comment="php5-bcmath-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126847" comment="php5-bz2-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126848" comment="php5-calendar-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126849" comment="php5-ctype-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126850" comment="php5-curl-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126851" comment="php5-dba-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126852" comment="php5-devel-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126853" comment="php5-dom-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126854" comment="php5-enchant-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126855" comment="php5-exif-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126856" comment="php5-fastcgi-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126857" comment="php5-fileinfo-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126858" comment="php5-firebird-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126859" comment="php5-fpm-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126860" comment="php5-ftp-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126861" comment="php5-gd-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126862" comment="php5-gettext-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126863" comment="php5-gmp-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126864" comment="php5-iconv-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126865" comment="php5-imap-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126866" comment="php5-intl-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126867" comment="php5-json-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126868" comment="php5-ldap-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126869" comment="php5-mbstring-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126870" comment="php5-mcrypt-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126871" comment="php5-mssql-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126872" comment="php5-mysql-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126873" comment="php5-odbc-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126874" comment="php5-opcache-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126875" comment="php5-openssl-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126876" comment="php5-pcntl-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126877" comment="php5-pdo-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126878" comment="php5-pear-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126879" comment="php5-pgsql-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126880" comment="php5-phar-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126881" comment="php5-posix-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126882" comment="php5-pspell-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126883" comment="php5-readline-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126884" comment="php5-shmop-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126885" comment="php5-snmp-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126886" comment="php5-soap-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126887" comment="php5-sockets-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126888" comment="php5-sqlite-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126889" comment="php5-suhosin-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126890" comment="php5-sysvmsg-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126891" comment="php5-sysvsem-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126892" comment="php5-sysvshm-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126893" comment="php5-tidy-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126894" comment="php5-tokenizer-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126895" comment="php5-wddx-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126896" comment="php5-xmlreader-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126897" comment="php5-xmlrpc-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126898" comment="php5-xmlwriter-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126899" comment="php5-xsl-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126900" comment="php5-zip-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126901" comment="php5-zlib-5.6.1-53.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8838</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8838" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8838" source="CVE"/>
    <description>
    ext/mysqlnd/mysqlnd.c in PHP before 5.4.43, 5.5.x before 5.5.27, and 5.6.x before 5.6.11 uses a client SSL option to mean that SSL is optional, which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, a related issue to CVE-2015-3152.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126844" comment="apache2-mod_php5-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126845" comment="php5-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126846" comment="php5-bcmath-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126847" comment="php5-bz2-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126848" comment="php5-calendar-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126849" comment="php5-ctype-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126850" comment="php5-curl-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126851" comment="php5-dba-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126852" comment="php5-devel-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126853" comment="php5-dom-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126854" comment="php5-enchant-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126855" comment="php5-exif-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126856" comment="php5-fastcgi-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126857" comment="php5-fileinfo-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126858" comment="php5-firebird-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126859" comment="php5-fpm-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126860" comment="php5-ftp-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126861" comment="php5-gd-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126862" comment="php5-gettext-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126863" comment="php5-gmp-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126864" comment="php5-iconv-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126865" comment="php5-imap-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126866" comment="php5-intl-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126867" comment="php5-json-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126868" comment="php5-ldap-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126869" comment="php5-mbstring-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126870" comment="php5-mcrypt-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126871" comment="php5-mssql-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126872" comment="php5-mysql-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126873" comment="php5-odbc-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126874" comment="php5-opcache-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126875" comment="php5-openssl-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126876" comment="php5-pcntl-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126877" comment="php5-pdo-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126878" comment="php5-pear-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126879" comment="php5-pgsql-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126880" comment="php5-phar-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126881" comment="php5-posix-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126882" comment="php5-pspell-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126883" comment="php5-readline-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126884" comment="php5-shmop-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126885" comment="php5-snmp-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126886" comment="php5-soap-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126887" comment="php5-sockets-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126888" comment="php5-sqlite-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126889" comment="php5-suhosin-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126890" comment="php5-sysvmsg-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126891" comment="php5-sysvsem-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126892" comment="php5-sysvshm-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126893" comment="php5-tidy-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126894" comment="php5-tokenizer-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126895" comment="php5-wddx-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126896" comment="php5-xmlreader-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126897" comment="php5-xmlrpc-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126898" comment="php5-xmlwriter-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126899" comment="php5-xsl-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126900" comment="php5-zip-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126901" comment="php5-zlib-5.6.1-53.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8842</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8842" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8842" source="CVE"/>
    <description>
    tmpfiles.d/systemd.conf in systemd before 229 uses weak permissions for /var/log/journal/%m/system.journal, which allows local users to obtain sensitive information by reading the file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126496" comment="libgudev-1_0-0-210.1459453449.5237776-25.37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126497" comment="libgudev-1_0-0-32bit-210.1459453449.5237776-25.37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126498" comment="libgudev-1_0-devel-210.1459453449.5237776-25.37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126499" comment="libudev-devel-210.1459453449.5237776-25.37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126500" comment="libudev-mini-devel-210.1459453449.5237776-25.37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126501" comment="libudev-mini1-210.1459453449.5237776-25.37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126502" comment="libudev1-210.1459453449.5237776-25.37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126503" comment="libudev1-32bit-210.1459453449.5237776-25.37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126504" comment="nss-myhostname-210.1459453449.5237776-25.37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126505" comment="nss-myhostname-32bit-210.1459453449.5237776-25.37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126506" comment="systemd-210.1459453449.5237776-25.37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126507" comment="systemd-32bit-210.1459453449.5237776-25.37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126508" comment="systemd-bash-completion-210.1459453449.5237776-25.37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126509" comment="systemd-devel-210.1459453449.5237776-25.37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126510" comment="systemd-journal-gateway-210.1459453449.5237776-25.37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126511" comment="systemd-logger-210.1459453449.5237776-25.37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126512" comment="systemd-mini-210.1459453449.5237776-25.37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126513" comment="systemd-mini-devel-210.1459453449.5237776-25.37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126514" comment="systemd-mini-sysvinit-210.1459453449.5237776-25.37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126515" comment="systemd-sysvinit-210.1459453449.5237776-25.37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126516" comment="typelib-1_0-GUdev-1_0-210.1459453449.5237776-25.37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126517" comment="udev-210.1459453449.5237776-25.37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126518" comment="udev-mini-210.1459453449.5237776-25.37.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8852</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8852" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8852" source="CVE"/>
    <description>
    Varnish 3.x before 3.0.7, when used in certain stacked installations, allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a header line terminated by a \r (carriage return) character in conjunction with multiple Content-Length headers in an HTTP request.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127663" comment="libvarnishapi1-3.0.7-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127664" comment="varnish-3.0.7-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127665" comment="varnish-devel-3.0.7-2.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8863</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8863" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8863" source="CVE"/>
    <description>
    Off-by-one error in the tokenadd function in jv_parse.c in jq allows remote attackers to cause a denial of service (crash) via a long JSON-encoded number, which triggers a heap-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127174" comment="jq-1.4-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127175" comment="libjq-devel-1.4-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127176" comment="libjq1-1.4-2.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8864</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8864" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8864" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134103" comment="roundcubemail-1.0.9-20.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8866</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8866" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8866" source="CVE"/>
    <description>
    ext/libxml/libxml.c in PHP before 5.5.22 and 5.6.x before 5.6.6, when PHP-FPM is used, does not isolate each thread from libxml_disable_entity_loader changes in other threads, which allows remote attackers to conduct XML External Entity (XXE) and XML Entity Expansion (XEE) attacks via a crafted XML document, a related issue to CVE-2015-5161.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127477" comment="apache2-mod_php5-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127478" comment="php5-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127479" comment="php5-bcmath-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127480" comment="php5-bz2-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127481" comment="php5-calendar-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127482" comment="php5-ctype-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127483" comment="php5-curl-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127484" comment="php5-dba-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127485" comment="php5-devel-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127486" comment="php5-dom-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127487" comment="php5-enchant-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127488" comment="php5-exif-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127489" comment="php5-fastcgi-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127490" comment="php5-fileinfo-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127491" comment="php5-firebird-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127492" comment="php5-fpm-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127493" comment="php5-ftp-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127494" comment="php5-gd-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127495" comment="php5-gettext-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127496" comment="php5-gmp-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127497" comment="php5-iconv-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127498" comment="php5-imap-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127499" comment="php5-intl-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127500" comment="php5-json-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127501" comment="php5-ldap-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127502" comment="php5-mbstring-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127503" comment="php5-mcrypt-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127504" comment="php5-mssql-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127505" comment="php5-mysql-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127506" comment="php5-odbc-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127507" comment="php5-opcache-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127508" comment="php5-openssl-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127509" comment="php5-pcntl-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127510" comment="php5-pdo-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127511" comment="php5-pear-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127512" comment="php5-pgsql-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127513" comment="php5-phar-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127514" comment="php5-posix-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127515" comment="php5-pspell-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127516" comment="php5-readline-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127517" comment="php5-shmop-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127518" comment="php5-snmp-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127519" comment="php5-soap-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127520" comment="php5-sockets-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127521" comment="php5-sqlite-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127522" comment="php5-suhosin-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127523" comment="php5-sysvmsg-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127524" comment="php5-sysvsem-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127525" comment="php5-sysvshm-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127526" comment="php5-tidy-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127527" comment="php5-tokenizer-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127528" comment="php5-wddx-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127529" comment="php5-xmlreader-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127530" comment="php5-xmlrpc-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127531" comment="php5-xmlwriter-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127532" comment="php5-xsl-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127533" comment="php5-zip-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127534" comment="php5-zlib-5.6.1-57.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8867</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8867" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8867" source="CVE"/>
    <description>
    The openssl_random_pseudo_bytes function in ext/openssl/openssl.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 incorrectly relies on the deprecated RAND_pseudo_bytes function, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127477" comment="apache2-mod_php5-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127478" comment="php5-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127479" comment="php5-bcmath-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127480" comment="php5-bz2-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127481" comment="php5-calendar-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127482" comment="php5-ctype-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127483" comment="php5-curl-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127484" comment="php5-dba-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127485" comment="php5-devel-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127486" comment="php5-dom-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127487" comment="php5-enchant-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127488" comment="php5-exif-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127489" comment="php5-fastcgi-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127490" comment="php5-fileinfo-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127491" comment="php5-firebird-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127492" comment="php5-fpm-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127493" comment="php5-ftp-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127494" comment="php5-gd-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127495" comment="php5-gettext-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127496" comment="php5-gmp-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127497" comment="php5-iconv-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127498" comment="php5-imap-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127499" comment="php5-intl-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127500" comment="php5-json-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127501" comment="php5-ldap-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127502" comment="php5-mbstring-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127503" comment="php5-mcrypt-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127504" comment="php5-mssql-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127505" comment="php5-mysql-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127506" comment="php5-odbc-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127507" comment="php5-opcache-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127508" comment="php5-openssl-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127509" comment="php5-pcntl-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127510" comment="php5-pdo-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127511" comment="php5-pear-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127512" comment="php5-pgsql-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127513" comment="php5-phar-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127514" comment="php5-posix-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127515" comment="php5-pspell-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127516" comment="php5-readline-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127517" comment="php5-shmop-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127518" comment="php5-snmp-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127519" comment="php5-soap-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127520" comment="php5-sockets-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127521" comment="php5-sqlite-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127522" comment="php5-suhosin-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127523" comment="php5-sysvmsg-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127524" comment="php5-sysvsem-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127525" comment="php5-sysvshm-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127526" comment="php5-tidy-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127527" comment="php5-tokenizer-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127528" comment="php5-wddx-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127529" comment="php5-xmlreader-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127530" comment="php5-xmlrpc-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127531" comment="php5-xmlwriter-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127532" comment="php5-xsl-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127533" comment="php5-zip-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127534" comment="php5-zlib-5.6.1-57.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8868</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8868" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8868" source="CVE"/>
    <description>
    Heap-based buffer overflow in the ExponentialFunction::ExponentialFunction function in Poppler before 0.40.0 allows remote attackers to cause a denial of service (memory corruption and crash) or possibly execute arbitrary code via an invalid blend mode in the ExtGState dictionary in a crafted PDF document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127676" comment="libpoppler-cpp0-0.26.5-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127677" comment="libpoppler-cpp0-32bit-0.26.5-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127678" comment="libpoppler-devel-0.26.5-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127679" comment="libpoppler-glib-devel-0.26.5-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127680" comment="libpoppler-glib8-0.26.5-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127681" comment="libpoppler-glib8-32bit-0.26.5-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127682" comment="libpoppler-qt4-4-0.26.5-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127683" comment="libpoppler-qt4-4-32bit-0.26.5-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127684" comment="libpoppler-qt4-devel-0.26.5-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127685" comment="libpoppler-qt5-1-0.26.5-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127686" comment="libpoppler-qt5-1-32bit-0.26.5-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127687" comment="libpoppler-qt5-devel-0.26.5-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127688" comment="libpoppler46-0.26.5-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127689" comment="libpoppler46-32bit-0.26.5-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127690" comment="poppler-0.26.5-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127691" comment="poppler-qt-0.26.5-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127692" comment="poppler-qt5-0.26.5-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127693" comment="poppler-tools-0.26.5-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127694" comment="typelib-1_0-Poppler-0_18-0.26.5-6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8869</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8869" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8869" source="CVE"/>
    <description>
    OCaml before 4.03.0 does not properly handle sign extensions, which allows remote attackers to conduct buffer overflow attacks or obtain sensitive information as demonstrated by a long string to the String.copy function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127781" comment="ocaml-4.01.0-6.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127782" comment="ocaml-camlp4-4.01.0-6.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127783" comment="ocaml-camlp4-devel-4.01.0-6.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127784" comment="ocaml-compiler-libs-4.01.0-6.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127785" comment="ocaml-compiler-libs-devel-4.01.0-6.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127786" comment="ocaml-docs-4.01.0-6.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127787" comment="ocaml-emacs-4.01.0-6.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127788" comment="ocaml-labltk-4.01.0-6.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127789" comment="ocaml-labltk-devel-4.01.0-6.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127790" comment="ocaml-ocamldoc-4.01.0-6.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127791" comment="ocaml-runtime-4.01.0-6.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127792" comment="ocaml-source-4.01.0-6.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127793" comment="ocaml-x11-4.01.0-6.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8872</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8872" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8872" source="CVE"/>
    <description>
    The set_fat function in fat.c in dosfstools before 4.0 might allow attackers to corrupt a FAT12 filesystem or cause a denial of service (invalid memory read and crash) by writing an odd number of clusters to the third to last entry on a FAT12 filesystem, which triggers an "off-by-two error."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128378" comment="dosfstools-3.0.26-3.8.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8873</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8873" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8873" source="CVE"/>
    <description>
    Stack consumption vulnerability in Zend/zend_exceptions.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allows remote attackers to cause a denial of service (segmentation fault) via recursive method calls.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128692" comment="apache2-mod_php5-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128693" comment="php5-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128694" comment="php5-bcmath-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128695" comment="php5-bz2-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128696" comment="php5-calendar-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128697" comment="php5-ctype-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128698" comment="php5-curl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128699" comment="php5-dba-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128700" comment="php5-devel-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128701" comment="php5-dom-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128702" comment="php5-enchant-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128703" comment="php5-exif-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128704" comment="php5-fastcgi-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128705" comment="php5-fileinfo-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128706" comment="php5-firebird-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128707" comment="php5-fpm-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128708" comment="php5-ftp-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128709" comment="php5-gd-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128710" comment="php5-gettext-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128711" comment="php5-gmp-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128712" comment="php5-iconv-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128713" comment="php5-imap-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128714" comment="php5-intl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128715" comment="php5-json-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128716" comment="php5-ldap-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128717" comment="php5-mbstring-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128718" comment="php5-mcrypt-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128719" comment="php5-mssql-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128720" comment="php5-mysql-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128721" comment="php5-odbc-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128722" comment="php5-opcache-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128723" comment="php5-openssl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128724" comment="php5-pcntl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128725" comment="php5-pdo-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128726" comment="php5-pear-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128727" comment="php5-pgsql-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128728" comment="php5-phar-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128729" comment="php5-posix-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128730" comment="php5-pspell-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128731" comment="php5-readline-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128732" comment="php5-shmop-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128733" comment="php5-snmp-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128734" comment="php5-soap-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128735" comment="php5-sockets-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128736" comment="php5-sqlite-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128737" comment="php5-suhosin-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128738" comment="php5-sysvmsg-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128739" comment="php5-sysvsem-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128740" comment="php5-sysvshm-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128741" comment="php5-tidy-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128742" comment="php5-tokenizer-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128743" comment="php5-wddx-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128744" comment="php5-xmlreader-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128745" comment="php5-xmlrpc-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128746" comment="php5-xmlwriter-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128747" comment="php5-xsl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128748" comment="php5-zip-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128749" comment="php5-zlib-5.6.1-66.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8874</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8874" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8874" source="CVE"/>
    <description>
    Stack consumption vulnerability in GD in PHP before 5.6.12 allows remote attackers to cause a denial of service via a crafted imagefilltoborder call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128692" comment="apache2-mod_php5-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128693" comment="php5-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128694" comment="php5-bcmath-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128695" comment="php5-bz2-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128696" comment="php5-calendar-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128697" comment="php5-ctype-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128698" comment="php5-curl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128699" comment="php5-dba-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128700" comment="php5-devel-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128701" comment="php5-dom-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128702" comment="php5-enchant-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128703" comment="php5-exif-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128704" comment="php5-fastcgi-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128705" comment="php5-fileinfo-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128706" comment="php5-firebird-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128707" comment="php5-fpm-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128708" comment="php5-ftp-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128709" comment="php5-gd-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128710" comment="php5-gettext-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128711" comment="php5-gmp-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128712" comment="php5-iconv-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128713" comment="php5-imap-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128714" comment="php5-intl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128715" comment="php5-json-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128716" comment="php5-ldap-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128717" comment="php5-mbstring-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128718" comment="php5-mcrypt-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128719" comment="php5-mssql-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128720" comment="php5-mysql-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128721" comment="php5-odbc-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128722" comment="php5-opcache-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128723" comment="php5-openssl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128724" comment="php5-pcntl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128725" comment="php5-pdo-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128726" comment="php5-pear-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128727" comment="php5-pgsql-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128728" comment="php5-phar-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128729" comment="php5-posix-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128730" comment="php5-pspell-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128731" comment="php5-readline-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128732" comment="php5-shmop-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128733" comment="php5-snmp-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128734" comment="php5-soap-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128735" comment="php5-sockets-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128736" comment="php5-sqlite-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128737" comment="php5-suhosin-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128738" comment="php5-sysvmsg-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128739" comment="php5-sysvsem-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128740" comment="php5-sysvshm-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128741" comment="php5-tidy-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128742" comment="php5-tokenizer-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128743" comment="php5-wddx-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128744" comment="php5-xmlreader-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128745" comment="php5-xmlrpc-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128746" comment="php5-xmlwriter-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128747" comment="php5-xsl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128748" comment="php5-zip-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128749" comment="php5-zlib-5.6.1-66.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8876</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8876" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8876" source="CVE"/>
    <description>
    Zend/zend_exceptions.c in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 does not validate certain Exception objects, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or trigger unintended method execution via crafted serialized data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128692" comment="apache2-mod_php5-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128693" comment="php5-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128694" comment="php5-bcmath-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128695" comment="php5-bz2-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128696" comment="php5-calendar-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128697" comment="php5-ctype-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128698" comment="php5-curl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128699" comment="php5-dba-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128700" comment="php5-devel-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128701" comment="php5-dom-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128702" comment="php5-enchant-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128703" comment="php5-exif-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128704" comment="php5-fastcgi-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128705" comment="php5-fileinfo-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128706" comment="php5-firebird-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128707" comment="php5-fpm-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128708" comment="php5-ftp-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128709" comment="php5-gd-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128710" comment="php5-gettext-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128711" comment="php5-gmp-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128712" comment="php5-iconv-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128713" comment="php5-imap-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128714" comment="php5-intl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128715" comment="php5-json-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128716" comment="php5-ldap-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128717" comment="php5-mbstring-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128718" comment="php5-mcrypt-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128719" comment="php5-mssql-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128720" comment="php5-mysql-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128721" comment="php5-odbc-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128722" comment="php5-opcache-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128723" comment="php5-openssl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128724" comment="php5-pcntl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128725" comment="php5-pdo-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128726" comment="php5-pear-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128727" comment="php5-pgsql-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128728" comment="php5-phar-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128729" comment="php5-posix-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128730" comment="php5-pspell-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128731" comment="php5-readline-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128732" comment="php5-shmop-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128733" comment="php5-snmp-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128734" comment="php5-soap-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128735" comment="php5-sockets-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128736" comment="php5-sqlite-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128737" comment="php5-suhosin-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128738" comment="php5-sysvmsg-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128739" comment="php5-sysvsem-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128740" comment="php5-sysvshm-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128741" comment="php5-tidy-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128742" comment="php5-tokenizer-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128743" comment="php5-wddx-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128744" comment="php5-xmlreader-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128745" comment="php5-xmlrpc-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128746" comment="php5-xmlwriter-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128747" comment="php5-xsl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128748" comment="php5-zip-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128749" comment="php5-zlib-5.6.1-66.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8877</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8877" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8877" source="CVE"/>
    <description>
    The gdImageScaleTwoPass function in gd_interpolation.c in the GD Graphics Library (aka libgd) before 2.2.0, as used in PHP before 5.6.12, uses inconsistent allocate and free approaches, which allows remote attackers to cause a denial of service (memory consumption) via a crafted call, as demonstrated by a call to the PHP imagescale function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128692" comment="apache2-mod_php5-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128693" comment="php5-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128694" comment="php5-bcmath-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128695" comment="php5-bz2-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128696" comment="php5-calendar-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128697" comment="php5-ctype-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128698" comment="php5-curl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128699" comment="php5-dba-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128700" comment="php5-devel-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128701" comment="php5-dom-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128702" comment="php5-enchant-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128703" comment="php5-exif-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128704" comment="php5-fastcgi-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128705" comment="php5-fileinfo-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128706" comment="php5-firebird-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128707" comment="php5-fpm-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128708" comment="php5-ftp-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128709" comment="php5-gd-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128710" comment="php5-gettext-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128711" comment="php5-gmp-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128712" comment="php5-iconv-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128713" comment="php5-imap-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128714" comment="php5-intl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128715" comment="php5-json-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128716" comment="php5-ldap-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128717" comment="php5-mbstring-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128718" comment="php5-mcrypt-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128719" comment="php5-mssql-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128720" comment="php5-mysql-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128721" comment="php5-odbc-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128722" comment="php5-opcache-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128723" comment="php5-openssl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128724" comment="php5-pcntl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128725" comment="php5-pdo-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128726" comment="php5-pear-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128727" comment="php5-pgsql-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128728" comment="php5-phar-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128729" comment="php5-posix-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128730" comment="php5-pspell-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128731" comment="php5-readline-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128732" comment="php5-shmop-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128733" comment="php5-snmp-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128734" comment="php5-soap-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128735" comment="php5-sockets-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128736" comment="php5-sqlite-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128737" comment="php5-suhosin-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128738" comment="php5-sysvmsg-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128739" comment="php5-sysvsem-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128740" comment="php5-sysvshm-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128741" comment="php5-tidy-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128742" comment="php5-tokenizer-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128743" comment="php5-wddx-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128744" comment="php5-xmlreader-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128745" comment="php5-xmlrpc-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128746" comment="php5-xmlwriter-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128747" comment="php5-xsl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128748" comment="php5-zip-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128749" comment="php5-zlib-5.6.1-66.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8879</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8879" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8879" source="CVE"/>
    <description>
    The odbc_bindcols function in ext/odbc/php_odbc.c in PHP before 5.6.12 mishandles driver behavior for SQL_WVARCHAR columns, which allows remote attackers to cause a denial of service (application crash) in opportunistic circumstances by leveraging use of the odbc_fetch_array function to access a certain type of Microsoft SQL Server table.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128692" comment="apache2-mod_php5-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128693" comment="php5-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128694" comment="php5-bcmath-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128695" comment="php5-bz2-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128696" comment="php5-calendar-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128697" comment="php5-ctype-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128698" comment="php5-curl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128699" comment="php5-dba-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128700" comment="php5-devel-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128701" comment="php5-dom-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128702" comment="php5-enchant-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128703" comment="php5-exif-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128704" comment="php5-fastcgi-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128705" comment="php5-fileinfo-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128706" comment="php5-firebird-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128707" comment="php5-fpm-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128708" comment="php5-ftp-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128709" comment="php5-gd-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128710" comment="php5-gettext-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128711" comment="php5-gmp-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128712" comment="php5-iconv-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128713" comment="php5-imap-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128714" comment="php5-intl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128715" comment="php5-json-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128716" comment="php5-ldap-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128717" comment="php5-mbstring-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128718" comment="php5-mcrypt-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128719" comment="php5-mssql-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128720" comment="php5-mysql-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128721" comment="php5-odbc-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128722" comment="php5-opcache-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128723" comment="php5-openssl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128724" comment="php5-pcntl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128725" comment="php5-pdo-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128726" comment="php5-pear-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128727" comment="php5-pgsql-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128728" comment="php5-phar-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128729" comment="php5-posix-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128730" comment="php5-pspell-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128731" comment="php5-readline-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128732" comment="php5-shmop-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128733" comment="php5-snmp-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128734" comment="php5-soap-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128735" comment="php5-sockets-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128736" comment="php5-sqlite-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128737" comment="php5-suhosin-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128738" comment="php5-sysvmsg-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128739" comment="php5-sysvsem-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128740" comment="php5-sysvshm-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128741" comment="php5-tidy-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128742" comment="php5-tokenizer-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128743" comment="php5-wddx-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128744" comment="php5-xmlreader-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128745" comment="php5-xmlrpc-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128746" comment="php5-xmlwriter-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128747" comment="php5-xsl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128748" comment="php5-zip-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128749" comment="php5-zlib-5.6.1-66.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8894</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8894" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8894" source="CVE"/>
    <description>
    Double free vulnerability in coders/tga.c in ImageMagick 7.0.0 and later allows remote attackers to cause a denial of service (application crash) via a crafted tga file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129696" comment="GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129697" comment="GraphicsMagick-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129698" comment="libGraphicsMagick++-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129699" comment="libGraphicsMagick++-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129700" comment="libGraphicsMagick-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129701" comment="libGraphicsMagick3-config-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129702" comment="libGraphicsMagickWand-Q16-2-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129703" comment="perl-GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8895</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8895" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8895" source="CVE"/>
    <description>
    Integer overflow in coders/icon.c in ImageMagick 6.9.1-3 and later allows remote attackers to cause a denial of service (application crash) via a crafted length value, which triggers a buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8896</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8896" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8896" source="CVE"/>
    <description>
    Integer truncation issue in coders/pict.c in ImageMagick before 7.0.5-0 allows remote attackers to cause a denial of service (application crash) via a crafted .pict file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129696" comment="GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129697" comment="GraphicsMagick-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129698" comment="libGraphicsMagick++-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129699" comment="libGraphicsMagick++-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129700" comment="libGraphicsMagick-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129701" comment="libGraphicsMagick3-config-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129702" comment="libGraphicsMagickWand-Q16-2-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129703" comment="perl-GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8897</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8897" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8897" source="CVE"/>
    <description>
    The SpliceImage function in MagickCore/transform.c in ImageMagick before 6.9.2-4 allows remote attackers to cause a denial of service (application crash) via a crafted png file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8898</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8898" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8898" source="CVE"/>
    <description>
    The WriteImages function in magick/constitute.c in ImageMagick before 6.9.2-4 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted image file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8900</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8900" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8900" source="CVE"/>
    <description>
    The ReadHDRImage function in coders/hdr.c in ImageMagick 6.x and 7.x allows remote attackers to cause a denial of service (infinite loop) via a crafted HDR file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8901</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8901" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8901" source="CVE"/>
    <description>
    ImageMagick 6.x before 6.9.0-5 Beta allows remote attackers to cause a denial of service (infinite loop) via a crafted MIFF file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129696" comment="GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129697" comment="GraphicsMagick-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129698" comment="libGraphicsMagick++-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129699" comment="libGraphicsMagick++-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129700" comment="libGraphicsMagick-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129701" comment="libGraphicsMagick3-config-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129702" comment="libGraphicsMagickWand-Q16-2-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129703" comment="perl-GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8902</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8902" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8902" source="CVE"/>
    <description>
    The ReadBlobByte function in coders/pdb.c in ImageMagick 6.x before 6.9.0-5 Beta allows remote attackers to cause a denial of service (infinite loop) via a crafted PDB file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8903</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8903" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8903" source="CVE"/>
    <description>
    The ReadVICARImage function in coders/vicar.c in ImageMagick 6.x before 6.9.0-5 Beta allows remote attackers to cause a denial of service (infinite loop) via a crafted VICAR file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129696" comment="GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129697" comment="GraphicsMagick-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129698" comment="libGraphicsMagick++-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129699" comment="libGraphicsMagick++-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129700" comment="libGraphicsMagick-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129701" comment="libGraphicsMagick3-config-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129702" comment="libGraphicsMagickWand-Q16-2-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129703" comment="perl-GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8935</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8935" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8935" source="CVE"/>
    <description>
    The sapi_header_op function in main/SAPI.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 supports deprecated line folding without considering browser compatibility, which allows remote attackers to conduct cross-site scripting (XSS) attacks against Internet Explorer by leveraging (1) %0A%20 or (2) %0D%0A%20 mishandling in the header function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129776" comment="apache2-mod_php5-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129777" comment="php5-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129778" comment="php5-bcmath-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129779" comment="php5-bz2-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129780" comment="php5-calendar-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129781" comment="php5-ctype-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129782" comment="php5-curl-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129783" comment="php5-dba-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129784" comment="php5-devel-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129785" comment="php5-dom-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129786" comment="php5-enchant-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129787" comment="php5-exif-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129788" comment="php5-fastcgi-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129789" comment="php5-fileinfo-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129790" comment="php5-firebird-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129791" comment="php5-fpm-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129792" comment="php5-ftp-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129793" comment="php5-gd-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129794" comment="php5-gettext-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129795" comment="php5-gmp-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129796" comment="php5-iconv-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129797" comment="php5-imap-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129798" comment="php5-intl-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129799" comment="php5-json-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129800" comment="php5-ldap-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129801" comment="php5-mbstring-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129802" comment="php5-mcrypt-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129803" comment="php5-mssql-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129804" comment="php5-mysql-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129805" comment="php5-odbc-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129806" comment="php5-opcache-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129807" comment="php5-openssl-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129808" comment="php5-pcntl-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129809" comment="php5-pdo-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129810" comment="php5-pear-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129811" comment="php5-pgsql-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129812" comment="php5-phar-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129813" comment="php5-posix-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129814" comment="php5-pspell-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129815" comment="php5-readline-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129816" comment="php5-shmop-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129817" comment="php5-snmp-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129818" comment="php5-soap-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129819" comment="php5-sockets-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129820" comment="php5-sqlite-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129821" comment="php5-suhosin-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129822" comment="php5-sysvmsg-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129823" comment="php5-sysvsem-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129824" comment="php5-sysvshm-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129825" comment="php5-tidy-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129826" comment="php5-tokenizer-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129827" comment="php5-wddx-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129828" comment="php5-xmlreader-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129829" comment="php5-xmlrpc-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129830" comment="php5-xmlwriter-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129831" comment="php5-xsl-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129832" comment="php5-zip-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129833" comment="php5-zlib-5.6.1-69.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8947</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8947" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8947" source="CVE"/>
    <description>
    hb-ot-layout-gpos-table.hh in HarfBuzz before 1.0.5 allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via crafted data, a different vulnerability than CVE-2016-2052.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134136" comment="harfbuzz-0.9.35-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134137" comment="harfbuzz-devel-0.9.35-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134138" comment="harfbuzz-tools-0.9.35-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134139" comment="libharfbuzz-icu0-0.9.35-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134140" comment="libharfbuzz-icu0-32bit-0.9.35-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134141" comment="libharfbuzz0-0.9.35-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134142" comment="libharfbuzz0-32bit-0.9.35-2.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8948</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8948" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8948" source="CVE"/>
    <description>
    idn in GNU libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130734" comment="libidn-1.33-3.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130735" comment="libidn-devel-1.33-3.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130736" comment="libidn-tools-1.33-3.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130737" comment="libidn11-1.33-3.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130738" comment="libidn11-32bit-1.33-3.6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8956</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8956" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8956" source="CVE"/>
    <description>
    The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 4.2 allows local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133865" comment="bbswitch-0.8-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133866" comment="bbswitch-kmp-default-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133867" comment="bbswitch-kmp-desktop-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133868" comment="bbswitch-kmp-pae-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133869" comment="bbswitch-kmp-xen-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133870" comment="cloop-2.639-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133871" comment="cloop-kmp-default-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133872" comment="cloop-kmp-desktop-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133873" comment="cloop-kmp-pae-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133874" comment="cloop-kmp-xen-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133875" comment="crash-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133876" comment="crash-devel-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133877" comment="crash-doc-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133878" comment="crash-eppic-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133879" comment="crash-gcore-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133880" comment="crash-kmp-default-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133881" comment="crash-kmp-desktop-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133882" comment="crash-kmp-pae-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133883" comment="crash-kmp-xen-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133884" comment="hdjmod-1.28-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133885" comment="hdjmod-kmp-default-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133886" comment="hdjmod-kmp-desktop-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133887" comment="hdjmod-kmp-pae-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133888" comment="hdjmod-kmp-xen-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133889" comment="ipset-6.23-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133890" comment="ipset-devel-6.23-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133891" comment="ipset-kmp-default-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133892" comment="ipset-kmp-desktop-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133893" comment="ipset-kmp-pae-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133894" comment="ipset-kmp-xen-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133895" comment="kernel-debug-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133896" comment="kernel-debug-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133897" comment="kernel-debug-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133898" comment="kernel-default-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133899" comment="kernel-default-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133900" comment="kernel-default-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133901" comment="kernel-desktop-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133902" comment="kernel-desktop-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133903" comment="kernel-desktop-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133904" comment="kernel-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133905" comment="kernel-docs-3.16.7-45.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133906" comment="kernel-ec2-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133907" comment="kernel-ec2-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133908" comment="kernel-ec2-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133909" comment="kernel-macros-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133910" comment="kernel-obs-build-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133911" comment="kernel-obs-qa-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133912" comment="kernel-obs-qa-xen-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133913" comment="kernel-pae-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133914" comment="kernel-pae-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133915" comment="kernel-pae-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133916" comment="kernel-source-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133917" comment="kernel-source-vanilla-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133918" comment="kernel-syms-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133919" comment="kernel-vanilla-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133920" comment="kernel-vanilla-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133921" comment="kernel-xen-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133922" comment="kernel-xen-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133923" comment="kernel-xen-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133924" comment="libipset3-6.23-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133925" comment="pcfclock-0.44-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133926" comment="pcfclock-kmp-default-0.44_k3.16.7_45-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133927" comment="pcfclock-kmp-desktop-0.44_k3.16.7_45-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133928" comment="pcfclock-kmp-pae-0.44_k3.16.7_45-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133929" comment="python-virtualbox-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133930" comment="vhba-kmp-20140629-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133931" comment="vhba-kmp-default-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133932" comment="vhba-kmp-desktop-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133933" comment="vhba-kmp-pae-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133934" comment="vhba-kmp-xen-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133935" comment="virtualbox-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133936" comment="virtualbox-devel-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133937" comment="virtualbox-guest-desktop-icons-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133938" comment="virtualbox-guest-kmp-default-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133939" comment="virtualbox-guest-kmp-desktop-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133940" comment="virtualbox-guest-kmp-pae-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133941" comment="virtualbox-guest-tools-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133942" comment="virtualbox-guest-x11-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133943" comment="virtualbox-host-kmp-default-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133944" comment="virtualbox-host-kmp-desktop-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133945" comment="virtualbox-host-kmp-pae-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133946" comment="virtualbox-host-source-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133947" comment="virtualbox-qt-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133948" comment="virtualbox-websrv-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133949" comment="xen-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133950" comment="xen-devel-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133951" comment="xen-doc-html-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133952" comment="xen-kmp-default-4.4.4_05_k3.16.7_45-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133953" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_45-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133954" comment="xen-libs-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133955" comment="xen-libs-32bit-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133956" comment="xen-tools-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133957" comment="xen-tools-domU-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133958" comment="xtables-addons-2.6-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133959" comment="xtables-addons-kmp-default-2.6_k3.16.7_45-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133960" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_45-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133961" comment="xtables-addons-kmp-pae-2.6_k3.16.7_45-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133962" comment="xtables-addons-kmp-xen-2.6_k3.16.7_45-24.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8957</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8957" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8957" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133963" comment="GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133964" comment="GraphicsMagick-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133990" comment="ImageMagick-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133991" comment="ImageMagick-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133992" comment="ImageMagick-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133993" comment="ImageMagick-doc-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133994" comment="ImageMagick-extra-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133965" comment="libGraphicsMagick++-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133966" comment="libGraphicsMagick++-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133967" comment="libGraphicsMagick-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133968" comment="libGraphicsMagick3-config-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133969" comment="libGraphicsMagickWand-Q16-2-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133995" comment="libMagick++-6_Q16-5-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133996" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133997" comment="libMagick++-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133998" comment="libMagick++-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133999" comment="libMagickCore-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134000" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134001" comment="libMagickWand-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134002" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133970" comment="perl-GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134003" comment="perl-PerlMagick-6.8.9.8-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8958</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8958" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8958" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133963" comment="GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133964" comment="GraphicsMagick-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133990" comment="ImageMagick-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133991" comment="ImageMagick-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133992" comment="ImageMagick-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133993" comment="ImageMagick-doc-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133994" comment="ImageMagick-extra-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133965" comment="libGraphicsMagick++-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133966" comment="libGraphicsMagick++-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133967" comment="libGraphicsMagick-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133968" comment="libGraphicsMagick3-config-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133969" comment="libGraphicsMagickWand-Q16-2-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133995" comment="libMagick++-6_Q16-5-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133996" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133997" comment="libMagick++-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133998" comment="libMagick++-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133999" comment="libMagickCore-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134000" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134001" comment="libMagickWand-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134002" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133970" comment="perl-GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134003" comment="perl-PerlMagick-6.8.9.8-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8959</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8959" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8959" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133990" comment="ImageMagick-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133991" comment="ImageMagick-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133992" comment="ImageMagick-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133993" comment="ImageMagick-doc-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133994" comment="ImageMagick-extra-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133995" comment="libMagick++-6_Q16-5-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133996" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133997" comment="libMagick++-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133998" comment="libMagick++-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133999" comment="libMagickCore-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134000" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134001" comment="libMagickWand-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134002" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134003" comment="perl-PerlMagick-6.8.9.8-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8962</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8962" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8962" source="CVE"/>
    <description>
    Double free vulnerability in the sg_common_write function in drivers/scsi/sg.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (memory corruption and system crash) by detaching a device during an SG_IO ioctl call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137932" comment="bbswitch-0.8-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137933" comment="bbswitch-kmp-default-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137934" comment="bbswitch-kmp-desktop-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137935" comment="bbswitch-kmp-pae-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137936" comment="bbswitch-kmp-xen-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137937" comment="cloop-2.639-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137938" comment="cloop-kmp-default-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137939" comment="cloop-kmp-desktop-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137940" comment="cloop-kmp-pae-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137941" comment="cloop-kmp-xen-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137942" comment="crash-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137943" comment="crash-devel-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137944" comment="crash-doc-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137945" comment="crash-eppic-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137946" comment="crash-gcore-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137947" comment="crash-kmp-default-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137948" comment="crash-kmp-desktop-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137949" comment="crash-kmp-pae-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137950" comment="crash-kmp-xen-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137951" comment="hdjmod-1.28-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137952" comment="hdjmod-kmp-default-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137953" comment="hdjmod-kmp-desktop-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137954" comment="hdjmod-kmp-pae-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137955" comment="hdjmod-kmp-xen-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137956" comment="ipset-6.23-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137957" comment="ipset-devel-6.23-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137958" comment="ipset-kmp-default-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137959" comment="ipset-kmp-desktop-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137960" comment="ipset-kmp-pae-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137961" comment="ipset-kmp-xen-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137962" comment="kernel-debug-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137963" comment="kernel-debug-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137964" comment="kernel-debug-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137965" comment="kernel-default-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137966" comment="kernel-default-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137967" comment="kernel-default-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137968" comment="kernel-desktop-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137969" comment="kernel-desktop-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137970" comment="kernel-desktop-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137971" comment="kernel-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137972" comment="kernel-docs-3.16.7-53.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137973" comment="kernel-ec2-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137974" comment="kernel-ec2-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137975" comment="kernel-ec2-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137976" comment="kernel-macros-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137977" comment="kernel-obs-build-3.16.7-53.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137978" comment="kernel-obs-qa-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137979" comment="kernel-pae-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137980" comment="kernel-pae-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137981" comment="kernel-pae-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137982" comment="kernel-source-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137983" comment="kernel-source-vanilla-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137984" comment="kernel-syms-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137985" comment="kernel-vanilla-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137986" comment="kernel-vanilla-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137987" comment="kernel-xen-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137988" comment="kernel-xen-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137989" comment="kernel-xen-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137990" comment="libipset3-6.23-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137991" comment="pcfclock-0.44-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137992" comment="pcfclock-kmp-default-0.44_k3.16.7_53-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137993" comment="pcfclock-kmp-desktop-0.44_k3.16.7_53-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137994" comment="pcfclock-kmp-pae-0.44_k3.16.7_53-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137995" comment="python-virtualbox-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137996" comment="vhba-kmp-20140629-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137997" comment="vhba-kmp-default-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137998" comment="vhba-kmp-desktop-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137999" comment="vhba-kmp-pae-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138000" comment="vhba-kmp-xen-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138001" comment="virtualbox-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138002" comment="virtualbox-devel-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138003" comment="virtualbox-guest-desktop-icons-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138004" comment="virtualbox-guest-kmp-default-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138005" comment="virtualbox-guest-kmp-desktop-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138006" comment="virtualbox-guest-kmp-pae-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138007" comment="virtualbox-guest-tools-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138008" comment="virtualbox-guest-x11-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138009" comment="virtualbox-host-kmp-default-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138010" comment="virtualbox-host-kmp-desktop-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138011" comment="virtualbox-host-kmp-pae-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138012" comment="virtualbox-host-source-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138013" comment="virtualbox-qt-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138014" comment="virtualbox-websrv-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138015" comment="xen-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138016" comment="xen-devel-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138017" comment="xen-doc-html-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138018" comment="xen-kmp-default-4.4.4_05_k3.16.7_53-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138019" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_53-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138020" comment="xen-libs-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138021" comment="xen-libs-32bit-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138022" comment="xen-tools-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138023" comment="xen-tools-domU-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138024" comment="xtables-addons-2.6-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138025" comment="xtables-addons-kmp-default-2.6_k3.16.7_53-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138026" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_53-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138027" comment="xtables-addons-kmp-pae-2.6_k3.16.7_53-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138028" comment="xtables-addons-kmp-xen-2.6_k3.16.7_53-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8963</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8963" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8963" source="CVE"/>
    <description>
    Race condition in kernel/events/core.c in the Linux kernel before 4.4 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging incorrect handling of an swevent data structure during a CPU unplug operation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137932" comment="bbswitch-0.8-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137933" comment="bbswitch-kmp-default-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137934" comment="bbswitch-kmp-desktop-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137935" comment="bbswitch-kmp-pae-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137936" comment="bbswitch-kmp-xen-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137937" comment="cloop-2.639-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137938" comment="cloop-kmp-default-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137939" comment="cloop-kmp-desktop-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137940" comment="cloop-kmp-pae-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137941" comment="cloop-kmp-xen-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137942" comment="crash-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137943" comment="crash-devel-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137944" comment="crash-doc-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137945" comment="crash-eppic-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137946" comment="crash-gcore-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137947" comment="crash-kmp-default-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137948" comment="crash-kmp-desktop-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137949" comment="crash-kmp-pae-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137950" comment="crash-kmp-xen-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137951" comment="hdjmod-1.28-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137952" comment="hdjmod-kmp-default-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137953" comment="hdjmod-kmp-desktop-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137954" comment="hdjmod-kmp-pae-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137955" comment="hdjmod-kmp-xen-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137956" comment="ipset-6.23-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137957" comment="ipset-devel-6.23-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137958" comment="ipset-kmp-default-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137959" comment="ipset-kmp-desktop-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137960" comment="ipset-kmp-pae-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137961" comment="ipset-kmp-xen-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137962" comment="kernel-debug-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137963" comment="kernel-debug-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137964" comment="kernel-debug-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137965" comment="kernel-default-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137966" comment="kernel-default-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137967" comment="kernel-default-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137968" comment="kernel-desktop-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137969" comment="kernel-desktop-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137970" comment="kernel-desktop-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137971" comment="kernel-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137972" comment="kernel-docs-3.16.7-53.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137973" comment="kernel-ec2-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137974" comment="kernel-ec2-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137975" comment="kernel-ec2-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137976" comment="kernel-macros-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137977" comment="kernel-obs-build-3.16.7-53.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137978" comment="kernel-obs-qa-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137979" comment="kernel-pae-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137980" comment="kernel-pae-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137981" comment="kernel-pae-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137982" comment="kernel-source-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137983" comment="kernel-source-vanilla-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137984" comment="kernel-syms-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137985" comment="kernel-vanilla-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137986" comment="kernel-vanilla-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137987" comment="kernel-xen-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137988" comment="kernel-xen-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137989" comment="kernel-xen-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137990" comment="libipset3-6.23-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137991" comment="pcfclock-0.44-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137992" comment="pcfclock-kmp-default-0.44_k3.16.7_53-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137993" comment="pcfclock-kmp-desktop-0.44_k3.16.7_53-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137994" comment="pcfclock-kmp-pae-0.44_k3.16.7_53-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137995" comment="python-virtualbox-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137996" comment="vhba-kmp-20140629-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137997" comment="vhba-kmp-default-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137998" comment="vhba-kmp-desktop-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137999" comment="vhba-kmp-pae-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138000" comment="vhba-kmp-xen-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138001" comment="virtualbox-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138002" comment="virtualbox-devel-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138003" comment="virtualbox-guest-desktop-icons-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138004" comment="virtualbox-guest-kmp-default-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138005" comment="virtualbox-guest-kmp-desktop-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138006" comment="virtualbox-guest-kmp-pae-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138007" comment="virtualbox-guest-tools-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138008" comment="virtualbox-guest-x11-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138009" comment="virtualbox-host-kmp-default-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138010" comment="virtualbox-host-kmp-desktop-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138011" comment="virtualbox-host-kmp-pae-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138012" comment="virtualbox-host-source-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138013" comment="virtualbox-qt-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138014" comment="virtualbox-websrv-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138015" comment="xen-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138016" comment="xen-devel-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138017" comment="xen-doc-html-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138018" comment="xen-kmp-default-4.4.4_05_k3.16.7_53-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138019" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_53-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138020" comment="xen-libs-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138021" comment="xen-libs-32bit-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138022" comment="xen-tools-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138023" comment="xen-tools-domU-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138024" comment="xtables-addons-2.6-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138025" comment="xtables-addons-kmp-default-2.6_k3.16.7_53-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138026" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_53-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138027" comment="xtables-addons-kmp-pae-2.6_k3.16.7_53-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138028" comment="xtables-addons-kmp-xen-2.6_k3.16.7_53-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8972</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2015-8972" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8972" source="CVE"/>
    <description>
    Stack-based buffer overflow in the ValidateMove function in frontend/move.cc in GNU Chess (aka gnuchess) before 6.2.4 might allow context-dependent attackers to execute arbitrary code via a large input, as demonstrated when in UCI mode.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135937" comment="gnuchess-6.0.2-6.3.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0402</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0402" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java SE and Java SE Embedded components in Oracle Java SE 6u105, 7u91, and 8u66 and Java SE Embedded 8u65 allows remote attackers to affect integrity via unknown vectors related to Networking.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122295" comment="java-1_7_0-openjdk-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122296" comment="java-1_7_0-openjdk-accessibility-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122297" comment="java-1_7_0-openjdk-bootstrap-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122298" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122299" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122300" comment="java-1_7_0-openjdk-demo-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122301" comment="java-1_7_0-openjdk-devel-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122302" comment="java-1_7_0-openjdk-headless-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122303" comment="java-1_7_0-openjdk-javadoc-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122304" comment="java-1_7_0-openjdk-src-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122288" comment="java-1_8_0-openjdk-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122289" comment="java-1_8_0-openjdk-accessibility-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122290" comment="java-1_8_0-openjdk-demo-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122291" comment="java-1_8_0-openjdk-devel-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122292" comment="java-1_8_0-openjdk-headless-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122293" comment="java-1_8_0-openjdk-javadoc-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122294" comment="java-1_8_0-openjdk-src-1.8.0.72-21.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0448</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0448" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java SE and Java SE Embedded components in Oracle Java SE 6u105, 7u91, and 8u66, and Java SE Embedded 8u65 allows remote authenticated users to affect confidentiality via vectors related to JMX.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122295" comment="java-1_7_0-openjdk-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122296" comment="java-1_7_0-openjdk-accessibility-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122297" comment="java-1_7_0-openjdk-bootstrap-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122298" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122299" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122300" comment="java-1_7_0-openjdk-demo-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122301" comment="java-1_7_0-openjdk-devel-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122302" comment="java-1_7_0-openjdk-headless-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122303" comment="java-1_7_0-openjdk-javadoc-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122304" comment="java-1_7_0-openjdk-src-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122288" comment="java-1_8_0-openjdk-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122289" comment="java-1_8_0-openjdk-accessibility-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122290" comment="java-1_8_0-openjdk-demo-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122291" comment="java-1_8_0-openjdk-devel-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122292" comment="java-1_8_0-openjdk-headless-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122293" comment="java-1_8_0-openjdk-javadoc-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122294" comment="java-1_8_0-openjdk-src-1.8.0.72-21.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0466</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0466" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java SE, Java SE Embedded, and JRockit components in Oracle Java SE 6u105, 7u91, and 8u66; Java SE Embedded 8u65; and JRockit R28.3.8 allows remote attackers to affect availability via vectors related to JAXP.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122295" comment="java-1_7_0-openjdk-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122296" comment="java-1_7_0-openjdk-accessibility-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122297" comment="java-1_7_0-openjdk-bootstrap-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122298" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122299" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122300" comment="java-1_7_0-openjdk-demo-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122301" comment="java-1_7_0-openjdk-devel-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122302" comment="java-1_7_0-openjdk-headless-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122303" comment="java-1_7_0-openjdk-javadoc-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122304" comment="java-1_7_0-openjdk-src-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122288" comment="java-1_8_0-openjdk-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122289" comment="java-1_8_0-openjdk-accessibility-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122290" comment="java-1_8_0-openjdk-demo-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122291" comment="java-1_8_0-openjdk-devel-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122292" comment="java-1_8_0-openjdk-headless-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122293" comment="java-1_8_0-openjdk-javadoc-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122294" comment="java-1_8_0-openjdk-src-1.8.0.72-21.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0483</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u105, 7u91, and 8u66; Java SE Embedded 8u65; and JRockit R28.3.8 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.  NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that this is a heap-based buffer overflow in the readImage function, which allows remote attackers to execute arbitrary code via crafted image data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122295" comment="java-1_7_0-openjdk-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122296" comment="java-1_7_0-openjdk-accessibility-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122297" comment="java-1_7_0-openjdk-bootstrap-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122298" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122299" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122300" comment="java-1_7_0-openjdk-demo-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122301" comment="java-1_7_0-openjdk-devel-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122302" comment="java-1_7_0-openjdk-headless-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122303" comment="java-1_7_0-openjdk-javadoc-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122304" comment="java-1_7_0-openjdk-src-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122288" comment="java-1_8_0-openjdk-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122289" comment="java-1_8_0-openjdk-accessibility-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122290" comment="java-1_8_0-openjdk-demo-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122291" comment="java-1_8_0-openjdk-devel-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122292" comment="java-1_8_0-openjdk-headless-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122293" comment="java-1_8_0-openjdk-javadoc-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122294" comment="java-1_8_0-openjdk-src-1.8.0.72-21.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0494</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494" source="CVE"/>
    <description>
    Unspecified vulnerability in the Java SE and Java SE Embedded components in Oracle Java SE 6u105, 7u91, and 8u66 and Java SE Embedded 8u65 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122295" comment="java-1_7_0-openjdk-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122296" comment="java-1_7_0-openjdk-accessibility-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122297" comment="java-1_7_0-openjdk-bootstrap-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122298" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122299" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122300" comment="java-1_7_0-openjdk-demo-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122301" comment="java-1_7_0-openjdk-devel-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122302" comment="java-1_7_0-openjdk-headless-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122303" comment="java-1_7_0-openjdk-javadoc-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122304" comment="java-1_7_0-openjdk-src-1.7.0.95-16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122288" comment="java-1_8_0-openjdk-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122289" comment="java-1_8_0-openjdk-accessibility-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122290" comment="java-1_8_0-openjdk-demo-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122291" comment="java-1_8_0-openjdk-devel-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122292" comment="java-1_8_0-openjdk-headless-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122293" comment="java-1_8_0-openjdk-javadoc-1.8.0.72-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122294" comment="java-1_8_0-openjdk-src-1.8.0.72-21.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0502</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0502" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0502" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.31 and earlier and 5.6.11 and earlier allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122915" comment="libmysql56client18-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122916" comment="libmysql56client18-32bit-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122917" comment="libmysql56client_r18-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122918" comment="libmysql56client_r18-32bit-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122919" comment="mysql-community-server-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122920" comment="mysql-community-server-bench-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122921" comment="mysql-community-server-client-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122922" comment="mysql-community-server-errormessages-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122923" comment="mysql-community-server-test-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122924" comment="mysql-community-server-tools-5.6.28-2.17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0503</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0503" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0503" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and 5.7.9 allows remote authenticated users to affect availability via vectors related to DML, a different vulnerability than CVE-2016-0504.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122915" comment="libmysql56client18-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122916" comment="libmysql56client18-32bit-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122917" comment="libmysql56client_r18-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122918" comment="libmysql56client_r18-32bit-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122919" comment="mysql-community-server-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122920" comment="mysql-community-server-bench-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122921" comment="mysql-community-server-client-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122922" comment="mysql-community-server-errormessages-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122923" comment="mysql-community-server-test-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122924" comment="mysql-community-server-tools-5.6.28-2.17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0504</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0504" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0504" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and 5.7.9 allows remote authenticated users to affect availability via vectors related to DML, a different vulnerability than CVE-2016-0503.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122915" comment="libmysql56client18-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122916" comment="libmysql56client18-32bit-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122917" comment="libmysql56client_r18-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122918" comment="libmysql56client_r18-32bit-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122919" comment="mysql-community-server-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122920" comment="mysql-community-server-bench-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122921" comment="mysql-community-server-client-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122922" comment="mysql-community-server-errormessages-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122923" comment="mysql-community-server-test-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122924" comment="mysql-community-server-tools-5.6.28-2.17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0505</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0505" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Options.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122915" comment="libmysql56client18-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122916" comment="libmysql56client18-32bit-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122917" comment="libmysql56client_r18-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122918" comment="libmysql56client_r18-32bit-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129216" comment="libmysqlclient-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129217" comment="libmysqlclient18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129218" comment="libmysqlclient18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129219" comment="libmysqlclient_r18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129220" comment="libmysqlclient_r18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129221" comment="libmysqld-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129222" comment="libmysqld18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129223" comment="mariadb-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129224" comment="mariadb-bench-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129225" comment="mariadb-client-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129226" comment="mariadb-errormessages-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129227" comment="mariadb-test-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129228" comment="mariadb-tools-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122919" comment="mysql-community-server-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122920" comment="mysql-community-server-bench-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122921" comment="mysql-community-server-client-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122922" comment="mysql-community-server-errormessages-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122923" comment="mysql-community-server-test-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122924" comment="mysql-community-server-tools-5.6.28-2.17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0546</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0546" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client.  NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that these are multiple buffer overflows in the mysqlshow tool that allow remote database servers to have unspecified impact via a long table or database name.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122915" comment="libmysql56client18-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122916" comment="libmysql56client18-32bit-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122917" comment="libmysql56client_r18-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122918" comment="libmysql56client_r18-32bit-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129216" comment="libmysqlclient-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129217" comment="libmysqlclient18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129218" comment="libmysqlclient18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129219" comment="libmysqlclient_r18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129220" comment="libmysqlclient_r18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129221" comment="libmysqld-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129222" comment="libmysqld18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129223" comment="mariadb-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129224" comment="mariadb-bench-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129225" comment="mariadb-client-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129226" comment="mariadb-errormessages-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129227" comment="mariadb-test-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129228" comment="mariadb-tools-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122919" comment="mysql-community-server-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122920" comment="mysql-community-server-bench-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122921" comment="mysql-community-server-client-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122922" comment="mysql-community-server-errormessages-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122923" comment="mysql-community-server-test-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122924" comment="mysql-community-server-tools-5.6.28-2.17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0594</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0594" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0594" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.21 and earlier allows remote authenticated users to affect availability via vectors related to DML.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122915" comment="libmysql56client18-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122916" comment="libmysql56client18-32bit-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122917" comment="libmysql56client_r18-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122918" comment="libmysql56client_r18-32bit-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122919" comment="mysql-community-server-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122920" comment="mysql-community-server-bench-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122921" comment="mysql-community-server-client-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122922" comment="mysql-community-server-errormessages-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122923" comment="mysql-community-server-test-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122924" comment="mysql-community-server-tools-5.6.28-2.17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0595</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0595" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0595" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier allows remote authenticated users to affect availability via vectors related to DML.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122915" comment="libmysql56client18-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122916" comment="libmysql56client18-32bit-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122917" comment="libmysql56client_r18-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122918" comment="libmysql56client_r18-32bit-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122919" comment="mysql-community-server-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122920" comment="mysql-community-server-bench-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122921" comment="mysql-community-server-client-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122922" comment="mysql-community-server-errormessages-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122923" comment="mysql-community-server-test-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122924" comment="mysql-community-server-tools-5.6.28-2.17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0596</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0596" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and 5.6.27 and earlier and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to DML.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122915" comment="libmysql56client18-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122916" comment="libmysql56client18-32bit-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122917" comment="libmysql56client_r18-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122918" comment="libmysql56client_r18-32bit-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129216" comment="libmysqlclient-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129217" comment="libmysqlclient18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129218" comment="libmysqlclient18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129219" comment="libmysqlclient_r18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129220" comment="libmysqlclient_r18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129221" comment="libmysqld-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129222" comment="libmysqld18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129223" comment="mariadb-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129224" comment="mariadb-bench-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129225" comment="mariadb-client-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129226" comment="mariadb-errormessages-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129227" comment="mariadb-test-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129228" comment="mariadb-tools-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122919" comment="mysql-community-server-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122920" comment="mysql-community-server-bench-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122921" comment="mysql-community-server-client-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122922" comment="mysql-community-server-errormessages-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122923" comment="mysql-community-server-test-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122924" comment="mysql-community-server-tools-5.6.28-2.17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0597</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0597" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122915" comment="libmysql56client18-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122916" comment="libmysql56client18-32bit-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122917" comment="libmysql56client_r18-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122918" comment="libmysql56client_r18-32bit-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129216" comment="libmysqlclient-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129217" comment="libmysqlclient18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129218" comment="libmysqlclient18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129219" comment="libmysqlclient_r18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129220" comment="libmysqlclient_r18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129221" comment="libmysqld-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129222" comment="libmysqld18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129223" comment="mariadb-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129224" comment="mariadb-bench-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129225" comment="mariadb-client-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129226" comment="mariadb-errormessages-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129227" comment="mariadb-test-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129228" comment="mariadb-tools-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122919" comment="mysql-community-server-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122920" comment="mysql-community-server-bench-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122921" comment="mysql-community-server-client-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122922" comment="mysql-community-server-errormessages-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122923" comment="mysql-community-server-test-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122924" comment="mysql-community-server-tools-5.6.28-2.17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0598</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0598" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to DML.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122915" comment="libmysql56client18-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122916" comment="libmysql56client18-32bit-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122917" comment="libmysql56client_r18-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122918" comment="libmysql56client_r18-32bit-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129216" comment="libmysqlclient-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129217" comment="libmysqlclient18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129218" comment="libmysqlclient18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129219" comment="libmysqlclient_r18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129220" comment="libmysqlclient_r18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129221" comment="libmysqld-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129222" comment="libmysqld18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129223" comment="mariadb-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129224" comment="mariadb-bench-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129225" comment="mariadb-client-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129226" comment="mariadb-errormessages-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129227" comment="mariadb-test-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129228" comment="mariadb-tools-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122919" comment="mysql-community-server-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122920" comment="mysql-community-server-bench-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122921" comment="mysql-community-server-client-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122922" comment="mysql-community-server-errormessages-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122923" comment="mysql-community-server-test-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122924" comment="mysql-community-server-tools-5.6.28-2.17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0600</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0600" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122915" comment="libmysql56client18-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122916" comment="libmysql56client18-32bit-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122917" comment="libmysql56client_r18-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122918" comment="libmysql56client_r18-32bit-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129216" comment="libmysqlclient-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129217" comment="libmysqlclient18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129218" comment="libmysqlclient18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129219" comment="libmysqlclient_r18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129220" comment="libmysqlclient_r18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129221" comment="libmysqld-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129222" comment="libmysqld18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129223" comment="mariadb-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129224" comment="mariadb-bench-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129225" comment="mariadb-client-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129226" comment="mariadb-errormessages-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129227" comment="mariadb-test-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129228" comment="mariadb-tools-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122919" comment="mysql-community-server-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122920" comment="mysql-community-server-bench-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122921" comment="mysql-community-server-client-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122922" comment="mysql-community-server-errormessages-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122923" comment="mysql-community-server-test-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122924" comment="mysql-community-server-tools-5.6.28-2.17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0605</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0605" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0605" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.26 and earlier allows remote authenticated users to affect availability via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122915" comment="libmysql56client18-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122916" comment="libmysql56client18-32bit-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122917" comment="libmysql56client_r18-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122918" comment="libmysql56client_r18-32bit-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122919" comment="mysql-community-server-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122920" comment="mysql-community-server-bench-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122921" comment="mysql-community-server-client-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122922" comment="mysql-community-server-errormessages-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122923" comment="mysql-community-server-test-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122924" comment="mysql-community-server-tools-5.6.28-2.17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0606</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0606" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect integrity via unknown vectors related to encryption.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122915" comment="libmysql56client18-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122916" comment="libmysql56client18-32bit-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122917" comment="libmysql56client_r18-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122918" comment="libmysql56client_r18-32bit-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129216" comment="libmysqlclient-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129217" comment="libmysqlclient18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129218" comment="libmysqlclient18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129219" comment="libmysqlclient_r18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129220" comment="libmysqlclient_r18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129221" comment="libmysqld-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129222" comment="libmysqld18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129223" comment="mariadb-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129224" comment="mariadb-bench-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129225" comment="mariadb-client-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129226" comment="mariadb-errormessages-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129227" comment="mariadb-test-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129228" comment="mariadb-tools-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122919" comment="mysql-community-server-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122920" comment="mysql-community-server-bench-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122921" comment="mysql-community-server-client-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122922" comment="mysql-community-server-errormessages-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122923" comment="mysql-community-server-test-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122924" comment="mysql-community-server-tools-5.6.28-2.17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0607</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0607" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0607" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to replication.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122915" comment="libmysql56client18-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122916" comment="libmysql56client18-32bit-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122917" comment="libmysql56client_r18-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122918" comment="libmysql56client_r18-32bit-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122919" comment="mysql-community-server-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122920" comment="mysql-community-server-bench-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122921" comment="mysql-community-server-client-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122922" comment="mysql-community-server-errormessages-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122923" comment="mysql-community-server-test-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122924" comment="mysql-community-server-tools-5.6.28-2.17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0608</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0608" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to UDF.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122915" comment="libmysql56client18-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122916" comment="libmysql56client18-32bit-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122917" comment="libmysql56client_r18-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122918" comment="libmysql56client_r18-32bit-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129216" comment="libmysqlclient-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129217" comment="libmysqlclient18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129218" comment="libmysqlclient18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129219" comment="libmysqlclient_r18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129220" comment="libmysqlclient_r18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129221" comment="libmysqld-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129222" comment="libmysqld18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129223" comment="mariadb-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129224" comment="mariadb-bench-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129225" comment="mariadb-client-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129226" comment="mariadb-errormessages-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129227" comment="mariadb-test-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129228" comment="mariadb-tools-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122919" comment="mysql-community-server-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122920" comment="mysql-community-server-bench-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122921" comment="mysql-community-server-client-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122922" comment="mysql-community-server-errormessages-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122923" comment="mysql-community-server-test-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122924" comment="mysql-community-server-tools-5.6.28-2.17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0609</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0609" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to privileges.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122915" comment="libmysql56client18-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122916" comment="libmysql56client18-32bit-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122917" comment="libmysql56client_r18-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122918" comment="libmysql56client_r18-32bit-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129216" comment="libmysqlclient-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129217" comment="libmysqlclient18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129218" comment="libmysqlclient18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129219" comment="libmysqlclient_r18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129220" comment="libmysqlclient_r18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129221" comment="libmysqld-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129222" comment="libmysqld18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129223" comment="mariadb-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129224" comment="mariadb-bench-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129225" comment="mariadb-client-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129226" comment="mariadb-errormessages-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129227" comment="mariadb-test-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129228" comment="mariadb-tools-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122919" comment="mysql-community-server-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122920" comment="mysql-community-server-bench-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122921" comment="mysql-community-server-client-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122922" comment="mysql-community-server-errormessages-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122923" comment="mysql-community-server-test-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122924" comment="mysql-community-server-tools-5.6.28-2.17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0610</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0610" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0610" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and MariaDB before 10.0.22 and 10.1.x before 10.1.9 allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122915" comment="libmysql56client18-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122916" comment="libmysql56client18-32bit-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122917" comment="libmysql56client_r18-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122918" comment="libmysql56client_r18-32bit-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122919" comment="mysql-community-server-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122920" comment="mysql-community-server-bench-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122921" comment="mysql-community-server-client-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122922" comment="mysql-community-server-errormessages-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122923" comment="mysql-community-server-test-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122924" comment="mysql-community-server-tools-5.6.28-2.17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0611</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0611" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0611" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and 5.7.9 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122915" comment="libmysql56client18-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122916" comment="libmysql56client18-32bit-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122917" comment="libmysql56client_r18-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122918" comment="libmysql56client_r18-32bit-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122919" comment="mysql-community-server-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122920" comment="mysql-community-server-bench-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122921" comment="mysql-community-server-client-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122922" comment="mysql-community-server-errormessages-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122923" comment="mysql-community-server-test-5.6.28-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122924" comment="mysql-community-server-tools-5.6.28-2.17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0616</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0616" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129216" comment="libmysqlclient-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129217" comment="libmysqlclient18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129218" comment="libmysqlclient18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129219" comment="libmysqlclient_r18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129220" comment="libmysqlclient_r18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129221" comment="libmysqld-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129222" comment="libmysqld18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129223" comment="mariadb-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129224" comment="mariadb-bench-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129225" comment="mariadb-client-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129226" comment="mariadb-errormessages-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129227" comment="mariadb-test-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129228" comment="mariadb-tools-10.0.25-2.24.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0634</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0634" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0634" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135243" comment="bash-4.2-75.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135244" comment="bash-devel-4.2-75.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135245" comment="bash-doc-4.2-75.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135246" comment="bash-lang-4.2-75.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135247" comment="bash-loadables-4.2-75.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135248" comment="libreadline6-6.2-75.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135249" comment="libreadline6-32bit-6.2-75.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135250" comment="readline-devel-6.2-75.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135251" comment="readline-devel-32bit-6.2-75.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135252" comment="readline-doc-6.2-75.5.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0636</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0636" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u97, 8u73, and 8u74 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to the Hotspot sub-component.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126000" comment="java-1_7_0-openjdk-1.7.0.99-19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126001" comment="java-1_7_0-openjdk-accessibility-1.7.0.99-19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126002" comment="java-1_7_0-openjdk-bootstrap-1.7.0.99-19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126003" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.99-19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126004" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.99-19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126005" comment="java-1_7_0-openjdk-demo-1.7.0.99-19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126006" comment="java-1_7_0-openjdk-devel-1.7.0.99-19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126007" comment="java-1_7_0-openjdk-headless-1.7.0.99-19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126008" comment="java-1_7_0-openjdk-javadoc-1.7.0.99-19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126009" comment="java-1_7_0-openjdk-src-1.7.0.99-19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126010" comment="java-1_8_0-openjdk-1.8.0.77-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126011" comment="java-1_8_0-openjdk-accessibility-1.8.0.77-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126012" comment="java-1_8_0-openjdk-demo-1.8.0.77-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126013" comment="java-1_8_0-openjdk-devel-1.8.0.77-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126014" comment="java-1_8_0-openjdk-headless-1.8.0.77-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126015" comment="java-1_8_0-openjdk-javadoc-1.8.0.77-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126016" comment="java-1_8_0-openjdk-src-1.8.0.77-24.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0639</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0639" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0639" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.29 and earlier and 5.7.11 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Pluggable Authentication.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127814" comment="libmysql56client18-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127815" comment="libmysql56client18-32bit-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127816" comment="libmysql56client_r18-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127817" comment="libmysql56client_r18-32bit-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127818" comment="mysql-community-server-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127819" comment="mysql-community-server-bench-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127820" comment="mysql-community-server-client-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127821" comment="mysql-community-server-errormessages-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127822" comment="mysql-community-server-test-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127823" comment="mysql-community-server-tools-5.6.30-2.20.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0640</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect integrity and availability via vectors related to DML.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127814" comment="libmysql56client18-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127815" comment="libmysql56client18-32bit-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127816" comment="libmysql56client_r18-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127817" comment="libmysql56client_r18-32bit-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129216" comment="libmysqlclient-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129217" comment="libmysqlclient18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129218" comment="libmysqlclient18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129219" comment="libmysqlclient_r18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129220" comment="libmysqlclient_r18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129221" comment="libmysqld-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129222" comment="libmysqld18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129223" comment="mariadb-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129224" comment="mariadb-bench-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129225" comment="mariadb-client-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129226" comment="mariadb-errormessages-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129227" comment="mariadb-test-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129228" comment="mariadb-tools-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127818" comment="mysql-community-server-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127819" comment="mysql-community-server-bench-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127820" comment="mysql-community-server-client-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127821" comment="mysql-community-server-errormessages-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127822" comment="mysql-community-server-test-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127823" comment="mysql-community-server-tools-5.6.30-2.20.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0641</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0641" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect confidentiality and availability via vectors related to MyISAM.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127814" comment="libmysql56client18-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127815" comment="libmysql56client18-32bit-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127816" comment="libmysql56client_r18-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127817" comment="libmysql56client_r18-32bit-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129216" comment="libmysqlclient-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129217" comment="libmysqlclient18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129218" comment="libmysqlclient18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129219" comment="libmysqlclient_r18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129220" comment="libmysqlclient_r18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129221" comment="libmysqld-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129222" comment="libmysqld18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129223" comment="mariadb-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129224" comment="mariadb-bench-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129225" comment="mariadb-client-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129226" comment="mariadb-errormessages-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129227" comment="mariadb-test-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129228" comment="mariadb-tools-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127818" comment="mysql-community-server-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127819" comment="mysql-community-server-bench-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127820" comment="mysql-community-server-client-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127821" comment="mysql-community-server-errormessages-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127822" comment="mysql-community-server-test-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127823" comment="mysql-community-server-tools-5.6.30-2.20.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0642</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0642" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0642" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier allows local users to affect integrity and availability via vectors related to Federated.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127814" comment="libmysql56client18-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127815" comment="libmysql56client18-32bit-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127816" comment="libmysql56client_r18-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127817" comment="libmysql56client_r18-32bit-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129216" comment="libmysqlclient-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129217" comment="libmysqlclient18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129218" comment="libmysqlclient18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129219" comment="libmysqlclient_r18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129220" comment="libmysqlclient_r18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129221" comment="libmysqld-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129222" comment="libmysqld18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129223" comment="mariadb-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129224" comment="mariadb-bench-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129225" comment="mariadb-client-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129226" comment="mariadb-errormessages-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129227" comment="mariadb-test-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129228" comment="mariadb-tools-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127818" comment="mysql-community-server-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127819" comment="mysql-community-server-bench-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127820" comment="mysql-community-server-client-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127821" comment="mysql-community-server-errormessages-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127822" comment="mysql-community-server-test-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127823" comment="mysql-community-server-tools-5.6.30-2.20.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0643</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0643" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect confidentiality via vectors related to DML.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127814" comment="libmysql56client18-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127815" comment="libmysql56client18-32bit-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127816" comment="libmysql56client_r18-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127817" comment="libmysql56client_r18-32bit-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129216" comment="libmysqlclient-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129217" comment="libmysqlclient18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129218" comment="libmysqlclient18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129219" comment="libmysqlclient_r18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129220" comment="libmysqlclient_r18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129221" comment="libmysqld-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129222" comment="libmysqld18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129223" comment="mariadb-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129224" comment="mariadb-bench-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129225" comment="mariadb-client-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129226" comment="mariadb-errormessages-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129227" comment="mariadb-test-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129228" comment="mariadb-tools-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127818" comment="mysql-community-server-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127819" comment="mysql-community-server-bench-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127820" comment="mysql-community-server-client-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127821" comment="mysql-community-server-errormessages-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127822" comment="mysql-community-server-test-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127823" comment="mysql-community-server-tools-5.6.30-2.20.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0644</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0644" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to DDL.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127814" comment="libmysql56client18-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127815" comment="libmysql56client18-32bit-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127816" comment="libmysql56client_r18-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127817" comment="libmysql56client_r18-32bit-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129216" comment="libmysqlclient-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129217" comment="libmysqlclient18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129218" comment="libmysqlclient18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129219" comment="libmysqlclient_r18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129220" comment="libmysqlclient_r18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129221" comment="libmysqld-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129222" comment="libmysqld18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129223" comment="mariadb-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129224" comment="mariadb-bench-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129225" comment="mariadb-client-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129226" comment="mariadb-errormessages-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129227" comment="mariadb-test-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129228" comment="mariadb-tools-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127818" comment="mysql-community-server-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127819" comment="mysql-community-server-bench-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127820" comment="mysql-community-server-client-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127821" comment="mysql-community-server-errormessages-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127822" comment="mysql-community-server-test-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127823" comment="mysql-community-server-tools-5.6.30-2.20.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0646</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0646" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to DML.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127814" comment="libmysql56client18-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127815" comment="libmysql56client18-32bit-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127816" comment="libmysql56client_r18-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127817" comment="libmysql56client_r18-32bit-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129216" comment="libmysqlclient-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129217" comment="libmysqlclient18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129218" comment="libmysqlclient18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129219" comment="libmysqlclient_r18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129220" comment="libmysqlclient_r18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129221" comment="libmysqld-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129222" comment="libmysqld18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129223" comment="mariadb-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129224" comment="mariadb-bench-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129225" comment="mariadb-client-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129226" comment="mariadb-errormessages-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129227" comment="mariadb-test-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129228" comment="mariadb-tools-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127818" comment="mysql-community-server-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127819" comment="mysql-community-server-bench-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127820" comment="mysql-community-server-client-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127821" comment="mysql-community-server-errormessages-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127822" comment="mysql-community-server-test-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127823" comment="mysql-community-server-tools-5.6.30-2.20.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0647</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0647" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect availability via vectors related to FTS.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127814" comment="libmysql56client18-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127815" comment="libmysql56client18-32bit-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127816" comment="libmysql56client_r18-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127817" comment="libmysql56client_r18-32bit-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129216" comment="libmysqlclient-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129217" comment="libmysqlclient18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129218" comment="libmysqlclient18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129219" comment="libmysqlclient_r18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129220" comment="libmysqlclient_r18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129221" comment="libmysqld-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129222" comment="libmysqld18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129223" comment="mariadb-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129224" comment="mariadb-bench-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129225" comment="mariadb-client-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129226" comment="mariadb-errormessages-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129227" comment="mariadb-test-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129228" comment="mariadb-tools-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127818" comment="mysql-community-server-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127819" comment="mysql-community-server-bench-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127820" comment="mysql-community-server-client-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127821" comment="mysql-community-server-errormessages-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127822" comment="mysql-community-server-test-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127823" comment="mysql-community-server-tools-5.6.30-2.20.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0648</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0648" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect availability via vectors related to PS.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127814" comment="libmysql56client18-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127815" comment="libmysql56client18-32bit-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127816" comment="libmysql56client_r18-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127817" comment="libmysql56client_r18-32bit-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129216" comment="libmysqlclient-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129217" comment="libmysqlclient18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129218" comment="libmysqlclient18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129219" comment="libmysqlclient_r18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129220" comment="libmysqlclient_r18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129221" comment="libmysqld-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129222" comment="libmysqld18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129223" comment="mariadb-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129224" comment="mariadb-bench-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129225" comment="mariadb-client-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129226" comment="mariadb-errormessages-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129227" comment="mariadb-test-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129228" comment="mariadb-tools-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127818" comment="mysql-community-server-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127819" comment="mysql-community-server-bench-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127820" comment="mysql-community-server-client-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127821" comment="mysql-community-server-errormessages-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127822" comment="mysql-community-server-test-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127823" comment="mysql-community-server-tools-5.6.30-2.20.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0649</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0649" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to PS.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127814" comment="libmysql56client18-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127815" comment="libmysql56client18-32bit-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127816" comment="libmysql56client_r18-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127817" comment="libmysql56client_r18-32bit-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129216" comment="libmysqlclient-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129217" comment="libmysqlclient18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129218" comment="libmysqlclient18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129219" comment="libmysqlclient_r18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129220" comment="libmysqlclient_r18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129221" comment="libmysqld-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129222" comment="libmysqld18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129223" comment="mariadb-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129224" comment="mariadb-bench-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129225" comment="mariadb-client-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129226" comment="mariadb-errormessages-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129227" comment="mariadb-test-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129228" comment="mariadb-tools-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127818" comment="mysql-community-server-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127819" comment="mysql-community-server-bench-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127820" comment="mysql-community-server-client-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127821" comment="mysql-community-server-errormessages-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127822" comment="mysql-community-server-test-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127823" comment="mysql-community-server-tools-5.6.30-2.20.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0650</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0650" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48, 10.0.x before 10.0.24, and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to Replication.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127814" comment="libmysql56client18-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127815" comment="libmysql56client18-32bit-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127816" comment="libmysql56client_r18-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127817" comment="libmysql56client_r18-32bit-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129216" comment="libmysqlclient-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129217" comment="libmysqlclient18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129218" comment="libmysqlclient18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129219" comment="libmysqlclient_r18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129220" comment="libmysqlclient_r18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129221" comment="libmysqld-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129222" comment="libmysqld18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129223" comment="mariadb-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129224" comment="mariadb-bench-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129225" comment="mariadb-client-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129226" comment="mariadb-errormessages-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129227" comment="mariadb-test-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129228" comment="mariadb-tools-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127818" comment="mysql-community-server-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127819" comment="mysql-community-server-bench-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127820" comment="mysql-community-server-client-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127821" comment="mysql-community-server-errormessages-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127822" comment="mysql-community-server-test-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127823" comment="mysql-community-server-tools-5.6.30-2.20.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0651</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0651" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0651" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier allows local users to affect availability via vectors related to Optimizer.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129216" comment="libmysqlclient-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129217" comment="libmysqlclient18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129218" comment="libmysqlclient18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129219" comment="libmysqlclient_r18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129220" comment="libmysqlclient_r18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129221" comment="libmysqld-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129222" comment="libmysqld18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129223" comment="mariadb-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129224" comment="mariadb-bench-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129225" comment="mariadb-client-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129226" comment="mariadb-errormessages-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129227" comment="mariadb-test-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129228" comment="mariadb-tools-10.0.25-2.24.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0655</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0655" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0655" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.29 and earlier and 5.7.11 and earlier and MariaDB 10.0.x before 10.0.25 and 10.1.x before 10.1.14 allows local users to affect availability via vectors related to InnoDB.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127814" comment="libmysql56client18-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127815" comment="libmysql56client18-32bit-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127816" comment="libmysql56client_r18-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127817" comment="libmysql56client_r18-32bit-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129216" comment="libmysqlclient-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129217" comment="libmysqlclient18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129218" comment="libmysqlclient18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129219" comment="libmysqlclient_r18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129220" comment="libmysqlclient_r18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129221" comment="libmysqld-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129222" comment="libmysqld18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129223" comment="mariadb-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129224" comment="mariadb-bench-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129225" comment="mariadb-client-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129226" comment="mariadb-errormessages-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129227" comment="mariadb-test-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129228" comment="mariadb-tools-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127818" comment="mysql-community-server-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127819" comment="mysql-community-server-bench-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127820" comment="mysql-community-server-client-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127821" comment="mysql-community-server-errormessages-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127822" comment="mysql-community-server-test-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127823" comment="mysql-community-server-tools-5.6.30-2.20.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0661</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0661" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0661" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.28 and earlier and 5.7.10 and earlier allows local users to affect availability via vectors related to Options.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127814" comment="libmysql56client18-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127815" comment="libmysql56client18-32bit-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127816" comment="libmysql56client_r18-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127817" comment="libmysql56client_r18-32bit-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127818" comment="mysql-community-server-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127819" comment="mysql-community-server-bench-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127820" comment="mysql-community-server-client-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127821" comment="mysql-community-server-errormessages-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127822" comment="mysql-community-server-test-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127823" comment="mysql-community-server-tools-5.6.30-2.20.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0665</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0665" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0665" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.28 and earlier and 5.7.10 and earlier allows local users to affect availability via vectors related to Security: Encryption.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127814" comment="libmysql56client18-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127815" comment="libmysql56client18-32bit-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127816" comment="libmysql56client_r18-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127817" comment="libmysql56client_r18-32bit-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127818" comment="mysql-community-server-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127819" comment="mysql-community-server-bench-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127820" comment="mysql-community-server-client-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127821" comment="mysql-community-server-errormessages-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127822" comment="mysql-community-server-test-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127823" comment="mysql-community-server-tools-5.6.30-2.20.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0666</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0666" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49, 10.0.x before 10.0.25, and 10.1.x before 10.1.14 allows local users to affect availability via vectors related to Security: Privileges.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127814" comment="libmysql56client18-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127815" comment="libmysql56client18-32bit-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127816" comment="libmysql56client_r18-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127817" comment="libmysql56client_r18-32bit-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129216" comment="libmysqlclient-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129217" comment="libmysqlclient18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129218" comment="libmysqlclient18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129219" comment="libmysqlclient_r18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129220" comment="libmysqlclient_r18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129221" comment="libmysqld-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129222" comment="libmysqld18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129223" comment="mariadb-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129224" comment="mariadb-bench-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129225" comment="mariadb-client-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129226" comment="mariadb-errormessages-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129227" comment="mariadb-test-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129228" comment="mariadb-tools-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127818" comment="mysql-community-server-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127819" comment="mysql-community-server-bench-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127820" comment="mysql-community-server-client-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127821" comment="mysql-community-server-errormessages-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127822" comment="mysql-community-server-test-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127823" comment="mysql-community-server-tools-5.6.30-2.20.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0668</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0668" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0668" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.28 and earlier and 5.7.10 and earlier and MariaDB 10.0.x before 10.0.24 and 10.1.x before 10.1.12 allows local users to affect availability via vectors related to InnoDB.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127814" comment="libmysql56client18-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127815" comment="libmysql56client18-32bit-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127816" comment="libmysql56client_r18-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127817" comment="libmysql56client_r18-32bit-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129216" comment="libmysqlclient-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129217" comment="libmysqlclient18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129218" comment="libmysqlclient18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129219" comment="libmysqlclient_r18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129220" comment="libmysqlclient_r18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129221" comment="libmysqld-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129222" comment="libmysqld18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129223" comment="mariadb-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129224" comment="mariadb-bench-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129225" comment="mariadb-client-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129226" comment="mariadb-errormessages-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129227" comment="mariadb-test-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129228" comment="mariadb-tools-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127818" comment="mysql-community-server-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127819" comment="mysql-community-server-bench-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127820" comment="mysql-community-server-client-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127821" comment="mysql-community-server-errormessages-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127822" comment="mysql-community-server-test-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127823" comment="mysql-community-server-tools-5.6.30-2.20.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0678</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0678" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0678" source="CVE"/>
    <description>
    Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 5.0.18 allows local users to affect confidentiality, integrity, and availability via vectors related to Core.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128362" comment="python-virtualbox-5.0.20-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128363" comment="virtualbox-5.0.20-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128364" comment="virtualbox-devel-5.0.20-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128365" comment="virtualbox-guest-desktop-icons-5.0.20-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128366" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_35-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128367" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_35-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128368" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_35-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128369" comment="virtualbox-guest-tools-5.0.20-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128370" comment="virtualbox-guest-x11-5.0.20-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128371" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_35-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128372" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_35-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128373" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_35-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128374" comment="virtualbox-host-source-5.0.20-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128375" comment="virtualbox-qt-5.0.20-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128376" comment="virtualbox-websrv-5.0.20-46.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0686</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0686" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77 and Java SE Embedded 8u77 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Serialization.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127177" comment="java-1_7_0-openjdk-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127178" comment="java-1_7_0-openjdk-accessibility-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127179" comment="java-1_7_0-openjdk-bootstrap-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127180" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127181" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127182" comment="java-1_7_0-openjdk-demo-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127183" comment="java-1_7_0-openjdk-devel-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127184" comment="java-1_7_0-openjdk-headless-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127185" comment="java-1_7_0-openjdk-javadoc-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127186" comment="java-1_7_0-openjdk-src-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127187" comment="java-1_8_0-openjdk-1.8.0.91-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127188" comment="java-1_8_0-openjdk-accessibility-1.8.0.91-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127189" comment="java-1_8_0-openjdk-demo-1.8.0.91-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127190" comment="java-1_8_0-openjdk-devel-1.8.0.91-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127191" comment="java-1_8_0-openjdk-headless-1.8.0.91-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127192" comment="java-1_8_0-openjdk-javadoc-1.8.0.91-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127193" comment="java-1_8_0-openjdk-src-1.8.0.91-27.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0687</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0687" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77 and Java SE Embedded 8u77 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to the Hotspot sub-component.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127177" comment="java-1_7_0-openjdk-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127178" comment="java-1_7_0-openjdk-accessibility-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127179" comment="java-1_7_0-openjdk-bootstrap-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127180" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127181" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127182" comment="java-1_7_0-openjdk-demo-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127183" comment="java-1_7_0-openjdk-devel-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127184" comment="java-1_7_0-openjdk-headless-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127185" comment="java-1_7_0-openjdk-javadoc-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127186" comment="java-1_7_0-openjdk-src-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127187" comment="java-1_8_0-openjdk-1.8.0.91-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127188" comment="java-1_8_0-openjdk-accessibility-1.8.0.91-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127189" comment="java-1_8_0-openjdk-demo-1.8.0.91-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127190" comment="java-1_8_0-openjdk-devel-1.8.0.91-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127191" comment="java-1_8_0-openjdk-headless-1.8.0.91-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127192" comment="java-1_8_0-openjdk-javadoc-1.8.0.91-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127193" comment="java-1_8_0-openjdk-src-1.8.0.91-27.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0695</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0695" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77; Java SE Embedded 8u77; and JRockit R28.3.9 allows remote attackers to affect confidentiality via vectors related to Security.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127177" comment="java-1_7_0-openjdk-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127178" comment="java-1_7_0-openjdk-accessibility-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127179" comment="java-1_7_0-openjdk-bootstrap-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127180" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127181" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127182" comment="java-1_7_0-openjdk-demo-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127183" comment="java-1_7_0-openjdk-devel-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127184" comment="java-1_7_0-openjdk-headless-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127185" comment="java-1_7_0-openjdk-javadoc-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127186" comment="java-1_7_0-openjdk-src-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127187" comment="java-1_8_0-openjdk-1.8.0.91-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127188" comment="java-1_8_0-openjdk-accessibility-1.8.0.91-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127189" comment="java-1_8_0-openjdk-demo-1.8.0.91-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127190" comment="java-1_8_0-openjdk-devel-1.8.0.91-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127191" comment="java-1_8_0-openjdk-headless-1.8.0.91-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127192" comment="java-1_8_0-openjdk-javadoc-1.8.0.91-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127193" comment="java-1_8_0-openjdk-src-1.8.0.91-27.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0702</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0702" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0702" source="CVE"/>
    <description>
    The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a "CacheBleed" attack.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124389" comment="libopenssl-devel-1.0.1k-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124390" comment="libopenssl-devel-32bit-1.0.1k-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127250" comment="libopenssl0_9_8-0.9.8zh-9.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127251" comment="libopenssl0_9_8-32bit-0.9.8zh-9.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124391" comment="libopenssl1_0_0-1.0.1k-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124392" comment="libopenssl1_0_0-32bit-1.0.1k-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124393" comment="libopenssl1_0_0-hmac-1.0.1k-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124394" comment="libopenssl1_0_0-hmac-32bit-1.0.1k-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128880" comment="nodejs-4.4.5-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128881" comment="nodejs-devel-4.4.5-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128872" comment="nodejs-doc-4.4.5-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124395" comment="openssl-1.0.1k-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124396" comment="openssl-doc-1.0.1k-2.33.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0705</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0705" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0705" source="CVE"/>
    <description>
    Double free vulnerability in the dsa_priv_decode function in crypto/dsa/dsa_ameth.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a malformed DSA private key.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127814" comment="libmysql56client18-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127815" comment="libmysql56client18-32bit-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127816" comment="libmysql56client_r18-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127817" comment="libmysql56client_r18-32bit-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124389" comment="libopenssl-devel-1.0.1k-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124390" comment="libopenssl-devel-32bit-1.0.1k-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124391" comment="libopenssl1_0_0-1.0.1k-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124392" comment="libopenssl1_0_0-32bit-1.0.1k-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124393" comment="libopenssl1_0_0-hmac-1.0.1k-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124394" comment="libopenssl1_0_0-hmac-32bit-1.0.1k-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127818" comment="mysql-community-server-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127819" comment="mysql-community-server-bench-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127820" comment="mysql-community-server-client-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127821" comment="mysql-community-server-errormessages-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127822" comment="mysql-community-server-test-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127823" comment="mysql-community-server-tools-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128880" comment="nodejs-4.4.5-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128881" comment="nodejs-devel-4.4.5-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128872" comment="nodejs-doc-4.4.5-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124395" comment="openssl-1.0.1k-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124396" comment="openssl-doc-1.0.1k-2.33.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0718</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0718" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0718" source="CVE"/>
    <description>
    Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130814" comment="MozillaFirefox-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130815" comment="MozillaFirefox-branding-upstream-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130816" comment="MozillaFirefox-buildsymbols-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130817" comment="MozillaFirefox-devel-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130818" comment="MozillaFirefox-translations-common-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130819" comment="MozillaFirefox-translations-other-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128279" comment="expat-2.1.0-14.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128280" comment="libexpat-devel-2.1.0-14.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128281" comment="libexpat-devel-32bit-2.1.0-14.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128282" comment="libexpat1-2.1.0-14.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128283" comment="libexpat1-32bit-2.1.0-14.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130820" comment="libfreebl3-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130821" comment="libfreebl3-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130822" comment="libsoftokn3-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130823" comment="libsoftokn3-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130824" comment="mozilla-nss-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130825" comment="mozilla-nss-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130826" comment="mozilla-nss-certs-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130827" comment="mozilla-nss-certs-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130828" comment="mozilla-nss-devel-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130829" comment="mozilla-nss-sysinit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130830" comment="mozilla-nss-sysinit-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130831" comment="mozilla-nss-tools-3.24-37.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0723</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0723" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0723" source="CVE"/>
    <description>
    Race condition in the tty_ioctl function in drivers/tty/tty_io.c in the Linux kernel through 4.4.1 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free and system crash) by making a TIOCGETD ioctl call during processing of a TIOCSETD ioctl call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123530" comment="bbswitch-0.8-3.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123531" comment="bbswitch-kmp-default-0.8_k3.16.7_35-3.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123532" comment="bbswitch-kmp-desktop-0.8_k3.16.7_35-3.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123533" comment="bbswitch-kmp-pae-0.8_k3.16.7_35-3.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123534" comment="bbswitch-kmp-xen-0.8_k3.16.7_35-3.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123535" comment="cloop-2.639-14.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123536" comment="cloop-kmp-default-2.639_k3.16.7_35-14.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123537" comment="cloop-kmp-desktop-2.639_k3.16.7_35-14.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123538" comment="cloop-kmp-pae-2.639_k3.16.7_35-14.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123539" comment="cloop-kmp-xen-2.639_k3.16.7_35-14.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123540" comment="crash-7.0.8-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123541" comment="crash-devel-7.0.8-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123542" comment="crash-doc-7.0.8-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123543" comment="crash-eppic-7.0.8-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123544" comment="crash-gcore-7.0.8-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123545" comment="crash-kmp-default-7.0.8_k3.16.7_35-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123546" comment="crash-kmp-desktop-7.0.8_k3.16.7_35-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123547" comment="crash-kmp-pae-7.0.8_k3.16.7_35-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123548" comment="crash-kmp-xen-7.0.8_k3.16.7_35-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123549" comment="hdjmod-1.28-18.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123550" comment="hdjmod-kmp-default-1.28_k3.16.7_35-18.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123551" comment="hdjmod-kmp-desktop-1.28_k3.16.7_35-18.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123552" comment="hdjmod-kmp-pae-1.28_k3.16.7_35-18.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123553" comment="hdjmod-kmp-xen-1.28_k3.16.7_35-18.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123554" comment="ipset-6.23-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123555" comment="ipset-devel-6.23-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123556" comment="ipset-kmp-default-6.23_k3.16.7_35-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123557" comment="ipset-kmp-desktop-6.23_k3.16.7_35-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123558" comment="ipset-kmp-pae-6.23_k3.16.7_35-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123559" comment="ipset-kmp-xen-6.23_k3.16.7_35-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123560" comment="kernel-debug-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123561" comment="kernel-debug-base-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123562" comment="kernel-debug-devel-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123563" comment="kernel-default-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123564" comment="kernel-default-base-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123565" comment="kernel-default-devel-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123566" comment="kernel-desktop-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123567" comment="kernel-desktop-base-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123568" comment="kernel-desktop-devel-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123569" comment="kernel-devel-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123570" comment="kernel-docs-3.16.7-35.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123571" comment="kernel-ec2-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123572" comment="kernel-ec2-base-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123573" comment="kernel-ec2-devel-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123574" comment="kernel-macros-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123575" comment="kernel-obs-build-3.16.7-35.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123576" comment="kernel-obs-qa-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123577" comment="kernel-obs-qa-xen-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123578" comment="kernel-pae-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123579" comment="kernel-pae-base-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123580" comment="kernel-pae-devel-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123581" comment="kernel-source-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123582" comment="kernel-source-vanilla-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123583" comment="kernel-syms-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123584" comment="kernel-vanilla-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123585" comment="kernel-vanilla-devel-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123586" comment="kernel-xen-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123587" comment="kernel-xen-base-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123588" comment="kernel-xen-devel-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123589" comment="libipset3-6.23-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123590" comment="pcfclock-0.44-260.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123591" comment="pcfclock-kmp-default-0.44_k3.16.7_35-260.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123592" comment="pcfclock-kmp-desktop-0.44_k3.16.7_35-260.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123593" comment="pcfclock-kmp-pae-0.44_k3.16.7_35-260.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123594" comment="python-virtualbox-4.3.36-43.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123595" comment="vhba-kmp-20140629-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123596" comment="vhba-kmp-default-20140629_k3.16.7_35-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123597" comment="vhba-kmp-desktop-20140629_k3.16.7_35-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123598" comment="vhba-kmp-pae-20140629_k3.16.7_35-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123599" comment="vhba-kmp-xen-20140629_k3.16.7_35-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123600" comment="virtualbox-4.3.36-43.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123601" comment="virtualbox-devel-4.3.36-43.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123602" comment="virtualbox-guest-desktop-icons-4.3.36-43.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123603" comment="virtualbox-guest-kmp-default-4.3.36_k3.16.7_35-43.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123604" comment="virtualbox-guest-kmp-desktop-4.3.36_k3.16.7_35-43.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123605" comment="virtualbox-guest-kmp-pae-4.3.36_k3.16.7_35-43.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123606" comment="virtualbox-guest-tools-4.3.36-43.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123607" comment="virtualbox-guest-x11-4.3.36-43.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123608" comment="virtualbox-host-kmp-default-4.3.36_k3.16.7_35-43.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123609" comment="virtualbox-host-kmp-desktop-4.3.36_k3.16.7_35-43.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123610" comment="virtualbox-host-kmp-pae-4.3.36_k3.16.7_35-43.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123611" comment="virtualbox-host-source-4.3.36-43.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123612" comment="virtualbox-qt-4.3.36-43.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123613" comment="virtualbox-websrv-4.3.36-43.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123614" comment="xen-4.4.3_08-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123615" comment="xen-devel-4.4.3_08-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123616" comment="xen-doc-html-4.4.3_08-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123617" comment="xen-kmp-default-4.4.3_08_k3.16.7_35-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123618" comment="xen-kmp-desktop-4.4.3_08_k3.16.7_35-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123619" comment="xen-libs-4.4.3_08-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123620" comment="xen-libs-32bit-4.4.3_08-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123621" comment="xen-tools-4.4.3_08-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123622" comment="xen-tools-domU-4.4.3_08-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123623" comment="xtables-addons-2.6-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123624" comment="xtables-addons-kmp-default-2.6_k3.16.7_35-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123625" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_35-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123626" comment="xtables-addons-kmp-pae-2.6_k3.16.7_35-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123627" comment="xtables-addons-kmp-xen-2.6_k3.16.7_35-17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0728</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0728" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0728" source="CVE"/>
    <description>
    The join_session_keyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a denial of service (integer overflow and use-after-free) via crafted keyctl commands.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122787" comment="bbswitch-0.8-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122788" comment="bbswitch-kmp-default-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122789" comment="bbswitch-kmp-desktop-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122790" comment="bbswitch-kmp-pae-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122791" comment="bbswitch-kmp-xen-0.8_k3.16.7_32-3.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122792" comment="cloop-2.639-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122793" comment="cloop-kmp-default-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122794" comment="cloop-kmp-desktop-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122795" comment="cloop-kmp-pae-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122796" comment="cloop-kmp-xen-2.639_k3.16.7_32-14.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122797" comment="crash-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122798" comment="crash-devel-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122799" comment="crash-doc-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122800" comment="crash-eppic-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122801" comment="crash-gcore-7.0.8-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122802" comment="crash-kmp-default-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122803" comment="crash-kmp-desktop-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122804" comment="crash-kmp-pae-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122805" comment="crash-kmp-xen-7.0.8_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122806" comment="hdjmod-1.28-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122807" comment="hdjmod-kmp-default-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122808" comment="hdjmod-kmp-desktop-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122809" comment="hdjmod-kmp-pae-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122810" comment="hdjmod-kmp-xen-1.28_k3.16.7_32-18.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122811" comment="ipset-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122812" comment="ipset-devel-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122813" comment="ipset-kmp-default-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122814" comment="ipset-kmp-desktop-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122815" comment="ipset-kmp-pae-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122816" comment="ipset-kmp-xen-6.23_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122817" comment="kernel-debug-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122818" comment="kernel-debug-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122819" comment="kernel-debug-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122820" comment="kernel-default-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122821" comment="kernel-default-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122822" comment="kernel-default-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122823" comment="kernel-desktop-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122824" comment="kernel-desktop-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122825" comment="kernel-desktop-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122826" comment="kernel-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122827" comment="kernel-docs-3.16.7-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122828" comment="kernel-ec2-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122829" comment="kernel-ec2-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122830" comment="kernel-ec2-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122831" comment="kernel-macros-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122832" comment="kernel-obs-build-3.16.7-32.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122833" comment="kernel-obs-qa-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122834" comment="kernel-obs-qa-xen-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122835" comment="kernel-pae-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122836" comment="kernel-pae-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122837" comment="kernel-pae-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122838" comment="kernel-source-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122839" comment="kernel-source-vanilla-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122840" comment="kernel-syms-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122841" comment="kernel-vanilla-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122842" comment="kernel-vanilla-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122843" comment="kernel-xen-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122844" comment="kernel-xen-base-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122845" comment="kernel-xen-devel-3.16.7-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122846" comment="libipset3-6.23-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122847" comment="pcfclock-0.44-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122848" comment="pcfclock-kmp-default-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122849" comment="pcfclock-kmp-desktop-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122850" comment="pcfclock-kmp-pae-0.44_k3.16.7_32-260.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122851" comment="python-virtualbox-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122852" comment="vhba-kmp-20140629-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122853" comment="vhba-kmp-default-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122854" comment="vhba-kmp-desktop-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122855" comment="vhba-kmp-pae-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122856" comment="vhba-kmp-xen-20140629_k3.16.7_32-2.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122857" comment="virtualbox-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122858" comment="virtualbox-devel-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122859" comment="virtualbox-guest-desktop-icons-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122860" comment="virtualbox-guest-kmp-default-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122861" comment="virtualbox-guest-kmp-desktop-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122862" comment="virtualbox-guest-kmp-pae-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122863" comment="virtualbox-guest-tools-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122864" comment="virtualbox-guest-x11-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122865" comment="virtualbox-host-kmp-default-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122866" comment="virtualbox-host-kmp-desktop-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122867" comment="virtualbox-host-kmp-pae-4.3.34_k3.16.7_32-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122868" comment="virtualbox-host-source-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122869" comment="virtualbox-qt-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122870" comment="virtualbox-websrv-4.3.34-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122871" comment="xen-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122872" comment="xen-devel-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122873" comment="xen-doc-html-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122874" comment="xen-kmp-default-4.4.3_08_k3.16.7_32-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122875" comment="xen-kmp-desktop-4.4.3_08_k3.16.7_32-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122876" comment="xen-libs-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122877" comment="xen-libs-32bit-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122878" comment="xen-tools-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122879" comment="xen-tools-domU-4.4.3_08-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122880" comment="xtables-addons-2.6-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122881" comment="xtables-addons-kmp-default-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122882" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122883" comment="xtables-addons-kmp-pae-2.6_k3.16.7_32-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122884" comment="xtables-addons-kmp-xen-2.6_k3.16.7_32-15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0729</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0729" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0729" source="CVE"/>
    <description>
    Multiple buffer overflows in (1) internal/XMLReader.cpp, (2) util/XMLURL.cpp, and (3) util/XMLUri.cpp in the XML Parser library in Apache Xerces-C before 3.1.3 allow remote attackers to cause a denial of service (segmentation fault or memory corruption) or possibly execute arbitrary code via a crafted document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130414" comment="libxerces-c-3_1-3.1.4-13.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130415" comment="libxerces-c-3_1-32bit-3.1.4-13.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130416" comment="libxerces-c-devel-3.1.4-13.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130417" comment="xerces-c-3.1.4-13.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130418" comment="xerces-c-doc-3.1.4-13.9.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0739</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0739" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0739" source="CVE"/>
    <description>
    libssh before 0.7.3 improperly truncates ephemeral secrets generated for the (1) diffie-hellman-group1 and (2) diffie-hellman-group14 key exchange methods to 128 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a "bits/bytes confusion bug."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125353" comment="libssh-0.6.3-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125354" comment="libssh-devel-0.6.3-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125355" comment="libssh-devel-doc-0.6.3-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125356" comment="libssh4-0.6.3-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125357" comment="libssh4-32bit-0.6.3-2.10.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0740</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0740" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0740" source="CVE"/>
    <description>
    Buffer overflow in the ImagingLibTiffDecode function in libImaging/TiffDecode.c in Pillow before 3.1.1 allows remote attackers to overwrite memory via a crafted TIFF file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124775" comment="python-Pillow-2.8.1-3.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124776" comment="python-Pillow-tk-2.8.1-3.6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0749</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0749" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0749" source="CVE"/>
    <description>
    The smartcard interaction in SPICE allows remote attackers to cause a denial of service (QEMU-KVM process crash) or possibly execute arbitrary code via vectors related to connecting to a guest VM, which triggers a heap-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129692" comment="libspice-server-devel-0.12.4-4.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129693" comment="libspice-server1-0.12.4-4.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129694" comment="spice-0.12.4-4.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129695" comment="spice-client-0.12.4-4.12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0751</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0751" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0751" source="CVE"/>
    <description>
    actionpack/lib/action_dispatch/http/mime_type.rb in Action Pack in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 does not properly restrict use of the MIME type cache, which allows remote attackers to cause a denial of service (memory consumption) via a crafted HTTP Accept header.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122899" comment="rubygem-actionpack-3_2-3.2.17-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122900" comment="rubygem-actionpack-3_2-doc-3.2.17-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122901" comment="rubygem-activerecord-3_2-3.2.17-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122902" comment="rubygem-activerecord-3_2-doc-3.2.17-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122903" comment="rubygem-activesupport-3_2-3.2.17-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122904" comment="rubygem-activesupport-3_2-doc-3.2.17-2.6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0752</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0752" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0752" source="CVE"/>
    <description>
    Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122899" comment="rubygem-actionpack-3_2-3.2.17-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122900" comment="rubygem-actionpack-3_2-doc-3.2.17-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122901" comment="rubygem-activerecord-3_2-3.2.17-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122902" comment="rubygem-activerecord-3_2-doc-3.2.17-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122903" comment="rubygem-activesupport-3_2-3.2.17-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122904" comment="rubygem-activesupport-3_2-doc-3.2.17-2.6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0755</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0755" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0755" source="CVE"/>
    <description>
    The ConnectionExists function in lib/url.c in libcurl before 7.47.0 does not properly re-use NTLM-authenticated proxy connections, which might allow remote attackers to authenticate as other users via a request, a similar issue to CVE-2014-0015.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122886" comment="curl-7.42.1-19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122887" comment="libcurl-devel-7.42.1-19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122888" comment="libcurl-devel-32bit-7.42.1-19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122889" comment="libcurl4-7.42.1-19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122890" comment="libcurl4-32bit-7.42.1-19.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0758</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0758" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0758" source="CVE"/>
    <description>
    Integer overflow in lib/asn1_decoder.c in the Linux kernel before 4.6 allows local users to gain privileges via crafted ASN.1 data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0766</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0766" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0766" source="CVE"/>
    <description>
    PostgreSQL before 9.1.20, 9.2.x before 9.2.15, 9.3.x before 9.3.11, 9.4.x before 9.4.6, and 9.5.x before 9.5.1 does not properly restrict access to unspecified custom configuration settings (GUCS) for PL/Java, which allows attackers to gain privileges via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123516" comment="libecpg6-9.3.11-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123517" comment="libecpg6-32bit-9.3.11-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123518" comment="libpq5-9.3.11-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123519" comment="libpq5-32bit-9.3.11-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123520" comment="postgresql93-9.3.11-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123521" comment="postgresql93-contrib-9.3.11-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123522" comment="postgresql93-devel-9.3.11-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123523" comment="postgresql93-docs-9.3.11-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123524" comment="postgresql93-libs-9.3.11-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123525" comment="postgresql93-plperl-9.3.11-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123526" comment="postgresql93-plpython-9.3.11-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123527" comment="postgresql93-pltcl-9.3.11-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123528" comment="postgresql93-server-9.3.11-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123529" comment="postgresql93-test-9.3.11-2.10.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0771</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0771" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0771" source="CVE"/>
    <description>
    The internal DNS server in Samba 4.x before 4.1.23, 4.2.x before 4.2.9, 4.3.x before 4.3.6, and 4.4.x before 4.4.0rc4, when an AD DC is configured, allows remote authenticated users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from process memory by uploading a crafted DNS TXT record.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125050" comment="libdcerpc-atsvc-devel-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125051" comment="libdcerpc-atsvc0-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125052" comment="libdcerpc-atsvc0-32bit-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125053" comment="libdcerpc-binding0-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125054" comment="libdcerpc-binding0-32bit-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125055" comment="libdcerpc-devel-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125056" comment="libdcerpc-samr-devel-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125057" comment="libdcerpc-samr0-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125058" comment="libdcerpc-samr0-32bit-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125059" comment="libdcerpc0-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125060" comment="libdcerpc0-32bit-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125061" comment="libgensec-devel-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125062" comment="libgensec0-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125063" comment="libgensec0-32bit-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125064" comment="libndr-devel-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125065" comment="libndr-krb5pac-devel-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125066" comment="libndr-krb5pac0-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125067" comment="libndr-krb5pac0-32bit-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125068" comment="libndr-nbt-devel-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125069" comment="libndr-nbt0-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125070" comment="libndr-nbt0-32bit-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125071" comment="libndr-standard-devel-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125072" comment="libndr-standard0-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125073" comment="libndr-standard0-32bit-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125074" comment="libndr0-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125075" comment="libndr0-32bit-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125076" comment="libnetapi-devel-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125077" comment="libnetapi0-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125078" comment="libnetapi0-32bit-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125079" comment="libpdb-devel-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125080" comment="libpdb0-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125081" comment="libpdb0-32bit-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125082" comment="libregistry-devel-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125083" comment="libregistry0-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125084" comment="libregistry0-32bit-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125085" comment="libsamba-credentials-devel-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125086" comment="libsamba-credentials0-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125087" comment="libsamba-credentials0-32bit-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125088" comment="libsamba-hostconfig-devel-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125089" comment="libsamba-hostconfig0-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125090" comment="libsamba-hostconfig0-32bit-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125091" comment="libsamba-policy-devel-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125092" comment="libsamba-policy0-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125093" comment="libsamba-policy0-32bit-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125094" comment="libsamba-util-devel-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125095" comment="libsamba-util0-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125096" comment="libsamba-util0-32bit-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125097" comment="libsamdb-devel-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125098" comment="libsamdb0-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125099" comment="libsamdb0-32bit-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125100" comment="libsmbclient-devel-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125101" comment="libsmbclient-raw-devel-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125102" comment="libsmbclient-raw0-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125103" comment="libsmbclient-raw0-32bit-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125104" comment="libsmbclient0-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125105" comment="libsmbclient0-32bit-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125106" comment="libsmbconf-devel-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125107" comment="libsmbconf0-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125108" comment="libsmbconf0-32bit-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125109" comment="libsmbldap-devel-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125110" comment="libsmbldap0-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125111" comment="libsmbldap0-32bit-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125112" comment="libsmbsharemodes-devel-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125113" comment="libsmbsharemodes0-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125114" comment="libtevent-util-devel-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125115" comment="libtevent-util0-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125116" comment="libtevent-util0-32bit-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125117" comment="libwbclient-devel-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125118" comment="libwbclient0-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125119" comment="libwbclient0-32bit-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125120" comment="samba-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125121" comment="samba-32bit-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125122" comment="samba-client-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125123" comment="samba-client-32bit-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125124" comment="samba-core-devel-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125125" comment="samba-doc-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125126" comment="samba-libs-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125127" comment="samba-libs-32bit-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125128" comment="samba-pidl-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125129" comment="samba-python-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125130" comment="samba-test-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125131" comment="samba-test-devel-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125132" comment="samba-winbind-4.1.23-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125133" comment="samba-winbind-32bit-4.1.23-31.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0772</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0772" source="CVE"/>
    <description>
    The smtplib library in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 does not return an error when StartTLS fails, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130698" comment="libpython2_7-1_0-2.7.12-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130699" comment="libpython2_7-1_0-32bit-2.7.12-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134121" comment="libpython3_4m1_0-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134122" comment="libpython3_4m1_0-32bit-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130700" comment="python-2.7.12-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130701" comment="python-32bit-2.7.12-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130702" comment="python-base-2.7.12-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130703" comment="python-base-32bit-2.7.12-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130704" comment="python-curses-2.7.12-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130705" comment="python-demo-2.7.12-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130706" comment="python-devel-2.7.12-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130707" comment="python-doc-2.7.12-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130708" comment="python-doc-pdf-2.7.12-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130709" comment="python-gdbm-2.7.12-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130710" comment="python-idle-2.7.12-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130711" comment="python-tk-2.7.12-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130712" comment="python-xml-2.7.12-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134123" comment="python3-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134124" comment="python3-32bit-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134125" comment="python3-base-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134126" comment="python3-base-32bit-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134127" comment="python3-curses-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134128" comment="python3-dbm-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134129" comment="python3-devel-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134130" comment="python3-doc-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134131" comment="python3-doc-pdf-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134132" comment="python3-idle-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134133" comment="python3-testsuite-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134134" comment="python3-tk-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134135" comment="python3-tools-3.4.5-4.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0773</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0773" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0773" source="CVE"/>
    <description>
    PostgreSQL before 9.1.20, 9.2.x before 9.2.15, 9.3.x before 9.3.11, 9.4.x before 9.4.6, and 9.5.x before 9.5.1 allows remote attackers to cause a denial of service (infinite loop or buffer overflow and crash) via a large Unicode character range in a regular expression.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123516" comment="libecpg6-9.3.11-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123517" comment="libecpg6-32bit-9.3.11-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123518" comment="libpq5-9.3.11-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123519" comment="libpq5-32bit-9.3.11-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123520" comment="postgresql93-9.3.11-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123521" comment="postgresql93-contrib-9.3.11-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123522" comment="postgresql93-devel-9.3.11-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123523" comment="postgresql93-docs-9.3.11-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123524" comment="postgresql93-libs-9.3.11-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123525" comment="postgresql93-plperl-9.3.11-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123526" comment="postgresql93-plpython-9.3.11-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123527" comment="postgresql93-pltcl-9.3.11-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123528" comment="postgresql93-server-9.3.11-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123529" comment="postgresql93-test-9.3.11-2.10.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0775</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0775" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0775" source="CVE"/>
    <description>
    Buffer overflow in the ImagingFliDecode function in libImaging/FliDecode.c in Pillow before 3.1.1 allows remote attackers to cause a denial of service (crash) via a crafted FLI file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124775" comment="python-Pillow-2.8.1-3.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124776" comment="python-Pillow-tk-2.8.1-3.6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0777</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0777" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0777" source="CVE"/>
    <description>
    The resend_bytes function in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2 allows remote servers to obtain sensitive information from process memory by requesting transmission of an entire buffer, as demonstrated by reading a private key.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009121488" comment="openssh-6.6p1-5.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121489" comment="openssh-askpass-gnome-6.6p1-5.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121490" comment="openssh-fips-6.6p1-5.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121491" comment="openssh-helpers-6.6p1-5.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0778</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0778" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0778" source="CVE"/>
    <description>
    The (1) roaming_read and (2) roaming_write functions in roaming_common.c in the client in OpenSSH 5.x, 6.x, and 7.x before 7.1p2, when certain proxy and forward options are enabled, do not properly maintain connection file descriptors, which allows remote servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact by requesting many forwardings.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009121488" comment="openssh-6.6p1-5.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121489" comment="openssh-askpass-gnome-6.6p1-5.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121490" comment="openssh-fips-6.6p1-5.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121491" comment="openssh-helpers-6.6p1-5.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0787</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0787" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0787" source="CVE"/>
    <description>
    The diffie_hellman_sha256 function in kex.c in libssh2 before 1.7.0 improperly truncates secrets to 128 or 256 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a "bits/bytes confusion bug."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124411" comment="libssh2-1-1.5.0-9.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124412" comment="libssh2-1-32bit-1.5.0-9.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124413" comment="libssh2-devel-1.5.0-9.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124414" comment="libssh2_org-1.5.0-9.7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0794</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0794" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0794" source="CVE"/>
    <description>
    The lwp filter in LibreOffice before 5.0.4 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted LotusWordPro (lwp) document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128060" comment="libreoffice-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128061" comment="libreoffice-base-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128062" comment="libreoffice-base-drivers-mysql-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128063" comment="libreoffice-base-drivers-postgresql-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128064" comment="libreoffice-branding-upstream-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128065" comment="libreoffice-calc-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128066" comment="libreoffice-calc-extensions-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128067" comment="libreoffice-draw-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128068" comment="libreoffice-filters-optional-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128069" comment="libreoffice-gnome-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128070" comment="libreoffice-gtk3-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128071" comment="libreoffice-icon-theme-breeze-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128072" comment="libreoffice-icon-theme-galaxy-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128073" comment="libreoffice-icon-theme-hicontrast-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128074" comment="libreoffice-icon-theme-oxygen-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128075" comment="libreoffice-icon-theme-sifr-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128076" comment="libreoffice-icon-theme-tango-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128077" comment="libreoffice-impress-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128078" comment="libreoffice-kde4-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128079" comment="libreoffice-l10n-af-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128080" comment="libreoffice-l10n-ar-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128081" comment="libreoffice-l10n-as-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128082" comment="libreoffice-l10n-bg-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128083" comment="libreoffice-l10n-bn-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128084" comment="libreoffice-l10n-br-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128085" comment="libreoffice-l10n-ca-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128086" comment="libreoffice-l10n-cs-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128087" comment="libreoffice-l10n-cy-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128088" comment="libreoffice-l10n-da-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128089" comment="libreoffice-l10n-de-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128090" comment="libreoffice-l10n-dz-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128091" comment="libreoffice-l10n-el-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128092" comment="libreoffice-l10n-en-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128093" comment="libreoffice-l10n-es-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128094" comment="libreoffice-l10n-et-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128095" comment="libreoffice-l10n-eu-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128096" comment="libreoffice-l10n-fa-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128097" comment="libreoffice-l10n-fi-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128098" comment="libreoffice-l10n-fr-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128099" comment="libreoffice-l10n-ga-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128100" comment="libreoffice-l10n-gl-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128101" comment="libreoffice-l10n-gu-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128102" comment="libreoffice-l10n-he-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128103" comment="libreoffice-l10n-hi-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128104" comment="libreoffice-l10n-hr-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128105" comment="libreoffice-l10n-hu-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128106" comment="libreoffice-l10n-it-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128107" comment="libreoffice-l10n-ja-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128108" comment="libreoffice-l10n-kk-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128109" comment="libreoffice-l10n-kn-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128110" comment="libreoffice-l10n-ko-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128111" comment="libreoffice-l10n-lt-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128112" comment="libreoffice-l10n-lv-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128113" comment="libreoffice-l10n-mai-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128114" comment="libreoffice-l10n-ml-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128115" comment="libreoffice-l10n-mr-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128116" comment="libreoffice-l10n-nb-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128117" comment="libreoffice-l10n-nl-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128118" comment="libreoffice-l10n-nn-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128119" comment="libreoffice-l10n-nr-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128120" comment="libreoffice-l10n-nso-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128121" comment="libreoffice-l10n-or-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128122" comment="libreoffice-l10n-pa-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128123" comment="libreoffice-l10n-pl-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128124" comment="libreoffice-l10n-pt-BR-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128125" comment="libreoffice-l10n-pt-PT-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128126" comment="libreoffice-l10n-ro-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128127" comment="libreoffice-l10n-ru-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128128" comment="libreoffice-l10n-si-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128129" comment="libreoffice-l10n-sk-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128130" comment="libreoffice-l10n-sl-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128131" comment="libreoffice-l10n-sr-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128132" comment="libreoffice-l10n-ss-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128133" comment="libreoffice-l10n-st-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128134" comment="libreoffice-l10n-sv-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128135" comment="libreoffice-l10n-ta-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128136" comment="libreoffice-l10n-te-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128137" comment="libreoffice-l10n-th-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128138" comment="libreoffice-l10n-tn-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128139" comment="libreoffice-l10n-tr-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128140" comment="libreoffice-l10n-ts-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128141" comment="libreoffice-l10n-uk-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128142" comment="libreoffice-l10n-ve-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128143" comment="libreoffice-l10n-xh-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128144" comment="libreoffice-l10n-zh-Hans-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128145" comment="libreoffice-l10n-zh-Hant-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128146" comment="libreoffice-l10n-zu-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128147" comment="libreoffice-mailmerge-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128148" comment="libreoffice-math-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128149" comment="libreoffice-officebean-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128150" comment="libreoffice-pyuno-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128151" comment="libreoffice-sdk-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128152" comment="libreoffice-sdk-doc-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128153" comment="libreoffice-writer-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128154" comment="libreoffice-writer-extensions-5.0.6.3-31.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0795</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0795" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0795" source="CVE"/>
    <description>
    LibreOffice before 5.0.5 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted LwpTocSuperLayout record in a LotusWordPro (lwp) document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128060" comment="libreoffice-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128061" comment="libreoffice-base-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128062" comment="libreoffice-base-drivers-mysql-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128063" comment="libreoffice-base-drivers-postgresql-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128064" comment="libreoffice-branding-upstream-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128065" comment="libreoffice-calc-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128066" comment="libreoffice-calc-extensions-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128067" comment="libreoffice-draw-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128068" comment="libreoffice-filters-optional-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128069" comment="libreoffice-gnome-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128070" comment="libreoffice-gtk3-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128071" comment="libreoffice-icon-theme-breeze-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128072" comment="libreoffice-icon-theme-galaxy-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128073" comment="libreoffice-icon-theme-hicontrast-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128074" comment="libreoffice-icon-theme-oxygen-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128075" comment="libreoffice-icon-theme-sifr-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128076" comment="libreoffice-icon-theme-tango-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128077" comment="libreoffice-impress-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128078" comment="libreoffice-kde4-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128079" comment="libreoffice-l10n-af-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128080" comment="libreoffice-l10n-ar-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128081" comment="libreoffice-l10n-as-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128082" comment="libreoffice-l10n-bg-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128083" comment="libreoffice-l10n-bn-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128084" comment="libreoffice-l10n-br-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128085" comment="libreoffice-l10n-ca-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128086" comment="libreoffice-l10n-cs-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128087" comment="libreoffice-l10n-cy-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128088" comment="libreoffice-l10n-da-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128089" comment="libreoffice-l10n-de-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128090" comment="libreoffice-l10n-dz-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128091" comment="libreoffice-l10n-el-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128092" comment="libreoffice-l10n-en-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128093" comment="libreoffice-l10n-es-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128094" comment="libreoffice-l10n-et-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128095" comment="libreoffice-l10n-eu-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128096" comment="libreoffice-l10n-fa-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128097" comment="libreoffice-l10n-fi-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128098" comment="libreoffice-l10n-fr-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128099" comment="libreoffice-l10n-ga-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128100" comment="libreoffice-l10n-gl-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128101" comment="libreoffice-l10n-gu-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128102" comment="libreoffice-l10n-he-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128103" comment="libreoffice-l10n-hi-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128104" comment="libreoffice-l10n-hr-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128105" comment="libreoffice-l10n-hu-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128106" comment="libreoffice-l10n-it-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128107" comment="libreoffice-l10n-ja-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128108" comment="libreoffice-l10n-kk-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128109" comment="libreoffice-l10n-kn-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128110" comment="libreoffice-l10n-ko-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128111" comment="libreoffice-l10n-lt-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128112" comment="libreoffice-l10n-lv-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128113" comment="libreoffice-l10n-mai-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128114" comment="libreoffice-l10n-ml-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128115" comment="libreoffice-l10n-mr-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128116" comment="libreoffice-l10n-nb-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128117" comment="libreoffice-l10n-nl-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128118" comment="libreoffice-l10n-nn-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128119" comment="libreoffice-l10n-nr-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128120" comment="libreoffice-l10n-nso-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128121" comment="libreoffice-l10n-or-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128122" comment="libreoffice-l10n-pa-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128123" comment="libreoffice-l10n-pl-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128124" comment="libreoffice-l10n-pt-BR-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128125" comment="libreoffice-l10n-pt-PT-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128126" comment="libreoffice-l10n-ro-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128127" comment="libreoffice-l10n-ru-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128128" comment="libreoffice-l10n-si-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128129" comment="libreoffice-l10n-sk-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128130" comment="libreoffice-l10n-sl-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128131" comment="libreoffice-l10n-sr-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128132" comment="libreoffice-l10n-ss-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128133" comment="libreoffice-l10n-st-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128134" comment="libreoffice-l10n-sv-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128135" comment="libreoffice-l10n-ta-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128136" comment="libreoffice-l10n-te-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128137" comment="libreoffice-l10n-th-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128138" comment="libreoffice-l10n-tn-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128139" comment="libreoffice-l10n-tr-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128140" comment="libreoffice-l10n-ts-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128141" comment="libreoffice-l10n-uk-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128142" comment="libreoffice-l10n-ve-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128143" comment="libreoffice-l10n-xh-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128144" comment="libreoffice-l10n-zh-Hans-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128145" comment="libreoffice-l10n-zh-Hant-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128146" comment="libreoffice-l10n-zu-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128147" comment="libreoffice-mailmerge-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128148" comment="libreoffice-math-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128149" comment="libreoffice-officebean-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128150" comment="libreoffice-pyuno-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128151" comment="libreoffice-sdk-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128152" comment="libreoffice-sdk-doc-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128153" comment="libreoffice-writer-5.0.6.3-31.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128154" comment="libreoffice-writer-extensions-5.0.6.3-31.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0797</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0797" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0797" source="CVE"/>
    <description>
    Multiple integer overflows in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allow remote attackers to cause a denial of service (heap memory corruption or NULL pointer dereference) or possibly have unspecified other impact via a long digit string that is mishandled by the (1) BN_dec2bn or (2) BN_hex2bn function, related to crypto/bn/bn.h and crypto/bn/bn_print.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124389" comment="libopenssl-devel-1.0.1k-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124390" comment="libopenssl-devel-32bit-1.0.1k-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124418" comment="libopenssl0_9_8-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124419" comment="libopenssl0_9_8-32bit-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124391" comment="libopenssl1_0_0-1.0.1k-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124392" comment="libopenssl1_0_0-32bit-1.0.1k-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124393" comment="libopenssl1_0_0-hmac-1.0.1k-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124394" comment="libopenssl1_0_0-hmac-32bit-1.0.1k-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128880" comment="nodejs-4.4.5-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128881" comment="nodejs-devel-4.4.5-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128872" comment="nodejs-doc-4.4.5-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124395" comment="openssl-1.0.1k-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124396" comment="openssl-doc-1.0.1k-2.33.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0798</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0798" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0798" source="CVE"/>
    <description>
    Memory leak in the SRP_VBASE_get_by_user implementation in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allows remote attackers to cause a denial of service (memory consumption) by providing an invalid username in a connection attempt, related to apps/s_server.c and crypto/srp/srp_vfy.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124389" comment="libopenssl-devel-1.0.1k-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124390" comment="libopenssl-devel-32bit-1.0.1k-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124391" comment="libopenssl1_0_0-1.0.1k-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124392" comment="libopenssl1_0_0-32bit-1.0.1k-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124393" comment="libopenssl1_0_0-hmac-1.0.1k-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124394" comment="libopenssl1_0_0-hmac-32bit-1.0.1k-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124395" comment="openssl-1.0.1k-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124396" comment="openssl-doc-1.0.1k-2.33.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0799</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0799" source="CVE"/>
    <description>
    The fmtstr function in crypto/bio/b_print.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g improperly calculates string lengths, which allows remote attackers to cause a denial of service (overflow and out-of-bounds read) or possibly have unspecified other impact via a long string, as demonstrated by a large amount of ASN.1 data, a different vulnerability than CVE-2016-2842.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124389" comment="libopenssl-devel-1.0.1k-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124390" comment="libopenssl-devel-32bit-1.0.1k-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124418" comment="libopenssl0_9_8-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124419" comment="libopenssl0_9_8-32bit-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124391" comment="libopenssl1_0_0-1.0.1k-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124392" comment="libopenssl1_0_0-32bit-1.0.1k-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124393" comment="libopenssl1_0_0-hmac-1.0.1k-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124394" comment="libopenssl1_0_0-hmac-32bit-1.0.1k-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124395" comment="openssl-1.0.1k-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124396" comment="openssl-doc-1.0.1k-2.33.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0800</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0800" source="CVE"/>
    <description>
    The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124389" comment="libopenssl-devel-1.0.1k-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124390" comment="libopenssl-devel-32bit-1.0.1k-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124418" comment="libopenssl0_9_8-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124419" comment="libopenssl0_9_8-32bit-0.9.8zh-9.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124391" comment="libopenssl1_0_0-1.0.1k-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124392" comment="libopenssl1_0_0-32bit-1.0.1k-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124393" comment="libopenssl1_0_0-hmac-1.0.1k-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124394" comment="libopenssl1_0_0-hmac-32bit-1.0.1k-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124395" comment="openssl-1.0.1k-2.33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124396" comment="openssl-doc-1.0.1k-2.33.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0823</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-0823" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0823" source="CVE"/>
    <description>
    The pagemap_open function in fs/proc/task_mmu.c in the Linux kernel before 3.19.3, as used in Android 6.0.1 before 2016-03-01, allows local users to obtain sensitive physical-address information by reading a pagemap file, aka Android internal bug 25739721.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133865" comment="bbswitch-0.8-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133866" comment="bbswitch-kmp-default-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133867" comment="bbswitch-kmp-desktop-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133868" comment="bbswitch-kmp-pae-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133869" comment="bbswitch-kmp-xen-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133870" comment="cloop-2.639-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133871" comment="cloop-kmp-default-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133872" comment="cloop-kmp-desktop-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133873" comment="cloop-kmp-pae-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133874" comment="cloop-kmp-xen-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133875" comment="crash-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133876" comment="crash-devel-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133877" comment="crash-doc-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133878" comment="crash-eppic-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133879" comment="crash-gcore-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133880" comment="crash-kmp-default-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133881" comment="crash-kmp-desktop-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133882" comment="crash-kmp-pae-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133883" comment="crash-kmp-xen-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133884" comment="hdjmod-1.28-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133885" comment="hdjmod-kmp-default-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133886" comment="hdjmod-kmp-desktop-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133887" comment="hdjmod-kmp-pae-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133888" comment="hdjmod-kmp-xen-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133889" comment="ipset-6.23-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133890" comment="ipset-devel-6.23-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133891" comment="ipset-kmp-default-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133892" comment="ipset-kmp-desktop-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133893" comment="ipset-kmp-pae-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133894" comment="ipset-kmp-xen-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133895" comment="kernel-debug-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133896" comment="kernel-debug-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133897" comment="kernel-debug-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133898" comment="kernel-default-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133899" comment="kernel-default-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133900" comment="kernel-default-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133901" comment="kernel-desktop-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133902" comment="kernel-desktop-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133903" comment="kernel-desktop-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133904" comment="kernel-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133905" comment="kernel-docs-3.16.7-45.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133906" comment="kernel-ec2-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133907" comment="kernel-ec2-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133908" comment="kernel-ec2-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133909" comment="kernel-macros-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133910" comment="kernel-obs-build-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133911" comment="kernel-obs-qa-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133912" comment="kernel-obs-qa-xen-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133913" comment="kernel-pae-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133914" comment="kernel-pae-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133915" comment="kernel-pae-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133916" comment="kernel-source-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133917" comment="kernel-source-vanilla-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133918" comment="kernel-syms-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133919" comment="kernel-vanilla-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133920" comment="kernel-vanilla-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133921" comment="kernel-xen-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133922" comment="kernel-xen-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133923" comment="kernel-xen-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133924" comment="libipset3-6.23-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133925" comment="pcfclock-0.44-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133926" comment="pcfclock-kmp-default-0.44_k3.16.7_45-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133927" comment="pcfclock-kmp-desktop-0.44_k3.16.7_45-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133928" comment="pcfclock-kmp-pae-0.44_k3.16.7_45-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133929" comment="python-virtualbox-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133930" comment="vhba-kmp-20140629-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133931" comment="vhba-kmp-default-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133932" comment="vhba-kmp-desktop-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133933" comment="vhba-kmp-pae-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133934" comment="vhba-kmp-xen-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133935" comment="virtualbox-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133936" comment="virtualbox-devel-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133937" comment="virtualbox-guest-desktop-icons-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133938" comment="virtualbox-guest-kmp-default-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133939" comment="virtualbox-guest-kmp-desktop-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133940" comment="virtualbox-guest-kmp-pae-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133941" comment="virtualbox-guest-tools-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133942" comment="virtualbox-guest-x11-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133943" comment="virtualbox-host-kmp-default-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133944" comment="virtualbox-host-kmp-desktop-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133945" comment="virtualbox-host-kmp-pae-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133946" comment="virtualbox-host-source-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133947" comment="virtualbox-qt-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133948" comment="virtualbox-websrv-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133949" comment="xen-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133950" comment="xen-devel-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133951" comment="xen-doc-html-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133952" comment="xen-kmp-default-4.4.4_05_k3.16.7_45-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133953" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_45-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133954" comment="xen-libs-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133955" comment="xen-libs-32bit-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133956" comment="xen-tools-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133957" comment="xen-tools-domU-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133958" comment="xtables-addons-2.6-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133959" comment="xtables-addons-kmp-default-2.6_k3.16.7_45-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133960" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_45-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133961" comment="xtables-addons-kmp-pae-2.6_k3.16.7_45-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133962" comment="xtables-addons-kmp-xen-2.6_k3.16.7_45-24.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0960</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-0960" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0960" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0961, CVE-2016-0962, CVE-2016-0986, CVE-2016-0989, CVE-2016-0992, CVE-2016-1002, and CVE-2016-1005.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124625" comment="flash-player-11.2.202.577-2.91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124626" comment="flash-player-gnome-11.2.202.577-2.91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124627" comment="flash-player-kde4-11.2.202.577-2.91.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0961</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-0961" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0961" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0960, CVE-2016-0962, CVE-2016-0986, CVE-2016-0989, CVE-2016-0992, CVE-2016-1002, and CVE-2016-1005.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124625" comment="flash-player-11.2.202.577-2.91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124626" comment="flash-player-gnome-11.2.202.577-2.91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124627" comment="flash-player-kde4-11.2.202.577-2.91.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0962</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-0962" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0962" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0960, CVE-2016-0961, CVE-2016-0986, CVE-2016-0989, CVE-2016-0992, CVE-2016-1002, and CVE-2016-1005.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124625" comment="flash-player-11.2.202.577-2.91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124626" comment="flash-player-gnome-11.2.202.577-2.91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124627" comment="flash-player-kde4-11.2.202.577-2.91.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0963</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-0963" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0963" source="CVE"/>
    <description>
    Integer overflow in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0993 and CVE-2016-1010.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124625" comment="flash-player-11.2.202.577-2.91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124626" comment="flash-player-gnome-11.2.202.577-2.91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124627" comment="flash-player-kde4-11.2.202.577-2.91.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0964</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-0964" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0964" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123218" comment="flash-player-11.2.202.569-2.88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123219" comment="flash-player-gnome-11.2.202.569-2.88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123220" comment="flash-player-kde4-11.2.202.569-2.88.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0965</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-0965" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0965" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123218" comment="flash-player-11.2.202.569-2.88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123219" comment="flash-player-gnome-11.2.202.569-2.88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123220" comment="flash-player-kde4-11.2.202.569-2.88.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0966</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-0966" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0966" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123218" comment="flash-player-11.2.202.569-2.88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123219" comment="flash-player-gnome-11.2.202.569-2.88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123220" comment="flash-player-kde4-11.2.202.569-2.88.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0967</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-0967" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0967" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123218" comment="flash-player-11.2.202.569-2.88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123219" comment="flash-player-gnome-11.2.202.569-2.88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123220" comment="flash-player-kde4-11.2.202.569-2.88.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0968</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-0968" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0968" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123218" comment="flash-player-11.2.202.569-2.88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123219" comment="flash-player-gnome-11.2.202.569-2.88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123220" comment="flash-player-kde4-11.2.202.569-2.88.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0969</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-0969" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0969" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123218" comment="flash-player-11.2.202.569-2.88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123219" comment="flash-player-gnome-11.2.202.569-2.88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123220" comment="flash-player-kde4-11.2.202.569-2.88.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0970</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-0970" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0970" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123218" comment="flash-player-11.2.202.569-2.88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123219" comment="flash-player-gnome-11.2.202.569-2.88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123220" comment="flash-player-kde4-11.2.202.569-2.88.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0971</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-0971" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0971" source="CVE"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123218" comment="flash-player-11.2.202.569-2.88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123219" comment="flash-player-gnome-11.2.202.569-2.88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123220" comment="flash-player-kde4-11.2.202.569-2.88.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0972</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-0972" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0972" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123218" comment="flash-player-11.2.202.569-2.88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123219" comment="flash-player-gnome-11.2.202.569-2.88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123220" comment="flash-player-kde4-11.2.202.569-2.88.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0973</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-0973" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0973" source="CVE"/>
    <description>
    Use-after-free vulnerability in the URLRequest object implementation in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allows attackers to execute arbitrary code via a URLLoader.load call, a different vulnerability than CVE-2016-0974, CVE-2016-0975, CVE-2016-0982, CVE-2016-0983, and CVE-2016-0984.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123218" comment="flash-player-11.2.202.569-2.88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123219" comment="flash-player-gnome-11.2.202.569-2.88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123220" comment="flash-player-kde4-11.2.202.569-2.88.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0974</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-0974" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0974" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0973, CVE-2016-0975, CVE-2016-0982, CVE-2016-0983, and CVE-2016-0984.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123218" comment="flash-player-11.2.202.569-2.88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123219" comment="flash-player-gnome-11.2.202.569-2.88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123220" comment="flash-player-kde4-11.2.202.569-2.88.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0975</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-0975" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0975" source="CVE"/>
    <description>
    Use-after-free vulnerability in the instanceof function in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allows attackers to execute arbitrary code by leveraging improper reference handling, a different vulnerability than CVE-2016-0973, CVE-2016-0974, CVE-2016-0982, CVE-2016-0983, and CVE-2016-0984.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123218" comment="flash-player-11.2.202.569-2.88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123219" comment="flash-player-gnome-11.2.202.569-2.88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123220" comment="flash-player-kde4-11.2.202.569-2.88.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0976</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-0976" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0976" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123218" comment="flash-player-11.2.202.569-2.88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123219" comment="flash-player-gnome-11.2.202.569-2.88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123220" comment="flash-player-kde4-11.2.202.569-2.88.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0977</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-0977" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0977" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0978, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123218" comment="flash-player-11.2.202.569-2.88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123219" comment="flash-player-gnome-11.2.202.569-2.88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123220" comment="flash-player-kde4-11.2.202.569-2.88.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0978</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-0978" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0978" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0979, CVE-2016-0980, and CVE-2016-0981.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123218" comment="flash-player-11.2.202.569-2.88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123219" comment="flash-player-gnome-11.2.202.569-2.88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123220" comment="flash-player-kde4-11.2.202.569-2.88.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0979</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-0979" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0979" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0980, and CVE-2016-0981.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123218" comment="flash-player-11.2.202.569-2.88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123219" comment="flash-player-gnome-11.2.202.569-2.88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123220" comment="flash-player-kde4-11.2.202.569-2.88.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0980</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-0980" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0980" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, and CVE-2016-0981.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123218" comment="flash-player-11.2.202.569-2.88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123219" comment="flash-player-gnome-11.2.202.569-2.88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123220" comment="flash-player-kde4-11.2.202.569-2.88.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0981</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-0981" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0981" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0964, CVE-2016-0965, CVE-2016-0966, CVE-2016-0967, CVE-2016-0968, CVE-2016-0969, CVE-2016-0970, CVE-2016-0972, CVE-2016-0976, CVE-2016-0977, CVE-2016-0978, CVE-2016-0979, and CVE-2016-0980.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123218" comment="flash-player-11.2.202.569-2.88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123219" comment="flash-player-gnome-11.2.202.569-2.88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123220" comment="flash-player-kde4-11.2.202.569-2.88.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0982</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-0982" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0982" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0973, CVE-2016-0974, CVE-2016-0975, CVE-2016-0983, and CVE-2016-0984.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123218" comment="flash-player-11.2.202.569-2.88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123219" comment="flash-player-gnome-11.2.202.569-2.88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123220" comment="flash-player-kde4-11.2.202.569-2.88.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0983</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-0983" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0983" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0973, CVE-2016-0974, CVE-2016-0975, CVE-2016-0982, and CVE-2016-0984.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123218" comment="flash-player-11.2.202.569-2.88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123219" comment="flash-player-gnome-11.2.202.569-2.88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123220" comment="flash-player-kde4-11.2.202.569-2.88.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0984</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-0984" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0984" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0973, CVE-2016-0974, CVE-2016-0975, CVE-2016-0982, and CVE-2016-0983.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123218" comment="flash-player-11.2.202.569-2.88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123219" comment="flash-player-gnome-11.2.202.569-2.88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123220" comment="flash-player-kde4-11.2.202.569-2.88.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0985</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-0985" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0985" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.329 and 19.x and 20.x before 20.0.0.306 on Windows and OS X and before 11.2.202.569 on Linux, Adobe AIR before 20.0.0.260, Adobe AIR SDK before 20.0.0.260, and Adobe AIR SDK &amp; Compiler before 20.0.0.260 allow attackers to execute arbitrary code by leveraging an unspecified "type confusion."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123218" comment="flash-player-11.2.202.569-2.88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123219" comment="flash-player-gnome-11.2.202.569-2.88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123220" comment="flash-player-kde4-11.2.202.569-2.88.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0986</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-0986" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0986" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0960, CVE-2016-0961, CVE-2016-0962, CVE-2016-0989, CVE-2016-0992, CVE-2016-1002, and CVE-2016-1005.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124625" comment="flash-player-11.2.202.577-2.91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124626" comment="flash-player-gnome-11.2.202.577-2.91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124627" comment="flash-player-kde4-11.2.202.577-2.91.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0987</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-0987" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0987" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0988, CVE-2016-0990, CVE-2016-0991, CVE-2016-0994, CVE-2016-0995, CVE-2016-0996, CVE-2016-0997, CVE-2016-0998, CVE-2016-0999, and CVE-2016-1000.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124625" comment="flash-player-11.2.202.577-2.91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124626" comment="flash-player-gnome-11.2.202.577-2.91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124627" comment="flash-player-kde4-11.2.202.577-2.91.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0988</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-0988" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0988" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0987, CVE-2016-0990, CVE-2016-0991, CVE-2016-0994, CVE-2016-0995, CVE-2016-0996, CVE-2016-0997, CVE-2016-0998, CVE-2016-0999, and CVE-2016-1000.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124625" comment="flash-player-11.2.202.577-2.91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124626" comment="flash-player-gnome-11.2.202.577-2.91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124627" comment="flash-player-kde4-11.2.202.577-2.91.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0989</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-0989" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0989" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0960, CVE-2016-0961, CVE-2016-0962, CVE-2016-0986, CVE-2016-0992, CVE-2016-1002, and CVE-2016-1005.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124625" comment="flash-player-11.2.202.577-2.91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124626" comment="flash-player-gnome-11.2.202.577-2.91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124627" comment="flash-player-kde4-11.2.202.577-2.91.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0990</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-0990" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0990" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0987, CVE-2016-0988, CVE-2016-0991, CVE-2016-0994, CVE-2016-0995, CVE-2016-0996, CVE-2016-0997, CVE-2016-0998, CVE-2016-0999, and CVE-2016-1000.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124625" comment="flash-player-11.2.202.577-2.91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124626" comment="flash-player-gnome-11.2.202.577-2.91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124627" comment="flash-player-kde4-11.2.202.577-2.91.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0991</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-0991" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0991" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0987, CVE-2016-0988, CVE-2016-0990, CVE-2016-0994, CVE-2016-0995, CVE-2016-0996, CVE-2016-0997, CVE-2016-0998, CVE-2016-0999, and CVE-2016-1000.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124625" comment="flash-player-11.2.202.577-2.91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124626" comment="flash-player-gnome-11.2.202.577-2.91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124627" comment="flash-player-kde4-11.2.202.577-2.91.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0992</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-0992" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0992" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0960, CVE-2016-0961, CVE-2016-0962, CVE-2016-0986, CVE-2016-0989, CVE-2016-1002, and CVE-2016-1005.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124625" comment="flash-player-11.2.202.577-2.91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124626" comment="flash-player-gnome-11.2.202.577-2.91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124627" comment="flash-player-kde4-11.2.202.577-2.91.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0993</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-0993" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0993" source="CVE"/>
    <description>
    Integer overflow in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0963 and CVE-2016-1010.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124625" comment="flash-player-11.2.202.577-2.91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124626" comment="flash-player-gnome-11.2.202.577-2.91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124627" comment="flash-player-kde4-11.2.202.577-2.91.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0994</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-0994" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0994" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allows attackers to execute arbitrary code by using the actionCallMethod opcode with crafted arguments, a different vulnerability than CVE-2016-0987, CVE-2016-0988, CVE-2016-0990, CVE-2016-0991, CVE-2016-0995, CVE-2016-0996, CVE-2016-0997, CVE-2016-0998, CVE-2016-0999, and CVE-2016-1000.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124625" comment="flash-player-11.2.202.577-2.91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124626" comment="flash-player-gnome-11.2.202.577-2.91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124627" comment="flash-player-kde4-11.2.202.577-2.91.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0995</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-0995" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0995" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0987, CVE-2016-0988, CVE-2016-0990, CVE-2016-0991, CVE-2016-0994, CVE-2016-0996, CVE-2016-0997, CVE-2016-0998, CVE-2016-0999, and CVE-2016-1000.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124625" comment="flash-player-11.2.202.577-2.91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124626" comment="flash-player-gnome-11.2.202.577-2.91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124627" comment="flash-player-kde4-11.2.202.577-2.91.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0996</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-0996" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0996" source="CVE"/>
    <description>
    Use-after-free vulnerability in the setInterval method in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allows attackers to execute arbitrary code via crafted arguments, a different vulnerability than CVE-2016-0987, CVE-2016-0988, CVE-2016-0990, CVE-2016-0991, CVE-2016-0994, CVE-2016-0995, CVE-2016-0997, CVE-2016-0998, CVE-2016-0999, and CVE-2016-1000.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124625" comment="flash-player-11.2.202.577-2.91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124626" comment="flash-player-gnome-11.2.202.577-2.91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124627" comment="flash-player-kde4-11.2.202.577-2.91.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0997</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-0997" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0997" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0987, CVE-2016-0988, CVE-2016-0990, CVE-2016-0991, CVE-2016-0994, CVE-2016-0995, CVE-2016-0996, CVE-2016-0998, CVE-2016-0999, and CVE-2016-1000.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124625" comment="flash-player-11.2.202.577-2.91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124626" comment="flash-player-gnome-11.2.202.577-2.91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124627" comment="flash-player-kde4-11.2.202.577-2.91.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0998</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-0998" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0998" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0987, CVE-2016-0988, CVE-2016-0990, CVE-2016-0991, CVE-2016-0994, CVE-2016-0995, CVE-2016-0996, CVE-2016-0997, CVE-2016-0999, and CVE-2016-1000.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124625" comment="flash-player-11.2.202.577-2.91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124626" comment="flash-player-gnome-11.2.202.577-2.91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124627" comment="flash-player-kde4-11.2.202.577-2.91.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0999</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-0999" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0999" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0987, CVE-2016-0988, CVE-2016-0990, CVE-2016-0991, CVE-2016-0994, CVE-2016-0995, CVE-2016-0996, CVE-2016-0997, CVE-2016-0998, and CVE-2016-1000.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124625" comment="flash-player-11.2.202.577-2.91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124626" comment="flash-player-gnome-11.2.202.577-2.91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124627" comment="flash-player-kde4-11.2.202.577-2.91.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1000</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-1000" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0987, CVE-2016-0988, CVE-2016-0990, CVE-2016-0991, CVE-2016-0994, CVE-2016-0995, CVE-2016-0996, CVE-2016-0997, CVE-2016-0998, and CVE-2016-0999.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124625" comment="flash-player-11.2.202.577-2.91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124626" comment="flash-player-gnome-11.2.202.577-2.91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124627" comment="flash-player-kde4-11.2.202.577-2.91.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161000104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1000104</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1000104" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000104" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134143" comment="apache2-mod_fcgid-2.3.9-2.5.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161000110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1000110</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1000110" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000110" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134121" comment="libpython3_4m1_0-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134122" comment="libpython3_4m1_0-32bit-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134123" comment="python3-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134124" comment="python3-32bit-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134125" comment="python3-base-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134126" comment="python3-base-32bit-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134127" comment="python3-curses-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134128" comment="python3-dbm-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134129" comment="python3-devel-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134130" comment="python3-doc-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134131" comment="python3-doc-pdf-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134132" comment="python3-idle-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134133" comment="python3-testsuite-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134134" comment="python3-tk-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134135" comment="python3-tools-3.4.5-4.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1001</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-1001" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1001" source="CVE"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124625" comment="flash-player-11.2.202.577-2.91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124626" comment="flash-player-gnome-11.2.202.577-2.91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124627" comment="flash-player-kde4-11.2.202.577-2.91.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10013</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-10013" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10013" source="CVE"/>
    <description>
    Xen through 4.8.x allows local 64-bit x86 HVM guest OS users to gain privileges by leveraging mishandling of SYSCALL singlestep during emulation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009146189" comment="xen-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146190" comment="xen-devel-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146191" comment="xen-doc-html-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146192" comment="xen-kmp-default-4.4.4_06_k3.16.7_53-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146193" comment="xen-kmp-desktop-4.4.4_06_k3.16.7_53-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146194" comment="xen-libs-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146195" comment="xen-libs-32bit-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146196" comment="xen-tools-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146197" comment="xen-tools-domU-4.4.4_06-58.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1002</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-1002" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1002" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-0960, CVE-2016-0961, CVE-2016-0962, CVE-2016-0986, CVE-2016-0989, CVE-2016-0992, and CVE-2016-1005.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124625" comment="flash-player-11.2.202.577-2.91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124626" comment="flash-player-gnome-11.2.202.577-2.91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124627" comment="flash-player-kde4-11.2.202.577-2.91.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10024</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-10024" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10024" source="CVE"/>
    <description>
    Xen through 4.8.x allows local x86 PV guest OS kernel administrators to cause a denial of service (host hang or crash) by modifying the instruction stream asynchronously while performing certain kernel operations.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009146189" comment="xen-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146190" comment="xen-devel-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146191" comment="xen-doc-html-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146192" comment="xen-kmp-default-4.4.4_06_k3.16.7_53-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146193" comment="xen-kmp-desktop-4.4.4_06_k3.16.7_53-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146194" comment="xen-libs-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146195" comment="xen-libs-32bit-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146196" comment="xen-tools-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146197" comment="xen-tools-domU-4.4.4_06-58.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1005</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-1005" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1005" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allow attackers to execute arbitrary code or cause a denial of service (uninitialized pointer dereference and memory corruption) via crafted MPEG-4 data, a different vulnerability than CVE-2016-0960, CVE-2016-0961, CVE-2016-0962, CVE-2016-0986, CVE-2016-0989, CVE-2016-0992, and CVE-2016-1002.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124625" comment="flash-player-11.2.202.577-2.91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124626" comment="flash-player-gnome-11.2.202.577-2.91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124627" comment="flash-player-kde4-11.2.202.577-2.91.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1006</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-1006" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1006" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to bypass the ASLR protection mechanism via JIT data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127586" comment="flash-player-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127587" comment="flash-player-gnome-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127588" comment="flash-player-kde4-11.2.202.621-2.97.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1010</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-1010" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1010" source="CVE"/>
    <description>
    Integer overflow in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK &amp; Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0963 and CVE-2016-0993.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124625" comment="flash-player-11.2.202.577-2.91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124626" comment="flash-player-gnome-11.2.202.577-2.91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124627" comment="flash-player-kde4-11.2.202.577-2.91.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201610109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-10109</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-10109" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10109" source="CVE"/>
    <description>
    Use-after-free vulnerability in pcsc-lite before 1.8.20 allows a remote attackers to cause denial of service (crash) via a command that uses "cardsList" after the handle has been released through the SCardReleaseContext function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009147280" comment="libpcsclite1-1.8.11-4.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147281" comment="libpcsclite1-32bit-1.8.11-4.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147282" comment="libpcscspy0-1.8.11-4.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147283" comment="libpcscspy0-32bit-1.8.11-4.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147284" comment="pcsc-lite-1.8.11-4.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147285" comment="pcsc-lite-devel-1.8.11-4.7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1011</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-1011" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1011" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-1013, CVE-2016-1016, CVE-2016-1017, and CVE-2016-1031.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127586" comment="flash-player-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127587" comment="flash-player-gnome-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127588" comment="flash-player-kde4-11.2.202.621-2.97.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1012</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-1012" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1012" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1020, CVE-2016-1021, CVE-2016-1022, CVE-2016-1023, CVE-2016-1024, CVE-2016-1025, CVE-2016-1026, CVE-2016-1027, CVE-2016-1028, CVE-2016-1029, CVE-2016-1032, and CVE-2016-1033.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127586" comment="flash-player-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127587" comment="flash-player-gnome-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127588" comment="flash-player-kde4-11.2.202.621-2.97.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1013</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-1013" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1013" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-1011, CVE-2016-1016, CVE-2016-1017, and CVE-2016-1031.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127586" comment="flash-player-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127587" comment="flash-player-gnome-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127588" comment="flash-player-kde4-11.2.202.621-2.97.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1014</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-1014" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1014" source="CVE"/>
    <description>
    Untrusted search path vulnerability in Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows local users to gain privileges via a Trojan horse resource in an unspecified directory.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127586" comment="flash-player-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127587" comment="flash-player-gnome-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127588" comment="flash-player-kde4-11.2.202.621-2.97.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1015</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-1015" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1015" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code by overriding NetConnection object properties to leverage an unspecified "type confusion," a different vulnerability than CVE-2016-1019.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127586" comment="flash-player-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127587" comment="flash-player-gnome-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127588" comment="flash-player-kde4-11.2.202.621-2.97.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1016</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-1016" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1016" source="CVE"/>
    <description>
    Use-after-free vulnerability in the Transform object implementation in Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code via a flash.geom.Matrix callback, a different vulnerability than CVE-2016-1011, CVE-2016-1013, CVE-2016-1017, and CVE-2016-1031.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127586" comment="flash-player-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127587" comment="flash-player-gnome-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127588" comment="flash-player-kde4-11.2.202.621-2.97.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1017</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-1017" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1017" source="CVE"/>
    <description>
    Use-after-free vulnerability in the LoadVars.decode function in Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-1011, CVE-2016-1013, CVE-2016-1016, and CVE-2016-1031.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127586" comment="flash-player-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127587" comment="flash-player-gnome-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127588" comment="flash-player-kde4-11.2.202.621-2.97.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1018</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-1018" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1018" source="CVE"/>
    <description>
    Stack-based buffer overflow in Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code via crafted JPEG-XR data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127586" comment="flash-player-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127587" comment="flash-player-gnome-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127588" comment="flash-player-kde4-11.2.202.621-2.97.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1019</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-1019" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1019" source="CVE"/>
    <description>
    Adobe Flash Player 21.0.0.197 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unspecified vectors, as exploited in the wild in April 2016.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127586" comment="flash-player-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127587" comment="flash-player-gnome-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127588" comment="flash-player-kde4-11.2.202.621-2.97.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1020</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-1020" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1020" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1012, CVE-2016-1021, CVE-2016-1022, CVE-2016-1023, CVE-2016-1024, CVE-2016-1025, CVE-2016-1026, CVE-2016-1027, CVE-2016-1028, CVE-2016-1029, CVE-2016-1032, and CVE-2016-1033.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127586" comment="flash-player-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127587" comment="flash-player-gnome-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127588" comment="flash-player-kde4-11.2.202.621-2.97.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1021</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-1021" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1021" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1012, CVE-2016-1020, CVE-2016-1022, CVE-2016-1023, CVE-2016-1024, CVE-2016-1025, CVE-2016-1026, CVE-2016-1027, CVE-2016-1028, CVE-2016-1029, CVE-2016-1032, and CVE-2016-1033.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127586" comment="flash-player-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127587" comment="flash-player-gnome-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127588" comment="flash-player-kde4-11.2.202.621-2.97.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1022</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-1022" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1022" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1012, CVE-2016-1020, CVE-2016-1021, CVE-2016-1023, CVE-2016-1024, CVE-2016-1025, CVE-2016-1026, CVE-2016-1027, CVE-2016-1028, CVE-2016-1029, CVE-2016-1032, and CVE-2016-1033.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127586" comment="flash-player-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127587" comment="flash-player-gnome-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127588" comment="flash-player-kde4-11.2.202.621-2.97.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1023</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-1023" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1023" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1012, CVE-2016-1020, CVE-2016-1021, CVE-2016-1022, CVE-2016-1024, CVE-2016-1025, CVE-2016-1026, CVE-2016-1027, CVE-2016-1028, CVE-2016-1029, CVE-2016-1032, and CVE-2016-1033.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127586" comment="flash-player-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127587" comment="flash-player-gnome-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127588" comment="flash-player-kde4-11.2.202.621-2.97.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1024</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-1024" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1024" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1012, CVE-2016-1020, CVE-2016-1021, CVE-2016-1022, CVE-2016-1023, CVE-2016-1025, CVE-2016-1026, CVE-2016-1027, CVE-2016-1028, CVE-2016-1029, CVE-2016-1032, and CVE-2016-1033.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127586" comment="flash-player-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127587" comment="flash-player-gnome-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127588" comment="flash-player-kde4-11.2.202.621-2.97.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1025</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-1025" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1025" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1012, CVE-2016-1020, CVE-2016-1021, CVE-2016-1022, CVE-2016-1023, CVE-2016-1024, CVE-2016-1026, CVE-2016-1027, CVE-2016-1028, CVE-2016-1029, CVE-2016-1032, and CVE-2016-1033.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127586" comment="flash-player-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127587" comment="flash-player-gnome-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127588" comment="flash-player-kde4-11.2.202.621-2.97.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1026</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-1026" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1026" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1012, CVE-2016-1020, CVE-2016-1021, CVE-2016-1022, CVE-2016-1023, CVE-2016-1024, CVE-2016-1025, CVE-2016-1027, CVE-2016-1028, CVE-2016-1029, CVE-2016-1032, and CVE-2016-1033.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127586" comment="flash-player-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127587" comment="flash-player-gnome-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127588" comment="flash-player-kde4-11.2.202.621-2.97.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1027</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-1027" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1027" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1012, CVE-2016-1020, CVE-2016-1021, CVE-2016-1022, CVE-2016-1023, CVE-2016-1024, CVE-2016-1025, CVE-2016-1026, CVE-2016-1028, CVE-2016-1029, CVE-2016-1032, and CVE-2016-1033.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127586" comment="flash-player-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127587" comment="flash-player-gnome-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127588" comment="flash-player-kde4-11.2.202.621-2.97.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1028</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-1028" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1028" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1012, CVE-2016-1020, CVE-2016-1021, CVE-2016-1022, CVE-2016-1023, CVE-2016-1024, CVE-2016-1025, CVE-2016-1026, CVE-2016-1027, CVE-2016-1029, CVE-2016-1032, and CVE-2016-1033.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127586" comment="flash-player-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127587" comment="flash-player-gnome-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127588" comment="flash-player-kde4-11.2.202.621-2.97.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1029</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-1029" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1029" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1012, CVE-2016-1020, CVE-2016-1021, CVE-2016-1022, CVE-2016-1023, CVE-2016-1024, CVE-2016-1025, CVE-2016-1026, CVE-2016-1027, CVE-2016-1028, CVE-2016-1032, and CVE-2016-1033.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127586" comment="flash-player-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127587" comment="flash-player-gnome-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127588" comment="flash-player-kde4-11.2.202.621-2.97.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1030</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-1030" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1030" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to bypass intended access restrictions via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127586" comment="flash-player-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127587" comment="flash-player-gnome-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127588" comment="flash-player-kde4-11.2.202.621-2.97.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1031</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-1031" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1031" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-1011, CVE-2016-1013, CVE-2016-1016, and CVE-2016-1017.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127586" comment="flash-player-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127587" comment="flash-player-gnome-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127588" comment="flash-player-kde4-11.2.202.621-2.97.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1032</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-1032" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1032" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1012, CVE-2016-1020, CVE-2016-1021, CVE-2016-1022, CVE-2016-1023, CVE-2016-1024, CVE-2016-1025, CVE-2016-1026, CVE-2016-1027, CVE-2016-1028, CVE-2016-1029, and CVE-2016-1033.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127586" comment="flash-player-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127587" comment="flash-player-gnome-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127588" comment="flash-player-kde4-11.2.202.621-2.97.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1033</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-1033" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1033" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1012, CVE-2016-1020, CVE-2016-1021, CVE-2016-1022, CVE-2016-1023, CVE-2016-1024, CVE-2016-1025, CVE-2016-1026, CVE-2016-1027, CVE-2016-1028, CVE-2016-1029, and CVE-2016-1032.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127586" comment="flash-player-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127587" comment="flash-player-gnome-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127588" comment="flash-player-kde4-11.2.202.621-2.97.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1234</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1234" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1234" source="CVE"/>
    <description>
    Stack-based buffer overflow in the glob implementation in GNU C Library (aka glibc) before 2.24, when GLOB_ALTDIRFUNC is used, allows context-dependent attackers to cause a denial of service (crash) via a long name.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128518" comment="glibc-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128519" comment="glibc-32bit-2.19-16.25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128520" comment="glibc-devel-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128521" comment="glibc-devel-32bit-2.19-16.25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128522" comment="glibc-devel-static-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128523" comment="glibc-devel-static-32bit-2.19-16.25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128524" comment="glibc-extra-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128525" comment="glibc-html-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128526" comment="glibc-i18ndata-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128527" comment="glibc-info-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128528" comment="glibc-locale-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128529" comment="glibc-locale-32bit-2.19-16.25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128530" comment="glibc-obsolete-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128531" comment="glibc-profile-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128532" comment="glibc-profile-32bit-2.19-16.25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128533" comment="glibc-testsuite-2.19-16.25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128534" comment="glibc-utils-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128535" comment="glibc-utils-32bit-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128536" comment="nscd-2.19-16.25.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1237</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1237" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1237" source="CVE"/>
    <description>
    nfsd in the Linux kernel through 4.6.3 allows local users to bypass intended file-permission restrictions by setting a POSIX ACL, related to nfs2acl.c, nfs3acl.c, and nfs4acl.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133865" comment="bbswitch-0.8-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133866" comment="bbswitch-kmp-default-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133867" comment="bbswitch-kmp-desktop-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133868" comment="bbswitch-kmp-pae-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133869" comment="bbswitch-kmp-xen-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133870" comment="cloop-2.639-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133871" comment="cloop-kmp-default-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133872" comment="cloop-kmp-desktop-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133873" comment="cloop-kmp-pae-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133874" comment="cloop-kmp-xen-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133875" comment="crash-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133876" comment="crash-devel-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133877" comment="crash-doc-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133878" comment="crash-eppic-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133879" comment="crash-gcore-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133880" comment="crash-kmp-default-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133881" comment="crash-kmp-desktop-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133882" comment="crash-kmp-pae-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133883" comment="crash-kmp-xen-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133884" comment="hdjmod-1.28-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133885" comment="hdjmod-kmp-default-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133886" comment="hdjmod-kmp-desktop-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133887" comment="hdjmod-kmp-pae-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133888" comment="hdjmod-kmp-xen-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133889" comment="ipset-6.23-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133890" comment="ipset-devel-6.23-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133891" comment="ipset-kmp-default-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133892" comment="ipset-kmp-desktop-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133893" comment="ipset-kmp-pae-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133894" comment="ipset-kmp-xen-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133895" comment="kernel-debug-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133896" comment="kernel-debug-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133897" comment="kernel-debug-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133898" comment="kernel-default-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133899" comment="kernel-default-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133900" comment="kernel-default-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133901" comment="kernel-desktop-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133902" comment="kernel-desktop-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133903" comment="kernel-desktop-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133904" comment="kernel-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133905" comment="kernel-docs-3.16.7-45.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133906" comment="kernel-ec2-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133907" comment="kernel-ec2-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133908" comment="kernel-ec2-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133909" comment="kernel-macros-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133910" comment="kernel-obs-build-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133911" comment="kernel-obs-qa-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133912" comment="kernel-obs-qa-xen-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133913" comment="kernel-pae-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133914" comment="kernel-pae-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133915" comment="kernel-pae-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133916" comment="kernel-source-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133917" comment="kernel-source-vanilla-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133918" comment="kernel-syms-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133919" comment="kernel-vanilla-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133920" comment="kernel-vanilla-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133921" comment="kernel-xen-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133922" comment="kernel-xen-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133923" comment="kernel-xen-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133924" comment="libipset3-6.23-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133925" comment="pcfclock-0.44-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133926" comment="pcfclock-kmp-default-0.44_k3.16.7_45-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133927" comment="pcfclock-kmp-desktop-0.44_k3.16.7_45-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133928" comment="pcfclock-kmp-pae-0.44_k3.16.7_45-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133929" comment="python-virtualbox-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133930" comment="vhba-kmp-20140629-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133931" comment="vhba-kmp-default-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133932" comment="vhba-kmp-desktop-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133933" comment="vhba-kmp-pae-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133934" comment="vhba-kmp-xen-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133935" comment="virtualbox-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133936" comment="virtualbox-devel-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133937" comment="virtualbox-guest-desktop-icons-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133938" comment="virtualbox-guest-kmp-default-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133939" comment="virtualbox-guest-kmp-desktop-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133940" comment="virtualbox-guest-kmp-pae-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133941" comment="virtualbox-guest-tools-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133942" comment="virtualbox-guest-x11-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133943" comment="virtualbox-host-kmp-default-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133944" comment="virtualbox-host-kmp-desktop-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133945" comment="virtualbox-host-kmp-pae-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133946" comment="virtualbox-host-source-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133947" comment="virtualbox-qt-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133948" comment="virtualbox-websrv-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133949" comment="xen-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133950" comment="xen-devel-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133951" comment="xen-doc-html-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133952" comment="xen-kmp-default-4.4.4_05_k3.16.7_45-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133953" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_45-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133954" comment="xen-libs-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133955" comment="xen-libs-32bit-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133956" comment="xen-tools-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133957" comment="xen-tools-domU-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133958" comment="xtables-addons-2.6-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133959" comment="xtables-addons-kmp-default-2.6_k3.16.7_45-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133960" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_45-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133961" comment="xtables-addons-kmp-pae-2.6_k3.16.7_45-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133962" comment="xtables-addons-kmp-xen-2.6_k3.16.7_45-24.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1245</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1245" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1245" source="CVE"/>
    <description>
    It was discovered that the zebra daemon in Quagga before 1.0.20161017 suffered from a stack-based buffer overflow when processing IPv6 Neighbor Discovery messages. The root cause was relying on BUFSIZ to be compatible with a message size; however, BUFSIZ is system-dependent.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133848" comment="quagga-0.99.23-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133849" comment="quagga-devel-0.99.23-2.12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1248</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1248" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1248" source="CVE"/>
    <description>
    vim before patch 8.0.0056 does not properly validate values for the 'filetype', 'syntax' and 'keymap' options, which may result in the execution of arbitrary code if a file with a specially crafted modeline is opened.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136340" comment="gvim-7.4.461.hg.6253-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136341" comment="vim-7.4.461.hg.6253-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136342" comment="vim-data-7.4.461.hg.6253-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1251</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1251" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1251" source="CVE"/>
    <description>
    There is a vulnerability of type use-after-free affecting DBD::mysql (aka DBD-mysql or the Database Interface (DBI) MySQL driver for Perl) 3.x and 4.x before 4.041 when used with mysql_server_prepare=1.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142382" comment="perl-DBD-mysql-4.021-8.3.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1254</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1254" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1254" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145995" comment="tor-0.2.7.6-29.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1283</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1283" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1283" source="CVE"/>
    <description>
    The pcre_compile2 function in pcre_compile.c in PCRE 8.38 mishandles the /((?:F?+(?:^(?(R)a+\"){99}-))(?J)(?'R'(?'R'&lt;((?'RR'(?'R'\){97)?J)?J)(?'R'(?'R'\){99|(:(?|(?'R')(\k'R')|((?'R')))H'R'R)(H'R))))))/ pattern and related patterns with named subgroups, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135519" comment="libpcre1-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135520" comment="libpcre1-32bit-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135521" comment="libpcre16-0-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135522" comment="libpcre16-0-32bit-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135523" comment="libpcrecpp0-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135524" comment="libpcrecpp0-32bit-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135525" comment="libpcreposix0-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135526" comment="libpcreposix0-32bit-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135527" comment="pcre-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135528" comment="pcre-devel-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135529" comment="pcre-devel-static-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135530" comment="pcre-doc-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135531" comment="pcre-tools-8.39-3.8.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1285</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1285" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1285" source="CVE"/>
    <description>
    named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 does not properly handle DNAME records when parsing fetch reply messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed packet to the rndc (aka control channel) interface, related to alist.c and sexpr.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125199" comment="bind-9.9.6P1-2.19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125200" comment="bind-chrootenv-9.9.6P1-2.19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125201" comment="bind-devel-9.9.6P1-2.19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125202" comment="bind-doc-9.9.6P1-2.19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125203" comment="bind-libs-9.9.6P1-2.19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125204" comment="bind-libs-32bit-9.9.6P1-2.19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125205" comment="bind-lwresd-9.9.6P1-2.19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125206" comment="bind-utils-9.9.6P1-2.19.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1286</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1286" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1286" source="CVE"/>
    <description>
    named in ISC BIND 9.x before 9.9.8-P4 and 9.10.x before 9.10.3-P4 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted signature record for a DNAME record, related to db.c and resolver.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125199" comment="bind-9.9.6P1-2.19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125200" comment="bind-chrootenv-9.9.6P1-2.19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125201" comment="bind-devel-9.9.6P1-2.19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125202" comment="bind-doc-9.9.6P1-2.19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125203" comment="bind-libs-9.9.6P1-2.19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125204" comment="bind-libs-32bit-9.9.6P1-2.19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125205" comment="bind-lwresd-9.9.6P1-2.19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125206" comment="bind-utils-9.9.6P1-2.19.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1494</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1494" source="CVE"/>
    <description>
    The verify function in the RSA package for Python (Python-RSA) before 3.3 allows attackers to spoof signatures with a small public exponent via crafted signature padding, aka a BERserk attack.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121402" comment="python-rsa-3.1.4-2.3.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1521</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1521" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1521" source="CVE"/>
    <description>
    The directrun function in directmachine.cpp in Libgraphite in Graphite 2 1.2.4, as used in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.6.1, does not validate a certain skip operation, which allows remote attackers to execute arbitrary code, obtain sensitive information, or cause a denial of service (out-of-bounds read and application crash) via a crafted Graphite smart font.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124841" comment="graphite2-1.2.4-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124842" comment="graphite2-devel-1.2.4-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124843" comment="libgraphite2-3-1.2.4-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124844" comment="libgraphite2-3-32bit-1.2.4-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1522</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1522" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1522" source="CVE"/>
    <description>
    Code.cpp in Libgraphite in Graphite 2 1.2.4, as used in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.6.1, does not consider recursive load calls during a size check, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly execute arbitrary code via a crafted Graphite smart font.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124841" comment="graphite2-1.2.4-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124842" comment="graphite2-devel-1.2.4-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124843" comment="libgraphite2-3-1.2.4-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124844" comment="libgraphite2-3-32bit-1.2.4-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1523</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1523" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1523" source="CVE"/>
    <description>
    The SillMap::readFace function in FeatureMap.cpp in Libgraphite in Graphite 2 1.2.4, as used in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.6.1, mishandles a return value, which allows remote attackers to cause a denial of service (missing initialization, NULL pointer dereference, and application crash) via a crafted Graphite smart font.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124841" comment="graphite2-1.2.4-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124842" comment="graphite2-devel-1.2.4-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124843" comment="libgraphite2-3-1.2.4-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124844" comment="libgraphite2-3-32bit-1.2.4-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1526</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1526" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1526" source="CVE"/>
    <description>
    The TtfUtil:LocaLookup function in TtfUtil.cpp in Libgraphite in Graphite 2 1.2.4, as used in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.6.1, incorrectly validates a size value, which allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and application crash) via a crafted Graphite smart font.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124841" comment="graphite2-1.2.4-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124842" comment="graphite2-devel-1.2.4-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124843" comment="libgraphite2-3-1.2.4-2.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124844" comment="libgraphite2-3-32bit-1.2.4-2.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1531</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1531" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1531" source="CVE"/>
    <description>
    Exim before 4.86.2, when installed setuid root, allows local users to gain privileges via the perl_startup argument.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124657" comment="exim-4.86.2-3.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124658" comment="eximon-4.86.2-3.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124659" comment="eximstats-html-4.86.2-3.10.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1541</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1541" source="CVE"/>
    <description>
    Heap-based buffer overflow in the zip_read_mac_metadata function in archive_read_support_format_zip.c in libarchive before 3.2.0 allows remote attackers to execute arbitrary code via crafted entry-size values in a ZIP archive.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128356" comment="bsdtar-3.1.2-7.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128357" comment="libarchive-3.1.2-7.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128358" comment="libarchive-devel-3.1.2-7.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128359" comment="libarchive13-3.1.2-7.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128360" comment="libarchive13-32bit-3.1.2-7.8.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1547</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547" source="CVE"/>
    <description>
    An off-path attacker can cause a preemptible client association to be demobilized in NTP 4.2.8p4 and earlier and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 by sending a crypto NAK packet to a victim client with a spoofed source address of an existing associated peer. This is true even if authentication is enabled.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128159" comment="ntp-4.2.8p7-25.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128160" comment="ntp-doc-4.2.8p7-25.15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1548</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1548" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548" source="CVE"/>
    <description>
    An attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches the peer-&gt;dst timestamp recorded for that server. After making this switch, the client in NTP 4.2.8p4 and earlier and NTPSec aa48d001683e5b791a743ec9c575aaf7d867a2b0c will reject all future legitimate server responses. It is possible to force the victim client to move time after the mode has been changed. ntpq gives no indication that the mode has been switched.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128159" comment="ntp-4.2.8p7-25.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128160" comment="ntp-doc-4.2.8p7-25.15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1549</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1549" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1549" source="CVE"/>
    <description>
    A malicious authenticated peer can create arbitrarily-many ephemeral associations in order to win the clock selection algorithm in ntpd in NTP 4.2.8p4 and earlier and NTPsec 3e160db8dc248a0bcb053b56a80167dc742d2b74 and a5fb34b9cc89b92a8fef2f459004865c93bb7f92 and modify a victim's clock.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128159" comment="ntp-4.2.8p7-25.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128160" comment="ntp-doc-4.2.8p7-25.15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1550</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1550" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550" source="CVE"/>
    <description>
    An exploitable vulnerability exists in the message authentication functionality of libntp in ntp 4.2.8p4 and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92. An attacker can send a series of crafted messages to attempt to recover the message digest key.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128159" comment="ntp-4.2.8p7-25.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128160" comment="ntp-doc-4.2.8p7-25.15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1551</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1551" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1551" source="CVE"/>
    <description>
    ntpd in NTP 4.2.8p3 and NTPsec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 relies on the underlying operating system to protect it from requests that impersonate reference clocks. Because reference clocks are treated like other peers and stored in the same structure, any packet with a source ip address of a reference clock (127.127.1.1 for example) that reaches the receive() function will match that reference clock's peer record and will be treated as a trusted peer. Any system that lacks the typical martian packet filtering which would block these packets is in danger of having its time controlled by an attacker.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128159" comment="ntp-4.2.8p7-25.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128160" comment="ntp-doc-4.2.8p7-25.15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1568</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1568" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1568" source="CVE"/>
    <description>
    Use-after-free vulnerability in hw/ide/ahci.c in QEMU, when built with IDE AHCI Emulation support, allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via an invalid AHCI Native Command Queuing (NCQ) AIO command.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126020" comment="xen-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126021" comment="xen-devel-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126022" comment="xen-doc-html-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126023" comment="xen-kmp-default-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126024" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126025" comment="xen-libs-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126026" comment="xen-libs-32bit-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126027" comment="xen-tools-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126028" comment="xen-tools-domU-4.4.4_02-43.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1570</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1570" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1570" source="CVE"/>
    <description>
    The PV superpage functionality in arch/x86/mm.c in Xen 3.4.0, 3.4.1, and 4.1.x through 4.6.x allows local PV guests to obtain sensitive information, cause a denial of service, gain privileges, or have unspecified other impact via a crafted page identifier (MFN) to the (1) MMUEXT_MARK_SUPER or (2) MMUEXT_UNMARK_SUPER sub-op in the HYPERVISOR_mmuext_op hypercall or (3) unknown vectors related to page table updates.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126020" comment="xen-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126021" comment="xen-devel-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126022" comment="xen-doc-html-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126023" comment="xen-kmp-default-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126024" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126025" comment="xen-libs-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126026" comment="xen-libs-32bit-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126027" comment="xen-tools-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126028" comment="xen-tools-domU-4.4.4_02-43.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1571</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1571" source="CVE"/>
    <description>
    The paging_invlpg function in include/asm-x86/paging.h in Xen 3.3.x through 4.6.x, when using shadow mode paging or nested virtualization is enabled, allows local HVM guest users to cause a denial of service (host crash) via a non-canonical guest address in an INVVPID instruction, which triggers a hypervisor bug check.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126020" comment="xen-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126021" comment="xen-devel-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126022" comment="xen-doc-html-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126023" comment="xen-kmp-default-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126024" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126025" comment="xen-libs-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126026" comment="xen-libs-32bit-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126027" comment="xen-tools-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126028" comment="xen-tools-domU-4.4.4_02-43.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1572</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1572" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1572" source="CVE"/>
    <description>
    mount.ecryptfs_private.c in eCryptfs-utils does not validate mount destination filesystem types, which allows local users to gain privileges by mounting over a nonstandard filesystem, as demonstrated by /proc/$pid.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122079" comment="ecryptfs-utils-104-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122080" comment="ecryptfs-utils-32bit-104-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1577</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1577" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1577" source="CVE"/>
    <description>
    Double free vulnerability in the jas_iccattrval_destroy function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted ICC color profile in a JPEG 2000 image file, a different vulnerability than CVE-2014-8137.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135287" comment="jasper-1.900.14-163.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135288" comment="libjasper-devel-1.900.14-163.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135289" comment="libjasper1-1.900.14-163.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135290" comment="libjasper1-32bit-1.900.14-163.24.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1583</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1583" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1583" source="CVE"/>
    <description>
    The ecryptfs_privileged_open function in fs/ecryptfs/kthread.c in the Linux kernel before 4.6.3 allows local users to gain privileges or cause a denial of service (stack memory consumption) via vectors involving crafted mmap calls for /proc pathnames, leading to recursive pagefault handling.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1612</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1612" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1612" source="CVE"/>
    <description>
    The LoadIC::UpdateCaches function in ic/ic.cc in Google V8, as used in Google Chrome before 48.0.2564.82, does not ensure receiver compatibility before performing a cast of an unspecified variable, which allows remote attackers to cause a denial of service or possibly have unknown other impact via crafted JavaScript code.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122193" comment="chromedriver-48.0.2564.82-67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122194" comment="chromium-48.0.2564.82-67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122195" comment="chromium-desktop-gnome-48.0.2564.82-67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122196" comment="chromium-desktop-kde-48.0.2564.82-67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122197" comment="chromium-ffmpegsumo-48.0.2564.82-67.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1613</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1613" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1613" source="CVE"/>
    <description>
    Multiple use-after-free vulnerabilities in the formfiller implementation in PDFium, as used in Google Chrome before 48.0.2564.82, allow remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted PDF document, related to improper tracking of the destruction of (1) IPWL_FocusHandler and (2) IPWL_Provider objects.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122193" comment="chromedriver-48.0.2564.82-67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122194" comment="chromium-48.0.2564.82-67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122195" comment="chromium-desktop-gnome-48.0.2564.82-67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122196" comment="chromium-desktop-kde-48.0.2564.82-67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122197" comment="chromium-ffmpegsumo-48.0.2564.82-67.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1614</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1614" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1614" source="CVE"/>
    <description>
    The UnacceleratedImageBufferSurface class in WebKit/Source/platform/graphics/UnacceleratedImageBufferSurface.cpp in Blink, as used in Google Chrome before 48.0.2564.82, mishandles the initialization mode, which allows remote attackers to obtain sensitive information from process memory via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122193" comment="chromedriver-48.0.2564.82-67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122194" comment="chromium-48.0.2564.82-67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122195" comment="chromium-desktop-gnome-48.0.2564.82-67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122196" comment="chromium-desktop-kde-48.0.2564.82-67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122197" comment="chromium-ffmpegsumo-48.0.2564.82-67.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1615</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1615" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1615" source="CVE"/>
    <description>
    The Omnibox implementation in Google Chrome before 48.0.2564.82 allows remote attackers to spoof a document's origin via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122193" comment="chromedriver-48.0.2564.82-67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122194" comment="chromium-48.0.2564.82-67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122195" comment="chromium-desktop-gnome-48.0.2564.82-67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122196" comment="chromium-desktop-kde-48.0.2564.82-67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122197" comment="chromium-ffmpegsumo-48.0.2564.82-67.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1616</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1616" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1616" source="CVE"/>
    <description>
    The CustomButton::AcceleratorPressed function in ui/views/controls/button/custom_button.cc in Google Chrome before 48.0.2564.82 allows remote attackers to spoof URLs via vectors involving an unfocused custom button.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122193" comment="chromedriver-48.0.2564.82-67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122194" comment="chromium-48.0.2564.82-67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122195" comment="chromium-desktop-gnome-48.0.2564.82-67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122196" comment="chromium-desktop-kde-48.0.2564.82-67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122197" comment="chromium-ffmpegsumo-48.0.2564.82-67.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1617</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1617" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1617" source="CVE"/>
    <description>
    The CSPSource::schemeMatches function in WebKit/Source/core/frame/csp/CSPSource.cpp in the Content Security Policy (CSP) implementation in Blink, as used in Google Chrome before 48.0.2564.82, does not apply http policies to https URLs and does not apply ws policies to wss URLs, which makes it easier for remote attackers to determine whether a specific HSTS web site has been visited by reading a CSP report.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122193" comment="chromedriver-48.0.2564.82-67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122194" comment="chromium-48.0.2564.82-67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122195" comment="chromium-desktop-gnome-48.0.2564.82-67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122196" comment="chromium-desktop-kde-48.0.2564.82-67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122197" comment="chromium-ffmpegsumo-48.0.2564.82-67.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1618</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1618" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1618" source="CVE"/>
    <description>
    Blink, as used in Google Chrome before 48.0.2564.82, does not ensure that a proper cryptographicallyRandomValues random number generator is used, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122193" comment="chromedriver-48.0.2564.82-67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122194" comment="chromium-48.0.2564.82-67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122195" comment="chromium-desktop-gnome-48.0.2564.82-67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122196" comment="chromium-desktop-kde-48.0.2564.82-67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122197" comment="chromium-ffmpegsumo-48.0.2564.82-67.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1619</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1619" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1619" source="CVE"/>
    <description>
    Multiple integer overflows in the (1) sycc422_to_rgb and (2) sycc444_to_rgb functions in fxcodec/codec/fx_codec_jpx_opj.cpp in PDFium, as used in Google Chrome before 48.0.2564.82, allow remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted PDF document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122193" comment="chromedriver-48.0.2564.82-67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122194" comment="chromium-48.0.2564.82-67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122195" comment="chromium-desktop-gnome-48.0.2564.82-67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122196" comment="chromium-desktop-kde-48.0.2564.82-67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122197" comment="chromium-ffmpegsumo-48.0.2564.82-67.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1620</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1620" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1620" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 48.0.2564.82 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122193" comment="chromedriver-48.0.2564.82-67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122194" comment="chromium-48.0.2564.82-67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122195" comment="chromium-desktop-gnome-48.0.2564.82-67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122196" comment="chromium-desktop-kde-48.0.2564.82-67.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122197" comment="chromium-ffmpegsumo-48.0.2564.82-67.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1622</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1622" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1622" source="CVE"/>
    <description>
    The Extensions subsystem in Google Chrome before 48.0.2564.109 does not prevent use of the Object.defineProperty method to override intended extension behavior, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123338" comment="chromedriver-48.0.2564.109-75.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123339" comment="chromium-48.0.2564.109-75.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123340" comment="chromium-desktop-gnome-48.0.2564.109-75.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123341" comment="chromium-desktop-kde-48.0.2564.109-75.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123342" comment="chromium-ffmpegsumo-48.0.2564.109-75.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1623</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1623" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1623" source="CVE"/>
    <description>
    The DOM implementation in Google Chrome before 48.0.2564.109 does not properly restrict frame-attach operations from occurring during or after frame-detach operations, which allows remote attackers to bypass the Same Origin Policy via a crafted web site, related to FrameLoader.cpp, HTMLFrameOwnerElement.h, LocalFrame.cpp, and WebLocalFrameImpl.cpp.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123338" comment="chromedriver-48.0.2564.109-75.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123339" comment="chromium-48.0.2564.109-75.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123340" comment="chromium-desktop-gnome-48.0.2564.109-75.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123341" comment="chromium-desktop-kde-48.0.2564.109-75.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123342" comment="chromium-ffmpegsumo-48.0.2564.109-75.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1624</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1624" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1624" source="CVE"/>
    <description>
    Integer underflow in the ProcessCommandsInternal function in dec/decode.c in Brotli, as used in Google Chrome before 48.0.2564.109, allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted data with brotli compression.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123338" comment="chromedriver-48.0.2564.109-75.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123339" comment="chromium-48.0.2564.109-75.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123340" comment="chromium-desktop-gnome-48.0.2564.109-75.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123341" comment="chromium-desktop-kde-48.0.2564.109-75.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123342" comment="chromium-ffmpegsumo-48.0.2564.109-75.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1625</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1625" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1625" source="CVE"/>
    <description>
    The Chrome Instant feature in Google Chrome before 48.0.2564.109 does not ensure that a New Tab Page (NTP) navigation target is on the most-visited or suggestions list, which allows remote attackers to bypass intended restrictions via unspecified vectors, related to instant_service.cc and search_tab_helper.cc.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123338" comment="chromedriver-48.0.2564.109-75.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123339" comment="chromium-48.0.2564.109-75.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123340" comment="chromium-desktop-gnome-48.0.2564.109-75.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123341" comment="chromium-desktop-kde-48.0.2564.109-75.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123342" comment="chromium-ffmpegsumo-48.0.2564.109-75.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1626</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1626" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1626" source="CVE"/>
    <description>
    The opj_pi_update_decode_poc function in pi.c in OpenJPEG, as used in PDFium in Google Chrome before 48.0.2564.109, miscalculates a certain layer index value, which allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PDF document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123338" comment="chromedriver-48.0.2564.109-75.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123339" comment="chromium-48.0.2564.109-75.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123340" comment="chromium-desktop-gnome-48.0.2564.109-75.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123341" comment="chromium-desktop-kde-48.0.2564.109-75.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123342" comment="chromium-ffmpegsumo-48.0.2564.109-75.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1627</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1627" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1627" source="CVE"/>
    <description>
    The Developer Tools (aka DevTools) subsystem in Google Chrome before 48.0.2564.109 does not validate URL schemes and ensure that the remoteBase parameter is associated with a chrome-devtools-frontend.appspot.com URL, which allows remote attackers to bypass intended access restrictions via a crafted URL, related to browser/devtools/devtools_ui_bindings.cc and WebKit/Source/devtools/front_end/Runtime.js.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123338" comment="chromedriver-48.0.2564.109-75.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123339" comment="chromium-48.0.2564.109-75.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123340" comment="chromium-desktop-gnome-48.0.2564.109-75.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123341" comment="chromium-desktop-kde-48.0.2564.109-75.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123342" comment="chromium-ffmpegsumo-48.0.2564.109-75.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1629</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1629" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1629" source="CVE"/>
    <description>
    Google Chrome before 48.0.2564.116 allows remote attackers to bypass the Blink Same Origin Policy and a sandbox protection mechanism via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123628" comment="chromedriver-48.0.2564.116-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123629" comment="chromium-48.0.2564.116-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123630" comment="chromium-desktop-gnome-48.0.2564.116-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123631" comment="chromium-desktop-kde-48.0.2564.116-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123632" comment="chromium-ffmpegsumo-48.0.2564.116-78.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1630</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1630" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1630" source="CVE"/>
    <description>
    The ContainerNode::parserRemoveChild function in WebKit/Source/core/dom/ContainerNode.cpp in Blink, as used in Google Chrome before 49.0.2623.75, mishandles widget updates, which makes it easier for remote attackers to bypass the Same Origin Policy via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124631" comment="chromedriver-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124632" comment="chromium-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124633" comment="chromium-desktop-gnome-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124634" comment="chromium-desktop-kde-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124635" comment="chromium-ffmpegsumo-49.0.2623.75-81.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1631</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1631" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1631" source="CVE"/>
    <description>
    The PPB_Flash_MessageLoop_Impl::InternalRun function in content/renderer/pepper/ppb_flash_message_loop_impl.cc in the Pepper plugin in Google Chrome before 49.0.2623.75 mishandles nested message loops, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124631" comment="chromedriver-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124632" comment="chromium-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124633" comment="chromium-desktop-gnome-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124634" comment="chromium-desktop-kde-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124635" comment="chromium-ffmpegsumo-49.0.2623.75-81.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1632</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1632" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1632" source="CVE"/>
    <description>
    The Extensions subsystem in Google Chrome before 49.0.2623.75 does not properly maintain own properties, which allows remote attackers to bypass intended access restrictions via crafted JavaScript code that triggers an incorrect cast, related to extensions/renderer/v8_helpers.h and gin/converter.h.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124631" comment="chromedriver-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124632" comment="chromium-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124633" comment="chromium-desktop-gnome-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124634" comment="chromium-desktop-kde-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124635" comment="chromium-ffmpegsumo-49.0.2623.75-81.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1633</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1633" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1633" source="CVE"/>
    <description>
    Use-after-free vulnerability in Blink, as used in Google Chrome before 49.0.2623.75, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124631" comment="chromedriver-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124632" comment="chromium-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124633" comment="chromium-desktop-gnome-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124634" comment="chromium-desktop-kde-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124635" comment="chromium-ffmpegsumo-49.0.2623.75-81.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1634</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1634" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1634" source="CVE"/>
    <description>
    Use-after-free vulnerability in the StyleResolver::appendCSSStyleSheet function in WebKit/Source/core/css/resolver/StyleResolver.cpp in Blink, as used in Google Chrome before 49.0.2623.75, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted web site that triggers Cascading Style Sheets (CSS) style invalidation during a certain subtree-removal action.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124631" comment="chromedriver-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124632" comment="chromium-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124633" comment="chromium-desktop-gnome-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124634" comment="chromium-desktop-kde-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124635" comment="chromium-ffmpegsumo-49.0.2623.75-81.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1635</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1635" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1635" source="CVE"/>
    <description>
    extensions/renderer/render_frame_observer_natives.cc in Google Chrome before 49.0.2623.75 does not properly consider object lifetimes and re-entrancy issues during OnDocumentElementCreated handling, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124631" comment="chromedriver-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124632" comment="chromium-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124633" comment="chromium-desktop-gnome-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124634" comment="chromium-desktop-kde-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124635" comment="chromium-ffmpegsumo-49.0.2623.75-81.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1636</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1636" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1636" source="CVE"/>
    <description>
    The PendingScript::notifyFinished function in WebKit/Source/core/dom/PendingScript.cpp in Google Chrome before 49.0.2623.75 relies on memory-cache information about integrity-check occurrences instead of integrity-check successes, which allows remote attackers to bypass the Subresource Integrity (aka SRI) protection mechanism by triggering two loads of the same resource.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124631" comment="chromedriver-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124632" comment="chromium-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124633" comment="chromium-desktop-gnome-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124634" comment="chromium-desktop-kde-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124635" comment="chromium-ffmpegsumo-49.0.2623.75-81.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1637</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1637" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1637" source="CVE"/>
    <description>
    The SkATan2_255 function in effects/gradients/SkSweepGradient.cpp in Skia, as used in Google Chrome before 49.0.2623.75, mishandles arctangent calculations, which allows remote attackers to obtain sensitive information via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124631" comment="chromedriver-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124632" comment="chromium-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124633" comment="chromium-desktop-gnome-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124634" comment="chromium-desktop-kde-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124635" comment="chromium-ffmpegsumo-49.0.2623.75-81.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1638</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1638" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1638" source="CVE"/>
    <description>
    extensions/renderer/resources/platform_app.js in the Extensions subsystem in Google Chrome before 49.0.2623.75 does not properly restrict use of Web APIs, which allows remote attackers to bypass intended access restrictions via a crafted platform app.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124631" comment="chromedriver-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124632" comment="chromium-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124633" comment="chromium-desktop-gnome-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124634" comment="chromium-desktop-kde-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124635" comment="chromium-ffmpegsumo-49.0.2623.75-81.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1639</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1639" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1639" source="CVE"/>
    <description>
    Use-after-free vulnerability in browser/extensions/api/webrtc_audio_private/webrtc_audio_private_api.cc in the WebRTC Audio Private API implementation in Google Chrome before 49.0.2623.75 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging incorrect reliance on the resource context pointer.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124631" comment="chromedriver-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124632" comment="chromium-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124633" comment="chromium-desktop-gnome-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124634" comment="chromium-desktop-kde-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124635" comment="chromium-ffmpegsumo-49.0.2623.75-81.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1640</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1640" source="CVE"/>
    <description>
    The Web Store inline-installer implementation in the Extensions UI in Google Chrome before 49.0.2623.75 does not block installations upon deletion of an installation frame, which makes it easier for remote attackers to trick a user into believing that an installation request originated from the user's next navigation target via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124631" comment="chromedriver-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124632" comment="chromium-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124633" comment="chromium-desktop-gnome-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124634" comment="chromium-desktop-kde-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124635" comment="chromium-ffmpegsumo-49.0.2623.75-81.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1641</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1641" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1641" source="CVE"/>
    <description>
    Use-after-free vulnerability in content/browser/web_contents/web_contents_impl.cc in Google Chrome before 49.0.2623.75 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering an image download after a certain data structure is deleted, as demonstrated by a favicon.ico download.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124631" comment="chromedriver-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124632" comment="chromium-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124633" comment="chromium-desktop-gnome-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124634" comment="chromium-desktop-kde-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124635" comment="chromium-ffmpegsumo-49.0.2623.75-81.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1642</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1642" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1642" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 49.0.2623.75 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124631" comment="chromedriver-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124632" comment="chromium-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124633" comment="chromium-desktop-gnome-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124634" comment="chromium-desktop-kde-49.0.2623.75-81.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124635" comment="chromium-ffmpegsumo-49.0.2623.75-81.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1643</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1643" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1643" source="CVE"/>
    <description>
    The ImageInputType::ensurePrimaryContent function in WebKit/Source/core/html/forms/ImageInputType.cpp in Blink, as used in Google Chrome before 49.0.2623.87, does not properly maintain the user agent shadow DOM, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage "type confusion."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125139" comment="chromedriver-49.0.2623.87-84.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125140" comment="chromium-49.0.2623.87-84.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125141" comment="chromium-desktop-gnome-49.0.2623.87-84.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125142" comment="chromium-desktop-kde-49.0.2623.87-84.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125143" comment="chromium-ffmpegsumo-49.0.2623.87-84.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1644</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1644" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1644" source="CVE"/>
    <description>
    WebKit/Source/core/layout/LayoutObject.cpp in Blink, as used in Google Chrome before 49.0.2623.87, does not properly restrict relayout scheduling, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted HTML document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125139" comment="chromedriver-49.0.2623.87-84.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125140" comment="chromium-49.0.2623.87-84.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125141" comment="chromium-desktop-gnome-49.0.2623.87-84.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125142" comment="chromium-desktop-kde-49.0.2623.87-84.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125143" comment="chromium-ffmpegsumo-49.0.2623.87-84.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1645</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1645" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1645" source="CVE"/>
    <description>
    Multiple integer signedness errors in the opj_j2k_update_image_data function in j2k.c in OpenJPEG, as used in PDFium in Google Chrome before 49.0.2623.87, allow remote attackers to cause a denial of service (incorrect cast and out-of-bounds write) or possibly have unspecified other impact via crafted JPEG 2000 data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125139" comment="chromedriver-49.0.2623.87-84.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125140" comment="chromium-49.0.2623.87-84.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125141" comment="chromium-desktop-gnome-49.0.2623.87-84.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125142" comment="chromium-desktop-kde-49.0.2623.87-84.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125143" comment="chromium-ffmpegsumo-49.0.2623.87-84.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1646</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1646" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1646" source="CVE"/>
    <description>
    The Array.prototype.concat implementation in builtins.cc in Google V8, as used in Google Chrome before 49.0.2623.108, does not properly consider element data types, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted JavaScript code.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125635" comment="chromedriver-49.0.2623.110-90.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125636" comment="chromium-49.0.2623.110-90.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125637" comment="chromium-desktop-gnome-49.0.2623.110-90.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125638" comment="chromium-desktop-kde-49.0.2623.110-90.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125639" comment="chromium-ffmpegsumo-49.0.2623.110-90.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1647</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1647" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1647" source="CVE"/>
    <description>
    Use-after-free vulnerability in the RenderWidgetHostImpl::Destroy function in content/browser/renderer_host/render_widget_host_impl.cc in the Navigation implementation in Google Chrome before 49.0.2623.108 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125635" comment="chromedriver-49.0.2623.110-90.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125636" comment="chromium-49.0.2623.110-90.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125637" comment="chromium-desktop-gnome-49.0.2623.110-90.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125638" comment="chromium-desktop-kde-49.0.2623.110-90.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125639" comment="chromium-ffmpegsumo-49.0.2623.110-90.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1648</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1648" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1648" source="CVE"/>
    <description>
    Use-after-free vulnerability in the GetLoadTimes function in renderer/loadtimes_extension_bindings.cc in the Extensions implementation in Google Chrome before 49.0.2623.108 allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125635" comment="chromedriver-49.0.2623.110-90.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125636" comment="chromium-49.0.2623.110-90.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125637" comment="chromium-desktop-gnome-49.0.2623.110-90.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125638" comment="chromium-desktop-kde-49.0.2623.110-90.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125639" comment="chromium-ffmpegsumo-49.0.2623.110-90.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1649</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1649" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1649" source="CVE"/>
    <description>
    The Program::getUniformInternal function in Program.cpp in libANGLE, as used in Google Chrome before 49.0.2623.108, does not properly handle a certain data-type mismatch, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted shader stages.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125635" comment="chromedriver-49.0.2623.110-90.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125636" comment="chromium-49.0.2623.110-90.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125637" comment="chromium-desktop-gnome-49.0.2623.110-90.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125638" comment="chromium-desktop-kde-49.0.2623.110-90.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125639" comment="chromium-ffmpegsumo-49.0.2623.110-90.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1650</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1650" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1650" source="CVE"/>
    <description>
    The PageCaptureSaveAsMHTMLFunction::ReturnFailure function in browser/extensions/api/page_capture/page_capture_api.cc in Google Chrome before 49.0.2623.108 allows attackers to cause a denial of service or possibly have unspecified other impact by triggering an error in creating an MHTML document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125635" comment="chromedriver-49.0.2623.110-90.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125636" comment="chromium-49.0.2623.110-90.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125637" comment="chromium-desktop-gnome-49.0.2623.110-90.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125638" comment="chromium-desktop-kde-49.0.2623.110-90.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125639" comment="chromium-ffmpegsumo-49.0.2623.110-90.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1651</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1651" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1651" source="CVE"/>
    <description>
    fxcodec/codec/fx_codec_jpx_opj.cpp in PDFium, as used in Google Chrome before 50.0.2661.75, does not properly implement the sycc420_to_rgb and sycc422_to_rgb functions, which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via crafted JPEG 2000 data in a PDF document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126696" comment="chromedriver-50.0.2661.75-94.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126697" comment="chromium-50.0.2661.75-94.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126698" comment="chromium-desktop-gnome-50.0.2661.75-94.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126699" comment="chromium-desktop-kde-50.0.2661.75-94.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126700" comment="chromium-ffmpegsumo-50.0.2661.75-94.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1652</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1652" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1652" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the ModuleSystem::RequireForJsInner function in extensions/renderer/module_system.cc in the Extensions subsystem in Google Chrome before 50.0.2661.75 allows remote attackers to inject arbitrary web script or HTML via a crafted web site, aka "Universal XSS (UXSS)."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126696" comment="chromedriver-50.0.2661.75-94.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126697" comment="chromium-50.0.2661.75-94.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126698" comment="chromium-desktop-gnome-50.0.2661.75-94.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126699" comment="chromium-desktop-kde-50.0.2661.75-94.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126700" comment="chromium-ffmpegsumo-50.0.2661.75-94.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1653</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1653" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1653" source="CVE"/>
    <description>
    The LoadBuffer implementation in Google V8, as used in Google Chrome before 50.0.2661.75, mishandles data types, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers an out-of-bounds write operation, related to compiler/pipeline.cc and compiler/simplified-lowering.cc.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126696" comment="chromedriver-50.0.2661.75-94.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126697" comment="chromium-50.0.2661.75-94.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126698" comment="chromium-desktop-gnome-50.0.2661.75-94.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126699" comment="chromium-desktop-kde-50.0.2661.75-94.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126700" comment="chromium-ffmpegsumo-50.0.2661.75-94.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1654</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1654" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1654" source="CVE"/>
    <description>
    The media subsystem in Google Chrome before 50.0.2661.75 does not initialize an unspecified data structure, which allows remote attackers to cause a denial of service (invalid read operation) via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126696" comment="chromedriver-50.0.2661.75-94.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126697" comment="chromium-50.0.2661.75-94.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126698" comment="chromium-desktop-gnome-50.0.2661.75-94.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126699" comment="chromium-desktop-kde-50.0.2661.75-94.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126700" comment="chromium-ffmpegsumo-50.0.2661.75-94.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1655</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1655" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1655" source="CVE"/>
    <description>
    Google Chrome before 50.0.2661.75 does not properly consider that frame removal may occur during callback execution, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted extension.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126696" comment="chromedriver-50.0.2661.75-94.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126697" comment="chromium-50.0.2661.75-94.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126698" comment="chromium-desktop-gnome-50.0.2661.75-94.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126699" comment="chromium-desktop-kde-50.0.2661.75-94.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126700" comment="chromium-ffmpegsumo-50.0.2661.75-94.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1656</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1656" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1656" source="CVE"/>
    <description>
    The download implementation in Google Chrome before 50.0.2661.75 on Android allows remote attackers to bypass intended pathname restrictions via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126696" comment="chromedriver-50.0.2661.75-94.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126697" comment="chromium-50.0.2661.75-94.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126698" comment="chromium-desktop-gnome-50.0.2661.75-94.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126699" comment="chromium-desktop-kde-50.0.2661.75-94.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126700" comment="chromium-ffmpegsumo-50.0.2661.75-94.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1657</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1657" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1657" source="CVE"/>
    <description>
    The WebContentsImpl::FocusLocationBarByDefault function in content/browser/web_contents/web_contents_impl.cc in Google Chrome before 50.0.2661.75 mishandles focus for certain about:blank pages, which allows remote attackers to spoof the address bar via a crafted URL.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126696" comment="chromedriver-50.0.2661.75-94.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126697" comment="chromium-50.0.2661.75-94.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126698" comment="chromium-desktop-gnome-50.0.2661.75-94.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126699" comment="chromium-desktop-kde-50.0.2661.75-94.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126700" comment="chromium-ffmpegsumo-50.0.2661.75-94.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1658</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1658" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1658" source="CVE"/>
    <description>
    The Extensions subsystem in Google Chrome before 50.0.2661.75 incorrectly relies on GetOrigin method calls for origin comparisons, which allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted extension.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126696" comment="chromedriver-50.0.2661.75-94.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126697" comment="chromium-50.0.2661.75-94.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126698" comment="chromium-desktop-gnome-50.0.2661.75-94.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126699" comment="chromium-desktop-kde-50.0.2661.75-94.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126700" comment="chromium-ffmpegsumo-50.0.2661.75-94.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1659</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1659" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1659" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 50.0.2661.75 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126696" comment="chromedriver-50.0.2661.75-94.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126697" comment="chromium-50.0.2661.75-94.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126698" comment="chromium-desktop-gnome-50.0.2661.75-94.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126699" comment="chromium-desktop-kde-50.0.2661.75-94.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126700" comment="chromium-ffmpegsumo-50.0.2661.75-94.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1660</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1660" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1660" source="CVE"/>
    <description>
    Blink, as used in Google Chrome before 50.0.2661.94, mishandles assertions in the WTF::BitArray and WTF::double_conversion::Vector classes, which allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127121" comment="chromedriver-50.0.2661.94-97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127122" comment="chromium-50.0.2661.94-97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127123" comment="chromium-desktop-gnome-50.0.2661.94-97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127124" comment="chromium-desktop-kde-50.0.2661.94-97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127125" comment="chromium-ffmpegsumo-50.0.2661.94-97.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1661</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1661" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1661" source="CVE"/>
    <description>
    Blink, as used in Google Chrome before 50.0.2661.94, does not ensure that frames satisfy a check for the same renderer process in addition to a Same Origin Policy check, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted web site, related to BindingSecurity.cpp and DOMWindow.cpp.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127121" comment="chromedriver-50.0.2661.94-97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127122" comment="chromium-50.0.2661.94-97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127123" comment="chromium-desktop-gnome-50.0.2661.94-97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127124" comment="chromium-desktop-kde-50.0.2661.94-97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127125" comment="chromium-ffmpegsumo-50.0.2661.94-97.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1662</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1662" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1662" source="CVE"/>
    <description>
    extensions/renderer/gc_callback.cc in Google Chrome before 50.0.2661.94 does not prevent fallback execution once the Garbage Collection callback has started, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127121" comment="chromedriver-50.0.2661.94-97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127122" comment="chromium-50.0.2661.94-97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127123" comment="chromium-desktop-gnome-50.0.2661.94-97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127124" comment="chromium-desktop-kde-50.0.2661.94-97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127125" comment="chromium-ffmpegsumo-50.0.2661.94-97.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1663</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1663" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1663" source="CVE"/>
    <description>
    The SerializedScriptValue::transferArrayBuffers function in WebKit/Source/bindings/core/v8/SerializedScriptValue.cpp in the V8 bindings in Blink, as used in Google Chrome before 50.0.2661.94, mishandles certain array-buffer data structures, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127121" comment="chromedriver-50.0.2661.94-97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127122" comment="chromium-50.0.2661.94-97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127123" comment="chromium-desktop-gnome-50.0.2661.94-97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127124" comment="chromium-desktop-kde-50.0.2661.94-97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127125" comment="chromium-ffmpegsumo-50.0.2661.94-97.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1664</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1664" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1664" source="CVE"/>
    <description>
    The HistoryController::UpdateForCommit function in content/renderer/history_controller.cc in Google Chrome before 50.0.2661.94 mishandles the interaction between subframe forward navigations and other forward navigations, which allows remote attackers to spoof the address bar via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127121" comment="chromedriver-50.0.2661.94-97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127122" comment="chromium-50.0.2661.94-97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127123" comment="chromium-desktop-gnome-50.0.2661.94-97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127124" comment="chromium-desktop-kde-50.0.2661.94-97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127125" comment="chromium-ffmpegsumo-50.0.2661.94-97.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1665</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1665" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1665" source="CVE"/>
    <description>
    The JSGenericLowering class in compiler/js-generic-lowering.cc in Google V8, as used in Google Chrome before 50.0.2661.94, mishandles comparison operators, which allows remote attackers to obtain sensitive information via crafted JavaScript code.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127121" comment="chromedriver-50.0.2661.94-97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127122" comment="chromium-50.0.2661.94-97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127123" comment="chromium-desktop-gnome-50.0.2661.94-97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127124" comment="chromium-desktop-kde-50.0.2661.94-97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127125" comment="chromium-ffmpegsumo-50.0.2661.94-97.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1666</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1666" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1666" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 50.0.2661.94 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127121" comment="chromedriver-50.0.2661.94-97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127122" comment="chromium-50.0.2661.94-97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127123" comment="chromium-desktop-gnome-50.0.2661.94-97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127124" comment="chromium-desktop-kde-50.0.2661.94-97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127125" comment="chromium-ffmpegsumo-50.0.2661.94-97.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1667</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1667" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1667" source="CVE"/>
    <description>
    The TreeScope::adoptIfNeeded function in WebKit/Source/core/dom/TreeScope.cpp in the DOM implementation in Blink, as used in Google Chrome before 50.0.2661.102, does not prevent script execution during node-adoption operations, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127589" comment="chromedriver-50.0.2661.102-100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127590" comment="chromium-50.0.2661.102-100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127591" comment="chromium-desktop-gnome-50.0.2661.102-100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127592" comment="chromium-desktop-kde-50.0.2661.102-100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127593" comment="chromium-ffmpegsumo-50.0.2661.102-100.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1668</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1668" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1668" source="CVE"/>
    <description>
    The forEachForBinding function in WebKit/Source/bindings/core/v8/Iterable.h in the V8 bindings in Blink, as used in Google Chrome before 50.0.2661.102, uses an improper creation context, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127589" comment="chromedriver-50.0.2661.102-100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127590" comment="chromium-50.0.2661.102-100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127591" comment="chromium-desktop-gnome-50.0.2661.102-100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127592" comment="chromium-desktop-kde-50.0.2661.102-100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127593" comment="chromium-ffmpegsumo-50.0.2661.102-100.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1669</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1669" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1669" source="CVE"/>
    <description>
    The Zone::New function in zone.cc in Google V8 before 5.0.71.47, as used in Google Chrome before 50.0.2661.102, does not properly determine when to expand certain memory allocations, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted JavaScript code.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127589" comment="chromedriver-50.0.2661.102-100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127590" comment="chromium-50.0.2661.102-100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127591" comment="chromium-desktop-gnome-50.0.2661.102-100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127592" comment="chromium-desktop-kde-50.0.2661.102-100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127593" comment="chromium-ffmpegsumo-50.0.2661.102-100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134144" comment="nodejs-4.6.0-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134145" comment="nodejs-devel-4.6.0-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133733" comment="nodejs-doc-4.6.0-24.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1670</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1670" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1670" source="CVE"/>
    <description>
    Race condition in the ResourceDispatcherHostImpl::BeginRequest function in content/browser/loader/resource_dispatcher_host_impl.cc in Google Chrome before 50.0.2661.102 allows remote attackers to make arbitrary HTTP requests by leveraging access to a renderer process and reusing a request ID.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127589" comment="chromedriver-50.0.2661.102-100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127590" comment="chromium-50.0.2661.102-100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127591" comment="chromium-desktop-gnome-50.0.2661.102-100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127592" comment="chromium-desktop-kde-50.0.2661.102-100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127593" comment="chromium-ffmpegsumo-50.0.2661.102-100.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1672</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1672" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1672" source="CVE"/>
    <description>
    The ModuleSystem::RequireForJsInner function in extensions/renderer/module_system.cc in the extension bindings in Google Chrome before 51.0.2704.63 mishandles properties, which allows remote attackers to conduct bindings-interception attacks and bypass the Same Origin Policy via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128405" comment="chromedriver-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128406" comment="chromium-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128407" comment="chromium-desktop-gnome-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128408" comment="chromium-desktop-kde-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128409" comment="chromium-ffmpegsumo-51.0.2704.79-105.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1673</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1673" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1673" source="CVE"/>
    <description>
    Blink, as used in Google Chrome before 51.0.2704.63, allows remote attackers to bypass the Same Origin Policy via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128405" comment="chromedriver-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128406" comment="chromium-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128407" comment="chromium-desktop-gnome-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128408" comment="chromium-desktop-kde-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128409" comment="chromium-ffmpegsumo-51.0.2704.79-105.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1674</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1674" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1674" source="CVE"/>
    <description>
    The extensions subsystem in Google Chrome before 51.0.2704.63 allows remote attackers to bypass the Same Origin Policy via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128405" comment="chromedriver-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128406" comment="chromium-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128407" comment="chromium-desktop-gnome-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128408" comment="chromium-desktop-kde-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128409" comment="chromium-ffmpegsumo-51.0.2704.79-105.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1675</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1675" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1675" source="CVE"/>
    <description>
    Blink, as used in Google Chrome before 51.0.2704.63, allows remote attackers to bypass the Same Origin Policy by leveraging the mishandling of Document reattachment during destruction, related to FrameLoader.cpp and LocalFrame.cpp.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128405" comment="chromedriver-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128406" comment="chromium-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128407" comment="chromium-desktop-gnome-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128408" comment="chromium-desktop-kde-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128409" comment="chromium-ffmpegsumo-51.0.2704.79-105.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1676</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1676" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1676" source="CVE"/>
    <description>
    extensions/renderer/resources/binding.js in the extension bindings in Google Chrome before 51.0.2704.63 does not properly use prototypes, which allows remote attackers to bypass the Same Origin Policy via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128405" comment="chromedriver-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128406" comment="chromium-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128407" comment="chromium-desktop-gnome-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128408" comment="chromium-desktop-kde-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128409" comment="chromium-ffmpegsumo-51.0.2704.79-105.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1677</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1677" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1677" source="CVE"/>
    <description>
    uri.js in Google V8 before 5.1.281.26, as used in Google Chrome before 51.0.2704.63, uses an incorrect array type, which allows remote attackers to obtain sensitive information by calling the decodeURI function and leveraging "type confusion."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128405" comment="chromedriver-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128406" comment="chromium-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128407" comment="chromium-desktop-gnome-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128408" comment="chromium-desktop-kde-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128409" comment="chromium-ffmpegsumo-51.0.2704.79-105.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1678</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1678" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1678" source="CVE"/>
    <description>
    objects.cc in Google V8 before 5.0.71.32, as used in Google Chrome before 51.0.2704.63, does not properly restrict lazy deoptimization, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JavaScript code.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128405" comment="chromedriver-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128406" comment="chromium-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128407" comment="chromium-desktop-gnome-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128408" comment="chromium-desktop-kde-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128409" comment="chromium-ffmpegsumo-51.0.2704.79-105.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1679</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1679" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1679" source="CVE"/>
    <description>
    The ToV8Value function in content/child/v8_value_converter_impl.cc in the V8 bindings in Google Chrome before 51.0.2704.63 does not properly restrict use of getters and setters, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted JavaScript code.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128405" comment="chromedriver-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128406" comment="chromium-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128407" comment="chromium-desktop-gnome-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128408" comment="chromium-desktop-kde-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128409" comment="chromium-ffmpegsumo-51.0.2704.79-105.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1680</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1680" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1680" source="CVE"/>
    <description>
    Use-after-free vulnerability in ports/SkFontHost_FreeType.cpp in Skia, as used in Google Chrome before 51.0.2704.63, allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128405" comment="chromedriver-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128406" comment="chromium-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128407" comment="chromium-desktop-gnome-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128408" comment="chromium-desktop-kde-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128409" comment="chromium-ffmpegsumo-51.0.2704.79-105.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1681</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1681" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1681" source="CVE"/>
    <description>
    Heap-based buffer overflow in the opj_j2k_read_SPCod_SPCoc function in j2k.c in OpenJPEG, as used in PDFium in Google Chrome before 51.0.2704.63, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted PDF document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128405" comment="chromedriver-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128406" comment="chromium-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128407" comment="chromium-desktop-gnome-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128408" comment="chromium-desktop-kde-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128409" comment="chromium-ffmpegsumo-51.0.2704.79-105.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1682</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1682" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1682" source="CVE"/>
    <description>
    The ServiceWorkerContainer::registerServiceWorkerImpl function in WebKit/Source/modules/serviceworkers/ServiceWorkerContainer.cpp in Blink, as used in Google Chrome before 51.0.2704.63, allows remote attackers to bypass the Content Security Policy (CSP) protection mechanism via a ServiceWorker registration.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128405" comment="chromedriver-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128406" comment="chromium-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128407" comment="chromium-desktop-gnome-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128408" comment="chromium-desktop-kde-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128409" comment="chromium-ffmpegsumo-51.0.2704.79-105.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1683</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1683" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1683" source="CVE"/>
    <description>
    numbers.c in libxslt before 1.1.29, as used in Google Chrome before 51.0.2704.63, mishandles namespace nodes, which allows remote attackers to cause a denial of service (out-of-bounds heap memory access) or possibly have unspecified other impact via a crafted document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128405" comment="chromedriver-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128406" comment="chromium-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128407" comment="chromium-desktop-gnome-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128408" comment="chromium-desktop-kde-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128409" comment="chromium-ffmpegsumo-51.0.2704.79-105.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1684</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1684" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1684" source="CVE"/>
    <description>
    numbers.c in libxslt before 1.1.29, as used in Google Chrome before 51.0.2704.63, mishandles the i format token for xsl:number data, which allows remote attackers to cause a denial of service (integer overflow or resource consumption) or possibly have unspecified other impact via a crafted document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128405" comment="chromedriver-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128406" comment="chromium-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128407" comment="chromium-desktop-gnome-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128408" comment="chromium-desktop-kde-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128409" comment="chromium-ffmpegsumo-51.0.2704.79-105.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1685</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1685" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1685" source="CVE"/>
    <description>
    core/fxge/ge/fx_ge_text.cpp in PDFium, as used in Google Chrome before 51.0.2704.63, miscalculates certain index values, which allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PDF document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128405" comment="chromedriver-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128406" comment="chromium-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128407" comment="chromium-desktop-gnome-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128408" comment="chromium-desktop-kde-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128409" comment="chromium-ffmpegsumo-51.0.2704.79-105.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1686</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1686" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1686" source="CVE"/>
    <description>
    The CPDF_DIBSource::CreateDecoder function in core/fpdfapi/fpdf_render/fpdf_render_loadimage.cpp in PDFium, as used in Google Chrome before 51.0.2704.63, mishandles decoder-initialization failure, which allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PDF document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128405" comment="chromedriver-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128406" comment="chromium-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128407" comment="chromium-desktop-gnome-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128408" comment="chromium-desktop-kde-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128409" comment="chromium-ffmpegsumo-51.0.2704.79-105.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1687</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1687" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1687" source="CVE"/>
    <description>
    The renderer implementation in Google Chrome before 51.0.2704.63 does not properly restrict public exposure of classes, which allows remote attackers to obtain sensitive information via vectors related to extensions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128405" comment="chromedriver-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128406" comment="chromium-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128407" comment="chromium-desktop-gnome-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128408" comment="chromium-desktop-kde-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128409" comment="chromium-ffmpegsumo-51.0.2704.79-105.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1688</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1688" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1688" source="CVE"/>
    <description>
    The regexp (aka regular expression) implementation in Google V8 before 5.0.71.40, as used in Google Chrome before 51.0.2704.63, mishandles external string sizes, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted JavaScript code.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128405" comment="chromedriver-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128406" comment="chromium-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128407" comment="chromium-desktop-gnome-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128408" comment="chromium-desktop-kde-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128409" comment="chromium-ffmpegsumo-51.0.2704.79-105.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1689</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1689" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1689" source="CVE"/>
    <description>
    Heap-based buffer overflow in content/renderer/media/canvas_capture_handler.cc in Google Chrome before 51.0.2704.63 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128405" comment="chromedriver-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128406" comment="chromium-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128407" comment="chromium-desktop-gnome-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128408" comment="chromium-desktop-kde-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128409" comment="chromium-ffmpegsumo-51.0.2704.79-105.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1690</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1690" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1690" source="CVE"/>
    <description>
    The Autofill implementation in Google Chrome before 51.0.2704.63 mishandles the interaction between field updates and JavaScript code that triggers a frame deletion, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted web site, a different vulnerability than CVE-2016-1701.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128405" comment="chromedriver-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128406" comment="chromium-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128407" comment="chromium-desktop-gnome-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128408" comment="chromium-desktop-kde-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128409" comment="chromium-ffmpegsumo-51.0.2704.79-105.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1691</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1691" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1691" source="CVE"/>
    <description>
    Skia, as used in Google Chrome before 51.0.2704.63, mishandles coincidence runs, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted curves, related to SkOpCoincidence.cpp and SkPathOpsCommon.cpp.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128405" comment="chromedriver-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128406" comment="chromium-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128407" comment="chromium-desktop-gnome-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128408" comment="chromium-desktop-kde-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128409" comment="chromium-ffmpegsumo-51.0.2704.79-105.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1692</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1692" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1692" source="CVE"/>
    <description>
    WebKit/Source/core/css/StyleSheetContents.cpp in Blink, as used in Google Chrome before 51.0.2704.63, permits cross-origin loading of CSS stylesheets by a ServiceWorker even when the stylesheet download has an incorrect MIME type, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128405" comment="chromedriver-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128406" comment="chromium-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128407" comment="chromium-desktop-gnome-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128408" comment="chromium-desktop-kde-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128409" comment="chromium-ffmpegsumo-51.0.2704.79-105.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1693</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1693" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1693" source="CVE"/>
    <description>
    browser/safe_browsing/srt_field_trial_win.cc in Google Chrome before 51.0.2704.63 does not use the HTTPS service on dl.google.com to obtain the Software Removal Tool, which allows remote attackers to spoof the chrome_cleanup_tool.exe (aka CCT) file via a man-in-the-middle attack on an HTTP session.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128405" comment="chromedriver-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128406" comment="chromium-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128407" comment="chromium-desktop-gnome-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128408" comment="chromium-desktop-kde-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128409" comment="chromium-ffmpegsumo-51.0.2704.79-105.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1694</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1694" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1694" source="CVE"/>
    <description>
    browser/browsing_data/browsing_data_remover.cc in Google Chrome before 51.0.2704.63 deletes HPKP pins during cache clearing, which makes it easier for remote attackers to spoof web sites via a valid certificate from an arbitrary recognized Certification Authority.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128405" comment="chromedriver-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128406" comment="chromium-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128407" comment="chromium-desktop-gnome-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128408" comment="chromium-desktop-kde-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128409" comment="chromium-ffmpegsumo-51.0.2704.79-105.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1695</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1695" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1695" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 51.0.2704.63 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128405" comment="chromedriver-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128406" comment="chromium-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128407" comment="chromium-desktop-gnome-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128408" comment="chromium-desktop-kde-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128409" comment="chromium-ffmpegsumo-51.0.2704.79-105.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1696</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1696" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1696" source="CVE"/>
    <description>
    The extensions subsystem in Google Chrome before 51.0.2704.79 does not properly restrict bindings access, which allows remote attackers to bypass the Same Origin Policy via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128405" comment="chromedriver-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128406" comment="chromium-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128407" comment="chromium-desktop-gnome-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128408" comment="chromium-desktop-kde-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128409" comment="chromium-ffmpegsumo-51.0.2704.79-105.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1697</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1697" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1697" source="CVE"/>
    <description>
    The FrameLoader::startLoad function in WebKit/Source/core/loader/FrameLoader.cpp in Blink, as used in Google Chrome before 51.0.2704.79, does not prevent frame navigations during DocumentLoader detach operations, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128405" comment="chromedriver-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128406" comment="chromium-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128407" comment="chromium-desktop-gnome-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128408" comment="chromium-desktop-kde-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128409" comment="chromium-ffmpegsumo-51.0.2704.79-105.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1698</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1698" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1698" source="CVE"/>
    <description>
    The createCustomType function in extensions/renderer/resources/binding.js in the extension bindings in Google Chrome before 51.0.2704.79 does not validate module types, which might allow attackers to load arbitrary modules or obtain sensitive information by leveraging a poisoned definition.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128405" comment="chromedriver-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128406" comment="chromium-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128407" comment="chromium-desktop-gnome-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128408" comment="chromium-desktop-kde-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128409" comment="chromium-ffmpegsumo-51.0.2704.79-105.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1699</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1699" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1699" source="CVE"/>
    <description>
    WebKit/Source/devtools/front_end/devtools.js in the Developer Tools (aka DevTools) subsystem in Blink, as used in Google Chrome before 51.0.2704.79, does not ensure that the remoteFrontendUrl parameter is associated with a chrome-devtools-frontend.appspot.com URL, which allows remote attackers to bypass intended access restrictions via a crafted URL.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128405" comment="chromedriver-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128406" comment="chromium-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128407" comment="chromium-desktop-gnome-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128408" comment="chromium-desktop-kde-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128409" comment="chromium-ffmpegsumo-51.0.2704.79-105.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1700</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1700" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1700" source="CVE"/>
    <description>
    extensions/renderer/runtime_custom_bindings.cc in Google Chrome before 51.0.2704.79 does not consider side effects during creation of an array of extension views, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via vectors related to extensions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128405" comment="chromedriver-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128406" comment="chromium-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128407" comment="chromium-desktop-gnome-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128408" comment="chromium-desktop-kde-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128409" comment="chromium-ffmpegsumo-51.0.2704.79-105.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1701</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1701" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1701" source="CVE"/>
    <description>
    The Autofill implementation in Google Chrome before 51.0.2704.79 mishandles the interaction between field updates and JavaScript code that triggers a frame deletion, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted web site, a different vulnerability than CVE-2016-1690.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128405" comment="chromedriver-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128406" comment="chromium-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128407" comment="chromium-desktop-gnome-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128408" comment="chromium-desktop-kde-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128409" comment="chromium-ffmpegsumo-51.0.2704.79-105.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1702</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1702" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1702" source="CVE"/>
    <description>
    The SkRegion::readFromMemory function in core/SkRegion.cpp in Skia, as used in Google Chrome before 51.0.2704.79, does not validate the interval count, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted serialized data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128405" comment="chromedriver-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128406" comment="chromium-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128407" comment="chromium-desktop-gnome-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128408" comment="chromium-desktop-kde-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128409" comment="chromium-ffmpegsumo-51.0.2704.79-105.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1703</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1703" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1703" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 51.0.2704.79 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128405" comment="chromedriver-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128406" comment="chromium-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128407" comment="chromium-desktop-gnome-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128408" comment="chromium-desktop-kde-51.0.2704.79-105.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128409" comment="chromium-ffmpegsumo-51.0.2704.79-105.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1704</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1704" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1704" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 51.0.2704.103 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129009" comment="chromedriver-51.0.2704.103-108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129010" comment="chromium-51.0.2704.103-108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129011" comment="chromium-desktop-gnome-51.0.2704.103-108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129012" comment="chromium-desktop-kde-51.0.2704.103-108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129013" comment="chromium-ffmpegsumo-51.0.2704.103-108.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1705</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1705" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1705" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 52.0.2743.82 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130660" comment="chromedriver-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130661" comment="chromium-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130662" comment="chromium-desktop-gnome-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130663" comment="chromium-desktop-kde-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130664" comment="chromium-ffmpegsumo-52.0.2743.82-111.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1706</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1706" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1706" source="CVE"/>
    <description>
    The PPAPI implementation in Google Chrome before 52.0.2743.82 does not validate the origin of IPC messages to the plugin broker process that should have come from the browser process, which allows remote attackers to bypass a sandbox protection mechanism via an unexpected message type, related to broker_process_dispatcher.cc, ppapi_plugin_process_host.cc, ppapi_thread.cc, and render_frame_message_filter.cc.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130660" comment="chromedriver-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130661" comment="chromium-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130662" comment="chromium-desktop-gnome-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130663" comment="chromium-desktop-kde-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130664" comment="chromium-ffmpegsumo-52.0.2743.82-111.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1707</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1707" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1707" source="CVE"/>
    <description>
    ios/web/web_state/ui/crw_web_controller.mm in Google Chrome before 52.0.2743.82 on iOS does not ensure that an invalid URL is replaced with the about:blank URL, which allows remote attackers to spoof the URL display via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130660" comment="chromedriver-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130661" comment="chromium-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130662" comment="chromium-desktop-gnome-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130663" comment="chromium-desktop-kde-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130664" comment="chromium-ffmpegsumo-52.0.2743.82-111.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1708</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1708" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1708" source="CVE"/>
    <description>
    The Chrome Web Store inline-installation implementation in the Extensions subsystem in Google Chrome before 52.0.2743.82 does not properly consider object lifetimes during progress observation, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130660" comment="chromedriver-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130661" comment="chromium-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130662" comment="chromium-desktop-gnome-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130663" comment="chromium-desktop-kde-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130664" comment="chromium-ffmpegsumo-52.0.2743.82-111.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1709</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1709" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1709" source="CVE"/>
    <description>
    Heap-based buffer overflow in the ByteArray::Get method in data/byte_array.cc in Google sfntly before 2016-06-10, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted SFNT font.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130660" comment="chromedriver-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130661" comment="chromium-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130662" comment="chromium-desktop-gnome-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130663" comment="chromium-desktop-kde-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130664" comment="chromium-ffmpegsumo-52.0.2743.82-111.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1710</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1710" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1710" source="CVE"/>
    <description>
    The ChromeClientImpl::createWindow method in WebKit/Source/web/ChromeClientImpl.cpp in Blink, as used in Google Chrome before 52.0.2743.82, does not prevent window creation by a deferred frame, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130660" comment="chromedriver-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130661" comment="chromium-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130662" comment="chromium-desktop-gnome-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130663" comment="chromium-desktop-kde-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130664" comment="chromium-ffmpegsumo-52.0.2743.82-111.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1711</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1711" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1711" source="CVE"/>
    <description>
    WebKit/Source/core/loader/FrameLoader.cpp in Blink, as used in Google Chrome before 52.0.2743.82, does not disable frame navigation during a detach operation on a DocumentLoader object, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130660" comment="chromedriver-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130661" comment="chromium-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130662" comment="chromium-desktop-gnome-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130663" comment="chromium-desktop-kde-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130664" comment="chromium-ffmpegsumo-52.0.2743.82-111.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1714</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1714" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714" source="CVE"/>
    <description>
    The (1) fw_cfg_write and (2) fw_cfg_read functions in hw/nvram/fw_cfg.c in QEMU before 2.4, when built with the Firmware Configuration device emulation support, allow guest OS users with the CAP_SYS_RAWIO privilege to cause a denial of service (out-of-bounds read or write access and process crash) or possibly execute arbitrary code via an invalid current entry value in a firmware configuration.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126020" comment="xen-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126021" comment="xen-devel-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126022" comment="xen-doc-html-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126023" comment="xen-kmp-default-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126024" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126025" comment="xen-libs-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126026" comment="xen-libs-32bit-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126027" comment="xen-tools-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126028" comment="xen-tools-domU-4.4.4_02-43.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1762</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1762" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1762" source="CVE"/>
    <description>
    The xmlNextChar function in libxml2 before 2.9.4 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128921" comment="libxml2-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128922" comment="libxml2-2-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128923" comment="libxml2-2-32bit-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128924" comment="libxml2-devel-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128925" comment="libxml2-devel-32bit-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128926" comment="libxml2-doc-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128927" comment="libxml2-tools-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128928" comment="python-libxml2-2.9.4-7.17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1833</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1833" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1833" source="CVE"/>
    <description>
    The htmlCurrentChar function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128921" comment="libxml2-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128922" comment="libxml2-2-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128923" comment="libxml2-2-32bit-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128924" comment="libxml2-devel-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128925" comment="libxml2-devel-32bit-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128926" comment="libxml2-doc-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128927" comment="libxml2-tools-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128928" comment="python-libxml2-2.9.4-7.17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1834</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1834" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1834" source="CVE"/>
    <description>
    Heap-based buffer overflow in the xmlStrncat function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128921" comment="libxml2-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128922" comment="libxml2-2-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128923" comment="libxml2-2-32bit-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128924" comment="libxml2-devel-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128925" comment="libxml2-devel-32bit-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128926" comment="libxml2-doc-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128927" comment="libxml2-tools-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128928" comment="python-libxml2-2.9.4-7.17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1835</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1835" source="CVE"/>
    <description>
    Use-after-free vulnerability in the xmlSAX2AttributeNs function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2 and OS X before 10.11.5, allows remote attackers to cause a denial of service via a crafted XML document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128921" comment="libxml2-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128922" comment="libxml2-2-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128923" comment="libxml2-2-32bit-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128924" comment="libxml2-devel-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128925" comment="libxml2-devel-32bit-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128926" comment="libxml2-doc-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128927" comment="libxml2-tools-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128928" comment="python-libxml2-2.9.4-7.17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1836</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1836" source="CVE"/>
    <description>
    Use-after-free vulnerability in the xmlDictComputeFastKey function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service via a crafted XML document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128921" comment="libxml2-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128922" comment="libxml2-2-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128923" comment="libxml2-2-32bit-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128924" comment="libxml2-devel-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128925" comment="libxml2-devel-32bit-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128926" comment="libxml2-doc-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128927" comment="libxml2-tools-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128928" comment="python-libxml2-2.9.4-7.17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1837</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1837" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1837" source="CVE"/>
    <description>
    Multiple use-after-free vulnerabilities in the (1) htmlPArsePubidLiteral and (2) htmlParseSystemiteral functions in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allow remote attackers to cause a denial of service via a crafted XML document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128921" comment="libxml2-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128922" comment="libxml2-2-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128923" comment="libxml2-2-32bit-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128924" comment="libxml2-devel-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128925" comment="libxml2-devel-32bit-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128926" comment="libxml2-doc-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128927" comment="libxml2-tools-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128928" comment="python-libxml2-2.9.4-7.17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1838</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1838" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1838" source="CVE"/>
    <description>
    The xmlPArserPrintFileContextInternal function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128921" comment="libxml2-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128922" comment="libxml2-2-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128923" comment="libxml2-2-32bit-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128924" comment="libxml2-devel-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128925" comment="libxml2-devel-32bit-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128926" comment="libxml2-doc-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128927" comment="libxml2-tools-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128928" comment="python-libxml2-2.9.4-7.17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1839</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1839" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1839" source="CVE"/>
    <description>
    The xmlDictAddString function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128921" comment="libxml2-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128922" comment="libxml2-2-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128923" comment="libxml2-2-32bit-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128924" comment="libxml2-devel-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128925" comment="libxml2-devel-32bit-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128926" comment="libxml2-doc-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128927" comment="libxml2-tools-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128928" comment="python-libxml2-2.9.4-7.17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1840</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1840" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1840" source="CVE"/>
    <description>
    Heap-based buffer overflow in the xmlFAParsePosCharGroup function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128921" comment="libxml2-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128922" comment="libxml2-2-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128923" comment="libxml2-2-32bit-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128924" comment="libxml2-devel-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128925" comment="libxml2-devel-32bit-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128926" comment="libxml2-doc-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128927" comment="libxml2-tools-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128928" comment="python-libxml2-2.9.4-7.17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1867</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1867" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1867" source="CVE"/>
    <description>
    The jpc_pi_nextcprl function in JasPer 1.900.1 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG 2000 image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122017" comment="jasper-1.900.1-163.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122018" comment="libjasper-devel-1.900.1-163.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122019" comment="libjasper1-1.900.1-163.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122020" comment="libjasper1-32bit-1.900.1-163.16.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1899</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1899" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1899" source="CVE"/>
    <description>
    CRLF injection vulnerability in the ui-blob handler in CGit before 0.12 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks or cross-site scripting (XSS) attacks via CRLF sequences in the mimetype parameter, as demonstrated by a request to blob/cgit.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121940" comment="cgit-0.12-13.6.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1900</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1900" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1900" source="CVE"/>
    <description>
    CRLF injection vulnerability in the cgit_print_http_headers function in ui-shared.c in CGit before 0.12 allows remote attackers with permission to write to a repository to inject arbitrary HTTP headers and conduct HTTP response splitting attacks or cross-site scripting (XSS) attacks via newline characters in a filename.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121940" comment="cgit-0.12-13.6.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1901</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1901" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1901" source="CVE"/>
    <description>
    Integer overflow in the authenticate_post function in CGit before 0.12 allows remote attackers to have unspecified impact via a large value in the Content-Length HTTP header, which triggers a buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009121940" comment="cgit-0.12-13.6.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1903</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1903" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1903" source="CVE"/>
    <description>
    The gdImageRotateInterpolated function in ext/gd/libgd/gd_interpolation.c in PHP before 5.5.31, 5.6.x before 5.6.17, and 7.x before 7.0.2 allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and application crash) via a large bgd_color argument to the imagerotate function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122130" comment="apache2-mod_php5-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122131" comment="php5-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122132" comment="php5-bcmath-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122133" comment="php5-bz2-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122134" comment="php5-calendar-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122135" comment="php5-ctype-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122136" comment="php5-curl-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122137" comment="php5-dba-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122138" comment="php5-devel-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122139" comment="php5-dom-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122140" comment="php5-enchant-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122141" comment="php5-exif-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122142" comment="php5-fastcgi-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122143" comment="php5-fileinfo-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122144" comment="php5-firebird-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122145" comment="php5-fpm-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122146" comment="php5-ftp-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122147" comment="php5-gd-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122148" comment="php5-gettext-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122149" comment="php5-gmp-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122150" comment="php5-iconv-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122151" comment="php5-imap-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122152" comment="php5-intl-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122153" comment="php5-json-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122154" comment="php5-ldap-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122155" comment="php5-mbstring-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122156" comment="php5-mcrypt-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122157" comment="php5-mssql-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122158" comment="php5-mysql-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122159" comment="php5-odbc-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122160" comment="php5-opcache-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122161" comment="php5-openssl-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122162" comment="php5-pcntl-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122163" comment="php5-pdo-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122164" comment="php5-pear-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122165" comment="php5-pgsql-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122166" comment="php5-phar-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122167" comment="php5-posix-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122168" comment="php5-pspell-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122169" comment="php5-readline-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122170" comment="php5-shmop-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122171" comment="php5-snmp-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122172" comment="php5-soap-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122173" comment="php5-sockets-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122174" comment="php5-sqlite-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122175" comment="php5-suhosin-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122176" comment="php5-sysvmsg-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122177" comment="php5-sysvsem-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122178" comment="php5-sysvshm-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122179" comment="php5-tidy-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122180" comment="php5-tokenizer-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122181" comment="php5-wddx-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122182" comment="php5-xmlreader-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122183" comment="php5-xmlrpc-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122184" comment="php5-xmlwriter-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122185" comment="php5-xsl-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122186" comment="php5-zip-5.6.1-39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122187" comment="php5-zlib-5.6.1-39.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1927</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1927" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1927" source="CVE"/>
    <description>
    The suggestPassword function in js/functions.js in phpMyAdmin 4.0.x before 4.0.10.13, 4.4.x before 4.4.15.3, and 4.5.x before 4.5.4 relies on the Math.random JavaScript function, which makes it easier for remote attackers to guess passwords via a brute-force approach.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122925" comment="phpMyAdmin-4.4.15.4-27.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1930</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1930" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1930" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 44.0 and Firefox ESR 38.x before 38.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122727" comment="MozillaFirefox-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122728" comment="MozillaFirefox-branding-upstream-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122729" comment="MozillaFirefox-buildsymbols-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122730" comment="MozillaFirefox-devel-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122731" comment="MozillaFirefox-translations-common-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122732" comment="MozillaFirefox-translations-other-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123343" comment="MozillaThunderbird-38.6.0-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123344" comment="MozillaThunderbird-buildsymbols-38.6.0-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123345" comment="MozillaThunderbird-devel-38.6.0-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123346" comment="MozillaThunderbird-translations-common-38.6.0-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123347" comment="MozillaThunderbird-translations-other-38.6.0-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122733" comment="libfreebl3-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122734" comment="libfreebl3-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122735" comment="libsoftokn3-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122736" comment="libsoftokn3-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122737" comment="mozilla-nspr-4.11-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122738" comment="mozilla-nspr-32bit-4.11-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122739" comment="mozilla-nspr-devel-4.11-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122740" comment="mozilla-nss-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122741" comment="mozilla-nss-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122742" comment="mozilla-nss-certs-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122743" comment="mozilla-nss-certs-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122744" comment="mozilla-nss-devel-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122745" comment="mozilla-nss-sysinit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122746" comment="mozilla-nss-sysinit-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122747" comment="mozilla-nss-tools-3.21-25.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1931</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1931" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1931" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 44.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to uninitialized memory encountered during brotli data compression, and other vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122727" comment="MozillaFirefox-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122728" comment="MozillaFirefox-branding-upstream-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122729" comment="MozillaFirefox-buildsymbols-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122730" comment="MozillaFirefox-devel-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122731" comment="MozillaFirefox-translations-common-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122732" comment="MozillaFirefox-translations-other-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122733" comment="libfreebl3-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122734" comment="libfreebl3-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122735" comment="libsoftokn3-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122736" comment="libsoftokn3-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122737" comment="mozilla-nspr-4.11-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122738" comment="mozilla-nspr-32bit-4.11-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122739" comment="mozilla-nspr-devel-4.11-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122740" comment="mozilla-nss-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122741" comment="mozilla-nss-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122742" comment="mozilla-nss-certs-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122743" comment="mozilla-nss-certs-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122744" comment="mozilla-nss-devel-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122745" comment="mozilla-nss-sysinit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122746" comment="mozilla-nss-sysinit-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122747" comment="mozilla-nss-tools-3.21-25.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1933</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1933" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1933" source="CVE"/>
    <description>
    Integer overflow in the image-deinterlacing functionality in Mozilla Firefox before 44.0 allows remote attackers to cause a denial of service (memory consumption or application crash) via a crafted GIF image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122727" comment="MozillaFirefox-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122728" comment="MozillaFirefox-branding-upstream-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122729" comment="MozillaFirefox-buildsymbols-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122730" comment="MozillaFirefox-devel-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122731" comment="MozillaFirefox-translations-common-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122732" comment="MozillaFirefox-translations-other-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122733" comment="libfreebl3-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122734" comment="libfreebl3-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122735" comment="libsoftokn3-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122736" comment="libsoftokn3-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122737" comment="mozilla-nspr-4.11-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122738" comment="mozilla-nspr-32bit-4.11-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122739" comment="mozilla-nspr-devel-4.11-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122740" comment="mozilla-nss-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122741" comment="mozilla-nss-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122742" comment="mozilla-nss-certs-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122743" comment="mozilla-nss-certs-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122744" comment="mozilla-nss-devel-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122745" comment="mozilla-nss-sysinit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122746" comment="mozilla-nss-sysinit-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122747" comment="mozilla-nss-tools-3.21-25.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1935</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1935" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1935" source="CVE"/>
    <description>
    Buffer overflow in the BufferSubData function in Mozilla Firefox before 44.0 and Firefox ESR 38.x before 38.6 allows remote attackers to execute arbitrary code via crafted WebGL content.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122727" comment="MozillaFirefox-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122728" comment="MozillaFirefox-branding-upstream-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122729" comment="MozillaFirefox-buildsymbols-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122730" comment="MozillaFirefox-devel-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122731" comment="MozillaFirefox-translations-common-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122732" comment="MozillaFirefox-translations-other-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123343" comment="MozillaThunderbird-38.6.0-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123344" comment="MozillaThunderbird-buildsymbols-38.6.0-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123345" comment="MozillaThunderbird-devel-38.6.0-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123346" comment="MozillaThunderbird-translations-common-38.6.0-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123347" comment="MozillaThunderbird-translations-other-38.6.0-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122733" comment="libfreebl3-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122734" comment="libfreebl3-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122735" comment="libsoftokn3-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122736" comment="libsoftokn3-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122737" comment="mozilla-nspr-4.11-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122738" comment="mozilla-nspr-32bit-4.11-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122739" comment="mozilla-nspr-devel-4.11-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122740" comment="mozilla-nss-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122741" comment="mozilla-nss-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122742" comment="mozilla-nss-certs-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122743" comment="mozilla-nss-certs-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122744" comment="mozilla-nss-devel-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122745" comment="mozilla-nss-sysinit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122746" comment="mozilla-nss-sysinit-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122747" comment="mozilla-nss-tools-3.21-25.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1937</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1937" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1937" source="CVE"/>
    <description>
    The protocol-handler dialog in Mozilla Firefox before 44.0 allows remote attackers to conduct clickjacking attacks via a crafted web site that triggers a single-click action in a situation where a double-click action was intended.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122727" comment="MozillaFirefox-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122728" comment="MozillaFirefox-branding-upstream-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122729" comment="MozillaFirefox-buildsymbols-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122730" comment="MozillaFirefox-devel-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122731" comment="MozillaFirefox-translations-common-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122732" comment="MozillaFirefox-translations-other-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122733" comment="libfreebl3-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122734" comment="libfreebl3-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122735" comment="libsoftokn3-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122736" comment="libsoftokn3-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122737" comment="mozilla-nspr-4.11-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122738" comment="mozilla-nspr-32bit-4.11-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122739" comment="mozilla-nspr-devel-4.11-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122740" comment="mozilla-nss-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122741" comment="mozilla-nss-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122742" comment="mozilla-nss-certs-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122743" comment="mozilla-nss-certs-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122744" comment="mozilla-nss-devel-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122745" comment="mozilla-nss-sysinit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122746" comment="mozilla-nss-sysinit-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122747" comment="mozilla-nss-tools-3.21-25.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1938</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1938" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1938" source="CVE"/>
    <description>
    The s_mp_div function in lib/freebl/mpi/mpi.c in Mozilla Network Security Services (NSS) before 3.21, as used in Mozilla Firefox before 44.0, improperly divides numbers, which might make it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging use of the (1) mp_div or (2) mp_exptmod function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122727" comment="MozillaFirefox-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122728" comment="MozillaFirefox-branding-upstream-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122729" comment="MozillaFirefox-buildsymbols-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122730" comment="MozillaFirefox-devel-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122731" comment="MozillaFirefox-translations-common-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122732" comment="MozillaFirefox-translations-other-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122733" comment="libfreebl3-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122734" comment="libfreebl3-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122735" comment="libsoftokn3-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122736" comment="libsoftokn3-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122737" comment="mozilla-nspr-4.11-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122738" comment="mozilla-nspr-32bit-4.11-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122739" comment="mozilla-nspr-devel-4.11-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122740" comment="mozilla-nss-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122741" comment="mozilla-nss-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122742" comment="mozilla-nss-certs-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122743" comment="mozilla-nss-certs-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122744" comment="mozilla-nss-devel-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122745" comment="mozilla-nss-sysinit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122746" comment="mozilla-nss-sysinit-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122747" comment="mozilla-nss-tools-3.21-25.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1939</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1939" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1939" source="CVE"/>
    <description>
    Mozilla Firefox before 44.0 stores cookies with names containing vertical tab characters, which allows remote attackers to obtain sensitive information by reading HTTP Cookie headers.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-7208.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122727" comment="MozillaFirefox-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122728" comment="MozillaFirefox-branding-upstream-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122729" comment="MozillaFirefox-buildsymbols-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122730" comment="MozillaFirefox-devel-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122731" comment="MozillaFirefox-translations-common-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122732" comment="MozillaFirefox-translations-other-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122733" comment="libfreebl3-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122734" comment="libfreebl3-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122735" comment="libsoftokn3-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122736" comment="libsoftokn3-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122737" comment="mozilla-nspr-4.11-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122738" comment="mozilla-nspr-32bit-4.11-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122739" comment="mozilla-nspr-devel-4.11-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122740" comment="mozilla-nss-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122741" comment="mozilla-nss-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122742" comment="mozilla-nss-certs-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122743" comment="mozilla-nss-certs-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122744" comment="mozilla-nss-devel-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122745" comment="mozilla-nss-sysinit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122746" comment="mozilla-nss-sysinit-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122747" comment="mozilla-nss-tools-3.21-25.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1942</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1942" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1942" source="CVE"/>
    <description>
    Mozilla Firefox before 44.0 allows user-assisted remote attackers to spoof a trailing substring in the address bar by leveraging a user's paste of a (1) wyciwyg: URI or (2) resource: URI.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122727" comment="MozillaFirefox-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122728" comment="MozillaFirefox-branding-upstream-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122729" comment="MozillaFirefox-buildsymbols-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122730" comment="MozillaFirefox-devel-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122731" comment="MozillaFirefox-translations-common-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122732" comment="MozillaFirefox-translations-other-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122733" comment="libfreebl3-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122734" comment="libfreebl3-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122735" comment="libsoftokn3-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122736" comment="libsoftokn3-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122737" comment="mozilla-nspr-4.11-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122738" comment="mozilla-nspr-32bit-4.11-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122739" comment="mozilla-nspr-devel-4.11-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122740" comment="mozilla-nss-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122741" comment="mozilla-nss-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122742" comment="mozilla-nss-certs-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122743" comment="mozilla-nss-certs-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122744" comment="mozilla-nss-devel-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122745" comment="mozilla-nss-sysinit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122746" comment="mozilla-nss-sysinit-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122747" comment="mozilla-nss-tools-3.21-25.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161943" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1943</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1943" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1943" source="CVE"/>
    <description>
    Mozilla Firefox before 44.0 on Android allows remote attackers to spoof the address bar via the scrollTo method.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122727" comment="MozillaFirefox-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122728" comment="MozillaFirefox-branding-upstream-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122729" comment="MozillaFirefox-buildsymbols-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122730" comment="MozillaFirefox-devel-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122731" comment="MozillaFirefox-translations-common-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122732" comment="MozillaFirefox-translations-other-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122733" comment="libfreebl3-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122734" comment="libfreebl3-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122735" comment="libsoftokn3-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122736" comment="libsoftokn3-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122737" comment="mozilla-nspr-4.11-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122738" comment="mozilla-nspr-32bit-4.11-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122739" comment="mozilla-nspr-devel-4.11-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122740" comment="mozilla-nss-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122741" comment="mozilla-nss-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122742" comment="mozilla-nss-certs-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122743" comment="mozilla-nss-certs-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122744" comment="mozilla-nss-devel-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122745" comment="mozilla-nss-sysinit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122746" comment="mozilla-nss-sysinit-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122747" comment="mozilla-nss-tools-3.21-25.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1944</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1944" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1944" source="CVE"/>
    <description>
    The Buffer11::NativeBuffer11::map function in ANGLE, as used in Mozilla Firefox before 44.0, might allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122727" comment="MozillaFirefox-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122728" comment="MozillaFirefox-branding-upstream-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122729" comment="MozillaFirefox-buildsymbols-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122730" comment="MozillaFirefox-devel-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122731" comment="MozillaFirefox-translations-common-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122732" comment="MozillaFirefox-translations-other-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122733" comment="libfreebl3-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122734" comment="libfreebl3-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122735" comment="libsoftokn3-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122736" comment="libsoftokn3-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122737" comment="mozilla-nspr-4.11-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122738" comment="mozilla-nspr-32bit-4.11-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122739" comment="mozilla-nspr-devel-4.11-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122740" comment="mozilla-nss-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122741" comment="mozilla-nss-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122742" comment="mozilla-nss-certs-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122743" comment="mozilla-nss-certs-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122744" comment="mozilla-nss-devel-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122745" comment="mozilla-nss-sysinit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122746" comment="mozilla-nss-sysinit-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122747" comment="mozilla-nss-tools-3.21-25.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1945</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1945" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1945" source="CVE"/>
    <description>
    The nsZipArchive function in Mozilla Firefox before 44.0 might allow remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging incorrect use of a pointer during processing of a ZIP archive.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122727" comment="MozillaFirefox-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122728" comment="MozillaFirefox-branding-upstream-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122729" comment="MozillaFirefox-buildsymbols-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122730" comment="MozillaFirefox-devel-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122731" comment="MozillaFirefox-translations-common-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122732" comment="MozillaFirefox-translations-other-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122733" comment="libfreebl3-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122734" comment="libfreebl3-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122735" comment="libsoftokn3-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122736" comment="libsoftokn3-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122737" comment="mozilla-nspr-4.11-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122738" comment="mozilla-nspr-32bit-4.11-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122739" comment="mozilla-nspr-devel-4.11-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122740" comment="mozilla-nss-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122741" comment="mozilla-nss-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122742" comment="mozilla-nss-certs-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122743" comment="mozilla-nss-certs-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122744" comment="mozilla-nss-devel-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122745" comment="mozilla-nss-sysinit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122746" comment="mozilla-nss-sysinit-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122747" comment="mozilla-nss-tools-3.21-25.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1946</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1946" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1946" source="CVE"/>
    <description>
    The MoofParser::Metadata function in binding/MoofParser.cpp in libstagefright in Mozilla Firefox before 44.0 does not limit the size of read operations, which might allow remote attackers to cause a denial of service (integer overflow and buffer overflow) or possibly have unspecified other impact via crafted metadata.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122727" comment="MozillaFirefox-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122728" comment="MozillaFirefox-branding-upstream-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122729" comment="MozillaFirefox-buildsymbols-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122730" comment="MozillaFirefox-devel-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122731" comment="MozillaFirefox-translations-common-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122732" comment="MozillaFirefox-translations-other-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122733" comment="libfreebl3-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122734" comment="libfreebl3-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122735" comment="libsoftokn3-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122736" comment="libsoftokn3-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122737" comment="mozilla-nspr-4.11-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122738" comment="mozilla-nspr-32bit-4.11-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122739" comment="mozilla-nspr-devel-4.11-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122740" comment="mozilla-nss-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122741" comment="mozilla-nss-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122742" comment="mozilla-nss-certs-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122743" comment="mozilla-nss-certs-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122744" comment="mozilla-nss-devel-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122745" comment="mozilla-nss-sysinit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122746" comment="mozilla-nss-sysinit-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122747" comment="mozilla-nss-tools-3.21-25.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1947</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1947" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1947" source="CVE"/>
    <description>
    Mozilla Firefox 43.x mishandles attempts to connect to the Application Reputation service, which makes it easier for remote attackers to trigger an unintended download by leveraging the absence of reputation data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122727" comment="MozillaFirefox-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122728" comment="MozillaFirefox-branding-upstream-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122729" comment="MozillaFirefox-buildsymbols-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122730" comment="MozillaFirefox-devel-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122731" comment="MozillaFirefox-translations-common-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122732" comment="MozillaFirefox-translations-other-44.0-59.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122733" comment="libfreebl3-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122734" comment="libfreebl3-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122735" comment="libsoftokn3-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122736" comment="libsoftokn3-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122737" comment="mozilla-nspr-4.11-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122738" comment="mozilla-nspr-32bit-4.11-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122739" comment="mozilla-nspr-devel-4.11-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122740" comment="mozilla-nss-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122741" comment="mozilla-nss-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122742" comment="mozilla-nss-certs-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122743" comment="mozilla-nss-certs-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122744" comment="mozilla-nss-devel-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122745" comment="mozilla-nss-sysinit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122746" comment="mozilla-nss-sysinit-32bit-3.21-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122747" comment="mozilla-nss-tools-3.21-25.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1949</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1949" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1949" source="CVE"/>
    <description>
    Mozilla Firefox before 44.0.2 does not properly restrict the interaction between Service Workers and plugins, which allows remote attackers to bypass the Same Origin Policy via a crafted web site that triggers spoofed responses to requests that use NPAPI, as demonstrated by a request for a crossdomain.xml file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123348" comment="MozillaFirefox-44.0.2-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123349" comment="MozillaFirefox-branding-upstream-44.0.2-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123350" comment="MozillaFirefox-buildsymbols-44.0.2-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123351" comment="MozillaFirefox-devel-44.0.2-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123352" comment="MozillaFirefox-translations-common-44.0.2-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123353" comment="MozillaFirefox-translations-other-44.0.2-62.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1950</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1950" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950" source="CVE"/>
    <description>
    Heap-based buffer overflow in Mozilla Network Security Services (NSS) before 3.19.2.3 and 3.20.x and 3.21.x before 3.21.1, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to execute arbitrary code via crafted ASN.1 data in an X.509 certificate.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124660" comment="MozillaFirefox-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124661" comment="MozillaFirefox-branding-upstream-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124662" comment="MozillaFirefox-buildsymbols-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124663" comment="MozillaFirefox-devel-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124664" comment="MozillaFirefox-translations-common-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124665" comment="MozillaFirefox-translations-other-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124666" comment="libfreebl3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124667" comment="libfreebl3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124668" comment="libsoftokn3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124669" comment="libsoftokn3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124670" comment="mozilla-nspr-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124671" comment="mozilla-nspr-32bit-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124672" comment="mozilla-nspr-devel-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124673" comment="mozilla-nss-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124674" comment="mozilla-nss-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124675" comment="mozilla-nss-certs-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124676" comment="mozilla-nss-certs-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124677" comment="mozilla-nss-devel-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124678" comment="mozilla-nss-sysinit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124679" comment="mozilla-nss-sysinit-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124680" comment="mozilla-nss-tools-3.21.1-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1952</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1952" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1952" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124660" comment="MozillaFirefox-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124661" comment="MozillaFirefox-branding-upstream-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124662" comment="MozillaFirefox-buildsymbols-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124663" comment="MozillaFirefox-devel-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124664" comment="MozillaFirefox-translations-common-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124665" comment="MozillaFirefox-translations-other-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129880" comment="MozillaThunderbird-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129881" comment="MozillaThunderbird-buildsymbols-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129882" comment="MozillaThunderbird-devel-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129883" comment="MozillaThunderbird-translations-common-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129884" comment="MozillaThunderbird-translations-other-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124666" comment="libfreebl3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124667" comment="libfreebl3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124668" comment="libsoftokn3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124669" comment="libsoftokn3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124670" comment="mozilla-nspr-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124671" comment="mozilla-nspr-32bit-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124672" comment="mozilla-nspr-devel-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124673" comment="mozilla-nss-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124674" comment="mozilla-nss-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124675" comment="mozilla-nss-certs-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124676" comment="mozilla-nss-certs-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124677" comment="mozilla-nss-devel-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124678" comment="mozilla-nss-sysinit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124679" comment="mozilla-nss-sysinit-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124680" comment="mozilla-nss-tools-3.21.1-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1953</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1953" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1953" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 45.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to js/src/jit/arm/Assembler-arm.cpp, and unknown other vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124660" comment="MozillaFirefox-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124661" comment="MozillaFirefox-branding-upstream-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124662" comment="MozillaFirefox-buildsymbols-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124663" comment="MozillaFirefox-devel-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124664" comment="MozillaFirefox-translations-common-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124665" comment="MozillaFirefox-translations-other-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129880" comment="MozillaThunderbird-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129881" comment="MozillaThunderbird-buildsymbols-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129882" comment="MozillaThunderbird-devel-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129883" comment="MozillaThunderbird-translations-common-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129884" comment="MozillaThunderbird-translations-other-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124666" comment="libfreebl3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124667" comment="libfreebl3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124668" comment="libsoftokn3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124669" comment="libsoftokn3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124670" comment="mozilla-nspr-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124671" comment="mozilla-nspr-32bit-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124672" comment="mozilla-nspr-devel-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124673" comment="mozilla-nss-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124674" comment="mozilla-nss-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124675" comment="mozilla-nss-certs-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124676" comment="mozilla-nss-certs-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124677" comment="mozilla-nss-devel-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124678" comment="mozilla-nss-sysinit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124679" comment="mozilla-nss-sysinit-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124680" comment="mozilla-nss-tools-3.21.1-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1954</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1954" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1954" source="CVE"/>
    <description>
    The nsCSPContext::SendReports function in dom/security/nsCSPContext.cpp in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 does not prevent use of a non-HTTP report-uri for a Content Security Policy (CSP) violation report, which allows remote attackers to cause a denial of service (data overwrite) or possibly gain privileges by specifying a URL of a local file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124660" comment="MozillaFirefox-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124661" comment="MozillaFirefox-branding-upstream-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124662" comment="MozillaFirefox-buildsymbols-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124663" comment="MozillaFirefox-devel-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124664" comment="MozillaFirefox-translations-common-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124665" comment="MozillaFirefox-translations-other-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129880" comment="MozillaThunderbird-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129881" comment="MozillaThunderbird-buildsymbols-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129882" comment="MozillaThunderbird-devel-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129883" comment="MozillaThunderbird-translations-common-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129884" comment="MozillaThunderbird-translations-other-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124666" comment="libfreebl3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124667" comment="libfreebl3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124668" comment="libsoftokn3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124669" comment="libsoftokn3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124670" comment="mozilla-nspr-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124671" comment="mozilla-nspr-32bit-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124672" comment="mozilla-nspr-devel-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124673" comment="mozilla-nss-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124674" comment="mozilla-nss-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124675" comment="mozilla-nss-certs-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124676" comment="mozilla-nss-certs-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124677" comment="mozilla-nss-devel-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124678" comment="mozilla-nss-sysinit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124679" comment="mozilla-nss-sysinit-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124680" comment="mozilla-nss-tools-3.21.1-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1955</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1955" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1955" source="CVE"/>
    <description>
    Mozilla Firefox before 45.0 allows remote attackers to bypass the Same Origin Policy and obtain sensitive information by reading a Content Security Policy (CSP) violation report that contains path information associated with an IFRAME element.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124660" comment="MozillaFirefox-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124661" comment="MozillaFirefox-branding-upstream-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124662" comment="MozillaFirefox-buildsymbols-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124663" comment="MozillaFirefox-devel-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124664" comment="MozillaFirefox-translations-common-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124665" comment="MozillaFirefox-translations-other-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129880" comment="MozillaThunderbird-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129881" comment="MozillaThunderbird-buildsymbols-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129882" comment="MozillaThunderbird-devel-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129883" comment="MozillaThunderbird-translations-common-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129884" comment="MozillaThunderbird-translations-other-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124666" comment="libfreebl3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124667" comment="libfreebl3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124668" comment="libsoftokn3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124669" comment="libsoftokn3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124670" comment="mozilla-nspr-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124671" comment="mozilla-nspr-32bit-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124672" comment="mozilla-nspr-devel-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124673" comment="mozilla-nss-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124674" comment="mozilla-nss-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124675" comment="mozilla-nss-certs-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124676" comment="mozilla-nss-certs-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124677" comment="mozilla-nss-devel-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124678" comment="mozilla-nss-sysinit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124679" comment="mozilla-nss-sysinit-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124680" comment="mozilla-nss-tools-3.21.1-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1956</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1956" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1956" source="CVE"/>
    <description>
    Mozilla Firefox before 45.0 on Linux, when an Intel video driver is used, allows remote attackers to cause a denial of service (memory consumption or stack memory corruption) by triggering use of a WebGL shader.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124660" comment="MozillaFirefox-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124661" comment="MozillaFirefox-branding-upstream-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124662" comment="MozillaFirefox-buildsymbols-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124663" comment="MozillaFirefox-devel-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124664" comment="MozillaFirefox-translations-common-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124665" comment="MozillaFirefox-translations-other-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129880" comment="MozillaThunderbird-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129881" comment="MozillaThunderbird-buildsymbols-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129882" comment="MozillaThunderbird-devel-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129883" comment="MozillaThunderbird-translations-common-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129884" comment="MozillaThunderbird-translations-other-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124666" comment="libfreebl3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124667" comment="libfreebl3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124668" comment="libsoftokn3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124669" comment="libsoftokn3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124670" comment="mozilla-nspr-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124671" comment="mozilla-nspr-32bit-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124672" comment="mozilla-nspr-devel-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124673" comment="mozilla-nss-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124674" comment="mozilla-nss-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124675" comment="mozilla-nss-certs-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124676" comment="mozilla-nss-certs-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124677" comment="mozilla-nss-devel-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124678" comment="mozilla-nss-sysinit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124679" comment="mozilla-nss-sysinit-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124680" comment="mozilla-nss-tools-3.21.1-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1957</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1957" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1957" source="CVE"/>
    <description>
    Memory leak in libstagefright in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to cause a denial of service (memory consumption) via an MPEG-4 file that triggers a delete operation on an array.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124660" comment="MozillaFirefox-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124661" comment="MozillaFirefox-branding-upstream-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124662" comment="MozillaFirefox-buildsymbols-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124663" comment="MozillaFirefox-devel-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124664" comment="MozillaFirefox-translations-common-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124665" comment="MozillaFirefox-translations-other-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129880" comment="MozillaThunderbird-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129881" comment="MozillaThunderbird-buildsymbols-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129882" comment="MozillaThunderbird-devel-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129883" comment="MozillaThunderbird-translations-common-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129884" comment="MozillaThunderbird-translations-other-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124666" comment="libfreebl3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124667" comment="libfreebl3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124668" comment="libsoftokn3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124669" comment="libsoftokn3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124670" comment="mozilla-nspr-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124671" comment="mozilla-nspr-32bit-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124672" comment="mozilla-nspr-devel-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124673" comment="mozilla-nss-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124674" comment="mozilla-nss-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124675" comment="mozilla-nss-certs-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124676" comment="mozilla-nss-certs-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124677" comment="mozilla-nss-devel-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124678" comment="mozilla-nss-sysinit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124679" comment="mozilla-nss-sysinit-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124680" comment="mozilla-nss-tools-3.21.1-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1958</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1958" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1958" source="CVE"/>
    <description>
    browser/base/content/browser.js in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to spoof the address bar via a javascript: URL.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124660" comment="MozillaFirefox-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124661" comment="MozillaFirefox-branding-upstream-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124662" comment="MozillaFirefox-buildsymbols-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124663" comment="MozillaFirefox-devel-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124664" comment="MozillaFirefox-translations-common-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124665" comment="MozillaFirefox-translations-other-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125364" comment="MozillaThunderbird-38.7.0-40.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125365" comment="MozillaThunderbird-buildsymbols-38.7.0-40.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125366" comment="MozillaThunderbird-devel-38.7.0-40.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125367" comment="MozillaThunderbird-translations-common-38.7.0-40.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125368" comment="MozillaThunderbird-translations-other-38.7.0-40.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124666" comment="libfreebl3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124667" comment="libfreebl3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124668" comment="libsoftokn3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124669" comment="libsoftokn3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124670" comment="mozilla-nspr-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124671" comment="mozilla-nspr-32bit-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124672" comment="mozilla-nspr-devel-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124673" comment="mozilla-nss-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124674" comment="mozilla-nss-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124675" comment="mozilla-nss-certs-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124676" comment="mozilla-nss-certs-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124677" comment="mozilla-nss-devel-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124678" comment="mozilla-nss-sysinit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124679" comment="mozilla-nss-sysinit-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124680" comment="mozilla-nss-tools-3.21.1-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1959</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1959" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1959" source="CVE"/>
    <description>
    The ServiceWorkerManager class in Mozilla Firefox before 45.0 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read and memory corruption) via unspecified use of the Clients API.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124660" comment="MozillaFirefox-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124661" comment="MozillaFirefox-branding-upstream-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124662" comment="MozillaFirefox-buildsymbols-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124663" comment="MozillaFirefox-devel-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124664" comment="MozillaFirefox-translations-common-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124665" comment="MozillaFirefox-translations-other-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124666" comment="libfreebl3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124667" comment="libfreebl3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124668" comment="libsoftokn3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124669" comment="libsoftokn3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124670" comment="mozilla-nspr-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124671" comment="mozilla-nspr-32bit-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124672" comment="mozilla-nspr-devel-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124673" comment="mozilla-nss-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124674" comment="mozilla-nss-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124675" comment="mozilla-nss-certs-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124676" comment="mozilla-nss-certs-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124677" comment="mozilla-nss-devel-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124678" comment="mozilla-nss-sysinit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124679" comment="mozilla-nss-sysinit-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124680" comment="mozilla-nss-tools-3.21.1-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1960</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1960" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1960" source="CVE"/>
    <description>
    Integer underflow in the nsHtml5TreeBuilder class in the HTML5 string parser in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) by leveraging mishandling of end tags, as demonstrated by incorrect SVG processing, aka ZDI-CAN-3545.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124660" comment="MozillaFirefox-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124661" comment="MozillaFirefox-branding-upstream-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124662" comment="MozillaFirefox-buildsymbols-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124663" comment="MozillaFirefox-devel-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124664" comment="MozillaFirefox-translations-common-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124665" comment="MozillaFirefox-translations-other-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129880" comment="MozillaThunderbird-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129881" comment="MozillaThunderbird-buildsymbols-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129882" comment="MozillaThunderbird-devel-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129883" comment="MozillaThunderbird-translations-common-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129884" comment="MozillaThunderbird-translations-other-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124666" comment="libfreebl3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124667" comment="libfreebl3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124668" comment="libsoftokn3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124669" comment="libsoftokn3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124670" comment="mozilla-nspr-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124671" comment="mozilla-nspr-32bit-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124672" comment="mozilla-nspr-devel-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124673" comment="mozilla-nss-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124674" comment="mozilla-nss-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124675" comment="mozilla-nss-certs-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124676" comment="mozilla-nss-certs-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124677" comment="mozilla-nss-devel-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124678" comment="mozilla-nss-sysinit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124679" comment="mozilla-nss-sysinit-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124680" comment="mozilla-nss-tools-3.21.1-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1961</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1961" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1961" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsHTMLDocument::SetBody function in dom/html/nsHTMLDocument.cpp in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code by leveraging mishandling of a root element, aka ZDI-CAN-3574.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124660" comment="MozillaFirefox-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124661" comment="MozillaFirefox-branding-upstream-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124662" comment="MozillaFirefox-buildsymbols-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124663" comment="MozillaFirefox-devel-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124664" comment="MozillaFirefox-translations-common-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124665" comment="MozillaFirefox-translations-other-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129880" comment="MozillaThunderbird-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129881" comment="MozillaThunderbird-buildsymbols-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129882" comment="MozillaThunderbird-devel-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129883" comment="MozillaThunderbird-translations-common-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129884" comment="MozillaThunderbird-translations-other-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124666" comment="libfreebl3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124667" comment="libfreebl3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124668" comment="libsoftokn3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124669" comment="libsoftokn3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124670" comment="mozilla-nspr-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124671" comment="mozilla-nspr-32bit-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124672" comment="mozilla-nspr-devel-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124673" comment="mozilla-nss-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124674" comment="mozilla-nss-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124675" comment="mozilla-nss-certs-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124676" comment="mozilla-nss-certs-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124677" comment="mozilla-nss-devel-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124678" comment="mozilla-nss-sysinit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124679" comment="mozilla-nss-sysinit-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124680" comment="mozilla-nss-tools-3.21.1-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1962</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1962" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1962" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::DataChannelConnection::Close function in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code by leveraging mishandling of WebRTC data-channel connections.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124660" comment="MozillaFirefox-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124661" comment="MozillaFirefox-branding-upstream-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124662" comment="MozillaFirefox-buildsymbols-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124663" comment="MozillaFirefox-devel-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124664" comment="MozillaFirefox-translations-common-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124665" comment="MozillaFirefox-translations-other-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125364" comment="MozillaThunderbird-38.7.0-40.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125365" comment="MozillaThunderbird-buildsymbols-38.7.0-40.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125366" comment="MozillaThunderbird-devel-38.7.0-40.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125367" comment="MozillaThunderbird-translations-common-38.7.0-40.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125368" comment="MozillaThunderbird-translations-other-38.7.0-40.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124666" comment="libfreebl3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124667" comment="libfreebl3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124668" comment="libsoftokn3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124669" comment="libsoftokn3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124670" comment="mozilla-nspr-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124671" comment="mozilla-nspr-32bit-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124672" comment="mozilla-nspr-devel-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124673" comment="mozilla-nss-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124674" comment="mozilla-nss-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124675" comment="mozilla-nss-certs-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124676" comment="mozilla-nss-certs-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124677" comment="mozilla-nss-devel-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124678" comment="mozilla-nss-sysinit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124679" comment="mozilla-nss-sysinit-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124680" comment="mozilla-nss-tools-3.21.1-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1963</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1963" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1963" source="CVE"/>
    <description>
    The FileReader class in Mozilla Firefox before 45.0 allows local users to gain privileges or cause a denial of service (memory corruption) by changing a file during a FileReader API read operation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124660" comment="MozillaFirefox-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124661" comment="MozillaFirefox-branding-upstream-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124662" comment="MozillaFirefox-buildsymbols-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124663" comment="MozillaFirefox-devel-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124664" comment="MozillaFirefox-translations-common-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124665" comment="MozillaFirefox-translations-other-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124666" comment="libfreebl3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124667" comment="libfreebl3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124668" comment="libsoftokn3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124669" comment="libsoftokn3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124670" comment="mozilla-nspr-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124671" comment="mozilla-nspr-32bit-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124672" comment="mozilla-nspr-devel-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124673" comment="mozilla-nss-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124674" comment="mozilla-nss-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124675" comment="mozilla-nss-certs-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124676" comment="mozilla-nss-certs-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124677" comment="mozilla-nss-devel-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124678" comment="mozilla-nss-sysinit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124679" comment="mozilla-nss-sysinit-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124680" comment="mozilla-nss-tools-3.21.1-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1964</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1964" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1964" source="CVE"/>
    <description>
    Use-after-free vulnerability in the AtomicBaseIncDec function in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by leveraging mishandling of XML transformations.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124660" comment="MozillaFirefox-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124661" comment="MozillaFirefox-branding-upstream-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124662" comment="MozillaFirefox-buildsymbols-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124663" comment="MozillaFirefox-devel-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124664" comment="MozillaFirefox-translations-common-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124665" comment="MozillaFirefox-translations-other-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129880" comment="MozillaThunderbird-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129881" comment="MozillaThunderbird-buildsymbols-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129882" comment="MozillaThunderbird-devel-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129883" comment="MozillaThunderbird-translations-common-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129884" comment="MozillaThunderbird-translations-other-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124666" comment="libfreebl3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124667" comment="libfreebl3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124668" comment="libsoftokn3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124669" comment="libsoftokn3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124670" comment="mozilla-nspr-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124671" comment="mozilla-nspr-32bit-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124672" comment="mozilla-nspr-devel-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124673" comment="mozilla-nss-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124674" comment="mozilla-nss-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124675" comment="mozilla-nss-certs-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124676" comment="mozilla-nss-certs-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124677" comment="mozilla-nss-devel-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124678" comment="mozilla-nss-sysinit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124679" comment="mozilla-nss-sysinit-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124680" comment="mozilla-nss-tools-3.21.1-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1965</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1965" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1965" source="CVE"/>
    <description>
    Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 mishandle a navigation sequence that returns to the original page, which allows remote attackers to spoof the address bar via vectors involving the history.back method and the location.protocol property.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124660" comment="MozillaFirefox-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124661" comment="MozillaFirefox-branding-upstream-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124662" comment="MozillaFirefox-buildsymbols-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124663" comment="MozillaFirefox-devel-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124664" comment="MozillaFirefox-translations-common-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124665" comment="MozillaFirefox-translations-other-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125364" comment="MozillaThunderbird-38.7.0-40.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125365" comment="MozillaThunderbird-buildsymbols-38.7.0-40.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125366" comment="MozillaThunderbird-devel-38.7.0-40.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125367" comment="MozillaThunderbird-translations-common-38.7.0-40.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125368" comment="MozillaThunderbird-translations-other-38.7.0-40.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124666" comment="libfreebl3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124667" comment="libfreebl3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124668" comment="libsoftokn3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124669" comment="libsoftokn3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124670" comment="mozilla-nspr-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124671" comment="mozilla-nspr-32bit-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124672" comment="mozilla-nspr-devel-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124673" comment="mozilla-nss-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124674" comment="mozilla-nss-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124675" comment="mozilla-nss-certs-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124676" comment="mozilla-nss-certs-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124677" comment="mozilla-nss-devel-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124678" comment="mozilla-nss-sysinit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124679" comment="mozilla-nss-sysinit-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124680" comment="mozilla-nss-tools-3.21.1-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1966</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1966" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1966" source="CVE"/>
    <description>
    The nsNPObjWrapper::GetNewOrUsed function in dom/plugins/base/nsJSNPRuntime.cpp in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code or cause a denial of service (invalid pointer dereference and memory corruption) via a crafted NPAPI plugin.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124660" comment="MozillaFirefox-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124661" comment="MozillaFirefox-branding-upstream-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124662" comment="MozillaFirefox-buildsymbols-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124663" comment="MozillaFirefox-devel-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124664" comment="MozillaFirefox-translations-common-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124665" comment="MozillaFirefox-translations-other-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125364" comment="MozillaThunderbird-38.7.0-40.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125365" comment="MozillaThunderbird-buildsymbols-38.7.0-40.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125366" comment="MozillaThunderbird-devel-38.7.0-40.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125367" comment="MozillaThunderbird-translations-common-38.7.0-40.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125368" comment="MozillaThunderbird-translations-other-38.7.0-40.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124666" comment="libfreebl3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124667" comment="libfreebl3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124668" comment="libsoftokn3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124669" comment="libsoftokn3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124670" comment="mozilla-nspr-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124671" comment="mozilla-nspr-32bit-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124672" comment="mozilla-nspr-devel-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124673" comment="mozilla-nss-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124674" comment="mozilla-nss-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124675" comment="mozilla-nss-certs-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124676" comment="mozilla-nss-certs-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124677" comment="mozilla-nss-devel-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124678" comment="mozilla-nss-sysinit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124679" comment="mozilla-nss-sysinit-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124680" comment="mozilla-nss-tools-3.21.1-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1967</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1967" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1967" source="CVE"/>
    <description>
    Mozilla Firefox before 45.0 does not properly restrict the availability of IFRAME Resource Timing API times, which allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via crafted JavaScript code that leverages history.back and performance.getEntries calls after restoring a browser session. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-7207.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124660" comment="MozillaFirefox-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124661" comment="MozillaFirefox-branding-upstream-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124662" comment="MozillaFirefox-buildsymbols-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124663" comment="MozillaFirefox-devel-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124664" comment="MozillaFirefox-translations-common-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124665" comment="MozillaFirefox-translations-other-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124666" comment="libfreebl3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124667" comment="libfreebl3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124668" comment="libsoftokn3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124669" comment="libsoftokn3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124670" comment="mozilla-nspr-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124671" comment="mozilla-nspr-32bit-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124672" comment="mozilla-nspr-devel-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124673" comment="mozilla-nss-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124674" comment="mozilla-nss-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124675" comment="mozilla-nss-certs-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124676" comment="mozilla-nss-certs-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124677" comment="mozilla-nss-devel-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124678" comment="mozilla-nss-sysinit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124679" comment="mozilla-nss-sysinit-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124680" comment="mozilla-nss-tools-3.21.1-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1968</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1968" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1968" source="CVE"/>
    <description>
    Integer underflow in Brotli, as used in Mozilla Firefox before 45.0, allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow) via crafted data with brotli compression.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124660" comment="MozillaFirefox-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124661" comment="MozillaFirefox-branding-upstream-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124662" comment="MozillaFirefox-buildsymbols-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124663" comment="MozillaFirefox-devel-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124664" comment="MozillaFirefox-translations-common-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124665" comment="MozillaFirefox-translations-other-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124666" comment="libfreebl3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124667" comment="libfreebl3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124668" comment="libsoftokn3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124669" comment="libsoftokn3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124670" comment="mozilla-nspr-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124671" comment="mozilla-nspr-32bit-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124672" comment="mozilla-nspr-devel-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124673" comment="mozilla-nss-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124674" comment="mozilla-nss-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124675" comment="mozilla-nss-certs-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124676" comment="mozilla-nss-certs-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124677" comment="mozilla-nss-devel-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124678" comment="mozilla-nss-sysinit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124679" comment="mozilla-nss-sysinit-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124680" comment="mozilla-nss-tools-3.21.1-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1970</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1970" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1970" source="CVE"/>
    <description>
    Integer underflow in the srtp_unprotect function in the WebRTC implementation in Mozilla Firefox before 45.0 on Windows might allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124660" comment="MozillaFirefox-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124661" comment="MozillaFirefox-branding-upstream-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124662" comment="MozillaFirefox-buildsymbols-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124663" comment="MozillaFirefox-devel-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124664" comment="MozillaFirefox-translations-common-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124665" comment="MozillaFirefox-translations-other-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124666" comment="libfreebl3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124667" comment="libfreebl3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124668" comment="libsoftokn3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124669" comment="libsoftokn3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124670" comment="mozilla-nspr-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124671" comment="mozilla-nspr-32bit-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124672" comment="mozilla-nspr-devel-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124673" comment="mozilla-nss-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124674" comment="mozilla-nss-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124675" comment="mozilla-nss-certs-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124676" comment="mozilla-nss-certs-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124677" comment="mozilla-nss-devel-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124678" comment="mozilla-nss-sysinit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124679" comment="mozilla-nss-sysinit-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124680" comment="mozilla-nss-tools-3.21.1-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1971</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1971" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1971" source="CVE"/>
    <description>
    The I420VideoFrame::CreateFrame function in the WebRTC implementation in Mozilla Firefox before 45.0 on Windows omits an unspecified status check, which might allow remote attackers to cause a denial of service (memory corruption) or possibly have other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124660" comment="MozillaFirefox-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124661" comment="MozillaFirefox-branding-upstream-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124662" comment="MozillaFirefox-buildsymbols-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124663" comment="MozillaFirefox-devel-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124664" comment="MozillaFirefox-translations-common-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124665" comment="MozillaFirefox-translations-other-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124666" comment="libfreebl3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124667" comment="libfreebl3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124668" comment="libsoftokn3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124669" comment="libsoftokn3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124670" comment="mozilla-nspr-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124671" comment="mozilla-nspr-32bit-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124672" comment="mozilla-nspr-devel-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124673" comment="mozilla-nss-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124674" comment="mozilla-nss-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124675" comment="mozilla-nss-certs-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124676" comment="mozilla-nss-certs-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124677" comment="mozilla-nss-devel-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124678" comment="mozilla-nss-sysinit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124679" comment="mozilla-nss-sysinit-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124680" comment="mozilla-nss-tools-3.21.1-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1972</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1972" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1972" source="CVE"/>
    <description>
    Race condition in libvpx in Mozilla Firefox before 45.0 on Windows might allow remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124660" comment="MozillaFirefox-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124661" comment="MozillaFirefox-branding-upstream-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124662" comment="MozillaFirefox-buildsymbols-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124663" comment="MozillaFirefox-devel-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124664" comment="MozillaFirefox-translations-common-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124665" comment="MozillaFirefox-translations-other-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124666" comment="libfreebl3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124667" comment="libfreebl3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124668" comment="libsoftokn3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124669" comment="libsoftokn3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124670" comment="mozilla-nspr-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124671" comment="mozilla-nspr-32bit-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124672" comment="mozilla-nspr-devel-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124673" comment="mozilla-nss-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124674" comment="mozilla-nss-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124675" comment="mozilla-nss-certs-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124676" comment="mozilla-nss-certs-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124677" comment="mozilla-nss-devel-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124678" comment="mozilla-nss-sysinit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124679" comment="mozilla-nss-sysinit-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124680" comment="mozilla-nss-tools-3.21.1-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1973</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1973" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1973" source="CVE"/>
    <description>
    Race condition in the GetStaticInstance function in the WebRTC implementation in Mozilla Firefox before 45.0 might allow remote attackers to execute arbitrary code or cause a denial of service (use-after-free) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124660" comment="MozillaFirefox-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124661" comment="MozillaFirefox-branding-upstream-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124662" comment="MozillaFirefox-buildsymbols-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124663" comment="MozillaFirefox-devel-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124664" comment="MozillaFirefox-translations-common-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124665" comment="MozillaFirefox-translations-other-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124666" comment="libfreebl3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124667" comment="libfreebl3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124668" comment="libsoftokn3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124669" comment="libsoftokn3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124670" comment="mozilla-nspr-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124671" comment="mozilla-nspr-32bit-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124672" comment="mozilla-nspr-devel-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124673" comment="mozilla-nss-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124674" comment="mozilla-nss-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124675" comment="mozilla-nss-certs-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124676" comment="mozilla-nss-certs-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124677" comment="mozilla-nss-devel-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124678" comment="mozilla-nss-sysinit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124679" comment="mozilla-nss-sysinit-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124680" comment="mozilla-nss-tools-3.21.1-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1974</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1974" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1974" source="CVE"/>
    <description>
    The nsScannerString::AppendUnicodeTo function in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 does not verify that memory allocation succeeds, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via crafted Unicode data in an HTML, XML, or SVG document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124660" comment="MozillaFirefox-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124661" comment="MozillaFirefox-branding-upstream-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124662" comment="MozillaFirefox-buildsymbols-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124663" comment="MozillaFirefox-devel-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124664" comment="MozillaFirefox-translations-common-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124665" comment="MozillaFirefox-translations-other-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129880" comment="MozillaThunderbird-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129881" comment="MozillaThunderbird-buildsymbols-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129882" comment="MozillaThunderbird-devel-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129883" comment="MozillaThunderbird-translations-common-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129884" comment="MozillaThunderbird-translations-other-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124666" comment="libfreebl3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124667" comment="libfreebl3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124668" comment="libsoftokn3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124669" comment="libsoftokn3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124670" comment="mozilla-nspr-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124671" comment="mozilla-nspr-32bit-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124672" comment="mozilla-nspr-devel-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124673" comment="mozilla-nss-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124674" comment="mozilla-nss-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124675" comment="mozilla-nss-certs-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124676" comment="mozilla-nss-certs-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124677" comment="mozilla-nss-devel-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124678" comment="mozilla-nss-sysinit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124679" comment="mozilla-nss-sysinit-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124680" comment="mozilla-nss-tools-3.21.1-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1975</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1975" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1975" source="CVE"/>
    <description>
    Multiple race conditions in dom/media/systemservices/CamerasChild.cpp in the WebRTC implementation in Mozilla Firefox before 45.0 on Windows might allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124660" comment="MozillaFirefox-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124661" comment="MozillaFirefox-branding-upstream-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124662" comment="MozillaFirefox-buildsymbols-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124663" comment="MozillaFirefox-devel-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124664" comment="MozillaFirefox-translations-common-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124665" comment="MozillaFirefox-translations-other-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124666" comment="libfreebl3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124667" comment="libfreebl3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124668" comment="libsoftokn3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124669" comment="libsoftokn3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124670" comment="mozilla-nspr-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124671" comment="mozilla-nspr-32bit-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124672" comment="mozilla-nspr-devel-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124673" comment="mozilla-nss-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124674" comment="mozilla-nss-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124675" comment="mozilla-nss-certs-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124676" comment="mozilla-nss-certs-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124677" comment="mozilla-nss-devel-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124678" comment="mozilla-nss-sysinit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124679" comment="mozilla-nss-sysinit-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124680" comment="mozilla-nss-tools-3.21.1-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1976</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1976" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1976" source="CVE"/>
    <description>
    Use-after-free vulnerability in the DesktopDisplayDevice class in the WebRTC implementation in Mozilla Firefox before 45.0 on Windows might allow remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124660" comment="MozillaFirefox-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124661" comment="MozillaFirefox-branding-upstream-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124662" comment="MozillaFirefox-buildsymbols-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124663" comment="MozillaFirefox-devel-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124664" comment="MozillaFirefox-translations-common-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124665" comment="MozillaFirefox-translations-other-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124666" comment="libfreebl3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124667" comment="libfreebl3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124668" comment="libsoftokn3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124669" comment="libsoftokn3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124670" comment="mozilla-nspr-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124671" comment="mozilla-nspr-32bit-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124672" comment="mozilla-nspr-devel-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124673" comment="mozilla-nss-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124674" comment="mozilla-nss-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124675" comment="mozilla-nss-certs-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124676" comment="mozilla-nss-certs-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124677" comment="mozilla-nss-devel-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124678" comment="mozilla-nss-sysinit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124679" comment="mozilla-nss-sysinit-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124680" comment="mozilla-nss-tools-3.21.1-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1977</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1977" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1977" source="CVE"/>
    <description>
    The Machine::Code::decoder::analysis::set_ref function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via a crafted Graphite smart font.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124660" comment="MozillaFirefox-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124661" comment="MozillaFirefox-branding-upstream-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124662" comment="MozillaFirefox-buildsymbols-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124663" comment="MozillaFirefox-devel-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124664" comment="MozillaFirefox-translations-common-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124665" comment="MozillaFirefox-translations-other-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129880" comment="MozillaThunderbird-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129881" comment="MozillaThunderbird-buildsymbols-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129882" comment="MozillaThunderbird-devel-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129883" comment="MozillaThunderbird-translations-common-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129884" comment="MozillaThunderbird-translations-other-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124666" comment="libfreebl3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124667" comment="libfreebl3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124668" comment="libsoftokn3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124669" comment="libsoftokn3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124670" comment="mozilla-nspr-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124671" comment="mozilla-nspr-32bit-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124672" comment="mozilla-nspr-devel-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124673" comment="mozilla-nss-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124674" comment="mozilla-nss-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124675" comment="mozilla-nss-certs-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124676" comment="mozilla-nss-certs-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124677" comment="mozilla-nss-devel-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124678" comment="mozilla-nss-sysinit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124679" comment="mozilla-nss-sysinit-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124680" comment="mozilla-nss-tools-3.21.1-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1979</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1979" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1979" source="CVE"/>
    <description>
    Use-after-free vulnerability in the PK11_ImportDERPrivateKeyInfoAndReturnKey function in Mozilla Network Security Services (NSS) before 3.21.1, as used in Mozilla Firefox before 45.0, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted key data with DER encoding.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124660" comment="MozillaFirefox-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124661" comment="MozillaFirefox-branding-upstream-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124662" comment="MozillaFirefox-buildsymbols-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124663" comment="MozillaFirefox-devel-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124664" comment="MozillaFirefox-translations-common-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124665" comment="MozillaFirefox-translations-other-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124666" comment="libfreebl3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124667" comment="libfreebl3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124668" comment="libsoftokn3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124669" comment="libsoftokn3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124670" comment="mozilla-nspr-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124671" comment="mozilla-nspr-32bit-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124672" comment="mozilla-nspr-devel-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124673" comment="mozilla-nss-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124674" comment="mozilla-nss-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124675" comment="mozilla-nss-certs-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124676" comment="mozilla-nss-certs-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124677" comment="mozilla-nss-devel-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124678" comment="mozilla-nss-sysinit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124679" comment="mozilla-nss-sysinit-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124680" comment="mozilla-nss-tools-3.21.1-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1981</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1981" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981" source="CVE"/>
    <description>
    QEMU (aka Quick Emulator) built with the e1000 NIC emulation support is vulnerable to an infinite loop issue. It could occur while processing data via transmit or receive descriptors, provided the initial receive/transmit descriptor head (TDH/RDH) is set outside the allocated descriptor buffer. A privileged user inside guest could use this flaw to crash the QEMU instance resulting in DoS.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126020" comment="xen-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126021" comment="xen-devel-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126022" comment="xen-doc-html-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126023" comment="xen-kmp-default-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126024" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126025" comment="xen-libs-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126026" comment="xen-libs-32bit-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126027" comment="xen-tools-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126028" comment="xen-tools-domU-4.4.4_02-43.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1982</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1982" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1982" source="CVE"/>
    <description>
    The remove_chunked_transfer_coding function in filters.c in Privoxy before 3.0.24 allows remote attackers to cause a denial of service (invalid read and crash) via crafted chunk-encoded content.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122748" comment="privoxy-3.0.24-8.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122749" comment="privoxy-doc-3.0.24-8.11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1983</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-1983" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1983" source="CVE"/>
    <description>
    The client_host function in parsers.c in Privoxy before 3.0.24 allows remote attackers to cause a denial of service (invalid read and crash) via an empty HTTP Host header.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009122748" comment="privoxy-3.0.24-8.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122749" comment="privoxy-doc-3.0.24-8.11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2038</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2038" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2038" source="CVE"/>
    <description>
    phpMyAdmin 4.0.x before 4.0.10.13, 4.4.x before 4.4.15.3, and 4.5.x before 4.5.4 allows remote attackers to obtain sensitive information via a crafted request, which reveals the full path in an error message.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122925" comment="phpMyAdmin-4.4.15.4-27.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2039</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2039" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2039" source="CVE"/>
    <description>
    libraries/session.inc.php in phpMyAdmin 4.0.x before 4.0.10.13, 4.4.x before 4.4.15.3, and 4.5.x before 4.5.4 does not properly generate CSRF token values, which allows remote attackers to bypass intended access restrictions by predicting a value.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122925" comment="phpMyAdmin-4.4.15.4-27.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2040</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2040" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2040" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 4.0.x before 4.0.10.13, 4.4.x before 4.4.15.3, and 4.5.x before 4.5.4 allow remote authenticated users to inject arbitrary web script or HTML via a (1) table name, (2) SET value, (3) search query, or (4) hostname in a Location header.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122925" comment="phpMyAdmin-4.4.15.4-27.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2041</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2041" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2041" source="CVE"/>
    <description>
    libraries/common.inc.php in phpMyAdmin 4.0.x before 4.0.10.13, 4.4.x before 4.4.15.3, and 4.5.x before 4.5.4 does not use a constant-time algorithm for comparing CSRF tokens, which makes it easier for remote attackers to bypass intended access restrictions by measuring time differences.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122925" comment="phpMyAdmin-4.4.15.4-27.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2042</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2042" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2042" source="CVE"/>
    <description>
    phpMyAdmin 4.4.x before 4.4.15.3 and 4.5.x before 4.5.4 allows remote attackers to obtain sensitive information via a crafted request to (1) libraries/phpseclib/Crypt/AES.php or (2) libraries/phpseclib/Crypt/Rijndael.php, which reveals the full path in an error message.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122925" comment="phpMyAdmin-4.4.15.4-27.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2043</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2043" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2043" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the goToFinish1NF function in js/normalization.js in phpMyAdmin 4.4.x before 4.4.15.3 and 4.5.x before 4.5.4 allows remote authenticated users to inject arbitrary web script or HTML via a table name to the normalization page.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009122925" comment="phpMyAdmin-4.4.15.4-27.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2047</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2047" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047" source="CVE"/>
    <description>
    The ssl_verify_server_cert function in sql-common/client.c in MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10; Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier; and Percona Server do not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "/CN=" string in a field in a certificate, as demonstrated by "/OU=/CN=bar.com/CN=foo.com."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127814" comment="libmysql56client18-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127815" comment="libmysql56client18-32bit-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127816" comment="libmysql56client_r18-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127817" comment="libmysql56client_r18-32bit-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129216" comment="libmysqlclient-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129217" comment="libmysqlclient18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129218" comment="libmysqlclient18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129219" comment="libmysqlclient_r18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129220" comment="libmysqlclient_r18-32bit-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129221" comment="libmysqld-devel-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129222" comment="libmysqld18-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129223" comment="mariadb-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129224" comment="mariadb-bench-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129225" comment="mariadb-client-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129226" comment="mariadb-errormessages-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129227" comment="mariadb-test-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129228" comment="mariadb-tools-10.0.25-2.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127818" comment="mysql-community-server-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127819" comment="mysql-community-server-bench-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127820" comment="mysql-community-server-client-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127821" comment="mysql-community-server-errormessages-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127822" comment="mysql-community-server-test-5.6.30-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127823" comment="mysql-community-server-tools-5.6.30-2.20.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2052</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2052" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2052" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in HarfBuzz before 1.0.6, as used in Google Chrome before 48.0.2564.82, allow attackers to cause a denial of service or possibly have other impact via crafted data, as demonstrated by a buffer over-read resulting from an inverted length check in hb-ot-font.cc, a different issue than CVE-2015-8947.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134136" comment="harfbuzz-0.9.35-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134137" comment="harfbuzz-devel-0.9.35-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134138" comment="harfbuzz-tools-0.9.35-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134139" comment="libharfbuzz-icu0-0.9.35-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134140" comment="libharfbuzz-icu0-32bit-0.9.35-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134141" comment="libharfbuzz0-0.9.35-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134142" comment="libharfbuzz0-32bit-0.9.35-2.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2053</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2053" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2053" source="CVE"/>
    <description>
    The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel before 4.3 allows attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2069</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2069" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2069" source="CVE"/>
    <description>
    Race condition in arch/x86/mm/tlb.c in the Linux kernel before 4.4.1 allows local users to gain privileges by triggering access to a paging structure by a different CPU.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123530" comment="bbswitch-0.8-3.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123531" comment="bbswitch-kmp-default-0.8_k3.16.7_35-3.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123532" comment="bbswitch-kmp-desktop-0.8_k3.16.7_35-3.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123533" comment="bbswitch-kmp-pae-0.8_k3.16.7_35-3.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123534" comment="bbswitch-kmp-xen-0.8_k3.16.7_35-3.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123535" comment="cloop-2.639-14.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123536" comment="cloop-kmp-default-2.639_k3.16.7_35-14.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123537" comment="cloop-kmp-desktop-2.639_k3.16.7_35-14.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123538" comment="cloop-kmp-pae-2.639_k3.16.7_35-14.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123539" comment="cloop-kmp-xen-2.639_k3.16.7_35-14.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123540" comment="crash-7.0.8-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123541" comment="crash-devel-7.0.8-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123542" comment="crash-doc-7.0.8-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123543" comment="crash-eppic-7.0.8-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123544" comment="crash-gcore-7.0.8-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123545" comment="crash-kmp-default-7.0.8_k3.16.7_35-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123546" comment="crash-kmp-desktop-7.0.8_k3.16.7_35-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123547" comment="crash-kmp-pae-7.0.8_k3.16.7_35-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123548" comment="crash-kmp-xen-7.0.8_k3.16.7_35-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123549" comment="hdjmod-1.28-18.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123550" comment="hdjmod-kmp-default-1.28_k3.16.7_35-18.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123551" comment="hdjmod-kmp-desktop-1.28_k3.16.7_35-18.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123552" comment="hdjmod-kmp-pae-1.28_k3.16.7_35-18.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123553" comment="hdjmod-kmp-xen-1.28_k3.16.7_35-18.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123554" comment="ipset-6.23-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123555" comment="ipset-devel-6.23-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123556" comment="ipset-kmp-default-6.23_k3.16.7_35-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123557" comment="ipset-kmp-desktop-6.23_k3.16.7_35-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123558" comment="ipset-kmp-pae-6.23_k3.16.7_35-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123559" comment="ipset-kmp-xen-6.23_k3.16.7_35-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123560" comment="kernel-debug-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123561" comment="kernel-debug-base-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123562" comment="kernel-debug-devel-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123563" comment="kernel-default-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123564" comment="kernel-default-base-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123565" comment="kernel-default-devel-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123566" comment="kernel-desktop-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123567" comment="kernel-desktop-base-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123568" comment="kernel-desktop-devel-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123569" comment="kernel-devel-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123570" comment="kernel-docs-3.16.7-35.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123571" comment="kernel-ec2-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123572" comment="kernel-ec2-base-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123573" comment="kernel-ec2-devel-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123574" comment="kernel-macros-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123575" comment="kernel-obs-build-3.16.7-35.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123576" comment="kernel-obs-qa-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123577" comment="kernel-obs-qa-xen-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123578" comment="kernel-pae-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123579" comment="kernel-pae-base-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123580" comment="kernel-pae-devel-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123581" comment="kernel-source-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123582" comment="kernel-source-vanilla-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123583" comment="kernel-syms-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123584" comment="kernel-vanilla-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123585" comment="kernel-vanilla-devel-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123586" comment="kernel-xen-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123587" comment="kernel-xen-base-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123588" comment="kernel-xen-devel-3.16.7-35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123589" comment="libipset3-6.23-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123590" comment="pcfclock-0.44-260.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123591" comment="pcfclock-kmp-default-0.44_k3.16.7_35-260.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123592" comment="pcfclock-kmp-desktop-0.44_k3.16.7_35-260.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123593" comment="pcfclock-kmp-pae-0.44_k3.16.7_35-260.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123594" comment="python-virtualbox-4.3.36-43.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123595" comment="vhba-kmp-20140629-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123596" comment="vhba-kmp-default-20140629_k3.16.7_35-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123597" comment="vhba-kmp-desktop-20140629_k3.16.7_35-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123598" comment="vhba-kmp-pae-20140629_k3.16.7_35-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123599" comment="vhba-kmp-xen-20140629_k3.16.7_35-2.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123600" comment="virtualbox-4.3.36-43.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123601" comment="virtualbox-devel-4.3.36-43.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123602" comment="virtualbox-guest-desktop-icons-4.3.36-43.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123603" comment="virtualbox-guest-kmp-default-4.3.36_k3.16.7_35-43.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123604" comment="virtualbox-guest-kmp-desktop-4.3.36_k3.16.7_35-43.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123605" comment="virtualbox-guest-kmp-pae-4.3.36_k3.16.7_35-43.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123606" comment="virtualbox-guest-tools-4.3.36-43.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123607" comment="virtualbox-guest-x11-4.3.36-43.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123608" comment="virtualbox-host-kmp-default-4.3.36_k3.16.7_35-43.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123609" comment="virtualbox-host-kmp-desktop-4.3.36_k3.16.7_35-43.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123610" comment="virtualbox-host-kmp-pae-4.3.36_k3.16.7_35-43.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123611" comment="virtualbox-host-source-4.3.36-43.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123612" comment="virtualbox-qt-4.3.36-43.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123613" comment="virtualbox-websrv-4.3.36-43.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123614" comment="xen-4.4.3_08-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123615" comment="xen-devel-4.4.3_08-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123616" comment="xen-doc-html-4.4.3_08-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123617" comment="xen-kmp-default-4.4.3_08_k3.16.7_35-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123618" comment="xen-kmp-desktop-4.4.3_08_k3.16.7_35-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123619" comment="xen-libs-4.4.3_08-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123620" comment="xen-libs-32bit-4.4.3_08-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123621" comment="xen-tools-4.4.3_08-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123622" comment="xen-tools-domU-4.4.3_08-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123623" comment="xtables-addons-2.6-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123624" comment="xtables-addons-kmp-default-2.6_k3.16.7_35-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123625" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_35-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123626" comment="xtables-addons-kmp-pae-2.6_k3.16.7_35-17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123627" comment="xtables-addons-kmp-xen-2.6_k3.16.7_35-17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2086</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2086" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2086" source="CVE"/>
    <description>
    Node.js 0.10.x before 0.10.42, 0.12.x before 0.12.10, 4.x before 4.3.0, and 5.x before 5.6.0 allow remote attackers to conduct HTTP request smuggling attacks via a crafted Content-Length HTTP header.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123861" comment="nodejs-4.3.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123862" comment="nodejs-devel-4.3.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123856" comment="nodejs-doc-4.3.1-15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2089</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2089" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2089" source="CVE"/>
    <description>
    The jas_matrix_clip function in jas_seq.c in JasPer 1.900.1 allows remote attackers to cause a denial of service (invalid read and application crash) via a crafted JPEG 2000 image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123202" comment="jasper-1.900.1-163.21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123203" comment="libjasper-devel-1.900.1-163.21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123204" comment="libjasper1-1.900.1-163.21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123205" comment="libjasper1-32bit-1.900.1-163.21.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2097</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2097" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2097" source="CVE"/>
    <description>
    Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.2 and 4.x before 4.1.14.2 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-0752.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125207" comment="rubygem-actionpack-3_2-3.2.17-3.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125208" comment="rubygem-actionpack-3_2-doc-3.2.17-3.10.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2098</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2098" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2098" source="CVE"/>
    <description>
    Action Pack in Ruby on Rails before 3.2.22.2, 4.x before 4.1.14.2, and 4.2.x before 4.2.5.2 allows remote attackers to execute arbitrary Ruby code by leveraging an application's unrestricted use of the render method.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125207" comment="rubygem-actionpack-3_2-3.2.17-3.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125208" comment="rubygem-actionpack-3_2-doc-3.2.17-3.10.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2099</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2099" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2099" source="CVE"/>
    <description>
    Use-after-free vulnerability in validators/DTD/DTDScanner.cpp in Apache Xerces C++ 3.1.3 and earlier allows context-dependent attackers to have unspecified impact via an invalid character in an XML document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130414" comment="libxerces-c-3_1-3.1.4-13.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130415" comment="libxerces-c-3_1-32bit-3.1.4-13.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130416" comment="libxerces-c-devel-3.1.4-13.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130417" comment="xerces-c-3.1.4-13.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130418" comment="xerces-c-doc-3.1.4-13.9.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2105</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2105" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2105" source="CVE"/>
    <description>
    Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135453" comment="libmysql56client18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135454" comment="libmysql56client18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135455" comment="libmysql56client_r18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135456" comment="libmysql56client_r18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127240" comment="libopenssl-devel-1.0.1k-2.36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127241" comment="libopenssl-devel-32bit-1.0.1k-2.36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127250" comment="libopenssl0_9_8-0.9.8zh-9.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127251" comment="libopenssl0_9_8-32bit-0.9.8zh-9.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127242" comment="libopenssl1_0_0-1.0.1k-2.36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127243" comment="libopenssl1_0_0-32bit-1.0.1k-2.36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127244" comment="libopenssl1_0_0-hmac-1.0.1k-2.36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127245" comment="libopenssl1_0_0-hmac-32bit-1.0.1k-2.36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135457" comment="mysql-community-server-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135458" comment="mysql-community-server-bench-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135459" comment="mysql-community-server-client-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135460" comment="mysql-community-server-errormessages-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135461" comment="mysql-community-server-test-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135462" comment="mysql-community-server-tools-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128880" comment="nodejs-4.4.5-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128881" comment="nodejs-devel-4.4.5-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128872" comment="nodejs-doc-4.4.5-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127246" comment="openssl-1.0.1k-2.36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127247" comment="openssl-doc-1.0.1k-2.36.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2106</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2106" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2106" source="CVE"/>
    <description>
    Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127240" comment="libopenssl-devel-1.0.1k-2.36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127241" comment="libopenssl-devel-32bit-1.0.1k-2.36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127250" comment="libopenssl0_9_8-0.9.8zh-9.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127251" comment="libopenssl0_9_8-32bit-0.9.8zh-9.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127242" comment="libopenssl1_0_0-1.0.1k-2.36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127243" comment="libopenssl1_0_0-32bit-1.0.1k-2.36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127244" comment="libopenssl1_0_0-hmac-1.0.1k-2.36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127245" comment="libopenssl1_0_0-hmac-32bit-1.0.1k-2.36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127246" comment="openssl-1.0.1k-2.36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127247" comment="openssl-doc-1.0.1k-2.36.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2107</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2107" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2107" source="CVE"/>
    <description>
    The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session, NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127240" comment="libopenssl-devel-1.0.1k-2.36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127241" comment="libopenssl-devel-32bit-1.0.1k-2.36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127242" comment="libopenssl1_0_0-1.0.1k-2.36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127243" comment="libopenssl1_0_0-32bit-1.0.1k-2.36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127244" comment="libopenssl1_0_0-hmac-1.0.1k-2.36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127245" comment="libopenssl1_0_0-hmac-32bit-1.0.1k-2.36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128880" comment="nodejs-4.4.5-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128881" comment="nodejs-devel-4.4.5-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128872" comment="nodejs-doc-4.4.5-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127246" comment="openssl-1.0.1k-2.36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127247" comment="openssl-doc-1.0.1k-2.36.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2108</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2108" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2108" source="CVE"/>
    <description>
    The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the "negative zero" issue.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127240" comment="libopenssl-devel-1.0.1k-2.36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127241" comment="libopenssl-devel-32bit-1.0.1k-2.36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127250" comment="libopenssl0_9_8-0.9.8zh-9.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127251" comment="libopenssl0_9_8-32bit-0.9.8zh-9.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127242" comment="libopenssl1_0_0-1.0.1k-2.36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127243" comment="libopenssl1_0_0-32bit-1.0.1k-2.36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127244" comment="libopenssl1_0_0-hmac-1.0.1k-2.36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127245" comment="libopenssl1_0_0-hmac-32bit-1.0.1k-2.36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127246" comment="openssl-1.0.1k-2.36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127247" comment="openssl-doc-1.0.1k-2.36.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2109</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2109" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2109" source="CVE"/>
    <description>
    The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in the ASN.1 BIO implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (memory consumption) via a short invalid encoding.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127240" comment="libopenssl-devel-1.0.1k-2.36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127241" comment="libopenssl-devel-32bit-1.0.1k-2.36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127250" comment="libopenssl0_9_8-0.9.8zh-9.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127251" comment="libopenssl0_9_8-32bit-0.9.8zh-9.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127242" comment="libopenssl1_0_0-1.0.1k-2.36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127243" comment="libopenssl1_0_0-32bit-1.0.1k-2.36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127244" comment="libopenssl1_0_0-hmac-1.0.1k-2.36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127245" comment="libopenssl1_0_0-hmac-32bit-1.0.1k-2.36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127246" comment="openssl-1.0.1k-2.36.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127247" comment="openssl-doc-1.0.1k-2.36.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2110</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2110" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110" source="CVE"/>
    <description>
    The NTLMSSP authentication implementation in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 allows man-in-the-middle attackers to perform protocol-downgrade attacks by modifying the client-server data stream to remove application-layer flags or encryption settings, as demonstrated by clearing the NTLMSSP_NEGOTIATE_SEAL or NTLMSSP_NEGOTIATE_SIGN option to disrupt LDAP security.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128193" comment="ctdb-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128194" comment="ctdb-devel-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128195" comment="ctdb-pcp-pmda-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128196" comment="ctdb-tests-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128197" comment="libdcerpc-atsvc-devel-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128198" comment="libdcerpc-atsvc0-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128199" comment="libdcerpc-atsvc0-32bit-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128200" comment="libdcerpc-binding0-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128201" comment="libdcerpc-binding0-32bit-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128202" comment="libdcerpc-devel-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128203" comment="libdcerpc-samr-devel-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128204" comment="libdcerpc-samr0-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128205" comment="libdcerpc-samr0-32bit-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128206" comment="libdcerpc0-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128207" comment="libdcerpc0-32bit-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128208" comment="libgensec-devel-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128209" comment="libgensec0-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128210" comment="libgensec0-32bit-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128211" comment="libndr-devel-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128212" comment="libndr-krb5pac-devel-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128213" comment="libndr-krb5pac0-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128214" comment="libndr-krb5pac0-32bit-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128215" comment="libndr-nbt-devel-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128216" comment="libndr-nbt0-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128217" comment="libndr-nbt0-32bit-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128218" comment="libndr-standard-devel-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128219" comment="libndr-standard0-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128220" comment="libndr-standard0-32bit-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128221" comment="libndr0-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128222" comment="libndr0-32bit-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128223" comment="libnetapi-devel-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128224" comment="libnetapi0-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128225" comment="libnetapi0-32bit-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128226" comment="libregistry-devel-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128227" comment="libregistry0-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128228" comment="libregistry0-32bit-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128229" comment="libsamba-credentials-devel-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128230" comment="libsamba-credentials0-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128231" comment="libsamba-credentials0-32bit-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128232" comment="libsamba-hostconfig-devel-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128233" comment="libsamba-hostconfig0-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128234" comment="libsamba-hostconfig0-32bit-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128235" comment="libsamba-passdb-devel-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128236" comment="libsamba-passdb0-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128237" comment="libsamba-passdb0-32bit-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128238" comment="libsamba-policy-devel-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128239" comment="libsamba-policy0-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128240" comment="libsamba-policy0-32bit-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128241" comment="libsamba-util-devel-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128242" comment="libsamba-util0-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128243" comment="libsamba-util0-32bit-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128244" comment="libsamdb-devel-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128245" comment="libsamdb0-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128246" comment="libsamdb0-32bit-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128247" comment="libsmbclient-devel-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128248" comment="libsmbclient-raw-devel-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128249" comment="libsmbclient-raw0-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128250" comment="libsmbclient-raw0-32bit-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128251" comment="libsmbclient0-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128252" comment="libsmbclient0-32bit-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128253" comment="libsmbconf-devel-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128254" comment="libsmbconf0-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128255" comment="libsmbconf0-32bit-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128256" comment="libsmbldap-devel-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128257" comment="libsmbldap0-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128258" comment="libsmbldap0-32bit-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128259" comment="libtevent-util-devel-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128260" comment="libtevent-util0-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128261" comment="libtevent-util0-32bit-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128262" comment="libwbclient-devel-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128263" comment="libwbclient0-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128264" comment="libwbclient0-32bit-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128265" comment="samba-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128266" comment="samba-32bit-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128267" comment="samba-client-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128268" comment="samba-client-32bit-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128269" comment="samba-core-devel-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128270" comment="samba-doc-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128271" comment="samba-libs-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128272" comment="samba-libs-32bit-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128273" comment="samba-pidl-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128274" comment="samba-python-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128275" comment="samba-test-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128276" comment="samba-test-devel-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128277" comment="samba-winbind-4.2.4-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128278" comment="samba-winbind-32bit-4.2.4-37.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2111</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2111" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111" source="CVE"/>
    <description>
    The NETLOGON service in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2, when a domain controller is configured, allows remote attackers to spoof the computer name of a secure channel's endpoint, and obtain sensitive session information, by running a crafted application and leveraging the ability to sniff network traffic, a related issue to CVE-2015-0005.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126263" comment="ctdb-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126264" comment="ctdb-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126265" comment="ctdb-pcp-pmda-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126266" comment="ctdb-tests-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126267" comment="libdcerpc-atsvc-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126268" comment="libdcerpc-atsvc0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126269" comment="libdcerpc-atsvc0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126270" comment="libdcerpc-binding0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126271" comment="libdcerpc-binding0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126272" comment="libdcerpc-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126273" comment="libdcerpc-samr-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126274" comment="libdcerpc-samr0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126275" comment="libdcerpc-samr0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126276" comment="libdcerpc0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126277" comment="libdcerpc0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126278" comment="libgensec-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126279" comment="libgensec0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126280" comment="libgensec0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126281" comment="libndr-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126282" comment="libndr-krb5pac-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126283" comment="libndr-krb5pac0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126284" comment="libndr-krb5pac0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126285" comment="libndr-nbt-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126286" comment="libndr-nbt0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126287" comment="libndr-nbt0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126288" comment="libndr-standard-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126289" comment="libndr-standard0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126290" comment="libndr-standard0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126291" comment="libndr0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126292" comment="libndr0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126293" comment="libnetapi-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126294" comment="libnetapi0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126295" comment="libnetapi0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126296" comment="libregistry-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126297" comment="libregistry0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126298" comment="libregistry0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126299" comment="libsamba-credentials-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126300" comment="libsamba-credentials0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126301" comment="libsamba-credentials0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126302" comment="libsamba-hostconfig-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126303" comment="libsamba-hostconfig0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126304" comment="libsamba-hostconfig0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126305" comment="libsamba-passdb-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126306" comment="libsamba-passdb0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126307" comment="libsamba-passdb0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126308" comment="libsamba-policy-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126309" comment="libsamba-policy0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126310" comment="libsamba-policy0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126311" comment="libsamba-util-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126312" comment="libsamba-util0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126313" comment="libsamba-util0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126314" comment="libsamdb-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126315" comment="libsamdb0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126316" comment="libsamdb0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126317" comment="libsmbclient-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126318" comment="libsmbclient-raw-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126319" comment="libsmbclient-raw0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126320" comment="libsmbclient-raw0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126321" comment="libsmbclient0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126322" comment="libsmbclient0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126323" comment="libsmbconf-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126324" comment="libsmbconf0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126325" comment="libsmbconf0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126326" comment="libsmbldap-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126327" comment="libsmbldap0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126328" comment="libsmbldap0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126329" comment="libtevent-util-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126330" comment="libtevent-util0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126331" comment="libtevent-util0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126332" comment="libwbclient-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126333" comment="libwbclient0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126334" comment="libwbclient0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126335" comment="samba-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126336" comment="samba-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126337" comment="samba-client-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126338" comment="samba-client-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126339" comment="samba-core-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126340" comment="samba-doc-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126341" comment="samba-libs-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126342" comment="samba-libs-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126343" comment="samba-pidl-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126344" comment="samba-python-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126345" comment="samba-test-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126346" comment="samba-test-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126347" comment="samba-winbind-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126348" comment="samba-winbind-32bit-4.2.4-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2112</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2112" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112" source="CVE"/>
    <description>
    The bundled LDAP client library in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not recognize the "client ldap sasl wrapping" setting, which allows man-in-the-middle attackers to perform LDAP protocol-downgrade attacks by modifying the client-server data stream.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126263" comment="ctdb-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126264" comment="ctdb-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126265" comment="ctdb-pcp-pmda-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126266" comment="ctdb-tests-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126267" comment="libdcerpc-atsvc-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126268" comment="libdcerpc-atsvc0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126269" comment="libdcerpc-atsvc0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126270" comment="libdcerpc-binding0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126271" comment="libdcerpc-binding0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126272" comment="libdcerpc-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126273" comment="libdcerpc-samr-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126274" comment="libdcerpc-samr0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126275" comment="libdcerpc-samr0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126276" comment="libdcerpc0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126277" comment="libdcerpc0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126278" comment="libgensec-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126279" comment="libgensec0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126280" comment="libgensec0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126281" comment="libndr-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126282" comment="libndr-krb5pac-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126283" comment="libndr-krb5pac0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126284" comment="libndr-krb5pac0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126285" comment="libndr-nbt-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126286" comment="libndr-nbt0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126287" comment="libndr-nbt0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126288" comment="libndr-standard-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126289" comment="libndr-standard0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126290" comment="libndr-standard0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126291" comment="libndr0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126292" comment="libndr0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126293" comment="libnetapi-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126294" comment="libnetapi0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126295" comment="libnetapi0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126296" comment="libregistry-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126297" comment="libregistry0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126298" comment="libregistry0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126299" comment="libsamba-credentials-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126300" comment="libsamba-credentials0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126301" comment="libsamba-credentials0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126302" comment="libsamba-hostconfig-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126303" comment="libsamba-hostconfig0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126304" comment="libsamba-hostconfig0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126305" comment="libsamba-passdb-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126306" comment="libsamba-passdb0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126307" comment="libsamba-passdb0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126308" comment="libsamba-policy-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126309" comment="libsamba-policy0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126310" comment="libsamba-policy0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126311" comment="libsamba-util-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126312" comment="libsamba-util0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126313" comment="libsamba-util0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126314" comment="libsamdb-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126315" comment="libsamdb0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126316" comment="libsamdb0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126317" comment="libsmbclient-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126318" comment="libsmbclient-raw-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126319" comment="libsmbclient-raw0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126320" comment="libsmbclient-raw0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126321" comment="libsmbclient0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126322" comment="libsmbclient0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126323" comment="libsmbconf-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126324" comment="libsmbconf0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126325" comment="libsmbconf0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126326" comment="libsmbldap-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126327" comment="libsmbldap0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126328" comment="libsmbldap0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126329" comment="libtevent-util-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126330" comment="libtevent-util0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126331" comment="libtevent-util0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126332" comment="libwbclient-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126333" comment="libwbclient0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126334" comment="libwbclient0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126335" comment="samba-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126336" comment="samba-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126337" comment="samba-client-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126338" comment="samba-client-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126339" comment="samba-core-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126340" comment="samba-doc-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126341" comment="samba-libs-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126342" comment="samba-libs-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126343" comment="samba-pidl-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126344" comment="samba-python-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126345" comment="samba-test-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126346" comment="samba-test-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126347" comment="samba-winbind-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126348" comment="samba-winbind-32bit-4.2.4-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2113</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2113" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113" source="CVE"/>
    <description>
    Samba 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not verify X.509 certificates from TLS servers, which allows man-in-the-middle attackers to spoof LDAPS and HTTPS servers and obtain sensitive information via a crafted certificate.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126263" comment="ctdb-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126264" comment="ctdb-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126265" comment="ctdb-pcp-pmda-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126266" comment="ctdb-tests-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126267" comment="libdcerpc-atsvc-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126268" comment="libdcerpc-atsvc0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126269" comment="libdcerpc-atsvc0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126270" comment="libdcerpc-binding0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126271" comment="libdcerpc-binding0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126272" comment="libdcerpc-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126273" comment="libdcerpc-samr-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126274" comment="libdcerpc-samr0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126275" comment="libdcerpc-samr0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126276" comment="libdcerpc0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126277" comment="libdcerpc0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126278" comment="libgensec-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126279" comment="libgensec0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126280" comment="libgensec0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126281" comment="libndr-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126282" comment="libndr-krb5pac-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126283" comment="libndr-krb5pac0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126284" comment="libndr-krb5pac0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126285" comment="libndr-nbt-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126286" comment="libndr-nbt0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126287" comment="libndr-nbt0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126288" comment="libndr-standard-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126289" comment="libndr-standard0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126290" comment="libndr-standard0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126291" comment="libndr0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126292" comment="libndr0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126293" comment="libnetapi-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126294" comment="libnetapi0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126295" comment="libnetapi0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126296" comment="libregistry-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126297" comment="libregistry0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126298" comment="libregistry0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126299" comment="libsamba-credentials-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126300" comment="libsamba-credentials0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126301" comment="libsamba-credentials0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126302" comment="libsamba-hostconfig-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126303" comment="libsamba-hostconfig0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126304" comment="libsamba-hostconfig0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126305" comment="libsamba-passdb-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126306" comment="libsamba-passdb0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126307" comment="libsamba-passdb0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126308" comment="libsamba-policy-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126309" comment="libsamba-policy0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126310" comment="libsamba-policy0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126311" comment="libsamba-util-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126312" comment="libsamba-util0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126313" comment="libsamba-util0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126314" comment="libsamdb-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126315" comment="libsamdb0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126316" comment="libsamdb0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126317" comment="libsmbclient-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126318" comment="libsmbclient-raw-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126319" comment="libsmbclient-raw0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126320" comment="libsmbclient-raw0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126321" comment="libsmbclient0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126322" comment="libsmbclient0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126323" comment="libsmbconf-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126324" comment="libsmbconf0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126325" comment="libsmbconf0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126326" comment="libsmbldap-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126327" comment="libsmbldap0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126328" comment="libsmbldap0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126329" comment="libtevent-util-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126330" comment="libtevent-util0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126331" comment="libtevent-util0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126332" comment="libwbclient-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126333" comment="libwbclient0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126334" comment="libwbclient0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126335" comment="samba-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126336" comment="samba-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126337" comment="samba-client-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126338" comment="samba-client-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126339" comment="samba-core-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126340" comment="samba-doc-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126341" comment="samba-libs-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126342" comment="samba-libs-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126343" comment="samba-pidl-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126344" comment="samba-python-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126345" comment="samba-test-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126346" comment="samba-test-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126347" comment="samba-winbind-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126348" comment="samba-winbind-32bit-4.2.4-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2115</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2115" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115" source="CVE"/>
    <description>
    Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not require SMB signing within a DCERPC session over ncacn_np, which allows man-in-the-middle attackers to spoof SMB clients by modifying the client-server data stream.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126263" comment="ctdb-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126264" comment="ctdb-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126265" comment="ctdb-pcp-pmda-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126266" comment="ctdb-tests-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126267" comment="libdcerpc-atsvc-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126268" comment="libdcerpc-atsvc0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126269" comment="libdcerpc-atsvc0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126270" comment="libdcerpc-binding0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126271" comment="libdcerpc-binding0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126272" comment="libdcerpc-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126273" comment="libdcerpc-samr-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126274" comment="libdcerpc-samr0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126275" comment="libdcerpc-samr0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126276" comment="libdcerpc0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126277" comment="libdcerpc0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126278" comment="libgensec-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126279" comment="libgensec0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126280" comment="libgensec0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126281" comment="libndr-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126282" comment="libndr-krb5pac-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126283" comment="libndr-krb5pac0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126284" comment="libndr-krb5pac0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126285" comment="libndr-nbt-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126286" comment="libndr-nbt0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126287" comment="libndr-nbt0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126288" comment="libndr-standard-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126289" comment="libndr-standard0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126290" comment="libndr-standard0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126291" comment="libndr0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126292" comment="libndr0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126293" comment="libnetapi-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126294" comment="libnetapi0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126295" comment="libnetapi0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126296" comment="libregistry-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126297" comment="libregistry0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126298" comment="libregistry0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126299" comment="libsamba-credentials-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126300" comment="libsamba-credentials0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126301" comment="libsamba-credentials0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126302" comment="libsamba-hostconfig-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126303" comment="libsamba-hostconfig0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126304" comment="libsamba-hostconfig0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126305" comment="libsamba-passdb-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126306" comment="libsamba-passdb0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126307" comment="libsamba-passdb0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126308" comment="libsamba-policy-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126309" comment="libsamba-policy0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126310" comment="libsamba-policy0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126311" comment="libsamba-util-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126312" comment="libsamba-util0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126313" comment="libsamba-util0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126314" comment="libsamdb-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126315" comment="libsamdb0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126316" comment="libsamdb0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126317" comment="libsmbclient-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126318" comment="libsmbclient-raw-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126319" comment="libsmbclient-raw0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126320" comment="libsmbclient-raw0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126321" comment="libsmbclient0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126322" comment="libsmbclient0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126323" comment="libsmbconf-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126324" comment="libsmbconf0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126325" comment="libsmbconf0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126326" comment="libsmbldap-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126327" comment="libsmbldap0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126328" comment="libsmbldap0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126329" comment="libtevent-util-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126330" comment="libtevent-util0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126331" comment="libtevent-util0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126332" comment="libwbclient-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126333" comment="libwbclient0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126334" comment="libwbclient0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126335" comment="samba-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126336" comment="samba-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126337" comment="samba-client-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126338" comment="samba-client-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126339" comment="samba-core-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126340" comment="samba-doc-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126341" comment="samba-libs-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126342" comment="samba-libs-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126343" comment="samba-pidl-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126344" comment="samba-python-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126345" comment="samba-test-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126346" comment="samba-test-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126347" comment="samba-winbind-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126348" comment="samba-winbind-32bit-4.2.4-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2116</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2116" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2116" source="CVE"/>
    <description>
    Memory leak in the jas_iccprof_createfrombuf function in JasPer 1.900.1 and earlier allows remote attackers to cause a denial of service (memory consumption) via a crafted ICC color profile in a JPEG 2000 image file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135287" comment="jasper-1.900.14-163.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135288" comment="libjasper-devel-1.900.14-163.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135289" comment="libjasper1-1.900.14-163.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135290" comment="libjasper1-32bit-1.900.14-163.24.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2118</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2118" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118" source="CVE"/>
    <description>
    The MS-SAMR and MS-LSAD protocol implementations in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 mishandle DCERPC connections, which allows man-in-the-middle attackers to perform protocol-downgrade attacks and impersonate users by modifying the client-server data stream, aka "BADLOCK."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126263" comment="ctdb-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126264" comment="ctdb-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126265" comment="ctdb-pcp-pmda-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126266" comment="ctdb-tests-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126267" comment="libdcerpc-atsvc-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126268" comment="libdcerpc-atsvc0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126269" comment="libdcerpc-atsvc0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126270" comment="libdcerpc-binding0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126271" comment="libdcerpc-binding0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126272" comment="libdcerpc-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126273" comment="libdcerpc-samr-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126274" comment="libdcerpc-samr0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126275" comment="libdcerpc-samr0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126276" comment="libdcerpc0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126277" comment="libdcerpc0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126278" comment="libgensec-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126279" comment="libgensec0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126280" comment="libgensec0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126281" comment="libndr-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126282" comment="libndr-krb5pac-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126283" comment="libndr-krb5pac0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126284" comment="libndr-krb5pac0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126285" comment="libndr-nbt-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126286" comment="libndr-nbt0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126287" comment="libndr-nbt0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126288" comment="libndr-standard-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126289" comment="libndr-standard0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126290" comment="libndr-standard0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126291" comment="libndr0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126292" comment="libndr0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126293" comment="libnetapi-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126294" comment="libnetapi0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126295" comment="libnetapi0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126296" comment="libregistry-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126297" comment="libregistry0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126298" comment="libregistry0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126299" comment="libsamba-credentials-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126300" comment="libsamba-credentials0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126301" comment="libsamba-credentials0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126302" comment="libsamba-hostconfig-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126303" comment="libsamba-hostconfig0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126304" comment="libsamba-hostconfig0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126305" comment="libsamba-passdb-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126306" comment="libsamba-passdb0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126307" comment="libsamba-passdb0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126308" comment="libsamba-policy-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126309" comment="libsamba-policy0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126310" comment="libsamba-policy0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126311" comment="libsamba-util-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126312" comment="libsamba-util0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126313" comment="libsamba-util0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126314" comment="libsamdb-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126315" comment="libsamdb0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126316" comment="libsamdb0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126317" comment="libsmbclient-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126318" comment="libsmbclient-raw-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126319" comment="libsmbclient-raw0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126320" comment="libsmbclient-raw0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126321" comment="libsmbclient0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126322" comment="libsmbclient0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126323" comment="libsmbconf-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126324" comment="libsmbconf0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126325" comment="libsmbconf0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126326" comment="libsmbldap-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126327" comment="libsmbldap0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126328" comment="libsmbldap0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126329" comment="libtevent-util-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126330" comment="libtevent-util0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126331" comment="libtevent-util0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126332" comment="libwbclient-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126333" comment="libwbclient0-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126334" comment="libwbclient0-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126335" comment="samba-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126336" comment="samba-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126337" comment="samba-client-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126338" comment="samba-client-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126339" comment="samba-core-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126340" comment="samba-doc-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126341" comment="samba-libs-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126342" comment="samba-libs-32bit-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126343" comment="samba-pidl-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126344" comment="samba-python-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126345" comment="samba-test-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126346" comment="samba-test-devel-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126347" comment="samba-winbind-4.2.4-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126348" comment="samba-winbind-32bit-4.2.4-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2119</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2119" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2119" source="CVE"/>
    <description>
    libcli/smb/smbXcli_base.c in Samba 4.x before 4.2.14, 4.3.x before 4.3.11, and 4.4.x before 4.4.5 allows man-in-the-middle attackers to bypass a client-signing protection mechanism, and consequently spoof SMB2 and SMB3 servers, via the (1) SMB2_SESSION_FLAG_IS_GUEST or (2) SMB2_SESSION_FLAG_IS_NULL flag.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130475" comment="ctdb-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130476" comment="ctdb-devel-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130477" comment="ctdb-pcp-pmda-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130478" comment="ctdb-tests-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130479" comment="libdcerpc-atsvc-devel-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130480" comment="libdcerpc-atsvc0-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130481" comment="libdcerpc-atsvc0-32bit-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130482" comment="libdcerpc-binding0-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130483" comment="libdcerpc-binding0-32bit-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130484" comment="libdcerpc-devel-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130485" comment="libdcerpc-samr-devel-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130486" comment="libdcerpc-samr0-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130487" comment="libdcerpc-samr0-32bit-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130488" comment="libdcerpc0-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130489" comment="libdcerpc0-32bit-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130490" comment="libgensec-devel-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130491" comment="libgensec0-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130492" comment="libgensec0-32bit-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130493" comment="libndr-devel-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130494" comment="libndr-krb5pac-devel-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130495" comment="libndr-krb5pac0-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130496" comment="libndr-krb5pac0-32bit-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130497" comment="libndr-nbt-devel-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130498" comment="libndr-nbt0-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130499" comment="libndr-nbt0-32bit-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130500" comment="libndr-standard-devel-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130501" comment="libndr-standard0-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130502" comment="libndr-standard0-32bit-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130503" comment="libndr0-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130504" comment="libndr0-32bit-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130505" comment="libnetapi-devel-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130506" comment="libnetapi0-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130507" comment="libnetapi0-32bit-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130508" comment="libregistry-devel-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130509" comment="libregistry0-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130510" comment="libregistry0-32bit-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130511" comment="libsamba-credentials-devel-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130512" comment="libsamba-credentials0-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130513" comment="libsamba-credentials0-32bit-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130514" comment="libsamba-hostconfig-devel-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130515" comment="libsamba-hostconfig0-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130516" comment="libsamba-hostconfig0-32bit-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130517" comment="libsamba-passdb-devel-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130518" comment="libsamba-passdb0-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130519" comment="libsamba-passdb0-32bit-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130520" comment="libsamba-policy-devel-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130521" comment="libsamba-policy0-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130522" comment="libsamba-policy0-32bit-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130523" comment="libsamba-util-devel-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130524" comment="libsamba-util0-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130525" comment="libsamba-util0-32bit-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130526" comment="libsamdb-devel-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130527" comment="libsamdb0-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130528" comment="libsamdb0-32bit-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130529" comment="libsmbclient-devel-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130530" comment="libsmbclient-raw-devel-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130531" comment="libsmbclient-raw0-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130532" comment="libsmbclient-raw0-32bit-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130533" comment="libsmbclient0-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130534" comment="libsmbclient0-32bit-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130535" comment="libsmbconf-devel-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130536" comment="libsmbconf0-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130537" comment="libsmbconf0-32bit-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130538" comment="libsmbldap-devel-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130539" comment="libsmbldap0-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130540" comment="libsmbldap0-32bit-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130541" comment="libtevent-util-devel-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130542" comment="libtevent-util0-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130543" comment="libtevent-util0-32bit-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130544" comment="libwbclient-devel-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130545" comment="libwbclient0-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130546" comment="libwbclient0-32bit-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130547" comment="samba-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130548" comment="samba-32bit-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130549" comment="samba-client-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130550" comment="samba-client-32bit-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130551" comment="samba-core-devel-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130552" comment="samba-doc-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130553" comment="samba-libs-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130554" comment="samba-libs-32bit-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130555" comment="samba-pidl-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130556" comment="samba-python-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130557" comment="samba-test-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130558" comment="samba-test-devel-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130559" comment="samba-winbind-4.2.4-40.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130560" comment="samba-winbind-32bit-4.2.4-40.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2120</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2120" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2120" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009147286" comment="pdns-3.3.1-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147287" comment="pdns-backend-ldap-3.3.1-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147288" comment="pdns-backend-lua-3.3.1-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147289" comment="pdns-backend-mydns-3.3.1-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147290" comment="pdns-backend-mysql-3.3.1-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147291" comment="pdns-backend-postgresql-3.3.1-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147292" comment="pdns-backend-sqlite3-3.3.1-2.12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2150</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2150" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2150" source="CVE"/>
    <description>
    SPICE allows local guest OS users to read from or write to arbitrary host memory locations via crafted primary surface parameters, a similar issue to CVE-2015-5261.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129692" comment="libspice-server-devel-0.12.4-4.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129693" comment="libspice-server1-0.12.4-4.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129694" comment="spice-0.12.4-4.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129695" comment="spice-client-0.12.4-4.12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2167</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2167" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2167" source="CVE"/>
    <description>
    The canonicalize_username function in svnserve/cyrus_auth.c in Apache Subversion before 1.8.16 and 1.9.x before 1.9.4, when Cyrus SASL authentication is used, allows remote attackers to authenticate and bypass intended access restrictions via a realm string that is a prefix of an expected repository realm string.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127309" comment="libsvn_auth_gnome_keyring-1-0-1.8.16-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127310" comment="libsvn_auth_kwallet-1-0-1.8.16-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127311" comment="subversion-1.8.16-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127312" comment="subversion-bash-completion-1.8.16-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127313" comment="subversion-devel-1.8.16-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127314" comment="subversion-perl-1.8.16-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127315" comment="subversion-python-1.8.16-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127316" comment="subversion-python-ctypes-1.8.16-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127317" comment="subversion-ruby-1.8.16-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127318" comment="subversion-server-1.8.16-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127319" comment="subversion-tools-1.8.16-2.26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2168</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2168" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2168" source="CVE"/>
    <description>
    The req_check_access function in the mod_authz_svn module in the httpd server in Apache Subversion before 1.8.16 and 1.9.x before 1.9.4 allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) via a crafted header in a (1) MOVE or (2) COPY request, involving an authorization check.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127309" comment="libsvn_auth_gnome_keyring-1-0-1.8.16-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127310" comment="libsvn_auth_kwallet-1-0-1.8.16-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127311" comment="subversion-1.8.16-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127312" comment="subversion-bash-completion-1.8.16-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127313" comment="subversion-devel-1.8.16-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127314" comment="subversion-perl-1.8.16-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127315" comment="subversion-python-1.8.16-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127316" comment="subversion-python-ctypes-1.8.16-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127317" comment="subversion-ruby-1.8.16-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127318" comment="subversion-server-1.8.16-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127319" comment="subversion-tools-1.8.16-2.26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2177</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2177" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2177" source="CVE"/>
    <description>
    OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary checks, which might allow remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact by leveraging unexpected malloc behavior, related to s3_srvr.c, ssl_sess.c, and t1_lib.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133596" comment="libopenssl-devel-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133597" comment="libopenssl-devel-32bit-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133598" comment="libopenssl1_0_0-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133599" comment="libopenssl1_0_0-32bit-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133600" comment="libopenssl1_0_0-hmac-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133601" comment="libopenssl1_0_0-hmac-32bit-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133602" comment="openssl-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133603" comment="openssl-doc-1.0.1k-2.39.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2178</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2178" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2178" source="CVE"/>
    <description>
    The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133596" comment="libopenssl-devel-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133597" comment="libopenssl-devel-32bit-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133598" comment="libopenssl1_0_0-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133599" comment="libopenssl1_0_0-32bit-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133600" comment="libopenssl1_0_0-hmac-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133601" comment="libopenssl1_0_0-hmac-32bit-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134144" comment="nodejs-4.6.0-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134145" comment="nodejs-devel-4.6.0-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133733" comment="nodejs-doc-4.6.0-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133602" comment="openssl-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133603" comment="openssl-doc-1.0.1k-2.39.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2179</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2179" source="CVE"/>
    <description>
    The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related to d1_lib.c, statem_dtls.c, statem_lib.c, and statem_srvr.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133596" comment="libopenssl-devel-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133597" comment="libopenssl-devel-32bit-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133598" comment="libopenssl1_0_0-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133599" comment="libopenssl1_0_0-32bit-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133600" comment="libopenssl1_0_0-hmac-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133601" comment="libopenssl1_0_0-hmac-32bit-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133602" comment="openssl-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133603" comment="openssl-doc-1.0.1k-2.39.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2180</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2180" source="CVE"/>
    <description>
    The TS_OBJ_print_bio function in crypto/ts/ts_lib.c in the X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) implementation in OpenSSL through 1.0.2h allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted time-stamp file that is mishandled by the "openssl ts" command.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133596" comment="libopenssl-devel-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133597" comment="libopenssl-devel-32bit-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133598" comment="libopenssl1_0_0-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133599" comment="libopenssl1_0_0-32bit-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133600" comment="libopenssl1_0_0-hmac-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133601" comment="libopenssl1_0_0-hmac-32bit-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133602" comment="openssl-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133603" comment="openssl-doc-1.0.1k-2.39.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2181</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2181" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2181" source="CVE"/>
    <description>
    The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133596" comment="libopenssl-devel-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133597" comment="libopenssl-devel-32bit-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133598" comment="libopenssl1_0_0-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133599" comment="libopenssl1_0_0-32bit-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133600" comment="libopenssl1_0_0-hmac-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133601" comment="libopenssl1_0_0-hmac-32bit-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133602" comment="openssl-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133603" comment="openssl-doc-1.0.1k-2.39.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2182</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2182" source="CVE"/>
    <description>
    The BN_bn2dec function in crypto/bn/bn_print.c in OpenSSL before 1.1.0 does not properly validate division results, which allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133596" comment="libopenssl-devel-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133597" comment="libopenssl-devel-32bit-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133598" comment="libopenssl1_0_0-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133599" comment="libopenssl1_0_0-32bit-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133600" comment="libopenssl1_0_0-hmac-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133601" comment="libopenssl1_0_0-hmac-32bit-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133602" comment="openssl-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133603" comment="openssl-doc-1.0.1k-2.39.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2183</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183" source="CVE"/>
    <description>
    The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133596" comment="libopenssl-devel-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133597" comment="libopenssl-devel-32bit-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133598" comment="libopenssl1_0_0-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133599" comment="libopenssl1_0_0-32bit-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133600" comment="libopenssl1_0_0-hmac-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133601" comment="libopenssl1_0_0-hmac-32bit-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134144" comment="nodejs-4.6.0-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134145" comment="nodejs-devel-4.6.0-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133733" comment="nodejs-doc-4.6.0-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133602" comment="openssl-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133603" comment="openssl-doc-1.0.1k-2.39.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2184</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2184" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2184" source="CVE"/>
    <description>
    The create_fixed_stream_quirk function in sound/usb/quirks.c in the snd-usb-audio driver in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference or double free, and system crash) via a crafted endpoints value in a USB device descriptor.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2185</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2185" source="CVE"/>
    <description>
    The ati_remote2_probe function in drivers/input/misc/ati_remote2.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2186</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2186" source="CVE"/>
    <description>
    The powermate_probe function in drivers/input/misc/powermate.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2187</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2187" source="CVE"/>
    <description>
    The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel through 4.5.2 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2188</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2188" source="CVE"/>
    <description>
    The iowarrior_probe function in drivers/usb/misc/iowarrior.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2191</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2191" source="CVE"/>
    <description>
    The bmp_read_rows function in pngxtern/pngxrbmp.c in OptiPNG before 0.7.6 allows remote attackers to cause a denial of service (invalid memory write and crash) via a series of delta escapes in a crafted BMP image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126349" comment="optipng-0.7.5-2.3.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2198</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2198" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2198" source="CVE"/>
    <description>
    QEMU (aka Quick Emulator) built with the USB EHCI emulation support is vulnerable to a null pointer dereference flaw. It could occur when an application attempts to write to EHCI capabilities registers. A privileged user inside quest could use this flaw to crash the QEMU process instance resulting in DoS.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126020" comment="xen-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126021" comment="xen-devel-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126022" comment="xen-doc-html-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126023" comment="xen-kmp-default-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126024" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126025" comment="xen-libs-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126026" comment="xen-libs-32bit-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126027" comment="xen-tools-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126028" comment="xen-tools-domU-4.4.4_02-43.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2216</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2216" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2216" source="CVE"/>
    <description>
    The HTTP header parsing code in Node.js 0.10.x before 0.10.42, 0.11.6 through 0.11.16, 0.12.x before 0.12.10, 4.x before 4.3.0, and 5.x before 5.6.0 allows remote attackers to bypass an HTTP response-splitting protection mechanism via UTF-8 encoded Unicode characters in the HTTP header, as demonstrated by %c4%8d%c4%8a.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123861" comment="nodejs-4.3.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123862" comment="nodejs-devel-4.3.1-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123856" comment="nodejs-doc-4.3.1-15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2270</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2270" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2270" source="CVE"/>
    <description>
    Xen 4.6.x and earlier allows local guest administrators to cause a denial of service (host reboot) via vectors related to multiple mappings of MMIO pages with different cachability settings.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126020" comment="xen-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126021" comment="xen-devel-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126022" comment="xen-doc-html-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126023" comment="xen-kmp-default-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126024" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126025" comment="xen-libs-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126026" comment="xen-libs-32bit-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126027" comment="xen-tools-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126028" comment="xen-tools-domU-4.4.4_02-43.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2271</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2271" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2271" source="CVE"/>
    <description>
    VMX in Xen 4.6.x and earlier, when using an Intel or Cyrix CPU, allows local HVM guest users to cause a denial of service (guest crash) via vectors related to a non-canonical RIP.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126020" comment="xen-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126021" comment="xen-devel-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126022" comment="xen-doc-html-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126023" comment="xen-kmp-default-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126024" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126025" comment="xen-libs-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126026" comment="xen-libs-32bit-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126027" comment="xen-tools-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126028" comment="xen-tools-domU-4.4.4_02-43.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2313</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2313" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2313" source="CVE"/>
    <description>
    auth_login.php in Cacti before 0.8.8g allows remote authenticated users who use web authentication to bypass intended access restrictions by logging in as a user not in the cacti database.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009123266" comment="cacti-0.8.8f-4.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009123267" comment="cacti-spine-0.8.8f-4.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2315</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2315" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2315" source="CVE"/>
    <description>
    revision.c in git before 2.7.4 uses an incorrect integer data type, which allows remote attackers to execute arbitrary code via a (1) long filename or (2) many nested trees, leading to a heap-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124868" comment="cgit-0.12-13.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124869" comment="git-2.1.4-19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124870" comment="git-arch-2.1.4-19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124871" comment="git-core-2.1.4-19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124872" comment="git-cvs-2.1.4-19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124873" comment="git-daemon-2.1.4-19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124874" comment="git-doc-2.1.4-19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124875" comment="git-email-2.1.4-19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124876" comment="git-gui-2.1.4-19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124877" comment="git-svn-2.1.4-19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124878" comment="git-web-2.1.4-19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124879" comment="gitk-2.1.4-19.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2317</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2317" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2317" source="CVE"/>
    <description>
    Multiple buffer overflows in GraphicsMagick 1.3.23 allow remote attackers to cause a denial of service (crash) via a crafted SVG file, related to the (1) TracePoint function in magick/render.c, (2) GetToken function in magick/utility.c, and (3) GetTransformTokens function in coders/svg.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129696" comment="GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129697" comment="GraphicsMagick-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129698" comment="libGraphicsMagick++-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129699" comment="libGraphicsMagick++-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129700" comment="libGraphicsMagick-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129701" comment="libGraphicsMagick3-config-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129702" comment="libGraphicsMagickWand-Q16-2-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129703" comment="perl-GraphicsMagick-1.3.20-9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2318</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2318" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2318" source="CVE"/>
    <description>
    GraphicsMagick 1.3.23 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted SVG file, related to the (1) DrawImage function in magick/render.c, (2) SVGStartElement function in coders/svg.c, and (3) TraceArcPath function in magick/render.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129696" comment="GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129697" comment="GraphicsMagick-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129698" comment="libGraphicsMagick++-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129699" comment="libGraphicsMagick++-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129700" comment="libGraphicsMagick-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129701" comment="libGraphicsMagick3-config-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129702" comment="libGraphicsMagickWand-Q16-2-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129703" comment="perl-GraphicsMagick-1.3.20-9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2324</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2324" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2324" source="CVE"/>
    <description>
    Integer overflow in Git before 2.7.4 allows remote attackers to execute arbitrary code via a (1) long filename or (2) many nested trees, which triggers a heap-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124868" comment="cgit-0.12-13.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124869" comment="git-2.1.4-19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124870" comment="git-arch-2.1.4-19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124871" comment="git-core-2.1.4-19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124872" comment="git-cvs-2.1.4-19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124873" comment="git-daemon-2.1.4-19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124874" comment="git-doc-2.1.4-19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124875" comment="git-email-2.1.4-19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124876" comment="git-gui-2.1.4-19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124877" comment="git-svn-2.1.4-19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124878" comment="git-web-2.1.4-19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124879" comment="gitk-2.1.4-19.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2335</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2335" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2335" source="CVE"/>
    <description>
    The CInArchive::ReadFileItem method in Archive/Udf/UdfIn.cpp in 7zip 9.20 and 15.05 beta and p7zip allows remote attackers to cause a denial of service (out-of-bounds read) or execute arbitrary code via the PartitionRef field in the Long Allocation Descriptor in a UDF file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128377" comment="p7zip-9.20.1-12.6.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2342</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2342" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2342" source="CVE"/>
    <description>
    The bgp_nlri_parse_vpnv4 function in bgp_mplsvpn.c in the VPNv4 NLRI parser in bgpd in Quagga before 1.0.20160309, when a certain VPNv4 configuration is used, relies on a Labeled-VPN SAFI routes-data length field during a data copy, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125306" comment="quagga-0.99.23-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125307" comment="quagga-devel-0.99.23-2.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2347</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2347" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2347" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126115" comment="lhasa-0.3.1-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126116" comment="lhasa-devel-0.3.1-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126117" comment="liblhasa0-0.3.1-4.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2381</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2381" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2381" source="CVE"/>
    <description>
    Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125347" comment="perl-5.20.1-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125348" comment="perl-32bit-5.20.1-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125349" comment="perl-base-5.20.1-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125350" comment="perl-base-32bit-5.20.1-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125351" comment="perl-doc-5.20.1-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2384</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2384" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2384" source="CVE"/>
    <description>
    Double free vulnerability in the snd_usbmidi_create function in sound/usb/midi.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (panic) or possibly have unspecified other impact via vectors involving an invalid USB descriptor.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2392</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2392" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2392" source="CVE"/>
    <description>
    The is_rndis function in the USB Net device emulator (hw/usb/dev-network.c) in QEMU before 2.5.1 does not properly validate USB configuration descriptor objects, which allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving a remote NDIS control message packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126020" comment="xen-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126021" comment="xen-devel-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126022" comment="xen-doc-html-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126023" comment="xen-kmp-default-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126024" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126025" comment="xen-libs-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126026" comment="xen-libs-32bit-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126027" comment="xen-tools-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126028" comment="xen-tools-domU-4.4.4_02-43.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2510</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2510" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2510" source="CVE"/>
    <description>
    BeanShell (bsh) before 2.0b6, when included on the classpath by an application that uses Java serialization or XStream, allows remote attackers to execute arbitrary code via crafted serialized data, related to XThis.Handler.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125209" comment="bsh2-2.0.0.b6-27.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125210" comment="bsh2-bsf-2.0.0.b6-27.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125211" comment="bsh2-classgen-2.0.0.b6-27.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125212" comment="bsh2-demo-2.0.0.b6-27.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125213" comment="bsh2-javadoc-2.0.0.b6-27.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125214" comment="bsh2-manual-2.0.0.b6-27.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2516</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2516" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516" source="CVE"/>
    <description>
    NTP before 4.2.8p7 and 4.3.x before 4.3.92, when mode7 is enabled, allows remote attackers to cause a denial of service (ntpd abort) by using the same IP address multiple times in an unconfig directive.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128159" comment="ntp-4.2.8p7-25.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128160" comment="ntp-doc-4.2.8p7-25.15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2517</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2517" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2517" source="CVE"/>
    <description>
    NTP before 4.2.8p7 and 4.3.x before 4.3.92 allows remote attackers to cause a denial of service (prevent subsequent authentication) by leveraging knowledge of the controlkey or requestkey and sending a crafted packet to ntpd, which changes the value of trustedkey, controlkey, or requestkey.  NOTE: this vulnerability exists because of a CVE-2016-2516 regression.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128159" comment="ntp-4.2.8p7-25.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128160" comment="ntp-doc-4.2.8p7-25.15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2518</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2518" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518" source="CVE"/>
    <description>
    The MATCH_ASSOC function in NTP before version 4.2.8p9 and 4.3.x before 4.3.92 allows remote attackers to cause an out-of-bounds reference via an addpeer request with a large hmode value.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128159" comment="ntp-4.2.8p7-25.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128160" comment="ntp-doc-4.2.8p7-25.15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2519</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2519" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2519" source="CVE"/>
    <description>
    ntpd in NTP before 4.2.8p7 and 4.3.x before 4.3.92 allows remote attackers to cause a denial of service (ntpd abort) by a large request data value, which triggers the ctl_getitem function to return a NULL value.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128159" comment="ntp-4.2.8p7-25.15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128160" comment="ntp-doc-4.2.8p7-25.15.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2523</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2523" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2523" source="CVE"/>
    <description>
    The dnp3_al_process_object function in epan/dissectors/packet-dnp.c in the DNP3 dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124451" comment="wireshark-1.12.10-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124452" comment="wireshark-devel-1.12.10-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124453" comment="wireshark-ui-gtk-1.12.10-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124454" comment="wireshark-ui-qt-1.12.10-32.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2530</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2530" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2530" source="CVE"/>
    <description>
    The dissct_rsl_ipaccess_msg function in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 mishandles the case of an unrecognized TLV type, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet, a different vulnerability than CVE-2016-2531.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124451" comment="wireshark-1.12.10-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124452" comment="wireshark-devel-1.12.10-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124453" comment="wireshark-ui-gtk-1.12.10-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124454" comment="wireshark-ui-qt-1.12.10-32.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2531</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2531" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2531" source="CVE"/>
    <description>
    Off-by-one error in epan/dissectors/packet-rsl.c in the RSL dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted packet that triggers a 0xff tag value, a different vulnerability than CVE-2016-2530.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124451" comment="wireshark-1.12.10-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124452" comment="wireshark-devel-1.12.10-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124453" comment="wireshark-ui-gtk-1.12.10-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124454" comment="wireshark-ui-qt-1.12.10-32.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2532</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2532" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2532" source="CVE"/>
    <description>
    The dissect_llrp_parameters function in epan/dissectors/packet-llrp.c in the LLRP dissector in Wireshark 1.12.x before 1.12.10 and 2.0.x before 2.0.2 does not limit the recursion depth, which allows remote attackers to cause a denial of service (memory consumption or application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124451" comment="wireshark-1.12.10-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124452" comment="wireshark-devel-1.12.10-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124453" comment="wireshark-ui-gtk-1.12.10-32.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124454" comment="wireshark-ui-qt-1.12.10-32.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2538</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2538" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2538" source="CVE"/>
    <description>
    Multiple integer overflows in the USB Net device emulator (hw/usb/dev-network.c) in QEMU before 2.5.1 allow local guest OS administrators to cause a denial of service (QEMU process crash) or obtain sensitive host memory information via a remote NDIS control message packet that is mishandled in the (1) rndis_query_response, (2) rndis_set_response, or (3) usb_net_handle_dataout function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126020" comment="xen-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126021" comment="xen-devel-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126022" comment="xen-doc-html-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126023" comment="xen-kmp-default-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126024" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_35-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126025" comment="xen-libs-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126026" comment="xen-libs-32bit-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126027" comment="xen-tools-4.4.4_02-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126028" comment="xen-tools-domU-4.4.4_02-43.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2543</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2543" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2543" source="CVE"/>
    <description>
    The snd_seq_ioctl_remove_events function in sound/core/seq/seq_clientmgr.c in the Linux kernel before 4.4.1 does not verify FIFO assignment before proceeding with FIFO clearing, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted ioctl call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2544</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2544" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2544" source="CVE"/>
    <description>
    Race condition in the queue_delete function in sound/core/seq/seq_queue.c in the Linux kernel before 4.4.1 allows local users to cause a denial of service (use-after-free and system crash) by making an ioctl call at a certain time.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2545</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2545" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2545" source="CVE"/>
    <description>
    The snd_timer_interrupt function in sound/core/timer.c in the Linux kernel before 4.4.1 does not properly maintain a certain linked list, which allows local users to cause a denial of service (race condition and system crash) via a crafted ioctl call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2546</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2546" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2546" source="CVE"/>
    <description>
    sound/core/timer.c in the Linux kernel before 4.4.1 uses an incorrect type of mutex, which allows local users to cause a denial of service (race condition, use-after-free, and system crash) via a crafted ioctl call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2547</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2547" source="CVE"/>
    <description>
    sound/core/timer.c in the Linux kernel before 4.4.1 employs a locking approach that does not consider slave timer instances, which allows local users to cause a denial of service (race condition, use-after-free, and system crash) via a crafted ioctl call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2548</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2548" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2548" source="CVE"/>
    <description>
    sound/core/timer.c in the Linux kernel before 4.4.1 retains certain linked lists after a close or stop action, which allows local users to cause a denial of service (system crash) via a crafted ioctl call, related to the (1) snd_timer_close and (2) _snd_timer_stop functions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2549</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2549" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2549" source="CVE"/>
    <description>
    sound/core/hrtimer.c in the Linux kernel before 4.4.1 does not prevent recursive callback access, which allows local users to cause a denial of service (deadlock) via a crafted ioctl call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2554</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2554" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2554" source="CVE"/>
    <description>
    Stack-based buffer overflow in ext/phar/tar.c in PHP before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TAR archive.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124528" comment="apache2-mod_php5-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124529" comment="php5-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124530" comment="php5-bcmath-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124531" comment="php5-bz2-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124532" comment="php5-calendar-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124533" comment="php5-ctype-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124534" comment="php5-curl-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124535" comment="php5-dba-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124536" comment="php5-devel-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124537" comment="php5-dom-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124538" comment="php5-enchant-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124539" comment="php5-exif-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124540" comment="php5-fastcgi-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124541" comment="php5-fileinfo-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124542" comment="php5-firebird-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124543" comment="php5-fpm-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124544" comment="php5-ftp-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124545" comment="php5-gd-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124546" comment="php5-gettext-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124547" comment="php5-gmp-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124548" comment="php5-iconv-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124549" comment="php5-imap-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124550" comment="php5-intl-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124551" comment="php5-json-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124552" comment="php5-ldap-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124553" comment="php5-mbstring-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124554" comment="php5-mcrypt-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124555" comment="php5-mssql-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124556" comment="php5-mysql-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124557" comment="php5-odbc-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124558" comment="php5-opcache-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124559" comment="php5-openssl-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124560" comment="php5-pcntl-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124561" comment="php5-pdo-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124562" comment="php5-pear-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124563" comment="php5-pgsql-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124564" comment="php5-phar-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124565" comment="php5-posix-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124566" comment="php5-pspell-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124567" comment="php5-readline-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124568" comment="php5-shmop-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124569" comment="php5-snmp-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124570" comment="php5-soap-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124571" comment="php5-sockets-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124572" comment="php5-sqlite-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124573" comment="php5-suhosin-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124574" comment="php5-sysvmsg-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124575" comment="php5-sysvsem-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124576" comment="php5-sysvshm-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124577" comment="php5-tidy-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124578" comment="php5-tokenizer-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124579" comment="php5-wddx-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124580" comment="php5-xmlreader-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124581" comment="php5-xmlrpc-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124582" comment="php5-xmlwriter-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124583" comment="php5-xsl-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124584" comment="php5-zip-5.6.1-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124585" comment="php5-zlib-5.6.1-42.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2560</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2560" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 4.0.x before 4.0.10.15, 4.4.x before 4.4.15.5, and 4.5.x before 4.5.5.1 allow remote attackers to inject arbitrary web script or HTML via (1) a crafted Host HTTP header, related to libraries/Config.class.php; (2) crafted JSON data, related to file_echo.php; (3) a crafted SQL query, related to js/functions.js; (4) the initial parameter to libraries/server_privileges.lib.php in the user accounts page; or (5) the it parameter to libraries/controllers/TableSearchController.class.php in the zoom search page.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124457" comment="phpMyAdmin-4.4.15.5-30.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2561</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2561" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2561" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 4.4.x before 4.4.15.5 and 4.5.x before 4.5.5.1 allow remote authenticated users to inject arbitrary web script or HTML via (1) normalization.php or (2) js/normalization.js in the database normalization page, (3) templates/database/structure/sortable_header.phtml in the database structure page, or (4) the pos parameter to db_central_columns.php in the central columns page.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124457" comment="phpMyAdmin-4.4.15.5-30.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2563</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2563" source="CVE"/>
    <description>
    Stack-based buffer overflow in the SCP command-line utility in PuTTY before 0.67 and KiTTY 0.66.6.3 and earlier allows remote servers to cause a denial of service (stack memory corruption) or execute arbitrary code via a crafted SCP-SINK file-size response to an SCP download request.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128327" comment="putty-0.67-4.10.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2776</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2776" source="CVE"/>
    <description>
    buffer.c in named in ISC BIND 9 before 9.9.9-P3, 9.10.x before 9.10.4-P3, and 9.11.x before 9.11.0rc3 does not properly construct responses, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted query.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134146" comment="bind-9.9.6P1-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134147" comment="bind-chrootenv-9.9.6P1-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134148" comment="bind-devel-9.9.6P1-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134149" comment="bind-doc-9.9.6P1-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134150" comment="bind-libs-9.9.6P1-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134151" comment="bind-libs-32bit-9.9.6P1-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134152" comment="bind-lwresd-9.9.6P1-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134153" comment="bind-utils-9.9.6P1-2.22.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2782</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2782" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2782" source="CVE"/>
    <description>
    The treo_attach function in drivers/usb/serial/visor.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a (1) bulk-in or (2) interrupt-in endpoint.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2790</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2790" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2790" source="CVE"/>
    <description>
    The graphite2::TtfUtil::GetTableInfo function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, does not initialize memory for an unspecified data structure, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted Graphite smart font.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124660" comment="MozillaFirefox-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124661" comment="MozillaFirefox-branding-upstream-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124662" comment="MozillaFirefox-buildsymbols-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124663" comment="MozillaFirefox-devel-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124664" comment="MozillaFirefox-translations-common-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124665" comment="MozillaFirefox-translations-other-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129880" comment="MozillaThunderbird-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129881" comment="MozillaThunderbird-buildsymbols-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129882" comment="MozillaThunderbird-devel-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129883" comment="MozillaThunderbird-translations-common-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129884" comment="MozillaThunderbird-translations-other-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124666" comment="libfreebl3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124667" comment="libfreebl3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124668" comment="libsoftokn3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124669" comment="libsoftokn3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124670" comment="mozilla-nspr-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124671" comment="mozilla-nspr-32bit-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124672" comment="mozilla-nspr-devel-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124673" comment="mozilla-nss-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124674" comment="mozilla-nss-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124675" comment="mozilla-nss-certs-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124676" comment="mozilla-nss-certs-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124677" comment="mozilla-nss-devel-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124678" comment="mozilla-nss-sysinit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124679" comment="mozilla-nss-sysinit-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124680" comment="mozilla-nss-tools-3.21.1-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2791</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2791" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2791" source="CVE"/>
    <description>
    The graphite2::GlyphCache::glyph function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124660" comment="MozillaFirefox-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124661" comment="MozillaFirefox-branding-upstream-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124662" comment="MozillaFirefox-buildsymbols-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124663" comment="MozillaFirefox-devel-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124664" comment="MozillaFirefox-translations-common-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124665" comment="MozillaFirefox-translations-other-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129880" comment="MozillaThunderbird-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129881" comment="MozillaThunderbird-buildsymbols-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129882" comment="MozillaThunderbird-devel-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129883" comment="MozillaThunderbird-translations-common-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129884" comment="MozillaThunderbird-translations-other-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124666" comment="libfreebl3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124667" comment="libfreebl3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124668" comment="libsoftokn3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124669" comment="libsoftokn3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124670" comment="mozilla-nspr-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124671" comment="mozilla-nspr-32bit-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124672" comment="mozilla-nspr-devel-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124673" comment="mozilla-nss-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124674" comment="mozilla-nss-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124675" comment="mozilla-nss-certs-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124676" comment="mozilla-nss-certs-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124677" comment="mozilla-nss-devel-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124678" comment="mozilla-nss-sysinit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124679" comment="mozilla-nss-sysinit-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124680" comment="mozilla-nss-tools-3.21.1-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2792</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2792" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2792" source="CVE"/>
    <description>
    The graphite2::Slot::getAttr function in Slot.cpp in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font, a different vulnerability than CVE-2016-2800.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124660" comment="MozillaFirefox-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124661" comment="MozillaFirefox-branding-upstream-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124662" comment="MozillaFirefox-buildsymbols-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124663" comment="MozillaFirefox-devel-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124664" comment="MozillaFirefox-translations-common-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124665" comment="MozillaFirefox-translations-other-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129880" comment="MozillaThunderbird-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129881" comment="MozillaThunderbird-buildsymbols-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129882" comment="MozillaThunderbird-devel-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129883" comment="MozillaThunderbird-translations-common-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129884" comment="MozillaThunderbird-translations-other-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124666" comment="libfreebl3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124667" comment="libfreebl3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124668" comment="libsoftokn3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124669" comment="libsoftokn3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124670" comment="mozilla-nspr-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124671" comment="mozilla-nspr-32bit-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124672" comment="mozilla-nspr-devel-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124673" comment="mozilla-nss-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124674" comment="mozilla-nss-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124675" comment="mozilla-nss-certs-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124676" comment="mozilla-nss-certs-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124677" comment="mozilla-nss-devel-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124678" comment="mozilla-nss-sysinit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124679" comment="mozilla-nss-sysinit-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124680" comment="mozilla-nss-tools-3.21.1-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2793</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2793" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2793" source="CVE"/>
    <description>
    CachedCmap.cpp in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124660" comment="MozillaFirefox-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124661" comment="MozillaFirefox-branding-upstream-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124662" comment="MozillaFirefox-buildsymbols-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124663" comment="MozillaFirefox-devel-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124664" comment="MozillaFirefox-translations-common-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124665" comment="MozillaFirefox-translations-other-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129880" comment="MozillaThunderbird-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129881" comment="MozillaThunderbird-buildsymbols-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129882" comment="MozillaThunderbird-devel-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129883" comment="MozillaThunderbird-translations-common-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129884" comment="MozillaThunderbird-translations-other-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124666" comment="libfreebl3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124667" comment="libfreebl3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124668" comment="libsoftokn3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124669" comment="libsoftokn3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124670" comment="mozilla-nspr-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124671" comment="mozilla-nspr-32bit-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124672" comment="mozilla-nspr-devel-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124673" comment="mozilla-nss-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124674" comment="mozilla-nss-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124675" comment="mozilla-nss-certs-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124676" comment="mozilla-nss-certs-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124677" comment="mozilla-nss-devel-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124678" comment="mozilla-nss-sysinit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124679" comment="mozilla-nss-sysinit-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124680" comment="mozilla-nss-tools-3.21.1-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2794</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2794" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2794" source="CVE"/>
    <description>
    The graphite2::TtfUtil::CmapSubtable12NextCodepoint function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124660" comment="MozillaFirefox-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124661" comment="MozillaFirefox-branding-upstream-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124662" comment="MozillaFirefox-buildsymbols-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124663" comment="MozillaFirefox-devel-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124664" comment="MozillaFirefox-translations-common-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124665" comment="MozillaFirefox-translations-other-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129880" comment="MozillaThunderbird-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129881" comment="MozillaThunderbird-buildsymbols-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129882" comment="MozillaThunderbird-devel-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129883" comment="MozillaThunderbird-translations-common-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129884" comment="MozillaThunderbird-translations-other-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124666" comment="libfreebl3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124667" comment="libfreebl3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124668" comment="libsoftokn3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124669" comment="libsoftokn3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124670" comment="mozilla-nspr-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124671" comment="mozilla-nspr-32bit-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124672" comment="mozilla-nspr-devel-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124673" comment="mozilla-nss-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124674" comment="mozilla-nss-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124675" comment="mozilla-nss-certs-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124676" comment="mozilla-nss-certs-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124677" comment="mozilla-nss-devel-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124678" comment="mozilla-nss-sysinit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124679" comment="mozilla-nss-sysinit-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124680" comment="mozilla-nss-tools-3.21.1-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2795</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2795" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2795" source="CVE"/>
    <description>
    The graphite2::FileFace::get_table_fn function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, does not initialize memory for an unspecified data structure, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted Graphite smart font.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124660" comment="MozillaFirefox-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124661" comment="MozillaFirefox-branding-upstream-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124662" comment="MozillaFirefox-buildsymbols-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124663" comment="MozillaFirefox-devel-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124664" comment="MozillaFirefox-translations-common-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124665" comment="MozillaFirefox-translations-other-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129880" comment="MozillaThunderbird-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129881" comment="MozillaThunderbird-buildsymbols-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129882" comment="MozillaThunderbird-devel-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129883" comment="MozillaThunderbird-translations-common-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129884" comment="MozillaThunderbird-translations-other-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124666" comment="libfreebl3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124667" comment="libfreebl3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124668" comment="libsoftokn3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124669" comment="libsoftokn3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124670" comment="mozilla-nspr-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124671" comment="mozilla-nspr-32bit-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124672" comment="mozilla-nspr-devel-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124673" comment="mozilla-nss-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124674" comment="mozilla-nss-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124675" comment="mozilla-nss-certs-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124676" comment="mozilla-nss-certs-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124677" comment="mozilla-nss-devel-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124678" comment="mozilla-nss-sysinit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124679" comment="mozilla-nss-sysinit-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124680" comment="mozilla-nss-tools-3.21.1-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2796</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2796" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2796" source="CVE"/>
    <description>
    Heap-based buffer overflow in the graphite2::vm::Machine::Code::Code function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124660" comment="MozillaFirefox-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124661" comment="MozillaFirefox-branding-upstream-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124662" comment="MozillaFirefox-buildsymbols-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124663" comment="MozillaFirefox-devel-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124664" comment="MozillaFirefox-translations-common-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124665" comment="MozillaFirefox-translations-other-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129880" comment="MozillaThunderbird-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129881" comment="MozillaThunderbird-buildsymbols-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129882" comment="MozillaThunderbird-devel-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129883" comment="MozillaThunderbird-translations-common-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129884" comment="MozillaThunderbird-translations-other-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124666" comment="libfreebl3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124667" comment="libfreebl3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124668" comment="libsoftokn3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124669" comment="libsoftokn3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124670" comment="mozilla-nspr-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124671" comment="mozilla-nspr-32bit-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124672" comment="mozilla-nspr-devel-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124673" comment="mozilla-nss-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124674" comment="mozilla-nss-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124675" comment="mozilla-nss-certs-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124676" comment="mozilla-nss-certs-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124677" comment="mozilla-nss-devel-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124678" comment="mozilla-nss-sysinit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124679" comment="mozilla-nss-sysinit-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124680" comment="mozilla-nss-tools-3.21.1-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2797</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2797" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2797" source="CVE"/>
    <description>
    The graphite2::TtfUtil::CmapSubtable12Lookup function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font, a different vulnerability than CVE-2016-2801.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124660" comment="MozillaFirefox-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124661" comment="MozillaFirefox-branding-upstream-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124662" comment="MozillaFirefox-buildsymbols-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124663" comment="MozillaFirefox-devel-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124664" comment="MozillaFirefox-translations-common-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124665" comment="MozillaFirefox-translations-other-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129880" comment="MozillaThunderbird-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129881" comment="MozillaThunderbird-buildsymbols-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129882" comment="MozillaThunderbird-devel-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129883" comment="MozillaThunderbird-translations-common-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129884" comment="MozillaThunderbird-translations-other-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124666" comment="libfreebl3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124667" comment="libfreebl3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124668" comment="libsoftokn3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124669" comment="libsoftokn3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124670" comment="mozilla-nspr-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124671" comment="mozilla-nspr-32bit-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124672" comment="mozilla-nspr-devel-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124673" comment="mozilla-nss-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124674" comment="mozilla-nss-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124675" comment="mozilla-nss-certs-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124676" comment="mozilla-nss-certs-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124677" comment="mozilla-nss-devel-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124678" comment="mozilla-nss-sysinit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124679" comment="mozilla-nss-sysinit-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124680" comment="mozilla-nss-tools-3.21.1-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2798</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2798" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2798" source="CVE"/>
    <description>
    The graphite2::GlyphCache::Loader::Loader function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124660" comment="MozillaFirefox-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124661" comment="MozillaFirefox-branding-upstream-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124662" comment="MozillaFirefox-buildsymbols-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124663" comment="MozillaFirefox-devel-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124664" comment="MozillaFirefox-translations-common-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124665" comment="MozillaFirefox-translations-other-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129880" comment="MozillaThunderbird-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129881" comment="MozillaThunderbird-buildsymbols-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129882" comment="MozillaThunderbird-devel-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129883" comment="MozillaThunderbird-translations-common-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129884" comment="MozillaThunderbird-translations-other-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124666" comment="libfreebl3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124667" comment="libfreebl3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124668" comment="libsoftokn3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124669" comment="libsoftokn3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124670" comment="mozilla-nspr-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124671" comment="mozilla-nspr-32bit-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124672" comment="mozilla-nspr-devel-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124673" comment="mozilla-nss-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124674" comment="mozilla-nss-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124675" comment="mozilla-nss-certs-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124676" comment="mozilla-nss-certs-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124677" comment="mozilla-nss-devel-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124678" comment="mozilla-nss-sysinit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124679" comment="mozilla-nss-sysinit-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124680" comment="mozilla-nss-tools-3.21.1-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2799</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2799" source="CVE"/>
    <description>
    Heap-based buffer overflow in the graphite2::Slot::setAttr function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124660" comment="MozillaFirefox-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124661" comment="MozillaFirefox-branding-upstream-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124662" comment="MozillaFirefox-buildsymbols-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124663" comment="MozillaFirefox-devel-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124664" comment="MozillaFirefox-translations-common-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124665" comment="MozillaFirefox-translations-other-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129880" comment="MozillaThunderbird-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129881" comment="MozillaThunderbird-buildsymbols-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129882" comment="MozillaThunderbird-devel-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129883" comment="MozillaThunderbird-translations-common-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129884" comment="MozillaThunderbird-translations-other-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124666" comment="libfreebl3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124667" comment="libfreebl3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124668" comment="libsoftokn3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124669" comment="libsoftokn3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124670" comment="mozilla-nspr-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124671" comment="mozilla-nspr-32bit-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124672" comment="mozilla-nspr-devel-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124673" comment="mozilla-nss-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124674" comment="mozilla-nss-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124675" comment="mozilla-nss-certs-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124676" comment="mozilla-nss-certs-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124677" comment="mozilla-nss-devel-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124678" comment="mozilla-nss-sysinit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124679" comment="mozilla-nss-sysinit-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124680" comment="mozilla-nss-tools-3.21.1-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2800</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2800" source="CVE"/>
    <description>
    The graphite2::Slot::getAttr function in Slot.cpp in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font, a different vulnerability than CVE-2016-2792.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124660" comment="MozillaFirefox-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124661" comment="MozillaFirefox-branding-upstream-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124662" comment="MozillaFirefox-buildsymbols-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124663" comment="MozillaFirefox-devel-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124664" comment="MozillaFirefox-translations-common-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124665" comment="MozillaFirefox-translations-other-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129880" comment="MozillaThunderbird-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129881" comment="MozillaThunderbird-buildsymbols-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129882" comment="MozillaThunderbird-devel-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129883" comment="MozillaThunderbird-translations-common-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129884" comment="MozillaThunderbird-translations-other-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124666" comment="libfreebl3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124667" comment="libfreebl3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124668" comment="libsoftokn3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124669" comment="libsoftokn3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124670" comment="mozilla-nspr-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124671" comment="mozilla-nspr-32bit-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124672" comment="mozilla-nspr-devel-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124673" comment="mozilla-nss-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124674" comment="mozilla-nss-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124675" comment="mozilla-nss-certs-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124676" comment="mozilla-nss-certs-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124677" comment="mozilla-nss-devel-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124678" comment="mozilla-nss-sysinit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124679" comment="mozilla-nss-sysinit-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124680" comment="mozilla-nss-tools-3.21.1-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2801</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2801" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2801" source="CVE"/>
    <description>
    The graphite2::TtfUtil::CmapSubtable12Lookup function in TtfUtil.cpp in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font, a different vulnerability than CVE-2016-2797.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124660" comment="MozillaFirefox-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124661" comment="MozillaFirefox-branding-upstream-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124662" comment="MozillaFirefox-buildsymbols-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124663" comment="MozillaFirefox-devel-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124664" comment="MozillaFirefox-translations-common-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124665" comment="MozillaFirefox-translations-other-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129880" comment="MozillaThunderbird-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129881" comment="MozillaThunderbird-buildsymbols-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129882" comment="MozillaThunderbird-devel-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129883" comment="MozillaThunderbird-translations-common-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129884" comment="MozillaThunderbird-translations-other-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124666" comment="libfreebl3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124667" comment="libfreebl3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124668" comment="libsoftokn3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124669" comment="libsoftokn3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124670" comment="mozilla-nspr-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124671" comment="mozilla-nspr-32bit-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124672" comment="mozilla-nspr-devel-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124673" comment="mozilla-nss-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124674" comment="mozilla-nss-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124675" comment="mozilla-nss-certs-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124676" comment="mozilla-nss-certs-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124677" comment="mozilla-nss-devel-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124678" comment="mozilla-nss-sysinit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124679" comment="mozilla-nss-sysinit-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124680" comment="mozilla-nss-tools-3.21.1-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2802</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2802" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2802" source="CVE"/>
    <description>
    The graphite2::TtfUtil::CmapSubtable4NextCodepoint function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124660" comment="MozillaFirefox-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124661" comment="MozillaFirefox-branding-upstream-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124662" comment="MozillaFirefox-buildsymbols-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124663" comment="MozillaFirefox-devel-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124664" comment="MozillaFirefox-translations-common-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124665" comment="MozillaFirefox-translations-other-45.0-65.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129880" comment="MozillaThunderbird-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129881" comment="MozillaThunderbird-buildsymbols-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129882" comment="MozillaThunderbird-devel-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129883" comment="MozillaThunderbird-translations-common-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129884" comment="MozillaThunderbird-translations-other-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124666" comment="libfreebl3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124667" comment="libfreebl3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124668" comment="libsoftokn3-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124669" comment="libsoftokn3-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124670" comment="mozilla-nspr-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124671" comment="mozilla-nspr-32bit-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124672" comment="mozilla-nspr-devel-4.12-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124673" comment="mozilla-nss-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124674" comment="mozilla-nss-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124675" comment="mozilla-nss-certs-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124676" comment="mozilla-nss-certs-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124677" comment="mozilla-nss-devel-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124678" comment="mozilla-nss-sysinit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124679" comment="mozilla-nss-sysinit-32bit-3.21.1-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124680" comment="mozilla-nss-tools-3.21.1-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2804</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2804" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2804" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 46.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127203" comment="MozillaFirefox-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127204" comment="MozillaFirefox-branding-upstream-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127205" comment="MozillaFirefox-buildsymbols-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127206" comment="MozillaFirefox-devel-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127207" comment="MozillaFirefox-translations-common-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127208" comment="MozillaFirefox-translations-other-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127209" comment="libfreebl3-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127210" comment="libfreebl3-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127211" comment="libsoftokn3-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127212" comment="libsoftokn3-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127213" comment="mozilla-nss-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127214" comment="mozilla-nss-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127215" comment="mozilla-nss-certs-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127216" comment="mozilla-nss-certs-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127217" comment="mozilla-nss-devel-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127218" comment="mozilla-nss-sysinit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127219" comment="mozilla-nss-sysinit-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127220" comment="mozilla-nss-tools-3.22.3-31.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2806</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2806" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2806" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 46.0 and Firefox ESR 45.x before 45.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127203" comment="MozillaFirefox-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127204" comment="MozillaFirefox-branding-upstream-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127205" comment="MozillaFirefox-buildsymbols-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127206" comment="MozillaFirefox-devel-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127207" comment="MozillaFirefox-translations-common-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127208" comment="MozillaFirefox-translations-other-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129880" comment="MozillaThunderbird-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129881" comment="MozillaThunderbird-buildsymbols-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129882" comment="MozillaThunderbird-devel-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129883" comment="MozillaThunderbird-translations-common-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129884" comment="MozillaThunderbird-translations-other-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127209" comment="libfreebl3-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127210" comment="libfreebl3-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127211" comment="libsoftokn3-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127212" comment="libsoftokn3-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127213" comment="mozilla-nss-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127214" comment="mozilla-nss-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127215" comment="mozilla-nss-certs-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127216" comment="mozilla-nss-certs-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127217" comment="mozilla-nss-devel-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127218" comment="mozilla-nss-sysinit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127219" comment="mozilla-nss-sysinit-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127220" comment="mozilla-nss-tools-3.22.3-31.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2807</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2807" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2807" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 46.0, Firefox ESR 38.x before 38.8, and Firefox ESR 45.x before 45.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127203" comment="MozillaFirefox-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127204" comment="MozillaFirefox-branding-upstream-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127205" comment="MozillaFirefox-buildsymbols-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127206" comment="MozillaFirefox-devel-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127207" comment="MozillaFirefox-translations-common-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127208" comment="MozillaFirefox-translations-other-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129880" comment="MozillaThunderbird-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129881" comment="MozillaThunderbird-buildsymbols-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129882" comment="MozillaThunderbird-devel-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129883" comment="MozillaThunderbird-translations-common-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129884" comment="MozillaThunderbird-translations-other-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127209" comment="libfreebl3-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127210" comment="libfreebl3-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127211" comment="libsoftokn3-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127212" comment="libsoftokn3-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127213" comment="mozilla-nss-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127214" comment="mozilla-nss-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127215" comment="mozilla-nss-certs-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127216" comment="mozilla-nss-certs-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127217" comment="mozilla-nss-devel-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127218" comment="mozilla-nss-sysinit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127219" comment="mozilla-nss-sysinit-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127220" comment="mozilla-nss-tools-3.22.3-31.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2808</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2808" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2808" source="CVE"/>
    <description>
    The watch implementation in the JavaScript engine in Mozilla Firefox before 46.0, Firefox ESR 38.x before 38.8, and Firefox ESR 45.x before 45.1 allows remote attackers to execute arbitrary code or cause a denial of service (generation-count overflow, out-of-bounds HashMap write access, and application crash) via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127203" comment="MozillaFirefox-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127204" comment="MozillaFirefox-branding-upstream-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127205" comment="MozillaFirefox-buildsymbols-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127206" comment="MozillaFirefox-devel-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127207" comment="MozillaFirefox-translations-common-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127208" comment="MozillaFirefox-translations-other-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127209" comment="libfreebl3-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127210" comment="libfreebl3-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127211" comment="libsoftokn3-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127212" comment="libsoftokn3-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127213" comment="mozilla-nss-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127214" comment="mozilla-nss-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127215" comment="mozilla-nss-certs-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127216" comment="mozilla-nss-certs-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127217" comment="mozilla-nss-devel-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127218" comment="mozilla-nss-sysinit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127219" comment="mozilla-nss-sysinit-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127220" comment="mozilla-nss-tools-3.22.3-31.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2811</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2811" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2811" source="CVE"/>
    <description>
    Use-after-free vulnerability in the ServiceWorkerInfo class in the Service Worker subsystem in Mozilla Firefox before 46.0 allows remote attackers to execute arbitrary code via vectors related to the BeginReading method.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127203" comment="MozillaFirefox-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127204" comment="MozillaFirefox-branding-upstream-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127205" comment="MozillaFirefox-buildsymbols-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127206" comment="MozillaFirefox-devel-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127207" comment="MozillaFirefox-translations-common-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127208" comment="MozillaFirefox-translations-other-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127209" comment="libfreebl3-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127210" comment="libfreebl3-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127211" comment="libsoftokn3-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127212" comment="libsoftokn3-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127213" comment="mozilla-nss-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127214" comment="mozilla-nss-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127215" comment="mozilla-nss-certs-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127216" comment="mozilla-nss-certs-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127217" comment="mozilla-nss-devel-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127218" comment="mozilla-nss-sysinit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127219" comment="mozilla-nss-sysinit-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127220" comment="mozilla-nss-tools-3.22.3-31.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2812</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2812" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2812" source="CVE"/>
    <description>
    Race condition in the get implementation in the ServiceWorkerManager class in the Service Worker subsystem in Mozilla Firefox before 46.0 allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127203" comment="MozillaFirefox-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127204" comment="MozillaFirefox-branding-upstream-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127205" comment="MozillaFirefox-buildsymbols-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127206" comment="MozillaFirefox-devel-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127207" comment="MozillaFirefox-translations-common-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127208" comment="MozillaFirefox-translations-other-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127209" comment="libfreebl3-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127210" comment="libfreebl3-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127211" comment="libsoftokn3-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127212" comment="libsoftokn3-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127213" comment="mozilla-nss-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127214" comment="mozilla-nss-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127215" comment="mozilla-nss-certs-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127216" comment="mozilla-nss-certs-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127217" comment="mozilla-nss-devel-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127218" comment="mozilla-nss-sysinit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127219" comment="mozilla-nss-sysinit-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127220" comment="mozilla-nss-tools-3.22.3-31.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2814</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2814" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2814" source="CVE"/>
    <description>
    Heap-based buffer overflow in the stagefright::SampleTable::parseSampleCencInfo function in libstagefright in Mozilla Firefox before 46.0, Firefox ESR 38.x before 38.8, and Firefox ESR 45.x before 45.1 allows remote attackers to execute arbitrary code via crafted CENC offsets that lead to mismanagement of the sizes table.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127203" comment="MozillaFirefox-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127204" comment="MozillaFirefox-branding-upstream-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127205" comment="MozillaFirefox-buildsymbols-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127206" comment="MozillaFirefox-devel-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127207" comment="MozillaFirefox-translations-common-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127208" comment="MozillaFirefox-translations-other-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127209" comment="libfreebl3-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127210" comment="libfreebl3-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127211" comment="libsoftokn3-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127212" comment="libsoftokn3-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127213" comment="mozilla-nss-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127214" comment="mozilla-nss-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127215" comment="mozilla-nss-certs-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127216" comment="mozilla-nss-certs-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127217" comment="mozilla-nss-devel-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127218" comment="mozilla-nss-sysinit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127219" comment="mozilla-nss-sysinit-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127220" comment="mozilla-nss-tools-3.22.3-31.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2815</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2815" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2815" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 47.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128768" comment="MozillaFirefox-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128769" comment="MozillaFirefox-branding-upstream-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128770" comment="MozillaFirefox-buildsymbols-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128771" comment="MozillaFirefox-devel-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128772" comment="MozillaFirefox-translations-common-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128773" comment="MozillaFirefox-translations-other-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129880" comment="MozillaThunderbird-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129881" comment="MozillaThunderbird-buildsymbols-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129882" comment="MozillaThunderbird-devel-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129883" comment="MozillaThunderbird-translations-common-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129884" comment="MozillaThunderbird-translations-other-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128774" comment="libfreebl3-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128775" comment="libfreebl3-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128776" comment="libsoftokn3-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128777" comment="libsoftokn3-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128778" comment="mozilla-nss-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128779" comment="mozilla-nss-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128780" comment="mozilla-nss-certs-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128781" comment="mozilla-nss-certs-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128782" comment="mozilla-nss-devel-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128783" comment="mozilla-nss-sysinit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128784" comment="mozilla-nss-sysinit-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128785" comment="mozilla-nss-tools-3.23-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2816</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2816" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2816" source="CVE"/>
    <description>
    Mozilla Firefox before 46.0 allows remote attackers to bypass the Content Security Policy (CSP) protection mechanism via the multipart/x-mixed-replace content type.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127203" comment="MozillaFirefox-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127204" comment="MozillaFirefox-branding-upstream-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127205" comment="MozillaFirefox-buildsymbols-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127206" comment="MozillaFirefox-devel-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127207" comment="MozillaFirefox-translations-common-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127208" comment="MozillaFirefox-translations-other-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127209" comment="libfreebl3-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127210" comment="libfreebl3-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127211" comment="libsoftokn3-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127212" comment="libsoftokn3-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127213" comment="mozilla-nss-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127214" comment="mozilla-nss-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127215" comment="mozilla-nss-certs-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127216" comment="mozilla-nss-certs-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127217" comment="mozilla-nss-devel-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127218" comment="mozilla-nss-sysinit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127219" comment="mozilla-nss-sysinit-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127220" comment="mozilla-nss-tools-3.22.3-31.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2817</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2817" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2817" source="CVE"/>
    <description>
    The WebExtension sandbox feature in browser/components/extensions/ext-tabs.js in Mozilla Firefox before 46.0 does not properly restrict principal inheritance during chrome.tabs.create and chrome.tabs.update API calls, which allows remote attackers to conduct Universal XSS (UXSS) attacks via a crafted extension that accesses a (1) javascript: or (2) data: URL.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127203" comment="MozillaFirefox-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127204" comment="MozillaFirefox-branding-upstream-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127205" comment="MozillaFirefox-buildsymbols-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127206" comment="MozillaFirefox-devel-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127207" comment="MozillaFirefox-translations-common-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127208" comment="MozillaFirefox-translations-other-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127209" comment="libfreebl3-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127210" comment="libfreebl3-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127211" comment="libsoftokn3-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127212" comment="libsoftokn3-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127213" comment="mozilla-nss-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127214" comment="mozilla-nss-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127215" comment="mozilla-nss-certs-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127216" comment="mozilla-nss-certs-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127217" comment="mozilla-nss-devel-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127218" comment="mozilla-nss-sysinit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127219" comment="mozilla-nss-sysinit-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127220" comment="mozilla-nss-tools-3.22.3-31.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2818</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2818" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2818" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128768" comment="MozillaFirefox-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128769" comment="MozillaFirefox-branding-upstream-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128770" comment="MozillaFirefox-buildsymbols-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128771" comment="MozillaFirefox-devel-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128772" comment="MozillaFirefox-translations-common-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128773" comment="MozillaFirefox-translations-other-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129880" comment="MozillaThunderbird-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129881" comment="MozillaThunderbird-buildsymbols-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129882" comment="MozillaThunderbird-devel-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129883" comment="MozillaThunderbird-translations-common-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129884" comment="MozillaThunderbird-translations-other-45.2-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128774" comment="libfreebl3-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128775" comment="libfreebl3-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128776" comment="libsoftokn3-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128777" comment="libsoftokn3-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128778" comment="mozilla-nss-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128779" comment="mozilla-nss-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128780" comment="mozilla-nss-certs-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128781" comment="mozilla-nss-certs-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128782" comment="mozilla-nss-devel-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128783" comment="mozilla-nss-sysinit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128784" comment="mozilla-nss-sysinit-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128785" comment="mozilla-nss-tools-3.23-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2819</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2819" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2819" source="CVE"/>
    <description>
    Heap-based buffer overflow in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 allows remote attackers to execute arbitrary code via foreign-context HTML5 fragments, as demonstrated by fragments within an SVG element.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128768" comment="MozillaFirefox-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128769" comment="MozillaFirefox-branding-upstream-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128770" comment="MozillaFirefox-buildsymbols-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128771" comment="MozillaFirefox-devel-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128772" comment="MozillaFirefox-translations-common-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128773" comment="MozillaFirefox-translations-other-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128774" comment="libfreebl3-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128775" comment="libfreebl3-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128776" comment="libsoftokn3-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128777" comment="libsoftokn3-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128778" comment="mozilla-nss-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128779" comment="mozilla-nss-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128780" comment="mozilla-nss-certs-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128781" comment="mozilla-nss-certs-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128782" comment="mozilla-nss-devel-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128783" comment="mozilla-nss-sysinit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128784" comment="mozilla-nss-sysinit-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128785" comment="mozilla-nss-tools-3.23-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2820</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2820" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2820" source="CVE"/>
    <description>
    The Firefox Health Reports (aka FHR or about:healthreport) feature in Mozilla Firefox before 46.0 does not properly restrict the origin of events, which makes it easier for remote attackers to modify sharing preferences by leveraging access to the remote-report IFRAME element.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127203" comment="MozillaFirefox-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127204" comment="MozillaFirefox-branding-upstream-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127205" comment="MozillaFirefox-buildsymbols-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127206" comment="MozillaFirefox-devel-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127207" comment="MozillaFirefox-translations-common-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127208" comment="MozillaFirefox-translations-other-46.0-68.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127209" comment="libfreebl3-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127210" comment="libfreebl3-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127211" comment="libsoftokn3-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127212" comment="libsoftokn3-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127213" comment="mozilla-nss-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127214" comment="mozilla-nss-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127215" comment="mozilla-nss-certs-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127216" comment="mozilla-nss-certs-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127217" comment="mozilla-nss-devel-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127218" comment="mozilla-nss-sysinit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127219" comment="mozilla-nss-sysinit-32bit-3.22.3-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127220" comment="mozilla-nss-tools-3.22.3-31.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2821</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2821" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2821" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::dom::Element class in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2, when contenteditable mode is enabled, allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by triggering deletion of DOM elements that were created in the editor.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128768" comment="MozillaFirefox-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128769" comment="MozillaFirefox-branding-upstream-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128770" comment="MozillaFirefox-buildsymbols-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128771" comment="MozillaFirefox-devel-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128772" comment="MozillaFirefox-translations-common-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128773" comment="MozillaFirefox-translations-other-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128774" comment="libfreebl3-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128775" comment="libfreebl3-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128776" comment="libsoftokn3-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128777" comment="libsoftokn3-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128778" comment="mozilla-nss-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128779" comment="mozilla-nss-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128780" comment="mozilla-nss-certs-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128781" comment="mozilla-nss-certs-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128782" comment="mozilla-nss-devel-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128783" comment="mozilla-nss-sysinit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128784" comment="mozilla-nss-sysinit-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128785" comment="mozilla-nss-tools-3.23-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2822</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2822" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2822" source="CVE"/>
    <description>
    Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 allow remote attackers to spoof the address bar via a SELECT element with a persistent menu.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128768" comment="MozillaFirefox-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128769" comment="MozillaFirefox-branding-upstream-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128770" comment="MozillaFirefox-buildsymbols-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128771" comment="MozillaFirefox-devel-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128772" comment="MozillaFirefox-translations-common-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128773" comment="MozillaFirefox-translations-other-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128774" comment="libfreebl3-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128775" comment="libfreebl3-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128776" comment="libsoftokn3-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128777" comment="libsoftokn3-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128778" comment="mozilla-nss-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128779" comment="mozilla-nss-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128780" comment="mozilla-nss-certs-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128781" comment="mozilla-nss-certs-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128782" comment="mozilla-nss-devel-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128783" comment="mozilla-nss-sysinit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128784" comment="mozilla-nss-sysinit-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128785" comment="mozilla-nss-tools-3.23-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2824</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2824" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2824" source="CVE"/>
    <description>
    The TSymbolTableLevel class in ANGLE, as used in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 on Windows, allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact by triggering use of a WebGL shader that writes to an array.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128768" comment="MozillaFirefox-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128769" comment="MozillaFirefox-branding-upstream-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128770" comment="MozillaFirefox-buildsymbols-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128771" comment="MozillaFirefox-devel-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128772" comment="MozillaFirefox-translations-common-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128773" comment="MozillaFirefox-translations-other-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128774" comment="libfreebl3-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128775" comment="libfreebl3-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128776" comment="libsoftokn3-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128777" comment="libsoftokn3-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128778" comment="mozilla-nss-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128779" comment="mozilla-nss-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128780" comment="mozilla-nss-certs-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128781" comment="mozilla-nss-certs-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128782" comment="mozilla-nss-devel-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128783" comment="mozilla-nss-sysinit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128784" comment="mozilla-nss-sysinit-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128785" comment="mozilla-nss-tools-3.23-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2825</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2825" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2825" source="CVE"/>
    <description>
    Mozilla Firefox before 47.0 allows remote attackers to bypass the Same Origin Policy and modify the location.host property via an invalid data: URL.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128768" comment="MozillaFirefox-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128769" comment="MozillaFirefox-branding-upstream-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128770" comment="MozillaFirefox-buildsymbols-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128771" comment="MozillaFirefox-devel-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128772" comment="MozillaFirefox-translations-common-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128773" comment="MozillaFirefox-translations-other-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128774" comment="libfreebl3-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128775" comment="libfreebl3-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128776" comment="libsoftokn3-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128777" comment="libsoftokn3-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128778" comment="mozilla-nss-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128779" comment="mozilla-nss-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128780" comment="mozilla-nss-certs-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128781" comment="mozilla-nss-certs-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128782" comment="mozilla-nss-devel-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128783" comment="mozilla-nss-sysinit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128784" comment="mozilla-nss-sysinit-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128785" comment="mozilla-nss-tools-3.23-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2827</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2827" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2827" source="CVE"/>
    <description>
    The mozilla::net::IsValidReferrerPolicy function in Mozilla Firefox before 49.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a Content Security Policy (CSP) referrer directive with zero values.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134154" comment="MozillaFirefox-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134155" comment="MozillaFirefox-branding-upstream-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134156" comment="MozillaFirefox-buildsymbols-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134157" comment="MozillaFirefox-devel-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134158" comment="MozillaFirefox-translations-common-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134159" comment="MozillaFirefox-translations-other-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134160" comment="libfreebl3-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134161" comment="libfreebl3-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134162" comment="libsoftokn3-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134163" comment="libsoftokn3-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134164" comment="mozilla-nss-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134165" comment="mozilla-nss-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134166" comment="mozilla-nss-certs-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134167" comment="mozilla-nss-certs-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134168" comment="mozilla-nss-devel-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134169" comment="mozilla-nss-sysinit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134170" comment="mozilla-nss-sysinit-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134171" comment="mozilla-nss-tools-3.25-46.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2828</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2828" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2828" source="CVE"/>
    <description>
    Use-after-free vulnerability in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 allows remote attackers to execute arbitrary code via WebGL content that triggers texture access after destruction of the texture's recycle pool.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128768" comment="MozillaFirefox-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128769" comment="MozillaFirefox-branding-upstream-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128770" comment="MozillaFirefox-buildsymbols-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128771" comment="MozillaFirefox-devel-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128772" comment="MozillaFirefox-translations-common-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128773" comment="MozillaFirefox-translations-other-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128774" comment="libfreebl3-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128775" comment="libfreebl3-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128776" comment="libsoftokn3-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128777" comment="libsoftokn3-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128778" comment="mozilla-nss-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128779" comment="mozilla-nss-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128780" comment="mozilla-nss-certs-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128781" comment="mozilla-nss-certs-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128782" comment="mozilla-nss-devel-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128783" comment="mozilla-nss-sysinit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128784" comment="mozilla-nss-sysinit-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128785" comment="mozilla-nss-tools-3.23-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2829</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2829" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2829" source="CVE"/>
    <description>
    Mozilla Firefox before 47.0 allows remote attackers to spoof permission notifications via a crafted web site that rapidly triggers permission requests, as demonstrated by the microphone permission or the geolocation permission.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128768" comment="MozillaFirefox-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128769" comment="MozillaFirefox-branding-upstream-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128770" comment="MozillaFirefox-buildsymbols-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128771" comment="MozillaFirefox-devel-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128772" comment="MozillaFirefox-translations-common-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128773" comment="MozillaFirefox-translations-other-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128774" comment="libfreebl3-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128775" comment="libfreebl3-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128776" comment="libsoftokn3-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128777" comment="libsoftokn3-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128778" comment="mozilla-nss-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128779" comment="mozilla-nss-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128780" comment="mozilla-nss-certs-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128781" comment="mozilla-nss-certs-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128782" comment="mozilla-nss-devel-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128783" comment="mozilla-nss-sysinit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128784" comment="mozilla-nss-sysinit-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128785" comment="mozilla-nss-tools-3.23-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2830</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2830" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2830" source="CVE"/>
    <description>
    Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 preserve the network connection used for favicon resource retrieval after the associated browser window is closed, which makes it easier for remote web servers to track users by observing network traffic from multiple IP addresses.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130814" comment="MozillaFirefox-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130815" comment="MozillaFirefox-branding-upstream-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130816" comment="MozillaFirefox-buildsymbols-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130817" comment="MozillaFirefox-devel-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130818" comment="MozillaFirefox-translations-common-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130819" comment="MozillaFirefox-translations-other-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134172" comment="MozillaThunderbird-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134173" comment="MozillaThunderbird-buildsymbols-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134174" comment="MozillaThunderbird-devel-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134175" comment="MozillaThunderbird-translations-common-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134176" comment="MozillaThunderbird-translations-other-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130820" comment="libfreebl3-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130821" comment="libfreebl3-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130822" comment="libsoftokn3-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130823" comment="libsoftokn3-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130824" comment="mozilla-nss-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130825" comment="mozilla-nss-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130826" comment="mozilla-nss-certs-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130827" comment="mozilla-nss-certs-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130828" comment="mozilla-nss-devel-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130829" comment="mozilla-nss-sysinit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130830" comment="mozilla-nss-sysinit-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130831" comment="mozilla-nss-tools-3.24-37.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2831</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2831" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2831" source="CVE"/>
    <description>
    Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 do not ensure that the user approves the fullscreen and pointerlock settings, which allows remote attackers to cause a denial of service (UI outage), or conduct clickjacking or spoofing attacks, via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128768" comment="MozillaFirefox-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128769" comment="MozillaFirefox-branding-upstream-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128770" comment="MozillaFirefox-buildsymbols-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128771" comment="MozillaFirefox-devel-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128772" comment="MozillaFirefox-translations-common-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128773" comment="MozillaFirefox-translations-other-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128774" comment="libfreebl3-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128775" comment="libfreebl3-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128776" comment="libsoftokn3-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128777" comment="libsoftokn3-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128778" comment="mozilla-nss-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128779" comment="mozilla-nss-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128780" comment="mozilla-nss-certs-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128781" comment="mozilla-nss-certs-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128782" comment="mozilla-nss-devel-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128783" comment="mozilla-nss-sysinit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128784" comment="mozilla-nss-sysinit-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128785" comment="mozilla-nss-tools-3.23-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2832</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2832" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2832" source="CVE"/>
    <description>
    Mozilla Firefox before 47.0 allows remote attackers to discover the list of disabled plugins via a fingerprinting attack involving Cascading Style Sheets (CSS) pseudo-classes.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128768" comment="MozillaFirefox-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128769" comment="MozillaFirefox-branding-upstream-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128770" comment="MozillaFirefox-buildsymbols-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128771" comment="MozillaFirefox-devel-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128772" comment="MozillaFirefox-translations-common-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128773" comment="MozillaFirefox-translations-other-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128774" comment="libfreebl3-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128775" comment="libfreebl3-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128776" comment="libsoftokn3-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128777" comment="libsoftokn3-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128778" comment="mozilla-nss-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128779" comment="mozilla-nss-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128780" comment="mozilla-nss-certs-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128781" comment="mozilla-nss-certs-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128782" comment="mozilla-nss-devel-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128783" comment="mozilla-nss-sysinit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128784" comment="mozilla-nss-sysinit-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128785" comment="mozilla-nss-tools-3.23-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2833</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2833" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2833" source="CVE"/>
    <description>
    Mozilla Firefox before 47.0 ignores Content Security Policy (CSP) directives for cross-domain Java applets, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted applet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128768" comment="MozillaFirefox-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128769" comment="MozillaFirefox-branding-upstream-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128770" comment="MozillaFirefox-buildsymbols-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128771" comment="MozillaFirefox-devel-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128772" comment="MozillaFirefox-translations-common-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128773" comment="MozillaFirefox-translations-other-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128774" comment="libfreebl3-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128775" comment="libfreebl3-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128776" comment="libsoftokn3-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128777" comment="libsoftokn3-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128778" comment="mozilla-nss-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128779" comment="mozilla-nss-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128780" comment="mozilla-nss-certs-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128781" comment="mozilla-nss-certs-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128782" comment="mozilla-nss-devel-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128783" comment="mozilla-nss-sysinit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128784" comment="mozilla-nss-sysinit-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128785" comment="mozilla-nss-tools-3.23-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2834</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2834" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2834" source="CVE"/>
    <description>
    Mozilla Network Security Services (NSS) before 3.23, as used in Mozilla Firefox before 47.0, allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128768" comment="MozillaFirefox-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128769" comment="MozillaFirefox-branding-upstream-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128770" comment="MozillaFirefox-buildsymbols-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128771" comment="MozillaFirefox-devel-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128772" comment="MozillaFirefox-translations-common-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128773" comment="MozillaFirefox-translations-other-47.0-71.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128774" comment="libfreebl3-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128775" comment="libfreebl3-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128776" comment="libsoftokn3-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128777" comment="libsoftokn3-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128778" comment="mozilla-nss-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128779" comment="mozilla-nss-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128780" comment="mozilla-nss-certs-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128781" comment="mozilla-nss-certs-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128782" comment="mozilla-nss-devel-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128783" comment="mozilla-nss-sysinit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128784" comment="mozilla-nss-sysinit-32bit-3.23-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128785" comment="mozilla-nss-tools-3.23-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2835</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2835" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 48.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130814" comment="MozillaFirefox-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130815" comment="MozillaFirefox-branding-upstream-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130816" comment="MozillaFirefox-buildsymbols-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130817" comment="MozillaFirefox-devel-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130818" comment="MozillaFirefox-translations-common-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130819" comment="MozillaFirefox-translations-other-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130820" comment="libfreebl3-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130821" comment="libfreebl3-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130822" comment="libsoftokn3-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130823" comment="libsoftokn3-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130824" comment="mozilla-nss-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130825" comment="mozilla-nss-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130826" comment="mozilla-nss-certs-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130827" comment="mozilla-nss-certs-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130828" comment="mozilla-nss-devel-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130829" comment="mozilla-nss-sysinit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130830" comment="mozilla-nss-sysinit-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130831" comment="mozilla-nss-tools-3.24-37.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2836</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2836" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to Http2Session::Shutdown and SpdySession31::Shutdown, and other vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130814" comment="MozillaFirefox-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130815" comment="MozillaFirefox-branding-upstream-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130816" comment="MozillaFirefox-buildsymbols-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130817" comment="MozillaFirefox-devel-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130818" comment="MozillaFirefox-translations-common-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130819" comment="MozillaFirefox-translations-other-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134172" comment="MozillaThunderbird-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134173" comment="MozillaThunderbird-buildsymbols-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134174" comment="MozillaThunderbird-devel-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134175" comment="MozillaThunderbird-translations-common-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134176" comment="MozillaThunderbird-translations-other-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130820" comment="libfreebl3-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130821" comment="libfreebl3-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130822" comment="libsoftokn3-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130823" comment="libsoftokn3-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130824" comment="mozilla-nss-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130825" comment="mozilla-nss-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130826" comment="mozilla-nss-certs-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130827" comment="mozilla-nss-certs-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130828" comment="mozilla-nss-devel-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130829" comment="mozilla-nss-sysinit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130830" comment="mozilla-nss-sysinit-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130831" comment="mozilla-nss-tools-3.24-37.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2837</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2837" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2837" source="CVE"/>
    <description>
    Heap-based buffer overflow in the ClearKey Content Decryption Module (CDM) in the Encrypted Media Extensions (EME) API in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 might allow remote attackers to execute arbitrary code by providing a malformed video and leveraging a Gecko Media Plugin (GMP) sandbox bypass.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130814" comment="MozillaFirefox-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130815" comment="MozillaFirefox-branding-upstream-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130816" comment="MozillaFirefox-buildsymbols-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130817" comment="MozillaFirefox-devel-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130818" comment="MozillaFirefox-translations-common-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130819" comment="MozillaFirefox-translations-other-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134172" comment="MozillaThunderbird-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134173" comment="MozillaThunderbird-buildsymbols-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134174" comment="MozillaThunderbird-devel-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134175" comment="MozillaThunderbird-translations-common-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134176" comment="MozillaThunderbird-translations-other-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130820" comment="libfreebl3-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130821" comment="libfreebl3-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130822" comment="libsoftokn3-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130823" comment="libsoftokn3-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130824" comment="mozilla-nss-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130825" comment="mozilla-nss-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130826" comment="mozilla-nss-certs-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130827" comment="mozilla-nss-certs-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130828" comment="mozilla-nss-devel-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130829" comment="mozilla-nss-sysinit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130830" comment="mozilla-nss-sysinit-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130831" comment="mozilla-nss-tools-3.24-37.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2838</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2838" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2838" source="CVE"/>
    <description>
    Heap-based buffer overflow in the nsBidi::BracketData::AddOpening function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code via directional content in an SVG document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130814" comment="MozillaFirefox-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130815" comment="MozillaFirefox-branding-upstream-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130816" comment="MozillaFirefox-buildsymbols-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130817" comment="MozillaFirefox-devel-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130818" comment="MozillaFirefox-translations-common-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130819" comment="MozillaFirefox-translations-other-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134172" comment="MozillaThunderbird-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134173" comment="MozillaThunderbird-buildsymbols-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134174" comment="MozillaThunderbird-devel-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134175" comment="MozillaThunderbird-translations-common-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134176" comment="MozillaThunderbird-translations-other-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130820" comment="libfreebl3-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130821" comment="libfreebl3-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130822" comment="libsoftokn3-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130823" comment="libsoftokn3-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130824" comment="mozilla-nss-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130825" comment="mozilla-nss-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130826" comment="mozilla-nss-certs-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130827" comment="mozilla-nss-certs-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130828" comment="mozilla-nss-devel-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130829" comment="mozilla-nss-sysinit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130830" comment="mozilla-nss-sysinit-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130831" comment="mozilla-nss-tools-3.24-37.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2839</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2839" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2839" source="CVE"/>
    <description>
    Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 on Linux make cairo _cairo_surface_get_extents calls that do not properly interact with libav header allocation in FFmpeg 0.10, which allows remote attackers to cause a denial of service (application crash) via a crafted video.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130814" comment="MozillaFirefox-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130815" comment="MozillaFirefox-branding-upstream-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130816" comment="MozillaFirefox-buildsymbols-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130817" comment="MozillaFirefox-devel-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130818" comment="MozillaFirefox-translations-common-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130819" comment="MozillaFirefox-translations-other-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134172" comment="MozillaThunderbird-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134173" comment="MozillaThunderbird-buildsymbols-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134174" comment="MozillaThunderbird-devel-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134175" comment="MozillaThunderbird-translations-common-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134176" comment="MozillaThunderbird-translations-other-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130820" comment="libfreebl3-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130821" comment="libfreebl3-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130822" comment="libsoftokn3-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130823" comment="libsoftokn3-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130824" comment="mozilla-nss-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130825" comment="mozilla-nss-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130826" comment="mozilla-nss-certs-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130827" comment="mozilla-nss-certs-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130828" comment="mozilla-nss-devel-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130829" comment="mozilla-nss-sysinit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130830" comment="mozilla-nss-sysinit-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130831" comment="mozilla-nss-tools-3.24-37.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2847</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2847" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2847" source="CVE"/>
    <description>
    fs/pipe.c in the Linux kernel before 4.5 does not limit the amount of unread data in pipes, which allows local users to cause a denial of service (memory consumption) by creating many pipes with non-default sizes.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2851</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-2851" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2851" source="CVE"/>
    <description>
    Integer overflow in proto.c in libotr before 4.1.1 on 64-bit platforms allows remote attackers to cause a denial of service (memory corruption and application crash) or execute arbitrary code via a series of large OTR messages, which triggers a heap-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009124501" comment="libotr-4.0.0-8.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124502" comment="libotr-devel-4.0.0-8.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124503" comment="libotr-tools-4.0.0-8.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124504" comment="libotr2-3.2.1-7.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124505" comment="libotr2-devel-3.2.1-7.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124506" comment="libotr2-tools-3.2.1-7.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009124507" comment="libotr5-4.0.0-8.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3068</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3068" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3068" source="CVE"/>
    <description>
    Mercurial before 3.7.3 allows remote attackers to execute arbitrary code via a crafted git ext:: URL when cloning a subrepository.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126039" comment="mercurial-3.1.2-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126040" comment="mercurial-lang-3.1.2-7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3069</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3069" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3069" source="CVE"/>
    <description>
    Mercurial before 3.7.3 allows remote attackers to execute arbitrary code via a crafted name when converting a Git repository.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126039" comment="mercurial-3.1.2-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126040" comment="mercurial-lang-3.1.2-7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3074</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3074" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3074" source="CVE"/>
    <description>
    Integer signedness error in GD Graphics Library 2.1.1 (aka libgd or libgd2) allows remote attackers to cause a denial of service (crash) or potentially execute arbitrary code via crafted compressed gd2 data, which triggers a heap-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128692" comment="apache2-mod_php5-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128693" comment="php5-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128694" comment="php5-bcmath-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128695" comment="php5-bz2-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128696" comment="php5-calendar-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128697" comment="php5-ctype-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128698" comment="php5-curl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128699" comment="php5-dba-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128700" comment="php5-devel-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128701" comment="php5-dom-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128702" comment="php5-enchant-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128703" comment="php5-exif-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128704" comment="php5-fastcgi-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128705" comment="php5-fileinfo-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128706" comment="php5-firebird-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128707" comment="php5-fpm-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128708" comment="php5-ftp-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128709" comment="php5-gd-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128710" comment="php5-gettext-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128711" comment="php5-gmp-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128712" comment="php5-iconv-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128713" comment="php5-imap-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128714" comment="php5-intl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128715" comment="php5-json-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128716" comment="php5-ldap-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128717" comment="php5-mbstring-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128718" comment="php5-mcrypt-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128719" comment="php5-mssql-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128720" comment="php5-mysql-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128721" comment="php5-odbc-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128722" comment="php5-opcache-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128723" comment="php5-openssl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128724" comment="php5-pcntl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128725" comment="php5-pdo-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128726" comment="php5-pear-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128727" comment="php5-pgsql-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128728" comment="php5-phar-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128729" comment="php5-posix-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128730" comment="php5-pspell-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128731" comment="php5-readline-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128732" comment="php5-shmop-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128733" comment="php5-snmp-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128734" comment="php5-soap-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128735" comment="php5-sockets-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128736" comment="php5-sqlite-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128737" comment="php5-suhosin-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128738" comment="php5-sysvmsg-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128739" comment="php5-sysvsem-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128740" comment="php5-sysvshm-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128741" comment="php5-tidy-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128742" comment="php5-tokenizer-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128743" comment="php5-wddx-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128744" comment="php5-xmlreader-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128745" comment="php5-xmlrpc-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128746" comment="php5-xmlwriter-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128747" comment="php5-xsl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128748" comment="php5-zip-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128749" comment="php5-zlib-5.6.1-66.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3075</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3075" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3075" source="CVE"/>
    <description>
    Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128518" comment="glibc-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128519" comment="glibc-32bit-2.19-16.25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128520" comment="glibc-devel-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128521" comment="glibc-devel-32bit-2.19-16.25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128522" comment="glibc-devel-static-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128523" comment="glibc-devel-static-32bit-2.19-16.25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128524" comment="glibc-extra-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128525" comment="glibc-html-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128526" comment="glibc-i18ndata-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128527" comment="glibc-info-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128528" comment="glibc-locale-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128529" comment="glibc-locale-32bit-2.19-16.25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128530" comment="glibc-obsolete-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128531" comment="glibc-profile-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128532" comment="glibc-profile-32bit-2.19-16.25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128533" comment="glibc-testsuite-2.19-16.25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128534" comment="glibc-utils-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128535" comment="glibc-utils-32bit-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128536" comment="nscd-2.19-16.25.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3100</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3100" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3100" source="CVE"/>
    <description>
    kinit in KDE Frameworks before 5.23.0 uses weak permissions (644) for /tmp/xauth-xxx-_y, which allows local users to obtain X11 cookies of other users and consequently capture keystrokes and possibly gain privileges by reading the file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129678" comment="kinit-5.11.0-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129679" comment="kinit-32bit-5.11.0-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129680" comment="kinit-devel-5.11.0-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129681" comment="kinit-lang-5.11.0-27.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3105</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3105" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3105" source="CVE"/>
    <description>
    The convert extension in Mercurial before 3.8 might allow context-dependent attackers to execute arbitrary code via a crafted git repository name.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127824" comment="mercurial-3.1.2-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127825" comment="mercurial-lang-3.1.2-10.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3116</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3116" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3116" source="CVE"/>
    <description>
    CRLF injection vulnerability in Dropbear SSH before 2016.72 allows remote authenticated users to bypass intended shell-command restrictions via crafted X11 forwarding data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125370" comment="dropbear-2016.72-2.3.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3125</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3125" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3125" source="CVE"/>
    <description>
    The mod_tls module in ProFTPD before 1.3.5b and 1.3.6 before 1.3.6rc2 does not properly handle the TLSDHParamFile directive, which might cause a weaker than intended Diffie-Hellman (DH) key to be used and consequently allow attackers to have unspecified impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127826" comment="proftpd-1.3.5b-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127827" comment="proftpd-devel-1.3.5b-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127828" comment="proftpd-doc-1.3.5b-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127829" comment="proftpd-lang-1.3.5b-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127830" comment="proftpd-ldap-1.3.5b-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127831" comment="proftpd-mysql-1.3.5b-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127832" comment="proftpd-pgsql-1.3.5b-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127833" comment="proftpd-radius-1.3.5b-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127834" comment="proftpd-sqlite-1.3.5b-6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3134</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3134" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3134" source="CVE"/>
    <description>
    The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3136</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3136" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3136" source="CVE"/>
    <description>
    The mct_u232_msr_to_state function in drivers/usb/serial/mct_u232.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted USB device without two interrupt-in endpoint descriptors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3137</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3137" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3137" source="CVE"/>
    <description>
    drivers/usb/serial/cypress_m8.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both an interrupt-in and an interrupt-out endpoint descriptor, related to the cypress_generic_port_probe and cypress_open functions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3138</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3138" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3138" source="CVE"/>
    <description>
    The acm_probe function in drivers/usb/class/cdc-acm.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a USB device without both a control and a data endpoint descriptor.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3139</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3139" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3139" source="CVE"/>
    <description>
    The wacom_probe function in drivers/input/tablet/wacom_sys.c in the Linux kernel before 3.17 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3140</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3140" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3140" source="CVE"/>
    <description>
    The digi_port_init function in drivers/usb/serial/digi_acceleport.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3141</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3141" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3141" source="CVE"/>
    <description>
    Use-after-free vulnerability in wddx.c in the WDDX extension in PHP before 5.5.33 and 5.6.x before 5.6.19 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact by triggering a wddx_deserialize call on XML data containing a crafted var element.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126844" comment="apache2-mod_php5-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126845" comment="php5-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126846" comment="php5-bcmath-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126847" comment="php5-bz2-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126848" comment="php5-calendar-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126849" comment="php5-ctype-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126850" comment="php5-curl-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126851" comment="php5-dba-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126852" comment="php5-devel-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126853" comment="php5-dom-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126854" comment="php5-enchant-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126855" comment="php5-exif-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126856" comment="php5-fastcgi-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126857" comment="php5-fileinfo-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126858" comment="php5-firebird-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126859" comment="php5-fpm-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126860" comment="php5-ftp-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126861" comment="php5-gd-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126862" comment="php5-gettext-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126863" comment="php5-gmp-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126864" comment="php5-iconv-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126865" comment="php5-imap-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126866" comment="php5-intl-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126867" comment="php5-json-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126868" comment="php5-ldap-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126869" comment="php5-mbstring-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126870" comment="php5-mcrypt-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126871" comment="php5-mssql-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126872" comment="php5-mysql-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126873" comment="php5-odbc-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126874" comment="php5-opcache-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126875" comment="php5-openssl-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126876" comment="php5-pcntl-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126877" comment="php5-pdo-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126878" comment="php5-pear-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126879" comment="php5-pgsql-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126880" comment="php5-phar-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126881" comment="php5-posix-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126882" comment="php5-pspell-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126883" comment="php5-readline-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126884" comment="php5-shmop-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126885" comment="php5-snmp-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126886" comment="php5-soap-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126887" comment="php5-sockets-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126888" comment="php5-sqlite-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126889" comment="php5-suhosin-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126890" comment="php5-sysvmsg-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126891" comment="php5-sysvsem-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126892" comment="php5-sysvshm-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126893" comment="php5-tidy-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126894" comment="php5-tokenizer-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126895" comment="php5-wddx-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126896" comment="php5-xmlreader-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126897" comment="php5-xmlrpc-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126898" comment="php5-xmlwriter-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126899" comment="php5-xsl-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126900" comment="php5-zip-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126901" comment="php5-zlib-5.6.1-53.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3142</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3142" source="CVE"/>
    <description>
    The phar_parse_zipfile function in zip.c in the PHAR extension in PHP before 5.5.33 and 5.6.x before 5.6.19 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read and application crash) by placing a PK\x05\x06 signature at an invalid location.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126844" comment="apache2-mod_php5-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126845" comment="php5-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126846" comment="php5-bcmath-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126847" comment="php5-bz2-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126848" comment="php5-calendar-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126849" comment="php5-ctype-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126850" comment="php5-curl-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126851" comment="php5-dba-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126852" comment="php5-devel-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126853" comment="php5-dom-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126854" comment="php5-enchant-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126855" comment="php5-exif-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126856" comment="php5-fastcgi-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126857" comment="php5-fileinfo-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126858" comment="php5-firebird-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126859" comment="php5-fpm-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126860" comment="php5-ftp-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126861" comment="php5-gd-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126862" comment="php5-gettext-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126863" comment="php5-gmp-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126864" comment="php5-iconv-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126865" comment="php5-imap-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126866" comment="php5-intl-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126867" comment="php5-json-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126868" comment="php5-ldap-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126869" comment="php5-mbstring-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126870" comment="php5-mcrypt-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126871" comment="php5-mssql-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126872" comment="php5-mysql-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126873" comment="php5-odbc-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126874" comment="php5-opcache-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126875" comment="php5-openssl-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126876" comment="php5-pcntl-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126877" comment="php5-pdo-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126878" comment="php5-pear-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126879" comment="php5-pgsql-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126880" comment="php5-phar-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126881" comment="php5-posix-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126882" comment="php5-pspell-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126883" comment="php5-readline-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126884" comment="php5-shmop-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126885" comment="php5-snmp-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126886" comment="php5-soap-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126887" comment="php5-sockets-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126888" comment="php5-sqlite-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126889" comment="php5-suhosin-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126890" comment="php5-sysvmsg-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126891" comment="php5-sysvsem-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126892" comment="php5-sysvshm-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126893" comment="php5-tidy-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126894" comment="php5-tokenizer-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126895" comment="php5-wddx-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126896" comment="php5-xmlreader-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126897" comment="php5-xmlrpc-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126898" comment="php5-xmlwriter-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126899" comment="php5-xsl-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126900" comment="php5-zip-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126901" comment="php5-zlib-5.6.1-53.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3156</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3156" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3156" source="CVE"/>
    <description>
    The IPv4 implementation in the Linux kernel before 4.5.2 mishandles destruction of device objects, which allows guest OS users to cause a denial of service (host OS networking outage) by arranging for a large number of IP addresses.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3158</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3158" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3158" source="CVE"/>
    <description>
    The xrstor function in arch/x86/xstate.c in Xen 4.x does not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allows local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-2076.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133720" comment="xen-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133721" comment="xen-devel-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133722" comment="xen-doc-html-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133723" comment="xen-kmp-default-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133724" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133725" comment="xen-libs-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133726" comment="xen-libs-32bit-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133727" comment="xen-tools-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133728" comment="xen-tools-domU-4.4.4_05-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3159</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3159" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3159" source="CVE"/>
    <description>
    The fpu_fxrstor function in arch/x86/i387.c in Xen 4.x does not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allows local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-2076.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133720" comment="xen-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133721" comment="xen-devel-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133722" comment="xen-doc-html-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133723" comment="xen-kmp-default-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133724" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133725" comment="xen-libs-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133726" comment="xen-libs-32bit-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133727" comment="xen-tools-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133728" comment="xen-tools-domU-4.4.4_05-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3172</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3172" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3172" source="CVE"/>
    <description>
    SQL injection vulnerability in tree.php in Cacti 0.8.8g and earlier allows remote authenticated users to execute arbitrary SQL commands via the parent_id parameter in an item_edit action.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127835" comment="cacti-0.8.8f-4.16.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3185</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3185" source="CVE"/>
    <description>
    The make_http_soap_request function in ext/soap/php_http.c in PHP before 5.4.44, 5.5.x before 5.5.28, 5.6.x before 5.6.12, and 7.x before 7.0.4 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (type confusion and application crash) via crafted serialized _cookies data, related to the SoapClient::__call method in ext/soap/soap.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126844" comment="apache2-mod_php5-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126845" comment="php5-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126846" comment="php5-bcmath-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126847" comment="php5-bz2-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126848" comment="php5-calendar-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126849" comment="php5-ctype-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126850" comment="php5-curl-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126851" comment="php5-dba-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126852" comment="php5-devel-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126853" comment="php5-dom-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126854" comment="php5-enchant-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126855" comment="php5-exif-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126856" comment="php5-fastcgi-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126857" comment="php5-fileinfo-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126858" comment="php5-firebird-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126859" comment="php5-fpm-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126860" comment="php5-ftp-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126861" comment="php5-gd-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126862" comment="php5-gettext-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126863" comment="php5-gmp-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126864" comment="php5-iconv-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126865" comment="php5-imap-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126866" comment="php5-intl-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126867" comment="php5-json-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126868" comment="php5-ldap-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126869" comment="php5-mbstring-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126870" comment="php5-mcrypt-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126871" comment="php5-mssql-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126872" comment="php5-mysql-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126873" comment="php5-odbc-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126874" comment="php5-opcache-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126875" comment="php5-openssl-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126876" comment="php5-pcntl-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126877" comment="php5-pdo-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126878" comment="php5-pear-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126879" comment="php5-pgsql-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126880" comment="php5-phar-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126881" comment="php5-posix-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126882" comment="php5-pspell-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126883" comment="php5-readline-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126884" comment="php5-shmop-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126885" comment="php5-snmp-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126886" comment="php5-soap-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126887" comment="php5-sockets-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126888" comment="php5-sqlite-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126889" comment="php5-suhosin-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126890" comment="php5-sysvmsg-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126891" comment="php5-sysvsem-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126892" comment="php5-sysvshm-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126893" comment="php5-tidy-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126894" comment="php5-tokenizer-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126895" comment="php5-wddx-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126896" comment="php5-xmlreader-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126897" comment="php5-xmlrpc-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126898" comment="php5-xmlwriter-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126899" comment="php5-xsl-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126900" comment="php5-zip-5.6.1-53.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126901" comment="php5-zlib-5.6.1-53.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3186</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3186" source="CVE"/>
    <description>
    Buffer overflow in the readextension function in gif2tiff.c in LibTIFF 4.0.6 allows remote attackers to cause a denial of service (application crash) via a crafted GIF file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126350" comment="libtiff-devel-4.0.6-10.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126351" comment="libtiff-devel-32bit-4.0.6-10.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126352" comment="libtiff5-4.0.6-10.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126353" comment="libtiff5-32bit-4.0.6-10.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126354" comment="tiff-4.0.6-10.23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3190</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3190" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3190" source="CVE"/>
    <description>
    The fill_xrgb32_lerp_opaque_spans function in cairo-image-compositor.c in cairo before 1.14.2 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a negative span length.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126029" comment="cairo-1.14.0-7.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126030" comment="cairo-devel-1.14.0-7.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126031" comment="cairo-devel-32bit-1.14.0-7.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126032" comment="cairo-tools-1.14.0-7.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126033" comment="libcairo-gobject2-1.14.0-7.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126034" comment="libcairo-gobject2-32bit-1.14.0-7.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126035" comment="libcairo-script-interpreter2-1.14.0-7.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126036" comment="libcairo-script-interpreter2-32bit-1.14.0-7.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126037" comment="libcairo2-1.14.0-7.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126038" comment="libcairo2-32bit-1.14.0-7.11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3191</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3191" source="CVE"/>
    <description>
    The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135519" comment="libpcre1-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135520" comment="libpcre1-32bit-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135521" comment="libpcre16-0-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135522" comment="libpcre16-0-32bit-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135523" comment="libpcrecpp0-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135524" comment="libpcrecpp0-32bit-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135525" comment="libpcreposix0-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135526" comment="libpcreposix0-32bit-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135527" comment="pcre-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135528" comment="pcre-devel-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135529" comment="pcre-devel-static-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135530" comment="pcre-doc-8.39-3.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135531" comment="pcre-tools-8.39-3.8.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3425</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3425" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77; Java SE Embedded 8u77; and JRockit R28.3.9 allows remote attackers to affect availability via vectors related to JAXP.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127177" comment="java-1_7_0-openjdk-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127178" comment="java-1_7_0-openjdk-accessibility-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127179" comment="java-1_7_0-openjdk-bootstrap-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127180" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127181" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127182" comment="java-1_7_0-openjdk-demo-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127183" comment="java-1_7_0-openjdk-devel-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127184" comment="java-1_7_0-openjdk-headless-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127185" comment="java-1_7_0-openjdk-javadoc-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127186" comment="java-1_7_0-openjdk-src-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127187" comment="java-1_8_0-openjdk-1.8.0.91-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127188" comment="java-1_8_0-openjdk-accessibility-1.8.0.91-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127189" comment="java-1_8_0-openjdk-demo-1.8.0.91-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127190" comment="java-1_8_0-openjdk-devel-1.8.0.91-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127191" comment="java-1_8_0-openjdk-headless-1.8.0.91-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127192" comment="java-1_8_0-openjdk-javadoc-1.8.0.91-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127193" comment="java-1_8_0-openjdk-src-1.8.0.91-27.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3426</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3426" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u77 and Java SE Embedded 8u77 allows remote attackers to affect confidentiality via vectors related to JCE.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127187" comment="java-1_8_0-openjdk-1.8.0.91-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127188" comment="java-1_8_0-openjdk-accessibility-1.8.0.91-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127189" comment="java-1_8_0-openjdk-demo-1.8.0.91-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127190" comment="java-1_8_0-openjdk-devel-1.8.0.91-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127191" comment="java-1_8_0-openjdk-headless-1.8.0.91-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127192" comment="java-1_8_0-openjdk-javadoc-1.8.0.91-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127193" comment="java-1_8_0-openjdk-src-1.8.0.91-27.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3427</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77; Java SE Embedded 8u77; and JRockit R28.3.9 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127177" comment="java-1_7_0-openjdk-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127178" comment="java-1_7_0-openjdk-accessibility-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127179" comment="java-1_7_0-openjdk-bootstrap-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127180" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127181" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127182" comment="java-1_7_0-openjdk-demo-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127183" comment="java-1_7_0-openjdk-devel-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127184" comment="java-1_7_0-openjdk-headless-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127185" comment="java-1_7_0-openjdk-javadoc-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127186" comment="java-1_7_0-openjdk-src-1.7.0.101-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127187" comment="java-1_8_0-openjdk-1.8.0.91-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127188" comment="java-1_8_0-openjdk-accessibility-1.8.0.91-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127189" comment="java-1_8_0-openjdk-demo-1.8.0.91-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127190" comment="java-1_8_0-openjdk-devel-1.8.0.91-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127191" comment="java-1_8_0-openjdk-headless-1.8.0.91-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127192" comment="java-1_8_0-openjdk-javadoc-1.8.0.91-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127193" comment="java-1_8_0-openjdk-src-1.8.0.91-27.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3458</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3458" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92; and Java SE Embedded 8u91 allows remote attackers to affect integrity via vectors related to CORBA.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134012" comment="java-1_7_0-openjdk-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134013" comment="java-1_7_0-openjdk-accessibility-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134014" comment="java-1_7_0-openjdk-bootstrap-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134015" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134016" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134017" comment="java-1_7_0-openjdk-demo-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134018" comment="java-1_7_0-openjdk-devel-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134019" comment="java-1_7_0-openjdk-headless-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134020" comment="java-1_7_0-openjdk-javadoc-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134021" comment="java-1_7_0-openjdk-src-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130864" comment="java-1_8_0-openjdk-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130865" comment="java-1_8_0-openjdk-accessibility-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130866" comment="java-1_8_0-openjdk-demo-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130867" comment="java-1_8_0-openjdk-devel-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130868" comment="java-1_8_0-openjdk-headless-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130869" comment="java-1_8_0-openjdk-javadoc-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130870" comment="java-1_8_0-openjdk-src-1.8.0.101-30.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3459</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3459" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3459" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.30 and earlier and 5.7.12 and earlier and MariaDB 10.0.x before 10.0.25 and 10.1.x before 10.1.14 allows remote administrators to affect availability via vectors related to Server: InnoDB.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135453" comment="libmysql56client18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135454" comment="libmysql56client18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135455" comment="libmysql56client_r18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135456" comment="libmysql56client_r18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135457" comment="mysql-community-server-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135458" comment="mysql-community-server-bench-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135459" comment="mysql-community-server-client-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135460" comment="mysql-community-server-errormessages-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135461" comment="mysql-community-server-test-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135462" comment="mysql-community-server-tools-5.6.34-2.23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3477</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3477" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.49 and earlier, 5.6.30 and earlier, and 5.7.12 and earlier and MariaDB before 5.5.50, 10.0.x before 10.0.26, and 10.1.x before 10.1.15 allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Parser.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135453" comment="libmysql56client18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135454" comment="libmysql56client18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135455" comment="libmysql56client_r18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135456" comment="libmysql56client_r18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135343" comment="libmysqlclient-devel-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135344" comment="libmysqlclient18-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135345" comment="libmysqlclient18-32bit-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135346" comment="libmysqlclient_r18-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135347" comment="libmysqlclient_r18-32bit-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135348" comment="libmysqld-devel-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135349" comment="libmysqld18-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135350" comment="mariadb-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135351" comment="mariadb-bench-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135352" comment="mariadb-client-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135353" comment="mariadb-errormessages-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135354" comment="mariadb-test-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135355" comment="mariadb-tools-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135457" comment="mysql-community-server-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135458" comment="mysql-community-server-bench-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135459" comment="mysql-community-server-client-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135460" comment="mysql-community-server-errormessages-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135461" comment="mysql-community-server-test-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135462" comment="mysql-community-server-tools-5.6.34-2.23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3485</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3485" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3485" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92; Java SE Embedded 8u91; and JRockit R28.3.10 allows local users to affect integrity via vectors related to Networking.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134012" comment="java-1_7_0-openjdk-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134013" comment="java-1_7_0-openjdk-accessibility-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134014" comment="java-1_7_0-openjdk-bootstrap-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134015" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134016" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134017" comment="java-1_7_0-openjdk-demo-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134018" comment="java-1_7_0-openjdk-devel-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134019" comment="java-1_7_0-openjdk-headless-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134020" comment="java-1_7_0-openjdk-javadoc-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134021" comment="java-1_7_0-openjdk-src-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130864" comment="java-1_8_0-openjdk-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130865" comment="java-1_8_0-openjdk-accessibility-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130866" comment="java-1_8_0-openjdk-demo-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130867" comment="java-1_8_0-openjdk-devel-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130868" comment="java-1_8_0-openjdk-headless-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130869" comment="java-1_8_0-openjdk-javadoc-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130870" comment="java-1_8_0-openjdk-src-1.8.0.101-30.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3486</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3486" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3486" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.30 and earlier and 5.7.12 and earlier allows remote authenticated users to affect availability via vectors related to Server: FTS.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135453" comment="libmysql56client18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135454" comment="libmysql56client18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135455" comment="libmysql56client_r18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135456" comment="libmysql56client_r18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135457" comment="mysql-community-server-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135458" comment="mysql-community-server-bench-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135459" comment="mysql-community-server-client-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135460" comment="mysql-community-server-errormessages-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135461" comment="mysql-community-server-test-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135462" comment="mysql-community-server-tools-5.6.34-2.23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3492</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3492" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote authenticated users to affect availability via vectors related to Server: Optimizer.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135453" comment="libmysql56client18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135454" comment="libmysql56client18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135455" comment="libmysql56client_r18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135456" comment="libmysql56client_r18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135457" comment="mysql-community-server-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135458" comment="mysql-community-server-bench-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135459" comment="mysql-community-server-client-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135460" comment="mysql-community-server-errormessages-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135461" comment="mysql-community-server-test-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135462" comment="mysql-community-server-tools-5.6.34-2.23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3498</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3498" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3498" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u101 and 8u92 allows remote attackers to affect availability via vectors related to JavaFX.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134012" comment="java-1_7_0-openjdk-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134013" comment="java-1_7_0-openjdk-accessibility-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134014" comment="java-1_7_0-openjdk-bootstrap-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134015" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134016" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134017" comment="java-1_7_0-openjdk-demo-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134018" comment="java-1_7_0-openjdk-devel-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134019" comment="java-1_7_0-openjdk-headless-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134020" comment="java-1_7_0-openjdk-javadoc-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134021" comment="java-1_7_0-openjdk-src-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130864" comment="java-1_8_0-openjdk-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130865" comment="java-1_8_0-openjdk-accessibility-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130866" comment="java-1_8_0-openjdk-demo-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130867" comment="java-1_8_0-openjdk-devel-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130868" comment="java-1_8_0-openjdk-headless-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130869" comment="java-1_8_0-openjdk-javadoc-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130870" comment="java-1_8_0-openjdk-src-1.8.0.101-30.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3500</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92; Java SE Embedded 8u91; and JRockit R28.3.10 allows remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2016-3508.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134012" comment="java-1_7_0-openjdk-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134013" comment="java-1_7_0-openjdk-accessibility-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134014" comment="java-1_7_0-openjdk-bootstrap-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134015" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134016" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134017" comment="java-1_7_0-openjdk-demo-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134018" comment="java-1_7_0-openjdk-devel-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134019" comment="java-1_7_0-openjdk-headless-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134020" comment="java-1_7_0-openjdk-javadoc-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134021" comment="java-1_7_0-openjdk-src-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130864" comment="java-1_8_0-openjdk-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130865" comment="java-1_8_0-openjdk-accessibility-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130866" comment="java-1_8_0-openjdk-demo-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130867" comment="java-1_8_0-openjdk-devel-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130868" comment="java-1_8_0-openjdk-headless-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130869" comment="java-1_8_0-openjdk-javadoc-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130870" comment="java-1_8_0-openjdk-src-1.8.0.101-30.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3501</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3501" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3501" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.30 and earlier and 5.7.12 and earlier allows remote authenticated users to affect availability via vectors related to Server: Optimizer.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135453" comment="libmysql56client18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135454" comment="libmysql56client18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135455" comment="libmysql56client_r18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135456" comment="libmysql56client_r18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135457" comment="mysql-community-server-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135458" comment="mysql-community-server-bench-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135459" comment="mysql-community-server-client-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135460" comment="mysql-community-server-errormessages-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135461" comment="mysql-community-server-test-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135462" comment="mysql-community-server-tools-5.6.34-2.23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3503</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3503" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3503" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92 allows local users to affect confidentiality, integrity, and availability via vectors related to Install.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134012" comment="java-1_7_0-openjdk-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134013" comment="java-1_7_0-openjdk-accessibility-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134014" comment="java-1_7_0-openjdk-bootstrap-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134015" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134016" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134017" comment="java-1_7_0-openjdk-demo-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134018" comment="java-1_7_0-openjdk-devel-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134019" comment="java-1_7_0-openjdk-headless-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134020" comment="java-1_7_0-openjdk-javadoc-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134021" comment="java-1_7_0-openjdk-src-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130864" comment="java-1_8_0-openjdk-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130865" comment="java-1_8_0-openjdk-accessibility-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130866" comment="java-1_8_0-openjdk-demo-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130867" comment="java-1_8_0-openjdk-devel-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130868" comment="java-1_8_0-openjdk-headless-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130869" comment="java-1_8_0-openjdk-javadoc-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130870" comment="java-1_8_0-openjdk-src-1.8.0.101-30.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3508</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3508" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92; Java SE Embedded 8u91; and JRockit R28.3.10 allows remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2016-3500.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134012" comment="java-1_7_0-openjdk-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134013" comment="java-1_7_0-openjdk-accessibility-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134014" comment="java-1_7_0-openjdk-bootstrap-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134015" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134016" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134017" comment="java-1_7_0-openjdk-demo-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134018" comment="java-1_7_0-openjdk-devel-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134019" comment="java-1_7_0-openjdk-headless-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134020" comment="java-1_7_0-openjdk-javadoc-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134021" comment="java-1_7_0-openjdk-src-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130864" comment="java-1_8_0-openjdk-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130865" comment="java-1_8_0-openjdk-accessibility-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130866" comment="java-1_8_0-openjdk-demo-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130867" comment="java-1_8_0-openjdk-devel-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130868" comment="java-1_8_0-openjdk-headless-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130869" comment="java-1_8_0-openjdk-javadoc-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130870" comment="java-1_8_0-openjdk-src-1.8.0.101-30.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3511</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3511" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u101 and 8u92 allows local users to affect confidentiality, integrity, and availability via vectors related to Deployment.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134012" comment="java-1_7_0-openjdk-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134013" comment="java-1_7_0-openjdk-accessibility-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134014" comment="java-1_7_0-openjdk-bootstrap-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134015" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134016" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134017" comment="java-1_7_0-openjdk-demo-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134018" comment="java-1_7_0-openjdk-devel-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134019" comment="java-1_7_0-openjdk-headless-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134020" comment="java-1_7_0-openjdk-javadoc-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134021" comment="java-1_7_0-openjdk-src-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130864" comment="java-1_8_0-openjdk-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130865" comment="java-1_8_0-openjdk-accessibility-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130866" comment="java-1_8_0-openjdk-demo-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130867" comment="java-1_8_0-openjdk-devel-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130868" comment="java-1_8_0-openjdk-headless-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130869" comment="java-1_8_0-openjdk-javadoc-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130870" comment="java-1_8_0-openjdk-src-1.8.0.101-30.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3521</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3521" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.49 and earlier, 5.6.30 and earlier, and 5.7.12 and earlier and MariaDB before 5.5.50, 10.0.x before 10.0.26, and 10.1.x before 10.1.15 allows remote authenticated users to affect availability via vectors related to Server: Types.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135453" comment="libmysql56client18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135454" comment="libmysql56client18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135455" comment="libmysql56client_r18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135456" comment="libmysql56client_r18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135343" comment="libmysqlclient-devel-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135344" comment="libmysqlclient18-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135345" comment="libmysqlclient18-32bit-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135346" comment="libmysqlclient_r18-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135347" comment="libmysqlclient_r18-32bit-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135348" comment="libmysqld-devel-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135349" comment="libmysqld18-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135350" comment="mariadb-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135351" comment="mariadb-bench-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135352" comment="mariadb-client-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135353" comment="mariadb-errormessages-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135354" comment="mariadb-test-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135355" comment="mariadb-tools-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135457" comment="mysql-community-server-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135458" comment="mysql-community-server-bench-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135459" comment="mysql-community-server-client-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135460" comment="mysql-community-server-errormessages-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135461" comment="mysql-community-server-test-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135462" comment="mysql-community-server-tools-5.6.34-2.23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3550</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3550" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u115, 7u101, and 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality via vectors related to Hotspot.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134012" comment="java-1_7_0-openjdk-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134013" comment="java-1_7_0-openjdk-accessibility-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134014" comment="java-1_7_0-openjdk-bootstrap-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134015" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134016" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134017" comment="java-1_7_0-openjdk-demo-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134018" comment="java-1_7_0-openjdk-devel-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134019" comment="java-1_7_0-openjdk-headless-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134020" comment="java-1_7_0-openjdk-javadoc-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134021" comment="java-1_7_0-openjdk-src-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130864" comment="java-1_8_0-openjdk-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130865" comment="java-1_8_0-openjdk-accessibility-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130866" comment="java-1_8_0-openjdk-demo-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130867" comment="java-1_8_0-openjdk-devel-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130868" comment="java-1_8_0-openjdk-headless-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130869" comment="java-1_8_0-openjdk-javadoc-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130870" comment="java-1_8_0-openjdk-src-1.8.0.101-30.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3552</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3552" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3552" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u92 allows local users to affect confidentiality, integrity, and availability via vectors related to Install.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130864" comment="java-1_8_0-openjdk-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130865" comment="java-1_8_0-openjdk-accessibility-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130866" comment="java-1_8_0-openjdk-demo-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130867" comment="java-1_8_0-openjdk-devel-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130868" comment="java-1_8_0-openjdk-headless-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130869" comment="java-1_8_0-openjdk-javadoc-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130870" comment="java-1_8_0-openjdk-src-1.8.0.101-30.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3587</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3587" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3587" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Hotspot.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130864" comment="java-1_8_0-openjdk-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130865" comment="java-1_8_0-openjdk-accessibility-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130866" comment="java-1_8_0-openjdk-demo-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130867" comment="java-1_8_0-openjdk-devel-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130868" comment="java-1_8_0-openjdk-headless-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130869" comment="java-1_8_0-openjdk-javadoc-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130870" comment="java-1_8_0-openjdk-src-1.8.0.101-30.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3597</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3597" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3597" source="CVE"/>
    <description>
    Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 5.0.26 allows local users to affect availability via vectors related to Core.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133445" comment="python-virtualbox-5.0.26-51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133446" comment="virtualbox-5.0.26-51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133447" comment="virtualbox-devel-5.0.26-51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133448" comment="virtualbox-guest-desktop-icons-5.0.26-51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133449" comment="virtualbox-guest-kmp-default-5.0.26_k3.16.7_42-51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133450" comment="virtualbox-guest-kmp-desktop-5.0.26_k3.16.7_42-51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133451" comment="virtualbox-guest-kmp-pae-5.0.26_k3.16.7_42-51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133452" comment="virtualbox-guest-tools-5.0.26-51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133453" comment="virtualbox-guest-x11-5.0.26-51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133454" comment="virtualbox-host-kmp-default-5.0.26_k3.16.7_42-51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133455" comment="virtualbox-host-kmp-desktop-5.0.26_k3.16.7_42-51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133456" comment="virtualbox-host-kmp-pae-5.0.26_k3.16.7_42-51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133457" comment="virtualbox-host-source-5.0.26-51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133458" comment="virtualbox-qt-5.0.26-51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133459" comment="virtualbox-websrv-5.0.26-51.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3598</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3598" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Libraries, a different vulnerability than CVE-2016-3610.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134012" comment="java-1_7_0-openjdk-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134013" comment="java-1_7_0-openjdk-accessibility-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134014" comment="java-1_7_0-openjdk-bootstrap-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134015" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134016" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134017" comment="java-1_7_0-openjdk-demo-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134018" comment="java-1_7_0-openjdk-devel-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134019" comment="java-1_7_0-openjdk-headless-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134020" comment="java-1_7_0-openjdk-javadoc-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134021" comment="java-1_7_0-openjdk-src-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130864" comment="java-1_8_0-openjdk-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130865" comment="java-1_8_0-openjdk-accessibility-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130866" comment="java-1_8_0-openjdk-demo-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130867" comment="java-1_8_0-openjdk-devel-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130868" comment="java-1_8_0-openjdk-headless-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130869" comment="java-1_8_0-openjdk-javadoc-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130870" comment="java-1_8_0-openjdk-src-1.8.0.101-30.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3606</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3606" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 7u101 and 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Hotspot.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134012" comment="java-1_7_0-openjdk-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134013" comment="java-1_7_0-openjdk-accessibility-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134014" comment="java-1_7_0-openjdk-bootstrap-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134015" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134016" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134017" comment="java-1_7_0-openjdk-demo-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134018" comment="java-1_7_0-openjdk-devel-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134019" comment="java-1_7_0-openjdk-headless-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134020" comment="java-1_7_0-openjdk-javadoc-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134021" comment="java-1_7_0-openjdk-src-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130864" comment="java-1_8_0-openjdk-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130865" comment="java-1_8_0-openjdk-accessibility-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130866" comment="java-1_8_0-openjdk-demo-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130867" comment="java-1_8_0-openjdk-devel-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130868" comment="java-1_8_0-openjdk-headless-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130869" comment="java-1_8_0-openjdk-javadoc-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130870" comment="java-1_8_0-openjdk-src-1.8.0.101-30.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3610</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3610" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 8u92 and Java SE Embedded 8u91 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Libraries, a different vulnerability than CVE-2016-3598.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134012" comment="java-1_7_0-openjdk-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134013" comment="java-1_7_0-openjdk-accessibility-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134014" comment="java-1_7_0-openjdk-bootstrap-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134015" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134016" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134017" comment="java-1_7_0-openjdk-demo-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134018" comment="java-1_7_0-openjdk-devel-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134019" comment="java-1_7_0-openjdk-headless-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134020" comment="java-1_7_0-openjdk-javadoc-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134021" comment="java-1_7_0-openjdk-src-1.7.0.111-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130864" comment="java-1_8_0-openjdk-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130865" comment="java-1_8_0-openjdk-accessibility-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130866" comment="java-1_8_0-openjdk-demo-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130867" comment="java-1_8_0-openjdk-devel-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130868" comment="java-1_8_0-openjdk-headless-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130869" comment="java-1_8_0-openjdk-javadoc-1.8.0.101-30.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130870" comment="java-1_8_0-openjdk-src-1.8.0.101-30.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3612</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3612" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3612" source="CVE"/>
    <description>
    Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 5.0.22 allows remote attackers to affect confidentiality via vectors related to Core.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133445" comment="python-virtualbox-5.0.26-51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133446" comment="virtualbox-5.0.26-51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133447" comment="virtualbox-devel-5.0.26-51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133448" comment="virtualbox-guest-desktop-icons-5.0.26-51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133449" comment="virtualbox-guest-kmp-default-5.0.26_k3.16.7_42-51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133450" comment="virtualbox-guest-kmp-desktop-5.0.26_k3.16.7_42-51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133451" comment="virtualbox-guest-kmp-pae-5.0.26_k3.16.7_42-51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133452" comment="virtualbox-guest-tools-5.0.26-51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133453" comment="virtualbox-guest-x11-5.0.26-51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133454" comment="virtualbox-host-kmp-default-5.0.26_k3.16.7_42-51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133455" comment="virtualbox-host-kmp-desktop-5.0.26_k3.16.7_42-51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133456" comment="virtualbox-host-kmp-pae-5.0.26_k3.16.7_42-51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133457" comment="virtualbox-host-source-5.0.26-51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133458" comment="virtualbox-qt-5.0.26-51.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133459" comment="virtualbox-websrv-5.0.26-51.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3614</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3614" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3614" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.30 and earlier and 5.7.12 and earlier allows remote authenticated users to affect availability via vectors related to Server: Security: Encryption.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135453" comment="libmysql56client18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135454" comment="libmysql56client18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135455" comment="libmysql56client_r18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135456" comment="libmysql56client_r18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135457" comment="mysql-community-server-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135458" comment="mysql-community-server-bench-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135459" comment="mysql-community-server-client-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135460" comment="mysql-community-server-errormessages-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135461" comment="mysql-community-server-test-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135462" comment="mysql-community-server-tools-5.6.34-2.23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3615</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3615" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.49 and earlier, 5.6.30 and earlier, and 5.7.12 and earlier and MariaDB before 5.5.50, 10.0.x before 10.0.26, and 10.1.x before 10.1.15 allows remote authenticated users to affect availability via vectors related to Server: DML.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135453" comment="libmysql56client18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135454" comment="libmysql56client18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135455" comment="libmysql56client_r18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135456" comment="libmysql56client_r18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135343" comment="libmysqlclient-devel-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135344" comment="libmysqlclient18-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135345" comment="libmysqlclient18-32bit-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135346" comment="libmysqlclient_r18-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135347" comment="libmysqlclient_r18-32bit-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135348" comment="libmysqld-devel-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135349" comment="libmysqld18-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135350" comment="mariadb-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135351" comment="mariadb-bench-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135352" comment="mariadb-client-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135353" comment="mariadb-errormessages-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135354" comment="mariadb-test-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135355" comment="mariadb-tools-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135457" comment="mysql-community-server-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135458" comment="mysql-community-server-bench-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135459" comment="mysql-community-server-client-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135460" comment="mysql-community-server-errormessages-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135461" comment="mysql-community-server-test-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135462" comment="mysql-community-server-tools-5.6.34-2.23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3622</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3622" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3622" source="CVE"/>
    <description>
    The fpAcc function in tif_predict.c in the tiff2rgba tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted TIFF image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136807" comment="libtiff-devel-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136808" comment="libtiff-devel-32bit-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136809" comment="libtiff5-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136810" comment="libtiff5-32bit-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136811" comment="tiff-4.0.7-10.35.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3623</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3623" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3623" source="CVE"/>
    <description>
    The rgb2ycbcr tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (divide-by-zero) by setting the (1) v or (2) h parameter to 0.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133415" comment="libtiff-devel-4.0.6-10.29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133416" comment="libtiff-devel-32bit-4.0.6-10.29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133417" comment="libtiff5-4.0.6-10.29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133418" comment="libtiff5-32bit-4.0.6-10.29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133419" comment="tiff-4.0.6-10.29.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3627</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3627" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3627" source="CVE"/>
    <description>
    The xmlStringGetNodeList function in tree.c in libxml2 2.9.3 and earlier, when used in recovery mode, allows context-dependent attackers to cause a denial of service (infinite recursion, stack consumption, and application crash) via a crafted XML document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128921" comment="libxml2-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128922" comment="libxml2-2-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128923" comment="libxml2-2-32bit-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128924" comment="libxml2-devel-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128925" comment="libxml2-devel-32bit-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128926" comment="libxml2-doc-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128927" comment="libxml2-tools-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128928" comment="python-libxml2-2.9.4-7.17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3630</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3630" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3630" source="CVE"/>
    <description>
    The binary delta decoder in Mercurial before 3.7.3 allows remote attackers to execute arbitrary code via a (1) clone, (2) push, or (3) pull command, related to (a) a list sizing rounding error and (b) short records.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126039" comment="mercurial-3.1.2-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126040" comment="mercurial-lang-3.1.2-7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3658</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3658" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3658" source="CVE"/>
    <description>
    The TIFFWriteDirectoryTagLongLong8Array function in tif_dirwrite.c in the tiffset tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) via vectors involving the ma variable.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136807" comment="libtiff-devel-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136808" comment="libtiff-devel-32bit-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136809" comment="libtiff5-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136810" comment="libtiff5-32bit-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136811" comment="tiff-4.0.7-10.35.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3659</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3659" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3659" source="CVE"/>
    <description>
    SQL injection vulnerability in graph_view.php in Cacti 0.8.8.g allows remote authenticated users to execute arbitrary SQL commands via the host_group_data parameter.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127835" comment="cacti-0.8.8f-4.16.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3672</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3672" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3672" source="CVE"/>
    <description>
    The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel through 4.5.2 does not properly randomize the legacy base address, which makes it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3679</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3679" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3679" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google V8 before 4.9.385.33, as used in Google Chrome before 49.0.2623.108, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009125635" comment="chromedriver-49.0.2623.110-90.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125636" comment="chromium-49.0.2623.110-90.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125637" comment="chromium-desktop-gnome-49.0.2623.110-90.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125638" comment="chromium-desktop-kde-49.0.2623.110-90.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125639" comment="chromium-ffmpegsumo-49.0.2623.110-90.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3689</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3689" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3689" source="CVE"/>
    <description>
    The ims_pcu_parse_cdc_data function in drivers/input/misc/ims-pcu.c in the Linux kernel before 4.5.1 allows physically proximate attackers to cause a denial of service (system crash) via a USB device without both a master and a slave interface.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3697</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3697" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3697" source="CVE"/>
    <description>
    libcontainer/user/user.go in runC before 0.1.0, as used in Docker before 1.11.2, improperly treats a numeric UID as a potential username, which allows local users to gain privileges via a numeric username in the password file in a container.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128155" comment="docker-1.9.1-56.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128156" comment="docker-bash-completion-1.9.1-56.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128157" comment="docker-test-1.9.1-56.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128158" comment="docker-zsh-completion-1.9.1-56.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3705</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3705" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3705" source="CVE"/>
    <description>
    The (1) xmlParserEntityCheck and (2) xmlParseAttValueComplex functions in parser.c in libxml2 2.9.3 do not properly keep track of the recursion depth, which allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a crafted XML document containing a large number of nested entity references.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128921" comment="libxml2-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128922" comment="libxml2-2-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128923" comment="libxml2-2-32bit-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128924" comment="libxml2-devel-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128925" comment="libxml2-devel-32bit-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128926" comment="libxml2-doc-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128927" comment="libxml2-tools-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128928" comment="python-libxml2-2.9.4-7.17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3706</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3706" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3706" source="CVE"/>
    <description>
    Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in the GNU C Library (aka glibc or libc6) allows remote attackers to cause a denial of service (crash) via vectors involving hostent conversion. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4458.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128518" comment="glibc-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128519" comment="glibc-32bit-2.19-16.25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128520" comment="glibc-devel-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128521" comment="glibc-devel-32bit-2.19-16.25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128522" comment="glibc-devel-static-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128523" comment="glibc-devel-static-32bit-2.19-16.25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128524" comment="glibc-extra-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128525" comment="glibc-html-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128526" comment="glibc-i18ndata-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128527" comment="glibc-info-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128528" comment="glibc-locale-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128529" comment="glibc-locale-32bit-2.19-16.25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128530" comment="glibc-obsolete-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128531" comment="glibc-profile-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128532" comment="glibc-profile-32bit-2.19-16.25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128533" comment="glibc-testsuite-2.19-16.25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128534" comment="glibc-utils-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128535" comment="glibc-utils-32bit-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128536" comment="nscd-2.19-16.25.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3710</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3710" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3710" source="CVE"/>
    <description>
    The VGA module in QEMU improperly performs bounds checking on banked access to video memory, which allows local guest OS administrators to execute arbitrary code on the host by changing access modes after setting the bank register, aka the "Dark Portal" issue.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133720" comment="xen-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133721" comment="xen-devel-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133722" comment="xen-doc-html-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133723" comment="xen-kmp-default-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133724" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133725" comment="xen-libs-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133726" comment="xen-libs-32bit-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133727" comment="xen-tools-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133728" comment="xen-tools-domU-4.4.4_05-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3712</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3712" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3712" source="CVE"/>
    <description>
    Integer overflow in the VGA module in QEMU allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) by editing VGA registers in VBE mode.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133720" comment="xen-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133721" comment="xen-devel-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133722" comment="xen-doc-html-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133723" comment="xen-kmp-default-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133724" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133725" comment="xen-libs-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133726" comment="xen-libs-32bit-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133727" comment="xen-tools-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133728" comment="xen-tools-domU-4.4.4_05-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3714</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3714" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714" source="CVE"/>
    <description>
    The (1) EPHEMERAL, (2) HTTPS, (3) MVG, (4) MSL, (5) TEXT, (6) SHOW, (7) WIN, and (8) PLT coders in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allow remote attackers to execute arbitrary code via shell metacharacters in a crafted image, aka "ImageTragick."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127836" comment="GraphicsMagick-1.3.20-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127837" comment="GraphicsMagick-devel-1.3.20-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127295" comment="ImageMagick-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127296" comment="ImageMagick-devel-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127297" comment="ImageMagick-devel-32bit-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127298" comment="ImageMagick-doc-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127299" comment="ImageMagick-extra-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127756" comment="libGraphicsMagick++-Q16-3-1.3.20-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127838" comment="libGraphicsMagick++-devel-1.3.20-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127839" comment="libGraphicsMagick-Q16-3-1.3.20-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127840" comment="libGraphicsMagick3-config-1.3.20-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127841" comment="libGraphicsMagickWand-Q16-2-1.3.20-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127300" comment="libMagick++-6_Q16-5-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127301" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127302" comment="libMagick++-devel-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127303" comment="libMagick++-devel-32bit-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127304" comment="libMagickCore-6_Q16-2-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127305" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127306" comment="libMagickWand-6_Q16-2-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127307" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127842" comment="perl-GraphicsMagick-1.3.20-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127308" comment="perl-PerlMagick-6.8.9.8-18.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3715</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3715" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715" source="CVE"/>
    <description>
    The EPHEMERAL coder in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allows remote attackers to delete arbitrary files via a crafted image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127836" comment="GraphicsMagick-1.3.20-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127837" comment="GraphicsMagick-devel-1.3.20-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127295" comment="ImageMagick-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127296" comment="ImageMagick-devel-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127297" comment="ImageMagick-devel-32bit-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127298" comment="ImageMagick-doc-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127299" comment="ImageMagick-extra-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127756" comment="libGraphicsMagick++-Q16-3-1.3.20-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127838" comment="libGraphicsMagick++-devel-1.3.20-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127839" comment="libGraphicsMagick-Q16-3-1.3.20-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127840" comment="libGraphicsMagick3-config-1.3.20-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127841" comment="libGraphicsMagickWand-Q16-2-1.3.20-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127300" comment="libMagick++-6_Q16-5-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127301" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127302" comment="libMagick++-devel-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127303" comment="libMagick++-devel-32bit-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127304" comment="libMagickCore-6_Q16-2-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127305" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127306" comment="libMagickWand-6_Q16-2-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127307" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127842" comment="perl-GraphicsMagick-1.3.20-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127308" comment="perl-PerlMagick-6.8.9.8-18.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3716</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3716" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3716" source="CVE"/>
    <description>
    The MSL coder in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allows remote attackers to move arbitrary files via a crafted image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127295" comment="ImageMagick-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127296" comment="ImageMagick-devel-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127297" comment="ImageMagick-devel-32bit-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127298" comment="ImageMagick-doc-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127299" comment="ImageMagick-extra-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127300" comment="libMagick++-6_Q16-5-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127301" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127302" comment="libMagick++-devel-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127303" comment="libMagick++-devel-32bit-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127304" comment="libMagickCore-6_Q16-2-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127305" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127306" comment="libMagickWand-6_Q16-2-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127307" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127308" comment="perl-PerlMagick-6.8.9.8-18.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3717</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3717" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3717" source="CVE"/>
    <description>
    The LABEL coder in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allows remote attackers to read arbitrary files via a crafted image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127836" comment="GraphicsMagick-1.3.20-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127837" comment="GraphicsMagick-devel-1.3.20-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127295" comment="ImageMagick-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127296" comment="ImageMagick-devel-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127297" comment="ImageMagick-devel-32bit-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127298" comment="ImageMagick-doc-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127299" comment="ImageMagick-extra-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127756" comment="libGraphicsMagick++-Q16-3-1.3.20-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127838" comment="libGraphicsMagick++-devel-1.3.20-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127839" comment="libGraphicsMagick-Q16-3-1.3.20-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127840" comment="libGraphicsMagick3-config-1.3.20-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127841" comment="libGraphicsMagickWand-Q16-2-1.3.20-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127300" comment="libMagick++-6_Q16-5-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127301" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127302" comment="libMagick++-devel-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127303" comment="libMagick++-devel-32bit-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127304" comment="libMagickCore-6_Q16-2-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127305" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127306" comment="libMagickWand-6_Q16-2-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127307" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127842" comment="perl-GraphicsMagick-1.3.20-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127308" comment="perl-PerlMagick-6.8.9.8-18.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3718</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3718" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3718" source="CVE"/>
    <description>
    The (1) HTTP and (2) FTP coders in ImageMagick before 6.9.3-10 and 7.x before 7.0.1-1 allow remote attackers to conduct server-side request forgery (SSRF) attacks via a crafted image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127836" comment="GraphicsMagick-1.3.20-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127837" comment="GraphicsMagick-devel-1.3.20-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127295" comment="ImageMagick-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127296" comment="ImageMagick-devel-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127297" comment="ImageMagick-devel-32bit-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127298" comment="ImageMagick-doc-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127299" comment="ImageMagick-extra-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127756" comment="libGraphicsMagick++-Q16-3-1.3.20-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127838" comment="libGraphicsMagick++-devel-1.3.20-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127839" comment="libGraphicsMagick-Q16-3-1.3.20-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127840" comment="libGraphicsMagick3-config-1.3.20-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127841" comment="libGraphicsMagickWand-Q16-2-1.3.20-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127300" comment="libMagick++-6_Q16-5-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127301" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127302" comment="libMagick++-devel-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127303" comment="libMagick++-devel-32bit-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127304" comment="libMagickCore-6_Q16-2-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127305" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127306" comment="libMagickWand-6_Q16-2-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127307" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127842" comment="perl-GraphicsMagick-1.3.20-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127308" comment="perl-PerlMagick-6.8.9.8-18.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3941</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3941" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3941" source="CVE"/>
    <description>
    Buffer overflow in the AStreamPeekStream function in input/stream.c in VideoLAN VLC media player before 2.2.0 allows remote attackers to cause a denial of service (crash) via a crafted wav file, related to "seek across EOF."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129185" comment="libvlc5-2.1.6-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129186" comment="libvlccore7-2.1.6-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129187" comment="vlc-2.1.6-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129188" comment="vlc-devel-2.1.6-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129189" comment="vlc-gnome-2.1.6-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129190" comment="vlc-noX-2.1.6-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129191" comment="vlc-noX-lang-2.1.6-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129192" comment="vlc-qt-2.1.6-2.10.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3945</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3945" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945" source="CVE"/>
    <description>
    Multiple integer overflows in the (1) cvt_by_strip and (2) cvt_by_tile functions in the tiff2rgba tool in LibTIFF 4.0.6 and earlier, when -b mode is enabled, allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted TIFF image, which triggers an out-of-bounds write.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133415" comment="libtiff-devel-4.0.6-10.29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133416" comment="libtiff-devel-32bit-4.0.6-10.29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133417" comment="libtiff5-4.0.6-10.29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133418" comment="libtiff5-32bit-4.0.6-10.29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133419" comment="tiff-4.0.6-10.29.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3951</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3951" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3951" source="CVE"/>
    <description>
    Double free vulnerability in drivers/net/usb/cdc_ncm.c in the Linux kernel before 4.5 allows physically proximate attackers to cause a denial of service (system crash) or possibly have unspecified other impact by inserting a USB device with an invalid USB descriptor.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3960</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3960" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3960" source="CVE"/>
    <description>
    Integer overflow in the x86 shadow pagetable code in Xen allows local guest OS users to cause a denial of service (host crash) or possibly gain privileges by shadowing a superpage mapping.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133720" comment="xen-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133721" comment="xen-devel-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133722" comment="xen-doc-html-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133723" comment="xen-kmp-default-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133724" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133725" comment="xen-libs-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133726" comment="xen-libs-32bit-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133727" comment="xen-tools-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133728" comment="xen-tools-domU-4.4.4_05-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3977</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3977" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3977" source="CVE"/>
    <description>
    Heap-based buffer overflow in util/gif2rgb.c in gif2rgb in giflib 5.1.2 allows remote attackers to cause a denial of service (application crash) via the background color index in a GIF file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009126685" comment="giflib-5.0.5-4.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126686" comment="giflib-devel-5.0.5-4.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126687" comment="giflib-devel-32bit-5.0.5-4.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126688" comment="giflib-progs-5.0.5-4.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126689" comment="libgif6-5.0.5-4.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126690" comment="libgif6-32bit-5.0.5-4.6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3981</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3981" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3981" source="CVE"/>
    <description>
    Heap-based buffer overflow in the bmp_read_rows function in pngxrbmp.c in OptiPNG before 0.7.6 allows remote attackers to cause a denial of service (out-of-bounds read or write access and crash) or possibly execute arbitrary code via a crafted image file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126349" comment="optipng-0.7.5-2.3.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3982</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3982" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3982" source="CVE"/>
    <description>
    Off-by-one error in the bmp_rle4_fread function in pngxrbmp.c in OptiPNG before 0.7.6 allows remote attackers to cause a denial of service (out-of-bounds read or write access and crash) or possibly execute arbitrary code via a crafted image file, which triggers a heap-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009126349" comment="optipng-0.7.5-2.3.2 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3990</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3990" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990" source="CVE"/>
    <description>
    Heap-based buffer overflow in the horizontalDifference8 function in tif_pixarlog.c in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted TIFF image to tiffcp.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133415" comment="libtiff-devel-4.0.6-10.29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133416" comment="libtiff-devel-32bit-4.0.6-10.29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133417" comment="libtiff5-4.0.6-10.29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133418" comment="libtiff5-32bit-4.0.6-10.29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133419" comment="tiff-4.0.6-10.29.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3991</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3991" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991" source="CVE"/>
    <description>
    Heap-based buffer overflow in the loadImage function in the tiffcrop tool in LibTIFF 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds write) or execute arbitrary code via a crafted TIFF image with zero tiles.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133415" comment="libtiff-devel-4.0.6-10.29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133416" comment="libtiff-devel-32bit-4.0.6-10.29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133417" comment="libtiff5-4.0.6-10.29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133418" comment="libtiff5-32bit-4.0.6-10.29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133419" comment="tiff-4.0.6-10.29.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3992</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3992" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3992" source="CVE"/>
    <description>
    cronic before 3 allows local users to write to arbitrary files via a symlink attack on a (1) cronic.out.$$, (2) cronic.err.$$, or (3) cronic.trace.$$ file in /tmp.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129748" comment="cronic-3-3.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3993</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3993" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3993" source="CVE"/>
    <description>
    Off-by-one error in the __imlib_MergeUpdate function in lib/updates.c in imlib2 before 1.4.9 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via crafted coordinates.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127747" comment="imlib2-1.4.9-17.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127748" comment="imlib2-devel-1.4.9-17.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127749" comment="imlib2-filters-1.4.9-17.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127750" comment="imlib2-loaders-1.4.9-17.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127751" comment="libImlib2-1-1.4.9-17.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3994</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-3994" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3994" source="CVE"/>
    <description>
    The GIF loader in imlib2 before 1.4.9 allows remote attackers to cause a denial of service (application crash) or obtain sensitive information via a crafted image, which triggers an out-of-bounds read.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127747" comment="imlib2-1.4.9-17.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127748" comment="imlib2-devel-1.4.9-17.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127749" comment="imlib2-filters-1.4.9-17.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127750" comment="imlib2-loaders-1.4.9-17.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127751" comment="libImlib2-1-1.4.9-17.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4001</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4001" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4001" source="CVE"/>
    <description>
    Buffer overflow in the stellaris_enet_receive function in hw/net/stellaris_enet.c in QEMU, when the Stellaris ethernet controller is configured to accept large packets, allows remote attackers to cause a denial of service (QEMU crash) via a large packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133720" comment="xen-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133721" comment="xen-devel-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133722" comment="xen-doc-html-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133723" comment="xen-kmp-default-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133724" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133725" comment="xen-libs-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133726" comment="xen-libs-32bit-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133727" comment="xen-tools-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133728" comment="xen-tools-domU-4.4.4_05-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4002</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4002" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4002" source="CVE"/>
    <description>
    Buffer overflow in the mipsnet_receive function in hw/net/mipsnet.c in QEMU, when the guest NIC is configured to accept large packets, allows remote attackers to cause a denial of service (memory corruption and QEMU crash) or possibly execute arbitrary code via a packet larger than 1514 bytes.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133720" comment="xen-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133721" comment="xen-devel-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133722" comment="xen-doc-html-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133723" comment="xen-kmp-default-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133724" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133725" comment="xen-libs-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133726" comment="xen-libs-32bit-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133727" comment="xen-tools-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133728" comment="xen-tools-domU-4.4.4_05-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4007</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4007" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4007" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the obs-service-extract_file package before 0.3-5.1 in openSUSE Leap 42.1 and before 0.3-3.1 in openSUSE 13.2 allow attackers to execute arbitrary commands via a service definition, related to executing unzip with "illegal options."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129193" comment="obs-service-source_validator-0.6+git20160531.fbfe336-9.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4008</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4008" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4008" source="CVE"/>
    <description>
    The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128875" comment="libtasn1-3.7-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128876" comment="libtasn1-6-3.7-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128877" comment="libtasn1-6-32bit-3.7-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128878" comment="libtasn1-devel-3.7-2.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128879" comment="libtasn1-devel-32bit-3.7-2.7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4020</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4020" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4020" source="CVE"/>
    <description>
    The patch_instruction function in hw/i386/kvmvapic.c in QEMU does not initialize the imm32 variable, which allows local guest OS administrators to obtain sensitive information from host stack memory by accessing the Task Priority Register (TPR).
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133720" comment="xen-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133721" comment="xen-devel-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133722" comment="xen-doc-html-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133723" comment="xen-kmp-default-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133724" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133725" comment="xen-libs-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133726" comment="xen-libs-32bit-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133727" comment="xen-tools-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133728" comment="xen-tools-domU-4.4.4_05-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4024</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4024" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4024" source="CVE"/>
    <description>
    Integer overflow in imlib2 before 1.4.9 on 32-bit platforms allows remote attackers to execute arbitrary code via large dimensions in an image, which triggers an out-of-bounds heap memory write operation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127747" comment="imlib2-1.4.9-17.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127748" comment="imlib2-devel-1.4.9-17.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127749" comment="imlib2-filters-1.4.9-17.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127750" comment="imlib2-loaders-1.4.9-17.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127751" comment="libImlib2-1-1.4.9-17.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4037</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4037" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4037" source="CVE"/>
    <description>
    The ehci_advance_state function in hw/usb/hcd-ehci.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via a circular split isochronous transfer descriptor (siTD) list, a related issue to CVE-2015-8558.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133720" comment="xen-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133721" comment="xen-devel-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133722" comment="xen-doc-html-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133723" comment="xen-kmp-default-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133724" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133725" comment="xen-libs-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133726" comment="xen-libs-32bit-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133727" comment="xen-tools-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133728" comment="xen-tools-domU-4.4.4_05-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4049</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4049" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4049" source="CVE"/>
    <description>
    The bgp_dump_routes_func function in bgpd/bgp_dump.c in Quagga does not perform size checks when dumping data, which might allow remote attackers to cause a denial of service (assertion failure and daemon crash) via a large BGP packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127698" comment="quagga-0.99.23-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127699" comment="quagga-devel-0.99.23-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4070</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4070" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4070" source="CVE"/>
    <description>
    ** DISPUTED ** Integer overflow in the php_raw_url_encode function in ext/standard/url.c in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to cause a denial of service (application crash) via a long string to the rawurlencode function. NOTE: the vendor says "Not sure if this qualifies as security issue (probably not)."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127477" comment="apache2-mod_php5-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127478" comment="php5-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127479" comment="php5-bcmath-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127480" comment="php5-bz2-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127481" comment="php5-calendar-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127482" comment="php5-ctype-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127483" comment="php5-curl-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127484" comment="php5-dba-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127485" comment="php5-devel-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127486" comment="php5-dom-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127487" comment="php5-enchant-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127488" comment="php5-exif-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127489" comment="php5-fastcgi-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127490" comment="php5-fileinfo-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127491" comment="php5-firebird-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127492" comment="php5-fpm-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127493" comment="php5-ftp-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127494" comment="php5-gd-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127495" comment="php5-gettext-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127496" comment="php5-gmp-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127497" comment="php5-iconv-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127498" comment="php5-imap-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127499" comment="php5-intl-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127500" comment="php5-json-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127501" comment="php5-ldap-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127502" comment="php5-mbstring-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127503" comment="php5-mcrypt-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127504" comment="php5-mssql-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127505" comment="php5-mysql-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127506" comment="php5-odbc-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127507" comment="php5-opcache-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127508" comment="php5-openssl-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127509" comment="php5-pcntl-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127510" comment="php5-pdo-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127511" comment="php5-pear-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127512" comment="php5-pgsql-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127513" comment="php5-phar-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127514" comment="php5-posix-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127515" comment="php5-pspell-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127516" comment="php5-readline-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127517" comment="php5-shmop-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127518" comment="php5-snmp-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127519" comment="php5-soap-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127520" comment="php5-sockets-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127521" comment="php5-sqlite-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127522" comment="php5-suhosin-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127523" comment="php5-sysvmsg-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127524" comment="php5-sysvsem-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127525" comment="php5-sysvshm-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127526" comment="php5-tidy-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127527" comment="php5-tokenizer-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127528" comment="php5-wddx-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127529" comment="php5-xmlreader-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127530" comment="php5-xmlrpc-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127531" comment="php5-xmlwriter-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127532" comment="php5-xsl-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127533" comment="php5-zip-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127534" comment="php5-zlib-5.6.1-57.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4071</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4071" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4071" source="CVE"/>
    <description>
    Format string vulnerability in the php_snmp_error function in ext/snmp/snmp.c in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to execute arbitrary code via format string specifiers in an SNMP::get call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127477" comment="apache2-mod_php5-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127478" comment="php5-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127479" comment="php5-bcmath-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127480" comment="php5-bz2-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127481" comment="php5-calendar-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127482" comment="php5-ctype-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127483" comment="php5-curl-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127484" comment="php5-dba-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127485" comment="php5-devel-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127486" comment="php5-dom-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127487" comment="php5-enchant-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127488" comment="php5-exif-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127489" comment="php5-fastcgi-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127490" comment="php5-fileinfo-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127491" comment="php5-firebird-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127492" comment="php5-fpm-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127493" comment="php5-ftp-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127494" comment="php5-gd-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127495" comment="php5-gettext-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127496" comment="php5-gmp-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127497" comment="php5-iconv-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127498" comment="php5-imap-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127499" comment="php5-intl-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127500" comment="php5-json-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127501" comment="php5-ldap-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127502" comment="php5-mbstring-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127503" comment="php5-mcrypt-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127504" comment="php5-mssql-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127505" comment="php5-mysql-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127506" comment="php5-odbc-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127507" comment="php5-opcache-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127508" comment="php5-openssl-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127509" comment="php5-pcntl-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127510" comment="php5-pdo-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127511" comment="php5-pear-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127512" comment="php5-pgsql-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127513" comment="php5-phar-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127514" comment="php5-posix-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127515" comment="php5-pspell-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127516" comment="php5-readline-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127517" comment="php5-shmop-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127518" comment="php5-snmp-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127519" comment="php5-soap-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127520" comment="php5-sockets-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127521" comment="php5-sqlite-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127522" comment="php5-suhosin-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127523" comment="php5-sysvmsg-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127524" comment="php5-sysvsem-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127525" comment="php5-sysvshm-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127526" comment="php5-tidy-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127527" comment="php5-tokenizer-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127528" comment="php5-wddx-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127529" comment="php5-xmlreader-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127530" comment="php5-xmlrpc-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127531" comment="php5-xmlwriter-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127532" comment="php5-xsl-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127533" comment="php5-zip-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127534" comment="php5-zlib-5.6.1-57.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4073</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4073" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4073" source="CVE"/>
    <description>
    Multiple integer overflows in the mbfl_strcut function in ext/mbstring/libmbfl/mbfl/mbfilter.c in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted mb_strcut call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127477" comment="apache2-mod_php5-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127478" comment="php5-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127479" comment="php5-bcmath-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127480" comment="php5-bz2-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127481" comment="php5-calendar-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127482" comment="php5-ctype-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127483" comment="php5-curl-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127484" comment="php5-dba-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127485" comment="php5-devel-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127486" comment="php5-dom-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127487" comment="php5-enchant-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127488" comment="php5-exif-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127489" comment="php5-fastcgi-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127490" comment="php5-fileinfo-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127491" comment="php5-firebird-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127492" comment="php5-fpm-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127493" comment="php5-ftp-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127494" comment="php5-gd-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127495" comment="php5-gettext-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127496" comment="php5-gmp-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127497" comment="php5-iconv-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127498" comment="php5-imap-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127499" comment="php5-intl-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127500" comment="php5-json-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127501" comment="php5-ldap-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127502" comment="php5-mbstring-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127503" comment="php5-mcrypt-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127504" comment="php5-mssql-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127505" comment="php5-mysql-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127506" comment="php5-odbc-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127507" comment="php5-opcache-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127508" comment="php5-openssl-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127509" comment="php5-pcntl-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127510" comment="php5-pdo-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127511" comment="php5-pear-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127512" comment="php5-pgsql-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127513" comment="php5-phar-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127514" comment="php5-posix-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127515" comment="php5-pspell-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127516" comment="php5-readline-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127517" comment="php5-shmop-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127518" comment="php5-snmp-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127519" comment="php5-soap-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127520" comment="php5-sockets-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127521" comment="php5-sqlite-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127522" comment="php5-suhosin-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127523" comment="php5-sysvmsg-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127524" comment="php5-sysvsem-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127525" comment="php5-sysvshm-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127526" comment="php5-tidy-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127527" comment="php5-tokenizer-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127528" comment="php5-wddx-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127529" comment="php5-xmlreader-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127530" comment="php5-xmlrpc-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127531" comment="php5-xmlwriter-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127532" comment="php5-xsl-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127533" comment="php5-zip-5.6.1-57.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127534" comment="php5-zlib-5.6.1-57.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4117</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4117" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4117" source="CVE"/>
    <description>
    Adobe Flash Player 21.0.0.226 and earlier allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in May 2016.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127586" comment="flash-player-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127587" comment="flash-player-gnome-11.2.202.621-2.97.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127588" comment="flash-player-kde4-11.2.202.621-2.97.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4122</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4122" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4122" source="CVE"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128994" comment="flash-player-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128995" comment="flash-player-gnome-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128996" comment="flash-player-kde4-11.2.202.626-2.100.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4123</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4123" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4123" source="CVE"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128994" comment="flash-player-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128995" comment="flash-player-gnome-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128996" comment="flash-player-kde4-11.2.202.626-2.100.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4124</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4124" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4124" source="CVE"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128994" comment="flash-player-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128995" comment="flash-player-gnome-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128996" comment="flash-player-kde4-11.2.202.626-2.100.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4125</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4125" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4125" source="CVE"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128994" comment="flash-player-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128995" comment="flash-player-gnome-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128996" comment="flash-player-kde4-11.2.202.626-2.100.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4127</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4127" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4127" source="CVE"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128994" comment="flash-player-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128995" comment="flash-player-gnome-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128996" comment="flash-player-kde4-11.2.202.626-2.100.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4128</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4128" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4128" source="CVE"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128994" comment="flash-player-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128995" comment="flash-player-gnome-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128996" comment="flash-player-kde4-11.2.202.626-2.100.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4129</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4129" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4129" source="CVE"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128994" comment="flash-player-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128995" comment="flash-player-gnome-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128996" comment="flash-player-kde4-11.2.202.626-2.100.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4130</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4130" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4130" source="CVE"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128994" comment="flash-player-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128995" comment="flash-player-gnome-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128996" comment="flash-player-kde4-11.2.202.626-2.100.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4131</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4131" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4131" source="CVE"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128994" comment="flash-player-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128995" comment="flash-player-gnome-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128996" comment="flash-player-kde4-11.2.202.626-2.100.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4132</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4132" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4132" source="CVE"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128994" comment="flash-player-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128995" comment="flash-player-gnome-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128996" comment="flash-player-kde4-11.2.202.626-2.100.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4133</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4133" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4133" source="CVE"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128994" comment="flash-player-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128995" comment="flash-player-gnome-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128996" comment="flash-player-kde4-11.2.202.626-2.100.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4134</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4134" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4134" source="CVE"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128994" comment="flash-player-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128995" comment="flash-player-gnome-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128996" comment="flash-player-kde4-11.2.202.626-2.100.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4135</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4135" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4135" source="CVE"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128994" comment="flash-player-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128995" comment="flash-player-gnome-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128996" comment="flash-player-kde4-11.2.202.626-2.100.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4136</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4136" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4136" source="CVE"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128994" comment="flash-player-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128995" comment="flash-player-gnome-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128996" comment="flash-player-kde4-11.2.202.626-2.100.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4137</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4137" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4137" source="CVE"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128994" comment="flash-player-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128995" comment="flash-player-gnome-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128996" comment="flash-player-kde4-11.2.202.626-2.100.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4138</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4138" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4138" source="CVE"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128994" comment="flash-player-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128995" comment="flash-player-gnome-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128996" comment="flash-player-kde4-11.2.202.626-2.100.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4139</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4139" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4139" source="CVE"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128994" comment="flash-player-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128995" comment="flash-player-gnome-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128996" comment="flash-player-kde4-11.2.202.626-2.100.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4140</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4140" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4140" source="CVE"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128994" comment="flash-player-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128995" comment="flash-player-gnome-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128996" comment="flash-player-kde4-11.2.202.626-2.100.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4141</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4141" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4141" source="CVE"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128994" comment="flash-player-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128995" comment="flash-player-gnome-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128996" comment="flash-player-kde4-11.2.202.626-2.100.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4142</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4142" source="CVE"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128994" comment="flash-player-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128995" comment="flash-player-gnome-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128996" comment="flash-player-kde4-11.2.202.626-2.100.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4143</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4143" source="CVE"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128994" comment="flash-player-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128995" comment="flash-player-gnome-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128996" comment="flash-player-kde4-11.2.202.626-2.100.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4144</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4144" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4144" source="CVE"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128994" comment="flash-player-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128995" comment="flash-player-gnome-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128996" comment="flash-player-kde4-11.2.202.626-2.100.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4145</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4145" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4145" source="CVE"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128994" comment="flash-player-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128995" comment="flash-player-gnome-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128996" comment="flash-player-kde4-11.2.202.626-2.100.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4146</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4146" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4146" source="CVE"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128994" comment="flash-player-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128995" comment="flash-player-gnome-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128996" comment="flash-player-kde4-11.2.202.626-2.100.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4147</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4147" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4147" source="CVE"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128994" comment="flash-player-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128995" comment="flash-player-gnome-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128996" comment="flash-player-kde4-11.2.202.626-2.100.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4148</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4148" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4148" source="CVE"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128994" comment="flash-player-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128995" comment="flash-player-gnome-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128996" comment="flash-player-kde4-11.2.202.626-2.100.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4149</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4149" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4149" source="CVE"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128994" comment="flash-player-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128995" comment="flash-player-gnome-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128996" comment="flash-player-kde4-11.2.202.626-2.100.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4150</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4150" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4150" source="CVE"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128994" comment="flash-player-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128995" comment="flash-player-gnome-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128996" comment="flash-player-kde4-11.2.202.626-2.100.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4151</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4151" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4151" source="CVE"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128994" comment="flash-player-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128995" comment="flash-player-gnome-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128996" comment="flash-player-kde4-11.2.202.626-2.100.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4152</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4152" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4152" source="CVE"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128994" comment="flash-player-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128995" comment="flash-player-gnome-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128996" comment="flash-player-kde4-11.2.202.626-2.100.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4153</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4153" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4153" source="CVE"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128994" comment="flash-player-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128995" comment="flash-player-gnome-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128996" comment="flash-player-kde4-11.2.202.626-2.100.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4154</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4154" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4154" source="CVE"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128994" comment="flash-player-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128995" comment="flash-player-gnome-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128996" comment="flash-player-kde4-11.2.202.626-2.100.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4155</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4155" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4155" source="CVE"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128994" comment="flash-player-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128995" comment="flash-player-gnome-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128996" comment="flash-player-kde4-11.2.202.626-2.100.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4156</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4156" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4156" source="CVE"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128994" comment="flash-player-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128995" comment="flash-player-gnome-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128996" comment="flash-player-kde4-11.2.202.626-2.100.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4166</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4166" source="CVE"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier, as used in the Adobe Flash libraries in Microsoft Internet Explorer 10 and 11 and Microsoft Edge, has unknown impact and attack vectors, a different vulnerability than other CVEs listed in MS16-083.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128994" comment="flash-player-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128995" comment="flash-player-gnome-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128996" comment="flash-player-kde4-11.2.202.626-2.100.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4171</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4171" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4171" source="CVE"/>
    <description>
    Unspecified vulnerability in Adobe Flash Player 21.0.0.242 and earlier allows remote attackers to execute arbitrary code via unknown vectors, as exploited in the wild in June 2016.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128994" comment="flash-player-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128995" comment="flash-player-gnome-11.2.202.626-2.100.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128996" comment="flash-player-kde4-11.2.202.626-2.100.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4172</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4172" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4172" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4173</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4173" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4173" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4174, CVE-2016-4222, CVE-2016-4226, CVE-2016-4227, CVE-2016-4228, CVE-2016-4229, CVE-2016-4230, CVE-2016-4231, and CVE-2016-4248.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4174</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4174" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4173, CVE-2016-4222, CVE-2016-4226, CVE-2016-4227, CVE-2016-4228, CVE-2016-4229, CVE-2016-4230, CVE-2016-4231, and CVE-2016-4248.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4175</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4175" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4175" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4176</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4176" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4176" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4177.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4177</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4177" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4177" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4176.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4178</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4178" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4178" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4179</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4179" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4180</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4180" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4181</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4181" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4181" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4182</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4182" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133437" comment="flash-player-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133438" comment="flash-player-gnome-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133439" comment="flash-player-kde4-11.2.202.635-2.108.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4183</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4183" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4184</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4184" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4184" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4185</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4185" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4186</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4186" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4187</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4187" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4188</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4188" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4189</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4189" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4189" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4190</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4190" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4190" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4217</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4217" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4217" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4218</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4218" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4218" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4219</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4219" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4219" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4220</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4220" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4220" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4221</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4221" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4221" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4222</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4222" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4222" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4173, CVE-2016-4174, CVE-2016-4226, CVE-2016-4227, CVE-2016-4228, CVE-2016-4229, CVE-2016-4230, CVE-2016-4231, and CVE-2016-4248.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4223</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4223" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4223" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2016-4224 and CVE-2016-4225.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4224</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4224" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4224" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2016-4223 and CVE-2016-4225.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4225</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4225" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4225" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code by leveraging an unspecified "type confusion," a different vulnerability than CVE-2016-4223 and CVE-2016-4224.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4226</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4226" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4226" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4173, CVE-2016-4174, CVE-2016-4222, CVE-2016-4227, CVE-2016-4228, CVE-2016-4229, CVE-2016-4230, CVE-2016-4231, and CVE-2016-4248.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4227</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4227" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4227" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4173, CVE-2016-4174, CVE-2016-4222, CVE-2016-4226, CVE-2016-4228, CVE-2016-4229, CVE-2016-4230, CVE-2016-4231, and CVE-2016-4248.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4228</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4228" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4228" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4173, CVE-2016-4174, CVE-2016-4222, CVE-2016-4226, CVE-2016-4227, CVE-2016-4229, CVE-2016-4230, CVE-2016-4231, and CVE-2016-4248.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4229</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4229" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4229" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4173, CVE-2016-4174, CVE-2016-4222, CVE-2016-4226, CVE-2016-4227, CVE-2016-4228, CVE-2016-4230, CVE-2016-4231, and CVE-2016-4248.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4230</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4230" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4230" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4173, CVE-2016-4174, CVE-2016-4222, CVE-2016-4226, CVE-2016-4227, CVE-2016-4228, CVE-2016-4229, CVE-2016-4231, and CVE-2016-4248.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4231</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4231" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4231" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4173, CVE-2016-4174, CVE-2016-4222, CVE-2016-4226, CVE-2016-4227, CVE-2016-4228, CVE-2016-4229, CVE-2016-4230, and CVE-2016-4248.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4232</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4232" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4232" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to obtain sensitive information from process memory via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4233</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4233" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4233" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4234</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4234" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4234" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4235</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4235" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4235" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4236</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4236" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4236" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4237</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4237" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4237" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133437" comment="flash-player-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133438" comment="flash-player-gnome-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133439" comment="flash-player-kde4-11.2.202.635-2.108.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4238</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4238" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4238" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133437" comment="flash-player-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133438" comment="flash-player-gnome-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133439" comment="flash-player-kde4-11.2.202.635-2.108.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4239</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4239" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4239" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4240</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4240" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4240" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4241</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4241" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4241" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4242</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4242" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4243</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4243" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4243" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4244</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4244" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4244" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4245, and CVE-2016-4246.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4245</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4245" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4245" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, and CVE-2016-4246.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4246</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4246" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4246" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4241, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, and CVE-2016-4245.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4247</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4247" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4247" source="CVE"/>
    <description>
    Race condition in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to obtain sensitive information via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4248</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4248" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4248" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4173, CVE-2016-4174, CVE-2016-4222, CVE-2016-4226, CVE-2016-4227, CVE-2016-4228, CVE-2016-4229, CVE-2016-4230, and CVE-2016-4231.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4249</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4249" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4249" source="CVE"/>
    <description>
    Heap-based buffer overflow in Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130044" comment="flash-player-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130045" comment="flash-player-gnome-11.2.202.632-2.103.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130046" comment="flash-player-kde4-11.2.202.632-2.103.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4271</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4271" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4271" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors, a different vulnerability than CVE-2016-4277 and CVE-2016-4278, aka a "local-with-filesystem Flash sandbox bypass" issue.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133437" comment="flash-player-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133438" comment="flash-player-gnome-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133439" comment="flash-player-kde4-11.2.202.635-2.108.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4272</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4272" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4272" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133437" comment="flash-player-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133438" comment="flash-player-gnome-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133439" comment="flash-player-kde4-11.2.202.635-2.108.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4273</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4273" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4273" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows and OS X and before 11.2.202.637 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-6982, CVE-2016-6983, CVE-2016-6984, CVE-2016-6985, CVE-2016-6986, CVE-2016-6989, and CVE-2016-6990.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133736" comment="flash-player-11.2.202.637-2.112.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133737" comment="flash-player-gnome-11.2.202.637-2.112.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133738" comment="flash-player-kde4-11.2.202.637-2.112.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4274</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4274" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4274" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133437" comment="flash-player-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133438" comment="flash-player-gnome-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133439" comment="flash-player-kde4-11.2.202.635-2.108.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4275</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4275" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4275" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133437" comment="flash-player-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133438" comment="flash-player-gnome-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133439" comment="flash-player-kde4-11.2.202.635-2.108.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4276</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4276" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4276" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133437" comment="flash-player-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133438" comment="flash-player-gnome-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133439" comment="flash-player-kde4-11.2.202.635-2.108.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4277</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4277" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4277" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors, a different vulnerability than CVE-2016-4271 and CVE-2016-4278.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133437" comment="flash-player-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133438" comment="flash-player-gnome-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133439" comment="flash-player-kde4-11.2.202.635-2.108.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4278</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4278" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4278" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to bypass intended access restrictions and obtain sensitive information via unspecified vectors, a different vulnerability than CVE-2016-4271 and CVE-2016-4277.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133437" comment="flash-player-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133438" comment="flash-player-gnome-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133439" comment="flash-player-kde4-11.2.202.635-2.108.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164279" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4279</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4279" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4279" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133437" comment="flash-player-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133438" comment="flash-player-gnome-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133439" comment="flash-player-kde4-11.2.202.635-2.108.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164280" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4280</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4280" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4280" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133437" comment="flash-player-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133438" comment="flash-player-gnome-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133439" comment="flash-player-kde4-11.2.202.635-2.108.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4281</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4281" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4281" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133437" comment="flash-player-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133438" comment="flash-player-gnome-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133439" comment="flash-player-kde4-11.2.202.635-2.108.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4282</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4282" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4282" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133437" comment="flash-player-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133438" comment="flash-player-gnome-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133439" comment="flash-player-kde4-11.2.202.635-2.108.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4283</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4283" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4283" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4284, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133437" comment="flash-player-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133438" comment="flash-player-gnome-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133439" comment="flash-player-kde4-11.2.202.635-2.108.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4284</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4284" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4284" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4285, CVE-2016-6922, and CVE-2016-6924.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133437" comment="flash-player-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133438" comment="flash-player-gnome-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133439" comment="flash-player-kde4-11.2.202.635-2.108.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4285</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4285" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4285" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-6922, and CVE-2016-6924.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133437" comment="flash-player-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133438" comment="flash-player-gnome-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133439" comment="flash-player-kde4-11.2.202.635-2.108.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4286</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4286" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4286" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows and OS X and before 11.2.202.637 on Linux allows attackers to bypass intended access restrictions via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133736" comment="flash-player-11.2.202.637-2.112.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133737" comment="flash-player-gnome-11.2.202.637-2.112.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133738" comment="flash-player-kde4-11.2.202.637-2.112.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4287</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-4287" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4287" source="CVE"/>
    <description>
    Integer overflow in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133437" comment="flash-player-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133438" comment="flash-player-gnome-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133439" comment="flash-player-kde4-11.2.202.635-2.108.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4303</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4303" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4303" source="CVE"/>
    <description>
    The parse_string function in cjson.c in the cJSON library mishandles UTF8/16 strings, which allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a non-hex character in a JSON string, which triggers a heap-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134177" comment="iperf-3.0.12-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134178" comment="iperf-devel-3.0.12-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134179" comment="libiperf0-3.0.12-2.6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4342</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4342" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4342" source="CVE"/>
    <description>
    ext/phar/phar_object.c in PHP before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3 mishandles zero-length uncompressed data, which allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted (1) TAR, (2) ZIP, or (3) PHAR archive.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127859" comment="apache2-mod_php5-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127860" comment="php5-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127861" comment="php5-bcmath-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127862" comment="php5-bz2-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127863" comment="php5-calendar-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127864" comment="php5-ctype-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127865" comment="php5-curl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127866" comment="php5-dba-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127867" comment="php5-devel-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127868" comment="php5-dom-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127869" comment="php5-enchant-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127870" comment="php5-exif-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127871" comment="php5-fastcgi-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127872" comment="php5-fileinfo-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127873" comment="php5-firebird-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127874" comment="php5-fpm-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127875" comment="php5-ftp-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127876" comment="php5-gd-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127877" comment="php5-gettext-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127878" comment="php5-gmp-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127879" comment="php5-iconv-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127880" comment="php5-imap-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127881" comment="php5-intl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127882" comment="php5-json-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127883" comment="php5-ldap-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127884" comment="php5-mbstring-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127885" comment="php5-mcrypt-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127886" comment="php5-mssql-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127887" comment="php5-mysql-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127888" comment="php5-odbc-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127889" comment="php5-opcache-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127890" comment="php5-openssl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127891" comment="php5-pcntl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127892" comment="php5-pdo-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127893" comment="php5-pear-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127894" comment="php5-pgsql-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127895" comment="php5-phar-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127896" comment="php5-posix-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127897" comment="php5-pspell-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127898" comment="php5-readline-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127899" comment="php5-shmop-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127900" comment="php5-snmp-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127901" comment="php5-soap-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127902" comment="php5-sockets-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127903" comment="php5-sqlite-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127904" comment="php5-suhosin-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127905" comment="php5-sysvmsg-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127906" comment="php5-sysvsem-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127907" comment="php5-sysvshm-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127908" comment="php5-tidy-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127909" comment="php5-tokenizer-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127910" comment="php5-wddx-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127911" comment="php5-xmlreader-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127912" comment="php5-xmlrpc-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127913" comment="php5-xmlwriter-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127914" comment="php5-xsl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127915" comment="php5-zip-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127916" comment="php5-zlib-5.6.1-61.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4343</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4343" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4343" source="CVE"/>
    <description>
    The phar_make_dirstream function in ext/phar/dirstream.c in PHP before 5.6.18 and 7.x before 7.0.3 mishandles zero-size ././@LongLink files, which allows remote attackers to cause a denial of service (uninitialized pointer dereference) or possibly have unspecified other impact via a crafted TAR archive.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127859" comment="apache2-mod_php5-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127860" comment="php5-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127861" comment="php5-bcmath-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127862" comment="php5-bz2-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127863" comment="php5-calendar-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127864" comment="php5-ctype-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127865" comment="php5-curl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127866" comment="php5-dba-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127867" comment="php5-devel-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127868" comment="php5-dom-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127869" comment="php5-enchant-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127870" comment="php5-exif-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127871" comment="php5-fastcgi-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127872" comment="php5-fileinfo-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127873" comment="php5-firebird-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127874" comment="php5-fpm-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127875" comment="php5-ftp-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127876" comment="php5-gd-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127877" comment="php5-gettext-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127878" comment="php5-gmp-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127879" comment="php5-iconv-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127880" comment="php5-imap-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127881" comment="php5-intl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127882" comment="php5-json-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127883" comment="php5-ldap-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127884" comment="php5-mbstring-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127885" comment="php5-mcrypt-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127886" comment="php5-mssql-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127887" comment="php5-mysql-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127888" comment="php5-odbc-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127889" comment="php5-opcache-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127890" comment="php5-openssl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127891" comment="php5-pcntl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127892" comment="php5-pdo-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127893" comment="php5-pear-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127894" comment="php5-pgsql-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127895" comment="php5-phar-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127896" comment="php5-posix-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127897" comment="php5-pspell-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127898" comment="php5-readline-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127899" comment="php5-shmop-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127900" comment="php5-snmp-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127901" comment="php5-soap-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127902" comment="php5-sockets-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127903" comment="php5-sqlite-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127904" comment="php5-suhosin-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127905" comment="php5-sysvmsg-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127906" comment="php5-sysvsem-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127907" comment="php5-sysvshm-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127908" comment="php5-tidy-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127909" comment="php5-tokenizer-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127910" comment="php5-wddx-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127911" comment="php5-xmlreader-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127912" comment="php5-xmlrpc-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127913" comment="php5-xmlwriter-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127914" comment="php5-xsl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127915" comment="php5-zip-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127916" comment="php5-zlib-5.6.1-61.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4346</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4346" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4346" source="CVE"/>
    <description>
    Integer overflow in the str_pad function in ext/standard/string.c in PHP before 7.0.4 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a long string, leading to a heap-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127859" comment="apache2-mod_php5-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127860" comment="php5-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127861" comment="php5-bcmath-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127862" comment="php5-bz2-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127863" comment="php5-calendar-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127864" comment="php5-ctype-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127865" comment="php5-curl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127866" comment="php5-dba-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127867" comment="php5-devel-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127868" comment="php5-dom-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127869" comment="php5-enchant-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127870" comment="php5-exif-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127871" comment="php5-fastcgi-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127872" comment="php5-fileinfo-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127873" comment="php5-firebird-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127874" comment="php5-fpm-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127875" comment="php5-ftp-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127876" comment="php5-gd-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127877" comment="php5-gettext-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127878" comment="php5-gmp-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127879" comment="php5-iconv-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127880" comment="php5-imap-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127881" comment="php5-intl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127882" comment="php5-json-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127883" comment="php5-ldap-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127884" comment="php5-mbstring-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127885" comment="php5-mcrypt-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127886" comment="php5-mssql-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127887" comment="php5-mysql-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127888" comment="php5-odbc-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127889" comment="php5-opcache-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127890" comment="php5-openssl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127891" comment="php5-pcntl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127892" comment="php5-pdo-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127893" comment="php5-pear-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127894" comment="php5-pgsql-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127895" comment="php5-phar-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127896" comment="php5-posix-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127897" comment="php5-pspell-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127898" comment="php5-readline-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127899" comment="php5-shmop-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127900" comment="php5-snmp-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127901" comment="php5-soap-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127902" comment="php5-sockets-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127903" comment="php5-sqlite-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127904" comment="php5-suhosin-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127905" comment="php5-sysvmsg-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127906" comment="php5-sysvsem-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127907" comment="php5-sysvshm-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127908" comment="php5-tidy-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127909" comment="php5-tokenizer-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127910" comment="php5-wddx-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127911" comment="php5-xmlreader-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127912" comment="php5-xmlrpc-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127913" comment="php5-xmlwriter-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127914" comment="php5-xsl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127915" comment="php5-zip-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127916" comment="php5-zlib-5.6.1-61.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4348</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4348" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4348" source="CVE"/>
    <description>
    The _rsvg_css_normalize_font_size function in librsvg 2.40.2 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via circular definitions in an SVG document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127843" comment="gdk-pixbuf-loader-rsvg-2.40.15-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127844" comment="gdk-pixbuf-loader-rsvg-32bit-2.40.15-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127845" comment="librsvg-2.40.15-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127846" comment="librsvg-2-2-2.40.15-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127847" comment="librsvg-2-2-32bit-2.40.15-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127848" comment="librsvg-devel-2.40.15-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127849" comment="rsvg-view-2.40.15-10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127850" comment="typelib-1_0-Rsvg-2_0-2.40.15-10.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4414</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4414" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4414" source="CVE"/>
    <description>
    The onReadyRead function in core/coreauthhandler.cpp in Quassel before 0.12.4 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via invalid handshake data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127700" comment="quassel-0.10.0-3.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127701" comment="quassel-base-0.10.0-3.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127702" comment="quassel-client-0.10.0-3.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127703" comment="quassel-core-0.10.0-3.16.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127704" comment="quassel-mono-0.10.0-3.16.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4429</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4429" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4429" source="CVE"/>
    <description>
    Stack-based buffer overflow in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) allows remote servers to cause a denial of service (crash) or possibly unspecified other impact via a flood of crafted ICMP and UDP packets.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128518" comment="glibc-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128519" comment="glibc-32bit-2.19-16.25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128520" comment="glibc-devel-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128521" comment="glibc-devel-32bit-2.19-16.25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128522" comment="glibc-devel-static-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128523" comment="glibc-devel-static-32bit-2.19-16.25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128524" comment="glibc-extra-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128525" comment="glibc-html-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128526" comment="glibc-i18ndata-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128527" comment="glibc-info-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128528" comment="glibc-locale-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128529" comment="glibc-locale-32bit-2.19-16.25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128530" comment="glibc-obsolete-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128531" comment="glibc-profile-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128532" comment="glibc-profile-32bit-2.19-16.25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128533" comment="glibc-testsuite-2.19-16.25.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128534" comment="glibc-utils-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128535" comment="glibc-utils-32bit-2.19-16.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128536" comment="nscd-2.19-16.25.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4439</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4439" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4439" source="CVE"/>
    <description>
    The esp_reg_write function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check command buffer length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or potentially execute arbitrary code on the QEMU host via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133720" comment="xen-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133721" comment="xen-devel-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133722" comment="xen-doc-html-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133723" comment="xen-kmp-default-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133724" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133725" comment="xen-libs-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133726" comment="xen-libs-32bit-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133727" comment="xen-tools-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133728" comment="xen-tools-domU-4.4.4_05-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4441</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4441" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4441" source="CVE"/>
    <description>
    The get_cmd function in hw/scsi/esp.c in the 53C9X Fast SCSI Controller (FSC) support in QEMU does not properly check DMA length, which allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via unspecified vectors, involving an SCSI command.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133720" comment="xen-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133721" comment="xen-devel-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133722" comment="xen-doc-html-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133723" comment="xen-kmp-default-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133724" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133725" comment="xen-libs-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133726" comment="xen-libs-32bit-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133727" comment="xen-tools-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133728" comment="xen-tools-domU-4.4.4_05-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4453</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4453" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4453" source="CVE"/>
    <description>
    The vmsvga_fifo_run function in hw/display/vmware_vga.c in QEMU allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a VGA command.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133720" comment="xen-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133721" comment="xen-devel-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133722" comment="xen-doc-html-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133723" comment="xen-kmp-default-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133724" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133725" comment="xen-libs-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133726" comment="xen-libs-32bit-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133727" comment="xen-tools-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133728" comment="xen-tools-domU-4.4.4_05-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4454</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4454" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4454" source="CVE"/>
    <description>
    The vmsvga_fifo_read_raw function in hw/display/vmware_vga.c in QEMU allows local guest OS administrators to obtain sensitive host memory information or cause a denial of service (QEMU process crash) by changing FIFO registers and issuing a VGA command, which triggers an out-of-bounds read.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133720" comment="xen-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133721" comment="xen-devel-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133722" comment="xen-doc-html-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133723" comment="xen-kmp-default-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133724" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133725" comment="xen-libs-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133726" comment="xen-libs-32bit-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133727" comment="xen-tools-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133728" comment="xen-tools-domU-4.4.4_05-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4463</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4463" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4463" source="CVE"/>
    <description>
    Stack-based buffer overflow in Apache Xerces-C++ before 3.1.4 allows context-dependent attackers to cause a denial of service via a deeply nested DTD.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130414" comment="libxerces-c-3_1-3.1.4-13.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130415" comment="libxerces-c-3_1-32bit-3.1.4-13.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130416" comment="libxerces-c-devel-3.1.4-13.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130417" comment="xerces-c-3.1.4-13.9.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130418" comment="xerces-c-doc-3.1.4-13.9.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4470</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4470" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4470" source="CVE"/>
    <description>
    The key_reject_and_link function in security/keys/key.c in the Linux kernel through 4.6.3 does not ensure that a certain data structure is initialized, which allows local users to cause a denial of service (system crash) via vectors involving a crafted keyctl request2 command.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4478</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4478" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4478" source="CVE"/>
    <description>
    Buffer overflow in the xmlrpc_char_encode function in modules/transport/xmlrpc/xmlrpclib.c in Atheme before 7.2.7 allows remote attackers to cause a denial of service via vectors related to XMLRPC response encoding.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127695" comment="atheme-7.2.6-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127696" comment="atheme-devel-7.2.6-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127697" comment="libathemecore1-7.2.6-2.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4480</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4480" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4480" source="CVE"/>
    <description>
    The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen 4.6.x and earlier does not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might allow local guest OS users to gain privileges via a crafted mapping of memory.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133720" comment="xen-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133721" comment="xen-devel-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133722" comment="xen-doc-html-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133723" comment="xen-kmp-default-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133724" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133725" comment="xen-libs-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133726" comment="xen-libs-32bit-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133727" comment="xen-tools-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133728" comment="xen-tools-domU-4.4.4_05-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4482</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4482" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4482" source="CVE"/>
    <description>
    The proc_connectinfo function in drivers/usb/core/devio.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted USBDEVFS_CONNECTINFO ioctl call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4483</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4483" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128921" comment="libxml2-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128922" comment="libxml2-2-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128923" comment="libxml2-2-32bit-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128924" comment="libxml2-devel-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128925" comment="libxml2-devel-32bit-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128926" comment="libxml2-doc-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128927" comment="libxml2-tools-2.9.4-7.17.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128928" comment="python-libxml2-2.9.4-7.17.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4485</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4485" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4485" source="CVE"/>
    <description>
    The llc_cmsg_rcv function in net/llc/af_llc.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory by reading a message.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4486</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4486" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4486" source="CVE"/>
    <description>
    The rtnl_fill_link_ifmap function in net/core/rtnetlink.c in the Linux kernel before 4.5.5 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading a Netlink message.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4537</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4537" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4537" source="CVE"/>
    <description>
    The bcpowmod function in ext/bcmath/bcmath.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 accepts a negative integer for the scale argument, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127859" comment="apache2-mod_php5-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127860" comment="php5-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127861" comment="php5-bcmath-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127862" comment="php5-bz2-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127863" comment="php5-calendar-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127864" comment="php5-ctype-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127865" comment="php5-curl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127866" comment="php5-dba-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127867" comment="php5-devel-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127868" comment="php5-dom-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127869" comment="php5-enchant-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127870" comment="php5-exif-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127871" comment="php5-fastcgi-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127872" comment="php5-fileinfo-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127873" comment="php5-firebird-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127874" comment="php5-fpm-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127875" comment="php5-ftp-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127876" comment="php5-gd-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127877" comment="php5-gettext-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127878" comment="php5-gmp-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127879" comment="php5-iconv-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127880" comment="php5-imap-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127881" comment="php5-intl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127882" comment="php5-json-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127883" comment="php5-ldap-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127884" comment="php5-mbstring-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127885" comment="php5-mcrypt-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127886" comment="php5-mssql-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127887" comment="php5-mysql-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127888" comment="php5-odbc-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127889" comment="php5-opcache-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127890" comment="php5-openssl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127891" comment="php5-pcntl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127892" comment="php5-pdo-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127893" comment="php5-pear-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127894" comment="php5-pgsql-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127895" comment="php5-phar-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127896" comment="php5-posix-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127897" comment="php5-pspell-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127898" comment="php5-readline-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127899" comment="php5-shmop-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127900" comment="php5-snmp-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127901" comment="php5-soap-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127902" comment="php5-sockets-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127903" comment="php5-sqlite-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127904" comment="php5-suhosin-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127905" comment="php5-sysvmsg-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127906" comment="php5-sysvsem-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127907" comment="php5-sysvshm-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127908" comment="php5-tidy-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127909" comment="php5-tokenizer-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127910" comment="php5-wddx-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127911" comment="php5-xmlreader-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127912" comment="php5-xmlrpc-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127913" comment="php5-xmlwriter-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127914" comment="php5-xsl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127915" comment="php5-zip-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127916" comment="php5-zlib-5.6.1-61.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4538</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4538" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4538" source="CVE"/>
    <description>
    The bcpowmod function in ext/bcmath/bcmath.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 modifies certain data structures without considering whether they are copies of the _zero_, _one_, or _two_ global variable, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127859" comment="apache2-mod_php5-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127860" comment="php5-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127861" comment="php5-bcmath-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127862" comment="php5-bz2-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127863" comment="php5-calendar-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127864" comment="php5-ctype-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127865" comment="php5-curl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127866" comment="php5-dba-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127867" comment="php5-devel-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127868" comment="php5-dom-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127869" comment="php5-enchant-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127870" comment="php5-exif-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127871" comment="php5-fastcgi-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127872" comment="php5-fileinfo-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127873" comment="php5-firebird-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127874" comment="php5-fpm-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127875" comment="php5-ftp-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127876" comment="php5-gd-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127877" comment="php5-gettext-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127878" comment="php5-gmp-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127879" comment="php5-iconv-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127880" comment="php5-imap-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127881" comment="php5-intl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127882" comment="php5-json-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127883" comment="php5-ldap-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127884" comment="php5-mbstring-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127885" comment="php5-mcrypt-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127886" comment="php5-mssql-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127887" comment="php5-mysql-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127888" comment="php5-odbc-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127889" comment="php5-opcache-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127890" comment="php5-openssl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127891" comment="php5-pcntl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127892" comment="php5-pdo-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127893" comment="php5-pear-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127894" comment="php5-pgsql-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127895" comment="php5-phar-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127896" comment="php5-posix-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127897" comment="php5-pspell-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127898" comment="php5-readline-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127899" comment="php5-shmop-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127900" comment="php5-snmp-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127901" comment="php5-soap-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127902" comment="php5-sockets-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127903" comment="php5-sqlite-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127904" comment="php5-suhosin-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127905" comment="php5-sysvmsg-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127906" comment="php5-sysvsem-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127907" comment="php5-sysvshm-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127908" comment="php5-tidy-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127909" comment="php5-tokenizer-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127910" comment="php5-wddx-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127911" comment="php5-xmlreader-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127912" comment="php5-xmlrpc-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127913" comment="php5-xmlwriter-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127914" comment="php5-xsl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127915" comment="php5-zip-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127916" comment="php5-zlib-5.6.1-61.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4539</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4539" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4539" source="CVE"/>
    <description>
    The xml_parse_into_struct function in ext/xml/xml.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 allows remote attackers to cause a denial of service (buffer under-read and segmentation fault) or possibly have unspecified other impact via crafted XML data in the second argument, leading to a parser level of zero.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127859" comment="apache2-mod_php5-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127860" comment="php5-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127861" comment="php5-bcmath-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127862" comment="php5-bz2-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127863" comment="php5-calendar-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127864" comment="php5-ctype-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127865" comment="php5-curl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127866" comment="php5-dba-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127867" comment="php5-devel-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127868" comment="php5-dom-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127869" comment="php5-enchant-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127870" comment="php5-exif-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127871" comment="php5-fastcgi-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127872" comment="php5-fileinfo-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127873" comment="php5-firebird-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127874" comment="php5-fpm-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127875" comment="php5-ftp-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127876" comment="php5-gd-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127877" comment="php5-gettext-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127878" comment="php5-gmp-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127879" comment="php5-iconv-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127880" comment="php5-imap-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127881" comment="php5-intl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127882" comment="php5-json-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127883" comment="php5-ldap-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127884" comment="php5-mbstring-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127885" comment="php5-mcrypt-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127886" comment="php5-mssql-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127887" comment="php5-mysql-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127888" comment="php5-odbc-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127889" comment="php5-opcache-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127890" comment="php5-openssl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127891" comment="php5-pcntl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127892" comment="php5-pdo-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127893" comment="php5-pear-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127894" comment="php5-pgsql-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127895" comment="php5-phar-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127896" comment="php5-posix-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127897" comment="php5-pspell-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127898" comment="php5-readline-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127899" comment="php5-shmop-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127900" comment="php5-snmp-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127901" comment="php5-soap-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127902" comment="php5-sockets-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127903" comment="php5-sqlite-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127904" comment="php5-suhosin-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127905" comment="php5-sysvmsg-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127906" comment="php5-sysvsem-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127907" comment="php5-sysvshm-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127908" comment="php5-tidy-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127909" comment="php5-tokenizer-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127910" comment="php5-wddx-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127911" comment="php5-xmlreader-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127912" comment="php5-xmlrpc-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127913" comment="php5-xmlwriter-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127914" comment="php5-xsl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127915" comment="php5-zip-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127916" comment="php5-zlib-5.6.1-61.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4540</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4540" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4540" source="CVE"/>
    <description>
    The grapheme_stripos function in ext/intl/grapheme/grapheme_string.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a negative offset.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127859" comment="apache2-mod_php5-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127860" comment="php5-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127861" comment="php5-bcmath-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127862" comment="php5-bz2-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127863" comment="php5-calendar-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127864" comment="php5-ctype-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127865" comment="php5-curl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127866" comment="php5-dba-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127867" comment="php5-devel-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127868" comment="php5-dom-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127869" comment="php5-enchant-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127870" comment="php5-exif-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127871" comment="php5-fastcgi-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127872" comment="php5-fileinfo-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127873" comment="php5-firebird-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127874" comment="php5-fpm-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127875" comment="php5-ftp-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127876" comment="php5-gd-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127877" comment="php5-gettext-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127878" comment="php5-gmp-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127879" comment="php5-iconv-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127880" comment="php5-imap-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127881" comment="php5-intl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127882" comment="php5-json-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127883" comment="php5-ldap-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127884" comment="php5-mbstring-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127885" comment="php5-mcrypt-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127886" comment="php5-mssql-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127887" comment="php5-mysql-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127888" comment="php5-odbc-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127889" comment="php5-opcache-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127890" comment="php5-openssl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127891" comment="php5-pcntl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127892" comment="php5-pdo-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127893" comment="php5-pear-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127894" comment="php5-pgsql-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127895" comment="php5-phar-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127896" comment="php5-posix-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127897" comment="php5-pspell-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127898" comment="php5-readline-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127899" comment="php5-shmop-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127900" comment="php5-snmp-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127901" comment="php5-soap-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127902" comment="php5-sockets-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127903" comment="php5-sqlite-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127904" comment="php5-suhosin-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127905" comment="php5-sysvmsg-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127906" comment="php5-sysvsem-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127907" comment="php5-sysvshm-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127908" comment="php5-tidy-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127909" comment="php5-tokenizer-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127910" comment="php5-wddx-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127911" comment="php5-xmlreader-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127912" comment="php5-xmlrpc-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127913" comment="php5-xmlwriter-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127914" comment="php5-xsl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127915" comment="php5-zip-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127916" comment="php5-zlib-5.6.1-61.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4541</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4541" source="CVE"/>
    <description>
    The grapheme_strpos function in ext/intl/grapheme/grapheme_string.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a negative offset.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127859" comment="apache2-mod_php5-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127860" comment="php5-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127861" comment="php5-bcmath-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127862" comment="php5-bz2-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127863" comment="php5-calendar-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127864" comment="php5-ctype-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127865" comment="php5-curl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127866" comment="php5-dba-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127867" comment="php5-devel-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127868" comment="php5-dom-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127869" comment="php5-enchant-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127870" comment="php5-exif-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127871" comment="php5-fastcgi-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127872" comment="php5-fileinfo-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127873" comment="php5-firebird-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127874" comment="php5-fpm-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127875" comment="php5-ftp-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127876" comment="php5-gd-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127877" comment="php5-gettext-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127878" comment="php5-gmp-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127879" comment="php5-iconv-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127880" comment="php5-imap-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127881" comment="php5-intl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127882" comment="php5-json-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127883" comment="php5-ldap-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127884" comment="php5-mbstring-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127885" comment="php5-mcrypt-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127886" comment="php5-mssql-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127887" comment="php5-mysql-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127888" comment="php5-odbc-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127889" comment="php5-opcache-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127890" comment="php5-openssl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127891" comment="php5-pcntl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127892" comment="php5-pdo-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127893" comment="php5-pear-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127894" comment="php5-pgsql-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127895" comment="php5-phar-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127896" comment="php5-posix-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127897" comment="php5-pspell-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127898" comment="php5-readline-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127899" comment="php5-shmop-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127900" comment="php5-snmp-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127901" comment="php5-soap-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127902" comment="php5-sockets-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127903" comment="php5-sqlite-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127904" comment="php5-suhosin-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127905" comment="php5-sysvmsg-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127906" comment="php5-sysvsem-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127907" comment="php5-sysvshm-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127908" comment="php5-tidy-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127909" comment="php5-tokenizer-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127910" comment="php5-wddx-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127911" comment="php5-xmlreader-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127912" comment="php5-xmlrpc-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127913" comment="php5-xmlwriter-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127914" comment="php5-xsl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127915" comment="php5-zip-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127916" comment="php5-zlib-5.6.1-61.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4542</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4542" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4542" source="CVE"/>
    <description>
    The exif_process_IFD_TAG function in ext/exif/exif.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 does not properly construct spprintf arguments, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted header data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127859" comment="apache2-mod_php5-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127860" comment="php5-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127861" comment="php5-bcmath-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127862" comment="php5-bz2-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127863" comment="php5-calendar-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127864" comment="php5-ctype-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127865" comment="php5-curl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127866" comment="php5-dba-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127867" comment="php5-devel-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127868" comment="php5-dom-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127869" comment="php5-enchant-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127870" comment="php5-exif-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127871" comment="php5-fastcgi-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127872" comment="php5-fileinfo-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127873" comment="php5-firebird-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127874" comment="php5-fpm-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127875" comment="php5-ftp-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127876" comment="php5-gd-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127877" comment="php5-gettext-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127878" comment="php5-gmp-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127879" comment="php5-iconv-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127880" comment="php5-imap-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127881" comment="php5-intl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127882" comment="php5-json-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127883" comment="php5-ldap-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127884" comment="php5-mbstring-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127885" comment="php5-mcrypt-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127886" comment="php5-mssql-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127887" comment="php5-mysql-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127888" comment="php5-odbc-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127889" comment="php5-opcache-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127890" comment="php5-openssl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127891" comment="php5-pcntl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127892" comment="php5-pdo-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127893" comment="php5-pear-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127894" comment="php5-pgsql-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127895" comment="php5-phar-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127896" comment="php5-posix-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127897" comment="php5-pspell-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127898" comment="php5-readline-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127899" comment="php5-shmop-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127900" comment="php5-snmp-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127901" comment="php5-soap-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127902" comment="php5-sockets-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127903" comment="php5-sqlite-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127904" comment="php5-suhosin-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127905" comment="php5-sysvmsg-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127906" comment="php5-sysvsem-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127907" comment="php5-sysvshm-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127908" comment="php5-tidy-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127909" comment="php5-tokenizer-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127910" comment="php5-wddx-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127911" comment="php5-xmlreader-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127912" comment="php5-xmlrpc-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127913" comment="php5-xmlwriter-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127914" comment="php5-xsl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127915" comment="php5-zip-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127916" comment="php5-zlib-5.6.1-61.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4543</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4543" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4543" source="CVE"/>
    <description>
    The exif_process_IFD_in_JPEG function in ext/exif/exif.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 does not validate IFD sizes, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted header data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127859" comment="apache2-mod_php5-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127860" comment="php5-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127861" comment="php5-bcmath-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127862" comment="php5-bz2-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127863" comment="php5-calendar-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127864" comment="php5-ctype-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127865" comment="php5-curl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127866" comment="php5-dba-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127867" comment="php5-devel-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127868" comment="php5-dom-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127869" comment="php5-enchant-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127870" comment="php5-exif-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127871" comment="php5-fastcgi-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127872" comment="php5-fileinfo-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127873" comment="php5-firebird-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127874" comment="php5-fpm-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127875" comment="php5-ftp-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127876" comment="php5-gd-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127877" comment="php5-gettext-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127878" comment="php5-gmp-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127879" comment="php5-iconv-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127880" comment="php5-imap-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127881" comment="php5-intl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127882" comment="php5-json-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127883" comment="php5-ldap-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127884" comment="php5-mbstring-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127885" comment="php5-mcrypt-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127886" comment="php5-mssql-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127887" comment="php5-mysql-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127888" comment="php5-odbc-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127889" comment="php5-opcache-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127890" comment="php5-openssl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127891" comment="php5-pcntl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127892" comment="php5-pdo-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127893" comment="php5-pear-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127894" comment="php5-pgsql-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127895" comment="php5-phar-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127896" comment="php5-posix-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127897" comment="php5-pspell-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127898" comment="php5-readline-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127899" comment="php5-shmop-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127900" comment="php5-snmp-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127901" comment="php5-soap-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127902" comment="php5-sockets-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127903" comment="php5-sqlite-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127904" comment="php5-suhosin-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127905" comment="php5-sysvmsg-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127906" comment="php5-sysvsem-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127907" comment="php5-sysvshm-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127908" comment="php5-tidy-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127909" comment="php5-tokenizer-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127910" comment="php5-wddx-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127911" comment="php5-xmlreader-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127912" comment="php5-xmlrpc-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127913" comment="php5-xmlwriter-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127914" comment="php5-xsl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127915" comment="php5-zip-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127916" comment="php5-zlib-5.6.1-61.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4544</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4544" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4544" source="CVE"/>
    <description>
    The exif_process_TIFF_in_JPEG function in ext/exif/exif.c in PHP before 5.5.35, 5.6.x before 5.6.21, and 7.x before 7.0.6 does not validate TIFF start data, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted header data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127859" comment="apache2-mod_php5-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127860" comment="php5-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127861" comment="php5-bcmath-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127862" comment="php5-bz2-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127863" comment="php5-calendar-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127864" comment="php5-ctype-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127865" comment="php5-curl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127866" comment="php5-dba-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127867" comment="php5-devel-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127868" comment="php5-dom-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127869" comment="php5-enchant-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127870" comment="php5-exif-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127871" comment="php5-fastcgi-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127872" comment="php5-fileinfo-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127873" comment="php5-firebird-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127874" comment="php5-fpm-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127875" comment="php5-ftp-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127876" comment="php5-gd-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127877" comment="php5-gettext-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127878" comment="php5-gmp-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127879" comment="php5-iconv-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127880" comment="php5-imap-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127881" comment="php5-intl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127882" comment="php5-json-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127883" comment="php5-ldap-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127884" comment="php5-mbstring-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127885" comment="php5-mcrypt-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127886" comment="php5-mssql-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127887" comment="php5-mysql-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127888" comment="php5-odbc-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127889" comment="php5-opcache-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127890" comment="php5-openssl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127891" comment="php5-pcntl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127892" comment="php5-pdo-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127893" comment="php5-pear-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127894" comment="php5-pgsql-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127895" comment="php5-phar-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127896" comment="php5-posix-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127897" comment="php5-pspell-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127898" comment="php5-readline-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127899" comment="php5-shmop-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127900" comment="php5-snmp-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127901" comment="php5-soap-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127902" comment="php5-sockets-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127903" comment="php5-sqlite-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127904" comment="php5-suhosin-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127905" comment="php5-sysvmsg-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127906" comment="php5-sysvsem-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127907" comment="php5-sysvshm-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127908" comment="php5-tidy-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127909" comment="php5-tokenizer-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127910" comment="php5-wddx-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127911" comment="php5-xmlreader-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127912" comment="php5-xmlrpc-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127913" comment="php5-xmlwriter-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127914" comment="php5-xsl-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127915" comment="php5-zip-5.6.1-61.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127916" comment="php5-zlib-5.6.1-61.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4562</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4562" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4562" source="CVE"/>
    <description>
    The DrawDashPolygon function in MagickCore/draw.c in ImageMagick before 6.9.4-0 and 7.x before 7.0.1-2 mishandles calculations of certain vertices integer data, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4563</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4563" source="CVE"/>
    <description>
    The TraceStrokePolygon function in MagickCore/draw.c in ImageMagick before 6.9.4-0 and 7.x before 7.0.1-2 mishandles the relationship between the BezierQuantum value and certain strokes data, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4564</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4564" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4564" source="CVE"/>
    <description>
    The DrawImage function in MagickCore/draw.c in ImageMagick before 6.9.4-0 and 7.x before 7.0.1-2 makes an incorrect function call in attempting to locate the next token, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4565</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4565" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4565" source="CVE"/>
    <description>
    The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4569</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4569" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4569" source="CVE"/>
    <description>
    The snd_timer_user_params function in sound/core/timer.c in the Linux kernel through 4.6 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4574</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4574" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4574" source="CVE"/>
    <description>
    Off-by-one error in the append_utf8_value function in the DN decoder (dn.c) in Libksba before 1.3.4 allows remote attackers to cause a denial of service (out-of-bounds read) via invalid utf-8 encoded data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-4356.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009127951" comment="libksba-1.3.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127952" comment="libksba-devel-1.3.1-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009127953" comment="libksba8-1.3.1-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4578</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4578" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4578" source="CVE"/>
    <description>
    sound/core/timer.c in the Linux kernel through 4.6 does not initialize certain r1 data structures, which allows local users to obtain sensitive information from kernel stack memory via crafted use of the ALSA timer interface, related to the (1) snd_timer_user_ccallback and (2) snd_timer_user_tinterrupt functions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4580</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4580" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4580" source="CVE"/>
    <description>
    The x25_negotiate_facilities function in net/x25/x25_facilities.c in the Linux kernel before 4.5.5 does not properly initialize a certain data structure, which allows attackers to obtain sensitive information from kernel stack memory via an X.25 Call Request.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4581</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4581" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4581" source="CVE"/>
    <description>
    fs/pnode.c in the Linux kernel before 4.5.4 does not properly traverse a mount propagation tree in a certain case involving a slave mount, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a crafted series of mount system calls.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4658</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4658" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4658" source="CVE"/>
    <description>
    libxml2 in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135291" comment="libxml2-2.9.4-7.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135292" comment="libxml2-2-2.9.4-7.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135293" comment="libxml2-2-32bit-2.9.4-7.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135294" comment="libxml2-devel-2.9.4-7.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135295" comment="libxml2-devel-32bit-2.9.4-7.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135296" comment="libxml2-doc-2.9.4-7.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135297" comment="libxml2-tools-2.9.4-7.20.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135298" comment="python-libxml2-2.9.4-7.20.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4804</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4804" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4804" source="CVE"/>
    <description>
    The read_boot function in boot.c in dosfstools before 4.0 allows attackers to cause a denial of service (crash) via a crafted filesystem, which triggers a heap-based buffer overflow in the (1) read_fat function or an out-of-bounds heap read in (2) get_fat function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128378" comment="dosfstools-3.0.26-3.8.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4805</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4805" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4805" source="CVE"/>
    <description>
    Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel before 4.5.2 allows local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4809</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4809" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4809" source="CVE"/>
    <description>
    The archive_read_format_cpio_read_header function in archive_read_support_format_cpio.c in libarchive before 3.2.1 allows remote attackers to cause a denial of service (application crash) via a CPIO archive with a large symlink.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129256" comment="bsdtar-3.1.2-7.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129257" comment="libarchive-3.1.2-7.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129258" comment="libarchive-devel-3.1.2-7.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129259" comment="libarchive13-3.1.2-7.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129260" comment="libarchive13-32bit-3.1.2-7.11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4913</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4913" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4913" source="CVE"/>
    <description>
    The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel before 4.5.5 mishandles NM (aka alternate name) entries containing \0 characters, which allows local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4952</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4952" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4952" source="CVE"/>
    <description>
    QEMU (aka Quick Emulator), when built with VMWARE PVSCSI paravirtual SCSI bus emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds array access) via vectors related to the (1) PVSCSI_CMD_SETUP_RINGS or (2) PVSCSI_CMD_SETUP_MSG_RING SCSI command.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133720" comment="xen-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133721" comment="xen-devel-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133722" comment="xen-doc-html-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133723" comment="xen-kmp-default-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133724" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133725" comment="xen-libs-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133726" comment="xen-libs-32bit-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133727" comment="xen-tools-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133728" comment="xen-tools-domU-4.4.4_05-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4953</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4953" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4953" source="CVE"/>
    <description>
    ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (ephemeral-association demobilization) by sending a spoofed crypto-NAK packet with incorrect authentication data at a certain time.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128886" comment="ntp-4.2.8p8-25.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128887" comment="ntp-doc-4.2.8p8-25.18.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4954</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4954" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4954" source="CVE"/>
    <description>
    The process_packet function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (peer-variable modification) by sending spoofed packets from many source IP addresses in a certain scenario, as demonstrated by triggering an incorrect leap indication.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128886" comment="ntp-4.2.8p8-25.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128887" comment="ntp-doc-4.2.8p8-25.18.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4955</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4955" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4955" source="CVE"/>
    <description>
    ntpd in NTP 4.x before 4.2.8p8, when autokey is enabled, allows remote attackers to cause a denial of service (peer-variable clearing and association outage) by sending (1) a spoofed crypto-NAK packet or (2) a packet with an incorrect MAC value at a certain time.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128886" comment="ntp-4.2.8p8-25.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128887" comment="ntp-doc-4.2.8p8-25.18.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4956</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4956" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4956" source="CVE"/>
    <description>
    ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (interleaved-mode transition and time change) via a spoofed broadcast packet.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-1548.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128886" comment="ntp-4.2.8p8-25.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128887" comment="ntp-doc-4.2.8p8-25.18.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4957</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4957" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4957" source="CVE"/>
    <description>
    ntpd in NTP before 4.2.8p8 allows remote attackers to cause a denial of service (daemon crash) via a crypto-NAK packet.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-1547.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128886" comment="ntp-4.2.8p8-25.18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128887" comment="ntp-doc-4.2.8p8-25.18.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4962</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4962" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4962" source="CVE"/>
    <description>
    The libxl device-handling in Xen 4.6.x and earlier allows local OS guest administrators to cause a denial of service (resource consumption or management facility confusion) or gain host OS privileges by manipulating information in guest controlled areas of xenstore.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133720" comment="xen-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133721" comment="xen-devel-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133722" comment="xen-doc-html-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133723" comment="xen-kmp-default-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133724" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133725" comment="xen-libs-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133726" comment="xen-libs-32bit-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133727" comment="xen-tools-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133728" comment="xen-tools-domU-4.4.4_05-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4963</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4963" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4963" source="CVE"/>
    <description>
    The libxl device-handling in Xen through 4.6.x allows local guest OS users with access to the driver domain to cause a denial of service (management tool confusion) by manipulating information in the backend directories in xenstore.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133720" comment="xen-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133721" comment="xen-devel-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133722" comment="xen-doc-html-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133723" comment="xen-kmp-default-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133724" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133725" comment="xen-libs-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133726" comment="xen-libs-32bit-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133727" comment="xen-tools-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133728" comment="xen-tools-domU-4.4.4_05-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4971</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4971" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4971" source="CVE"/>
    <description>
    GNU wget before 1.18 allows remote servers to write to arbitrary files by redirecting a request from HTTP to a crafted FTP resource.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134011" comment="wget-1.16-4.7.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4983</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4983" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4983" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135913" comment="dovecot22-2.2.13-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135914" comment="dovecot22-backend-mysql-2.2.13-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135915" comment="dovecot22-backend-pgsql-2.2.13-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135916" comment="dovecot22-backend-sqlite-2.2.13-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135917" comment="dovecot22-devel-2.2.13-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135918" comment="dovecot22-fts-lucene-2.2.13-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135919" comment="dovecot22-fts-solr-2.2.13-3.7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4994</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4994" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4994" source="CVE"/>
    <description>
    Use-after-free vulnerability in the xcf_load_image function in app/xcf/xcf-load.c in GIMP allows remote attackers to cause a denial of service (program crash) or possibly execute arbitrary code via a crafted XCF file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129682" comment="gimp-2.8.16-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129683" comment="gimp-devel-2.8.16-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129684" comment="gimp-help-browser-2.8.16-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129685" comment="gimp-lang-2.8.16-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129686" comment="gimp-plugin-aa-2.8.16-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129687" comment="gimp-plugins-python-2.8.16-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129688" comment="libgimp-2_0-0-2.8.16-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129689" comment="libgimp-2_0-0-32bit-2.8.16-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129690" comment="libgimpui-2_0-0-2.8.16-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129691" comment="libgimpui-2_0-0-32bit-2.8.16-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4997</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-4997" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4997" source="CVE"/>
    <description>
    The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5008</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5008" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5008" source="CVE"/>
    <description>
    libvirt before 2.0.0 improperly disables password checking when the password on a VNC server is set to an empty string, which allows remote attackers to bypass authentication and establish a VNC session by connecting to the server.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130386" comment="libvirt-1.2.9-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130387" comment="libvirt-client-1.2.9-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130388" comment="libvirt-client-32bit-1.2.9-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130389" comment="libvirt-daemon-1.2.9-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130390" comment="libvirt-daemon-config-network-1.2.9-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130391" comment="libvirt-daemon-config-nwfilter-1.2.9-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130392" comment="libvirt-daemon-driver-interface-1.2.9-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130393" comment="libvirt-daemon-driver-libxl-1.2.9-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130394" comment="libvirt-daemon-driver-lxc-1.2.9-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130395" comment="libvirt-daemon-driver-network-1.2.9-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130396" comment="libvirt-daemon-driver-nodedev-1.2.9-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130397" comment="libvirt-daemon-driver-nwfilter-1.2.9-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130398" comment="libvirt-daemon-driver-qemu-1.2.9-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130399" comment="libvirt-daemon-driver-secret-1.2.9-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130400" comment="libvirt-daemon-driver-storage-1.2.9-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130401" comment="libvirt-daemon-driver-uml-1.2.9-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130402" comment="libvirt-daemon-driver-vbox-1.2.9-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130403" comment="libvirt-daemon-driver-xen-1.2.9-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130404" comment="libvirt-daemon-lxc-1.2.9-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130405" comment="libvirt-daemon-qemu-1.2.9-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130406" comment="libvirt-daemon-uml-1.2.9-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130407" comment="libvirt-daemon-vbox-1.2.9-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130408" comment="libvirt-daemon-xen-1.2.9-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130409" comment="libvirt-devel-1.2.9-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130410" comment="libvirt-devel-32bit-1.2.9-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130411" comment="libvirt-doc-1.2.9-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130412" comment="libvirt-lock-sanlock-1.2.9-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130413" comment="libvirt-login-shell-1.2.9-31.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5010</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5010" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5010" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134024" comment="ImageMagick-6.8.9.8-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134025" comment="ImageMagick-devel-6.8.9.8-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134026" comment="ImageMagick-devel-32bit-6.8.9.8-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134027" comment="ImageMagick-doc-6.8.9.8-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134028" comment="ImageMagick-extra-6.8.9.8-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134029" comment="libMagick++-6_Q16-5-6.8.9.8-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134030" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134031" comment="libMagick++-devel-6.8.9.8-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134032" comment="libMagick++-devel-32bit-6.8.9.8-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134033" comment="libMagickCore-6_Q16-2-6.8.9.8-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134034" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134035" comment="libMagickWand-6_Q16-2-6.8.9.8-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134036" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134037" comment="perl-PerlMagick-6.8.9.8-29.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5093</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5093" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5093" source="CVE"/>
    <description>
    The get_icu_value_internal function in ext/intl/locale/locale_methods.c in PHP before 5.5.36, 5.6.x before 5.6.22, and 7.x before 7.0.7 does not ensure the presence of a '\0' character, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via a crafted locale_get_primary_language call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128692" comment="apache2-mod_php5-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128693" comment="php5-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128694" comment="php5-bcmath-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128695" comment="php5-bz2-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128696" comment="php5-calendar-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128697" comment="php5-ctype-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128698" comment="php5-curl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128699" comment="php5-dba-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128700" comment="php5-devel-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128701" comment="php5-dom-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128702" comment="php5-enchant-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128703" comment="php5-exif-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128704" comment="php5-fastcgi-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128705" comment="php5-fileinfo-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128706" comment="php5-firebird-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128707" comment="php5-fpm-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128708" comment="php5-ftp-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128709" comment="php5-gd-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128710" comment="php5-gettext-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128711" comment="php5-gmp-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128712" comment="php5-iconv-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128713" comment="php5-imap-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128714" comment="php5-intl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128715" comment="php5-json-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128716" comment="php5-ldap-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128717" comment="php5-mbstring-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128718" comment="php5-mcrypt-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128719" comment="php5-mssql-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128720" comment="php5-mysql-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128721" comment="php5-odbc-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128722" comment="php5-opcache-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128723" comment="php5-openssl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128724" comment="php5-pcntl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128725" comment="php5-pdo-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128726" comment="php5-pear-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128727" comment="php5-pgsql-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128728" comment="php5-phar-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128729" comment="php5-posix-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128730" comment="php5-pspell-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128731" comment="php5-readline-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128732" comment="php5-shmop-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128733" comment="php5-snmp-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128734" comment="php5-soap-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128735" comment="php5-sockets-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128736" comment="php5-sqlite-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128737" comment="php5-suhosin-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128738" comment="php5-sysvmsg-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128739" comment="php5-sysvsem-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128740" comment="php5-sysvshm-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128741" comment="php5-tidy-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128742" comment="php5-tokenizer-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128743" comment="php5-wddx-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128744" comment="php5-xmlreader-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128745" comment="php5-xmlrpc-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128746" comment="php5-xmlwriter-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128747" comment="php5-xsl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128748" comment="php5-zip-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128749" comment="php5-zlib-5.6.1-66.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5094</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5094" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5094" source="CVE"/>
    <description>
    Integer overflow in the php_html_entities function in ext/standard/html.c in PHP before 5.5.36 and 5.6.x before 5.6.22 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering a large output string from the htmlspecialchars function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128692" comment="apache2-mod_php5-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128693" comment="php5-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128694" comment="php5-bcmath-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128695" comment="php5-bz2-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128696" comment="php5-calendar-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128697" comment="php5-ctype-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128698" comment="php5-curl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128699" comment="php5-dba-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128700" comment="php5-devel-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128701" comment="php5-dom-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128702" comment="php5-enchant-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128703" comment="php5-exif-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128704" comment="php5-fastcgi-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128705" comment="php5-fileinfo-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128706" comment="php5-firebird-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128707" comment="php5-fpm-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128708" comment="php5-ftp-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128709" comment="php5-gd-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128710" comment="php5-gettext-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128711" comment="php5-gmp-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128712" comment="php5-iconv-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128713" comment="php5-imap-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128714" comment="php5-intl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128715" comment="php5-json-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128716" comment="php5-ldap-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128717" comment="php5-mbstring-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128718" comment="php5-mcrypt-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128719" comment="php5-mssql-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128720" comment="php5-mysql-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128721" comment="php5-odbc-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128722" comment="php5-opcache-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128723" comment="php5-openssl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128724" comment="php5-pcntl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128725" comment="php5-pdo-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128726" comment="php5-pear-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128727" comment="php5-pgsql-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128728" comment="php5-phar-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128729" comment="php5-posix-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128730" comment="php5-pspell-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128731" comment="php5-readline-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128732" comment="php5-shmop-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128733" comment="php5-snmp-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128734" comment="php5-soap-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128735" comment="php5-sockets-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128736" comment="php5-sqlite-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128737" comment="php5-suhosin-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128738" comment="php5-sysvmsg-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128739" comment="php5-sysvsem-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128740" comment="php5-sysvshm-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128741" comment="php5-tidy-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128742" comment="php5-tokenizer-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128743" comment="php5-wddx-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128744" comment="php5-xmlreader-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128745" comment="php5-xmlrpc-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128746" comment="php5-xmlwriter-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128747" comment="php5-xsl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128748" comment="php5-zip-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128749" comment="php5-zlib-5.6.1-66.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5095</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5095" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5095" source="CVE"/>
    <description>
    Integer overflow in the php_escape_html_entities_ex function in ext/standard/html.c in PHP before 5.5.36 and 5.6.x before 5.6.22 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering a large output string from a FILTER_SANITIZE_FULL_SPECIAL_CHARS filter_var call.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-5094.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128692" comment="apache2-mod_php5-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128693" comment="php5-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128694" comment="php5-bcmath-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128695" comment="php5-bz2-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128696" comment="php5-calendar-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128697" comment="php5-ctype-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128698" comment="php5-curl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128699" comment="php5-dba-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128700" comment="php5-devel-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128701" comment="php5-dom-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128702" comment="php5-enchant-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128703" comment="php5-exif-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128704" comment="php5-fastcgi-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128705" comment="php5-fileinfo-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128706" comment="php5-firebird-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128707" comment="php5-fpm-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128708" comment="php5-ftp-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128709" comment="php5-gd-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128710" comment="php5-gettext-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128711" comment="php5-gmp-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128712" comment="php5-iconv-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128713" comment="php5-imap-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128714" comment="php5-intl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128715" comment="php5-json-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128716" comment="php5-ldap-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128717" comment="php5-mbstring-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128718" comment="php5-mcrypt-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128719" comment="php5-mssql-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128720" comment="php5-mysql-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128721" comment="php5-odbc-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128722" comment="php5-opcache-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128723" comment="php5-openssl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128724" comment="php5-pcntl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128725" comment="php5-pdo-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128726" comment="php5-pear-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128727" comment="php5-pgsql-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128728" comment="php5-phar-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128729" comment="php5-posix-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128730" comment="php5-pspell-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128731" comment="php5-readline-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128732" comment="php5-shmop-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128733" comment="php5-snmp-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128734" comment="php5-soap-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128735" comment="php5-sockets-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128736" comment="php5-sqlite-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128737" comment="php5-suhosin-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128738" comment="php5-sysvmsg-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128739" comment="php5-sysvsem-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128740" comment="php5-sysvshm-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128741" comment="php5-tidy-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128742" comment="php5-tokenizer-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128743" comment="php5-wddx-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128744" comment="php5-xmlreader-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128745" comment="php5-xmlrpc-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128746" comment="php5-xmlwriter-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128747" comment="php5-xsl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128748" comment="php5-zip-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128749" comment="php5-zlib-5.6.1-66.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5096</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5096" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5096" source="CVE"/>
    <description>
    Integer overflow in the fread function in ext/standard/file.c in PHP before 5.5.36 and 5.6.x before 5.6.22 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large integer in the second argument.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128692" comment="apache2-mod_php5-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128693" comment="php5-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128694" comment="php5-bcmath-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128695" comment="php5-bz2-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128696" comment="php5-calendar-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128697" comment="php5-ctype-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128698" comment="php5-curl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128699" comment="php5-dba-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128700" comment="php5-devel-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128701" comment="php5-dom-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128702" comment="php5-enchant-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128703" comment="php5-exif-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128704" comment="php5-fastcgi-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128705" comment="php5-fileinfo-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128706" comment="php5-firebird-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128707" comment="php5-fpm-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128708" comment="php5-ftp-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128709" comment="php5-gd-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128710" comment="php5-gettext-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128711" comment="php5-gmp-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128712" comment="php5-iconv-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128713" comment="php5-imap-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128714" comment="php5-intl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128715" comment="php5-json-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128716" comment="php5-ldap-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128717" comment="php5-mbstring-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128718" comment="php5-mcrypt-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128719" comment="php5-mssql-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128720" comment="php5-mysql-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128721" comment="php5-odbc-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128722" comment="php5-opcache-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128723" comment="php5-openssl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128724" comment="php5-pcntl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128725" comment="php5-pdo-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128726" comment="php5-pear-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128727" comment="php5-pgsql-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128728" comment="php5-phar-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128729" comment="php5-posix-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128730" comment="php5-pspell-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128731" comment="php5-readline-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128732" comment="php5-shmop-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128733" comment="php5-snmp-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128734" comment="php5-soap-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128735" comment="php5-sockets-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128736" comment="php5-sqlite-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128737" comment="php5-suhosin-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128738" comment="php5-sysvmsg-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128739" comment="php5-sysvsem-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128740" comment="php5-sysvshm-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128741" comment="php5-tidy-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128742" comment="php5-tokenizer-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128743" comment="php5-wddx-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128744" comment="php5-xmlreader-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128745" comment="php5-xmlrpc-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128746" comment="php5-xmlwriter-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128747" comment="php5-xsl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128748" comment="php5-zip-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128749" comment="php5-zlib-5.6.1-66.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5099</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5099" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5099" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in phpMyAdmin 4.4.x before 4.4.15.6 and 4.6.x before 4.6.2 allows remote attackers to inject arbitrary web script or HTML via special characters that are mishandled during double URL decoding.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128190" comment="phpMyAdmin-4.4.15.6-33.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5103</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5103" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5103" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2016-4552.  Reason: This candidate is a reservation duplicate of CVE-2016-4552.  Notes: All CVE users should reference CVE-2016-4552 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136714" comment="roundcubemail-1.0.9-23.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5104</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5104" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5104" source="CVE"/>
    <description>
    The socket_create function in common/socket.c in libimobiledevice and libusbmuxd allows remote attackers to bypass intended access restrictions and communicate with services on iOS devices by connecting to an IPv4 TCP socket.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128537" comment="imobiledevice-tools-1.1.6-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128538" comment="iproxy-1.0.9-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128539" comment="libimobiledevice-1.1.6-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128540" comment="libimobiledevice-devel-1.1.6-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128541" comment="libimobiledevice-doc-1.1.6-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128507" comment="libimobiledevice4-1.1.6-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128508" comment="libimobiledevice4-32bit-1.1.6-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128542" comment="libusbmuxd-1.0.9-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128543" comment="libusbmuxd-devel-1.0.9-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128513" comment="libusbmuxd2-1.0.9-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128514" comment="libusbmuxd2-32bit-1.0.9-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128544" comment="python-imobiledevice-1.1.6-2.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5105</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5105" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5105" source="CVE"/>
    <description>
    The megasas_dcmd_cfg_read function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, uses an uninitialized variable, which allows local guest administrators to read host memory via vectors involving a MegaRAID Firmware Interface (MFI) command.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133720" comment="xen-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133721" comment="xen-devel-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133722" comment="xen-doc-html-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133723" comment="xen-kmp-default-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133724" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133725" comment="xen-libs-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133726" comment="xen-libs-32bit-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133727" comment="xen-tools-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133728" comment="xen-tools-domU-4.4.4_05-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5106</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5106" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5106" source="CVE"/>
    <description>
    The megasas_dcmd_set_properties function in hw/scsi/megasas.c in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest administrators to cause a denial of service (out-of-bounds write access) via vectors involving a MegaRAID Firmware Interface (MFI) command.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133720" comment="xen-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133721" comment="xen-devel-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133722" comment="xen-doc-html-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133723" comment="xen-kmp-default-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133724" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133725" comment="xen-libs-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133726" comment="xen-libs-32bit-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133727" comment="xen-tools-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133728" comment="xen-tools-domU-4.4.4_05-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5107</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5107" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5107" source="CVE"/>
    <description>
    The megasas_lookup_frame function in QEMU, when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds read and crash) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133720" comment="xen-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133721" comment="xen-devel-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133722" comment="xen-doc-html-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133723" comment="xen-kmp-default-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133724" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133725" comment="xen-libs-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133726" comment="xen-libs-32bit-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133727" comment="xen-tools-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133728" comment="xen-tools-domU-4.4.4_05-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5108</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5108" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5108" source="CVE"/>
    <description>
    Buffer overflow in the DecodeAdpcmImaQT function in modules/codec/adpcm.c in VideoLAN VLC media player before 2.2.4 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted QuickTime IMA file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129185" comment="libvlc5-2.1.6-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129186" comment="libvlccore7-2.1.6-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129187" comment="vlc-2.1.6-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129188" comment="vlc-devel-2.1.6-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129189" comment="vlc-gnome-2.1.6-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129190" comment="vlc-noX-2.1.6-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129191" comment="vlc-noX-lang-2.1.6-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129192" comment="vlc-qt-2.1.6-2.10.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5114</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5114" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5114" source="CVE"/>
    <description>
    sapi/fpm/fpm/fpm_log.c in PHP before 5.5.31, 5.6.x before 5.6.17, and 7.x before 7.0.2 misinterprets the semantics of the snprintf return value, which allows attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read and buffer overflow) via a long string, as demonstrated by a long URI in a configuration with custom REQUEST_URI logging.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128692" comment="apache2-mod_php5-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128693" comment="php5-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128694" comment="php5-bcmath-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128695" comment="php5-bz2-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128696" comment="php5-calendar-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128697" comment="php5-ctype-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128698" comment="php5-curl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128699" comment="php5-dba-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128700" comment="php5-devel-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128701" comment="php5-dom-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128702" comment="php5-enchant-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128703" comment="php5-exif-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128704" comment="php5-fastcgi-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128705" comment="php5-fileinfo-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128706" comment="php5-firebird-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128707" comment="php5-fpm-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128708" comment="php5-ftp-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128709" comment="php5-gd-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128710" comment="php5-gettext-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128711" comment="php5-gmp-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128712" comment="php5-iconv-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128713" comment="php5-imap-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128714" comment="php5-intl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128715" comment="php5-json-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128716" comment="php5-ldap-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128717" comment="php5-mbstring-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128718" comment="php5-mcrypt-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128719" comment="php5-mssql-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128720" comment="php5-mysql-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128721" comment="php5-odbc-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128722" comment="php5-opcache-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128723" comment="php5-openssl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128724" comment="php5-pcntl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128725" comment="php5-pdo-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128726" comment="php5-pear-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128727" comment="php5-pgsql-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128728" comment="php5-phar-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128729" comment="php5-posix-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128730" comment="php5-pspell-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128731" comment="php5-readline-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128732" comment="php5-shmop-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128733" comment="php5-snmp-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128734" comment="php5-soap-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128735" comment="php5-sockets-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128736" comment="php5-sqlite-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128737" comment="php5-suhosin-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128738" comment="php5-sysvmsg-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128739" comment="php5-sysvsem-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128740" comment="php5-sysvshm-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128741" comment="php5-tidy-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128742" comment="php5-tokenizer-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128743" comment="php5-wddx-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128744" comment="php5-xmlreader-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128745" comment="php5-xmlrpc-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128746" comment="php5-xmlwriter-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128747" comment="php5-xsl-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128748" comment="php5-zip-5.6.1-66.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128749" comment="php5-zlib-5.6.1-66.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5116</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5116" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5116" source="CVE"/>
    <description>
    gd_xbm.c in the GD Graphics Library (aka libgd) before 2.2.0, as used in certain custom PHP 5.5.x configurations, allows context-dependent attackers to obtain sensitive information from process memory or cause a denial of service (stack-based buffer under-read and application crash) via a long name.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128485" comment="gd-2.1.0-7.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128486" comment="gd-devel-2.1.0-7.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128487" comment="libgd3-2.1.0-7.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128488" comment="libgd3-32bit-2.1.0-7.8.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5118</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5118" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5118" source="CVE"/>
    <description>
    The OpenBlob function in blob.c in GraphicsMagick before 1.3.24 and ImageMagick allows remote attackers to execute arbitrary code via a | (pipe) character at the start of a filename.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128494" comment="GraphicsMagick-1.3.20-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128495" comment="GraphicsMagick-devel-1.3.20-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128622" comment="ImageMagick-6.8.9.8-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128623" comment="ImageMagick-devel-6.8.9.8-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128624" comment="ImageMagick-devel-32bit-6.8.9.8-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128625" comment="ImageMagick-doc-6.8.9.8-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128626" comment="ImageMagick-extra-6.8.9.8-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128496" comment="libGraphicsMagick++-Q16-3-1.3.20-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128497" comment="libGraphicsMagick++-devel-1.3.20-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128498" comment="libGraphicsMagick-Q16-3-1.3.20-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128499" comment="libGraphicsMagick3-config-1.3.20-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128500" comment="libGraphicsMagickWand-Q16-2-1.3.20-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128627" comment="libMagick++-6_Q16-5-6.8.9.8-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128628" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128629" comment="libMagick++-devel-6.8.9.8-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128630" comment="libMagick++-devel-32bit-6.8.9.8-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128631" comment="libMagickCore-6_Q16-2-6.8.9.8-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128632" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128633" comment="libMagickWand-6_Q16-2-6.8.9.8-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128634" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128501" comment="perl-GraphicsMagick-1.3.20-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128635" comment="perl-PerlMagick-6.8.9.8-21.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5126</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5126" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5126" source="CVE"/>
    <description>
    Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allows local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133720" comment="xen-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133721" comment="xen-devel-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133722" comment="xen-doc-html-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133723" comment="xen-kmp-default-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133724" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133725" comment="xen-libs-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133726" comment="xen-libs-32bit-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133727" comment="xen-tools-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133728" comment="xen-tools-domU-4.4.4_05-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5127</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5127" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5127" source="CVE"/>
    <description>
    Use-after-free vulnerability in WebKit/Source/core/editing/VisibleUnits.cpp in Blink, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code involving an @import at-rule in a Cascading Style Sheets (CSS) token sequence in conjunction with a rel=import attribute of a LINK element.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130660" comment="chromedriver-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130661" comment="chromium-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130662" comment="chromium-desktop-gnome-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130663" comment="chromium-desktop-kde-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130664" comment="chromium-ffmpegsumo-52.0.2743.82-111.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5128</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5128" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5128" source="CVE"/>
    <description>
    objects.cc in Google V8 before 5.2.361.27, as used in Google Chrome before 52.0.2743.82, does not prevent API interceptors from modifying a store target without setting a property, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130660" comment="chromedriver-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130661" comment="chromium-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130662" comment="chromium-desktop-gnome-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130663" comment="chromium-desktop-kde-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130664" comment="chromium-ffmpegsumo-52.0.2743.82-111.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5129</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5129" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129" source="CVE"/>
    <description>
    Google V8 before 5.2.361.32, as used in Google Chrome before 52.0.2743.82, does not properly process left-trimmed objects, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted JavaScript code.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130660" comment="chromedriver-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130661" comment="chromium-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130662" comment="chromium-desktop-gnome-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130663" comment="chromium-desktop-kde-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130664" comment="chromium-ffmpegsumo-52.0.2743.82-111.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5130</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5130" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5130" source="CVE"/>
    <description>
    content/renderer/history_controller.cc in Google Chrome before 52.0.2743.82 does not properly restrict multiple uses of a JavaScript forward method, which allows remote attackers to spoof the URL display via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130660" comment="chromedriver-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130661" comment="chromium-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130662" comment="chromium-desktop-gnome-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130663" comment="chromium-desktop-kde-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130664" comment="chromium-ffmpegsumo-52.0.2743.82-111.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5131</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5131" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131" source="CVE"/>
    <description>
    Use-after-free vulnerability in libxml2 through 2.9.4, as used in Google Chrome before 52.0.2743.82, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to the XPointer range-to function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130660" comment="chromedriver-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130661" comment="chromium-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130662" comment="chromium-desktop-gnome-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130663" comment="chromium-desktop-kde-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130664" comment="chromium-ffmpegsumo-52.0.2743.82-111.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5132</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5132" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5132" source="CVE"/>
    <description>
    The Service Workers subsystem in Google Chrome before 52.0.2743.82 does not properly implement the Secure Contexts specification during decisions about whether to control a subframe, which allows remote attackers to bypass the Same Origin Policy via an https IFRAME element inside an http IFRAME element.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130660" comment="chromedriver-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130661" comment="chromium-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130662" comment="chromium-desktop-gnome-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130663" comment="chromium-desktop-kde-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130664" comment="chromium-ffmpegsumo-52.0.2743.82-111.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5133</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5133" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5133" source="CVE"/>
    <description>
    Google Chrome before 52.0.2743.82 mishandles origin information during proxy authentication, which allows man-in-the-middle attackers to spoof a proxy-authentication login prompt or trigger incorrect credential storage by modifying the client-server data stream.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130660" comment="chromedriver-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130661" comment="chromium-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130662" comment="chromium-desktop-gnome-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130663" comment="chromium-desktop-kde-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130664" comment="chromium-ffmpegsumo-52.0.2743.82-111.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5134</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5134" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5134" source="CVE"/>
    <description>
    net/proxy/proxy_service.cc in the Proxy Auto-Config (PAC) feature in Google Chrome before 52.0.2743.82 does not ensure that URL information is restricted to a scheme, host, and port, which allows remote attackers to discover credentials by operating a server with a PAC script, a related issue to CVE-2016-3763.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130660" comment="chromedriver-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130661" comment="chromium-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130662" comment="chromium-desktop-gnome-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130663" comment="chromium-desktop-kde-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130664" comment="chromium-ffmpegsumo-52.0.2743.82-111.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5135</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5135" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5135" source="CVE"/>
    <description>
    WebKit/Source/core/html/parser/HTMLPreloadScanner.cpp in Blink, as used in Google Chrome before 52.0.2743.82, does not consider referrer-policy information inside an HTML document during a preload request, which allows remote attackers to bypass the Content Security Policy (CSP) protection mechanism via a crafted web site, as demonstrated by a "Content-Security-Policy: referrer origin-when-cross-origin" header that overrides a "&lt;META name='referrer' content='no-referrer'&gt;" element.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130660" comment="chromedriver-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130661" comment="chromium-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130662" comment="chromium-desktop-gnome-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130663" comment="chromium-desktop-kde-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130664" comment="chromium-ffmpegsumo-52.0.2743.82-111.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5136</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5136" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5136" source="CVE"/>
    <description>
    Use-after-free vulnerability in extensions/renderer/user_script_injector.cc in the Extensions subsystem in Google Chrome before 52.0.2743.82 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to script deletion.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130660" comment="chromedriver-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130661" comment="chromium-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130662" comment="chromium-desktop-gnome-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130663" comment="chromium-desktop-kde-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130664" comment="chromium-ffmpegsumo-52.0.2743.82-111.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5137</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5137" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5137" source="CVE"/>
    <description>
    The CSPSource::schemeMatches function in WebKit/Source/core/frame/csp/CSPSource.cpp in the Content Security Policy (CSP) implementation in Blink, as used in Google Chrome before 52.0.2743.82, does not apply http :80 policies to https :443 URLs and does not apply ws :80 policies to wss :443 URLs, which makes it easier for remote attackers to determine whether a specific HSTS web site has been visited by reading a CSP report.  NOTE: this vulnerability is associated with a specification change after CVE-2016-1617 resolution.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130660" comment="chromedriver-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130661" comment="chromium-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130662" comment="chromium-desktop-gnome-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130663" comment="chromium-desktop-kde-52.0.2743.82-111.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130664" comment="chromium-ffmpegsumo-52.0.2743.82-111.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5139</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5139" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5139" source="CVE"/>
    <description>
    Multiple integer overflows in the opj_tcd_init_tile function in tcd.c in OpenJPEG, as used in PDFium in Google Chrome before 52.0.2743.116, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JPEG 2000 data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130915" comment="chromedriver-52.0.2743.116-114.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130916" comment="chromium-52.0.2743.116-114.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130917" comment="chromium-desktop-gnome-52.0.2743.116-114.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130918" comment="chromium-desktop-kde-52.0.2743.116-114.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130919" comment="chromium-ffmpegsumo-52.0.2743.116-114.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5140</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5140" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5140" source="CVE"/>
    <description>
    Heap-based buffer overflow in the opj_j2k_read_SQcd_SQcc function in j2k.c in OpenJPEG, as used in PDFium in Google Chrome before 52.0.2743.116, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JPEG 2000 data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130915" comment="chromedriver-52.0.2743.116-114.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130916" comment="chromium-52.0.2743.116-114.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130917" comment="chromium-desktop-gnome-52.0.2743.116-114.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130918" comment="chromium-desktop-kde-52.0.2743.116-114.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130919" comment="chromium-ffmpegsumo-52.0.2743.116-114.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5141</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5141" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5141" source="CVE"/>
    <description>
    Blink, as used in Google Chrome before 52.0.2743.116, allows remote attackers to spoof the address bar via vectors involving a provisional URL for an initially empty document, related to FrameLoader.cpp and ScopedPageLoadDeferrer.cpp.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130915" comment="chromedriver-52.0.2743.116-114.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130916" comment="chromium-52.0.2743.116-114.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130917" comment="chromium-desktop-gnome-52.0.2743.116-114.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130918" comment="chromium-desktop-kde-52.0.2743.116-114.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130919" comment="chromium-ffmpegsumo-52.0.2743.116-114.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5142</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5142" source="CVE"/>
    <description>
    The Web Cryptography API (aka WebCrypto) implementation in Blink, as used in Google Chrome before 52.0.2743.116, does not properly copy data buffers, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted JavaScript code, related to NormalizeAlgorithm.cpp and SubtleCrypto.cpp.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130915" comment="chromedriver-52.0.2743.116-114.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130916" comment="chromium-52.0.2743.116-114.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130917" comment="chromium-desktop-gnome-52.0.2743.116-114.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130918" comment="chromium-desktop-kde-52.0.2743.116-114.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130919" comment="chromium-ffmpegsumo-52.0.2743.116-114.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5143</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5143" source="CVE"/>
    <description>
    The Developer Tools (aka DevTools) subsystem in Blink, as used in Google Chrome before 52.0.2743.116, mishandles the script-path hostname, remoteBase parameter, and remoteFrontendUrl parameter, which allows remote attackers to bypass intended access restrictions via a crafted URL, a different vulnerability than CVE-2016-5144.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130915" comment="chromedriver-52.0.2743.116-114.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130916" comment="chromium-52.0.2743.116-114.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130917" comment="chromium-desktop-gnome-52.0.2743.116-114.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130918" comment="chromium-desktop-kde-52.0.2743.116-114.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130919" comment="chromium-ffmpegsumo-52.0.2743.116-114.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5144</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5144" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5144" source="CVE"/>
    <description>
    The Developer Tools (aka DevTools) subsystem in Blink, as used in Google Chrome before 52.0.2743.116, mishandles the script-path hostname, remoteBase parameter, and remoteFrontendUrl parameter, which allows remote attackers to bypass intended access restrictions via a crafted URL, a different vulnerability than CVE-2016-5143.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130915" comment="chromedriver-52.0.2743.116-114.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130916" comment="chromium-52.0.2743.116-114.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130917" comment="chromium-desktop-gnome-52.0.2743.116-114.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130918" comment="chromium-desktop-kde-52.0.2743.116-114.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130919" comment="chromium-ffmpegsumo-52.0.2743.116-114.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5145</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5145" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5145" source="CVE"/>
    <description>
    Blink, as used in Google Chrome before 52.0.2743.116, does not ensure that a taint property is preserved after a structure-clone operation on an ImageBitmap object derived from a cross-origin image, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130915" comment="chromedriver-52.0.2743.116-114.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130916" comment="chromium-52.0.2743.116-114.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130917" comment="chromium-desktop-gnome-52.0.2743.116-114.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130918" comment="chromium-desktop-kde-52.0.2743.116-114.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130919" comment="chromium-ffmpegsumo-52.0.2743.116-114.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5146</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5146" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5146" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 52.0.2743.116 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130915" comment="chromedriver-52.0.2743.116-114.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130916" comment="chromium-52.0.2743.116-114.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130917" comment="chromium-desktop-gnome-52.0.2743.116-114.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130918" comment="chromium-desktop-kde-52.0.2743.116-114.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130919" comment="chromium-ffmpegsumo-52.0.2743.116-114.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5147</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5147" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5147" source="CVE"/>
    <description>
    Blink, as used in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, mishandles deferred page loads, which allows remote attackers to inject arbitrary web script or HTML via a crafted web site, aka "Universal XSS (UXSS)."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133430" comment="chromedriver-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133431" comment="chromium-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133432" comment="chromium-desktop-gnome-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133433" comment="chromium-desktop-kde-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133434" comment="chromium-ffmpegsumo-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133435" comment="rpmlint-1.5-39.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133436" comment="rpmlint-mini-1.5-8.7.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5148</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5148" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5148" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Blink, as used in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allows remote attackers to inject arbitrary web script or HTML via vectors related to widget updates, aka "Universal XSS (UXSS)."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133430" comment="chromedriver-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133431" comment="chromium-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133432" comment="chromium-desktop-gnome-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133433" comment="chromium-desktop-kde-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133434" comment="chromium-ffmpegsumo-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133435" comment="rpmlint-1.5-39.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133436" comment="rpmlint-mini-1.5-8.7.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5149</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5149" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5149" source="CVE"/>
    <description>
    The extensions subsystem in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux relies on an IFRAME source URL to identify an associated extension, which allows remote attackers to conduct extension-bindings injection attacks by leveraging script access to a resource that initially has the about:blank URL.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133430" comment="chromedriver-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133431" comment="chromium-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133432" comment="chromium-desktop-gnome-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133433" comment="chromium-desktop-kde-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133434" comment="chromium-ffmpegsumo-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133435" comment="rpmlint-1.5-39.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133436" comment="rpmlint-mini-1.5-8.7.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5150</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5150" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5150" source="CVE"/>
    <description>
    WebKit/Source/bindings/modules/v8/V8BindingForModules.cpp in Blink, as used in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, has an Indexed Database (aka IndexedDB) API implementation that does not properly restrict key-path evaluation, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted JavaScript code that leverages certain side effects.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133430" comment="chromedriver-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133431" comment="chromium-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133432" comment="chromium-desktop-gnome-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133433" comment="chromium-desktop-kde-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133434" comment="chromium-ffmpegsumo-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133435" comment="rpmlint-1.5-39.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133436" comment="rpmlint-mini-1.5-8.7.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5151</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5151" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5151" source="CVE"/>
    <description>
    PDFium in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux mishandles timers, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted PDF document, related to fpdfsdk/javascript/JS_Object.cpp and fpdfsdk/javascript/app.cpp.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133430" comment="chromedriver-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133431" comment="chromium-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133432" comment="chromium-desktop-gnome-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133433" comment="chromium-desktop-kde-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133434" comment="chromium-ffmpegsumo-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133435" comment="rpmlint-1.5-39.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133436" comment="rpmlint-mini-1.5-8.7.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5152</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5152" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5152" source="CVE"/>
    <description>
    Integer overflow in the opj_tcd_get_decoded_tile_size function in tcd.c in OpenJPEG, as used in PDFium in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JPEG 2000 data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133430" comment="chromedriver-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133431" comment="chromium-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133432" comment="chromium-desktop-gnome-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133433" comment="chromium-desktop-kde-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133434" comment="chromium-ffmpegsumo-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133435" comment="rpmlint-1.5-39.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133436" comment="rpmlint-mini-1.5-8.7.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5153</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5153" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5153" source="CVE"/>
    <description>
    The Web Animations implementation in Blink, as used in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, improperly relies on list iteration, which allows remote attackers to cause a denial of service (use-after-destruction) or possibly have unspecified other impact via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133430" comment="chromedriver-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133431" comment="chromium-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133432" comment="chromium-desktop-gnome-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133433" comment="chromium-desktop-kde-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133434" comment="chromium-ffmpegsumo-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133435" comment="rpmlint-1.5-39.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133436" comment="rpmlint-mini-1.5-8.7.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5154</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5154" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5154" source="CVE"/>
    <description>
    Multiple heap-based buffer overflows in PDFium, as used in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allow remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted JBig2 image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133430" comment="chromedriver-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133431" comment="chromium-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133432" comment="chromium-desktop-gnome-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133433" comment="chromium-desktop-kde-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133434" comment="chromium-ffmpegsumo-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133435" comment="rpmlint-1.5-39.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133436" comment="rpmlint-mini-1.5-8.7.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5155</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5155" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5155" source="CVE"/>
    <description>
    Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux does not properly validate access to the initial document, which allows remote attackers to spoof the address bar via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133430" comment="chromedriver-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133431" comment="chromium-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133432" comment="chromium-desktop-gnome-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133433" comment="chromium-desktop-kde-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133434" comment="chromium-ffmpegsumo-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133435" comment="rpmlint-1.5-39.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133436" comment="rpmlint-mini-1.5-8.7.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5156</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5156" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5156" source="CVE"/>
    <description>
    extensions/renderer/event_bindings.cc in the event bindings in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux attempts to process filtered events after failure to add an event matcher, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133430" comment="chromedriver-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133431" comment="chromium-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133432" comment="chromium-desktop-gnome-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133433" comment="chromium-desktop-kde-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133434" comment="chromium-ffmpegsumo-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133435" comment="rpmlint-1.5-39.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133436" comment="rpmlint-mini-1.5-8.7.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5157</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5157" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5157" source="CVE"/>
    <description>
    Heap-based buffer overflow in the opj_dwt_interleave_v function in dwt.c in OpenJPEG, as used in PDFium in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allows remote attackers to execute arbitrary code via crafted coordinate values in JPEG 2000 data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133430" comment="chromedriver-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133431" comment="chromium-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133432" comment="chromium-desktop-gnome-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133433" comment="chromium-desktop-kde-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133434" comment="chromium-ffmpegsumo-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133435" comment="rpmlint-1.5-39.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133436" comment="rpmlint-mini-1.5-8.7.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5158</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5158" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158" source="CVE"/>
    <description>
    Multiple integer overflows in the opj_tcd_init_tile function in tcd.c in OpenJPEG, as used in PDFium in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JPEG 2000 data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133430" comment="chromedriver-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133431" comment="chromium-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133432" comment="chromium-desktop-gnome-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133433" comment="chromium-desktop-kde-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133434" comment="chromium-ffmpegsumo-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133435" comment="rpmlint-1.5-39.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133436" comment="rpmlint-mini-1.5-8.7.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5159</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5159" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159" source="CVE"/>
    <description>
    Multiple integer overflows in OpenJPEG, as used in PDFium in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JPEG 2000 data that is mishandled during opj_aligned_malloc calls in dwt.c and t1.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133430" comment="chromedriver-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133431" comment="chromium-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133432" comment="chromium-desktop-gnome-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133433" comment="chromium-desktop-kde-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133434" comment="chromium-ffmpegsumo-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133435" comment="rpmlint-1.5-39.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133436" comment="rpmlint-mini-1.5-8.7.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5160</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5160" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5160" source="CVE"/>
    <description>
    The AllowCrossRendererResourceLoad function in extensions/browser/url_request_util.cc in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux does not properly use an extension's manifest.json web_accessible_resources field for restrictions on IFRAME elements, which makes it easier for remote attackers to conduct clickjacking attacks, and trick users into changing extension settings, via a crafted web site, a different vulnerability than CVE-2016-5162.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133430" comment="chromedriver-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133431" comment="chromium-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133432" comment="chromium-desktop-gnome-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133433" comment="chromium-desktop-kde-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133434" comment="chromium-ffmpegsumo-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133435" comment="rpmlint-1.5-39.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133436" comment="rpmlint-mini-1.5-8.7.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5161</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5161" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5161" source="CVE"/>
    <description>
    The EditingStyle::mergeStyle function in WebKit/Source/core/editing/EditingStyle.cpp in Blink, as used in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, mishandles custom properties, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted web site that leverages "type confusion" in the StylePropertySerializer class.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133430" comment="chromedriver-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133431" comment="chromium-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133432" comment="chromium-desktop-gnome-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133433" comment="chromium-desktop-kde-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133434" comment="chromium-ffmpegsumo-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133435" comment="rpmlint-1.5-39.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133436" comment="rpmlint-mini-1.5-8.7.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5162</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5162" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5162" source="CVE"/>
    <description>
    The AllowCrossRendererResourceLoad function in extensions/browser/url_request_util.cc in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux does not properly use an extension's manifest.json web_accessible_resources field for restrictions on IFRAME elements, which makes it easier for remote attackers to conduct clickjacking attacks, and trick users into changing extension settings, via a crafted web site, a different vulnerability than CVE-2016-5160.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133430" comment="chromedriver-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133431" comment="chromium-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133432" comment="chromium-desktop-gnome-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133433" comment="chromium-desktop-kde-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133434" comment="chromium-ffmpegsumo-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133435" comment="rpmlint-1.5-39.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133436" comment="rpmlint-mini-1.5-8.7.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5163</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5163" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5163" source="CVE"/>
    <description>
    The bidirectional-text implementation in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux does not ensure left-to-right (LTR) rendering of URLs, which allows remote attackers to spoof the address bar via crafted right-to-left (RTL) Unicode text, related to omnibox/SuggestionView.java and omnibox/UrlBar.java in Chrome for Android.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133430" comment="chromedriver-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133431" comment="chromium-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133432" comment="chromium-desktop-gnome-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133433" comment="chromium-desktop-kde-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133434" comment="chromium-ffmpegsumo-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133435" comment="rpmlint-1.5-39.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133436" comment="rpmlint-mini-1.5-8.7.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5164</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5164" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5164" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in WebKit/Source/platform/v8_inspector/V8Debugger.cpp in Blink, as used in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allows remote attackers to inject arbitrary web script or HTML into the Developer Tools (aka DevTools) subsystem via a crafted web site, aka "Universal XSS (UXSS)."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133430" comment="chromedriver-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133431" comment="chromium-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133432" comment="chromium-desktop-gnome-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133433" comment="chromium-desktop-kde-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133434" comment="chromium-ffmpegsumo-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133435" comment="rpmlint-1.5-39.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133436" comment="rpmlint-mini-1.5-8.7.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5165</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5165" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5165" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in the Developer Tools (aka DevTools) subsystem in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux allows remote attackers to inject arbitrary web script or HTML via the settings parameter in a chrome-devtools-frontend.appspot.com URL's query string.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133430" comment="chromedriver-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133431" comment="chromium-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133432" comment="chromium-desktop-gnome-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133433" comment="chromium-desktop-kde-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133434" comment="chromium-ffmpegsumo-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133435" comment="rpmlint-1.5-39.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133436" comment="rpmlint-mini-1.5-8.7.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5166</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5166" source="CVE"/>
    <description>
    The download implementation in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux does not properly restrict saving a file:// URL that is referenced by an http:// URL, which makes it easier for user-assisted remote attackers to discover NetNTLM hashes and conduct SMB relay attacks via a crafted web page that is accessed with the "Save page as" menu choice.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133430" comment="chromedriver-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133431" comment="chromium-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133432" comment="chromium-desktop-gnome-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133433" comment="chromium-desktop-kde-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133434" comment="chromium-ffmpegsumo-53.0.2785.101-120.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133435" comment="rpmlint-1.5-39.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133436" comment="rpmlint-mini-1.5-8.7.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5170</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5170" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5170" source="CVE"/>
    <description>
    WebKit/Source/bindings/modules/v8/V8BindingForModules.cpp in Blink, as used in Google Chrome before 53.0.2785.113, does not properly consider getter side effects during array key conversion, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted Indexed Database (aka IndexedDB) API calls.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133440" comment="chromedriver-53.0.2785.113-123.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133441" comment="chromium-53.0.2785.113-123.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133442" comment="chromium-desktop-gnome-53.0.2785.113-123.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133443" comment="chromium-desktop-kde-53.0.2785.113-123.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133444" comment="chromium-ffmpegsumo-53.0.2785.113-123.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5171</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5171" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5171" source="CVE"/>
    <description>
    WebKit/Source/bindings/templates/interface.cpp in Blink, as used in Google Chrome before 53.0.2785.113, does not prevent certain constructor calls, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via crafted JavaScript code.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133440" comment="chromedriver-53.0.2785.113-123.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133441" comment="chromium-53.0.2785.113-123.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133442" comment="chromium-desktop-gnome-53.0.2785.113-123.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133443" comment="chromium-desktop-kde-53.0.2785.113-123.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133444" comment="chromium-ffmpegsumo-53.0.2785.113-123.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5172</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5172" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5172" source="CVE"/>
    <description>
    The parser in Google V8, as used in Google Chrome before 53.0.2785.113, mishandles scopes, which allows remote attackers to obtain sensitive information from arbitrary memory locations via crafted JavaScript code.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133440" comment="chromedriver-53.0.2785.113-123.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133441" comment="chromium-53.0.2785.113-123.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133442" comment="chromium-desktop-gnome-53.0.2785.113-123.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133443" comment="chromium-desktop-kde-53.0.2785.113-123.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133444" comment="chromium-ffmpegsumo-53.0.2785.113-123.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5173</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5173" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5173" source="CVE"/>
    <description>
    The extensions subsystem in Google Chrome before 53.0.2785.113 does not properly restrict access to Object.prototype, which allows remote attackers to load unintended resources, and consequently trigger unintended JavaScript function calls and bypass the Same Origin Policy via an indirect interception attack.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133440" comment="chromedriver-53.0.2785.113-123.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133441" comment="chromium-53.0.2785.113-123.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133442" comment="chromium-desktop-gnome-53.0.2785.113-123.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133443" comment="chromium-desktop-kde-53.0.2785.113-123.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133444" comment="chromium-ffmpegsumo-53.0.2785.113-123.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5174</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5174" source="CVE"/>
    <description>
    browser/ui/cocoa/browser_window_controller_private.mm in Google Chrome before 53.0.2785.113 does not process fullscreen toggle requests during a fullscreen transition, which allows remote attackers to cause a denial of service (unsuppressed popup) via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133440" comment="chromedriver-53.0.2785.113-123.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133441" comment="chromium-53.0.2785.113-123.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133442" comment="chromium-desktop-gnome-53.0.2785.113-123.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133443" comment="chromium-desktop-kde-53.0.2785.113-123.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133444" comment="chromium-ffmpegsumo-53.0.2785.113-123.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5175</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5175" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5175" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in Google Chrome before 53.0.2785.113 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133440" comment="chromedriver-53.0.2785.113-123.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133441" comment="chromium-53.0.2785.113-123.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133442" comment="chromium-desktop-gnome-53.0.2785.113-123.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133443" comment="chromium-desktop-kde-53.0.2785.113-123.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133444" comment="chromium-ffmpegsumo-53.0.2785.113-123.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5177</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5177" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5177" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134180" comment="chromedriver-53.0.2785.143-128.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134181" comment="chromium-53.0.2785.143-128.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134182" comment="chromium-desktop-gnome-53.0.2785.143-128.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134183" comment="chromium-desktop-kde-53.0.2785.143-128.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134184" comment="chromium-ffmpegsumo-53.0.2785.143-128.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5178</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5178" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5178" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134180" comment="chromedriver-53.0.2785.143-128.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134181" comment="chromium-53.0.2785.143-128.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134182" comment="chromium-desktop-gnome-53.0.2785.143-128.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134183" comment="chromium-desktop-kde-53.0.2785.143-128.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134184" comment="chromium-ffmpegsumo-53.0.2785.143-128.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5180</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5180" source="CVE"/>
    <description>
    Heap-based buffer overflow in the ares_create_query function in c-ares 1.x before 1.12.0 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly execute arbitrary code via a hostname with an escaped trailing dot.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136187" comment="libcares-devel-1.10.0-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136188" comment="libcares2-1.10.0-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136189" comment="libcares2-32bit-1.10.0-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135463" comment="nodejs-4.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135464" comment="nodejs-devel-4.6.1-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135437" comment="nodejs-doc-4.6.1-27.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5181</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5181" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5181" source="CVE"/>
    <description>
    Blink in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android permitted execution of v8 microtasks while the DOM was in an inconsistent state, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via crafted HTML pages.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134185" comment="chromedriver-54.0.2840.59-131.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134186" comment="chromium-54.0.2840.59-131.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134187" comment="chromium-ffmpegsumo-54.0.2840.59-131.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5182</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5182" source="CVE"/>
    <description>
    Blink in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android had insufficient validation in bitmap handling, which allowed a remote attacker to potentially exploit heap corruption via crafted HTML pages.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134185" comment="chromedriver-54.0.2840.59-131.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134186" comment="chromium-54.0.2840.59-131.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134187" comment="chromium-ffmpegsumo-54.0.2840.59-131.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5183</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5183" source="CVE"/>
    <description>
    A heap use after free in PDFium in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android allows a remote attacker to potentially exploit heap corruption via crafted PDF files.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134185" comment="chromedriver-54.0.2840.59-131.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134186" comment="chromium-54.0.2840.59-131.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134187" comment="chromium-ffmpegsumo-54.0.2840.59-131.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5184</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5184" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5184" source="CVE"/>
    <description>
    PDFium in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android incorrectly handled object lifecycles in CFFL_FormFillter::KillFocusForAnnot, which allowed a remote attacker to potentially exploit heap corruption via crafted PDF files.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134185" comment="chromedriver-54.0.2840.59-131.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134186" comment="chromium-54.0.2840.59-131.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134187" comment="chromium-ffmpegsumo-54.0.2840.59-131.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5185</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5185" source="CVE"/>
    <description>
    Blink in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android incorrectly allowed reentrance of FrameView::updateLifecyclePhasesInternal(), which allowed a remote attacker to perform an out of bounds memory read via crafted HTML pages.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134185" comment="chromedriver-54.0.2840.59-131.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134186" comment="chromium-54.0.2840.59-131.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134187" comment="chromium-ffmpegsumo-54.0.2840.59-131.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5186</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5186" source="CVE"/>
    <description>
    Devtools in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android incorrectly handled objects after a tab crash, which allowed a remote attacker to perform an out of bounds memory read via crafted PDF files.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134185" comment="chromedriver-54.0.2840.59-131.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134186" comment="chromium-54.0.2840.59-131.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134187" comment="chromium-ffmpegsumo-54.0.2840.59-131.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5187</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5187" source="CVE"/>
    <description>
    Google Chrome prior to 54.0.2840.85 for Android incorrectly handled rapid transition into and out of full screen mode, which allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via crafted HTML pages.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134185" comment="chromedriver-54.0.2840.59-131.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134186" comment="chromium-54.0.2840.59-131.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134187" comment="chromium-ffmpegsumo-54.0.2840.59-131.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5188</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5188" source="CVE"/>
    <description>
    Multiple issues in Blink in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux allow a remote attacker to spoof various parts of browser UI via crafted HTML pages.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134185" comment="chromedriver-54.0.2840.59-131.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134186" comment="chromium-54.0.2840.59-131.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134187" comment="chromium-ffmpegsumo-54.0.2840.59-131.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5189</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5189" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5189" source="CVE"/>
    <description>
    Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android permitted navigation to blob URLs with non-canonical origins, which allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via crafted HTML pages.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134185" comment="chromedriver-54.0.2840.59-131.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134186" comment="chromium-54.0.2840.59-131.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134187" comment="chromium-ffmpegsumo-54.0.2840.59-131.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5190</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5190" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5190" source="CVE"/>
    <description>
    Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android incorrectly handled object lifecycles during shutdown, which allowed a remote attacker to perform an out of bounds memory read via crafted HTML pages.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134185" comment="chromedriver-54.0.2840.59-131.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134186" comment="chromium-54.0.2840.59-131.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134187" comment="chromium-ffmpegsumo-54.0.2840.59-131.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5191</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5191" source="CVE"/>
    <description>
    Bookmark handling in Google Chrome prior to 54.0.2840.59 for Windows, Mac, and Linux; 54.0.2840.85 for Android had insufficient validation of supplied data, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via crafted HTML pages, as demonstrated by an interpretation conflict between userinfo and scheme in an http://javascript:payload@example.com URL.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134185" comment="chromedriver-54.0.2840.59-131.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134186" comment="chromium-54.0.2840.59-131.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134187" comment="chromium-ffmpegsumo-54.0.2840.59-131.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5192</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5192" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5192" source="CVE"/>
    <description>
    Blink in Google Chrome prior to 54.0.2840.59 for Windows missed a CORS check on redirect in TextTrackLoader, which allowed a remote attacker to bypass cross-origin restrictions via crafted HTML pages.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134185" comment="chromedriver-54.0.2840.59-131.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134186" comment="chromium-54.0.2840.59-131.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134187" comment="chromium-ffmpegsumo-54.0.2840.59-131.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5193</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5193" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5193" source="CVE"/>
    <description>
    Google Chrome prior to 54.0 for iOS had insufficient validation of URLs for windows open by DOM, which allowed a remote attacker to bypass restrictions on navigation to certain URL schemes via crafted HTML pages.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134185" comment="chromedriver-54.0.2840.59-131.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134186" comment="chromium-54.0.2840.59-131.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134187" comment="chromium-ffmpegsumo-54.0.2840.59-131.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5195</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5195" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5195" source="CVE"/>
    <description>
    Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133865" comment="bbswitch-0.8-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133866" comment="bbswitch-kmp-default-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133867" comment="bbswitch-kmp-desktop-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133868" comment="bbswitch-kmp-pae-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133869" comment="bbswitch-kmp-xen-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133870" comment="cloop-2.639-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133871" comment="cloop-kmp-default-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133872" comment="cloop-kmp-desktop-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133873" comment="cloop-kmp-pae-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133874" comment="cloop-kmp-xen-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133875" comment="crash-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133876" comment="crash-devel-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133877" comment="crash-doc-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133878" comment="crash-eppic-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133879" comment="crash-gcore-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133880" comment="crash-kmp-default-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133881" comment="crash-kmp-desktop-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133882" comment="crash-kmp-pae-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133883" comment="crash-kmp-xen-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133884" comment="hdjmod-1.28-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133885" comment="hdjmod-kmp-default-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133886" comment="hdjmod-kmp-desktop-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133887" comment="hdjmod-kmp-pae-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133888" comment="hdjmod-kmp-xen-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133889" comment="ipset-6.23-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133890" comment="ipset-devel-6.23-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133891" comment="ipset-kmp-default-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133892" comment="ipset-kmp-desktop-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133893" comment="ipset-kmp-pae-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133894" comment="ipset-kmp-xen-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133895" comment="kernel-debug-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133896" comment="kernel-debug-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133897" comment="kernel-debug-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133898" comment="kernel-default-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133899" comment="kernel-default-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133900" comment="kernel-default-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133901" comment="kernel-desktop-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133902" comment="kernel-desktop-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133903" comment="kernel-desktop-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133904" comment="kernel-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133905" comment="kernel-docs-3.16.7-45.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133906" comment="kernel-ec2-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133907" comment="kernel-ec2-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133908" comment="kernel-ec2-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133909" comment="kernel-macros-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133910" comment="kernel-obs-build-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133911" comment="kernel-obs-qa-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133912" comment="kernel-obs-qa-xen-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133913" comment="kernel-pae-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133914" comment="kernel-pae-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133915" comment="kernel-pae-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133916" comment="kernel-source-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133917" comment="kernel-source-vanilla-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133918" comment="kernel-syms-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133919" comment="kernel-vanilla-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133920" comment="kernel-vanilla-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133921" comment="kernel-xen-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133922" comment="kernel-xen-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133923" comment="kernel-xen-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133924" comment="libipset3-6.23-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133925" comment="pcfclock-0.44-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133926" comment="pcfclock-kmp-default-0.44_k3.16.7_45-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133927" comment="pcfclock-kmp-desktop-0.44_k3.16.7_45-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133928" comment="pcfclock-kmp-pae-0.44_k3.16.7_45-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133929" comment="python-virtualbox-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133930" comment="vhba-kmp-20140629-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133931" comment="vhba-kmp-default-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133932" comment="vhba-kmp-desktop-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133933" comment="vhba-kmp-pae-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133934" comment="vhba-kmp-xen-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133935" comment="virtualbox-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133936" comment="virtualbox-devel-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133937" comment="virtualbox-guest-desktop-icons-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133938" comment="virtualbox-guest-kmp-default-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133939" comment="virtualbox-guest-kmp-desktop-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133940" comment="virtualbox-guest-kmp-pae-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133941" comment="virtualbox-guest-tools-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133942" comment="virtualbox-guest-x11-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133943" comment="virtualbox-host-kmp-default-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133944" comment="virtualbox-host-kmp-desktop-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133945" comment="virtualbox-host-kmp-pae-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133946" comment="virtualbox-host-source-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133947" comment="virtualbox-qt-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133948" comment="virtualbox-websrv-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133949" comment="xen-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133950" comment="xen-devel-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133951" comment="xen-doc-html-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133952" comment="xen-kmp-default-4.4.4_05_k3.16.7_45-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133953" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_45-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133954" comment="xen-libs-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133955" comment="xen-libs-32bit-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133956" comment="xen-tools-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133957" comment="xen-tools-domU-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133958" comment="xtables-addons-2.6-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133959" comment="xtables-addons-kmp-default-2.6_k3.16.7_45-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133960" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_45-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133961" comment="xtables-addons-kmp-pae-2.6_k3.16.7_45-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133962" comment="xtables-addons-kmp-xen-2.6_k3.16.7_45-24.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5198</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5198" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5198" source="CVE"/>
    <description>
    V8 in Google Chrome prior to 54.0.2840.90 for Linux, and 54.0.2840.85 for Android, and 54.0.2840.87 for Windows and Mac included incorrect optimisation assumptions, which allowed a remote attacker to perform arbitrary read/write operations, leading to code execution, via a crafted HTML page.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135302" comment="chromedriver-54.0.2840.90-134.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135303" comment="chromium-54.0.2840.90-134.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135304" comment="chromium-ffmpegsumo-54.0.2840.90-134.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5199</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5199" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5199" source="CVE"/>
    <description>
    An off by one error resulting in an allocation of zero size in FFmpeg in Google Chrome prior to 54.0.2840.98 for Mac, and 54.0.2840.99 for Windows, and 54.0.2840.100 for Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted video file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135532" comment="chromedriver-54.0.2840.100-140.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135533" comment="chromium-54.0.2840.100-140.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135534" comment="chromium-ffmpegsumo-54.0.2840.100-140.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5200</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5200" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5200" source="CVE"/>
    <description>
    V8 in Google Chrome prior to 54.0.2840.98 for Mac, and 54.0.2840.99 for Windows, and 54.0.2840.100 for Linux, and 55.0.2883.84 for Android incorrectly applied type rules, which allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135532" comment="chromedriver-54.0.2840.100-140.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135533" comment="chromium-54.0.2840.100-140.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135534" comment="chromium-ffmpegsumo-54.0.2840.100-140.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5201</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5201" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5201" source="CVE"/>
    <description>
    A leak of privateClass in the extensions API in Google Chrome prior to 54.0.2840.100 for Linux, and 54.0.2840.99 for Windows, and 54.0.2840.98 for Mac allowed a remote attacker to access privileged JavaScript code via a crafted HTML page.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135532" comment="chromedriver-54.0.2840.100-140.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135533" comment="chromium-54.0.2840.100-140.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135534" comment="chromium-ffmpegsumo-54.0.2840.100-140.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5202</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5202" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5202" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135532" comment="chromedriver-54.0.2840.100-140.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135533" comment="chromium-54.0.2840.100-140.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135534" comment="chromium-ffmpegsumo-54.0.2840.100-140.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5203</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5203" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5203" source="CVE"/>
    <description>
    A use after free in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009142897" comment="chromedriver-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142898" comment="chromium-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142896" comment="chromium-ffmpegsumo-55.0.2883.75-148.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5204</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5204" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5204" source="CVE"/>
    <description>
    Leaking of an SVG shadow tree leading to corruption of the DOM tree in Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009142897" comment="chromedriver-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142898" comment="chromium-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142896" comment="chromium-ffmpegsumo-55.0.2883.75-148.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5205</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5205" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5205" source="CVE"/>
    <description>
    Blink in Google Chrome prior to 55.0.2883.75 for Linux, Windows and Mac, incorrectly handles deferred page loads, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009142897" comment="chromedriver-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142898" comment="chromium-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142896" comment="chromium-ffmpegsumo-55.0.2883.75-148.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5206</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5206" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5206" source="CVE"/>
    <description>
    The PDF plugin in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly followed redirects, which allowed a remote attacker to bypass the Same Origin Policy via a crafted HTML page.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009142897" comment="chromedriver-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142898" comment="chromium-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142896" comment="chromium-ffmpegsumo-55.0.2883.75-148.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5207</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5207" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5207" source="CVE"/>
    <description>
    In Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android, corruption of the DOM tree could occur during the removal of a full screen element, which allowed a remote attacker to achieve arbitrary code execution via a crafted HTML page.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009142897" comment="chromedriver-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142898" comment="chromium-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142896" comment="chromium-ffmpegsumo-55.0.2883.75-148.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5208</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5208" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5208" source="CVE"/>
    <description>
    Blink in Google Chrome prior to 55.0.2883.75 for Linux and Windows, and 55.0.2883.84 for Android allowed possible corruption of the DOM tree during synchronous event handling, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009142897" comment="chromedriver-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142898" comment="chromium-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142896" comment="chromium-ffmpegsumo-55.0.2883.75-148.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5209</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5209" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5209" source="CVE"/>
    <description>
    Bad casting in bitmap manipulation in Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009142897" comment="chromedriver-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142898" comment="chromium-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142896" comment="chromium-ffmpegsumo-55.0.2883.75-148.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5210</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5210" source="CVE"/>
    <description>
    Heap buffer overflow during TIFF image parsing in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009142897" comment="chromedriver-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142898" comment="chromium-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142896" comment="chromium-ffmpegsumo-55.0.2883.75-148.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5211</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5211" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5211" source="CVE"/>
    <description>
    A use after free in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009142897" comment="chromedriver-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142898" comment="chromium-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142896" comment="chromium-ffmpegsumo-55.0.2883.75-148.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5212</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5212" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5212" source="CVE"/>
    <description>
    Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android insufficiently sanitized DevTools URLs, which allowed a remote attacker to read local files via a crafted HTML page.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009142897" comment="chromedriver-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142898" comment="chromium-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142896" comment="chromium-ffmpegsumo-55.0.2883.75-148.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5213</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5213" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5213" source="CVE"/>
    <description>
    A use after free in V8 in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009142897" comment="chromedriver-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142898" comment="chromium-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142896" comment="chromium-ffmpegsumo-55.0.2883.75-148.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5214</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5214" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5214" source="CVE"/>
    <description>
    Google Chrome prior to 55.0.2883.75 for Windows mishandled downloaded files, which allowed a remote attacker to prevent the downloaded file from receiving the Mark of the Web via a crafted HTML page.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009142897" comment="chromedriver-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142898" comment="chromium-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142896" comment="chromium-ffmpegsumo-55.0.2883.75-148.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5215</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5215" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5215" source="CVE"/>
    <description>
    A use after free in webaudio in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009142897" comment="chromedriver-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142898" comment="chromium-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142896" comment="chromium-ffmpegsumo-55.0.2883.75-148.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5216</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5216" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5216" source="CVE"/>
    <description>
    A use after free in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009142897" comment="chromedriver-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142898" comment="chromium-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142896" comment="chromium-ffmpegsumo-55.0.2883.75-148.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5217</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5217" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5217" source="CVE"/>
    <description>
    The extensions API in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly permitted access to privileged plugins, which allowed a remote attacker to bypass site isolation via a crafted HTML page.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009142897" comment="chromedriver-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142898" comment="chromium-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142896" comment="chromium-ffmpegsumo-55.0.2883.75-148.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5218</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5218" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5218" source="CVE"/>
    <description>
    The extensions API in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly handled navigation within PDFs, which allowed a remote attacker to temporarily spoof the contents of the Omnibox (URL bar) via a crafted HTML page containing PDF data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009142897" comment="chromedriver-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142898" comment="chromium-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142896" comment="chromium-ffmpegsumo-55.0.2883.75-148.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5219</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5219" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5219" source="CVE"/>
    <description>
    A heap use after free in V8 in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009142897" comment="chromedriver-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142898" comment="chromium-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142896" comment="chromium-ffmpegsumo-55.0.2883.75-148.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5220</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5220" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5220" source="CVE"/>
    <description>
    PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly handled navigation within PDFs, which allowed a remote attacker to read local files via a crafted PDF file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009142897" comment="chromedriver-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142898" comment="chromium-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142896" comment="chromium-ffmpegsumo-55.0.2883.75-148.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5221</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5221" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5221" source="CVE"/>
    <description>
    Type confusion in libGLESv2 in ANGLE in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android possibly allowed a remote attacker to bypass buffer validation via a crafted HTML page.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009142897" comment="chromedriver-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142898" comment="chromium-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142896" comment="chromium-ffmpegsumo-55.0.2883.75-148.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5222</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5222" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5222" source="CVE"/>
    <description>
    Incorrect handling of invalid URLs in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009142897" comment="chromedriver-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142898" comment="chromium-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142896" comment="chromium-ffmpegsumo-55.0.2883.75-148.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5223</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5223" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5223" source="CVE"/>
    <description>
    Integer overflow in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption or DoS via a crafted PDF file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009142897" comment="chromedriver-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142898" comment="chromium-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142896" comment="chromium-ffmpegsumo-55.0.2883.75-148.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5224</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5224" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5224" source="CVE"/>
    <description>
    A timing attack on denormalized floating point arithmetic in SVG filters in Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to bypass the Same Origin Policy via a crafted HTML page.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009142897" comment="chromedriver-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142898" comment="chromium-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142896" comment="chromium-ffmpegsumo-55.0.2883.75-148.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5225</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5225" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5225" source="CVE"/>
    <description>
    Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly handled form actions, which allowed a remote attacker to bypass Content Security Policy via a crafted HTML page.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009142897" comment="chromedriver-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142898" comment="chromium-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142896" comment="chromium-ffmpegsumo-55.0.2883.75-148.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5226</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5226" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5226" source="CVE"/>
    <description>
    Blink in Google Chrome prior to 55.0.2883.75 for Linux, Windows and Mac executed javascript: URLs entered in the URL bar in the context of the current tab, which allowed a socially engineered user to XSS themselves by dragging and dropping a javascript: URL into the URL bar.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009142897" comment="chromedriver-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142898" comment="chromium-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142896" comment="chromium-ffmpegsumo-55.0.2883.75-148.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5238</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5238" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5238" source="CVE"/>
    <description>
    The get_cmd function in hw/scsi/esp.c in QEMU might allow local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) via vectors related to reading from the information transfer buffer in non-DMA mode.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133720" comment="xen-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133721" comment="xen-devel-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133722" comment="xen-doc-html-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133723" comment="xen-kmp-default-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133724" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133725" comment="xen-libs-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133726" comment="xen-libs-32bit-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133727" comment="xen-tools-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133728" comment="xen-tools-domU-4.4.4_05-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5240</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5240" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5240" source="CVE"/>
    <description>
    The DrawDashPolygon function in magick/render.c in GraphicsMagick before 1.3.24 and the SVG renderer in ImageMagick allow remote attackers to cause a denial of service (infinite loop) by converting a circularly defined SVG file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129696" comment="GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129697" comment="GraphicsMagick-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129698" comment="libGraphicsMagick++-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129699" comment="libGraphicsMagick++-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129700" comment="libGraphicsMagick-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129701" comment="libGraphicsMagick3-config-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129702" comment="libGraphicsMagickWand-Q16-2-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129703" comment="perl-GraphicsMagick-1.3.20-9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5241</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5241" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5241" source="CVE"/>
    <description>
    magick/render.c in GraphicsMagick before 1.3.24 allows remote attackers to cause a denial of service (arithmetic exception and application crash) via a crafted svg file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129696" comment="GraphicsMagick-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129697" comment="GraphicsMagick-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129698" comment="libGraphicsMagick++-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129699" comment="libGraphicsMagick++-devel-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129700" comment="libGraphicsMagick-Q16-3-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129701" comment="libGraphicsMagick3-config-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129702" comment="libGraphicsMagickWand-Q16-2-1.3.20-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129703" comment="perl-GraphicsMagick-1.3.20-9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5244</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5244" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5244" source="CVE"/>
    <description>
    The rds_inc_info_copy function in net/rds/recv.c in the Linux kernel through 4.6.3 does not initialize a certain structure member, which allows remote attackers to obtain sensitive information from kernel stack memory by reading an RDS message.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5250</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5250" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5250" source="CVE"/>
    <description>
    Mozilla Firefox before 48.0 allows remote attackers to obtain sensitive information about the previously retrieved page via Resource Timing API calls.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130814" comment="MozillaFirefox-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130815" comment="MozillaFirefox-branding-upstream-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130816" comment="MozillaFirefox-buildsymbols-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130817" comment="MozillaFirefox-devel-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130818" comment="MozillaFirefox-translations-common-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130819" comment="MozillaFirefox-translations-other-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130820" comment="libfreebl3-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130821" comment="libfreebl3-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130822" comment="libsoftokn3-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130823" comment="libsoftokn3-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130824" comment="mozilla-nss-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130825" comment="mozilla-nss-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130826" comment="mozilla-nss-certs-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130827" comment="mozilla-nss-certs-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130828" comment="mozilla-nss-devel-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130829" comment="mozilla-nss-sysinit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130830" comment="mozilla-nss-sysinit-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130831" comment="mozilla-nss-tools-3.24-37.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5251</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5251" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5251" source="CVE"/>
    <description>
    Mozilla Firefox before 48.0 allows remote attackers to spoof the location bar via crafted characters in the media type of a data: URL.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130814" comment="MozillaFirefox-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130815" comment="MozillaFirefox-branding-upstream-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130816" comment="MozillaFirefox-buildsymbols-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130817" comment="MozillaFirefox-devel-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130818" comment="MozillaFirefox-translations-common-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130819" comment="MozillaFirefox-translations-other-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130820" comment="libfreebl3-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130821" comment="libfreebl3-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130822" comment="libsoftokn3-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130823" comment="libsoftokn3-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130824" comment="mozilla-nss-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130825" comment="mozilla-nss-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130826" comment="mozilla-nss-certs-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130827" comment="mozilla-nss-certs-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130828" comment="mozilla-nss-devel-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130829" comment="mozilla-nss-sysinit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130830" comment="mozilla-nss-sysinit-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130831" comment="mozilla-nss-tools-3.24-37.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5252</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5252" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5252" source="CVE"/>
    <description>
    Stack-based buffer underflow in the mozilla::gfx::BasePoint4d function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code via crafted two-dimensional graphics data that is mishandled during clipping-region calculations.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130814" comment="MozillaFirefox-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130815" comment="MozillaFirefox-branding-upstream-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130816" comment="MozillaFirefox-buildsymbols-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130817" comment="MozillaFirefox-devel-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130818" comment="MozillaFirefox-translations-common-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130819" comment="MozillaFirefox-translations-other-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134172" comment="MozillaThunderbird-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134173" comment="MozillaThunderbird-buildsymbols-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134174" comment="MozillaThunderbird-devel-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134175" comment="MozillaThunderbird-translations-common-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134176" comment="MozillaThunderbird-translations-other-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130820" comment="libfreebl3-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130821" comment="libfreebl3-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130822" comment="libsoftokn3-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130823" comment="libsoftokn3-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130824" comment="mozilla-nss-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130825" comment="mozilla-nss-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130826" comment="mozilla-nss-certs-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130827" comment="mozilla-nss-certs-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130828" comment="mozilla-nss-devel-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130829" comment="mozilla-nss-sysinit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130830" comment="mozilla-nss-sysinit-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130831" comment="mozilla-nss-tools-3.24-37.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5254</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5254" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5254" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsXULPopupManager::KeyDown function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows attackers to execute arbitrary code or cause a denial of service (heap memory corruption and application crash) by leveraging keyboard access to use the Alt key during selection of top-level menu items.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130814" comment="MozillaFirefox-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130815" comment="MozillaFirefox-branding-upstream-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130816" comment="MozillaFirefox-buildsymbols-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130817" comment="MozillaFirefox-devel-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130818" comment="MozillaFirefox-translations-common-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130819" comment="MozillaFirefox-translations-other-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134172" comment="MozillaThunderbird-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134173" comment="MozillaThunderbird-buildsymbols-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134174" comment="MozillaThunderbird-devel-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134175" comment="MozillaThunderbird-translations-common-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134176" comment="MozillaThunderbird-translations-other-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130820" comment="libfreebl3-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130821" comment="libfreebl3-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130822" comment="libsoftokn3-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130823" comment="libsoftokn3-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130824" comment="mozilla-nss-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130825" comment="mozilla-nss-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130826" comment="mozilla-nss-certs-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130827" comment="mozilla-nss-certs-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130828" comment="mozilla-nss-devel-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130829" comment="mozilla-nss-sysinit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130830" comment="mozilla-nss-sysinit-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130831" comment="mozilla-nss-tools-3.24-37.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5255</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5255" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5255" source="CVE"/>
    <description>
    Use-after-free vulnerability in the js::PreliminaryObjectArray::sweep function in Mozilla Firefox before 48.0 allows remote attackers to execute arbitrary code via crafted JavaScript that is mishandled during incremental garbage collection.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130814" comment="MozillaFirefox-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130815" comment="MozillaFirefox-branding-upstream-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130816" comment="MozillaFirefox-buildsymbols-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130817" comment="MozillaFirefox-devel-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130818" comment="MozillaFirefox-translations-common-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130819" comment="MozillaFirefox-translations-other-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130820" comment="libfreebl3-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130821" comment="libfreebl3-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130822" comment="libsoftokn3-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130823" comment="libsoftokn3-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130824" comment="mozilla-nss-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130825" comment="mozilla-nss-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130826" comment="mozilla-nss-certs-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130827" comment="mozilla-nss-certs-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130828" comment="mozilla-nss-devel-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130829" comment="mozilla-nss-sysinit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130830" comment="mozilla-nss-sysinit-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130831" comment="mozilla-nss-tools-3.24-37.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5256</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5256" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5256" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 49.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134154" comment="MozillaFirefox-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134155" comment="MozillaFirefox-branding-upstream-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134156" comment="MozillaFirefox-buildsymbols-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134157" comment="MozillaFirefox-devel-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134158" comment="MozillaFirefox-translations-common-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134159" comment="MozillaFirefox-translations-other-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134160" comment="libfreebl3-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134161" comment="libfreebl3-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134162" comment="libsoftokn3-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134163" comment="libsoftokn3-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134164" comment="mozilla-nss-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134165" comment="mozilla-nss-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134166" comment="mozilla-nss-certs-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134167" comment="mozilla-nss-certs-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134168" comment="mozilla-nss-devel-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134169" comment="mozilla-nss-sysinit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134170" comment="mozilla-nss-sysinit-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134171" comment="mozilla-nss-tools-3.25-46.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165257" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5257</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5257" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5257" source="CVE"/>
    <description>
    Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 49.0 and Firefox ESR 45.x before 45.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134154" comment="MozillaFirefox-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134155" comment="MozillaFirefox-branding-upstream-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134156" comment="MozillaFirefox-buildsymbols-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134157" comment="MozillaFirefox-devel-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134158" comment="MozillaFirefox-translations-common-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134159" comment="MozillaFirefox-translations-other-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134160" comment="libfreebl3-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134161" comment="libfreebl3-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134162" comment="libsoftokn3-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134163" comment="libsoftokn3-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134164" comment="mozilla-nss-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134165" comment="mozilla-nss-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134166" comment="mozilla-nss-certs-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134167" comment="mozilla-nss-certs-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134168" comment="mozilla-nss-devel-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134169" comment="mozilla-nss-sysinit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134170" comment="mozilla-nss-sysinit-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134171" comment="mozilla-nss-tools-3.25-46.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5258</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5258" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5258" source="CVE"/>
    <description>
    Use-after-free vulnerability in the WebRTC socket thread in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code by leveraging incorrect free operations on DTLS objects during the shutdown of a WebRTC session.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130814" comment="MozillaFirefox-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130815" comment="MozillaFirefox-branding-upstream-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130816" comment="MozillaFirefox-buildsymbols-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130817" comment="MozillaFirefox-devel-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130818" comment="MozillaFirefox-translations-common-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130819" comment="MozillaFirefox-translations-other-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134172" comment="MozillaThunderbird-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134173" comment="MozillaThunderbird-buildsymbols-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134174" comment="MozillaThunderbird-devel-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134175" comment="MozillaThunderbird-translations-common-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134176" comment="MozillaThunderbird-translations-other-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130820" comment="libfreebl3-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130821" comment="libfreebl3-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130822" comment="libsoftokn3-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130823" comment="libsoftokn3-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130824" comment="mozilla-nss-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130825" comment="mozilla-nss-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130826" comment="mozilla-nss-certs-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130827" comment="mozilla-nss-certs-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130828" comment="mozilla-nss-devel-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130829" comment="mozilla-nss-sysinit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130830" comment="mozilla-nss-sysinit-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130831" comment="mozilla-nss-tools-3.24-37.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5259</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5259" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5259" source="CVE"/>
    <description>
    Use-after-free vulnerability in the CanonicalizeXPCOMParticipant function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code via a script that closes its own Service Worker within a nested sync event loop.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130814" comment="MozillaFirefox-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130815" comment="MozillaFirefox-branding-upstream-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130816" comment="MozillaFirefox-buildsymbols-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130817" comment="MozillaFirefox-devel-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130818" comment="MozillaFirefox-translations-common-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130819" comment="MozillaFirefox-translations-other-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134172" comment="MozillaThunderbird-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134173" comment="MozillaThunderbird-buildsymbols-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134174" comment="MozillaThunderbird-devel-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134175" comment="MozillaThunderbird-translations-common-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134176" comment="MozillaThunderbird-translations-other-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130820" comment="libfreebl3-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130821" comment="libfreebl3-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130822" comment="libsoftokn3-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130823" comment="libsoftokn3-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130824" comment="mozilla-nss-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130825" comment="mozilla-nss-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130826" comment="mozilla-nss-certs-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130827" comment="mozilla-nss-certs-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130828" comment="mozilla-nss-devel-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130829" comment="mozilla-nss-sysinit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130830" comment="mozilla-nss-sysinit-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130831" comment="mozilla-nss-tools-3.24-37.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165260" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5260</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5260" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5260" source="CVE"/>
    <description>
    Mozilla Firefox before 48.0 mishandles changes from 'INPUT type="password"' to 'INPUT type="text"' within a single Session Manager session, which might allow attackers to discover cleartext passwords by reading a session restoration file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130814" comment="MozillaFirefox-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130815" comment="MozillaFirefox-branding-upstream-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130816" comment="MozillaFirefox-buildsymbols-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130817" comment="MozillaFirefox-devel-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130818" comment="MozillaFirefox-translations-common-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130819" comment="MozillaFirefox-translations-other-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130820" comment="libfreebl3-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130821" comment="libfreebl3-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130822" comment="libsoftokn3-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130823" comment="libsoftokn3-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130824" comment="mozilla-nss-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130825" comment="mozilla-nss-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130826" comment="mozilla-nss-certs-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130827" comment="mozilla-nss-certs-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130828" comment="mozilla-nss-devel-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130829" comment="mozilla-nss-sysinit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130830" comment="mozilla-nss-sysinit-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130831" comment="mozilla-nss-tools-3.24-37.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5261</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5261" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5261" source="CVE"/>
    <description>
    Integer overflow in the WebSocketChannel class in the WebSockets subsystem in Mozilla Firefox before 48.0 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted packets that trigger incorrect buffer-resize operations during buffering.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130814" comment="MozillaFirefox-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130815" comment="MozillaFirefox-branding-upstream-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130816" comment="MozillaFirefox-buildsymbols-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130817" comment="MozillaFirefox-devel-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130818" comment="MozillaFirefox-translations-common-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130819" comment="MozillaFirefox-translations-other-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130820" comment="libfreebl3-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130821" comment="libfreebl3-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130822" comment="libsoftokn3-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130823" comment="libsoftokn3-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130824" comment="mozilla-nss-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130825" comment="mozilla-nss-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130826" comment="mozilla-nss-certs-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130827" comment="mozilla-nss-certs-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130828" comment="mozilla-nss-devel-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130829" comment="mozilla-nss-sysinit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130830" comment="mozilla-nss-sysinit-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130831" comment="mozilla-nss-tools-3.24-37.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5262</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5262" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5262" source="CVE"/>
    <description>
    Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 process JavaScript event-handler attributes of a MARQUEE element within a sandboxed IFRAME element that lacks the sandbox="allow-scripts" attribute value, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130814" comment="MozillaFirefox-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130815" comment="MozillaFirefox-branding-upstream-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130816" comment="MozillaFirefox-buildsymbols-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130817" comment="MozillaFirefox-devel-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130818" comment="MozillaFirefox-translations-common-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130819" comment="MozillaFirefox-translations-other-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134172" comment="MozillaThunderbird-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134173" comment="MozillaThunderbird-buildsymbols-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134174" comment="MozillaThunderbird-devel-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134175" comment="MozillaThunderbird-translations-common-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134176" comment="MozillaThunderbird-translations-other-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130820" comment="libfreebl3-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130821" comment="libfreebl3-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130822" comment="libsoftokn3-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130823" comment="libsoftokn3-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130824" comment="mozilla-nss-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130825" comment="mozilla-nss-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130826" comment="mozilla-nss-certs-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130827" comment="mozilla-nss-certs-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130828" comment="mozilla-nss-devel-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130829" comment="mozilla-nss-sysinit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130830" comment="mozilla-nss-sysinit-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130831" comment="mozilla-nss-tools-3.24-37.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5263</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5263" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5263" source="CVE"/>
    <description>
    The nsDisplayList::HitTest function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 mishandles rendering display transformation, which allows remote attackers to execute arbitrary code via a crafted web site that leverages "type confusion."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130814" comment="MozillaFirefox-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130815" comment="MozillaFirefox-branding-upstream-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130816" comment="MozillaFirefox-buildsymbols-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130817" comment="MozillaFirefox-devel-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130818" comment="MozillaFirefox-translations-common-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130819" comment="MozillaFirefox-translations-other-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134172" comment="MozillaThunderbird-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134173" comment="MozillaThunderbird-buildsymbols-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134174" comment="MozillaThunderbird-devel-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134175" comment="MozillaThunderbird-translations-common-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134176" comment="MozillaThunderbird-translations-other-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130820" comment="libfreebl3-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130821" comment="libfreebl3-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130822" comment="libsoftokn3-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130823" comment="libsoftokn3-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130824" comment="mozilla-nss-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130825" comment="mozilla-nss-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130826" comment="mozilla-nss-certs-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130827" comment="mozilla-nss-certs-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130828" comment="mozilla-nss-devel-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130829" comment="mozilla-nss-sysinit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130830" comment="mozilla-nss-sysinit-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130831" comment="mozilla-nss-tools-3.24-37.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5264</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5264" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5264" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsNodeUtils::NativeAnonymousChildListChange function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via an SVG element that is mishandled during effect application.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130814" comment="MozillaFirefox-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130815" comment="MozillaFirefox-branding-upstream-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130816" comment="MozillaFirefox-buildsymbols-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130817" comment="MozillaFirefox-devel-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130818" comment="MozillaFirefox-translations-common-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130819" comment="MozillaFirefox-translations-other-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134172" comment="MozillaThunderbird-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134173" comment="MozillaThunderbird-buildsymbols-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134174" comment="MozillaThunderbird-devel-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134175" comment="MozillaThunderbird-translations-common-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134176" comment="MozillaThunderbird-translations-other-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130820" comment="libfreebl3-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130821" comment="libfreebl3-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130822" comment="libsoftokn3-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130823" comment="libsoftokn3-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130824" comment="mozilla-nss-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130825" comment="mozilla-nss-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130826" comment="mozilla-nss-certs-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130827" comment="mozilla-nss-certs-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130828" comment="mozilla-nss-devel-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130829" comment="mozilla-nss-sysinit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130830" comment="mozilla-nss-sysinit-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130831" comment="mozilla-nss-tools-3.24-37.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5265</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5265" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5265" source="CVE"/>
    <description>
    Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allow user-assisted remote attackers to bypass the Same Origin Policy, and conduct Universal XSS (UXSS) attacks or read arbitrary files, by arranging for the presence of a crafted HTML document and a crafted shortcut file in the same local directory.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130814" comment="MozillaFirefox-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130815" comment="MozillaFirefox-branding-upstream-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130816" comment="MozillaFirefox-buildsymbols-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130817" comment="MozillaFirefox-devel-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130818" comment="MozillaFirefox-translations-common-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130819" comment="MozillaFirefox-translations-other-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134172" comment="MozillaThunderbird-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134173" comment="MozillaThunderbird-buildsymbols-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134174" comment="MozillaThunderbird-devel-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134175" comment="MozillaThunderbird-translations-common-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134176" comment="MozillaThunderbird-translations-other-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130820" comment="libfreebl3-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130821" comment="libfreebl3-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130822" comment="libsoftokn3-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130823" comment="libsoftokn3-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130824" comment="mozilla-nss-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130825" comment="mozilla-nss-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130826" comment="mozilla-nss-certs-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130827" comment="mozilla-nss-certs-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130828" comment="mozilla-nss-devel-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130829" comment="mozilla-nss-sysinit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130830" comment="mozilla-nss-sysinit-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130831" comment="mozilla-nss-tools-3.24-37.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5266</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5266" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5266" source="CVE"/>
    <description>
    Mozilla Firefox before 48.0 does not properly restrict drag-and-drop (aka dataTransfer) actions for file: URIs, which allows user-assisted remote attackers to access local files via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130814" comment="MozillaFirefox-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130815" comment="MozillaFirefox-branding-upstream-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130816" comment="MozillaFirefox-buildsymbols-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130817" comment="MozillaFirefox-devel-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130818" comment="MozillaFirefox-translations-common-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130819" comment="MozillaFirefox-translations-other-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130820" comment="libfreebl3-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130821" comment="libfreebl3-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130822" comment="libsoftokn3-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130823" comment="libsoftokn3-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130824" comment="mozilla-nss-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130825" comment="mozilla-nss-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130826" comment="mozilla-nss-certs-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130827" comment="mozilla-nss-certs-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130828" comment="mozilla-nss-devel-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130829" comment="mozilla-nss-sysinit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130830" comment="mozilla-nss-sysinit-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130831" comment="mozilla-nss-tools-3.24-37.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5268</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5268" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5268" source="CVE"/>
    <description>
    Mozilla Firefox before 48.0 does not properly set the LINKABLE and URI_SAFE_FOR_UNTRUSTED_CONTENT flags of about: URLs that are used for error pages, which makes it easier for remote attackers to conduct spoofing attacks via a crafted URL, as demonstrated by misleading text after an about:neterror?d= substring.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130814" comment="MozillaFirefox-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130815" comment="MozillaFirefox-branding-upstream-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130816" comment="MozillaFirefox-buildsymbols-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130817" comment="MozillaFirefox-devel-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130818" comment="MozillaFirefox-translations-common-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130819" comment="MozillaFirefox-translations-other-48.0-74.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130820" comment="libfreebl3-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130821" comment="libfreebl3-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130822" comment="libsoftokn3-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130823" comment="libsoftokn3-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130824" comment="mozilla-nss-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130825" comment="mozilla-nss-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130826" comment="mozilla-nss-certs-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130827" comment="mozilla-nss-certs-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130828" comment="mozilla-nss-devel-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130829" comment="mozilla-nss-sysinit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130830" comment="mozilla-nss-sysinit-32bit-3.24-37.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130831" comment="mozilla-nss-tools-3.24-37.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5270</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5270" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5270" source="CVE"/>
    <description>
    Heap-based buffer overflow in the nsCaseTransformTextRunFactory::TransformString function in Mozilla Firefox before 49.0 and Firefox ESR 45.x before 45.4 allows remote attackers to cause a denial of service (boolean out-of-bounds write) or possibly have unspecified other impact via Unicode characters that are mishandled during text conversion.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134154" comment="MozillaFirefox-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134155" comment="MozillaFirefox-branding-upstream-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134156" comment="MozillaFirefox-buildsymbols-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134157" comment="MozillaFirefox-devel-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134158" comment="MozillaFirefox-translations-common-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134159" comment="MozillaFirefox-translations-other-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134160" comment="libfreebl3-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134161" comment="libfreebl3-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134162" comment="libsoftokn3-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134163" comment="libsoftokn3-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134164" comment="mozilla-nss-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134165" comment="mozilla-nss-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134166" comment="mozilla-nss-certs-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134167" comment="mozilla-nss-certs-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134168" comment="mozilla-nss-devel-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134169" comment="mozilla-nss-sysinit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134170" comment="mozilla-nss-sysinit-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134171" comment="mozilla-nss-tools-3.25-46.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5271</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5271" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5271" source="CVE"/>
    <description>
    The PropertyProvider::GetSpacingInternal function in Mozilla Firefox before 49.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via text runs in conjunction with a "display: contents" Cascading Style Sheets (CSS) property.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134154" comment="MozillaFirefox-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134155" comment="MozillaFirefox-branding-upstream-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134156" comment="MozillaFirefox-buildsymbols-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134157" comment="MozillaFirefox-devel-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134158" comment="MozillaFirefox-translations-common-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134159" comment="MozillaFirefox-translations-other-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134160" comment="libfreebl3-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134161" comment="libfreebl3-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134162" comment="libsoftokn3-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134163" comment="libsoftokn3-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134164" comment="mozilla-nss-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134165" comment="mozilla-nss-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134166" comment="mozilla-nss-certs-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134167" comment="mozilla-nss-certs-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134168" comment="mozilla-nss-devel-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134169" comment="mozilla-nss-sysinit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134170" comment="mozilla-nss-sysinit-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134171" comment="mozilla-nss-tools-3.25-46.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5272</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5272" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5272" source="CVE"/>
    <description>
    The nsImageGeometryMixin class in Mozilla Firefox before 49.0 and Firefox ESR 45.x before 45.4 does not properly perform a cast of an unspecified variable during handling of INPUT elements, which allows remote attackers to execute arbitrary code via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134154" comment="MozillaFirefox-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134155" comment="MozillaFirefox-branding-upstream-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134156" comment="MozillaFirefox-buildsymbols-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134157" comment="MozillaFirefox-devel-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134158" comment="MozillaFirefox-translations-common-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134159" comment="MozillaFirefox-translations-other-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134160" comment="libfreebl3-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134161" comment="libfreebl3-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134162" comment="libsoftokn3-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134163" comment="libsoftokn3-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134164" comment="mozilla-nss-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134165" comment="mozilla-nss-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134166" comment="mozilla-nss-certs-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134167" comment="mozilla-nss-certs-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134168" comment="mozilla-nss-devel-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134169" comment="mozilla-nss-sysinit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134170" comment="mozilla-nss-sysinit-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134171" comment="mozilla-nss-tools-3.25-46.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5273</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5273" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5273" source="CVE"/>
    <description>
    The mozilla::a11y::HyperTextAccessible::GetChildOffset function in the accessibility implementation in Mozilla Firefox before 49.0 allows remote attackers to execute arbitrary code via a crafted web site.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134154" comment="MozillaFirefox-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134155" comment="MozillaFirefox-branding-upstream-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134156" comment="MozillaFirefox-buildsymbols-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134157" comment="MozillaFirefox-devel-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134158" comment="MozillaFirefox-translations-common-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134159" comment="MozillaFirefox-translations-other-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134160" comment="libfreebl3-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134161" comment="libfreebl3-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134162" comment="libsoftokn3-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134163" comment="libsoftokn3-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134164" comment="mozilla-nss-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134165" comment="mozilla-nss-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134166" comment="mozilla-nss-certs-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134167" comment="mozilla-nss-certs-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134168" comment="mozilla-nss-devel-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134169" comment="mozilla-nss-sysinit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134170" comment="mozilla-nss-sysinit-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134171" comment="mozilla-nss-tools-3.25-46.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5274</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5274" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5274" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsFrameManager::CaptureFrameState function in Mozilla Firefox before 49.0 and Firefox ESR 45.x before 45.4 allows remote attackers to execute arbitrary code by leveraging improper interaction between restyling and the Web Animations model implementation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134154" comment="MozillaFirefox-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134155" comment="MozillaFirefox-branding-upstream-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134156" comment="MozillaFirefox-buildsymbols-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134157" comment="MozillaFirefox-devel-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134158" comment="MozillaFirefox-translations-common-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134159" comment="MozillaFirefox-translations-other-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134160" comment="libfreebl3-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134161" comment="libfreebl3-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134162" comment="libsoftokn3-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134163" comment="libsoftokn3-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134164" comment="mozilla-nss-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134165" comment="mozilla-nss-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134166" comment="mozilla-nss-certs-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134167" comment="mozilla-nss-certs-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134168" comment="mozilla-nss-devel-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134169" comment="mozilla-nss-sysinit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134170" comment="mozilla-nss-sysinit-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134171" comment="mozilla-nss-tools-3.25-46.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5275</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5275" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5275" source="CVE"/>
    <description>
    Buffer overflow in the mozilla::gfx::FilterSupport::ComputeSourceNeededRegions function in Mozilla Firefox before 49.0 allows remote attackers to execute arbitrary code by leveraging improper interaction between empty filters and CANVAS element rendering.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134154" comment="MozillaFirefox-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134155" comment="MozillaFirefox-branding-upstream-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134156" comment="MozillaFirefox-buildsymbols-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134157" comment="MozillaFirefox-devel-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134158" comment="MozillaFirefox-translations-common-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134159" comment="MozillaFirefox-translations-other-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134160" comment="libfreebl3-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134161" comment="libfreebl3-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134162" comment="libsoftokn3-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134163" comment="libsoftokn3-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134164" comment="mozilla-nss-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134165" comment="mozilla-nss-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134166" comment="mozilla-nss-certs-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134167" comment="mozilla-nss-certs-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134168" comment="mozilla-nss-devel-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134169" comment="mozilla-nss-sysinit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134170" comment="mozilla-nss-sysinit-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134171" comment="mozilla-nss-tools-3.25-46.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5276</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5276" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5276" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::a11y::DocAccessible::ProcessInvalidationList function in Mozilla Firefox before 49.0 and Firefox ESR 45.x before 45.4 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via an aria-owns attribute.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134154" comment="MozillaFirefox-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134155" comment="MozillaFirefox-branding-upstream-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134156" comment="MozillaFirefox-buildsymbols-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134157" comment="MozillaFirefox-devel-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134158" comment="MozillaFirefox-translations-common-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134159" comment="MozillaFirefox-translations-other-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134160" comment="libfreebl3-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134161" comment="libfreebl3-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134162" comment="libsoftokn3-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134163" comment="libsoftokn3-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134164" comment="mozilla-nss-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134165" comment="mozilla-nss-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134166" comment="mozilla-nss-certs-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134167" comment="mozilla-nss-certs-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134168" comment="mozilla-nss-devel-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134169" comment="mozilla-nss-sysinit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134170" comment="mozilla-nss-sysinit-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134171" comment="mozilla-nss-tools-3.25-46.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5277</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5277" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5277" source="CVE"/>
    <description>
    Use-after-free vulnerability in the nsRefreshDriver::Tick function in Mozilla Firefox before 49.0 and Firefox ESR 45.x before 45.4 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by leveraging improper interaction between timeline destruction and the Web Animations model implementation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134154" comment="MozillaFirefox-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134155" comment="MozillaFirefox-branding-upstream-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134156" comment="MozillaFirefox-buildsymbols-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134157" comment="MozillaFirefox-devel-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134158" comment="MozillaFirefox-translations-common-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134159" comment="MozillaFirefox-translations-other-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134160" comment="libfreebl3-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134161" comment="libfreebl3-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134162" comment="libsoftokn3-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134163" comment="libsoftokn3-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134164" comment="mozilla-nss-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134165" comment="mozilla-nss-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134166" comment="mozilla-nss-certs-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134167" comment="mozilla-nss-certs-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134168" comment="mozilla-nss-devel-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134169" comment="mozilla-nss-sysinit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134170" comment="mozilla-nss-sysinit-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134171" comment="mozilla-nss-tools-3.25-46.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5278</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5278" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5278" source="CVE"/>
    <description>
    Heap-based buffer overflow in the nsBMPEncoder::AddImageFrame function in Mozilla Firefox before 49.0 and Firefox ESR 45.x before 45.4 allows remote attackers to execute arbitrary code via a crafted image data that is mishandled during the encoding of an image frame to an image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134154" comment="MozillaFirefox-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134155" comment="MozillaFirefox-branding-upstream-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134156" comment="MozillaFirefox-buildsymbols-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134157" comment="MozillaFirefox-devel-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134158" comment="MozillaFirefox-translations-common-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134159" comment="MozillaFirefox-translations-other-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134160" comment="libfreebl3-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134161" comment="libfreebl3-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134162" comment="libsoftokn3-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134163" comment="libsoftokn3-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134164" comment="mozilla-nss-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134165" comment="mozilla-nss-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134166" comment="mozilla-nss-certs-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134167" comment="mozilla-nss-certs-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134168" comment="mozilla-nss-devel-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134169" comment="mozilla-nss-sysinit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134170" comment="mozilla-nss-sysinit-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134171" comment="mozilla-nss-tools-3.25-46.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165279" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5279</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5279" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5279" source="CVE"/>
    <description>
    Mozilla Firefox before 49.0 allows user-assisted remote attackers to obtain sensitive full-pathname information during a local-file drag-and-drop operation via crafted JavaScript code.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134154" comment="MozillaFirefox-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134155" comment="MozillaFirefox-branding-upstream-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134156" comment="MozillaFirefox-buildsymbols-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134157" comment="MozillaFirefox-devel-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134158" comment="MozillaFirefox-translations-common-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134159" comment="MozillaFirefox-translations-other-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134160" comment="libfreebl3-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134161" comment="libfreebl3-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134162" comment="libsoftokn3-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134163" comment="libsoftokn3-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134164" comment="mozilla-nss-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134165" comment="mozilla-nss-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134166" comment="mozilla-nss-certs-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134167" comment="mozilla-nss-certs-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134168" comment="mozilla-nss-devel-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134169" comment="mozilla-nss-sysinit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134170" comment="mozilla-nss-sysinit-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134171" comment="mozilla-nss-tools-3.25-46.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165280" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5280</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5280" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5280" source="CVE"/>
    <description>
    Use-after-free vulnerability in the mozilla::nsTextNodeDirectionalityMap::RemoveElementFromMap function in Mozilla Firefox before 49.0 and Firefox ESR 45.x before 45.4 allows remote attackers to execute arbitrary code via bidirectional text.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134154" comment="MozillaFirefox-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134155" comment="MozillaFirefox-branding-upstream-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134156" comment="MozillaFirefox-buildsymbols-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134157" comment="MozillaFirefox-devel-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134158" comment="MozillaFirefox-translations-common-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134159" comment="MozillaFirefox-translations-other-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134160" comment="libfreebl3-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134161" comment="libfreebl3-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134162" comment="libsoftokn3-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134163" comment="libsoftokn3-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134164" comment="mozilla-nss-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134165" comment="mozilla-nss-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134166" comment="mozilla-nss-certs-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134167" comment="mozilla-nss-certs-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134168" comment="mozilla-nss-devel-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134169" comment="mozilla-nss-sysinit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134170" comment="mozilla-nss-sysinit-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134171" comment="mozilla-nss-tools-3.25-46.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5281</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5281" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5281" source="CVE"/>
    <description>
    Use-after-free vulnerability in the DOMSVGLength class in Mozilla Firefox before 49.0 and Firefox ESR 45.x before 45.4 allows remote attackers to execute arbitrary code by leveraging improper interaction between JavaScript code and an SVG document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134154" comment="MozillaFirefox-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134155" comment="MozillaFirefox-branding-upstream-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134156" comment="MozillaFirefox-buildsymbols-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134157" comment="MozillaFirefox-devel-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134158" comment="MozillaFirefox-translations-common-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134159" comment="MozillaFirefox-translations-other-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134160" comment="libfreebl3-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134161" comment="libfreebl3-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134162" comment="libsoftokn3-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134163" comment="libsoftokn3-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134164" comment="mozilla-nss-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134165" comment="mozilla-nss-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134166" comment="mozilla-nss-certs-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134167" comment="mozilla-nss-certs-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134168" comment="mozilla-nss-devel-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134169" comment="mozilla-nss-sysinit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134170" comment="mozilla-nss-sysinit-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134171" comment="mozilla-nss-tools-3.25-46.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5282</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5282" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5282" source="CVE"/>
    <description>
    Mozilla Firefox before 49.0 does not properly restrict the scheme in favicon requests, which might allow remote attackers to obtain sensitive information via unspecified vectors, as demonstrated by a jar: URL for a favicon resource.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134154" comment="MozillaFirefox-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134155" comment="MozillaFirefox-branding-upstream-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134156" comment="MozillaFirefox-buildsymbols-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134157" comment="MozillaFirefox-devel-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134158" comment="MozillaFirefox-translations-common-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134159" comment="MozillaFirefox-translations-other-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134160" comment="libfreebl3-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134161" comment="libfreebl3-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134162" comment="libsoftokn3-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134163" comment="libsoftokn3-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134164" comment="mozilla-nss-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134165" comment="mozilla-nss-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134166" comment="mozilla-nss-certs-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134167" comment="mozilla-nss-certs-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134168" comment="mozilla-nss-devel-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134169" comment="mozilla-nss-sysinit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134170" comment="mozilla-nss-sysinit-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134171" comment="mozilla-nss-tools-3.25-46.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5283</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5283" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5283" source="CVE"/>
    <description>
    Mozilla Firefox before 49.0 allows remote attackers to bypass the Same Origin Policy via a crafted fragment identifier in the SRC attribute of an IFRAME element, leading to insufficient restrictions on link-color information after a document is resized.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134154" comment="MozillaFirefox-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134155" comment="MozillaFirefox-branding-upstream-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134156" comment="MozillaFirefox-buildsymbols-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134157" comment="MozillaFirefox-devel-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134158" comment="MozillaFirefox-translations-common-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134159" comment="MozillaFirefox-translations-other-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134160" comment="libfreebl3-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134161" comment="libfreebl3-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134162" comment="libsoftokn3-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134163" comment="libsoftokn3-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134164" comment="mozilla-nss-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134165" comment="mozilla-nss-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134166" comment="mozilla-nss-certs-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134167" comment="mozilla-nss-certs-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134168" comment="mozilla-nss-devel-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134169" comment="mozilla-nss-sysinit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134170" comment="mozilla-nss-sysinit-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134171" comment="mozilla-nss-tools-3.25-46.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5284</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5284" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5284" source="CVE"/>
    <description>
    Mozilla Firefox before 49.0 and Firefox ESR 45.x before 45.4 rely on unintended expiration dates for Preloaded Public Key Pinning, which allows man-in-the-middle attackers to spoof add-on updates by leveraging possession of an X.509 server certificate for addons.mozilla.org signed by an arbitrary built-in Certification Authority.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134154" comment="MozillaFirefox-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134155" comment="MozillaFirefox-branding-upstream-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134156" comment="MozillaFirefox-buildsymbols-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134157" comment="MozillaFirefox-devel-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134158" comment="MozillaFirefox-translations-common-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134159" comment="MozillaFirefox-translations-other-49.0-80.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134160" comment="libfreebl3-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134161" comment="libfreebl3-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134162" comment="libsoftokn3-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134163" comment="libsoftokn3-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134164" comment="mozilla-nss-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134165" comment="mozilla-nss-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134166" comment="mozilla-nss-certs-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134167" comment="mozilla-nss-certs-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134168" comment="mozilla-nss-devel-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134169" comment="mozilla-nss-sysinit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134170" comment="mozilla-nss-sysinit-32bit-3.25-46.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134171" comment="mozilla-nss-tools-3.25-46.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5287</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5287" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5287" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134188" comment="MozillaFirefox-49.0.2-84.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134189" comment="MozillaFirefox-branding-upstream-49.0.2-84.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134190" comment="MozillaFirefox-buildsymbols-49.0.2-84.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134191" comment="MozillaFirefox-devel-49.0.2-84.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134192" comment="MozillaFirefox-translations-common-49.0.2-84.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134193" comment="MozillaFirefox-translations-other-49.0.2-84.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5288</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5288" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5288" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134188" comment="MozillaFirefox-49.0.2-84.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134189" comment="MozillaFirefox-branding-upstream-49.0.2-84.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134190" comment="MozillaFirefox-buildsymbols-49.0.2-84.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134191" comment="MozillaFirefox-devel-49.0.2-84.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134192" comment="MozillaFirefox-translations-common-49.0.2-84.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134193" comment="MozillaFirefox-translations-other-49.0.2-84.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5289</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5289" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5289" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135702" comment="MozillaFirefox-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135703" comment="MozillaFirefox-branding-upstream-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135704" comment="MozillaFirefox-buildsymbols-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135705" comment="MozillaFirefox-devel-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135706" comment="MozillaFirefox-translations-common-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135707" comment="MozillaFirefox-translations-other-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135708" comment="libfreebl3-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135709" comment="libfreebl3-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135710" comment="libsoftokn3-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135711" comment="libsoftokn3-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135712" comment="mozilla-nss-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135713" comment="mozilla-nss-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135714" comment="mozilla-nss-certs-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135715" comment="mozilla-nss-certs-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135716" comment="mozilla-nss-devel-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135717" comment="mozilla-nss-sysinit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135718" comment="mozilla-nss-sysinit-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135719" comment="mozilla-nss-tools-3.26.2-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5290</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5290" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5290" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135702" comment="MozillaFirefox-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135703" comment="MozillaFirefox-branding-upstream-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135704" comment="MozillaFirefox-buildsymbols-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135705" comment="MozillaFirefox-devel-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135706" comment="MozillaFirefox-translations-common-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135707" comment="MozillaFirefox-translations-other-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135708" comment="libfreebl3-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135709" comment="libfreebl3-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135710" comment="libsoftokn3-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135711" comment="libsoftokn3-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135712" comment="mozilla-nss-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135713" comment="mozilla-nss-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135714" comment="mozilla-nss-certs-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135715" comment="mozilla-nss-certs-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135716" comment="mozilla-nss-devel-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135717" comment="mozilla-nss-sysinit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135718" comment="mozilla-nss-sysinit-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135719" comment="mozilla-nss-tools-3.26.2-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5291</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5291" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5291" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135702" comment="MozillaFirefox-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135703" comment="MozillaFirefox-branding-upstream-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135704" comment="MozillaFirefox-buildsymbols-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135705" comment="MozillaFirefox-devel-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135706" comment="MozillaFirefox-translations-common-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135707" comment="MozillaFirefox-translations-other-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135708" comment="libfreebl3-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135709" comment="libfreebl3-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135710" comment="libsoftokn3-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135711" comment="libsoftokn3-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135712" comment="mozilla-nss-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135713" comment="mozilla-nss-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135714" comment="mozilla-nss-certs-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135715" comment="mozilla-nss-certs-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135716" comment="mozilla-nss-devel-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135717" comment="mozilla-nss-sysinit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135718" comment="mozilla-nss-sysinit-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135719" comment="mozilla-nss-tools-3.26.2-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5292</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5292" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5292" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135702" comment="MozillaFirefox-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135703" comment="MozillaFirefox-branding-upstream-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135704" comment="MozillaFirefox-buildsymbols-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135705" comment="MozillaFirefox-devel-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135706" comment="MozillaFirefox-translations-common-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135707" comment="MozillaFirefox-translations-other-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135708" comment="libfreebl3-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135709" comment="libfreebl3-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135710" comment="libsoftokn3-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135711" comment="libsoftokn3-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135712" comment="mozilla-nss-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135713" comment="mozilla-nss-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135714" comment="mozilla-nss-certs-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135715" comment="mozilla-nss-certs-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135716" comment="mozilla-nss-devel-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135717" comment="mozilla-nss-sysinit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135718" comment="mozilla-nss-sysinit-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135719" comment="mozilla-nss-tools-3.26.2-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5296</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5296" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5296" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135702" comment="MozillaFirefox-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135703" comment="MozillaFirefox-branding-upstream-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135704" comment="MozillaFirefox-buildsymbols-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135705" comment="MozillaFirefox-devel-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135706" comment="MozillaFirefox-translations-common-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135707" comment="MozillaFirefox-translations-other-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135708" comment="libfreebl3-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135709" comment="libfreebl3-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135710" comment="libsoftokn3-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135711" comment="libsoftokn3-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135712" comment="mozilla-nss-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135713" comment="mozilla-nss-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135714" comment="mozilla-nss-certs-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135715" comment="mozilla-nss-certs-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135716" comment="mozilla-nss-devel-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135717" comment="mozilla-nss-sysinit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135718" comment="mozilla-nss-sysinit-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135719" comment="mozilla-nss-tools-3.26.2-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5297</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5297" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5297" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135702" comment="MozillaFirefox-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135703" comment="MozillaFirefox-branding-upstream-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135704" comment="MozillaFirefox-buildsymbols-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135705" comment="MozillaFirefox-devel-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135706" comment="MozillaFirefox-translations-common-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135707" comment="MozillaFirefox-translations-other-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135708" comment="libfreebl3-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135709" comment="libfreebl3-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135710" comment="libsoftokn3-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135711" comment="libsoftokn3-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135712" comment="mozilla-nss-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135713" comment="mozilla-nss-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135714" comment="mozilla-nss-certs-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135715" comment="mozilla-nss-certs-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135716" comment="mozilla-nss-devel-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135717" comment="mozilla-nss-sysinit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135718" comment="mozilla-nss-sysinit-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135719" comment="mozilla-nss-tools-3.26.2-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5301</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5301" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5301" source="CVE"/>
    <description>
    The parse_chunk_header function in libtorrent before 1.1.1 allows remote attackers to cause a denial of service (crash) via a crafted (1) HTTP response or possibly a (2) UPnP broadcast.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129083" comment="libtorrent-rasterbar-0.16.17-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129084" comment="libtorrent-rasterbar-devel-0.16.17-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129085" comment="libtorrent-rasterbar-doc-0.16.17-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129077" comment="libtorrent-rasterbar7-0.16.17-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129086" comment="python-libtorrent-rasterbar-0.16.17-2.5.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5314</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5314" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5314" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130692" comment="libtiff-devel-4.0.6-10.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130693" comment="libtiff-devel-32bit-4.0.6-10.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130694" comment="libtiff5-4.0.6-10.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130695" comment="libtiff5-32bit-4.0.6-10.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130696" comment="tiff-4.0.6-10.26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5316</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5316" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5316" source="CVE"/>
    <description>
    Out-of-bounds read in the PixarLogCleanup function in tif_pixarlog.c in libtiff 4.0.6 and earlier allows remote attackers to crash the application by sending a crafted TIFF image to the rgb2ycbcr tool.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130692" comment="libtiff-devel-4.0.6-10.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130693" comment="libtiff-devel-32bit-4.0.6-10.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130694" comment="libtiff5-4.0.6-10.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130695" comment="libtiff5-32bit-4.0.6-10.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130696" comment="tiff-4.0.6-10.26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5317</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5317" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5317" source="CVE"/>
    <description>
    Buffer overflow in the PixarLogDecode function in libtiff.so in the PixarLogDecode function in libtiff 4.0.6 and earlier, as used in GNOME nautilus, allows attackers to cause a denial of service attack (crash) via a crafted TIFF file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130692" comment="libtiff-devel-4.0.6-10.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130693" comment="libtiff-devel-32bit-4.0.6-10.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130694" comment="libtiff5-4.0.6-10.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130695" comment="libtiff5-32bit-4.0.6-10.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130696" comment="tiff-4.0.6-10.26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165320" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5320</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5320" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5320" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130692" comment="libtiff-devel-4.0.6-10.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130693" comment="libtiff-devel-32bit-4.0.6-10.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130694" comment="libtiff5-4.0.6-10.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130695" comment="libtiff5-32bit-4.0.6-10.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130696" comment="tiff-4.0.6-10.26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5321</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5321" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5321" source="CVE"/>
    <description>
    The DumpModeDecode function in libtiff 4.0.6 and earlier allows attackers to cause a denial of service (invalid read and crash) via a crafted tiff image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136807" comment="libtiff-devel-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136808" comment="libtiff-devel-32bit-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136809" comment="libtiff5-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136810" comment="libtiff5-32bit-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136811" comment="tiff-4.0.7-10.35.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5323</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5323" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5323" source="CVE"/>
    <description>
    The _TIFFFax3fillruns function in libtiff before 4.0.6 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted Tiff image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136807" comment="libtiff-devel-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136808" comment="libtiff-devel-32bit-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136809" comment="libtiff5-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136810" comment="libtiff5-32bit-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136811" comment="tiff-4.0.7-10.35.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5325</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5325" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5325" source="CVE"/>
    <description>
    CRLF injection vulnerability in the ServerResponse#writeHead function in Node.js 0.10.x before 0.10.47, 0.12.x before 0.12.16, 4.x before 4.6.0, and 6.x before 6.7.0 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the reason argument.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134144" comment="nodejs-4.6.0-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134145" comment="nodejs-devel-4.6.0-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133733" comment="nodejs-doc-4.6.0-24.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5337</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5337" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5337" source="CVE"/>
    <description>
    The megasas_ctrl_get_info function in hw/scsi/megasas.c in QEMU allows local guest OS administrators to obtain sensitive host memory information via vectors related to reading device control information.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133720" comment="xen-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133721" comment="xen-devel-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133722" comment="xen-doc-html-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133723" comment="xen-kmp-default-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133724" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133725" comment="xen-libs-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133726" comment="xen-libs-32bit-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133727" comment="xen-tools-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133728" comment="xen-tools-domU-4.4.4_05-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5338</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5338" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5338" source="CVE"/>
    <description>
    The (1) esp_reg_read and (2) esp_reg_write functions in hw/scsi/esp.c in QEMU allow local guest OS administrators to cause a denial of service (QEMU process crash) or execute arbitrary code on the QEMU host via vectors related to the information transfer buffer.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133720" comment="xen-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133721" comment="xen-devel-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133722" comment="xen-doc-html-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133723" comment="xen-kmp-default-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133724" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133725" comment="xen-libs-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133726" comment="xen-libs-32bit-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133727" comment="xen-tools-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133728" comment="xen-tools-domU-4.4.4_05-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5350</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5350" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5350" source="CVE"/>
    <description>
    epan/dissectors/packet-dcerpc-spoolss.c in the SPOOLS component in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles unexpected offsets, which allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128997" comment="wireshark-1.12.12-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128998" comment="wireshark-devel-1.12.12-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128999" comment="wireshark-ui-gtk-1.12.12-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129000" comment="wireshark-ui-qt-1.12.12-38.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5351</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5351" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5351" source="CVE"/>
    <description>
    epan/crypt/airpdcap.c in the IEEE 802.11 dissector in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles the lack of an EAPOL_RSN_KEY, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128997" comment="wireshark-1.12.12-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128998" comment="wireshark-devel-1.12.12-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128999" comment="wireshark-ui-gtk-1.12.12-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129000" comment="wireshark-ui-qt-1.12.12-38.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5353</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5353" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5353" source="CVE"/>
    <description>
    epan/dissectors/packet-umts_fp.c in the UMTS FP dissector in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles the reserved C/T value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128997" comment="wireshark-1.12.12-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128998" comment="wireshark-devel-1.12.12-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128999" comment="wireshark-ui-gtk-1.12.12-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129000" comment="wireshark-ui-qt-1.12.12-38.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5354</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5354" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5354" source="CVE"/>
    <description>
    The USB subsystem in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles class types, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128997" comment="wireshark-1.12.12-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128998" comment="wireshark-devel-1.12.12-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128999" comment="wireshark-ui-gtk-1.12.12-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129000" comment="wireshark-ui-qt-1.12.12-38.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5355</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5355" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5355" source="CVE"/>
    <description>
    wiretap/toshiba.c in the Toshiba file parser in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles sscanf unsigned-integer processing, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128997" comment="wireshark-1.12.12-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128998" comment="wireshark-devel-1.12.12-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128999" comment="wireshark-ui-gtk-1.12.12-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129000" comment="wireshark-ui-qt-1.12.12-38.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5356</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5356" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5356" source="CVE"/>
    <description>
    wiretap/cosine.c in the CoSine file parser in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles sscanf unsigned-integer processing, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128997" comment="wireshark-1.12.12-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128998" comment="wireshark-devel-1.12.12-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128999" comment="wireshark-ui-gtk-1.12.12-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129000" comment="wireshark-ui-qt-1.12.12-38.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5357</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5357" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5357" source="CVE"/>
    <description>
    wiretap/netscreen.c in the NetScreen file parser in Wireshark 1.12.x before 1.12.12 and 2.x before 2.0.4 mishandles sscanf unsigned-integer processing, which allows remote attackers to cause a denial of service (application crash) via a crafted file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128997" comment="wireshark-1.12.12-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128998" comment="wireshark-devel-1.12.12-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128999" comment="wireshark-ui-gtk-1.12.12-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129000" comment="wireshark-ui-qt-1.12.12-38.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5358</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5358" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5358" source="CVE"/>
    <description>
    epan/dissectors/packet-pktap.c in the Ethernet dissector in Wireshark 2.x before 2.0.4 mishandles the packet-header data type, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009128997" comment="wireshark-1.12.12-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128998" comment="wireshark-devel-1.12.12-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009128999" comment="wireshark-ui-gtk-1.12.12-38.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129000" comment="wireshark-ui-qt-1.12.12-38.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5386</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5386" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5386" source="CVE"/>
    <description>
    The net/http package in Go through 1.6 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect a CGI application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134194" comment="go-1.4.3-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134195" comment="go-doc-1.4.3-18.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5387</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5387" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5387" source="CVE"/>
    <description>
    The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue.  NOTE: the vendor states "This mitigation has been assigned the identifier CVE-2016-5387"; in other words, this is not a CVE ID for a vulnerability.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130561" comment="apache2-2.4.10-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130562" comment="apache2-devel-2.4.10-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130563" comment="apache2-doc-2.4.10-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130564" comment="apache2-event-2.4.10-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130565" comment="apache2-example-pages-2.4.10-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134143" comment="apache2-mod_fcgid-2.3.9-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130566" comment="apache2-prefork-2.4.10-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130567" comment="apache2-utils-2.4.10-31.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130568" comment="apache2-worker-2.4.10-31.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5399</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5399" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5399" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134038" comment="apache2-mod_php5-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134039" comment="php5-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134040" comment="php5-bcmath-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134041" comment="php5-bz2-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134042" comment="php5-calendar-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134043" comment="php5-ctype-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134044" comment="php5-curl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134045" comment="php5-dba-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134046" comment="php5-devel-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134047" comment="php5-dom-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134048" comment="php5-enchant-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134049" comment="php5-exif-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134050" comment="php5-fastcgi-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134051" comment="php5-fileinfo-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134052" comment="php5-firebird-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134053" comment="php5-fpm-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134054" comment="php5-ftp-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134055" comment="php5-gd-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134056" comment="php5-gettext-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134057" comment="php5-gmp-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134058" comment="php5-iconv-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134059" comment="php5-imap-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134060" comment="php5-intl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134061" comment="php5-json-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134062" comment="php5-ldap-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134063" comment="php5-mbstring-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134064" comment="php5-mcrypt-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134065" comment="php5-mssql-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134066" comment="php5-mysql-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134067" comment="php5-odbc-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134068" comment="php5-opcache-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134069" comment="php5-openssl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134070" comment="php5-pcntl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134071" comment="php5-pdo-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134072" comment="php5-pear-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134073" comment="php5-pgsql-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134074" comment="php5-phar-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134075" comment="php5-posix-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134076" comment="php5-pspell-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134077" comment="php5-readline-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134078" comment="php5-shmop-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134079" comment="php5-snmp-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134080" comment="php5-soap-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134081" comment="php5-sockets-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134082" comment="php5-sqlite-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134083" comment="php5-suhosin-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134084" comment="php5-sysvmsg-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134085" comment="php5-sysvsem-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134086" comment="php5-sysvshm-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134087" comment="php5-tidy-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134088" comment="php5-tokenizer-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134089" comment="php5-wddx-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134090" comment="php5-xmlreader-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134091" comment="php5-xmlrpc-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134092" comment="php5-xmlwriter-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134093" comment="php5-xsl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134094" comment="php5-zip-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134095" comment="php5-zlib-5.6.1-72.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5403</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5403" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5403" source="CVE"/>
    <description>
    The virtqueue_pop function in hw/virtio/virtio.c in QEMU allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by submitting requests without waiting for completion.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133720" comment="xen-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133721" comment="xen-devel-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133722" comment="xen-doc-html-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133723" comment="xen-kmp-default-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133724" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133725" comment="xen-libs-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133726" comment="xen-libs-32bit-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133727" comment="xen-tools-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133728" comment="xen-tools-domU-4.4.4_05-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5407</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5407" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5407" source="CVE"/>
    <description>
    The (1) XvQueryAdaptors and (2) XvQueryEncodings functions in X.org libXv before 1.0.11 allow remote X servers to trigger out-of-bounds memory access operations via vectors involving length specifications in received data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136797" comment="libXv-1.0.10-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136798" comment="libXv-devel-1.0.10-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136799" comment="libXv-devel-32bit-1.0.10-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136800" comment="libXv1-1.0.10-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136801" comment="libXv1-32bit-1.0.10-4.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5419</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5419" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419" source="CVE"/>
    <description>
    curl and libcurl before 7.50.1 do not prevent TLS session resumption when the client certificate has changed, which allows remote attackers to bypass intended restrictions by resuming a session.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133402" comment="curl-7.42.1-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133403" comment="libcurl-devel-7.42.1-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133404" comment="libcurl-devel-32bit-7.42.1-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133405" comment="libcurl4-7.42.1-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133406" comment="libcurl4-32bit-7.42.1-25.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5420</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420" source="CVE"/>
    <description>
    curl and libcurl before 7.50.1 do not check the client certificate when choosing the TLS connection to reuse, which might allow remote attackers to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133402" comment="curl-7.42.1-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133403" comment="libcurl-devel-7.42.1-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133404" comment="libcurl-devel-32bit-7.42.1-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133405" comment="libcurl4-7.42.1-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133406" comment="libcurl4-32bit-7.42.1-25.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5421</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5421" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5421" source="CVE"/>
    <description>
    Use-after-free vulnerability in libcurl before 7.50.1 allows attackers to control which connection is used or possibly have unspecified other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133402" comment="curl-7.42.1-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133403" comment="libcurl-devel-7.42.1-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133404" comment="libcurl-devel-32bit-7.42.1-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133405" comment="libcurl4-7.42.1-25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133406" comment="libcurl4-32bit-7.42.1-25.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5423</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5423" source="CVE"/>
    <description>
    PostgreSQL before 9.1.23, 9.2.x before 9.2.18, 9.3.x before 9.3.14, 9.4.x before 9.4.9, and 9.5.x before 9.5.4 allow remote authenticated users to cause a denial of service (NULL pointer dereference and server crash), obtain sensitive memory information, or possibly execute arbitrary code via (1) a CASE expression within the test value subexpression of another CASE or (2) inlining of an SQL function that implements the equality operator used for a CASE expression involving values of different types.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133616" comment="libecpg6-9.3.14-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133617" comment="libecpg6-32bit-9.3.14-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133618" comment="libpq5-9.3.14-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133619" comment="libpq5-32bit-9.3.14-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133620" comment="postgresql93-9.3.14-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133621" comment="postgresql93-contrib-9.3.14-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133622" comment="postgresql93-devel-9.3.14-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133623" comment="postgresql93-docs-9.3.14-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133624" comment="postgresql93-libs-9.3.14-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133625" comment="postgresql93-plperl-9.3.14-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133626" comment="postgresql93-plpython-9.3.14-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133627" comment="postgresql93-pltcl-9.3.14-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133628" comment="postgresql93-server-9.3.14-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133629" comment="postgresql93-test-9.3.14-2.13.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5424</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5424" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5424" source="CVE"/>
    <description>
    PostgreSQL before 9.1.23, 9.2.x before 9.2.18, 9.3.x before 9.3.14, 9.4.x before 9.4.9, and 9.5.x before 9.5.4 might allow remote authenticated users with the CREATEDB or CREATEROLE role to gain superuser privileges via a (1) " (double quote), (2) \ (backslash), (3) carriage return, or (4) newline character in a (a) database or (b) role name that is mishandled during an administrative operation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133616" comment="libecpg6-9.3.14-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133617" comment="libecpg6-32bit-9.3.14-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133618" comment="libpq5-9.3.14-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133619" comment="libpq5-32bit-9.3.14-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133620" comment="postgresql93-9.3.14-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133621" comment="postgresql93-contrib-9.3.14-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133622" comment="postgresql93-devel-9.3.14-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133623" comment="postgresql93-docs-9.3.14-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133624" comment="postgresql93-libs-9.3.14-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133625" comment="postgresql93-plperl-9.3.14-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133626" comment="postgresql93-plpython-9.3.14-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133627" comment="postgresql93-pltcl-9.3.14-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133628" comment="postgresql93-server-9.3.14-2.13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133629" comment="postgresql93-test-9.3.14-2.13.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5426</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5426" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5426" source="CVE"/>
    <description>
    PowerDNS (aka pdns) Authoritative Server before 3.4.10 allows remote attackers to cause a denial of service (backend CPU consumption) via a long qname.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134196" comment="pdns-3.3.1-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134197" comment="pdns-backend-ldap-3.3.1-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134198" comment="pdns-backend-lua-3.3.1-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134199" comment="pdns-backend-mydns-3.3.1-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134200" comment="pdns-backend-mysql-3.3.1-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134201" comment="pdns-backend-postgresql-3.3.1-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134202" comment="pdns-backend-sqlite3-3.3.1-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5427</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5427" source="CVE"/>
    <description>
    PowerDNS (aka pdns) Authoritative Server before 3.4.10 does not properly handle a . (dot) inside labels, which allows remote attackers to cause a denial of service (backend CPU consumption) via a crafted DNS query.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134196" comment="pdns-3.3.1-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134197" comment="pdns-backend-ldap-3.3.1-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134198" comment="pdns-backend-lua-3.3.1-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134199" comment="pdns-backend-mydns-3.3.1-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134200" comment="pdns-backend-mysql-3.3.1-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134201" comment="pdns-backend-postgresql-3.3.1-2.9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134202" comment="pdns-backend-sqlite3-3.3.1-2.9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5439</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5439" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5439" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.30 and earlier and 5.7.12 and earlier allows remote administrators to affect availability via vectors related to Server: Privileges.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135453" comment="libmysql56client18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135454" comment="libmysql56client18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135455" comment="libmysql56client_r18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135456" comment="libmysql56client_r18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135457" comment="mysql-community-server-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135458" comment="mysql-community-server-bench-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135459" comment="mysql-community-server-client-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135460" comment="mysql-community-server-errormessages-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135461" comment="mysql-community-server-test-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135462" comment="mysql-community-server-tools-5.6.34-2.23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5440</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5440" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.49 and earlier, 5.6.30 and earlier, and 5.7.12 and earlier and MariaDB before 5.5.50, 10.0.x before 10.0.26, and 10.1.x before 10.1.15 allows remote administrators to affect availability via vectors related to Server: RBR.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135453" comment="libmysql56client18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135454" comment="libmysql56client18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135455" comment="libmysql56client_r18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135456" comment="libmysql56client_r18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135343" comment="libmysqlclient-devel-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135344" comment="libmysqlclient18-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135345" comment="libmysqlclient18-32bit-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135346" comment="libmysqlclient_r18-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135347" comment="libmysqlclient_r18-32bit-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135348" comment="libmysqld-devel-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135349" comment="libmysqld18-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135350" comment="mariadb-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135351" comment="mariadb-bench-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135352" comment="mariadb-client-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135353" comment="mariadb-errormessages-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135354" comment="mariadb-test-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135355" comment="mariadb-tools-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135457" comment="mysql-community-server-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135458" comment="mysql-community-server-bench-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135459" comment="mysql-community-server-client-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135460" comment="mysql-community-server-errormessages-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135461" comment="mysql-community-server-test-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135462" comment="mysql-community-server-tools-5.6.34-2.23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5501</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5501" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5501" source="CVE"/>
    <description>
    Unspecified vulnerability in the Oracle VM VirtualBox component before 5.0.28 and 5.1.x before 5.1.8 in Oracle Virtualization allows local users to affect confidentiality, integrity, and availability via vectors related to Core, a different vulnerability than CVE-2016-5538.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133850" comment="python-virtualbox-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133851" comment="virtualbox-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133852" comment="virtualbox-devel-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133853" comment="virtualbox-guest-desktop-icons-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133854" comment="virtualbox-guest-kmp-default-5.0.28_k3.16.7_42-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133855" comment="virtualbox-guest-kmp-desktop-5.0.28_k3.16.7_42-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133856" comment="virtualbox-guest-kmp-pae-5.0.28_k3.16.7_42-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133857" comment="virtualbox-guest-tools-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133858" comment="virtualbox-guest-x11-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133859" comment="virtualbox-host-kmp-default-5.0.28_k3.16.7_42-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133860" comment="virtualbox-host-kmp-desktop-5.0.28_k3.16.7_42-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133861" comment="virtualbox-host-kmp-pae-5.0.28_k3.16.7_42-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133862" comment="virtualbox-host-source-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133863" comment="virtualbox-qt-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133864" comment="virtualbox-websrv-5.0.28-54.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5507</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5507" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5507" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.32 and earlier and 5.7.14 and earlier allows remote administrators to affect availability via vectors related to Server: InnoDB.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135453" comment="libmysql56client18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135454" comment="libmysql56client18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135455" comment="libmysql56client_r18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135456" comment="libmysql56client_r18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135457" comment="mysql-community-server-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135458" comment="mysql-community-server-bench-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135459" comment="mysql-community-server-client-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135460" comment="mysql-community-server-errormessages-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135461" comment="mysql-community-server-test-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135462" comment="mysql-community-server-tools-5.6.34-2.23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5538</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5538" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5538" source="CVE"/>
    <description>
    Unspecified vulnerability in the Oracle VM VirtualBox component before 5.0.28 and 5.1.x before 5.1.8 in Oracle Virtualization allows local users to affect confidentiality, integrity, and availability via vectors related to Core, a different vulnerability than CVE-2016-5501.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133850" comment="python-virtualbox-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133851" comment="virtualbox-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133852" comment="virtualbox-devel-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133853" comment="virtualbox-guest-desktop-icons-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133854" comment="virtualbox-guest-kmp-default-5.0.28_k3.16.7_42-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133855" comment="virtualbox-guest-kmp-desktop-5.0.28_k3.16.7_42-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133856" comment="virtualbox-guest-kmp-pae-5.0.28_k3.16.7_42-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133857" comment="virtualbox-guest-tools-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133858" comment="virtualbox-guest-x11-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133859" comment="virtualbox-host-kmp-default-5.0.28_k3.16.7_42-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133860" comment="virtualbox-host-kmp-desktop-5.0.28_k3.16.7_42-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133861" comment="virtualbox-host-kmp-pae-5.0.28_k3.16.7_42-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133862" comment="virtualbox-host-source-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133863" comment="virtualbox-qt-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133864" comment="virtualbox-websrv-5.0.28-54.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5542</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5542" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u121, 7u111, 8u102; and Java SE Embedded 8u101 allows remote attackers to affect integrity via vectors related to Libraries.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135952" comment="java-1_7_0-openjdk-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135953" comment="java-1_7_0-openjdk-accessibility-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135954" comment="java-1_7_0-openjdk-bootstrap-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135955" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135956" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135957" comment="java-1_7_0-openjdk-demo-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135958" comment="java-1_7_0-openjdk-devel-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135959" comment="java-1_7_0-openjdk-headless-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135960" comment="java-1_7_0-openjdk-javadoc-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135961" comment="java-1_7_0-openjdk-src-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135795" comment="java-1_8_0-openjdk-1.8.0.111-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135796" comment="java-1_8_0-openjdk-accessibility-1.8.0.111-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135797" comment="java-1_8_0-openjdk-demo-1.8.0.111-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135798" comment="java-1_8_0-openjdk-devel-1.8.0.111-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135799" comment="java-1_8_0-openjdk-headless-1.8.0.111-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135800" comment="java-1_8_0-openjdk-javadoc-1.8.0.111-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135801" comment="java-1_8_0-openjdk-src-1.8.0.111-33.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5554</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5554" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u121, 7u111, 8u102; and Java SE Embedded 8u101 allows remote attackers to affect integrity via vectors related to JMX.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135952" comment="java-1_7_0-openjdk-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135953" comment="java-1_7_0-openjdk-accessibility-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135954" comment="java-1_7_0-openjdk-bootstrap-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135955" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135956" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135957" comment="java-1_7_0-openjdk-demo-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135958" comment="java-1_7_0-openjdk-devel-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135959" comment="java-1_7_0-openjdk-headless-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135960" comment="java-1_7_0-openjdk-javadoc-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135961" comment="java-1_7_0-openjdk-src-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135795" comment="java-1_8_0-openjdk-1.8.0.111-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135796" comment="java-1_8_0-openjdk-accessibility-1.8.0.111-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135797" comment="java-1_8_0-openjdk-demo-1.8.0.111-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135798" comment="java-1_8_0-openjdk-devel-1.8.0.111-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135799" comment="java-1_8_0-openjdk-headless-1.8.0.111-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135800" comment="java-1_8_0-openjdk-javadoc-1.8.0.111-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135801" comment="java-1_8_0-openjdk-src-1.8.0.111-33.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5556</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5556" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5556" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u121, 7u111, and 8u102 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to 2D.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135952" comment="java-1_7_0-openjdk-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135953" comment="java-1_7_0-openjdk-accessibility-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135954" comment="java-1_7_0-openjdk-bootstrap-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135955" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135956" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135957" comment="java-1_7_0-openjdk-demo-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135958" comment="java-1_7_0-openjdk-devel-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135959" comment="java-1_7_0-openjdk-headless-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135960" comment="java-1_7_0-openjdk-javadoc-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135961" comment="java-1_7_0-openjdk-src-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135795" comment="java-1_8_0-openjdk-1.8.0.111-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135796" comment="java-1_8_0-openjdk-accessibility-1.8.0.111-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135797" comment="java-1_8_0-openjdk-demo-1.8.0.111-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135798" comment="java-1_8_0-openjdk-devel-1.8.0.111-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135799" comment="java-1_8_0-openjdk-headless-1.8.0.111-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135800" comment="java-1_8_0-openjdk-javadoc-1.8.0.111-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135801" comment="java-1_8_0-openjdk-src-1.8.0.111-33.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5568</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5568" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5568" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u121, 7u111, and 8u102 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135952" comment="java-1_7_0-openjdk-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135953" comment="java-1_7_0-openjdk-accessibility-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135954" comment="java-1_7_0-openjdk-bootstrap-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135955" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135956" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135957" comment="java-1_7_0-openjdk-demo-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135958" comment="java-1_7_0-openjdk-devel-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135959" comment="java-1_7_0-openjdk-headless-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135960" comment="java-1_7_0-openjdk-javadoc-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135961" comment="java-1_7_0-openjdk-src-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135795" comment="java-1_8_0-openjdk-1.8.0.111-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135796" comment="java-1_8_0-openjdk-accessibility-1.8.0.111-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135797" comment="java-1_8_0-openjdk-demo-1.8.0.111-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135798" comment="java-1_8_0-openjdk-devel-1.8.0.111-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135799" comment="java-1_8_0-openjdk-headless-1.8.0.111-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135800" comment="java-1_8_0-openjdk-javadoc-1.8.0.111-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135801" comment="java-1_8_0-openjdk-src-1.8.0.111-33.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5573</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5573" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u121, 7u111, 8u102; and Java SE Embedded 8u101 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Hotspot, a different vulnerability than CVE-2016-5582.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135952" comment="java-1_7_0-openjdk-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135953" comment="java-1_7_0-openjdk-accessibility-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135954" comment="java-1_7_0-openjdk-bootstrap-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135955" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135956" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135957" comment="java-1_7_0-openjdk-demo-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135958" comment="java-1_7_0-openjdk-devel-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135959" comment="java-1_7_0-openjdk-headless-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135960" comment="java-1_7_0-openjdk-javadoc-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135961" comment="java-1_7_0-openjdk-src-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135795" comment="java-1_8_0-openjdk-1.8.0.111-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135796" comment="java-1_8_0-openjdk-accessibility-1.8.0.111-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135797" comment="java-1_8_0-openjdk-demo-1.8.0.111-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135798" comment="java-1_8_0-openjdk-devel-1.8.0.111-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135799" comment="java-1_8_0-openjdk-headless-1.8.0.111-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135800" comment="java-1_8_0-openjdk-javadoc-1.8.0.111-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135801" comment="java-1_8_0-openjdk-src-1.8.0.111-33.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5582</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5582" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u121, 7u111, 8u102; and Java SE Embedded 8u101 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Hotspot, a different vulnerability than CVE-2016-5573.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135952" comment="java-1_7_0-openjdk-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135953" comment="java-1_7_0-openjdk-accessibility-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135954" comment="java-1_7_0-openjdk-bootstrap-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135955" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135956" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135957" comment="java-1_7_0-openjdk-demo-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135958" comment="java-1_7_0-openjdk-devel-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135959" comment="java-1_7_0-openjdk-headless-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135960" comment="java-1_7_0-openjdk-javadoc-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135961" comment="java-1_7_0-openjdk-src-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135795" comment="java-1_8_0-openjdk-1.8.0.111-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135796" comment="java-1_8_0-openjdk-accessibility-1.8.0.111-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135797" comment="java-1_8_0-openjdk-demo-1.8.0.111-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135798" comment="java-1_8_0-openjdk-devel-1.8.0.111-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135799" comment="java-1_8_0-openjdk-headless-1.8.0.111-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135800" comment="java-1_8_0-openjdk-javadoc-1.8.0.111-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135801" comment="java-1_8_0-openjdk-src-1.8.0.111-33.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5584</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5584" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5584" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.52 and earlier, 5.6.33 and earlier, and 5.7.15 and earlier allows remote administrators to affect confidentiality via vectors related to Server: Security: Encryption.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135453" comment="libmysql56client18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135454" comment="libmysql56client18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135455" comment="libmysql56client_r18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135456" comment="libmysql56client_r18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135457" comment="mysql-community-server-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135458" comment="mysql-community-server-bench-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135459" comment="mysql-community-server-client-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135460" comment="mysql-community-server-errormessages-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135461" comment="mysql-community-server-test-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135462" comment="mysql-community-server-tools-5.6.34-2.23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5597</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5597" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle Java SE 6u121, 7u111, 8u102; and Java SE Embedded 8u101 allows remote attackers to affect confidentiality via vectors related to Networking.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135952" comment="java-1_7_0-openjdk-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135953" comment="java-1_7_0-openjdk-accessibility-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135954" comment="java-1_7_0-openjdk-bootstrap-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135955" comment="java-1_7_0-openjdk-bootstrap-devel-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135956" comment="java-1_7_0-openjdk-bootstrap-headless-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135957" comment="java-1_7_0-openjdk-demo-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135958" comment="java-1_7_0-openjdk-devel-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135959" comment="java-1_7_0-openjdk-headless-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135960" comment="java-1_7_0-openjdk-javadoc-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135961" comment="java-1_7_0-openjdk-src-1.7.0.121-28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135795" comment="java-1_8_0-openjdk-1.8.0.111-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135796" comment="java-1_8_0-openjdk-accessibility-1.8.0.111-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135797" comment="java-1_8_0-openjdk-demo-1.8.0.111-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135798" comment="java-1_8_0-openjdk-devel-1.8.0.111-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135799" comment="java-1_8_0-openjdk-headless-1.8.0.111-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135800" comment="java-1_8_0-openjdk-javadoc-1.8.0.111-33.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135801" comment="java-1_8_0-openjdk-src-1.8.0.111-33.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5605</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5605" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5605" source="CVE"/>
    <description>
    Unspecified vulnerability in the Oracle VM VirtualBox component before 5.1.4 in Oracle Virtualization allows remote attackers to affect confidentiality and integrity via vectors related to VRDE.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133850" comment="python-virtualbox-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133851" comment="virtualbox-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133852" comment="virtualbox-devel-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133853" comment="virtualbox-guest-desktop-icons-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133854" comment="virtualbox-guest-kmp-default-5.0.28_k3.16.7_42-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133855" comment="virtualbox-guest-kmp-desktop-5.0.28_k3.16.7_42-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133856" comment="virtualbox-guest-kmp-pae-5.0.28_k3.16.7_42-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133857" comment="virtualbox-guest-tools-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133858" comment="virtualbox-guest-x11-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133859" comment="virtualbox-host-kmp-default-5.0.28_k3.16.7_42-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133860" comment="virtualbox-host-kmp-desktop-5.0.28_k3.16.7_42-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133861" comment="virtualbox-host-kmp-pae-5.0.28_k3.16.7_42-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133862" comment="virtualbox-host-source-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133863" comment="virtualbox-qt-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133864" comment="virtualbox-websrv-5.0.28-54.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5608</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5608" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5608" source="CVE"/>
    <description>
    Unspecified vulnerability in the Oracle VM VirtualBox component before 5.0.28 and 5.1.x before 5.1.8 in Oracle Virtualization allows local users to affect availability via vectors related to Core, a different vulnerability than CVE-2016-5613.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133850" comment="python-virtualbox-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133851" comment="virtualbox-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133852" comment="virtualbox-devel-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133853" comment="virtualbox-guest-desktop-icons-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133854" comment="virtualbox-guest-kmp-default-5.0.28_k3.16.7_42-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133855" comment="virtualbox-guest-kmp-desktop-5.0.28_k3.16.7_42-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133856" comment="virtualbox-guest-kmp-pae-5.0.28_k3.16.7_42-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133857" comment="virtualbox-guest-tools-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133858" comment="virtualbox-guest-x11-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133859" comment="virtualbox-host-kmp-default-5.0.28_k3.16.7_42-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133860" comment="virtualbox-host-kmp-desktop-5.0.28_k3.16.7_42-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133861" comment="virtualbox-host-kmp-pae-5.0.28_k3.16.7_42-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133862" comment="virtualbox-host-source-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133863" comment="virtualbox-qt-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133864" comment="virtualbox-websrv-5.0.28-54.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5609</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5609" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5609" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.31 and earlier and 5.7.13 and earlier allows remote authenticated users to affect availability via vectors related to DML.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135453" comment="libmysql56client18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135454" comment="libmysql56client18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135455" comment="libmysql56client_r18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135456" comment="libmysql56client_r18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135457" comment="mysql-community-server-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135458" comment="mysql-community-server-bench-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135459" comment="mysql-community-server-client-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135460" comment="mysql-community-server-errormessages-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135461" comment="mysql-community-server-test-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135462" comment="mysql-community-server-tools-5.6.34-2.23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5610</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5610" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5610" source="CVE"/>
    <description>
    Unspecified vulnerability in the Oracle VM VirtualBox component before 5.0.28 and 5.1.x before 5.1.8 in Oracle Virtualization allows local users to affect confidentiality, integrity, and availability via vectors related to Core.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133850" comment="python-virtualbox-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133851" comment="virtualbox-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133852" comment="virtualbox-devel-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133853" comment="virtualbox-guest-desktop-icons-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133854" comment="virtualbox-guest-kmp-default-5.0.28_k3.16.7_42-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133855" comment="virtualbox-guest-kmp-desktop-5.0.28_k3.16.7_42-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133856" comment="virtualbox-guest-kmp-pae-5.0.28_k3.16.7_42-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133857" comment="virtualbox-guest-tools-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133858" comment="virtualbox-guest-x11-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133859" comment="virtualbox-host-kmp-default-5.0.28_k3.16.7_42-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133860" comment="virtualbox-host-kmp-desktop-5.0.28_k3.16.7_42-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133861" comment="virtualbox-host-kmp-pae-5.0.28_k3.16.7_42-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133862" comment="virtualbox-host-source-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133863" comment="virtualbox-qt-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133864" comment="virtualbox-websrv-5.0.28-54.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5611</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5611" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5611" source="CVE"/>
    <description>
    Unspecified vulnerability in the Oracle VM VirtualBox component before 5.0.28 and 5.1.x before 5.1.8 in Oracle Virtualization allows local users to affect confidentiality via vectors related to Core.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133850" comment="python-virtualbox-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133851" comment="virtualbox-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133852" comment="virtualbox-devel-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133853" comment="virtualbox-guest-desktop-icons-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133854" comment="virtualbox-guest-kmp-default-5.0.28_k3.16.7_42-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133855" comment="virtualbox-guest-kmp-desktop-5.0.28_k3.16.7_42-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133856" comment="virtualbox-guest-kmp-pae-5.0.28_k3.16.7_42-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133857" comment="virtualbox-guest-tools-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133858" comment="virtualbox-guest-x11-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133859" comment="virtualbox-host-kmp-default-5.0.28_k3.16.7_42-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133860" comment="virtualbox-host-kmp-desktop-5.0.28_k3.16.7_42-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133861" comment="virtualbox-host-kmp-pae-5.0.28_k3.16.7_42-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133862" comment="virtualbox-host-source-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133863" comment="virtualbox-qt-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133864" comment="virtualbox-websrv-5.0.28-54.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5612</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5612" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5612" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.50 and earlier, 5.6.31 and earlier, and 5.7.13 and earlier allows remote authenticated users to affect availability via vectors related to DML.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135453" comment="libmysql56client18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135454" comment="libmysql56client18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135455" comment="libmysql56client_r18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135456" comment="libmysql56client_r18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135343" comment="libmysqlclient-devel-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135344" comment="libmysqlclient18-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135345" comment="libmysqlclient18-32bit-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135346" comment="libmysqlclient_r18-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135347" comment="libmysqlclient_r18-32bit-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135348" comment="libmysqld-devel-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135349" comment="libmysqld18-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135350" comment="mariadb-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135351" comment="mariadb-bench-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135352" comment="mariadb-client-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135353" comment="mariadb-errormessages-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135354" comment="mariadb-test-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135355" comment="mariadb-tools-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135457" comment="mysql-community-server-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135458" comment="mysql-community-server-bench-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135459" comment="mysql-community-server-client-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135460" comment="mysql-community-server-errormessages-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135461" comment="mysql-community-server-test-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135462" comment="mysql-community-server-tools-5.6.34-2.23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5613</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5613" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5613" source="CVE"/>
    <description>
    Unspecified vulnerability in the Oracle VM VirtualBox component before 5.0.28 and 5.1.x before 5.1.8 in Oracle Virtualization allows local users to affect availability via vectors related to Core, a different vulnerability than CVE-2016-5608.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133850" comment="python-virtualbox-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133851" comment="virtualbox-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133852" comment="virtualbox-devel-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133853" comment="virtualbox-guest-desktop-icons-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133854" comment="virtualbox-guest-kmp-default-5.0.28_k3.16.7_42-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133855" comment="virtualbox-guest-kmp-desktop-5.0.28_k3.16.7_42-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133856" comment="virtualbox-guest-kmp-pae-5.0.28_k3.16.7_42-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133857" comment="virtualbox-guest-tools-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133858" comment="virtualbox-guest-x11-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133859" comment="virtualbox-host-kmp-default-5.0.28_k3.16.7_42-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133860" comment="virtualbox-host-kmp-desktop-5.0.28_k3.16.7_42-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133861" comment="virtualbox-host-kmp-pae-5.0.28_k3.16.7_42-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133862" comment="virtualbox-host-source-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133863" comment="virtualbox-qt-5.0.28-54.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133864" comment="virtualbox-websrv-5.0.28-54.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5616</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5616" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5616" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2016-6663. Reason:  This candidate is a reservation duplicate of CVE-2016-6663.  Notes: All CVE users should reference CVE-2016-6663 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135453" comment="libmysql56client18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135454" comment="libmysql56client18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135455" comment="libmysql56client_r18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135456" comment="libmysql56client_r18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135457" comment="mysql-community-server-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135458" comment="mysql-community-server-bench-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135459" comment="mysql-community-server-client-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135460" comment="mysql-community-server-errormessages-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135461" comment="mysql-community-server-test-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135462" comment="mysql-community-server-tools-5.6.34-2.23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5617</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5617" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5617" source="CVE"/>
    <description>
    ** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2016-6664.  Reason: This candidate is a reservation duplicate of CVE-2016-6664.  Notes: All CVE users should reference CVE-2016-6664 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135453" comment="libmysql56client18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135454" comment="libmysql56client18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135455" comment="libmysql56client_r18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135456" comment="libmysql56client_r18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135457" comment="mysql-community-server-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135458" comment="mysql-community-server-bench-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135459" comment="mysql-community-server-client-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135460" comment="mysql-community-server-errormessages-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135461" comment="mysql-community-server-test-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135462" comment="mysql-community-server-tools-5.6.34-2.23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5626</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5626" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote authenticated users to affect availability via vectors related to GIS.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135453" comment="libmysql56client18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135454" comment="libmysql56client18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135455" comment="libmysql56client_r18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135456" comment="libmysql56client_r18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135457" comment="mysql-community-server-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135458" comment="mysql-community-server-bench-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135459" comment="mysql-community-server-client-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135460" comment="mysql-community-server-errormessages-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135461" comment="mysql-community-server-test-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135462" comment="mysql-community-server-tools-5.6.34-2.23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5627</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5627" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5627" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.31 and earlier and 5.7.13 and earlier allows remote authenticated users to affect availability via vectors related to Server: InnoDB.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135453" comment="libmysql56client18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135454" comment="libmysql56client18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135455" comment="libmysql56client_r18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135456" comment="libmysql56client_r18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135457" comment="mysql-community-server-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135458" comment="mysql-community-server-bench-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135459" comment="mysql-community-server-client-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135460" comment="mysql-community-server-errormessages-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135461" comment="mysql-community-server-test-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135462" comment="mysql-community-server-tools-5.6.34-2.23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5629</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5629" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote administrators to affect availability via vectors related to Server: Federated.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135453" comment="libmysql56client18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135454" comment="libmysql56client18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135455" comment="libmysql56client_r18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135456" comment="libmysql56client_r18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135457" comment="mysql-community-server-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135458" comment="mysql-community-server-bench-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135459" comment="mysql-community-server-client-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135460" comment="mysql-community-server-errormessages-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135461" comment="mysql-community-server-test-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135462" comment="mysql-community-server-tools-5.6.34-2.23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5630</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5630" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5630" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.31 and earlier and 5.7.13 and earlier allows remote administrators to affect availability via vectors related to Server: InnoDB.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135453" comment="libmysql56client18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135454" comment="libmysql56client18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135455" comment="libmysql56client_r18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135456" comment="libmysql56client_r18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135343" comment="libmysqlclient-devel-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135344" comment="libmysqlclient18-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135345" comment="libmysqlclient18-32bit-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135346" comment="libmysqlclient_r18-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135347" comment="libmysqlclient_r18-32bit-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135348" comment="libmysqld-devel-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135349" comment="libmysqld18-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135350" comment="mariadb-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135351" comment="mariadb-bench-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135352" comment="mariadb-client-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135353" comment="mariadb-errormessages-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135354" comment="mariadb-test-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135355" comment="mariadb-tools-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135457" comment="mysql-community-server-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135458" comment="mysql-community-server-bench-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135459" comment="mysql-community-server-client-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135460" comment="mysql-community-server-errormessages-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135461" comment="mysql-community-server-test-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135462" comment="mysql-community-server-tools-5.6.34-2.23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5636</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5636" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5636" source="CVE"/>
    <description>
    Integer overflow in the get_data function in zipimport.c in CPython (aka Python) before 2.7.12, 3.x before 3.4.5, and 3.5.x before 3.5.2 allows remote attackers to have unspecified impact via a negative data size value, which triggers a heap-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130698" comment="libpython2_7-1_0-2.7.12-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130699" comment="libpython2_7-1_0-32bit-2.7.12-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134121" comment="libpython3_4m1_0-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134122" comment="libpython3_4m1_0-32bit-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130700" comment="python-2.7.12-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130701" comment="python-32bit-2.7.12-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130702" comment="python-base-2.7.12-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130703" comment="python-base-32bit-2.7.12-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130704" comment="python-curses-2.7.12-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130705" comment="python-demo-2.7.12-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130706" comment="python-devel-2.7.12-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130707" comment="python-doc-2.7.12-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130708" comment="python-doc-pdf-2.7.12-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130709" comment="python-gdbm-2.7.12-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130710" comment="python-idle-2.7.12-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130711" comment="python-tk-2.7.12-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130712" comment="python-xml-2.7.12-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134123" comment="python3-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134124" comment="python3-32bit-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134125" comment="python3-base-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134126" comment="python3-base-32bit-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134127" comment="python3-curses-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134128" comment="python3-dbm-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134129" comment="python3-devel-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134130" comment="python3-doc-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134131" comment="python3-doc-pdf-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134132" comment="python3-idle-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134133" comment="python3-testsuite-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134134" comment="python3-tk-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134135" comment="python3-tools-3.4.5-4.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5652</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5652" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652" source="CVE"/>
    <description>
    An exploitable heap-based buffer overflow exists in the handling of TIFF images in LibTIFF's TIFF2PDF tool. A crafted TIFF document can lead to a heap-based buffer overflow resulting in remote code execution. Vulnerability can be triggered via a saved TIFF file delivered by other means.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136807" comment="libtiff-devel-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136808" comment="libtiff-devel-32bit-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136809" comment="libtiff5-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136810" comment="libtiff5-32bit-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136811" comment="tiff-4.0.7-10.35.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5687</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5687" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5687" source="CVE"/>
    <description>
    The VerticalFilter function in the DDS coder in ImageMagick before 6.9.4-3 and 7.x before 7.0.1-4 allows remote attackers to have unspecified impact via a crafted DDS file, which triggers an out-of-bounds read.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5688</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5688" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5688" source="CVE"/>
    <description>
    The WPG parser in ImageMagick before 6.9.4-4 and 7.x before 7.0.1-5, when a memory limit is set, allows remote attackers to have unspecified impact via vectors related to the SetImageExtent return-value check, which trigger (1) a heap-based buffer overflow in the SetPixelIndex function or an invalid write operation in the (2) ScaleCharToQuantum or (3) SetPixelIndex functions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133963" comment="GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133964" comment="GraphicsMagick-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133965" comment="libGraphicsMagick++-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133966" comment="libGraphicsMagick++-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133967" comment="libGraphicsMagick-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133968" comment="libGraphicsMagick3-config-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133969" comment="libGraphicsMagickWand-Q16-2-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133970" comment="perl-GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5689</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5689" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5689" source="CVE"/>
    <description>
    The DCM reader in ImageMagick before 6.9.4-5 and 7.x before 7.0.1-7 allows remote attackers to have unspecified impact by leveraging lack of NULL pointer checks.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5690</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5690" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5690" source="CVE"/>
    <description>
    The ReadDCMImage function in DCM reader in ImageMagick before 6.9.4-5 and 7.x before 7.0.1-7 allows remote attackers to have unspecified impact via vectors involving the for statement in computing the pixel scaling table.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5691</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5691" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5691" source="CVE"/>
    <description>
    The DCM reader in ImageMagick before 6.9.4-5 and 7.x before 7.0.1-7 allows remote attackers to have unspecified impact by leveraging lack of validation of (1) pixel.red, (2) pixel.green, and (3) pixel.blue.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5696</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5696" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5696" source="CVE"/>
    <description>
    net/ipv4/tcp_input.c in the Linux kernel before 4.7 does not properly determine the rate of challenge ACK segments, which makes it easier for remote attackers to hijack TCP sessions via a blind in-window attack.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133865" comment="bbswitch-0.8-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133866" comment="bbswitch-kmp-default-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133867" comment="bbswitch-kmp-desktop-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133868" comment="bbswitch-kmp-pae-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133869" comment="bbswitch-kmp-xen-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133870" comment="cloop-2.639-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133871" comment="cloop-kmp-default-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133872" comment="cloop-kmp-desktop-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133873" comment="cloop-kmp-pae-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133874" comment="cloop-kmp-xen-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133875" comment="crash-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133876" comment="crash-devel-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133877" comment="crash-doc-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133878" comment="crash-eppic-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133879" comment="crash-gcore-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133880" comment="crash-kmp-default-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133881" comment="crash-kmp-desktop-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133882" comment="crash-kmp-pae-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133883" comment="crash-kmp-xen-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133884" comment="hdjmod-1.28-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133885" comment="hdjmod-kmp-default-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133886" comment="hdjmod-kmp-desktop-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133887" comment="hdjmod-kmp-pae-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133888" comment="hdjmod-kmp-xen-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133889" comment="ipset-6.23-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133890" comment="ipset-devel-6.23-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133891" comment="ipset-kmp-default-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133892" comment="ipset-kmp-desktop-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133893" comment="ipset-kmp-pae-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133894" comment="ipset-kmp-xen-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133895" comment="kernel-debug-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133896" comment="kernel-debug-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133897" comment="kernel-debug-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133898" comment="kernel-default-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133899" comment="kernel-default-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133900" comment="kernel-default-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133901" comment="kernel-desktop-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133902" comment="kernel-desktop-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133903" comment="kernel-desktop-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133904" comment="kernel-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133905" comment="kernel-docs-3.16.7-45.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133906" comment="kernel-ec2-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133907" comment="kernel-ec2-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133908" comment="kernel-ec2-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133909" comment="kernel-macros-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133910" comment="kernel-obs-build-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133911" comment="kernel-obs-qa-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133912" comment="kernel-obs-qa-xen-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133913" comment="kernel-pae-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133914" comment="kernel-pae-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133915" comment="kernel-pae-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133916" comment="kernel-source-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133917" comment="kernel-source-vanilla-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133918" comment="kernel-syms-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133919" comment="kernel-vanilla-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133920" comment="kernel-vanilla-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133921" comment="kernel-xen-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133922" comment="kernel-xen-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133923" comment="kernel-xen-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133924" comment="libipset3-6.23-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133925" comment="pcfclock-0.44-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133926" comment="pcfclock-kmp-default-0.44_k3.16.7_45-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133927" comment="pcfclock-kmp-desktop-0.44_k3.16.7_45-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133928" comment="pcfclock-kmp-pae-0.44_k3.16.7_45-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133929" comment="python-virtualbox-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133930" comment="vhba-kmp-20140629-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133931" comment="vhba-kmp-default-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133932" comment="vhba-kmp-desktop-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133933" comment="vhba-kmp-pae-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133934" comment="vhba-kmp-xen-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133935" comment="virtualbox-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133936" comment="virtualbox-devel-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133937" comment="virtualbox-guest-desktop-icons-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133938" comment="virtualbox-guest-kmp-default-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133939" comment="virtualbox-guest-kmp-desktop-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133940" comment="virtualbox-guest-kmp-pae-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133941" comment="virtualbox-guest-tools-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133942" comment="virtualbox-guest-x11-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133943" comment="virtualbox-host-kmp-default-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133944" comment="virtualbox-host-kmp-desktop-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133945" comment="virtualbox-host-kmp-pae-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133946" comment="virtualbox-host-source-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133947" comment="virtualbox-qt-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133948" comment="virtualbox-websrv-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133949" comment="xen-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133950" comment="xen-devel-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133951" comment="xen-doc-html-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133952" comment="xen-kmp-default-4.4.4_05_k3.16.7_45-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133953" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_45-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133954" comment="xen-libs-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133955" comment="xen-libs-32bit-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133956" comment="xen-tools-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133957" comment="xen-tools-domU-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133958" comment="xtables-addons-2.6-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133959" comment="xtables-addons-kmp-default-2.6_k3.16.7_45-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133960" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_45-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133961" comment="xtables-addons-kmp-pae-2.6_k3.16.7_45-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133962" comment="xtables-addons-kmp-xen-2.6_k3.16.7_45-24.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5699</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5699" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5699" source="CVE"/>
    <description>
    CRLF injection vulnerability in the HTTPConnection.putheader function in urllib2 and urllib in CPython (aka Python) before 2.7.10 and 3.x before 3.4.4 allows remote attackers to inject arbitrary HTTP headers via CRLF sequences in a URL.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130698" comment="libpython2_7-1_0-2.7.12-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130699" comment="libpython2_7-1_0-32bit-2.7.12-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134121" comment="libpython3_4m1_0-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134122" comment="libpython3_4m1_0-32bit-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130700" comment="python-2.7.12-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130701" comment="python-32bit-2.7.12-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130702" comment="python-base-2.7.12-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130703" comment="python-base-32bit-2.7.12-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130704" comment="python-curses-2.7.12-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130705" comment="python-demo-2.7.12-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130706" comment="python-devel-2.7.12-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130707" comment="python-doc-2.7.12-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130708" comment="python-doc-pdf-2.7.12-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130709" comment="python-gdbm-2.7.12-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130710" comment="python-idle-2.7.12-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130711" comment="python-tk-2.7.12-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130712" comment="python-xml-2.7.12-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134123" comment="python3-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134124" comment="python3-32bit-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134125" comment="python3-base-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134126" comment="python3-base-32bit-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134127" comment="python3-curses-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134128" comment="python3-dbm-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134129" comment="python3-devel-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134130" comment="python3-doc-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134131" comment="python3-doc-pdf-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134132" comment="python3-idle-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134133" comment="python3-testsuite-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134134" comment="python3-tk-3.4.5-4.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134135" comment="python3-tools-3.4.5-4.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5701</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5701" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5701" source="CVE"/>
    <description>
    setup/frames/index.inc.php in phpMyAdmin 4.0.10.x before 4.0.10.16, 4.4.15.x before 4.4.15.7, and 4.6.x before 4.6.3 allows remote attackers to conduct BBCode injection attacks against HTTP sessions via a crafted URI.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129368" comment="phpMyAdmin-4.4.15.7-36.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5703</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5703" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5703" source="CVE"/>
    <description>
    SQL injection vulnerability in libraries/central_columns.lib.php in phpMyAdmin 4.4.x before 4.4.15.7 and 4.6.x before 4.6.3 allows remote attackers to execute arbitrary SQL commands via a crafted database name that is mishandled in a central column query.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129368" comment="phpMyAdmin-4.4.15.7-36.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5705</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5705" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5705" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 4.4.x before 4.4.15.7 and 4.6.x before 4.6.3 allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) server-privileges certificate data fields on the user privileges page, (2) an "invalid JSON" error message in the error console, (3) a database name in the central columns implementation, (4) a group name, or (5) a search name in the bookmarks implementation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129368" comment="phpMyAdmin-4.4.15.7-36.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5706</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5706" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5706" source="CVE"/>
    <description>
    js/get_scripts.js.php in phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 allows remote attackers to cause a denial of service via a large array in the scripts parameter.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129368" comment="phpMyAdmin-4.4.15.7-36.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5730</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5730" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5730" source="CVE"/>
    <description>
    phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 allows remote attackers to obtain sensitive information via vectors involving (1) an array value to FormDisplay.php, (2) incorrect data to validate.php, (3) unexpected data to Validator.php, (4) a missing config directory during setup, or (5) an incorrect OpenID identifier data type, which reveals the full path in an error message.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129368" comment="phpMyAdmin-4.4.15.7-36.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5731</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5731" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5731" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in examples/openid.php in phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 allows remote attackers to inject arbitrary web script or HTML via vectors involving an OpenID error message.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129368" comment="phpMyAdmin-4.4.15.7-36.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5733</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5733" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5733" source="CVE"/>
    <description>
    Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) a crafted table name that is mishandled during privilege checking in table_row.phtml, (2) a crafted mysqld log_bin directive that is mishandled in log_selector.phtml, (3) the Transformation implementation, (4) AJAX error handling in js/ajax.js, (5) the Designer implementation, (6) the charts implementation in js/tbl_chart.js, or (7) the zoom-search implementation in rows_zoom.phtml.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129368" comment="phpMyAdmin-4.4.15.7-36.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5739</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5739" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5739" source="CVE"/>
    <description>
    The Transformation implementation in phpMyAdmin 4.0.x before 4.0.10.16, 4.4.x before 4.4.15.7, and 4.6.x before 4.6.3 does not use the no-referrer Content Security Policy (CSP) protection mechanism, which makes it easier for remote attackers to conduct CSRF attacks by reading an authentication token in a Referer header, related to libraries/Header.php.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129368" comment="phpMyAdmin-4.4.15.7-36.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5766</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5766" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766" source="CVE"/>
    <description>
    Integer overflow in the _gd2GetHeader function in gd_gd2.c in the GD Graphics Library (aka libgd) before 2.2.3, as used in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via crafted chunk dimensions in an image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129776" comment="apache2-mod_php5-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129777" comment="php5-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129778" comment="php5-bcmath-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129779" comment="php5-bz2-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129780" comment="php5-calendar-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129781" comment="php5-ctype-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129782" comment="php5-curl-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129783" comment="php5-dba-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129784" comment="php5-devel-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129785" comment="php5-dom-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129786" comment="php5-enchant-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129787" comment="php5-exif-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129788" comment="php5-fastcgi-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129789" comment="php5-fileinfo-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129790" comment="php5-firebird-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129791" comment="php5-fpm-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129792" comment="php5-ftp-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129793" comment="php5-gd-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129794" comment="php5-gettext-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129795" comment="php5-gmp-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129796" comment="php5-iconv-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129797" comment="php5-imap-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129798" comment="php5-intl-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129799" comment="php5-json-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129800" comment="php5-ldap-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129801" comment="php5-mbstring-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129802" comment="php5-mcrypt-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129803" comment="php5-mssql-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129804" comment="php5-mysql-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129805" comment="php5-odbc-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129806" comment="php5-opcache-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129807" comment="php5-openssl-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129808" comment="php5-pcntl-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129809" comment="php5-pdo-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129810" comment="php5-pear-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129811" comment="php5-pgsql-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129812" comment="php5-phar-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129813" comment="php5-posix-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129814" comment="php5-pspell-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129815" comment="php5-readline-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129816" comment="php5-shmop-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129817" comment="php5-snmp-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129818" comment="php5-soap-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129819" comment="php5-sockets-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129820" comment="php5-sqlite-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129821" comment="php5-suhosin-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129822" comment="php5-sysvmsg-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129823" comment="php5-sysvsem-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129824" comment="php5-sysvshm-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129825" comment="php5-tidy-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129826" comment="php5-tokenizer-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129827" comment="php5-wddx-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129828" comment="php5-xmlreader-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129829" comment="php5-xmlrpc-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129830" comment="php5-xmlwriter-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129831" comment="php5-xsl-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129832" comment="php5-zip-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129833" comment="php5-zlib-5.6.1-69.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5767</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5767" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5767" source="CVE"/>
    <description>
    Integer overflow in the gdImageCreate function in gd.c in the GD Graphics Library (aka libgd) before 2.0.34RC1, as used in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8, allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted image dimensions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129776" comment="apache2-mod_php5-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129777" comment="php5-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129778" comment="php5-bcmath-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129779" comment="php5-bz2-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129780" comment="php5-calendar-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129781" comment="php5-ctype-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129782" comment="php5-curl-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129783" comment="php5-dba-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129784" comment="php5-devel-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129785" comment="php5-dom-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129786" comment="php5-enchant-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129787" comment="php5-exif-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129788" comment="php5-fastcgi-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129789" comment="php5-fileinfo-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129790" comment="php5-firebird-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129791" comment="php5-fpm-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129792" comment="php5-ftp-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129793" comment="php5-gd-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129794" comment="php5-gettext-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129795" comment="php5-gmp-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129796" comment="php5-iconv-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129797" comment="php5-imap-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129798" comment="php5-intl-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129799" comment="php5-json-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129800" comment="php5-ldap-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129801" comment="php5-mbstring-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129802" comment="php5-mcrypt-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129803" comment="php5-mssql-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129804" comment="php5-mysql-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129805" comment="php5-odbc-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129806" comment="php5-opcache-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129807" comment="php5-openssl-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129808" comment="php5-pcntl-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129809" comment="php5-pdo-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129810" comment="php5-pear-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129811" comment="php5-pgsql-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129812" comment="php5-phar-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129813" comment="php5-posix-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129814" comment="php5-pspell-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129815" comment="php5-readline-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129816" comment="php5-shmop-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129817" comment="php5-snmp-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129818" comment="php5-soap-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129819" comment="php5-sockets-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129820" comment="php5-sqlite-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129821" comment="php5-suhosin-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129822" comment="php5-sysvmsg-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129823" comment="php5-sysvsem-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129824" comment="php5-sysvshm-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129825" comment="php5-tidy-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129826" comment="php5-tokenizer-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129827" comment="php5-wddx-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129828" comment="php5-xmlreader-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129829" comment="php5-xmlrpc-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129830" comment="php5-xmlwriter-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129831" comment="php5-xsl-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129832" comment="php5-zip-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129833" comment="php5-zlib-5.6.1-69.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5768</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5768" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5768" source="CVE"/>
    <description>
    Double free vulnerability in the _php_mb_regex_ereg_replace_exec function in php_mbregex.c in the mbstring extension in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) by leveraging a callback exception.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129776" comment="apache2-mod_php5-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129777" comment="php5-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129778" comment="php5-bcmath-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129779" comment="php5-bz2-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129780" comment="php5-calendar-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129781" comment="php5-ctype-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129782" comment="php5-curl-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129783" comment="php5-dba-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129784" comment="php5-devel-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129785" comment="php5-dom-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129786" comment="php5-enchant-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129787" comment="php5-exif-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129788" comment="php5-fastcgi-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129789" comment="php5-fileinfo-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129790" comment="php5-firebird-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129791" comment="php5-fpm-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129792" comment="php5-ftp-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129793" comment="php5-gd-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129794" comment="php5-gettext-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129795" comment="php5-gmp-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129796" comment="php5-iconv-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129797" comment="php5-imap-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129798" comment="php5-intl-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129799" comment="php5-json-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129800" comment="php5-ldap-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129801" comment="php5-mbstring-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129802" comment="php5-mcrypt-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129803" comment="php5-mssql-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129804" comment="php5-mysql-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129805" comment="php5-odbc-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129806" comment="php5-opcache-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129807" comment="php5-openssl-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129808" comment="php5-pcntl-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129809" comment="php5-pdo-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129810" comment="php5-pear-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129811" comment="php5-pgsql-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129812" comment="php5-phar-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129813" comment="php5-posix-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129814" comment="php5-pspell-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129815" comment="php5-readline-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129816" comment="php5-shmop-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129817" comment="php5-snmp-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129818" comment="php5-soap-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129819" comment="php5-sockets-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129820" comment="php5-sqlite-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129821" comment="php5-suhosin-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129822" comment="php5-sysvmsg-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129823" comment="php5-sysvsem-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129824" comment="php5-sysvshm-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129825" comment="php5-tidy-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129826" comment="php5-tokenizer-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129827" comment="php5-wddx-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129828" comment="php5-xmlreader-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129829" comment="php5-xmlrpc-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129830" comment="php5-xmlwriter-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129831" comment="php5-xsl-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129832" comment="php5-zip-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129833" comment="php5-zlib-5.6.1-69.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5769</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5769" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5769" source="CVE"/>
    <description>
    Multiple integer overflows in mcrypt.c in the mcrypt extension in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 allow remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted length value, related to the (1) mcrypt_generic and (2) mdecrypt_generic functions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129776" comment="apache2-mod_php5-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129777" comment="php5-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129778" comment="php5-bcmath-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129779" comment="php5-bz2-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129780" comment="php5-calendar-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129781" comment="php5-ctype-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129782" comment="php5-curl-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129783" comment="php5-dba-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129784" comment="php5-devel-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129785" comment="php5-dom-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129786" comment="php5-enchant-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129787" comment="php5-exif-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129788" comment="php5-fastcgi-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129789" comment="php5-fileinfo-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129790" comment="php5-firebird-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129791" comment="php5-fpm-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129792" comment="php5-ftp-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129793" comment="php5-gd-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129794" comment="php5-gettext-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129795" comment="php5-gmp-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129796" comment="php5-iconv-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129797" comment="php5-imap-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129798" comment="php5-intl-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129799" comment="php5-json-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129800" comment="php5-ldap-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129801" comment="php5-mbstring-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129802" comment="php5-mcrypt-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129803" comment="php5-mssql-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129804" comment="php5-mysql-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129805" comment="php5-odbc-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129806" comment="php5-opcache-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129807" comment="php5-openssl-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129808" comment="php5-pcntl-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129809" comment="php5-pdo-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129810" comment="php5-pear-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129811" comment="php5-pgsql-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129812" comment="php5-phar-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129813" comment="php5-posix-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129814" comment="php5-pspell-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129815" comment="php5-readline-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129816" comment="php5-shmop-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129817" comment="php5-snmp-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129818" comment="php5-soap-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129819" comment="php5-sockets-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129820" comment="php5-sqlite-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129821" comment="php5-suhosin-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129822" comment="php5-sysvmsg-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129823" comment="php5-sysvsem-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129824" comment="php5-sysvshm-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129825" comment="php5-tidy-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129826" comment="php5-tokenizer-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129827" comment="php5-wddx-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129828" comment="php5-xmlreader-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129829" comment="php5-xmlrpc-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129830" comment="php5-xmlwriter-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129831" comment="php5-xsl-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129832" comment="php5-zip-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129833" comment="php5-zlib-5.6.1-69.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5770</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5770" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5770" source="CVE"/>
    <description>
    Integer overflow in the SplFileObject::fread function in spl_directory.c in the SPL extension in PHP before 5.5.37 and 5.6.x before 5.6.23 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large integer argument, a related issue to CVE-2016-5096.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129776" comment="apache2-mod_php5-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129777" comment="php5-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129778" comment="php5-bcmath-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129779" comment="php5-bz2-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129780" comment="php5-calendar-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129781" comment="php5-ctype-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129782" comment="php5-curl-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129783" comment="php5-dba-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129784" comment="php5-devel-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129785" comment="php5-dom-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129786" comment="php5-enchant-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129787" comment="php5-exif-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129788" comment="php5-fastcgi-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129789" comment="php5-fileinfo-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129790" comment="php5-firebird-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129791" comment="php5-fpm-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129792" comment="php5-ftp-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129793" comment="php5-gd-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129794" comment="php5-gettext-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129795" comment="php5-gmp-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129796" comment="php5-iconv-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129797" comment="php5-imap-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129798" comment="php5-intl-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129799" comment="php5-json-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129800" comment="php5-ldap-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129801" comment="php5-mbstring-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129802" comment="php5-mcrypt-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129803" comment="php5-mssql-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129804" comment="php5-mysql-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129805" comment="php5-odbc-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129806" comment="php5-opcache-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129807" comment="php5-openssl-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129808" comment="php5-pcntl-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129809" comment="php5-pdo-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129810" comment="php5-pear-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129811" comment="php5-pgsql-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129812" comment="php5-phar-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129813" comment="php5-posix-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129814" comment="php5-pspell-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129815" comment="php5-readline-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129816" comment="php5-shmop-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129817" comment="php5-snmp-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129818" comment="php5-soap-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129819" comment="php5-sockets-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129820" comment="php5-sqlite-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129821" comment="php5-suhosin-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129822" comment="php5-sysvmsg-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129823" comment="php5-sysvsem-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129824" comment="php5-sysvshm-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129825" comment="php5-tidy-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129826" comment="php5-tokenizer-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129827" comment="php5-wddx-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129828" comment="php5-xmlreader-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129829" comment="php5-xmlrpc-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129830" comment="php5-xmlwriter-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129831" comment="php5-xsl-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129832" comment="php5-zip-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129833" comment="php5-zlib-5.6.1-69.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5771</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5771" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5771" source="CVE"/>
    <description>
    spl_array.c in the SPL extension in PHP before 5.5.37 and 5.6.x before 5.6.23 improperly interacts with the unserialize implementation and garbage collection, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and application crash) via crafted serialized data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129776" comment="apache2-mod_php5-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129777" comment="php5-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129778" comment="php5-bcmath-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129779" comment="php5-bz2-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129780" comment="php5-calendar-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129781" comment="php5-ctype-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129782" comment="php5-curl-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129783" comment="php5-dba-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129784" comment="php5-devel-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129785" comment="php5-dom-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129786" comment="php5-enchant-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129787" comment="php5-exif-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129788" comment="php5-fastcgi-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129789" comment="php5-fileinfo-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129790" comment="php5-firebird-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129791" comment="php5-fpm-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129792" comment="php5-ftp-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129793" comment="php5-gd-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129794" comment="php5-gettext-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129795" comment="php5-gmp-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129796" comment="php5-iconv-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129797" comment="php5-imap-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129798" comment="php5-intl-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129799" comment="php5-json-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129800" comment="php5-ldap-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129801" comment="php5-mbstring-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129802" comment="php5-mcrypt-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129803" comment="php5-mssql-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129804" comment="php5-mysql-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129805" comment="php5-odbc-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129806" comment="php5-opcache-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129807" comment="php5-openssl-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129808" comment="php5-pcntl-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129809" comment="php5-pdo-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129810" comment="php5-pear-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129811" comment="php5-pgsql-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129812" comment="php5-phar-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129813" comment="php5-posix-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129814" comment="php5-pspell-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129815" comment="php5-readline-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129816" comment="php5-shmop-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129817" comment="php5-snmp-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129818" comment="php5-soap-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129819" comment="php5-sockets-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129820" comment="php5-sqlite-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129821" comment="php5-suhosin-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129822" comment="php5-sysvmsg-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129823" comment="php5-sysvsem-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129824" comment="php5-sysvshm-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129825" comment="php5-tidy-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129826" comment="php5-tokenizer-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129827" comment="php5-wddx-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129828" comment="php5-xmlreader-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129829" comment="php5-xmlrpc-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129830" comment="php5-xmlwriter-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129831" comment="php5-xsl-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129832" comment="php5-zip-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129833" comment="php5-zlib-5.6.1-69.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5772</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5772" source="CVE"/>
    <description>
    Double free vulnerability in the php_wddx_process_data function in wddx.c in the WDDX extension in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted XML data that is mishandled in a wddx_deserialize call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129776" comment="apache2-mod_php5-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129777" comment="php5-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129778" comment="php5-bcmath-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129779" comment="php5-bz2-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129780" comment="php5-calendar-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129781" comment="php5-ctype-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129782" comment="php5-curl-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129783" comment="php5-dba-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129784" comment="php5-devel-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129785" comment="php5-dom-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129786" comment="php5-enchant-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129787" comment="php5-exif-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129788" comment="php5-fastcgi-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129789" comment="php5-fileinfo-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129790" comment="php5-firebird-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129791" comment="php5-fpm-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129792" comment="php5-ftp-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129793" comment="php5-gd-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129794" comment="php5-gettext-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129795" comment="php5-gmp-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129796" comment="php5-iconv-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129797" comment="php5-imap-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129798" comment="php5-intl-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129799" comment="php5-json-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129800" comment="php5-ldap-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129801" comment="php5-mbstring-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129802" comment="php5-mcrypt-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129803" comment="php5-mssql-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129804" comment="php5-mysql-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129805" comment="php5-odbc-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129806" comment="php5-opcache-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129807" comment="php5-openssl-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129808" comment="php5-pcntl-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129809" comment="php5-pdo-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129810" comment="php5-pear-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129811" comment="php5-pgsql-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129812" comment="php5-phar-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129813" comment="php5-posix-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129814" comment="php5-pspell-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129815" comment="php5-readline-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129816" comment="php5-shmop-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129817" comment="php5-snmp-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129818" comment="php5-soap-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129819" comment="php5-sockets-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129820" comment="php5-sqlite-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129821" comment="php5-suhosin-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129822" comment="php5-sysvmsg-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129823" comment="php5-sysvsem-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129824" comment="php5-sysvshm-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129825" comment="php5-tidy-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129826" comment="php5-tokenizer-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129827" comment="php5-wddx-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129828" comment="php5-xmlreader-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129829" comment="php5-xmlrpc-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129830" comment="php5-xmlwriter-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129831" comment="php5-xsl-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129832" comment="php5-zip-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129833" comment="php5-zlib-5.6.1-69.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5773</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5773" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5773" source="CVE"/>
    <description>
    php_zip.c in the zip extension in PHP before 5.5.37, 5.6.x before 5.6.23, and 7.x before 7.0.8 improperly interacts with the unserialize implementation and garbage collection, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and application crash) via crafted serialized data containing a ZipArchive object.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129776" comment="apache2-mod_php5-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129777" comment="php5-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129778" comment="php5-bcmath-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129779" comment="php5-bz2-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129780" comment="php5-calendar-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129781" comment="php5-ctype-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129782" comment="php5-curl-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129783" comment="php5-dba-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129784" comment="php5-devel-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129785" comment="php5-dom-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129786" comment="php5-enchant-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129787" comment="php5-exif-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129788" comment="php5-fastcgi-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129789" comment="php5-fileinfo-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129790" comment="php5-firebird-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129791" comment="php5-fpm-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129792" comment="php5-ftp-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129793" comment="php5-gd-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129794" comment="php5-gettext-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129795" comment="php5-gmp-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129796" comment="php5-iconv-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129797" comment="php5-imap-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129798" comment="php5-intl-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129799" comment="php5-json-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129800" comment="php5-ldap-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129801" comment="php5-mbstring-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129802" comment="php5-mcrypt-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129803" comment="php5-mssql-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129804" comment="php5-mysql-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129805" comment="php5-odbc-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129806" comment="php5-opcache-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129807" comment="php5-openssl-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129808" comment="php5-pcntl-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129809" comment="php5-pdo-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129810" comment="php5-pear-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129811" comment="php5-pgsql-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129812" comment="php5-phar-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129813" comment="php5-posix-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129814" comment="php5-pspell-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129815" comment="php5-readline-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129816" comment="php5-shmop-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129817" comment="php5-snmp-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129818" comment="php5-soap-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129819" comment="php5-sockets-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129820" comment="php5-sqlite-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129821" comment="php5-suhosin-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129822" comment="php5-sysvmsg-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129823" comment="php5-sysvsem-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129824" comment="php5-sysvshm-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129825" comment="php5-tidy-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129826" comment="php5-tokenizer-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129827" comment="php5-wddx-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129828" comment="php5-xmlreader-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129829" comment="php5-xmlrpc-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129830" comment="php5-xmlwriter-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129831" comment="php5-xsl-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129832" comment="php5-zip-5.6.1-69.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129833" comment="php5-zlib-5.6.1-69.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5829</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5829" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5829" source="CVE"/>
    <description>
    Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel through 4.6.3 allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133272" comment="bbswitch-0.8-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133273" comment="bbswitch-kmp-default-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133274" comment="bbswitch-kmp-desktop-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133275" comment="bbswitch-kmp-pae-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133276" comment="bbswitch-kmp-xen-0.8_k3.16.7_42-3.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133277" comment="cloop-2.639-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133278" comment="cloop-kmp-default-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133279" comment="cloop-kmp-desktop-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133280" comment="cloop-kmp-pae-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133281" comment="cloop-kmp-xen-2.639_k3.16.7_42-14.20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133282" comment="crash-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133283" comment="crash-devel-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133284" comment="crash-doc-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133285" comment="crash-eppic-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133286" comment="crash-gcore-7.0.8-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133287" comment="crash-kmp-default-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133288" comment="crash-kmp-desktop-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133289" comment="crash-kmp-pae-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133290" comment="crash-kmp-xen-7.0.8_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133291" comment="hdjmod-1.28-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133292" comment="hdjmod-kmp-default-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133293" comment="hdjmod-kmp-desktop-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133294" comment="hdjmod-kmp-pae-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133295" comment="hdjmod-kmp-xen-1.28_k3.16.7_42-18.21.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133296" comment="ipset-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133297" comment="ipset-devel-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133298" comment="ipset-kmp-default-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133299" comment="ipset-kmp-desktop-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133300" comment="ipset-kmp-pae-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133301" comment="ipset-kmp-xen-6.23_k3.16.7_42-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133302" comment="kernel-debug-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133303" comment="kernel-debug-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133304" comment="kernel-debug-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133305" comment="kernel-default-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133306" comment="kernel-default-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133307" comment="kernel-default-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133308" comment="kernel-desktop-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133309" comment="kernel-desktop-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133310" comment="kernel-desktop-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133311" comment="kernel-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133312" comment="kernel-docs-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133313" comment="kernel-ec2-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133314" comment="kernel-ec2-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133315" comment="kernel-ec2-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133316" comment="kernel-macros-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133317" comment="kernel-obs-build-3.16.7-42.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133318" comment="kernel-obs-qa-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133319" comment="kernel-obs-qa-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133320" comment="kernel-pae-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133321" comment="kernel-pae-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133322" comment="kernel-pae-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133323" comment="kernel-source-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133324" comment="kernel-source-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133325" comment="kernel-syms-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133326" comment="kernel-vanilla-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133327" comment="kernel-vanilla-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133328" comment="kernel-xen-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133329" comment="kernel-xen-base-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133330" comment="kernel-xen-devel-3.16.7-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133331" comment="libipset3-6.23-20.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133332" comment="pcfclock-0.44-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133333" comment="pcfclock-kmp-default-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133334" comment="pcfclock-kmp-desktop-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133335" comment="pcfclock-kmp-pae-0.44_k3.16.7_42-260.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133336" comment="python-virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133337" comment="vhba-kmp-20140629-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133338" comment="vhba-kmp-default-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133339" comment="vhba-kmp-desktop-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133340" comment="vhba-kmp-pae-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133341" comment="vhba-kmp-xen-20140629_k3.16.7_42-2.20.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133342" comment="virtualbox-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133343" comment="virtualbox-devel-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133344" comment="virtualbox-guest-desktop-icons-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133345" comment="virtualbox-guest-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133346" comment="virtualbox-guest-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133347" comment="virtualbox-guest-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133348" comment="virtualbox-guest-tools-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133349" comment="virtualbox-guest-x11-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133350" comment="virtualbox-host-kmp-default-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133351" comment="virtualbox-host-kmp-desktop-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133352" comment="virtualbox-host-kmp-pae-5.0.20_k3.16.7_42-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133353" comment="virtualbox-host-source-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133354" comment="virtualbox-qt-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133355" comment="virtualbox-websrv-5.0.20-48.5 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133356" comment="xen-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133357" comment="xen-devel-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133358" comment="xen-doc-html-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133359" comment="xen-kmp-default-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133360" comment="xen-kmp-desktop-4.4.4_02_k3.16.7_42-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133361" comment="xen-libs-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133362" comment="xen-libs-32bit-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133363" comment="xen-tools-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133364" comment="xen-tools-domU-4.4.4_02-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133365" comment="xtables-addons-2.6-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133366" comment="xtables-addons-kmp-default-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133367" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133368" comment="xtables-addons-kmp-pae-2.6_k3.16.7_42-22.3 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133369" comment="xtables-addons-kmp-xen-2.6_k3.16.7_42-22.3 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5841</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5841" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5841" source="CVE"/>
    <description>
    Integer overflow in MagickCore/profile.c in ImageMagick before 7.0.2-1 allows remote attackers to cause a denial of service (segmentation fault) or possibly execute arbitrary code via vectors involving the offset variable.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5842</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5842" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5842" source="CVE"/>
    <description>
    MagickCore/property.c in ImageMagick before 7.0.2-1 allows remote attackers to obtain sensitive memory information via vectors involving the q variable, which triggers an out-of-bounds read.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009129762" comment="ImageMagick-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129763" comment="ImageMagick-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129764" comment="ImageMagick-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129765" comment="ImageMagick-doc-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129766" comment="ImageMagick-extra-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129767" comment="libMagick++-6_Q16-5-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129768" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129769" comment="libMagick++-devel-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129770" comment="libMagick++-devel-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129771" comment="libMagickCore-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129772" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129773" comment="libMagickWand-6_Q16-2-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129774" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009129775" comment="perl-PerlMagick-6.8.9.8-26.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20165875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-5875</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-5875" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5875" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136807" comment="libtiff-devel-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136808" comment="libtiff-devel-32bit-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136809" comment="libtiff5-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136810" comment="libtiff5-32bit-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136811" comment="tiff-4.0.7-10.35.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6128</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6128" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6128" source="CVE"/>
    <description>
    The gdImageCropThreshold function in gd_crop.c in the GD Graphics Library (aka libgd) before 2.2.3, as used in PHP before 7.0.9, allows remote attackers to cause a denial of service (application crash) via an invalid color index.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134038" comment="apache2-mod_php5-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133257" comment="gd-2.1.0-7.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133258" comment="gd-devel-2.1.0-7.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133259" comment="libgd3-2.1.0-7.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133260" comment="libgd3-32bit-2.1.0-7.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134039" comment="php5-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134040" comment="php5-bcmath-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134041" comment="php5-bz2-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134042" comment="php5-calendar-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134043" comment="php5-ctype-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134044" comment="php5-curl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134045" comment="php5-dba-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134046" comment="php5-devel-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134047" comment="php5-dom-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134048" comment="php5-enchant-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134049" comment="php5-exif-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134050" comment="php5-fastcgi-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134051" comment="php5-fileinfo-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134052" comment="php5-firebird-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134053" comment="php5-fpm-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134054" comment="php5-ftp-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134055" comment="php5-gd-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134056" comment="php5-gettext-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134057" comment="php5-gmp-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134058" comment="php5-iconv-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134059" comment="php5-imap-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134060" comment="php5-intl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134061" comment="php5-json-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134062" comment="php5-ldap-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134063" comment="php5-mbstring-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134064" comment="php5-mcrypt-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134065" comment="php5-mssql-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134066" comment="php5-mysql-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134067" comment="php5-odbc-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134068" comment="php5-opcache-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134069" comment="php5-openssl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134070" comment="php5-pcntl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134071" comment="php5-pdo-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134072" comment="php5-pear-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134073" comment="php5-pgsql-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134074" comment="php5-phar-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134075" comment="php5-posix-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134076" comment="php5-pspell-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134077" comment="php5-readline-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134078" comment="php5-shmop-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134079" comment="php5-snmp-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134080" comment="php5-soap-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134081" comment="php5-sockets-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134082" comment="php5-sqlite-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134083" comment="php5-suhosin-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134084" comment="php5-sysvmsg-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134085" comment="php5-sysvsem-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134086" comment="php5-sysvshm-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134087" comment="php5-tidy-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134088" comment="php5-tokenizer-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134089" comment="php5-wddx-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134090" comment="php5-xmlreader-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134091" comment="php5-xmlrpc-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134092" comment="php5-xmlwriter-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134093" comment="php5-xsl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134094" comment="php5-zip-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134095" comment="php5-zlib-5.6.1-72.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6132</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6132" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6132" source="CVE"/>
    <description>
    The gdImageCreateFromTgaCtx function in the GD Graphics Library (aka libgd) before 2.2.3 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133257" comment="gd-2.1.0-7.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133258" comment="gd-devel-2.1.0-7.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133259" comment="libgd3-2.1.0-7.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133260" comment="libgd3-32bit-2.1.0-7.11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6153</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6153" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6153" source="CVE"/>
    <description>
    os_unix.c in SQLite before 3.13.0 improperly implements the temporary directory search algorithm, which might allow local users to obtain sensitive information, cause a denial of service (application crash), or have unspecified other impact by leveraging use of the current working directory for temporary files.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130741" comment="libsqlite3-0-3.8.6-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130742" comment="libsqlite3-0-32bit-3.8.6-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130743" comment="sqlite3-3.8.6-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130744" comment="sqlite3-devel-3.8.6-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130745" comment="sqlite3-doc-3.8.6-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6161</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6161" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6161" source="CVE"/>
    <description>
    The output function in gd_gif_out.c in the GD Graphics Library (aka libgd) allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134038" comment="apache2-mod_php5-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133257" comment="gd-2.1.0-7.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133258" comment="gd-devel-2.1.0-7.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133259" comment="libgd3-2.1.0-7.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133260" comment="libgd3-32bit-2.1.0-7.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134039" comment="php5-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134040" comment="php5-bcmath-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134041" comment="php5-bz2-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134042" comment="php5-calendar-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134043" comment="php5-ctype-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134044" comment="php5-curl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134045" comment="php5-dba-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134046" comment="php5-devel-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134047" comment="php5-dom-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134048" comment="php5-enchant-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134049" comment="php5-exif-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134050" comment="php5-fastcgi-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134051" comment="php5-fileinfo-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134052" comment="php5-firebird-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134053" comment="php5-fpm-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134054" comment="php5-ftp-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134055" comment="php5-gd-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134056" comment="php5-gettext-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134057" comment="php5-gmp-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134058" comment="php5-iconv-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134059" comment="php5-imap-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134060" comment="php5-intl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134061" comment="php5-json-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134062" comment="php5-ldap-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134063" comment="php5-mbstring-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134064" comment="php5-mcrypt-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134065" comment="php5-mssql-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134066" comment="php5-mysql-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134067" comment="php5-odbc-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134068" comment="php5-opcache-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134069" comment="php5-openssl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134070" comment="php5-pcntl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134071" comment="php5-pdo-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134072" comment="php5-pear-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134073" comment="php5-pgsql-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134074" comment="php5-phar-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134075" comment="php5-posix-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134076" comment="php5-pspell-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134077" comment="php5-readline-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134078" comment="php5-shmop-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134079" comment="php5-snmp-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134080" comment="php5-soap-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134081" comment="php5-sockets-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134082" comment="php5-sqlite-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134083" comment="php5-suhosin-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134084" comment="php5-sysvmsg-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134085" comment="php5-sysvsem-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134086" comment="php5-sysvshm-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134087" comment="php5-tidy-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134088" comment="php5-tokenizer-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134089" comment="php5-wddx-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134090" comment="php5-xmlreader-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134091" comment="php5-xmlrpc-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134092" comment="php5-xmlwriter-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134093" comment="php5-xsl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134094" comment="php5-zip-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134095" comment="php5-zlib-5.6.1-72.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6172</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6172" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6172" source="CVE"/>
    <description>
    PowerDNS (aka pdns) Authoritative Server before 4.0.1 allows remote primary DNS servers to cause a denial of service (memory exhaustion and secondary DNS server crash) via a large (1) AXFR or (2) IXFR response.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134203" comment="pdns-3.3.1-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134204" comment="pdns-backend-ldap-3.3.1-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134205" comment="pdns-backend-lua-3.3.1-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134206" comment="pdns-backend-mydns-3.3.1-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134207" comment="pdns-backend-mysql-3.3.1-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134208" comment="pdns-backend-postgresql-3.3.1-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134209" comment="pdns-backend-sqlite3-3.3.1-2.6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6207</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6207" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6207" source="CVE"/>
    <description>
    Integer overflow in the _gdContributionsAlloc function in gd_interpolation.c in GD Graphics Library (aka libgd) before 2.2.3 allows remote attackers to cause a denial of service (out-of-bounds memory write or memory consumption) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134038" comment="apache2-mod_php5-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133257" comment="gd-2.1.0-7.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133258" comment="gd-devel-2.1.0-7.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133259" comment="libgd3-2.1.0-7.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133260" comment="libgd3-32bit-2.1.0-7.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134039" comment="php5-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134040" comment="php5-bcmath-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134041" comment="php5-bz2-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134042" comment="php5-calendar-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134043" comment="php5-ctype-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134044" comment="php5-curl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134045" comment="php5-dba-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134046" comment="php5-devel-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134047" comment="php5-dom-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134048" comment="php5-enchant-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134049" comment="php5-exif-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134050" comment="php5-fastcgi-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134051" comment="php5-fileinfo-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134052" comment="php5-firebird-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134053" comment="php5-fpm-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134054" comment="php5-ftp-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134055" comment="php5-gd-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134056" comment="php5-gettext-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134057" comment="php5-gmp-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134058" comment="php5-iconv-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134059" comment="php5-imap-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134060" comment="php5-intl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134061" comment="php5-json-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134062" comment="php5-ldap-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134063" comment="php5-mbstring-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134064" comment="php5-mcrypt-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134065" comment="php5-mssql-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134066" comment="php5-mysql-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134067" comment="php5-odbc-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134068" comment="php5-opcache-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134069" comment="php5-openssl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134070" comment="php5-pcntl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134071" comment="php5-pdo-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134072" comment="php5-pear-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134073" comment="php5-pgsql-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134074" comment="php5-phar-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134075" comment="php5-posix-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134076" comment="php5-pspell-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134077" comment="php5-readline-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134078" comment="php5-shmop-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134079" comment="php5-snmp-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134080" comment="php5-soap-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134081" comment="php5-sockets-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134082" comment="php5-sqlite-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134083" comment="php5-suhosin-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134084" comment="php5-sysvmsg-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134085" comment="php5-sysvsem-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134086" comment="php5-sysvshm-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134087" comment="php5-tidy-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134088" comment="php5-tokenizer-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134089" comment="php5-wddx-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134090" comment="php5-xmlreader-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134091" comment="php5-xmlrpc-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134092" comment="php5-xmlwriter-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134093" comment="php5-xsl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134094" comment="php5-zip-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134095" comment="php5-zlib-5.6.1-72.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6214</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6214" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6214" source="CVE"/>
    <description>
    gd_tga.c in the GD Graphics Library (aka libgd) before 2.2.3 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133257" comment="gd-2.1.0-7.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133258" comment="gd-devel-2.1.0-7.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133259" comment="libgd3-2.1.0-7.11.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133260" comment="libgd3-32bit-2.1.0-7.11.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6232</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6232" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6232" source="CVE"/>
    <description>
    Directory traversal vulnerability in KArchive before 5.24, as used in KDE Frameworks, allows remote attackers to write to arbitrary files via a ../ (dot dot slash) in a filename in an archive file, related to KNewsstuff downloads.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130713" comment="karchive-5.11.0-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130714" comment="karchive-devel-5.11.0-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130715" comment="karchive-devel-32bit-5.11.0-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130716" comment="libKF5Archive5-5.11.0-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130717" comment="libKF5Archive5-32bit-5.11.0-27.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6258</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6258" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6258" source="CVE"/>
    <description>
    The PV pagetable code in arch/x86/mm.c in Xen 4.7.x and earlier allows local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133720" comment="xen-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133721" comment="xen-devel-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133722" comment="xen-doc-html-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133723" comment="xen-kmp-default-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133724" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133725" comment="xen-libs-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133726" comment="xen-libs-32bit-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133727" comment="xen-tools-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133728" comment="xen-tools-domU-4.4.4_05-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6262</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6262" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6262" source="CVE"/>
    <description>
    idn in libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read, a different vulnerability than CVE-2015-8948.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130734" comment="libidn-1.33-3.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130735" comment="libidn-devel-1.33-3.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130736" comment="libidn-tools-1.33-3.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130737" comment="libidn11-1.33-3.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130738" comment="libidn11-32bit-1.33-3.6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6263</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6263" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6263" source="CVE"/>
    <description>
    The stringprep_utf8_nfkc_normalize function in lib/nfkc.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via crafted UTF-8 data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130734" comment="libidn-1.33-3.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130735" comment="libidn-devel-1.33-3.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130736" comment="libidn-tools-1.33-3.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130737" comment="libidn11-1.33-3.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130738" comment="libidn11-32bit-1.33-3.6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6265</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6265" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6265" source="CVE"/>
    <description>
    Use-after-free vulnerability in the pdf_load_xref function in pdf/pdf-xref.c in MuPDF allows remote attackers to cause a denial of service (crash) via a crafted PDF file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130749" comment="mupdf-1.5-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130750" comment="mupdf-devel-static-1.5-2.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6288</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6288" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6288" source="CVE"/>
    <description>
    The php_url_parse_ex function in ext/standard/url.c in PHP before 5.5.38 allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via vectors involving the smart_str data type.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134038" comment="apache2-mod_php5-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134039" comment="php5-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134040" comment="php5-bcmath-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134041" comment="php5-bz2-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134042" comment="php5-calendar-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134043" comment="php5-ctype-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134044" comment="php5-curl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134045" comment="php5-dba-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134046" comment="php5-devel-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134047" comment="php5-dom-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134048" comment="php5-enchant-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134049" comment="php5-exif-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134050" comment="php5-fastcgi-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134051" comment="php5-fileinfo-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134052" comment="php5-firebird-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134053" comment="php5-fpm-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134054" comment="php5-ftp-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134055" comment="php5-gd-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134056" comment="php5-gettext-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134057" comment="php5-gmp-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134058" comment="php5-iconv-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134059" comment="php5-imap-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134060" comment="php5-intl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134061" comment="php5-json-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134062" comment="php5-ldap-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134063" comment="php5-mbstring-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134064" comment="php5-mcrypt-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134065" comment="php5-mssql-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134066" comment="php5-mysql-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134067" comment="php5-odbc-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134068" comment="php5-opcache-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134069" comment="php5-openssl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134070" comment="php5-pcntl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134071" comment="php5-pdo-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134072" comment="php5-pear-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134073" comment="php5-pgsql-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134074" comment="php5-phar-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134075" comment="php5-posix-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134076" comment="php5-pspell-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134077" comment="php5-readline-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134078" comment="php5-shmop-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134079" comment="php5-snmp-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134080" comment="php5-soap-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134081" comment="php5-sockets-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134082" comment="php5-sqlite-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134083" comment="php5-suhosin-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134084" comment="php5-sysvmsg-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134085" comment="php5-sysvsem-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134086" comment="php5-sysvshm-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134087" comment="php5-tidy-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134088" comment="php5-tokenizer-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134089" comment="php5-wddx-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134090" comment="php5-xmlreader-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134091" comment="php5-xmlrpc-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134092" comment="php5-xmlwriter-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134093" comment="php5-xsl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134094" comment="php5-zip-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134095" comment="php5-zlib-5.6.1-72.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6289</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6289" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6289" source="CVE"/>
    <description>
    Integer overflow in the virtual_file_ex function in TSRM/tsrm_virtual_cwd.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a crafted extract operation on a ZIP archive.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134038" comment="apache2-mod_php5-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134039" comment="php5-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134040" comment="php5-bcmath-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134041" comment="php5-bz2-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134042" comment="php5-calendar-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134043" comment="php5-ctype-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134044" comment="php5-curl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134045" comment="php5-dba-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134046" comment="php5-devel-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134047" comment="php5-dom-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134048" comment="php5-enchant-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134049" comment="php5-exif-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134050" comment="php5-fastcgi-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134051" comment="php5-fileinfo-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134052" comment="php5-firebird-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134053" comment="php5-fpm-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134054" comment="php5-ftp-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134055" comment="php5-gd-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134056" comment="php5-gettext-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134057" comment="php5-gmp-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134058" comment="php5-iconv-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134059" comment="php5-imap-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134060" comment="php5-intl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134061" comment="php5-json-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134062" comment="php5-ldap-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134063" comment="php5-mbstring-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134064" comment="php5-mcrypt-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134065" comment="php5-mssql-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134066" comment="php5-mysql-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134067" comment="php5-odbc-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134068" comment="php5-opcache-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134069" comment="php5-openssl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134070" comment="php5-pcntl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134071" comment="php5-pdo-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134072" comment="php5-pear-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134073" comment="php5-pgsql-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134074" comment="php5-phar-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134075" comment="php5-posix-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134076" comment="php5-pspell-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134077" comment="php5-readline-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134078" comment="php5-shmop-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134079" comment="php5-snmp-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134080" comment="php5-soap-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134081" comment="php5-sockets-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134082" comment="php5-sqlite-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134083" comment="php5-suhosin-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134084" comment="php5-sysvmsg-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134085" comment="php5-sysvsem-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134086" comment="php5-sysvshm-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134087" comment="php5-tidy-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134088" comment="php5-tokenizer-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134089" comment="php5-wddx-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134090" comment="php5-xmlreader-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134091" comment="php5-xmlrpc-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134092" comment="php5-xmlwriter-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134093" comment="php5-xsl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134094" comment="php5-zip-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134095" comment="php5-zlib-5.6.1-72.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6290</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6290" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6290" source="CVE"/>
    <description>
    ext/session/session.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 does not properly maintain a certain hash data structure, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via vectors related to session deserialization.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134038" comment="apache2-mod_php5-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134039" comment="php5-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134040" comment="php5-bcmath-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134041" comment="php5-bz2-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134042" comment="php5-calendar-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134043" comment="php5-ctype-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134044" comment="php5-curl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134045" comment="php5-dba-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134046" comment="php5-devel-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134047" comment="php5-dom-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134048" comment="php5-enchant-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134049" comment="php5-exif-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134050" comment="php5-fastcgi-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134051" comment="php5-fileinfo-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134052" comment="php5-firebird-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134053" comment="php5-fpm-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134054" comment="php5-ftp-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134055" comment="php5-gd-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134056" comment="php5-gettext-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134057" comment="php5-gmp-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134058" comment="php5-iconv-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134059" comment="php5-imap-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134060" comment="php5-intl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134061" comment="php5-json-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134062" comment="php5-ldap-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134063" comment="php5-mbstring-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134064" comment="php5-mcrypt-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134065" comment="php5-mssql-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134066" comment="php5-mysql-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134067" comment="php5-odbc-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134068" comment="php5-opcache-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134069" comment="php5-openssl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134070" comment="php5-pcntl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134071" comment="php5-pdo-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134072" comment="php5-pear-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134073" comment="php5-pgsql-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134074" comment="php5-phar-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134075" comment="php5-posix-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134076" comment="php5-pspell-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134077" comment="php5-readline-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134078" comment="php5-shmop-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134079" comment="php5-snmp-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134080" comment="php5-soap-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134081" comment="php5-sockets-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134082" comment="php5-sqlite-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134083" comment="php5-suhosin-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134084" comment="php5-sysvmsg-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134085" comment="php5-sysvsem-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134086" comment="php5-sysvshm-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134087" comment="php5-tidy-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134088" comment="php5-tokenizer-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134089" comment="php5-wddx-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134090" comment="php5-xmlreader-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134091" comment="php5-xmlrpc-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134092" comment="php5-xmlwriter-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134093" comment="php5-xsl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134094" comment="php5-zip-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134095" comment="php5-zlib-5.6.1-72.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6291</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6291" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6291" source="CVE"/>
    <description>
    The exif_process_IFD_in_MAKERNOTE function in ext/exif/exif.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (out-of-bounds array access and memory corruption), obtain sensitive information from process memory, or possibly have unspecified other impact via a crafted JPEG image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134038" comment="apache2-mod_php5-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134039" comment="php5-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134040" comment="php5-bcmath-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134041" comment="php5-bz2-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134042" comment="php5-calendar-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134043" comment="php5-ctype-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134044" comment="php5-curl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134045" comment="php5-dba-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134046" comment="php5-devel-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134047" comment="php5-dom-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134048" comment="php5-enchant-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134049" comment="php5-exif-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134050" comment="php5-fastcgi-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134051" comment="php5-fileinfo-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134052" comment="php5-firebird-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134053" comment="php5-fpm-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134054" comment="php5-ftp-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134055" comment="php5-gd-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134056" comment="php5-gettext-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134057" comment="php5-gmp-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134058" comment="php5-iconv-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134059" comment="php5-imap-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134060" comment="php5-intl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134061" comment="php5-json-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134062" comment="php5-ldap-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134063" comment="php5-mbstring-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134064" comment="php5-mcrypt-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134065" comment="php5-mssql-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134066" comment="php5-mysql-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134067" comment="php5-odbc-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134068" comment="php5-opcache-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134069" comment="php5-openssl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134070" comment="php5-pcntl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134071" comment="php5-pdo-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134072" comment="php5-pear-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134073" comment="php5-pgsql-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134074" comment="php5-phar-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134075" comment="php5-posix-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134076" comment="php5-pspell-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134077" comment="php5-readline-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134078" comment="php5-shmop-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134079" comment="php5-snmp-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134080" comment="php5-soap-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134081" comment="php5-sockets-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134082" comment="php5-sqlite-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134083" comment="php5-suhosin-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134084" comment="php5-sysvmsg-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134085" comment="php5-sysvsem-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134086" comment="php5-sysvshm-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134087" comment="php5-tidy-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134088" comment="php5-tokenizer-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134089" comment="php5-wddx-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134090" comment="php5-xmlreader-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134091" comment="php5-xmlrpc-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134092" comment="php5-xmlwriter-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134093" comment="php5-xsl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134094" comment="php5-zip-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134095" comment="php5-zlib-5.6.1-72.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6292</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6292" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6292" source="CVE"/>
    <description>
    The exif_process_user_comment function in ext/exif/exif.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted JPEG image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134038" comment="apache2-mod_php5-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134039" comment="php5-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134040" comment="php5-bcmath-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134041" comment="php5-bz2-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134042" comment="php5-calendar-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134043" comment="php5-ctype-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134044" comment="php5-curl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134045" comment="php5-dba-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134046" comment="php5-devel-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134047" comment="php5-dom-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134048" comment="php5-enchant-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134049" comment="php5-exif-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134050" comment="php5-fastcgi-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134051" comment="php5-fileinfo-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134052" comment="php5-firebird-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134053" comment="php5-fpm-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134054" comment="php5-ftp-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134055" comment="php5-gd-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134056" comment="php5-gettext-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134057" comment="php5-gmp-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134058" comment="php5-iconv-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134059" comment="php5-imap-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134060" comment="php5-intl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134061" comment="php5-json-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134062" comment="php5-ldap-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134063" comment="php5-mbstring-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134064" comment="php5-mcrypt-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134065" comment="php5-mssql-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134066" comment="php5-mysql-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134067" comment="php5-odbc-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134068" comment="php5-opcache-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134069" comment="php5-openssl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134070" comment="php5-pcntl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134071" comment="php5-pdo-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134072" comment="php5-pear-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134073" comment="php5-pgsql-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134074" comment="php5-phar-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134075" comment="php5-posix-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134076" comment="php5-pspell-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134077" comment="php5-readline-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134078" comment="php5-shmop-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134079" comment="php5-snmp-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134080" comment="php5-soap-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134081" comment="php5-sockets-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134082" comment="php5-sqlite-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134083" comment="php5-suhosin-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134084" comment="php5-sysvmsg-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134085" comment="php5-sysvsem-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134086" comment="php5-sysvshm-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134087" comment="php5-tidy-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134088" comment="php5-tokenizer-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134089" comment="php5-wddx-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134090" comment="php5-xmlreader-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134091" comment="php5-xmlrpc-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134092" comment="php5-xmlwriter-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134093" comment="php5-xsl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134094" comment="php5-zip-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134095" comment="php5-zlib-5.6.1-72.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6295</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6295" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6295" source="CVE"/>
    <description>
    ext/snmp/snmp.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 improperly interacts with the unserialize implementation and garbage collection, which allows remote attackers to cause a denial of service (use-after-free and application crash) or possibly have unspecified other impact via crafted serialized data, a related issue to CVE-2016-5773.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134038" comment="apache2-mod_php5-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134039" comment="php5-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134040" comment="php5-bcmath-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134041" comment="php5-bz2-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134042" comment="php5-calendar-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134043" comment="php5-ctype-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134044" comment="php5-curl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134045" comment="php5-dba-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134046" comment="php5-devel-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134047" comment="php5-dom-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134048" comment="php5-enchant-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134049" comment="php5-exif-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134050" comment="php5-fastcgi-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134051" comment="php5-fileinfo-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134052" comment="php5-firebird-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134053" comment="php5-fpm-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134054" comment="php5-ftp-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134055" comment="php5-gd-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134056" comment="php5-gettext-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134057" comment="php5-gmp-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134058" comment="php5-iconv-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134059" comment="php5-imap-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134060" comment="php5-intl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134061" comment="php5-json-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134062" comment="php5-ldap-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134063" comment="php5-mbstring-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134064" comment="php5-mcrypt-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134065" comment="php5-mssql-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134066" comment="php5-mysql-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134067" comment="php5-odbc-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134068" comment="php5-opcache-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134069" comment="php5-openssl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134070" comment="php5-pcntl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134071" comment="php5-pdo-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134072" comment="php5-pear-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134073" comment="php5-pgsql-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134074" comment="php5-phar-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134075" comment="php5-posix-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134076" comment="php5-pspell-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134077" comment="php5-readline-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134078" comment="php5-shmop-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134079" comment="php5-snmp-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134080" comment="php5-soap-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134081" comment="php5-sockets-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134082" comment="php5-sqlite-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134083" comment="php5-suhosin-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134084" comment="php5-sysvmsg-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134085" comment="php5-sysvsem-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134086" comment="php5-sysvshm-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134087" comment="php5-tidy-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134088" comment="php5-tokenizer-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134089" comment="php5-wddx-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134090" comment="php5-xmlreader-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134091" comment="php5-xmlrpc-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134092" comment="php5-xmlwriter-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134093" comment="php5-xsl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134094" comment="php5-zip-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134095" comment="php5-zlib-5.6.1-72.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6296</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6296" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6296" source="CVE"/>
    <description>
    Integer signedness error in the simplestring_addn function in simplestring.c in xmlrpc-epi through 0.54.2, as used in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a long first argument to the PHP xmlrpc_encode_request function.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134038" comment="apache2-mod_php5-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134039" comment="php5-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134040" comment="php5-bcmath-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134041" comment="php5-bz2-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134042" comment="php5-calendar-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134043" comment="php5-ctype-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134044" comment="php5-curl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134045" comment="php5-dba-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134046" comment="php5-devel-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134047" comment="php5-dom-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134048" comment="php5-enchant-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134049" comment="php5-exif-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134050" comment="php5-fastcgi-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134051" comment="php5-fileinfo-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134052" comment="php5-firebird-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134053" comment="php5-fpm-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134054" comment="php5-ftp-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134055" comment="php5-gd-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134056" comment="php5-gettext-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134057" comment="php5-gmp-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134058" comment="php5-iconv-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134059" comment="php5-imap-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134060" comment="php5-intl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134061" comment="php5-json-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134062" comment="php5-ldap-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134063" comment="php5-mbstring-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134064" comment="php5-mcrypt-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134065" comment="php5-mssql-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134066" comment="php5-mysql-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134067" comment="php5-odbc-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134068" comment="php5-opcache-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134069" comment="php5-openssl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134070" comment="php5-pcntl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134071" comment="php5-pdo-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134072" comment="php5-pear-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134073" comment="php5-pgsql-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134074" comment="php5-phar-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134075" comment="php5-posix-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134076" comment="php5-pspell-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134077" comment="php5-readline-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134078" comment="php5-shmop-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134079" comment="php5-snmp-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134080" comment="php5-soap-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134081" comment="php5-sockets-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134082" comment="php5-sqlite-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134083" comment="php5-suhosin-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134084" comment="php5-sysvmsg-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134085" comment="php5-sysvsem-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134086" comment="php5-sysvshm-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134087" comment="php5-tidy-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134088" comment="php5-tokenizer-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134089" comment="php5-wddx-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134090" comment="php5-xmlreader-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134091" comment="php5-xmlrpc-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134092" comment="php5-xmlwriter-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134093" comment="php5-xsl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134094" comment="php5-zip-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134095" comment="php5-zlib-5.6.1-72.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6297</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6297" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6297" source="CVE"/>
    <description>
    Integer overflow in the php_stream_zip_opener function in ext/zip/zip_stream.c in PHP before 5.5.38, 5.6.x before 5.6.24, and 7.x before 7.0.9 allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a crafted zip:// URL.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134038" comment="apache2-mod_php5-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134039" comment="php5-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134040" comment="php5-bcmath-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134041" comment="php5-bz2-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134042" comment="php5-calendar-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134043" comment="php5-ctype-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134044" comment="php5-curl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134045" comment="php5-dba-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134046" comment="php5-devel-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134047" comment="php5-dom-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134048" comment="php5-enchant-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134049" comment="php5-exif-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134050" comment="php5-fastcgi-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134051" comment="php5-fileinfo-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134052" comment="php5-firebird-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134053" comment="php5-fpm-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134054" comment="php5-ftp-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134055" comment="php5-gd-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134056" comment="php5-gettext-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134057" comment="php5-gmp-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134058" comment="php5-iconv-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134059" comment="php5-imap-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134060" comment="php5-intl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134061" comment="php5-json-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134062" comment="php5-ldap-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134063" comment="php5-mbstring-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134064" comment="php5-mcrypt-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134065" comment="php5-mssql-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134066" comment="php5-mysql-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134067" comment="php5-odbc-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134068" comment="php5-opcache-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134069" comment="php5-openssl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134070" comment="php5-pcntl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134071" comment="php5-pdo-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134072" comment="php5-pear-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134073" comment="php5-pgsql-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134074" comment="php5-phar-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134075" comment="php5-posix-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134076" comment="php5-pspell-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134077" comment="php5-readline-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134078" comment="php5-shmop-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134079" comment="php5-snmp-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134080" comment="php5-soap-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134081" comment="php5-sockets-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134082" comment="php5-sqlite-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134083" comment="php5-suhosin-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134084" comment="php5-sysvmsg-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134085" comment="php5-sysvsem-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134086" comment="php5-sysvshm-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134087" comment="php5-tidy-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134088" comment="php5-tokenizer-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134089" comment="php5-wddx-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134090" comment="php5-xmlreader-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134091" comment="php5-xmlrpc-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134092" comment="php5-xmlwriter-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134093" comment="php5-xsl-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134094" comment="php5-zip-5.6.1-72.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134095" comment="php5-zlib-5.6.1-72.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6302</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6302" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6302" source="CVE"/>
    <description>
    The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133596" comment="libopenssl-devel-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133597" comment="libopenssl-devel-32bit-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133598" comment="libopenssl1_0_0-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133599" comment="libopenssl1_0_0-32bit-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133600" comment="libopenssl1_0_0-hmac-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133601" comment="libopenssl1_0_0-hmac-32bit-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133602" comment="openssl-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133603" comment="openssl-doc-1.0.1k-2.39.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6303</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6303" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6303" source="CVE"/>
    <description>
    Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c in OpenSSL before 1.1.0 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133596" comment="libopenssl-devel-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133597" comment="libopenssl-devel-32bit-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133598" comment="libopenssl1_0_0-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133599" comment="libopenssl1_0_0-32bit-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133600" comment="libopenssl1_0_0-hmac-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133601" comment="libopenssl1_0_0-hmac-32bit-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133602" comment="openssl-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133603" comment="openssl-doc-1.0.1k-2.39.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6304</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6304" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6304" source="CVE"/>
    <description>
    Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135453" comment="libmysql56client18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135454" comment="libmysql56client18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135455" comment="libmysql56client_r18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135456" comment="libmysql56client_r18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133596" comment="libopenssl-devel-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133597" comment="libopenssl-devel-32bit-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133598" comment="libopenssl1_0_0-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133599" comment="libopenssl1_0_0-32bit-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133600" comment="libopenssl1_0_0-hmac-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133601" comment="libopenssl1_0_0-hmac-32bit-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135457" comment="mysql-community-server-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135458" comment="mysql-community-server-bench-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135459" comment="mysql-community-server-client-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135460" comment="mysql-community-server-errormessages-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135461" comment="mysql-community-server-test-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135462" comment="mysql-community-server-tools-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134144" comment="nodejs-4.6.0-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134145" comment="nodejs-devel-4.6.0-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133733" comment="nodejs-doc-4.6.0-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133602" comment="openssl-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133603" comment="openssl-doc-1.0.1k-2.39.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6306</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6306" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6306" source="CVE"/>
    <description>
    The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remote attackers to cause a denial of service (out-of-bounds read) via crafted certificate operations, related to s3_clnt.c and s3_srvr.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133596" comment="libopenssl-devel-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133597" comment="libopenssl-devel-32bit-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133598" comment="libopenssl1_0_0-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133599" comment="libopenssl1_0_0-32bit-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133600" comment="libopenssl1_0_0-hmac-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133601" comment="libopenssl1_0_0-hmac-32bit-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134144" comment="nodejs-4.6.0-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134145" comment="nodejs-devel-4.6.0-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133733" comment="nodejs-doc-4.6.0-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133602" comment="openssl-1.0.1k-2.39.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133603" comment="openssl-doc-1.0.1k-2.39.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6313</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6313" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6313" source="CVE"/>
    <description>
    The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133394" comment="libgcrypt-1.6.1-8.19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133395" comment="libgcrypt-cavs-1.6.1-8.19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133396" comment="libgcrypt-devel-1.6.1-8.19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133397" comment="libgcrypt-devel-32bit-1.6.1-8.19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133398" comment="libgcrypt20-1.6.1-8.19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133399" comment="libgcrypt20-32bit-1.6.1-8.19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133400" comment="libgcrypt20-hmac-1.6.1-8.19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133401" comment="libgcrypt20-hmac-32bit-1.6.1-8.19.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6321</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6321" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6321" source="CVE"/>
    <description>
    Directory traversal vulnerability in the safer_name_suffix function in GNU tar 1.14 through 1.29 might allow remote attackers to bypass an intended protection mechanism and write to arbitrary files via vectors related to improper sanitization of the file_name parameter, aka POINTYFEATHER.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135895" comment="tar-1.28-2.19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135896" comment="tar-backup-scripts-1.28-2.19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135897" comment="tar-lang-1.28-2.19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135898" comment="tar-tests-1.28-2.19.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6323</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6323" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6323" source="CVE"/>
    <description>
    The makecontext function in the GNU C Library (aka glibc or libc6) before 2.25 creates execution contexts incompatible with the unwinder on ARM EABI (32-bit) platforms, which might allow context-dependent attackers to cause a denial of service (hang), as demonstrated by applications compiled using gccgo, related to backtrace generation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133635" comment="glibc-2.19-16.28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133636" comment="glibc-32bit-2.19-16.28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133637" comment="glibc-devel-2.19-16.28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133638" comment="glibc-devel-32bit-2.19-16.28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133639" comment="glibc-devel-static-2.19-16.28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133640" comment="glibc-devel-static-32bit-2.19-16.28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133641" comment="glibc-extra-2.19-16.28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133642" comment="glibc-html-2.19-16.28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133643" comment="glibc-i18ndata-2.19-16.28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133644" comment="glibc-info-2.19-16.28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133645" comment="glibc-locale-2.19-16.28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133646" comment="glibc-locale-32bit-2.19-16.28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133647" comment="glibc-obsolete-2.19-16.28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133648" comment="glibc-profile-2.19-16.28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133649" comment="glibc-profile-32bit-2.19-16.28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133650" comment="glibc-testsuite-2.19-16.28.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133651" comment="glibc-utils-2.19-16.28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133652" comment="glibc-utils-32bit-2.19-16.28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133653" comment="nscd-2.19-16.28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6327</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6327" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6327" source="CVE"/>
    <description>
    drivers/infiniband/ulp/srpt/ib_srpt.c in the Linux kernel before 4.5.1 allows local users to cause a denial of service (NULL pointer dereference and system crash) by using an ABORT_TASK command to abort a device write operation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133865" comment="bbswitch-0.8-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133866" comment="bbswitch-kmp-default-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133867" comment="bbswitch-kmp-desktop-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133868" comment="bbswitch-kmp-pae-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133869" comment="bbswitch-kmp-xen-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133870" comment="cloop-2.639-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133871" comment="cloop-kmp-default-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133872" comment="cloop-kmp-desktop-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133873" comment="cloop-kmp-pae-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133874" comment="cloop-kmp-xen-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133875" comment="crash-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133876" comment="crash-devel-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133877" comment="crash-doc-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133878" comment="crash-eppic-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133879" comment="crash-gcore-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133880" comment="crash-kmp-default-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133881" comment="crash-kmp-desktop-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133882" comment="crash-kmp-pae-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133883" comment="crash-kmp-xen-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133884" comment="hdjmod-1.28-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133885" comment="hdjmod-kmp-default-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133886" comment="hdjmod-kmp-desktop-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133887" comment="hdjmod-kmp-pae-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133888" comment="hdjmod-kmp-xen-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133889" comment="ipset-6.23-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133890" comment="ipset-devel-6.23-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133891" comment="ipset-kmp-default-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133892" comment="ipset-kmp-desktop-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133893" comment="ipset-kmp-pae-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133894" comment="ipset-kmp-xen-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133895" comment="kernel-debug-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133896" comment="kernel-debug-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133897" comment="kernel-debug-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133898" comment="kernel-default-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133899" comment="kernel-default-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133900" comment="kernel-default-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133901" comment="kernel-desktop-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133902" comment="kernel-desktop-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133903" comment="kernel-desktop-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133904" comment="kernel-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133905" comment="kernel-docs-3.16.7-45.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133906" comment="kernel-ec2-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133907" comment="kernel-ec2-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133908" comment="kernel-ec2-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133909" comment="kernel-macros-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133910" comment="kernel-obs-build-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133911" comment="kernel-obs-qa-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133912" comment="kernel-obs-qa-xen-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133913" comment="kernel-pae-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133914" comment="kernel-pae-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133915" comment="kernel-pae-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133916" comment="kernel-source-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133917" comment="kernel-source-vanilla-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133918" comment="kernel-syms-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133919" comment="kernel-vanilla-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133920" comment="kernel-vanilla-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133921" comment="kernel-xen-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133922" comment="kernel-xen-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133923" comment="kernel-xen-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133924" comment="libipset3-6.23-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133925" comment="pcfclock-0.44-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133926" comment="pcfclock-kmp-default-0.44_k3.16.7_45-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133927" comment="pcfclock-kmp-desktop-0.44_k3.16.7_45-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133928" comment="pcfclock-kmp-pae-0.44_k3.16.7_45-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133929" comment="python-virtualbox-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133930" comment="vhba-kmp-20140629-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133931" comment="vhba-kmp-default-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133932" comment="vhba-kmp-desktop-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133933" comment="vhba-kmp-pae-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133934" comment="vhba-kmp-xen-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133935" comment="virtualbox-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133936" comment="virtualbox-devel-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133937" comment="virtualbox-guest-desktop-icons-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133938" comment="virtualbox-guest-kmp-default-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133939" comment="virtualbox-guest-kmp-desktop-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133940" comment="virtualbox-guest-kmp-pae-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133941" comment="virtualbox-guest-tools-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133942" comment="virtualbox-guest-x11-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133943" comment="virtualbox-host-kmp-default-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133944" comment="virtualbox-host-kmp-desktop-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133945" comment="virtualbox-host-kmp-pae-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133946" comment="virtualbox-host-source-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133947" comment="virtualbox-qt-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133948" comment="virtualbox-websrv-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133949" comment="xen-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133950" comment="xen-devel-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133951" comment="xen-doc-html-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133952" comment="xen-kmp-default-4.4.4_05_k3.16.7_45-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133953" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_45-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133954" comment="xen-libs-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133955" comment="xen-libs-32bit-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133956" comment="xen-tools-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133957" comment="xen-tools-domU-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133958" comment="xtables-addons-2.6-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133959" comment="xtables-addons-kmp-default-2.6_k3.16.7_45-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133960" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_45-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133961" comment="xtables-addons-kmp-pae-2.6_k3.16.7_45-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133962" comment="xtables-addons-kmp-xen-2.6_k3.16.7_45-24.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6351</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6351" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6351" source="CVE"/>
    <description>
    The esp_do_dma function in hw/scsi/esp.c in QEMU (aka Quick Emulator), when built with ESP/NCR53C9x controller emulation support, allows local guest OS administrators to cause a denial of service (out-of-bounds write and QEMU process crash) or execute arbitrary code on the QEMU host via vectors involving DMA read into ESP command buffer.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133720" comment="xen-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133721" comment="xen-devel-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133722" comment="xen-doc-html-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133723" comment="xen-kmp-default-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133724" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133725" comment="xen-libs-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133726" comment="xen-libs-32bit-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133727" comment="xen-tools-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133728" comment="xen-tools-domU-4.4.4_05-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6352</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6352" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6352" source="CVE"/>
    <description>
    The OneLine32 function in io-ico.c in gdk-pixbuf before 2.35.3 allows remote attackers to cause a denial of service (out-of-bounds write and crash) via crafted dimensions in an ICO file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134210" comment="gdk-pixbuf-2.32.3-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134211" comment="gdk-pixbuf-devel-2.32.3-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134212" comment="gdk-pixbuf-devel-32bit-2.32.3-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134213" comment="gdk-pixbuf-lang-2.32.3-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134214" comment="gdk-pixbuf-query-loaders-2.32.3-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134215" comment="gdk-pixbuf-query-loaders-32bit-2.32.3-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134216" comment="libgdk_pixbuf-2_0-0-2.32.3-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134217" comment="libgdk_pixbuf-2_0-0-32bit-2.32.3-9.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134218" comment="typelib-1_0-GdkPixbuf-2_0-2.32.3-9.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6354</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6354" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6354" source="CVE"/>
    <description>
    Heap-based buffer overflow in the yy_get_next_buffer function in Flex before 2.6.1 might allow context-dependent attackers to cause a denial of service or possibly execute arbitrary code via vectors involving num_to_read.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134219" comment="MozillaFirefox-48.0.1-77.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134220" comment="MozillaFirefox-branding-upstream-48.0.1-77.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134221" comment="MozillaFirefox-buildsymbols-48.0.1-77.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134222" comment="MozillaFirefox-devel-48.0.1-77.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134223" comment="MozillaFirefox-translations-common-48.0.1-77.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134224" comment="MozillaFirefox-translations-other-48.0.1-77.4 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134172" comment="MozillaThunderbird-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134173" comment="MozillaThunderbird-buildsymbols-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134174" comment="MozillaThunderbird-devel-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134175" comment="MozillaThunderbird-translations-common-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134176" comment="MozillaThunderbird-translations-other-45.3.0-46.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134225" comment="libfreebl3-3.24-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134226" comment="libfreebl3-32bit-3.24-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134227" comment="libsoftokn3-3.24-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134228" comment="libsoftokn3-32bit-3.24-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134229" comment="mozilla-nss-3.24-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134230" comment="mozilla-nss-32bit-3.24-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134231" comment="mozilla-nss-certs-3.24-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134232" comment="mozilla-nss-certs-32bit-3.24-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134233" comment="mozilla-nss-devel-3.24-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134234" comment="mozilla-nss-sysinit-3.24-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134235" comment="mozilla-nss-sysinit-32bit-3.24-43.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134236" comment="mozilla-nss-tools-3.24-43.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6480</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6480" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6480" source="CVE"/>
    <description>
    Race condition in the ioctl_send_fib function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 4.7 allows local users to cause a denial of service (out-of-bounds access or system crash) by changing a certain size value, aka a "double fetch" vulnerability.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133865" comment="bbswitch-0.8-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133866" comment="bbswitch-kmp-default-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133867" comment="bbswitch-kmp-desktop-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133868" comment="bbswitch-kmp-pae-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133869" comment="bbswitch-kmp-xen-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133870" comment="cloop-2.639-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133871" comment="cloop-kmp-default-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133872" comment="cloop-kmp-desktop-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133873" comment="cloop-kmp-pae-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133874" comment="cloop-kmp-xen-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133875" comment="crash-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133876" comment="crash-devel-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133877" comment="crash-doc-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133878" comment="crash-eppic-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133879" comment="crash-gcore-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133880" comment="crash-kmp-default-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133881" comment="crash-kmp-desktop-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133882" comment="crash-kmp-pae-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133883" comment="crash-kmp-xen-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133884" comment="hdjmod-1.28-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133885" comment="hdjmod-kmp-default-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133886" comment="hdjmod-kmp-desktop-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133887" comment="hdjmod-kmp-pae-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133888" comment="hdjmod-kmp-xen-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133889" comment="ipset-6.23-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133890" comment="ipset-devel-6.23-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133891" comment="ipset-kmp-default-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133892" comment="ipset-kmp-desktop-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133893" comment="ipset-kmp-pae-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133894" comment="ipset-kmp-xen-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133895" comment="kernel-debug-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133896" comment="kernel-debug-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133897" comment="kernel-debug-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133898" comment="kernel-default-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133899" comment="kernel-default-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133900" comment="kernel-default-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133901" comment="kernel-desktop-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133902" comment="kernel-desktop-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133903" comment="kernel-desktop-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133904" comment="kernel-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133905" comment="kernel-docs-3.16.7-45.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133906" comment="kernel-ec2-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133907" comment="kernel-ec2-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133908" comment="kernel-ec2-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133909" comment="kernel-macros-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133910" comment="kernel-obs-build-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133911" comment="kernel-obs-qa-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133912" comment="kernel-obs-qa-xen-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133913" comment="kernel-pae-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133914" comment="kernel-pae-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133915" comment="kernel-pae-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133916" comment="kernel-source-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133917" comment="kernel-source-vanilla-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133918" comment="kernel-syms-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133919" comment="kernel-vanilla-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133920" comment="kernel-vanilla-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133921" comment="kernel-xen-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133922" comment="kernel-xen-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133923" comment="kernel-xen-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133924" comment="libipset3-6.23-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133925" comment="pcfclock-0.44-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133926" comment="pcfclock-kmp-default-0.44_k3.16.7_45-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133927" comment="pcfclock-kmp-desktop-0.44_k3.16.7_45-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133928" comment="pcfclock-kmp-pae-0.44_k3.16.7_45-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133929" comment="python-virtualbox-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133930" comment="vhba-kmp-20140629-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133931" comment="vhba-kmp-default-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133932" comment="vhba-kmp-desktop-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133933" comment="vhba-kmp-pae-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133934" comment="vhba-kmp-xen-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133935" comment="virtualbox-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133936" comment="virtualbox-devel-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133937" comment="virtualbox-guest-desktop-icons-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133938" comment="virtualbox-guest-kmp-default-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133939" comment="virtualbox-guest-kmp-desktop-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133940" comment="virtualbox-guest-kmp-pae-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133941" comment="virtualbox-guest-tools-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133942" comment="virtualbox-guest-x11-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133943" comment="virtualbox-host-kmp-default-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133944" comment="virtualbox-host-kmp-desktop-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133945" comment="virtualbox-host-kmp-pae-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133946" comment="virtualbox-host-source-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133947" comment="virtualbox-qt-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133948" comment="virtualbox-websrv-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133949" comment="xen-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133950" comment="xen-devel-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133951" comment="xen-doc-html-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133952" comment="xen-kmp-default-4.4.4_05_k3.16.7_45-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133953" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_45-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133954" comment="xen-libs-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133955" comment="xen-libs-32bit-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133956" comment="xen-tools-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133957" comment="xen-tools-domU-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133958" comment="xtables-addons-2.6-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133959" comment="xtables-addons-kmp-default-2.6_k3.16.7_45-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133960" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_45-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133961" comment="xtables-addons-kmp-pae-2.6_k3.16.7_45-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133962" comment="xtables-addons-kmp-xen-2.6_k3.16.7_45-24.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6491</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6491" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6491" source="CVE"/>
    <description>
    Buffer overflow in the Get8BIMProperty function in MagickCore/property.c in ImageMagick before 6.9.5-4 and 7.x before 7.0.2-6 allows remote attackers to cause a denial of service (out-of-bounds read, memory leak, and crash) via a crafted image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134024" comment="ImageMagick-6.8.9.8-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134025" comment="ImageMagick-devel-6.8.9.8-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134026" comment="ImageMagick-devel-32bit-6.8.9.8-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134027" comment="ImageMagick-doc-6.8.9.8-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134028" comment="ImageMagick-extra-6.8.9.8-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134029" comment="libMagick++-6_Q16-5-6.8.9.8-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134030" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134031" comment="libMagick++-devel-6.8.9.8-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134032" comment="libMagick++-devel-32bit-6.8.9.8-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134033" comment="libMagickCore-6_Q16-2-6.8.9.8-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134034" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134035" comment="libMagickWand-6_Q16-2-6.8.9.8-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134036" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134037" comment="perl-PerlMagick-6.8.9.8-29.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6504</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6504" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6504" source="CVE"/>
    <description>
    epan/dissectors/packet-ncp2222.inc in the NDS dissector in Wireshark 1.12.x before 1.12.13 does not properly maintain a ptvc data structure, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130879" comment="wireshark-1.12.13-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130880" comment="wireshark-devel-1.12.13-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130881" comment="wireshark-ui-gtk-1.12.13-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130882" comment="wireshark-ui-qt-1.12.13-44.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6505</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6505" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6505" source="CVE"/>
    <description>
    epan/dissectors/packet-packetbb.c in the PacketBB dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130879" comment="wireshark-1.12.13-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130880" comment="wireshark-devel-1.12.13-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130881" comment="wireshark-ui-gtk-1.12.13-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130882" comment="wireshark-ui-qt-1.12.13-44.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6506</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6506" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6506" source="CVE"/>
    <description>
    epan/dissectors/packet-wsp.c in the WSP dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130879" comment="wireshark-1.12.13-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130880" comment="wireshark-devel-1.12.13-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130881" comment="wireshark-ui-gtk-1.12.13-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130882" comment="wireshark-ui-qt-1.12.13-44.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6507</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6507" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6507" source="CVE"/>
    <description>
    epan/dissectors/packet-mmse.c in the MMSE dissector in Wireshark 1.12.x before 1.12.13 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130879" comment="wireshark-1.12.13-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130880" comment="wireshark-devel-1.12.13-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130881" comment="wireshark-ui-gtk-1.12.13-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130882" comment="wireshark-ui-qt-1.12.13-44.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6508</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6508" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6508" source="CVE"/>
    <description>
    epan/dissectors/packet-rlc.c in the RLC dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 uses an incorrect integer data type, which allows remote attackers to cause a denial of service (large loop) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130879" comment="wireshark-1.12.13-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130880" comment="wireshark-devel-1.12.13-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130881" comment="wireshark-ui-gtk-1.12.13-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130882" comment="wireshark-ui-qt-1.12.13-44.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6509</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6509" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6509" source="CVE"/>
    <description>
    epan/dissectors/packet-ldss.c in the LDSS dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 mishandles conversations, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130879" comment="wireshark-1.12.13-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130880" comment="wireshark-devel-1.12.13-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130881" comment="wireshark-ui-gtk-1.12.13-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130882" comment="wireshark-ui-qt-1.12.13-44.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6510</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6510" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6510" source="CVE"/>
    <description>
    Off-by-one error in epan/dissectors/packet-rlc.c in the RLC dissector in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130879" comment="wireshark-1.12.13-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130880" comment="wireshark-devel-1.12.13-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130881" comment="wireshark-ui-gtk-1.12.13-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130882" comment="wireshark-ui-qt-1.12.13-44.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6511</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6511" source="CVE"/>
    <description>
    epan/proto.c in Wireshark 1.12.x before 1.12.13 and 2.x before 2.0.5 allows remote attackers to cause a denial of service (OpenFlow dissector large loop) via a crafted packet.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009130879" comment="wireshark-1.12.13-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130880" comment="wireshark-devel-1.12.13-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130881" comment="wireshark-ui-gtk-1.12.13-44.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009130882" comment="wireshark-ui-qt-1.12.13-44.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6520</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6520" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6520" source="CVE"/>
    <description>
    Buffer overflow in MagickCore/enhance.c in ImageMagick before 7.0.2-7 allows remote attackers to have unspecified impact via vectors related to pixel cache morphology.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134024" comment="ImageMagick-6.8.9.8-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134025" comment="ImageMagick-devel-6.8.9.8-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134026" comment="ImageMagick-devel-32bit-6.8.9.8-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134027" comment="ImageMagick-doc-6.8.9.8-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134028" comment="ImageMagick-extra-6.8.9.8-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134029" comment="libMagick++-6_Q16-5-6.8.9.8-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134030" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134031" comment="libMagick++-devel-6.8.9.8-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134032" comment="libMagick++-devel-32bit-6.8.9.8-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134033" comment="libMagickCore-6_Q16-2-6.8.9.8-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134034" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134035" comment="libMagickWand-6_Q16-2-6.8.9.8-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134036" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-29.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134037" comment="perl-PerlMagick-6.8.9.8-29.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6606</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6606" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6606" source="CVE"/>
    <description>
    An issue was discovered in cookie encryption in phpMyAdmin. The decryption of the username/password is vulnerable to a padding oracle attack. This can allow an attacker who has access to a user's browser cookie file to decrypt the username and password. Furthermore, the same initialization vector (IV) is used to hash the username and password stored in the phpMyAdmin cookie. If a user has the same password as their username, an attacker who examines the browser cookie can see that they are the same - but the attacker can not directly decode these values from the cookie as it is still hashed. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134237" comment="phpMyAdmin-4.4.15.8-39.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6607</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6607" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6607" source="CVE"/>
    <description>
    XSS issues were discovered in phpMyAdmin. This affects Zoom search (specially crafted column content can be used to trigger an XSS attack); GIS editor (certain fields in the graphical GIS editor are not properly escaped and can be used to trigger an XSS attack); Relation view; the following Transformations: Formatted, Imagelink, JPEG: Upload, RegexValidation, JPEG inline, PNG inline, and transformation wrapper; XML export; MediaWiki export; Designer; When the MySQL server is running with a specially-crafted log_bin directive; Database tab; Replication feature; and Database search. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134237" comment="phpMyAdmin-4.4.15.8-39.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6608</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6608" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6608" source="CVE"/>
    <description>
    XSS issues were discovered in phpMyAdmin. This affects the database privilege check and the "Remove partitioning" functionality. Specially crafted database names can trigger the XSS attack. All 4.6.x versions (prior to 4.6.4) are affected.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134237" comment="phpMyAdmin-4.4.15.8-39.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6609</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6609" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6609" source="CVE"/>
    <description>
    An issue was discovered in phpMyAdmin. A specially crafted database name could be used to run arbitrary PHP commands through the array export feature. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134237" comment="phpMyAdmin-4.4.15.8-39.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6610</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6610" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6610" source="CVE"/>
    <description>
    A full path disclosure vulnerability was discovered in phpMyAdmin where a user can trigger a particular error in the export mechanism to discover the full path of phpMyAdmin on the disk. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134237" comment="phpMyAdmin-4.4.15.8-39.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6611</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6611" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6611" source="CVE"/>
    <description>
    An issue was discovered in phpMyAdmin. A specially crafted database and/or table name can be used to trigger an SQL injection attack through the export functionality. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134237" comment="phpMyAdmin-4.4.15.8-39.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6612</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6612" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6612" source="CVE"/>
    <description>
    An issue was discovered in phpMyAdmin. A user can exploit the LOAD LOCAL INFILE functionality to expose files on the server to the database system. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134237" comment="phpMyAdmin-4.4.15.8-39.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6613</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6613" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6613" source="CVE"/>
    <description>
    An issue was discovered in phpMyAdmin. A user can specially craft a symlink on disk, to a file which phpMyAdmin is permitted to read but the user is not, which phpMyAdmin will then expose to the user. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134237" comment="phpMyAdmin-4.4.15.8-39.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6614</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6614" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6614" source="CVE"/>
    <description>
    An issue was discovered in phpMyAdmin involving the %u username replacement functionality of the SaveDir and UploadDir features. When the username substitution is configured, a specially-crafted user name can be used to circumvent restrictions to traverse the file system. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134237" comment="phpMyAdmin-4.4.15.8-39.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6615</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6615" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6615" source="CVE"/>
    <description>
    XSS issues were discovered in phpMyAdmin. This affects navigation pane and database/table hiding feature (a specially-crafted database name can be used to trigger an XSS attack); the "Tracking" feature (a specially-crafted query can be used to trigger an XSS attack); and GIS visualization feature. All 4.6.x versions (prior to 4.6.4) and 4.4.x versions (prior to 4.4.15.8) are affected.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134237" comment="phpMyAdmin-4.4.15.8-39.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6616</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6616" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6616" source="CVE"/>
    <description>
    An issue was discovered in phpMyAdmin. In the "User group" and "Designer" features, a user can execute an SQL injection attack against the account of the control user. All 4.6.x versions (prior to 4.6.4) and 4.4.x versions (prior to 4.4.15.8) are affected.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134237" comment="phpMyAdmin-4.4.15.8-39.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6617</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6617" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6617" source="CVE"/>
    <description>
    An issue was discovered in phpMyAdmin. A specially crafted database and/or table name can be used to trigger an SQL injection attack through the export functionality. All 4.6.x versions (prior to 4.6.4) are affected.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134237" comment="phpMyAdmin-4.4.15.8-39.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6618</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6618" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6618" source="CVE"/>
    <description>
    An issue was discovered in phpMyAdmin. The transformation feature allows a user to trigger a denial-of-service (DoS) attack against the server. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134237" comment="phpMyAdmin-4.4.15.8-39.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6619</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6619" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6619" source="CVE"/>
    <description>
    An issue was discovered in phpMyAdmin. In the user interface preference feature, a user can execute an SQL injection attack against the account of the control user. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134237" comment="phpMyAdmin-4.4.15.8-39.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6620</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6620" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6620" source="CVE"/>
    <description>
    An issue was discovered in phpMyAdmin. Some data is passed to the PHP unserialize() function without verification that it's valid serialized data. The unserialization can result in code execution because of the interaction with object instantiation and autoloading. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134237" comment="phpMyAdmin-4.4.15.8-39.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6621</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6621" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6621" source="CVE"/>
    <description>
    The setup script for phpMyAdmin before 4.0.10.19, 4.4.x before 4.4.15.10, and 4.6.x before 4.6.6 allows remote attackers to conduct server-side request forgery (SSRF) attacks via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134237" comment="phpMyAdmin-4.4.15.8-39.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6622</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6622" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6622" source="CVE"/>
    <description>
    An issue was discovered in phpMyAdmin. An unauthenticated user is able to execute a denial-of-service (DoS) attack by forcing persistent connections when phpMyAdmin is running with $cfg['AllowArbitraryServer']=true. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134237" comment="phpMyAdmin-4.4.15.8-39.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6623</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6623" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6623" source="CVE"/>
    <description>
    An issue was discovered in phpMyAdmin. An authorized user can cause a denial-of-service (DoS) attack on a server by passing large values to a loop. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134237" comment="phpMyAdmin-4.4.15.8-39.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6624</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6624" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6624" source="CVE"/>
    <description>
    An issue was discovered in phpMyAdmin involving improper enforcement of the IP-based authentication rules. When phpMyAdmin is used with IPv6 in a proxy server environment, and the proxy server is in the allowed range but the attacking computer is not allowed, this vulnerability can allow the attacking computer to connect despite the IP rules. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134237" comment="phpMyAdmin-4.4.15.8-39.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6625</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6625" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6625" source="CVE"/>
    <description>
    An issue was discovered in phpMyAdmin. An attacker can determine whether a user is logged in to phpMyAdmin. The user's session, username, and password are not compromised by this vulnerability. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134237" comment="phpMyAdmin-4.4.15.8-39.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6626</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6626" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6626" source="CVE"/>
    <description>
    An issue was discovered in phpMyAdmin. An attacker could redirect a user to a malicious web page. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134237" comment="phpMyAdmin-4.4.15.8-39.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6627</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6627" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6627" source="CVE"/>
    <description>
    An issue was discovered in phpMyAdmin. An attacker can determine the phpMyAdmin host location through the file url.php. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134237" comment="phpMyAdmin-4.4.15.8-39.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6628</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6628" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6628" source="CVE"/>
    <description>
    An issue was discovered in phpMyAdmin. An attacker may be able to trigger a user to download a specially crafted malicious SVG file. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134237" comment="phpMyAdmin-4.4.15.8-39.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6629</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6629" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6629" source="CVE"/>
    <description>
    An issue was discovered in phpMyAdmin involving the $cfg['ArbitraryServerRegexp'] configuration directive. An attacker could reuse certain cookie values in a way of bypassing the servers defined by ArbitraryServerRegexp. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134237" comment="phpMyAdmin-4.4.15.8-39.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6630</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6630" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6630" source="CVE"/>
    <description>
    An issue was discovered in phpMyAdmin. An authenticated user can trigger a denial-of-service (DoS) attack by entering a very long password at the change password dialog. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134237" comment="phpMyAdmin-4.4.15.8-39.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6631</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6631" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6631" source="CVE"/>
    <description>
    An issue was discovered in phpMyAdmin. A user can execute a remote code execution attack against a server when phpMyAdmin is being run as a CGI application. Under certain server configurations, a user can pass a query string which is executed as a command-line argument by the file generator_plugin.sh. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134237" comment="phpMyAdmin-4.4.15.8-39.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6632</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6632" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6632" source="CVE"/>
    <description>
    An issue was discovered in phpMyAdmin where, under certain conditions, phpMyAdmin may not delete temporary files during the import of ESRI files. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134237" comment="phpMyAdmin-4.4.15.8-39.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6633</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6633" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6633" source="CVE"/>
    <description>
    An issue was discovered in phpMyAdmin. phpMyAdmin can be used to trigger a remote code execution attack against certain PHP installations that are running with the dbase extension. All 4.6.x versions (prior to 4.6.4), 4.4.x versions (prior to 4.4.15.8), and 4.0.x versions (prior to 4.0.10.17) are affected.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134237" comment="phpMyAdmin-4.4.15.8-39.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6662</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6662" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6662" source="CVE"/>
    <description>
    Oracle MySQL through 5.5.52, 5.6.x through 5.6.33, and 5.7.x through 5.7.15; MariaDB before 5.5.51, 10.0.x before 10.0.27, and 10.1.x before 10.1.17; and Percona Server before 5.5.51-38.1, 5.6.x before 5.6.32-78.0, and 5.7.x before 5.7.14-7 allow local users to create arbitrary configurations and bypass certain protection mechanisms by setting general_log_file to a my.cnf configuration. NOTE: this can be leveraged to execute arbitrary code with root privileges by setting malloc_lib. NOTE: the affected MySQL version information is from Oracle's October 2016 CPU. Oracle has not commented on third-party claims that the issue was silently patched in MySQL 5.5.52, 5.6.33, and 5.7.15.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135453" comment="libmysql56client18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135454" comment="libmysql56client18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135455" comment="libmysql56client_r18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135456" comment="libmysql56client_r18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135343" comment="libmysqlclient-devel-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135344" comment="libmysqlclient18-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135345" comment="libmysqlclient18-32bit-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135346" comment="libmysqlclient_r18-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135347" comment="libmysqlclient_r18-32bit-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135348" comment="libmysqld-devel-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135349" comment="libmysqld18-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135350" comment="mariadb-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135351" comment="mariadb-bench-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135352" comment="mariadb-client-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135353" comment="mariadb-errormessages-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135354" comment="mariadb-test-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135355" comment="mariadb-tools-10.0.27-2.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135457" comment="mysql-community-server-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135458" comment="mysql-community-server-bench-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135459" comment="mysql-community-server-client-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135460" comment="mysql-community-server-errormessages-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135461" comment="mysql-community-server-test-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135462" comment="mysql-community-server-tools-5.6.34-2.23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6823</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6823" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6823" source="CVE"/>
    <description>
    Integer overflow in the BMP coder in ImageMagick before 7.0.2-10 allows remote attackers to cause a denial of service (crash) via crafted height and width values, which triggers an out-of-bounds write.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133963" comment="GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133964" comment="GraphicsMagick-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133990" comment="ImageMagick-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133991" comment="ImageMagick-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133992" comment="ImageMagick-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133993" comment="ImageMagick-doc-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133994" comment="ImageMagick-extra-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133965" comment="libGraphicsMagick++-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133966" comment="libGraphicsMagick++-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133967" comment="libGraphicsMagick-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133968" comment="libGraphicsMagick3-config-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133969" comment="libGraphicsMagickWand-Q16-2-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133995" comment="libMagick++-6_Q16-5-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133996" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133997" comment="libMagick++-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133998" comment="libMagick++-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133999" comment="libMagickCore-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134000" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134001" comment="libMagickWand-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134002" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133970" comment="perl-GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134003" comment="perl-PerlMagick-6.8.9.8-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6828</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6828" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6828" source="CVE"/>
    <description>
    The tcp_check_send_head function in include/net/tcp.h in the Linux kernel before 4.7.5 does not properly maintain certain SACK state after a failed data copy, which allows local users to cause a denial of service (tcp_xmit_retransmit_queue use-after-free and system crash) via a crafted SACK option.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133865" comment="bbswitch-0.8-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133866" comment="bbswitch-kmp-default-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133867" comment="bbswitch-kmp-desktop-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133868" comment="bbswitch-kmp-pae-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133869" comment="bbswitch-kmp-xen-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133870" comment="cloop-2.639-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133871" comment="cloop-kmp-default-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133872" comment="cloop-kmp-desktop-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133873" comment="cloop-kmp-pae-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133874" comment="cloop-kmp-xen-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133875" comment="crash-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133876" comment="crash-devel-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133877" comment="crash-doc-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133878" comment="crash-eppic-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133879" comment="crash-gcore-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133880" comment="crash-kmp-default-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133881" comment="crash-kmp-desktop-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133882" comment="crash-kmp-pae-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133883" comment="crash-kmp-xen-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133884" comment="hdjmod-1.28-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133885" comment="hdjmod-kmp-default-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133886" comment="hdjmod-kmp-desktop-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133887" comment="hdjmod-kmp-pae-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133888" comment="hdjmod-kmp-xen-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133889" comment="ipset-6.23-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133890" comment="ipset-devel-6.23-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133891" comment="ipset-kmp-default-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133892" comment="ipset-kmp-desktop-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133893" comment="ipset-kmp-pae-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133894" comment="ipset-kmp-xen-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133895" comment="kernel-debug-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133896" comment="kernel-debug-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133897" comment="kernel-debug-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133898" comment="kernel-default-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133899" comment="kernel-default-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133900" comment="kernel-default-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133901" comment="kernel-desktop-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133902" comment="kernel-desktop-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133903" comment="kernel-desktop-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133904" comment="kernel-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133905" comment="kernel-docs-3.16.7-45.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133906" comment="kernel-ec2-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133907" comment="kernel-ec2-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133908" comment="kernel-ec2-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133909" comment="kernel-macros-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133910" comment="kernel-obs-build-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133911" comment="kernel-obs-qa-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133912" comment="kernel-obs-qa-xen-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133913" comment="kernel-pae-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133914" comment="kernel-pae-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133915" comment="kernel-pae-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133916" comment="kernel-source-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133917" comment="kernel-source-vanilla-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133918" comment="kernel-syms-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133919" comment="kernel-vanilla-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133920" comment="kernel-vanilla-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133921" comment="kernel-xen-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133922" comment="kernel-xen-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133923" comment="kernel-xen-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133924" comment="libipset3-6.23-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133925" comment="pcfclock-0.44-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133926" comment="pcfclock-kmp-default-0.44_k3.16.7_45-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133927" comment="pcfclock-kmp-desktop-0.44_k3.16.7_45-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133928" comment="pcfclock-kmp-pae-0.44_k3.16.7_45-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133929" comment="python-virtualbox-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133930" comment="vhba-kmp-20140629-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133931" comment="vhba-kmp-default-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133932" comment="vhba-kmp-desktop-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133933" comment="vhba-kmp-pae-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133934" comment="vhba-kmp-xen-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133935" comment="virtualbox-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133936" comment="virtualbox-devel-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133937" comment="virtualbox-guest-desktop-icons-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133938" comment="virtualbox-guest-kmp-default-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133939" comment="virtualbox-guest-kmp-desktop-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133940" comment="virtualbox-guest-kmp-pae-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133941" comment="virtualbox-guest-tools-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133942" comment="virtualbox-guest-x11-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133943" comment="virtualbox-host-kmp-default-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133944" comment="virtualbox-host-kmp-desktop-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133945" comment="virtualbox-host-kmp-pae-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133946" comment="virtualbox-host-source-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133947" comment="virtualbox-qt-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133948" comment="virtualbox-websrv-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133949" comment="xen-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133950" comment="xen-devel-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133951" comment="xen-doc-html-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133952" comment="xen-kmp-default-4.4.4_05_k3.16.7_45-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133953" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_45-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133954" comment="xen-libs-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133955" comment="xen-libs-32bit-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133956" comment="xen-tools-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133957" comment="xen-tools-domU-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133958" comment="xtables-addons-2.6-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133959" comment="xtables-addons-kmp-default-2.6_k3.16.7_45-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133960" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_45-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133961" comment="xtables-addons-kmp-pae-2.6_k3.16.7_45-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133962" comment="xtables-addons-kmp-xen-2.6_k3.16.7_45-24.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6833</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6833" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6833" source="CVE"/>
    <description>
    Use-after-free vulnerability in the vmxnet3_io_bar0_write function in hw/net/vmxnet3.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU instance crash) by leveraging failure to check if the device is active.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133720" comment="xen-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133721" comment="xen-devel-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133722" comment="xen-doc-html-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133723" comment="xen-kmp-default-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133724" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133725" comment="xen-libs-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133726" comment="xen-libs-32bit-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133727" comment="xen-tools-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133728" comment="xen-tools-domU-4.4.4_05-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6834</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6834" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6834" source="CVE"/>
    <description>
    The net_tx_pkt_do_sw_fragmentation function in hw/net/net_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via a zero length for the current fragment length.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133720" comment="xen-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133721" comment="xen-devel-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133722" comment="xen-doc-html-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133723" comment="xen-kmp-default-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133724" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133725" comment="xen-libs-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133726" comment="xen-libs-32bit-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133727" comment="xen-tools-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133728" comment="xen-tools-domU-4.4.4_05-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6835</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6835" source="CVE"/>
    <description>
    The vmxnet_tx_pkt_parse_headers function in hw/net/vmxnet_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (buffer over-read) by leveraging failure to check IP header length.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133720" comment="xen-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133721" comment="xen-devel-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133722" comment="xen-doc-html-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133723" comment="xen-kmp-default-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133724" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133725" comment="xen-libs-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133726" comment="xen-libs-32bit-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133727" comment="xen-tools-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133728" comment="xen-tools-domU-4.4.4_05-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6836</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6836" source="CVE"/>
    <description>
    The vmxnet3_complete_packet function in hw/net/vmxnet3.c in QEMU (aka Quick Emulator) allows local guest OS administrators to obtain sensitive host memory information by leveraging failure to initialize the txcq_descr object.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133720" comment="xen-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133721" comment="xen-devel-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133722" comment="xen-doc-html-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133723" comment="xen-kmp-default-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133724" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133725" comment="xen-libs-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133726" comment="xen-libs-32bit-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133727" comment="xen-tools-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133728" comment="xen-tools-domU-4.4.4_05-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6855</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6855" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6855" source="CVE"/>
    <description>
    Eye of GNOME (aka eog) 3.16.5, 3.17.x, 3.18.x before 3.18.3, 3.19.x, and 3.20.x before 3.20.4, when used with glib before 2.44.1, allow remote attackers to cause a denial of service (out-of-bounds write and crash) via vectors involving passing invalid UTF-8 to GMarkup.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134238" comment="eog-3.14.5-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134239" comment="eog-devel-3.14.5-13.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134240" comment="eog-lang-3.14.5-13.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6888</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6888" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6888" source="CVE"/>
    <description>
    Integer overflow in the net_tx_pkt_init function in hw/net/net_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU process crash) via the maximum fragmentation count, which triggers an unchecked multiplication and NULL pointer dereference.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133720" comment="xen-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133721" comment="xen-devel-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133722" comment="xen-doc-html-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133723" comment="xen-kmp-default-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133724" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133725" comment="xen-libs-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133726" comment="xen-libs-32bit-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133727" comment="xen-tools-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133728" comment="xen-tools-domU-4.4.4_05-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6905</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6905" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6905" source="CVE"/>
    <description>
    The read_image_tga function in gd_tga.c in the GD Graphics Library (aka libgd) before 2.2.3 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133390" comment="gd-2.1.0-7.14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133391" comment="gd-devel-2.1.0-7.14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133392" comment="libgd3-2.1.0-7.14.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133393" comment="libgd3-32bit-2.1.0-7.14.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6911</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-6911" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6911" source="CVE"/>
    <description>
    The dynamicGetbuf function in the GD Graphics Library (aka libgd) before 2.2.4 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TIFF image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133790" comment="apache2-mod_php5-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133791" comment="php5-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133792" comment="php5-bcmath-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133793" comment="php5-bz2-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133794" comment="php5-calendar-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133795" comment="php5-ctype-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133796" comment="php5-curl-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133797" comment="php5-dba-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133798" comment="php5-devel-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133799" comment="php5-dom-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133800" comment="php5-enchant-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133801" comment="php5-exif-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133802" comment="php5-fastcgi-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133803" comment="php5-fileinfo-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133804" comment="php5-firebird-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133805" comment="php5-fpm-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133806" comment="php5-ftp-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133807" comment="php5-gd-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133808" comment="php5-gettext-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133809" comment="php5-gmp-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133810" comment="php5-iconv-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133811" comment="php5-imap-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133812" comment="php5-intl-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133813" comment="php5-json-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133814" comment="php5-ldap-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133815" comment="php5-mbstring-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133816" comment="php5-mcrypt-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133817" comment="php5-mssql-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133818" comment="php5-mysql-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133819" comment="php5-odbc-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133820" comment="php5-opcache-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133821" comment="php5-openssl-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133822" comment="php5-pcntl-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133823" comment="php5-pdo-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133824" comment="php5-pear-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133825" comment="php5-pgsql-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133826" comment="php5-phar-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133827" comment="php5-posix-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133828" comment="php5-pspell-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133829" comment="php5-readline-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133830" comment="php5-shmop-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133831" comment="php5-snmp-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133832" comment="php5-soap-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133833" comment="php5-sockets-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133834" comment="php5-sqlite-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133835" comment="php5-suhosin-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133836" comment="php5-sysvmsg-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133837" comment="php5-sysvsem-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133838" comment="php5-sysvshm-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133839" comment="php5-tidy-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133840" comment="php5-tokenizer-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133841" comment="php5-wddx-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133842" comment="php5-xmlreader-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133843" comment="php5-xmlrpc-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133844" comment="php5-xmlwriter-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133845" comment="php5-xsl-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133846" comment="php5-zip-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133847" comment="php5-zlib-5.6.1-83.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6921</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-6921" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6921" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133437" comment="flash-player-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133438" comment="flash-player-gnome-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133439" comment="flash-player-kde4-11.2.202.635-2.108.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6922</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-6922" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6922" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, and CVE-2016-6924.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133437" comment="flash-player-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133438" comment="flash-player-gnome-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133439" comment="flash-player-kde4-11.2.202.635-2.108.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6923</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-6923" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6923" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133437" comment="flash-player-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133438" comment="flash-player-gnome-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133439" comment="flash-player-kde4-11.2.202.635-2.108.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6924</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-6924" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6924" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4274, CVE-2016-4275, CVE-2016-4276, CVE-2016-4280, CVE-2016-4281, CVE-2016-4282, CVE-2016-4283, CVE-2016-4284, CVE-2016-4285, and CVE-2016-6922.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133437" comment="flash-player-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133438" comment="flash-player-gnome-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133439" comment="flash-player-kde4-11.2.202.635-2.108.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6925</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-6925" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6925" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133437" comment="flash-player-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133438" comment="flash-player-gnome-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133439" comment="flash-player-kde4-11.2.202.635-2.108.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6926</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-6926" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6926" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133437" comment="flash-player-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133438" comment="flash-player-gnome-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133439" comment="flash-player-kde4-11.2.202.635-2.108.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6927</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-6927" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6927" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6929, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133437" comment="flash-player-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133438" comment="flash-player-gnome-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133439" comment="flash-player-kde4-11.2.202.635-2.108.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6929</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-6929" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6929" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6930, CVE-2016-6931, and CVE-2016-6932.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133437" comment="flash-player-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133438" comment="flash-player-gnome-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133439" comment="flash-player-kde4-11.2.202.635-2.108.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6930</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-6930" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6930" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6931, and CVE-2016-6932.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133437" comment="flash-player-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133438" comment="flash-player-gnome-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133439" comment="flash-player-kde4-11.2.202.635-2.108.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6931</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-6931" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6931" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, and CVE-2016-6932.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133437" comment="flash-player-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133438" comment="flash-player-gnome-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133439" comment="flash-player-kde4-11.2.202.635-2.108.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6932</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-6932" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6932" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.375 and 19.x through 23.x before 23.0.0.162 on Windows and OS X and before 11.2.202.635 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-4272, CVE-2016-4279, CVE-2016-6921, CVE-2016-6923, CVE-2016-6925, CVE-2016-6926, CVE-2016-6927, CVE-2016-6929, CVE-2016-6930, and CVE-2016-6931.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133437" comment="flash-player-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133438" comment="flash-player-gnome-11.2.202.635-2.108.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133439" comment="flash-player-kde4-11.2.202.635-2.108.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6981</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-6981" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6981" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows and OS X and before 11.2.202.637 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-6987.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133736" comment="flash-player-11.2.202.637-2.112.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133737" comment="flash-player-gnome-11.2.202.637-2.112.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133738" comment="flash-player-kde4-11.2.202.637-2.112.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6982</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-6982" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6982" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows and OS X and before 11.2.202.637 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4273, CVE-2016-6983, CVE-2016-6984, CVE-2016-6985, CVE-2016-6986, CVE-2016-6989, and CVE-2016-6990.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133736" comment="flash-player-11.2.202.637-2.112.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133737" comment="flash-player-gnome-11.2.202.637-2.112.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133738" comment="flash-player-kde4-11.2.202.637-2.112.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6983</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-6983" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6983" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows and OS X and before 11.2.202.637 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4273, CVE-2016-6982, CVE-2016-6984, CVE-2016-6985, CVE-2016-6986, CVE-2016-6989, and CVE-2016-6990.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133736" comment="flash-player-11.2.202.637-2.112.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133737" comment="flash-player-gnome-11.2.202.637-2.112.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133738" comment="flash-player-kde4-11.2.202.637-2.112.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6984</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-6984" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6984" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows and OS X and before 11.2.202.637 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4273, CVE-2016-6982, CVE-2016-6983, CVE-2016-6985, CVE-2016-6986, CVE-2016-6989, and CVE-2016-6990.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133736" comment="flash-player-11.2.202.637-2.112.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133737" comment="flash-player-gnome-11.2.202.637-2.112.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133738" comment="flash-player-kde4-11.2.202.637-2.112.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6985</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-6985" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6985" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows and OS X and before 11.2.202.637 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4273, CVE-2016-6982, CVE-2016-6983, CVE-2016-6984, CVE-2016-6986, CVE-2016-6989, and CVE-2016-6990.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133736" comment="flash-player-11.2.202.637-2.112.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133737" comment="flash-player-gnome-11.2.202.637-2.112.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133738" comment="flash-player-kde4-11.2.202.637-2.112.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6986</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-6986" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6986" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows and OS X and before 11.2.202.637 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4273, CVE-2016-6982, CVE-2016-6983, CVE-2016-6984, CVE-2016-6985, CVE-2016-6989, and CVE-2016-6990.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133736" comment="flash-player-11.2.202.637-2.112.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133737" comment="flash-player-gnome-11.2.202.637-2.112.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133738" comment="flash-player-kde4-11.2.202.637-2.112.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6987</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-6987" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6987" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows and OS X and before 11.2.202.637 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-6981.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133736" comment="flash-player-11.2.202.637-2.112.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133737" comment="flash-player-gnome-11.2.202.637-2.112.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133738" comment="flash-player-kde4-11.2.202.637-2.112.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6989</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-6989" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6989" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows and OS X and before 11.2.202.637 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4273, CVE-2016-6982, CVE-2016-6983, CVE-2016-6984, CVE-2016-6985, CVE-2016-6986, and CVE-2016-6990.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133736" comment="flash-player-11.2.202.637-2.112.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133737" comment="flash-player-gnome-11.2.202.637-2.112.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133738" comment="flash-player-kde4-11.2.202.637-2.112.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6990</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-6990" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6990" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows and OS X and before 11.2.202.637 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4273, CVE-2016-6982, CVE-2016-6983, CVE-2016-6984, CVE-2016-6985, CVE-2016-6986, and CVE-2016-6989.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133736" comment="flash-player-11.2.202.637-2.112.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133737" comment="flash-player-gnome-11.2.202.637-2.112.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133738" comment="flash-player-kde4-11.2.202.637-2.112.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20166992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-6992</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-6992" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6992" source="CVE"/>
    <description>
    Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows and OS X and before 11.2.202.637 on Linux allows attackers to execute arbitrary code by leveraging an unspecified "type confusion."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133736" comment="flash-player-11.2.202.637-2.112.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133737" comment="flash-player-gnome-11.2.202.637-2.112.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133738" comment="flash-player-kde4-11.2.202.637-2.112.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7032</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7032" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7032" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135908" comment="sudo-1.8.10p3-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135909" comment="sudo-devel-1.8.10p3-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135910" comment="sudo-test-1.8.10p3-2.10.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7042</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7042" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7042" source="CVE"/>
    <description>
    The proc_keys_show function in security/keys/proc.c in the Linux kernel through 4.8.2, when the GNU Compiler Collection (gcc) stack protector is enabled, uses an incorrect buffer size for certain timeout data, which allows local users to cause a denial of service (stack memory corruption and panic) by reading the /proc/keys file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137932" comment="bbswitch-0.8-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137933" comment="bbswitch-kmp-default-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137934" comment="bbswitch-kmp-desktop-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137935" comment="bbswitch-kmp-pae-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137936" comment="bbswitch-kmp-xen-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137937" comment="cloop-2.639-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137938" comment="cloop-kmp-default-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137939" comment="cloop-kmp-desktop-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137940" comment="cloop-kmp-pae-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137941" comment="cloop-kmp-xen-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137942" comment="crash-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137943" comment="crash-devel-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137944" comment="crash-doc-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137945" comment="crash-eppic-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137946" comment="crash-gcore-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137947" comment="crash-kmp-default-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137948" comment="crash-kmp-desktop-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137949" comment="crash-kmp-pae-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137950" comment="crash-kmp-xen-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137951" comment="hdjmod-1.28-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137952" comment="hdjmod-kmp-default-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137953" comment="hdjmod-kmp-desktop-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137954" comment="hdjmod-kmp-pae-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137955" comment="hdjmod-kmp-xen-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137956" comment="ipset-6.23-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137957" comment="ipset-devel-6.23-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137958" comment="ipset-kmp-default-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137959" comment="ipset-kmp-desktop-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137960" comment="ipset-kmp-pae-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137961" comment="ipset-kmp-xen-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137962" comment="kernel-debug-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137963" comment="kernel-debug-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137964" comment="kernel-debug-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137965" comment="kernel-default-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137966" comment="kernel-default-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137967" comment="kernel-default-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137968" comment="kernel-desktop-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137969" comment="kernel-desktop-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137970" comment="kernel-desktop-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137971" comment="kernel-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137972" comment="kernel-docs-3.16.7-53.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137973" comment="kernel-ec2-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137974" comment="kernel-ec2-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137975" comment="kernel-ec2-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137976" comment="kernel-macros-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137977" comment="kernel-obs-build-3.16.7-53.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137978" comment="kernel-obs-qa-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137979" comment="kernel-pae-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137980" comment="kernel-pae-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137981" comment="kernel-pae-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137982" comment="kernel-source-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137983" comment="kernel-source-vanilla-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137984" comment="kernel-syms-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137985" comment="kernel-vanilla-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137986" comment="kernel-vanilla-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137987" comment="kernel-xen-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137988" comment="kernel-xen-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137989" comment="kernel-xen-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137990" comment="libipset3-6.23-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137991" comment="pcfclock-0.44-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137992" comment="pcfclock-kmp-default-0.44_k3.16.7_53-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137993" comment="pcfclock-kmp-desktop-0.44_k3.16.7_53-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137994" comment="pcfclock-kmp-pae-0.44_k3.16.7_53-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137995" comment="python-virtualbox-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137996" comment="vhba-kmp-20140629-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137997" comment="vhba-kmp-default-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137998" comment="vhba-kmp-desktop-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137999" comment="vhba-kmp-pae-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138000" comment="vhba-kmp-xen-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138001" comment="virtualbox-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138002" comment="virtualbox-devel-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138003" comment="virtualbox-guest-desktop-icons-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138004" comment="virtualbox-guest-kmp-default-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138005" comment="virtualbox-guest-kmp-desktop-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138006" comment="virtualbox-guest-kmp-pae-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138007" comment="virtualbox-guest-tools-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138008" comment="virtualbox-guest-x11-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138009" comment="virtualbox-host-kmp-default-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138010" comment="virtualbox-host-kmp-desktop-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138011" comment="virtualbox-host-kmp-pae-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138012" comment="virtualbox-host-source-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138013" comment="virtualbox-qt-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138014" comment="virtualbox-websrv-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138015" comment="xen-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138016" comment="xen-devel-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138017" comment="xen-doc-html-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138018" comment="xen-kmp-default-4.4.4_05_k3.16.7_53-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138019" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_53-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138020" comment="xen-libs-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138021" comment="xen-libs-32bit-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138022" comment="xen-tools-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138023" comment="xen-tools-domU-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138024" comment="xtables-addons-2.6-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138025" comment="xtables-addons-kmp-default-2.6_k3.16.7_53-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138026" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_53-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138027" comment="xtables-addons-kmp-pae-2.6_k3.16.7_53-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138028" comment="xtables-addons-kmp-xen-2.6_k3.16.7_53-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7044</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7044" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7044" source="CVE"/>
    <description>
    The unformat_24bit_color function in the format parsing code in Irssi before 0.8.20, when compiled with true-color enabled, allows remote attackers to cause a denial of service (heap corruption and crash) via an incomplete 24bit color code.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134241" comment="irssi-0.8.20-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134242" comment="irssi-devel-0.8.20-3.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7045</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7045" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7045" source="CVE"/>
    <description>
    The format_send_to_gui function in the format parsing code in Irssi before 0.8.20 allows remote attackers to cause a denial of service (heap corruption and crash) via vectors involving the length of a string.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134241" comment="irssi-0.8.20-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134242" comment="irssi-devel-0.8.20-3.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7052</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7052" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7052" source="CVE"/>
    <description>
    crypto/x509/x509_vfy.c in OpenSSL 1.0.2i allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) by triggering a CRL operation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134144" comment="nodejs-4.6.0-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134145" comment="nodejs-devel-4.6.0-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133733" comment="nodejs-doc-4.6.0-24.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7067</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7067" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7067" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135911" comment="monit-5.20.0-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135912" comment="monit-doc-5.20.0-2.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7068</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7068" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7068" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009147286" comment="pdns-3.3.1-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147287" comment="pdns-backend-ldap-3.3.1-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147288" comment="pdns-backend-lua-3.3.1-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147289" comment="pdns-backend-mydns-3.3.1-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147290" comment="pdns-backend-mysql-3.3.1-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147291" comment="pdns-backend-postgresql-3.3.1-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147292" comment="pdns-backend-sqlite3-3.3.1-2.12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7072</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7072" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7072" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009147286" comment="pdns-3.3.1-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147287" comment="pdns-backend-ldap-3.3.1-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147288" comment="pdns-backend-lua-3.3.1-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147289" comment="pdns-backend-mydns-3.3.1-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147290" comment="pdns-backend-mysql-3.3.1-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147291" comment="pdns-backend-postgresql-3.3.1-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147292" comment="pdns-backend-sqlite3-3.3.1-2.12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7073</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7073" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7073" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009147286" comment="pdns-3.3.1-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147287" comment="pdns-backend-ldap-3.3.1-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147288" comment="pdns-backend-lua-3.3.1-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147289" comment="pdns-backend-mydns-3.3.1-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147290" comment="pdns-backend-mysql-3.3.1-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147291" comment="pdns-backend-postgresql-3.3.1-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147292" comment="pdns-backend-sqlite3-3.3.1-2.12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7074</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7074" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7074" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009147286" comment="pdns-3.3.1-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147287" comment="pdns-backend-ldap-3.3.1-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147288" comment="pdns-backend-lua-3.3.1-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147289" comment="pdns-backend-mydns-3.3.1-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147290" comment="pdns-backend-mysql-3.3.1-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147291" comment="pdns-backend-postgresql-3.3.1-2.12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147292" comment="pdns-backend-sqlite3-3.3.1-2.12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7076</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7076" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7076" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135908" comment="sudo-1.8.10p3-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135909" comment="sudo-devel-1.8.10p3-2.10.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135910" comment="sudo-test-1.8.10p3-2.10.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7092</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7092" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7092" source="CVE"/>
    <description>
    The get_page_from_l3e function in arch/x86/mm.c in Xen allows local 32-bit PV guest OS administrators to gain host OS privileges via vectors related to L3 recursive pagetables.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133720" comment="xen-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133721" comment="xen-devel-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133722" comment="xen-doc-html-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133723" comment="xen-kmp-default-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133724" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133725" comment="xen-libs-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133726" comment="xen-libs-32bit-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133727" comment="xen-tools-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133728" comment="xen-tools-domU-4.4.4_05-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7093</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7093" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7093" source="CVE"/>
    <description>
    Xen 4.5.3, 4.6.3, and 4.7.x allow local HVM guest OS administrators to overwrite hypervisor memory and consequently gain host OS privileges by leveraging mishandling of instruction pointer truncation during emulation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133720" comment="xen-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133721" comment="xen-devel-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133722" comment="xen-doc-html-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133723" comment="xen-kmp-default-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133724" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133725" comment="xen-libs-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133726" comment="xen-libs-32bit-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133727" comment="xen-tools-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133728" comment="xen-tools-domU-4.4.4_05-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7094</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7094" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7094" source="CVE"/>
    <description>
    Buffer overflow in Xen 4.7.x and earlier allows local x86 HVM guest OS administrators on guests running with shadow paging to cause a denial of service via a pagetable update.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133720" comment="xen-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133721" comment="xen-devel-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133722" comment="xen-doc-html-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133723" comment="xen-kmp-default-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133724" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133725" comment="xen-libs-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133726" comment="xen-libs-32bit-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133727" comment="xen-tools-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133728" comment="xen-tools-domU-4.4.4_05-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7098</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7098" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7098" source="CVE"/>
    <description>
    Race condition in wget 1.17 and earlier, when used in recursive or mirroring mode to download a single file, might allow remote servers to bypass intended access list restrictions by keeping an HTTP connection open.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133429" comment="wget-1.16-4.10.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7099</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7099" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7099" source="CVE"/>
    <description>
    The tls.checkServerIdentity function in Node.js 0.10.x before 0.10.47, 0.12.x before 0.12.16, 4.x before 4.6.0, and 6.x before 6.7.0 does not properly handle wildcards in name fields of X.509 certificates, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134144" comment="nodejs-4.6.0-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134145" comment="nodejs-devel-4.6.0-24.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133733" comment="nodejs-doc-4.6.0-24.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7101</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7101" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7101" source="CVE"/>
    <description>
    The SGI coder in ImageMagick before 7.0.2-10 allows remote attackers to cause a denial of service (out-of-bounds read) via a large row value in an sgi file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133963" comment="GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133964" comment="GraphicsMagick-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133990" comment="ImageMagick-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133991" comment="ImageMagick-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133992" comment="ImageMagick-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133993" comment="ImageMagick-doc-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133994" comment="ImageMagick-extra-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133965" comment="libGraphicsMagick++-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133966" comment="libGraphicsMagick++-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133967" comment="libGraphicsMagick-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133968" comment="libGraphicsMagick3-config-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133969" comment="libGraphicsMagickWand-Q16-2-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133995" comment="libMagick++-6_Q16-5-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133996" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133997" comment="libMagick++-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133998" comment="libMagick++-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133999" comment="libMagickCore-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134000" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134001" comment="libMagickWand-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134002" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133970" comment="perl-GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134003" comment="perl-PerlMagick-6.8.9.8-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7117</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7117" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7117" source="CVE"/>
    <description>
    Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133865" comment="bbswitch-0.8-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133866" comment="bbswitch-kmp-default-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133867" comment="bbswitch-kmp-desktop-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133868" comment="bbswitch-kmp-pae-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133869" comment="bbswitch-kmp-xen-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133870" comment="cloop-2.639-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133871" comment="cloop-kmp-default-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133872" comment="cloop-kmp-desktop-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133873" comment="cloop-kmp-pae-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133874" comment="cloop-kmp-xen-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133875" comment="crash-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133876" comment="crash-devel-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133877" comment="crash-doc-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133878" comment="crash-eppic-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133879" comment="crash-gcore-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133880" comment="crash-kmp-default-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133881" comment="crash-kmp-desktop-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133882" comment="crash-kmp-pae-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133883" comment="crash-kmp-xen-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133884" comment="hdjmod-1.28-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133885" comment="hdjmod-kmp-default-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133886" comment="hdjmod-kmp-desktop-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133887" comment="hdjmod-kmp-pae-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133888" comment="hdjmod-kmp-xen-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133889" comment="ipset-6.23-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133890" comment="ipset-devel-6.23-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133891" comment="ipset-kmp-default-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133892" comment="ipset-kmp-desktop-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133893" comment="ipset-kmp-pae-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133894" comment="ipset-kmp-xen-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133895" comment="kernel-debug-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133896" comment="kernel-debug-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133897" comment="kernel-debug-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133898" comment="kernel-default-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133899" comment="kernel-default-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133900" comment="kernel-default-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133901" comment="kernel-desktop-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133902" comment="kernel-desktop-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133903" comment="kernel-desktop-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133904" comment="kernel-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133905" comment="kernel-docs-3.16.7-45.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133906" comment="kernel-ec2-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133907" comment="kernel-ec2-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133908" comment="kernel-ec2-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133909" comment="kernel-macros-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133910" comment="kernel-obs-build-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133911" comment="kernel-obs-qa-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133912" comment="kernel-obs-qa-xen-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133913" comment="kernel-pae-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133914" comment="kernel-pae-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133915" comment="kernel-pae-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133916" comment="kernel-source-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133917" comment="kernel-source-vanilla-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133918" comment="kernel-syms-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133919" comment="kernel-vanilla-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133920" comment="kernel-vanilla-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133921" comment="kernel-xen-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133922" comment="kernel-xen-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133923" comment="kernel-xen-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133924" comment="libipset3-6.23-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133925" comment="pcfclock-0.44-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133926" comment="pcfclock-kmp-default-0.44_k3.16.7_45-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133927" comment="pcfclock-kmp-desktop-0.44_k3.16.7_45-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133928" comment="pcfclock-kmp-pae-0.44_k3.16.7_45-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133929" comment="python-virtualbox-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133930" comment="vhba-kmp-20140629-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133931" comment="vhba-kmp-default-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133932" comment="vhba-kmp-desktop-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133933" comment="vhba-kmp-pae-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133934" comment="vhba-kmp-xen-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133935" comment="virtualbox-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133936" comment="virtualbox-devel-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133937" comment="virtualbox-guest-desktop-icons-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133938" comment="virtualbox-guest-kmp-default-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133939" comment="virtualbox-guest-kmp-desktop-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133940" comment="virtualbox-guest-kmp-pae-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133941" comment="virtualbox-guest-tools-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133942" comment="virtualbox-guest-x11-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133943" comment="virtualbox-host-kmp-default-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133944" comment="virtualbox-host-kmp-desktop-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133945" comment="virtualbox-host-kmp-pae-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133946" comment="virtualbox-host-source-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133947" comment="virtualbox-qt-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133948" comment="virtualbox-websrv-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133949" comment="xen-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133950" comment="xen-devel-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133951" comment="xen-doc-html-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133952" comment="xen-kmp-default-4.4.4_05_k3.16.7_45-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133953" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_45-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133954" comment="xen-libs-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133955" comment="xen-libs-32bit-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133956" comment="xen-tools-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133957" comment="xen-tools-domU-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133958" comment="xtables-addons-2.6-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133959" comment="xtables-addons-kmp-default-2.6_k3.16.7_45-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133960" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_45-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133961" comment="xtables-addons-kmp-pae-2.6_k3.16.7_45-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133962" comment="xtables-addons-kmp-xen-2.6_k3.16.7_45-24.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7124</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7124" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7124" source="CVE"/>
    <description>
    ext/standard/var_unserializer.c in PHP before 5.6.25 and 7.x before 7.0.10 mishandles certain invalid objects, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data that leads to a (1) __destruct call or (2) magic method call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133460" comment="apache2-mod_php5-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133461" comment="php5-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133462" comment="php5-bcmath-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133463" comment="php5-bz2-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133464" comment="php5-calendar-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133465" comment="php5-ctype-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133466" comment="php5-curl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133467" comment="php5-dba-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133468" comment="php5-devel-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133469" comment="php5-dom-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133470" comment="php5-enchant-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133471" comment="php5-exif-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133472" comment="php5-fastcgi-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133473" comment="php5-fileinfo-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133474" comment="php5-firebird-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133475" comment="php5-fpm-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133476" comment="php5-ftp-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133477" comment="php5-gd-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133478" comment="php5-gettext-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133479" comment="php5-gmp-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133480" comment="php5-iconv-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133481" comment="php5-imap-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133482" comment="php5-intl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133483" comment="php5-json-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133484" comment="php5-ldap-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133485" comment="php5-mbstring-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133486" comment="php5-mcrypt-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133487" comment="php5-mssql-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133488" comment="php5-mysql-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133489" comment="php5-odbc-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133490" comment="php5-opcache-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133491" comment="php5-openssl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133492" comment="php5-pcntl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133493" comment="php5-pdo-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133494" comment="php5-pear-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133495" comment="php5-pgsql-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133496" comment="php5-phar-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133497" comment="php5-posix-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133498" comment="php5-pspell-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133499" comment="php5-readline-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133500" comment="php5-shmop-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133501" comment="php5-snmp-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133502" comment="php5-soap-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133503" comment="php5-sockets-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133504" comment="php5-sqlite-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133505" comment="php5-suhosin-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133506" comment="php5-sysvmsg-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133507" comment="php5-sysvsem-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133508" comment="php5-sysvshm-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133509" comment="php5-tidy-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133510" comment="php5-tokenizer-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133511" comment="php5-wddx-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133512" comment="php5-xmlreader-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133513" comment="php5-xmlrpc-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133514" comment="php5-xmlwriter-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133515" comment="php5-xsl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133516" comment="php5-zip-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133517" comment="php5-zlib-5.6.1-75.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7125</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7125" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7125" source="CVE"/>
    <description>
    ext/session/session.c in PHP before 5.6.25 and 7.x before 7.0.10 skips invalid session names in a way that triggers incorrect parsing, which allows remote attackers to inject arbitrary-type session data by leveraging control of a session name, as demonstrated by object injection.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133460" comment="apache2-mod_php5-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133461" comment="php5-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133462" comment="php5-bcmath-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133463" comment="php5-bz2-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133464" comment="php5-calendar-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133465" comment="php5-ctype-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133466" comment="php5-curl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133467" comment="php5-dba-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133468" comment="php5-devel-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133469" comment="php5-dom-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133470" comment="php5-enchant-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133471" comment="php5-exif-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133472" comment="php5-fastcgi-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133473" comment="php5-fileinfo-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133474" comment="php5-firebird-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133475" comment="php5-fpm-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133476" comment="php5-ftp-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133477" comment="php5-gd-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133478" comment="php5-gettext-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133479" comment="php5-gmp-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133480" comment="php5-iconv-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133481" comment="php5-imap-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133482" comment="php5-intl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133483" comment="php5-json-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133484" comment="php5-ldap-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133485" comment="php5-mbstring-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133486" comment="php5-mcrypt-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133487" comment="php5-mssql-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133488" comment="php5-mysql-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133489" comment="php5-odbc-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133490" comment="php5-opcache-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133491" comment="php5-openssl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133492" comment="php5-pcntl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133493" comment="php5-pdo-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133494" comment="php5-pear-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133495" comment="php5-pgsql-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133496" comment="php5-phar-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133497" comment="php5-posix-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133498" comment="php5-pspell-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133499" comment="php5-readline-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133500" comment="php5-shmop-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133501" comment="php5-snmp-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133502" comment="php5-soap-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133503" comment="php5-sockets-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133504" comment="php5-sqlite-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133505" comment="php5-suhosin-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133506" comment="php5-sysvmsg-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133507" comment="php5-sysvsem-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133508" comment="php5-sysvshm-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133509" comment="php5-tidy-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133510" comment="php5-tokenizer-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133511" comment="php5-wddx-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133512" comment="php5-xmlreader-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133513" comment="php5-xmlrpc-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133514" comment="php5-xmlwriter-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133515" comment="php5-xsl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133516" comment="php5-zip-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133517" comment="php5-zlib-5.6.1-75.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7126</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7126" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7126" source="CVE"/>
    <description>
    The imagetruecolortopalette function in ext/gd/gd.c in PHP before 5.6.25 and 7.x before 7.0.10 does not properly validate the number of colors, which allows remote attackers to cause a denial of service (select_colors allocation error and out-of-bounds write) or possibly have unspecified other impact via a large value in the third argument.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133460" comment="apache2-mod_php5-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133461" comment="php5-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133462" comment="php5-bcmath-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133463" comment="php5-bz2-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133464" comment="php5-calendar-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133465" comment="php5-ctype-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133466" comment="php5-curl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133467" comment="php5-dba-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133468" comment="php5-devel-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133469" comment="php5-dom-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133470" comment="php5-enchant-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133471" comment="php5-exif-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133472" comment="php5-fastcgi-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133473" comment="php5-fileinfo-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133474" comment="php5-firebird-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133475" comment="php5-fpm-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133476" comment="php5-ftp-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133477" comment="php5-gd-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133478" comment="php5-gettext-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133479" comment="php5-gmp-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133480" comment="php5-iconv-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133481" comment="php5-imap-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133482" comment="php5-intl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133483" comment="php5-json-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133484" comment="php5-ldap-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133485" comment="php5-mbstring-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133486" comment="php5-mcrypt-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133487" comment="php5-mssql-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133488" comment="php5-mysql-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133489" comment="php5-odbc-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133490" comment="php5-opcache-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133491" comment="php5-openssl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133492" comment="php5-pcntl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133493" comment="php5-pdo-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133494" comment="php5-pear-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133495" comment="php5-pgsql-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133496" comment="php5-phar-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133497" comment="php5-posix-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133498" comment="php5-pspell-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133499" comment="php5-readline-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133500" comment="php5-shmop-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133501" comment="php5-snmp-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133502" comment="php5-soap-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133503" comment="php5-sockets-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133504" comment="php5-sqlite-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133505" comment="php5-suhosin-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133506" comment="php5-sysvmsg-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133507" comment="php5-sysvsem-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133508" comment="php5-sysvshm-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133509" comment="php5-tidy-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133510" comment="php5-tokenizer-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133511" comment="php5-wddx-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133512" comment="php5-xmlreader-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133513" comment="php5-xmlrpc-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133514" comment="php5-xmlwriter-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133515" comment="php5-xsl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133516" comment="php5-zip-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133517" comment="php5-zlib-5.6.1-75.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7127</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7127" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7127" source="CVE"/>
    <description>
    The imagegammacorrect function in ext/gd/gd.c in PHP before 5.6.25 and 7.x before 7.0.10 does not properly validate gamma values, which allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact by providing different signs for the second and third arguments.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133460" comment="apache2-mod_php5-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133461" comment="php5-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133462" comment="php5-bcmath-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133463" comment="php5-bz2-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133464" comment="php5-calendar-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133465" comment="php5-ctype-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133466" comment="php5-curl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133467" comment="php5-dba-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133468" comment="php5-devel-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133469" comment="php5-dom-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133470" comment="php5-enchant-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133471" comment="php5-exif-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133472" comment="php5-fastcgi-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133473" comment="php5-fileinfo-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133474" comment="php5-firebird-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133475" comment="php5-fpm-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133476" comment="php5-ftp-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133477" comment="php5-gd-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133478" comment="php5-gettext-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133479" comment="php5-gmp-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133480" comment="php5-iconv-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133481" comment="php5-imap-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133482" comment="php5-intl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133483" comment="php5-json-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133484" comment="php5-ldap-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133485" comment="php5-mbstring-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133486" comment="php5-mcrypt-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133487" comment="php5-mssql-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133488" comment="php5-mysql-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133489" comment="php5-odbc-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133490" comment="php5-opcache-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133491" comment="php5-openssl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133492" comment="php5-pcntl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133493" comment="php5-pdo-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133494" comment="php5-pear-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133495" comment="php5-pgsql-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133496" comment="php5-phar-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133497" comment="php5-posix-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133498" comment="php5-pspell-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133499" comment="php5-readline-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133500" comment="php5-shmop-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133501" comment="php5-snmp-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133502" comment="php5-soap-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133503" comment="php5-sockets-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133504" comment="php5-sqlite-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133505" comment="php5-suhosin-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133506" comment="php5-sysvmsg-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133507" comment="php5-sysvsem-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133508" comment="php5-sysvshm-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133509" comment="php5-tidy-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133510" comment="php5-tokenizer-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133511" comment="php5-wddx-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133512" comment="php5-xmlreader-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133513" comment="php5-xmlrpc-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133514" comment="php5-xmlwriter-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133515" comment="php5-xsl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133516" comment="php5-zip-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133517" comment="php5-zlib-5.6.1-75.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7128</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7128" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7128" source="CVE"/>
    <description>
    The exif_process_IFD_in_TIFF function in ext/exif/exif.c in PHP before 5.6.25 and 7.x before 7.0.10 mishandles the case of a thumbnail offset that exceeds the file size, which allows remote attackers to obtain sensitive information from process memory via a crafted TIFF image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133460" comment="apache2-mod_php5-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133461" comment="php5-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133462" comment="php5-bcmath-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133463" comment="php5-bz2-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133464" comment="php5-calendar-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133465" comment="php5-ctype-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133466" comment="php5-curl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133467" comment="php5-dba-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133468" comment="php5-devel-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133469" comment="php5-dom-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133470" comment="php5-enchant-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133471" comment="php5-exif-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133472" comment="php5-fastcgi-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133473" comment="php5-fileinfo-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133474" comment="php5-firebird-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133475" comment="php5-fpm-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133476" comment="php5-ftp-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133477" comment="php5-gd-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133478" comment="php5-gettext-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133479" comment="php5-gmp-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133480" comment="php5-iconv-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133481" comment="php5-imap-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133482" comment="php5-intl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133483" comment="php5-json-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133484" comment="php5-ldap-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133485" comment="php5-mbstring-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133486" comment="php5-mcrypt-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133487" comment="php5-mssql-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133488" comment="php5-mysql-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133489" comment="php5-odbc-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133490" comment="php5-opcache-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133491" comment="php5-openssl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133492" comment="php5-pcntl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133493" comment="php5-pdo-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133494" comment="php5-pear-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133495" comment="php5-pgsql-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133496" comment="php5-phar-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133497" comment="php5-posix-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133498" comment="php5-pspell-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133499" comment="php5-readline-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133500" comment="php5-shmop-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133501" comment="php5-snmp-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133502" comment="php5-soap-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133503" comment="php5-sockets-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133504" comment="php5-sqlite-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133505" comment="php5-suhosin-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133506" comment="php5-sysvmsg-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133507" comment="php5-sysvsem-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133508" comment="php5-sysvshm-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133509" comment="php5-tidy-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133510" comment="php5-tokenizer-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133511" comment="php5-wddx-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133512" comment="php5-xmlreader-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133513" comment="php5-xmlrpc-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133514" comment="php5-xmlwriter-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133515" comment="php5-xsl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133516" comment="php5-zip-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133517" comment="php5-zlib-5.6.1-75.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7129</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7129" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7129" source="CVE"/>
    <description>
    The php_wddx_process_data function in ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via an invalid ISO 8601 time value, as demonstrated by a wddx_deserialize call that mishandles a dateTime element in a wddxPacket XML document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133460" comment="apache2-mod_php5-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133461" comment="php5-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133462" comment="php5-bcmath-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133463" comment="php5-bz2-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133464" comment="php5-calendar-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133465" comment="php5-ctype-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133466" comment="php5-curl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133467" comment="php5-dba-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133468" comment="php5-devel-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133469" comment="php5-dom-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133470" comment="php5-enchant-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133471" comment="php5-exif-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133472" comment="php5-fastcgi-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133473" comment="php5-fileinfo-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133474" comment="php5-firebird-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133475" comment="php5-fpm-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133476" comment="php5-ftp-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133477" comment="php5-gd-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133478" comment="php5-gettext-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133479" comment="php5-gmp-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133480" comment="php5-iconv-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133481" comment="php5-imap-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133482" comment="php5-intl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133483" comment="php5-json-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133484" comment="php5-ldap-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133485" comment="php5-mbstring-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133486" comment="php5-mcrypt-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133487" comment="php5-mssql-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133488" comment="php5-mysql-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133489" comment="php5-odbc-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133490" comment="php5-opcache-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133491" comment="php5-openssl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133492" comment="php5-pcntl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133493" comment="php5-pdo-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133494" comment="php5-pear-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133495" comment="php5-pgsql-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133496" comment="php5-phar-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133497" comment="php5-posix-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133498" comment="php5-pspell-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133499" comment="php5-readline-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133500" comment="php5-shmop-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133501" comment="php5-snmp-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133502" comment="php5-soap-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133503" comment="php5-sockets-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133504" comment="php5-sqlite-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133505" comment="php5-suhosin-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133506" comment="php5-sysvmsg-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133507" comment="php5-sysvsem-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133508" comment="php5-sysvshm-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133509" comment="php5-tidy-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133510" comment="php5-tokenizer-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133511" comment="php5-wddx-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133512" comment="php5-xmlreader-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133513" comment="php5-xmlrpc-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133514" comment="php5-xmlwriter-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133515" comment="php5-xsl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133516" comment="php5-zip-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133517" comment="php5-zlib-5.6.1-75.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7130</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7130" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7130" source="CVE"/>
    <description>
    The php_wddx_pop_element function in ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly have unspecified other impact via an invalid base64 binary value, as demonstrated by a wddx_deserialize call that mishandles a binary element in a wddxPacket XML document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133460" comment="apache2-mod_php5-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133461" comment="php5-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133462" comment="php5-bcmath-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133463" comment="php5-bz2-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133464" comment="php5-calendar-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133465" comment="php5-ctype-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133466" comment="php5-curl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133467" comment="php5-dba-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133468" comment="php5-devel-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133469" comment="php5-dom-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133470" comment="php5-enchant-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133471" comment="php5-exif-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133472" comment="php5-fastcgi-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133473" comment="php5-fileinfo-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133474" comment="php5-firebird-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133475" comment="php5-fpm-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133476" comment="php5-ftp-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133477" comment="php5-gd-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133478" comment="php5-gettext-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133479" comment="php5-gmp-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133480" comment="php5-iconv-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133481" comment="php5-imap-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133482" comment="php5-intl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133483" comment="php5-json-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133484" comment="php5-ldap-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133485" comment="php5-mbstring-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133486" comment="php5-mcrypt-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133487" comment="php5-mssql-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133488" comment="php5-mysql-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133489" comment="php5-odbc-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133490" comment="php5-opcache-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133491" comment="php5-openssl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133492" comment="php5-pcntl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133493" comment="php5-pdo-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133494" comment="php5-pear-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133495" comment="php5-pgsql-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133496" comment="php5-phar-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133497" comment="php5-posix-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133498" comment="php5-pspell-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133499" comment="php5-readline-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133500" comment="php5-shmop-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133501" comment="php5-snmp-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133502" comment="php5-soap-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133503" comment="php5-sockets-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133504" comment="php5-sqlite-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133505" comment="php5-suhosin-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133506" comment="php5-sysvmsg-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133507" comment="php5-sysvsem-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133508" comment="php5-sysvshm-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133509" comment="php5-tidy-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133510" comment="php5-tokenizer-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133511" comment="php5-wddx-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133512" comment="php5-xmlreader-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133513" comment="php5-xmlrpc-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133514" comment="php5-xmlwriter-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133515" comment="php5-xsl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133516" comment="php5-zip-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133517" comment="php5-zlib-5.6.1-75.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7131</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7131" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7131" source="CVE"/>
    <description>
    ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly have unspecified other impact via a malformed wddxPacket XML document that is mishandled in a wddx_deserialize call, as demonstrated by a tag that lacks a &lt; (less than) character.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133460" comment="apache2-mod_php5-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133461" comment="php5-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133462" comment="php5-bcmath-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133463" comment="php5-bz2-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133464" comment="php5-calendar-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133465" comment="php5-ctype-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133466" comment="php5-curl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133467" comment="php5-dba-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133468" comment="php5-devel-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133469" comment="php5-dom-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133470" comment="php5-enchant-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133471" comment="php5-exif-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133472" comment="php5-fastcgi-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133473" comment="php5-fileinfo-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133474" comment="php5-firebird-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133475" comment="php5-fpm-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133476" comment="php5-ftp-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133477" comment="php5-gd-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133478" comment="php5-gettext-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133479" comment="php5-gmp-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133480" comment="php5-iconv-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133481" comment="php5-imap-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133482" comment="php5-intl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133483" comment="php5-json-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133484" comment="php5-ldap-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133485" comment="php5-mbstring-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133486" comment="php5-mcrypt-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133487" comment="php5-mssql-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133488" comment="php5-mysql-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133489" comment="php5-odbc-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133490" comment="php5-opcache-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133491" comment="php5-openssl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133492" comment="php5-pcntl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133493" comment="php5-pdo-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133494" comment="php5-pear-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133495" comment="php5-pgsql-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133496" comment="php5-phar-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133497" comment="php5-posix-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133498" comment="php5-pspell-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133499" comment="php5-readline-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133500" comment="php5-shmop-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133501" comment="php5-snmp-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133502" comment="php5-soap-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133503" comment="php5-sockets-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133504" comment="php5-sqlite-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133505" comment="php5-suhosin-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133506" comment="php5-sysvmsg-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133507" comment="php5-sysvsem-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133508" comment="php5-sysvshm-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133509" comment="php5-tidy-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133510" comment="php5-tokenizer-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133511" comment="php5-wddx-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133512" comment="php5-xmlreader-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133513" comment="php5-xmlrpc-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133514" comment="php5-xmlwriter-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133515" comment="php5-xsl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133516" comment="php5-zip-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133517" comment="php5-zlib-5.6.1-75.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7132</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7132" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7132" source="CVE"/>
    <description>
    ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly have unspecified other impact via an invalid wddxPacket XML document that is mishandled in a wddx_deserialize call, as demonstrated by a stray element inside a boolean element, leading to incorrect pop processing.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133460" comment="apache2-mod_php5-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133461" comment="php5-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133462" comment="php5-bcmath-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133463" comment="php5-bz2-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133464" comment="php5-calendar-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133465" comment="php5-ctype-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133466" comment="php5-curl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133467" comment="php5-dba-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133468" comment="php5-devel-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133469" comment="php5-dom-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133470" comment="php5-enchant-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133471" comment="php5-exif-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133472" comment="php5-fastcgi-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133473" comment="php5-fileinfo-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133474" comment="php5-firebird-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133475" comment="php5-fpm-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133476" comment="php5-ftp-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133477" comment="php5-gd-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133478" comment="php5-gettext-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133479" comment="php5-gmp-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133480" comment="php5-iconv-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133481" comment="php5-imap-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133482" comment="php5-intl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133483" comment="php5-json-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133484" comment="php5-ldap-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133485" comment="php5-mbstring-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133486" comment="php5-mcrypt-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133487" comment="php5-mssql-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133488" comment="php5-mysql-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133489" comment="php5-odbc-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133490" comment="php5-opcache-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133491" comment="php5-openssl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133492" comment="php5-pcntl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133493" comment="php5-pdo-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133494" comment="php5-pear-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133495" comment="php5-pgsql-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133496" comment="php5-phar-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133497" comment="php5-posix-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133498" comment="php5-pspell-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133499" comment="php5-readline-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133500" comment="php5-shmop-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133501" comment="php5-snmp-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133502" comment="php5-soap-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133503" comment="php5-sockets-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133504" comment="php5-sqlite-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133505" comment="php5-suhosin-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133506" comment="php5-sysvmsg-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133507" comment="php5-sysvsem-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133508" comment="php5-sysvshm-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133509" comment="php5-tidy-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133510" comment="php5-tokenizer-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133511" comment="php5-wddx-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133512" comment="php5-xmlreader-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133513" comment="php5-xmlrpc-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133514" comment="php5-xmlwriter-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133515" comment="php5-xsl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133516" comment="php5-zip-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133517" comment="php5-zlib-5.6.1-75.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7134</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7134" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7134" source="CVE"/>
    <description>
    ext/curl/interface.c in PHP 7.x before 7.0.10 does not work around a libcurl integer overflow, which allows remote attackers to cause a denial of service (allocation error and heap-based buffer overflow) or possibly have unspecified other impact via a long string that is mishandled in a curl_escape call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133460" comment="apache2-mod_php5-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133461" comment="php5-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133462" comment="php5-bcmath-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133463" comment="php5-bz2-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133464" comment="php5-calendar-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133465" comment="php5-ctype-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133466" comment="php5-curl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133467" comment="php5-dba-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133468" comment="php5-devel-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133469" comment="php5-dom-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133470" comment="php5-enchant-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133471" comment="php5-exif-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133472" comment="php5-fastcgi-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133473" comment="php5-fileinfo-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133474" comment="php5-firebird-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133475" comment="php5-fpm-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133476" comment="php5-ftp-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133477" comment="php5-gd-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133478" comment="php5-gettext-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133479" comment="php5-gmp-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133480" comment="php5-iconv-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133481" comment="php5-imap-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133482" comment="php5-intl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133483" comment="php5-json-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133484" comment="php5-ldap-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133485" comment="php5-mbstring-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133486" comment="php5-mcrypt-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133487" comment="php5-mssql-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133488" comment="php5-mysql-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133489" comment="php5-odbc-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133490" comment="php5-opcache-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133491" comment="php5-openssl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133492" comment="php5-pcntl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133493" comment="php5-pdo-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133494" comment="php5-pear-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133495" comment="php5-pgsql-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133496" comment="php5-phar-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133497" comment="php5-posix-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133498" comment="php5-pspell-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133499" comment="php5-readline-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133500" comment="php5-shmop-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133501" comment="php5-snmp-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133502" comment="php5-soap-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133503" comment="php5-sockets-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133504" comment="php5-sqlite-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133505" comment="php5-suhosin-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133506" comment="php5-sysvmsg-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133507" comment="php5-sysvsem-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133508" comment="php5-sysvshm-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133509" comment="php5-tidy-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133510" comment="php5-tokenizer-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133511" comment="php5-wddx-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133512" comment="php5-xmlreader-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133513" comment="php5-xmlrpc-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133514" comment="php5-xmlwriter-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133515" comment="php5-xsl-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133516" comment="php5-zip-5.6.1-75.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133517" comment="php5-zlib-5.6.1-75.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7154</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7154" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7154" source="CVE"/>
    <description>
    Use-after-free vulnerability in the FIFO event channel code in Xen 4.4.x allows local guest OS administrators to cause a denial of service (host crash) and possibly execute arbitrary code or obtain sensitive information via an invalid guest frame number.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133720" comment="xen-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133721" comment="xen-devel-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133722" comment="xen-doc-html-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133723" comment="xen-kmp-default-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133724" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_42-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133725" comment="xen-libs-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133726" comment="xen-libs-32bit-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133727" comment="xen-tools-4.4.4_05-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133728" comment="xen-tools-domU-4.4.4_05-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7162</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7162" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7162" source="CVE"/>
    <description>
    The _g_file_remove_directory function in file-utils.c in File Roller 3.5.4 through 3.20.2 allows remote attackers to delete arbitrary files via a symlink attack on a folder in an archive.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134243" comment="file-roller-3.14.2-7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134244" comment="file-roller-lang-3.14.2-7.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134245" comment="nautilus-file-roller-3.14.2-7.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7411</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7411" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7411" source="CVE"/>
    <description>
    ext/standard/var_unserializer.re in PHP before 5.6.26 mishandles object-deserialization failures, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via an unserialize call that references a partially constructed object.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133654" comment="apache2-mod_php5-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133655" comment="php5-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133656" comment="php5-bcmath-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133657" comment="php5-bz2-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133658" comment="php5-calendar-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133659" comment="php5-ctype-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133660" comment="php5-curl-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133661" comment="php5-dba-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133662" comment="php5-devel-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133663" comment="php5-dom-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133664" comment="php5-enchant-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133665" comment="php5-exif-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133666" comment="php5-fastcgi-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133667" comment="php5-fileinfo-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133668" comment="php5-firebird-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133669" comment="php5-fpm-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133670" comment="php5-ftp-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133671" comment="php5-gd-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133672" comment="php5-gettext-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133673" comment="php5-gmp-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133674" comment="php5-iconv-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133675" comment="php5-imap-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133676" comment="php5-intl-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133677" comment="php5-json-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133678" comment="php5-ldap-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133679" comment="php5-mbstring-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133680" comment="php5-mcrypt-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133681" comment="php5-mssql-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133682" comment="php5-mysql-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133683" comment="php5-odbc-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133684" comment="php5-opcache-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133685" comment="php5-openssl-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133686" comment="php5-pcntl-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133687" comment="php5-pdo-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133688" comment="php5-pear-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133689" comment="php5-pgsql-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133690" comment="php5-phar-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133691" comment="php5-posix-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133692" comment="php5-pspell-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133693" comment="php5-readline-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133694" comment="php5-shmop-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133695" comment="php5-snmp-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133696" comment="php5-soap-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133697" comment="php5-sockets-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133698" comment="php5-sqlite-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133699" comment="php5-suhosin-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133700" comment="php5-sysvmsg-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133701" comment="php5-sysvsem-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133702" comment="php5-sysvshm-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133703" comment="php5-tidy-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133704" comment="php5-tokenizer-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133705" comment="php5-wddx-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133706" comment="php5-xmlreader-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133707" comment="php5-xmlrpc-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133708" comment="php5-xmlwriter-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133709" comment="php5-xsl-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133710" comment="php5-zip-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133711" comment="php5-zlib-5.6.1-78.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7412</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7412" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7412" source="CVE"/>
    <description>
    ext/mysqlnd/mysqlnd_wireprotocol.c in PHP before 5.6.26 and 7.x before 7.0.11 does not verify that a BIT field has the UNSIGNED_FLAG flag, which allows remote MySQL servers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted field metadata.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133654" comment="apache2-mod_php5-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133655" comment="php5-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133656" comment="php5-bcmath-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133657" comment="php5-bz2-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133658" comment="php5-calendar-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133659" comment="php5-ctype-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133660" comment="php5-curl-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133661" comment="php5-dba-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133662" comment="php5-devel-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133663" comment="php5-dom-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133664" comment="php5-enchant-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133665" comment="php5-exif-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133666" comment="php5-fastcgi-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133667" comment="php5-fileinfo-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133668" comment="php5-firebird-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133669" comment="php5-fpm-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133670" comment="php5-ftp-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133671" comment="php5-gd-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133672" comment="php5-gettext-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133673" comment="php5-gmp-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133674" comment="php5-iconv-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133675" comment="php5-imap-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133676" comment="php5-intl-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133677" comment="php5-json-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133678" comment="php5-ldap-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133679" comment="php5-mbstring-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133680" comment="php5-mcrypt-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133681" comment="php5-mssql-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133682" comment="php5-mysql-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133683" comment="php5-odbc-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133684" comment="php5-opcache-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133685" comment="php5-openssl-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133686" comment="php5-pcntl-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133687" comment="php5-pdo-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133688" comment="php5-pear-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133689" comment="php5-pgsql-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133690" comment="php5-phar-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133691" comment="php5-posix-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133692" comment="php5-pspell-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133693" comment="php5-readline-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133694" comment="php5-shmop-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133695" comment="php5-snmp-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133696" comment="php5-soap-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133697" comment="php5-sockets-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133698" comment="php5-sqlite-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133699" comment="php5-suhosin-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133700" comment="php5-sysvmsg-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133701" comment="php5-sysvsem-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133702" comment="php5-sysvshm-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133703" comment="php5-tidy-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133704" comment="php5-tokenizer-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133705" comment="php5-wddx-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133706" comment="php5-xmlreader-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133707" comment="php5-xmlrpc-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133708" comment="php5-xmlwriter-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133709" comment="php5-xsl-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133710" comment="php5-zip-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133711" comment="php5-zlib-5.6.1-78.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167413" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7413</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7413" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7413" source="CVE"/>
    <description>
    Use-after-free vulnerability in the wddx_stack_destroy function in ext/wddx/wddx.c in PHP before 5.6.26 and 7.x before 7.0.11 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a wddxPacket XML document that lacks an end-tag for a recordset field element, leading to mishandling in a wddx_deserialize call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133654" comment="apache2-mod_php5-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133655" comment="php5-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133656" comment="php5-bcmath-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133657" comment="php5-bz2-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133658" comment="php5-calendar-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133659" comment="php5-ctype-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133660" comment="php5-curl-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133661" comment="php5-dba-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133662" comment="php5-devel-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133663" comment="php5-dom-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133664" comment="php5-enchant-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133665" comment="php5-exif-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133666" comment="php5-fastcgi-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133667" comment="php5-fileinfo-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133668" comment="php5-firebird-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133669" comment="php5-fpm-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133670" comment="php5-ftp-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133671" comment="php5-gd-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133672" comment="php5-gettext-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133673" comment="php5-gmp-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133674" comment="php5-iconv-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133675" comment="php5-imap-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133676" comment="php5-intl-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133677" comment="php5-json-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133678" comment="php5-ldap-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133679" comment="php5-mbstring-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133680" comment="php5-mcrypt-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133681" comment="php5-mssql-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133682" comment="php5-mysql-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133683" comment="php5-odbc-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133684" comment="php5-opcache-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133685" comment="php5-openssl-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133686" comment="php5-pcntl-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133687" comment="php5-pdo-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133688" comment="php5-pear-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133689" comment="php5-pgsql-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133690" comment="php5-phar-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133691" comment="php5-posix-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133692" comment="php5-pspell-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133693" comment="php5-readline-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133694" comment="php5-shmop-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133695" comment="php5-snmp-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133696" comment="php5-soap-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133697" comment="php5-sockets-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133698" comment="php5-sqlite-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133699" comment="php5-suhosin-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133700" comment="php5-sysvmsg-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133701" comment="php5-sysvsem-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133702" comment="php5-sysvshm-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133703" comment="php5-tidy-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133704" comment="php5-tokenizer-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133705" comment="php5-wddx-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133706" comment="php5-xmlreader-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133707" comment="php5-xmlrpc-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133708" comment="php5-xmlwriter-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133709" comment="php5-xsl-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133710" comment="php5-zip-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133711" comment="php5-zlib-5.6.1-78.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7414</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7414" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7414" source="CVE"/>
    <description>
    The ZIP signature-verification feature in PHP before 5.6.26 and 7.x before 7.0.11 does not ensure that the uncompressed_filesize field is large enough, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via a crafted PHAR archive, related to ext/phar/util.c and ext/phar/zip.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133654" comment="apache2-mod_php5-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133655" comment="php5-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133656" comment="php5-bcmath-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133657" comment="php5-bz2-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133658" comment="php5-calendar-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133659" comment="php5-ctype-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133660" comment="php5-curl-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133661" comment="php5-dba-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133662" comment="php5-devel-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133663" comment="php5-dom-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133664" comment="php5-enchant-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133665" comment="php5-exif-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133666" comment="php5-fastcgi-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133667" comment="php5-fileinfo-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133668" comment="php5-firebird-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133669" comment="php5-fpm-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133670" comment="php5-ftp-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133671" comment="php5-gd-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133672" comment="php5-gettext-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133673" comment="php5-gmp-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133674" comment="php5-iconv-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133675" comment="php5-imap-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133676" comment="php5-intl-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133677" comment="php5-json-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133678" comment="php5-ldap-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133679" comment="php5-mbstring-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133680" comment="php5-mcrypt-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133681" comment="php5-mssql-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133682" comment="php5-mysql-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133683" comment="php5-odbc-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133684" comment="php5-opcache-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133685" comment="php5-openssl-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133686" comment="php5-pcntl-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133687" comment="php5-pdo-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133688" comment="php5-pear-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133689" comment="php5-pgsql-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133690" comment="php5-phar-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133691" comment="php5-posix-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133692" comment="php5-pspell-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133693" comment="php5-readline-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133694" comment="php5-shmop-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133695" comment="php5-snmp-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133696" comment="php5-soap-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133697" comment="php5-sockets-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133698" comment="php5-sqlite-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133699" comment="php5-suhosin-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133700" comment="php5-sysvmsg-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133701" comment="php5-sysvsem-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133702" comment="php5-sysvshm-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133703" comment="php5-tidy-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133704" comment="php5-tokenizer-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133705" comment="php5-wddx-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133706" comment="php5-xmlreader-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133707" comment="php5-xmlrpc-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133708" comment="php5-xmlwriter-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133709" comment="php5-xsl-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133710" comment="php5-zip-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133711" comment="php5-zlib-5.6.1-78.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7416</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7416" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7416" source="CVE"/>
    <description>
    ext/intl/msgformat/msgformat_format.c in PHP before 5.6.26 and 7.x before 7.0.11 does not properly restrict the locale length provided to the Locale class in the ICU library, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a MessageFormatter::formatMessage call with a long first argument.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133654" comment="apache2-mod_php5-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133655" comment="php5-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133656" comment="php5-bcmath-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133657" comment="php5-bz2-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133658" comment="php5-calendar-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133659" comment="php5-ctype-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133660" comment="php5-curl-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133661" comment="php5-dba-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133662" comment="php5-devel-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133663" comment="php5-dom-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133664" comment="php5-enchant-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133665" comment="php5-exif-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133666" comment="php5-fastcgi-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133667" comment="php5-fileinfo-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133668" comment="php5-firebird-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133669" comment="php5-fpm-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133670" comment="php5-ftp-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133671" comment="php5-gd-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133672" comment="php5-gettext-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133673" comment="php5-gmp-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133674" comment="php5-iconv-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133675" comment="php5-imap-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133676" comment="php5-intl-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133677" comment="php5-json-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133678" comment="php5-ldap-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133679" comment="php5-mbstring-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133680" comment="php5-mcrypt-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133681" comment="php5-mssql-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133682" comment="php5-mysql-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133683" comment="php5-odbc-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133684" comment="php5-opcache-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133685" comment="php5-openssl-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133686" comment="php5-pcntl-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133687" comment="php5-pdo-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133688" comment="php5-pear-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133689" comment="php5-pgsql-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133690" comment="php5-phar-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133691" comment="php5-posix-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133692" comment="php5-pspell-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133693" comment="php5-readline-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133694" comment="php5-shmop-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133695" comment="php5-snmp-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133696" comment="php5-soap-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133697" comment="php5-sockets-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133698" comment="php5-sqlite-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133699" comment="php5-suhosin-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133700" comment="php5-sysvmsg-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133701" comment="php5-sysvsem-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133702" comment="php5-sysvshm-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133703" comment="php5-tidy-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133704" comment="php5-tokenizer-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133705" comment="php5-wddx-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133706" comment="php5-xmlreader-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133707" comment="php5-xmlrpc-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133708" comment="php5-xmlwriter-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133709" comment="php5-xsl-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133710" comment="php5-zip-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133711" comment="php5-zlib-5.6.1-78.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7417</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7417" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7417" source="CVE"/>
    <description>
    ext/spl/spl_array.c in PHP before 5.6.26 and 7.x before 7.0.11 proceeds with SplArray unserialization without validating a return value and data type, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133654" comment="apache2-mod_php5-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133655" comment="php5-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133656" comment="php5-bcmath-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133657" comment="php5-bz2-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133658" comment="php5-calendar-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133659" comment="php5-ctype-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133660" comment="php5-curl-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133661" comment="php5-dba-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133662" comment="php5-devel-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133663" comment="php5-dom-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133664" comment="php5-enchant-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133665" comment="php5-exif-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133666" comment="php5-fastcgi-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133667" comment="php5-fileinfo-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133668" comment="php5-firebird-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133669" comment="php5-fpm-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133670" comment="php5-ftp-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133671" comment="php5-gd-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133672" comment="php5-gettext-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133673" comment="php5-gmp-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133674" comment="php5-iconv-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133675" comment="php5-imap-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133676" comment="php5-intl-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133677" comment="php5-json-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133678" comment="php5-ldap-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133679" comment="php5-mbstring-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133680" comment="php5-mcrypt-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133681" comment="php5-mssql-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133682" comment="php5-mysql-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133683" comment="php5-odbc-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133684" comment="php5-opcache-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133685" comment="php5-openssl-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133686" comment="php5-pcntl-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133687" comment="php5-pdo-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133688" comment="php5-pear-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133689" comment="php5-pgsql-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133690" comment="php5-phar-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133691" comment="php5-posix-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133692" comment="php5-pspell-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133693" comment="php5-readline-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133694" comment="php5-shmop-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133695" comment="php5-snmp-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133696" comment="php5-soap-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133697" comment="php5-sockets-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133698" comment="php5-sqlite-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133699" comment="php5-suhosin-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133700" comment="php5-sysvmsg-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133701" comment="php5-sysvsem-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133702" comment="php5-sysvshm-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133703" comment="php5-tidy-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133704" comment="php5-tokenizer-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133705" comment="php5-wddx-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133706" comment="php5-xmlreader-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133707" comment="php5-xmlrpc-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133708" comment="php5-xmlwriter-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133709" comment="php5-xsl-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133710" comment="php5-zip-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133711" comment="php5-zlib-5.6.1-78.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7418</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7418" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7418" source="CVE"/>
    <description>
    The php_wddx_push_element function in ext/wddx/wddx.c in PHP before 5.6.26 and 7.x before 7.0.11 allows remote attackers to cause a denial of service (invalid pointer access and out-of-bounds read) or possibly have unspecified other impact via an incorrect boolean element in a wddxPacket XML document, leading to mishandling in a wddx_deserialize call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133654" comment="apache2-mod_php5-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133655" comment="php5-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133656" comment="php5-bcmath-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133657" comment="php5-bz2-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133658" comment="php5-calendar-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133659" comment="php5-ctype-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133660" comment="php5-curl-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133661" comment="php5-dba-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133662" comment="php5-devel-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133663" comment="php5-dom-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133664" comment="php5-enchant-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133665" comment="php5-exif-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133666" comment="php5-fastcgi-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133667" comment="php5-fileinfo-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133668" comment="php5-firebird-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133669" comment="php5-fpm-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133670" comment="php5-ftp-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133671" comment="php5-gd-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133672" comment="php5-gettext-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133673" comment="php5-gmp-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133674" comment="php5-iconv-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133675" comment="php5-imap-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133676" comment="php5-intl-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133677" comment="php5-json-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133678" comment="php5-ldap-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133679" comment="php5-mbstring-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133680" comment="php5-mcrypt-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133681" comment="php5-mssql-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133682" comment="php5-mysql-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133683" comment="php5-odbc-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133684" comment="php5-opcache-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133685" comment="php5-openssl-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133686" comment="php5-pcntl-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133687" comment="php5-pdo-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133688" comment="php5-pear-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133689" comment="php5-pgsql-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133690" comment="php5-phar-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133691" comment="php5-posix-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133692" comment="php5-pspell-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133693" comment="php5-readline-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133694" comment="php5-shmop-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133695" comment="php5-snmp-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133696" comment="php5-soap-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133697" comment="php5-sockets-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133698" comment="php5-sqlite-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133699" comment="php5-suhosin-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133700" comment="php5-sysvmsg-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133701" comment="php5-sysvsem-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133702" comment="php5-sysvshm-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133703" comment="php5-tidy-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133704" comment="php5-tokenizer-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133705" comment="php5-wddx-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133706" comment="php5-xmlreader-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133707" comment="php5-xmlrpc-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133708" comment="php5-xmlwriter-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133709" comment="php5-xsl-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133710" comment="php5-zip-5.6.1-78.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133711" comment="php5-zlib-5.6.1-78.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7425</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7425" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7425" source="CVE"/>
    <description>
    The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133865" comment="bbswitch-0.8-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133866" comment="bbswitch-kmp-default-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133867" comment="bbswitch-kmp-desktop-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133868" comment="bbswitch-kmp-pae-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133869" comment="bbswitch-kmp-xen-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133870" comment="cloop-2.639-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133871" comment="cloop-kmp-default-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133872" comment="cloop-kmp-desktop-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133873" comment="cloop-kmp-pae-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133874" comment="cloop-kmp-xen-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133875" comment="crash-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133876" comment="crash-devel-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133877" comment="crash-doc-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133878" comment="crash-eppic-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133879" comment="crash-gcore-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133880" comment="crash-kmp-default-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133881" comment="crash-kmp-desktop-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133882" comment="crash-kmp-pae-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133883" comment="crash-kmp-xen-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133884" comment="hdjmod-1.28-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133885" comment="hdjmod-kmp-default-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133886" comment="hdjmod-kmp-desktop-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133887" comment="hdjmod-kmp-pae-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133888" comment="hdjmod-kmp-xen-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133889" comment="ipset-6.23-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133890" comment="ipset-devel-6.23-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133891" comment="ipset-kmp-default-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133892" comment="ipset-kmp-desktop-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133893" comment="ipset-kmp-pae-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133894" comment="ipset-kmp-xen-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133895" comment="kernel-debug-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133896" comment="kernel-debug-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133897" comment="kernel-debug-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133898" comment="kernel-default-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133899" comment="kernel-default-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133900" comment="kernel-default-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133901" comment="kernel-desktop-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133902" comment="kernel-desktop-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133903" comment="kernel-desktop-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133904" comment="kernel-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133905" comment="kernel-docs-3.16.7-45.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133906" comment="kernel-ec2-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133907" comment="kernel-ec2-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133908" comment="kernel-ec2-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133909" comment="kernel-macros-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133910" comment="kernel-obs-build-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133911" comment="kernel-obs-qa-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133912" comment="kernel-obs-qa-xen-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133913" comment="kernel-pae-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133914" comment="kernel-pae-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133915" comment="kernel-pae-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133916" comment="kernel-source-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133917" comment="kernel-source-vanilla-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133918" comment="kernel-syms-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133919" comment="kernel-vanilla-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133920" comment="kernel-vanilla-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133921" comment="kernel-xen-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133922" comment="kernel-xen-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133923" comment="kernel-xen-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133924" comment="libipset3-6.23-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133925" comment="pcfclock-0.44-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133926" comment="pcfclock-kmp-default-0.44_k3.16.7_45-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133927" comment="pcfclock-kmp-desktop-0.44_k3.16.7_45-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133928" comment="pcfclock-kmp-pae-0.44_k3.16.7_45-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133929" comment="python-virtualbox-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133930" comment="vhba-kmp-20140629-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133931" comment="vhba-kmp-default-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133932" comment="vhba-kmp-desktop-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133933" comment="vhba-kmp-pae-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133934" comment="vhba-kmp-xen-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133935" comment="virtualbox-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133936" comment="virtualbox-devel-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133937" comment="virtualbox-guest-desktop-icons-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133938" comment="virtualbox-guest-kmp-default-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133939" comment="virtualbox-guest-kmp-desktop-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133940" comment="virtualbox-guest-kmp-pae-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133941" comment="virtualbox-guest-tools-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133942" comment="virtualbox-guest-x11-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133943" comment="virtualbox-host-kmp-default-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133944" comment="virtualbox-host-kmp-desktop-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133945" comment="virtualbox-host-kmp-pae-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133946" comment="virtualbox-host-source-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133947" comment="virtualbox-qt-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133948" comment="virtualbox-websrv-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133949" comment="xen-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133950" comment="xen-devel-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133951" comment="xen-doc-html-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133952" comment="xen-kmp-default-4.4.4_05_k3.16.7_45-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133953" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_45-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133954" comment="xen-libs-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133955" comment="xen-libs-32bit-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133956" comment="xen-tools-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133957" comment="xen-tools-domU-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133958" comment="xtables-addons-2.6-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133959" comment="xtables-addons-kmp-default-2.6_k3.16.7_45-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133960" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_45-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133961" comment="xtables-addons-kmp-pae-2.6_k3.16.7_45-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133962" comment="xtables-addons-kmp-xen-2.6_k3.16.7_45-24.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7440</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7440" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7440" source="CVE"/>
    <description>
    The C software implementation of AES Encryption and Decryption in wolfSSL (formerly CyaSSL) before 3.9.10 makes it easier for local users to discover AES keys by leveraging cache-bank timing differences.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135453" comment="libmysql56client18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135454" comment="libmysql56client18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135455" comment="libmysql56client_r18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135456" comment="libmysql56client_r18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135457" comment="mysql-community-server-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135458" comment="mysql-community-server-bench-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135459" comment="mysql-community-server-client-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135460" comment="mysql-community-server-errormessages-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135461" comment="mysql-community-server-test-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135462" comment="mysql-community-server-tools-5.6.34-2.23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7445</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7445" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7445" source="CVE"/>
    <description>
    convert.c in OpenJPEG before 2.1.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors involving the variable s.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009147259" comment="libopenjp2-7-2.1.0-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147260" comment="openjpeg2-2.1.0-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147261" comment="openjpeg2-devel-2.1.0-2.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7446</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7446" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7446" source="CVE"/>
    <description>
    Buffer overflow in the MVG and SVG rendering code in GraphicsMagick 1.3.24 allows remote attackers to have unspecified impact via unknown vectors. Note: This vulnerability exists due to an incomplete patch for CVE-2016-2317.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133963" comment="GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133964" comment="GraphicsMagick-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133965" comment="libGraphicsMagick++-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133966" comment="libGraphicsMagick++-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133967" comment="libGraphicsMagick-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133968" comment="libGraphicsMagick3-config-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133969" comment="libGraphicsMagickWand-Q16-2-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133970" comment="perl-GraphicsMagick-1.3.20-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7447</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7447" source="CVE"/>
    <description>
    Heap-based buffer overflow in the EscapeParenthesis function in GraphicsMagick before 1.3.25 allows remote attackers to have unspecified impact via unknown vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133963" comment="GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133964" comment="GraphicsMagick-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133965" comment="libGraphicsMagick++-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133966" comment="libGraphicsMagick++-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133967" comment="libGraphicsMagick-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133968" comment="libGraphicsMagick3-config-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133969" comment="libGraphicsMagickWand-Q16-2-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133970" comment="perl-GraphicsMagick-1.3.20-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7448</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7448" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7448" source="CVE"/>
    <description>
    The Utah RLE reader in GraphicsMagick before 1.3.25 allows remote attackers to cause a denial of service (CPU consumption or large memory allocations) via vectors involving the header information and the file size.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133963" comment="GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133964" comment="GraphicsMagick-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133965" comment="libGraphicsMagick++-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133966" comment="libGraphicsMagick++-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133967" comment="libGraphicsMagick-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133968" comment="libGraphicsMagick3-config-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133969" comment="libGraphicsMagickWand-Q16-2-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133970" comment="perl-GraphicsMagick-1.3.20-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7449</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7449" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7449" source="CVE"/>
    <description>
    The TIFFGetField function in coders/tiff.c in GraphicsMagick 1.3.24 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a file containing an "unterminated" string.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133963" comment="GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133964" comment="GraphicsMagick-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133965" comment="libGraphicsMagick++-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133966" comment="libGraphicsMagick++-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133967" comment="libGraphicsMagick-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133968" comment="libGraphicsMagick3-config-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133969" comment="libGraphicsMagickWand-Q16-2-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133970" comment="perl-GraphicsMagick-1.3.20-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7513</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7513" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7513" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133990" comment="ImageMagick-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133991" comment="ImageMagick-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133992" comment="ImageMagick-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133993" comment="ImageMagick-doc-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133994" comment="ImageMagick-extra-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133995" comment="libMagick++-6_Q16-5-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133996" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133997" comment="libMagick++-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133998" comment="libMagick++-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133999" comment="libMagickCore-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134000" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134001" comment="libMagickWand-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134002" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134003" comment="perl-PerlMagick-6.8.9.8-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7514</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7514" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7514" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133990" comment="ImageMagick-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133991" comment="ImageMagick-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133992" comment="ImageMagick-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133993" comment="ImageMagick-doc-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133994" comment="ImageMagick-extra-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133995" comment="libMagick++-6_Q16-5-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133996" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133997" comment="libMagick++-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133998" comment="libMagick++-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133999" comment="libMagickCore-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134000" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134001" comment="libMagickWand-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134002" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134003" comment="perl-PerlMagick-6.8.9.8-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7515</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7515" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7515" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133963" comment="GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133964" comment="GraphicsMagick-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133990" comment="ImageMagick-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133991" comment="ImageMagick-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133992" comment="ImageMagick-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133993" comment="ImageMagick-doc-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133994" comment="ImageMagick-extra-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133965" comment="libGraphicsMagick++-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133966" comment="libGraphicsMagick++-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133967" comment="libGraphicsMagick-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133968" comment="libGraphicsMagick3-config-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133969" comment="libGraphicsMagickWand-Q16-2-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133995" comment="libMagick++-6_Q16-5-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133996" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133997" comment="libMagick++-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133998" comment="libMagick++-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133999" comment="libMagickCore-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134000" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134001" comment="libMagickWand-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134002" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133970" comment="perl-GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134003" comment="perl-PerlMagick-6.8.9.8-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7516</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7516" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7516" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133963" comment="GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133964" comment="GraphicsMagick-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133990" comment="ImageMagick-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133991" comment="ImageMagick-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133992" comment="ImageMagick-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133993" comment="ImageMagick-doc-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133994" comment="ImageMagick-extra-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133965" comment="libGraphicsMagick++-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133966" comment="libGraphicsMagick++-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133967" comment="libGraphicsMagick-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133968" comment="libGraphicsMagick3-config-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133969" comment="libGraphicsMagickWand-Q16-2-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133995" comment="libMagick++-6_Q16-5-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133996" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133997" comment="libMagick++-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133998" comment="libMagick++-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133999" comment="libMagickCore-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134000" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134001" comment="libMagickWand-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134002" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133970" comment="perl-GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134003" comment="perl-PerlMagick-6.8.9.8-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7517</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7517" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7517" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133963" comment="GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133964" comment="GraphicsMagick-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133990" comment="ImageMagick-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133991" comment="ImageMagick-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133992" comment="ImageMagick-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133993" comment="ImageMagick-doc-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133994" comment="ImageMagick-extra-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133965" comment="libGraphicsMagick++-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133966" comment="libGraphicsMagick++-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133967" comment="libGraphicsMagick-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133968" comment="libGraphicsMagick3-config-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133969" comment="libGraphicsMagickWand-Q16-2-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133995" comment="libMagick++-6_Q16-5-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133996" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133997" comment="libMagick++-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133998" comment="libMagick++-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133999" comment="libMagickCore-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134000" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134001" comment="libMagickWand-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134002" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133970" comment="perl-GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134003" comment="perl-PerlMagick-6.8.9.8-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7518</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7518" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7518" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133990" comment="ImageMagick-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133991" comment="ImageMagick-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133992" comment="ImageMagick-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133993" comment="ImageMagick-doc-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133994" comment="ImageMagick-extra-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133995" comment="libMagick++-6_Q16-5-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133996" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133997" comment="libMagick++-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133998" comment="libMagick++-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133999" comment="libMagickCore-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134000" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134001" comment="libMagickWand-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134002" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134003" comment="perl-PerlMagick-6.8.9.8-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7519</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7519" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7519" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133963" comment="GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133964" comment="GraphicsMagick-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133990" comment="ImageMagick-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133991" comment="ImageMagick-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133992" comment="ImageMagick-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133993" comment="ImageMagick-doc-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133994" comment="ImageMagick-extra-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133965" comment="libGraphicsMagick++-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133966" comment="libGraphicsMagick++-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133967" comment="libGraphicsMagick-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133968" comment="libGraphicsMagick3-config-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133969" comment="libGraphicsMagickWand-Q16-2-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133995" comment="libMagick++-6_Q16-5-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133996" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133997" comment="libMagick++-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133998" comment="libMagick++-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133999" comment="libMagickCore-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134000" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134001" comment="libMagickWand-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134002" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133970" comment="perl-GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134003" comment="perl-PerlMagick-6.8.9.8-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7520</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7520" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7520" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133990" comment="ImageMagick-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133991" comment="ImageMagick-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133992" comment="ImageMagick-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133993" comment="ImageMagick-doc-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133994" comment="ImageMagick-extra-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133995" comment="libMagick++-6_Q16-5-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133996" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133997" comment="libMagick++-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133998" comment="libMagick++-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133999" comment="libMagickCore-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134000" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134001" comment="libMagickWand-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134002" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134003" comment="perl-PerlMagick-6.8.9.8-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7521</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7521" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7521" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133990" comment="ImageMagick-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133991" comment="ImageMagick-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133992" comment="ImageMagick-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133993" comment="ImageMagick-doc-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133994" comment="ImageMagick-extra-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133995" comment="libMagick++-6_Q16-5-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133996" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133997" comment="libMagick++-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133998" comment="libMagick++-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133999" comment="libMagickCore-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134000" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134001" comment="libMagickWand-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134002" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134003" comment="perl-PerlMagick-6.8.9.8-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7522</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7522" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7522" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133963" comment="GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133964" comment="GraphicsMagick-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133990" comment="ImageMagick-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133991" comment="ImageMagick-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133992" comment="ImageMagick-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133993" comment="ImageMagick-doc-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133994" comment="ImageMagick-extra-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133965" comment="libGraphicsMagick++-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133966" comment="libGraphicsMagick++-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133967" comment="libGraphicsMagick-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133968" comment="libGraphicsMagick3-config-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133969" comment="libGraphicsMagickWand-Q16-2-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133995" comment="libMagick++-6_Q16-5-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133996" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133997" comment="libMagick++-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133998" comment="libMagick++-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133999" comment="libMagickCore-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134000" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134001" comment="libMagickWand-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134002" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133970" comment="perl-GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134003" comment="perl-PerlMagick-6.8.9.8-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7523</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7523" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7523" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133990" comment="ImageMagick-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133991" comment="ImageMagick-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133992" comment="ImageMagick-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133993" comment="ImageMagick-doc-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133994" comment="ImageMagick-extra-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133995" comment="libMagick++-6_Q16-5-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133996" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133997" comment="libMagick++-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133998" comment="libMagick++-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133999" comment="libMagickCore-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134000" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134001" comment="libMagickWand-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134002" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134003" comment="perl-PerlMagick-6.8.9.8-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7524</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7524" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7524" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133963" comment="GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133964" comment="GraphicsMagick-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133990" comment="ImageMagick-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133991" comment="ImageMagick-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133992" comment="ImageMagick-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133993" comment="ImageMagick-doc-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133994" comment="ImageMagick-extra-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133965" comment="libGraphicsMagick++-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133966" comment="libGraphicsMagick++-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133967" comment="libGraphicsMagick-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133968" comment="libGraphicsMagick3-config-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133969" comment="libGraphicsMagickWand-Q16-2-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133995" comment="libMagick++-6_Q16-5-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133996" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133997" comment="libMagick++-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133998" comment="libMagick++-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133999" comment="libMagickCore-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134000" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134001" comment="libMagickWand-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134002" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133970" comment="perl-GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134003" comment="perl-PerlMagick-6.8.9.8-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7525</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7525" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7525" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133990" comment="ImageMagick-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133991" comment="ImageMagick-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133992" comment="ImageMagick-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133993" comment="ImageMagick-doc-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133994" comment="ImageMagick-extra-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133995" comment="libMagick++-6_Q16-5-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133996" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133997" comment="libMagick++-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133998" comment="libMagick++-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133999" comment="libMagickCore-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134000" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134001" comment="libMagickWand-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134002" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134003" comment="perl-PerlMagick-6.8.9.8-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7526</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7526" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7526" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133963" comment="GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133964" comment="GraphicsMagick-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133965" comment="libGraphicsMagick++-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133966" comment="libGraphicsMagick++-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133967" comment="libGraphicsMagick-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133968" comment="libGraphicsMagick3-config-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133969" comment="libGraphicsMagickWand-Q16-2-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133970" comment="perl-GraphicsMagick-1.3.20-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7527</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7527" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7527" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133963" comment="GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133964" comment="GraphicsMagick-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133990" comment="ImageMagick-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133991" comment="ImageMagick-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133992" comment="ImageMagick-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133993" comment="ImageMagick-doc-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133994" comment="ImageMagick-extra-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133965" comment="libGraphicsMagick++-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133966" comment="libGraphicsMagick++-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133967" comment="libGraphicsMagick-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133968" comment="libGraphicsMagick3-config-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133969" comment="libGraphicsMagickWand-Q16-2-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133995" comment="libMagick++-6_Q16-5-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133996" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133997" comment="libMagick++-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133998" comment="libMagick++-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133999" comment="libMagickCore-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134000" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134001" comment="libMagickWand-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134002" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133970" comment="perl-GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134003" comment="perl-PerlMagick-6.8.9.8-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7528</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7528" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7528" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133963" comment="GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133964" comment="GraphicsMagick-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133990" comment="ImageMagick-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133991" comment="ImageMagick-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133992" comment="ImageMagick-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133993" comment="ImageMagick-doc-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133994" comment="ImageMagick-extra-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133965" comment="libGraphicsMagick++-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133966" comment="libGraphicsMagick++-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133967" comment="libGraphicsMagick-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133968" comment="libGraphicsMagick3-config-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133969" comment="libGraphicsMagickWand-Q16-2-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133995" comment="libMagick++-6_Q16-5-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133996" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133997" comment="libMagick++-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133998" comment="libMagick++-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133999" comment="libMagickCore-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134000" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134001" comment="libMagickWand-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134002" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133970" comment="perl-GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134003" comment="perl-PerlMagick-6.8.9.8-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7529</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7529" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7529" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133963" comment="GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133964" comment="GraphicsMagick-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133990" comment="ImageMagick-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133991" comment="ImageMagick-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133992" comment="ImageMagick-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133993" comment="ImageMagick-doc-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133994" comment="ImageMagick-extra-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133965" comment="libGraphicsMagick++-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133966" comment="libGraphicsMagick++-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133967" comment="libGraphicsMagick-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133968" comment="libGraphicsMagick3-config-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133969" comment="libGraphicsMagickWand-Q16-2-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133995" comment="libMagick++-6_Q16-5-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133996" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133997" comment="libMagick++-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133998" comment="libMagick++-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133999" comment="libMagickCore-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134000" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134001" comment="libMagickWand-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134002" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133970" comment="perl-GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134003" comment="perl-PerlMagick-6.8.9.8-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7530</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7530" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7530" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133990" comment="ImageMagick-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133991" comment="ImageMagick-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133992" comment="ImageMagick-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133993" comment="ImageMagick-doc-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133994" comment="ImageMagick-extra-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133995" comment="libMagick++-6_Q16-5-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133996" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133997" comment="libMagick++-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133998" comment="libMagick++-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133999" comment="libMagickCore-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134000" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134001" comment="libMagickWand-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134002" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134003" comment="perl-PerlMagick-6.8.9.8-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7531</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7531" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7531" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133963" comment="GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133964" comment="GraphicsMagick-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133990" comment="ImageMagick-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133991" comment="ImageMagick-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133992" comment="ImageMagick-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133993" comment="ImageMagick-doc-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133994" comment="ImageMagick-extra-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133965" comment="libGraphicsMagick++-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133966" comment="libGraphicsMagick++-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133967" comment="libGraphicsMagick-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133968" comment="libGraphicsMagick3-config-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133969" comment="libGraphicsMagickWand-Q16-2-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133995" comment="libMagick++-6_Q16-5-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133996" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133997" comment="libMagick++-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133998" comment="libMagick++-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133999" comment="libMagickCore-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134000" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134001" comment="libMagickWand-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134002" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133970" comment="perl-GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134003" comment="perl-PerlMagick-6.8.9.8-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7532</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7532" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7532" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133990" comment="ImageMagick-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133991" comment="ImageMagick-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133992" comment="ImageMagick-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133993" comment="ImageMagick-doc-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133994" comment="ImageMagick-extra-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133995" comment="libMagick++-6_Q16-5-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133996" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133997" comment="libMagick++-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133998" comment="libMagick++-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133999" comment="libMagickCore-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134000" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134001" comment="libMagickWand-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134002" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134003" comment="perl-PerlMagick-6.8.9.8-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7533</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7533" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7533" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133963" comment="GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133964" comment="GraphicsMagick-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133990" comment="ImageMagick-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133991" comment="ImageMagick-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133992" comment="ImageMagick-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133993" comment="ImageMagick-doc-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133994" comment="ImageMagick-extra-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133965" comment="libGraphicsMagick++-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133966" comment="libGraphicsMagick++-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133967" comment="libGraphicsMagick-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133968" comment="libGraphicsMagick3-config-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133969" comment="libGraphicsMagickWand-Q16-2-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133995" comment="libMagick++-6_Q16-5-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133996" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133997" comment="libMagick++-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133998" comment="libMagick++-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133999" comment="libMagickCore-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134000" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134001" comment="libMagickWand-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134002" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133970" comment="perl-GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134003" comment="perl-PerlMagick-6.8.9.8-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7534</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7534" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7534" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133990" comment="ImageMagick-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133991" comment="ImageMagick-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133992" comment="ImageMagick-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133993" comment="ImageMagick-doc-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133994" comment="ImageMagick-extra-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133995" comment="libMagick++-6_Q16-5-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133996" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133997" comment="libMagick++-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133998" comment="libMagick++-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133999" comment="libMagickCore-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134000" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134001" comment="libMagickWand-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134002" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134003" comment="perl-PerlMagick-6.8.9.8-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7535</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7535" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7535" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133990" comment="ImageMagick-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133991" comment="ImageMagick-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133992" comment="ImageMagick-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133993" comment="ImageMagick-doc-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133994" comment="ImageMagick-extra-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133995" comment="libMagick++-6_Q16-5-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133996" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133997" comment="libMagick++-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133998" comment="libMagick++-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133999" comment="libMagickCore-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134000" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134001" comment="libMagickWand-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134002" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134003" comment="perl-PerlMagick-6.8.9.8-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7536</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7536" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7536" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133990" comment="ImageMagick-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133991" comment="ImageMagick-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133992" comment="ImageMagick-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133993" comment="ImageMagick-doc-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133994" comment="ImageMagick-extra-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133995" comment="libMagick++-6_Q16-5-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133996" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133997" comment="libMagick++-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133998" comment="libMagick++-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133999" comment="libMagickCore-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134000" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134001" comment="libMagickWand-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134002" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134003" comment="perl-PerlMagick-6.8.9.8-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7537</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7537" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7537" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133963" comment="GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133964" comment="GraphicsMagick-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133990" comment="ImageMagick-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133991" comment="ImageMagick-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133992" comment="ImageMagick-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133993" comment="ImageMagick-doc-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133994" comment="ImageMagick-extra-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133965" comment="libGraphicsMagick++-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133966" comment="libGraphicsMagick++-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133967" comment="libGraphicsMagick-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133968" comment="libGraphicsMagick3-config-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133969" comment="libGraphicsMagickWand-Q16-2-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133995" comment="libMagick++-6_Q16-5-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133996" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133997" comment="libMagick++-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133998" comment="libMagick++-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133999" comment="libMagickCore-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134000" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134001" comment="libMagickWand-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134002" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133970" comment="perl-GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134003" comment="perl-PerlMagick-6.8.9.8-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7538</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7538" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7538" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133990" comment="ImageMagick-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133991" comment="ImageMagick-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133992" comment="ImageMagick-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133993" comment="ImageMagick-doc-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133994" comment="ImageMagick-extra-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133995" comment="libMagick++-6_Q16-5-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133996" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133997" comment="libMagick++-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133998" comment="libMagick++-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133999" comment="libMagickCore-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134000" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134001" comment="libMagickWand-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134002" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134003" comment="perl-PerlMagick-6.8.9.8-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7539</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7539" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7539" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133990" comment="ImageMagick-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133991" comment="ImageMagick-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133992" comment="ImageMagick-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133993" comment="ImageMagick-doc-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133994" comment="ImageMagick-extra-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133995" comment="libMagick++-6_Q16-5-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133996" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133997" comment="libMagick++-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133998" comment="libMagick++-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133999" comment="libMagickCore-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134000" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134001" comment="libMagickWand-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134002" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134003" comment="perl-PerlMagick-6.8.9.8-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7540</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7540" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7540" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133990" comment="ImageMagick-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133991" comment="ImageMagick-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133992" comment="ImageMagick-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133993" comment="ImageMagick-doc-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133994" comment="ImageMagick-extra-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133995" comment="libMagick++-6_Q16-5-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133996" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133997" comment="libMagick++-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133998" comment="libMagick++-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133999" comment="libMagickCore-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134000" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134001" comment="libMagickWand-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134002" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134003" comment="perl-PerlMagick-6.8.9.8-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7543</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7543" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7543" source="CVE"/>
    <description>
    Bash before 4.4 allows local users to execute arbitrary commands with root privileges via crafted SHELLOPTS and PS4 environment variables.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135243" comment="bash-4.2-75.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135244" comment="bash-devel-4.2-75.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135245" comment="bash-doc-4.2-75.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135246" comment="bash-lang-4.2-75.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135247" comment="bash-loadables-4.2-75.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135248" comment="libreadline6-6.2-75.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135249" comment="libreadline6-32bit-6.2-75.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135250" comment="readline-devel-6.2-75.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135251" comment="readline-devel-32bit-6.2-75.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135252" comment="readline-doc-6.2-75.5.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7553</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7553" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7553" source="CVE"/>
    <description>
    The buf.pl script before 2.20 in Irssi before 0.8.20 uses weak permissions for the scrollbuffer dump file created between upgrades, which might allow local users to obtain sensitive information from private chat conversations by reading the file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134241" comment="irssi-0.8.20-3.4.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134242" comment="irssi-devel-0.8.20-3.4.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7568</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7568" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7568" source="CVE"/>
    <description>
    Integer overflow in the gdImageWebpCtx function in gd_webp.c in the GD Graphics Library (aka libgd) through 2.2.3, as used in PHP through 7.0.11, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted imagewebp and imagedestroy calls.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133790" comment="apache2-mod_php5-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133786" comment="gd-2.1.0-7.19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133787" comment="gd-devel-2.1.0-7.19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133788" comment="libgd3-2.1.0-7.19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133789" comment="libgd3-32bit-2.1.0-7.19.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133791" comment="php5-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133792" comment="php5-bcmath-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133793" comment="php5-bz2-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133794" comment="php5-calendar-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133795" comment="php5-ctype-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133796" comment="php5-curl-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133797" comment="php5-dba-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133798" comment="php5-devel-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133799" comment="php5-dom-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133800" comment="php5-enchant-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133801" comment="php5-exif-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133802" comment="php5-fastcgi-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133803" comment="php5-fileinfo-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133804" comment="php5-firebird-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133805" comment="php5-fpm-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133806" comment="php5-ftp-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133807" comment="php5-gd-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133808" comment="php5-gettext-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133809" comment="php5-gmp-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133810" comment="php5-iconv-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133811" comment="php5-imap-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133812" comment="php5-intl-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133813" comment="php5-json-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133814" comment="php5-ldap-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133815" comment="php5-mbstring-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133816" comment="php5-mcrypt-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133817" comment="php5-mssql-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133818" comment="php5-mysql-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133819" comment="php5-odbc-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133820" comment="php5-opcache-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133821" comment="php5-openssl-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133822" comment="php5-pcntl-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133823" comment="php5-pdo-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133824" comment="php5-pear-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133825" comment="php5-pgsql-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133826" comment="php5-phar-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133827" comment="php5-posix-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133828" comment="php5-pspell-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133829" comment="php5-readline-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133830" comment="php5-shmop-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133831" comment="php5-snmp-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133832" comment="php5-soap-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133833" comment="php5-sockets-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133834" comment="php5-sqlite-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133835" comment="php5-suhosin-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133836" comment="php5-sysvmsg-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133837" comment="php5-sysvsem-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133838" comment="php5-sysvshm-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133839" comment="php5-tidy-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133840" comment="php5-tokenizer-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133841" comment="php5-wddx-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133842" comment="php5-xmlreader-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133843" comment="php5-xmlrpc-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133844" comment="php5-xmlwriter-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133845" comment="php5-xsl-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133846" comment="php5-zip-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133847" comment="php5-zlib-5.6.1-83.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7777</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7777" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7777" source="CVE"/>
    <description>
    Xen 4.7.x and earlier does not properly honor CR0.TS and CR0.EM, which allows local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009146189" comment="xen-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146190" comment="xen-devel-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146191" comment="xen-doc-html-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146192" comment="xen-kmp-default-4.4.4_06_k3.16.7_53-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146193" comment="xen-kmp-desktop-4.4.4_06_k3.16.7_53-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146194" comment="xen-libs-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146195" comment="xen-libs-32bit-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146196" comment="xen-tools-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146197" comment="xen-tools-domU-4.4.4_06-58.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7787</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7787" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7787" source="CVE"/>
    <description>
    A maliciously crafted command line for kdesu can result in the user only seeing part of the commands that will actually get executed as super user.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134246" comment="kde-cli-tools5-5.3.2-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134247" comment="kde-cli-tools5-lang-5.3.2-27.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7796</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7796" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7796" source="CVE"/>
    <description>
    The manager_dispatch_notify_fd function in systemd allows local users to cause a denial of service (system hang) via a zero-length message received over a notify socket, which causes an error to be returned and the notification handler to be disabled.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133739" comment="libgudev-1_0-0-210.1475218254.1e76ce0-25.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133740" comment="libgudev-1_0-0-32bit-210.1475218254.1e76ce0-25.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133741" comment="libgudev-1_0-devel-210.1475218254.1e76ce0-25.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133742" comment="libudev-devel-210.1475218254.1e76ce0-25.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133743" comment="libudev-mini-devel-210.1475218254.1e76ce0-25.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133744" comment="libudev-mini1-210.1475218254.1e76ce0-25.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133745" comment="libudev1-210.1475218254.1e76ce0-25.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133746" comment="libudev1-32bit-210.1475218254.1e76ce0-25.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133747" comment="nss-myhostname-210.1475218254.1e76ce0-25.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133748" comment="nss-myhostname-32bit-210.1475218254.1e76ce0-25.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133749" comment="systemd-210.1475218254.1e76ce0-25.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133750" comment="systemd-32bit-210.1475218254.1e76ce0-25.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133751" comment="systemd-bash-completion-210.1475218254.1e76ce0-25.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133752" comment="systemd-devel-210.1475218254.1e76ce0-25.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133753" comment="systemd-journal-gateway-210.1475218254.1e76ce0-25.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133754" comment="systemd-logger-210.1475218254.1e76ce0-25.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133755" comment="systemd-mini-210.1475218254.1e76ce0-25.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133756" comment="systemd-mini-devel-210.1475218254.1e76ce0-25.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133757" comment="systemd-mini-sysvinit-210.1475218254.1e76ce0-25.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133758" comment="systemd-sysvinit-210.1475218254.1e76ce0-25.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133759" comment="typelib-1_0-GUdev-1_0-210.1475218254.1e76ce0-25.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133760" comment="udev-210.1475218254.1e76ce0-25.48.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133761" comment="udev-mini-210.1475218254.1e76ce0-25.48.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7799</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7799" source="CVE"/>
    <description>
    MagickCore/profile.c in ImageMagick before 7.0.3-2 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133990" comment="ImageMagick-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133991" comment="ImageMagick-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133992" comment="ImageMagick-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133993" comment="ImageMagick-doc-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133994" comment="ImageMagick-extra-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133995" comment="libMagick++-6_Q16-5-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133996" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133997" comment="libMagick++-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133998" comment="libMagick++-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133999" comment="libMagickCore-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134000" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134001" comment="libMagickWand-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134002" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134003" comment="perl-PerlMagick-6.8.9.8-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7800</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7800" source="CVE"/>
    <description>
    Integer underflow in the parse8BIM function in coders/meta.c in GraphicsMagick 1.3.25 and earlier allows remote attackers to cause a denial of service (application crash) via a crafted 8BIM chunk, which triggers a heap-based buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133963" comment="GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133964" comment="GraphicsMagick-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133990" comment="ImageMagick-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133991" comment="ImageMagick-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133992" comment="ImageMagick-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133993" comment="ImageMagick-doc-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133994" comment="ImageMagick-extra-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133965" comment="libGraphicsMagick++-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133966" comment="libGraphicsMagick++-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133967" comment="libGraphicsMagick-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133968" comment="libGraphicsMagick3-config-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133969" comment="libGraphicsMagickWand-Q16-2-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133995" comment="libMagick++-6_Q16-5-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133996" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133997" comment="libMagick++-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133998" comment="libMagick++-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133999" comment="libMagickCore-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134000" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134001" comment="libMagickWand-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134002" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133970" comment="perl-GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134003" comment="perl-PerlMagick-6.8.9.8-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7855</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-7855" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7855" source="CVE"/>
    <description>
    Use-after-free vulnerability in Adobe Flash Player before 23.0.0.205 on Windows and OS X and before 11.2.202.643 on Linux allows remote attackers to execute arbitrary code via unspecified vectors, as exploited in the wild in October 2016.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133987" comment="flash-player-11.2.202.643-2.115.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133988" comment="flash-player-gnome-11.2.202.643-2.115.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133989" comment="flash-player-kde4-11.2.202.643-2.115.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7857</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-7857" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7857" source="CVE"/>
    <description>
    Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135450" comment="flash-player-11.2.202.644-2.118.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135451" comment="flash-player-gnome-11.2.202.644-2.118.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135452" comment="flash-player-kde4-11.2.202.644-2.118.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7858</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-7858" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7858" source="CVE"/>
    <description>
    Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135450" comment="flash-player-11.2.202.644-2.118.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135451" comment="flash-player-gnome-11.2.202.644-2.118.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135452" comment="flash-player-kde4-11.2.202.644-2.118.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7859</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-7859" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7859" source="CVE"/>
    <description>
    Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135450" comment="flash-player-11.2.202.644-2.118.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135451" comment="flash-player-gnome-11.2.202.644-2.118.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135452" comment="flash-player-kde4-11.2.202.644-2.118.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7860</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-7860" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7860" source="CVE"/>
    <description>
    Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable type confusion vulnerability. Successful exploitation could lead to arbitrary code execution.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135450" comment="flash-player-11.2.202.644-2.118.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135451" comment="flash-player-gnome-11.2.202.644-2.118.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135452" comment="flash-player-kde4-11.2.202.644-2.118.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7861</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-7861" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7861" source="CVE"/>
    <description>
    Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable type confusion vulnerability. Successful exploitation could lead to arbitrary code execution.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135450" comment="flash-player-11.2.202.644-2.118.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135451" comment="flash-player-gnome-11.2.202.644-2.118.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135452" comment="flash-player-kde4-11.2.202.644-2.118.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7862</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-7862" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7862" source="CVE"/>
    <description>
    Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135450" comment="flash-player-11.2.202.644-2.118.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135451" comment="flash-player-gnome-11.2.202.644-2.118.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135452" comment="flash-player-kde4-11.2.202.644-2.118.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7863</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-7863" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7863" source="CVE"/>
    <description>
    Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135450" comment="flash-player-11.2.202.644-2.118.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135451" comment="flash-player-gnome-11.2.202.644-2.118.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135452" comment="flash-player-kde4-11.2.202.644-2.118.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7864</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-7864" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7864" source="CVE"/>
    <description>
    Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135450" comment="flash-player-11.2.202.644-2.118.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135451" comment="flash-player-gnome-11.2.202.644-2.118.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135452" comment="flash-player-kde4-11.2.202.644-2.118.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7865</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-7865" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7865" source="CVE"/>
    <description>
    Adobe Flash Player versions 23.0.0.205 and earlier, 11.2.202.643 and earlier have an exploitable type confusion vulnerability. Successful exploitation could lead to arbitrary code execution.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135450" comment="flash-player-11.2.202.644-2.118.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135451" comment="flash-player-gnome-11.2.202.644-2.118.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135452" comment="flash-player-kde4-11.2.202.644-2.118.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7867</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-7867" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7867" source="CVE"/>
    <description>
    Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable buffer overflow / underflow vulnerability in the RegExp class related to bookmarking in searches. Successful exploitation could lead to arbitrary code execution.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009143051" comment="flash-player-24.0.0.186-2.121.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143052" comment="flash-player-gnome-24.0.0.186-2.121.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143053" comment="flash-player-kde4-24.0.0.186-2.121.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7868</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-7868" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7868" source="CVE"/>
    <description>
    Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable buffer overflow / underflow vulnerability in the RegExp class related to alternation functionality. Successful exploitation could lead to arbitrary code execution.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009143051" comment="flash-player-24.0.0.186-2.121.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143052" comment="flash-player-gnome-24.0.0.186-2.121.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143053" comment="flash-player-kde4-24.0.0.186-2.121.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7869</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-7869" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7869" source="CVE"/>
    <description>
    Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable buffer overflow / underflow vulnerability in the RegExp class related to backtrack search functionality. Successful exploitation could lead to arbitrary code execution.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009143051" comment="flash-player-24.0.0.186-2.121.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143052" comment="flash-player-gnome-24.0.0.186-2.121.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143053" comment="flash-player-kde4-24.0.0.186-2.121.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7870</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-7870" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7870" source="CVE"/>
    <description>
    Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable buffer overflow / underflow vulnerability in the RegExp class for specific search strategies. Successful exploitation could lead to arbitrary code execution.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009143051" comment="flash-player-24.0.0.186-2.121.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143052" comment="flash-player-gnome-24.0.0.186-2.121.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143053" comment="flash-player-kde4-24.0.0.186-2.121.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7871</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-7871" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7871" source="CVE"/>
    <description>
    Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable memory corruption vulnerability in the Worker class. Successful exploitation could lead to arbitrary code execution.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009143051" comment="flash-player-24.0.0.186-2.121.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143052" comment="flash-player-gnome-24.0.0.186-2.121.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143053" comment="flash-player-kde4-24.0.0.186-2.121.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7872</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-7872" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7872" source="CVE"/>
    <description>
    Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable use after free vulnerability in the MovieClip class related to objects at multiple presentation levels. Successful exploitation could lead to arbitrary code execution.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009143051" comment="flash-player-24.0.0.186-2.121.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143052" comment="flash-player-gnome-24.0.0.186-2.121.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143053" comment="flash-player-kde4-24.0.0.186-2.121.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7873</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-7873" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7873" source="CVE"/>
    <description>
    Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable memory corruption vulnerability in the PSDK class related to ad policy functionality method. Successful exploitation could lead to arbitrary code execution.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009143051" comment="flash-player-24.0.0.186-2.121.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143052" comment="flash-player-gnome-24.0.0.186-2.121.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143053" comment="flash-player-kde4-24.0.0.186-2.121.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7874</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-7874" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7874" source="CVE"/>
    <description>
    Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable memory corruption vulnerability in the NetConnection class when handling the proxy types. Successful exploitation could lead to arbitrary code execution.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009143051" comment="flash-player-24.0.0.186-2.121.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143052" comment="flash-player-gnome-24.0.0.186-2.121.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143053" comment="flash-player-kde4-24.0.0.186-2.121.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7875</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-7875" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7875" source="CVE"/>
    <description>
    Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable integer overflow vulnerability in the BitmapData class. Successful exploitation could lead to arbitrary code execution.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009143051" comment="flash-player-24.0.0.186-2.121.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143052" comment="flash-player-gnome-24.0.0.186-2.121.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143053" comment="flash-player-kde4-24.0.0.186-2.121.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7876</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-7876" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7876" source="CVE"/>
    <description>
    Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable memory corruption vulnerability in the Clipboard class related to data handling functionality. Successful exploitation could lead to arbitrary code execution.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009143051" comment="flash-player-24.0.0.186-2.121.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143052" comment="flash-player-gnome-24.0.0.186-2.121.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143053" comment="flash-player-kde4-24.0.0.186-2.121.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7877</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-7877" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7877" source="CVE"/>
    <description>
    Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable use after free vulnerability in the Action Message Format serialization (AFM0). Successful exploitation could lead to arbitrary code execution.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009143051" comment="flash-player-24.0.0.186-2.121.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143052" comment="flash-player-gnome-24.0.0.186-2.121.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143053" comment="flash-player-kde4-24.0.0.186-2.121.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7878</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-7878" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7878" source="CVE"/>
    <description>
    Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable use after free vulnerability in the PSDK's MediaPlayer class. Successful exploitation could lead to arbitrary code execution.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009143051" comment="flash-player-24.0.0.186-2.121.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143052" comment="flash-player-gnome-24.0.0.186-2.121.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143053" comment="flash-player-kde4-24.0.0.186-2.121.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7879</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-7879" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7879" source="CVE"/>
    <description>
    Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable use after free vulnerability in the NetConnection class when handling an attached script object. Successful exploitation could lead to arbitrary code execution.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009143051" comment="flash-player-24.0.0.186-2.121.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143052" comment="flash-player-gnome-24.0.0.186-2.121.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143053" comment="flash-player-kde4-24.0.0.186-2.121.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7880</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-7880" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7880" source="CVE"/>
    <description>
    Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable use after free vulnerability when setting the length property of an array object. Successful exploitation could lead to arbitrary code execution.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009143051" comment="flash-player-24.0.0.186-2.121.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143052" comment="flash-player-gnome-24.0.0.186-2.121.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143053" comment="flash-player-kde4-24.0.0.186-2.121.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7881</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-7881" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7881" source="CVE"/>
    <description>
    Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable use after free vulnerability in the MovieClip class when handling conversion to an object. Successful exploitation could lead to arbitrary code execution.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009143051" comment="flash-player-24.0.0.186-2.121.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143052" comment="flash-player-gnome-24.0.0.186-2.121.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143053" comment="flash-player-kde4-24.0.0.186-2.121.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7890</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-7890" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7890" source="CVE"/>
    <description>
    Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have security bypass vulnerability in the implementation of the same origin policy.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009143051" comment="flash-player-24.0.0.186-2.121.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143052" comment="flash-player-gnome-24.0.0.186-2.121.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143053" comment="flash-player-kde4-24.0.0.186-2.121.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7892</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2016-7892" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7892" source="CVE"/>
    <description>
    Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable use after free vulnerability in the TextField class. Successful exploitation could lead to arbitrary code execution.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009143051" comment="flash-player-24.0.0.186-2.121.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143052" comment="flash-player-gnome-24.0.0.186-2.121.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143053" comment="flash-player-kde4-24.0.0.186-2.121.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7908</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7908" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7908" source="CVE"/>
    <description>
    The mcf_fec_do_tx function in hw/net/mcf_fec.c in QEMU (aka Quick Emulator) does not properly limit the buffer descriptor count when transmitting packets, which allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via vectors involving a buffer descriptor with a length of 0 and crafted values in bd.flags.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009146189" comment="xen-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146190" comment="xen-devel-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146191" comment="xen-doc-html-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146192" comment="xen-kmp-default-4.4.4_06_k3.16.7_53-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146193" comment="xen-kmp-desktop-4.4.4_06_k3.16.7_53-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146194" comment="xen-libs-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146195" comment="xen-libs-32bit-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146196" comment="xen-tools-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146197" comment="xen-tools-domU-4.4.4_06-58.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7909</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7909" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7909" source="CVE"/>
    <description>
    The pcnet_rdra_addr function in hw/net/pcnet.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by setting the (1) receive or (2) transmit descriptor ring length to 0.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009146189" comment="xen-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146190" comment="xen-devel-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146191" comment="xen-doc-html-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146192" comment="xen-kmp-default-4.4.4_06_k3.16.7_53-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146193" comment="xen-kmp-desktop-4.4.4_06_k3.16.7_53-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146194" comment="xen-libs-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146195" comment="xen-libs-32bit-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146196" comment="xen-tools-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146197" comment="xen-tools-domU-4.4.4_06-58.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7910</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7910" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7910" source="CVE"/>
    <description>
    Use-after-free vulnerability in the disk_seqf_stop function in block/genhd.c in the Linux kernel before 4.7.1 allows local users to gain privileges by leveraging the execution of a certain stop operation even if the corresponding start operation had failed.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137932" comment="bbswitch-0.8-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137933" comment="bbswitch-kmp-default-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137934" comment="bbswitch-kmp-desktop-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137935" comment="bbswitch-kmp-pae-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137936" comment="bbswitch-kmp-xen-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137937" comment="cloop-2.639-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137938" comment="cloop-kmp-default-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137939" comment="cloop-kmp-desktop-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137940" comment="cloop-kmp-pae-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137941" comment="cloop-kmp-xen-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137942" comment="crash-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137943" comment="crash-devel-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137944" comment="crash-doc-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137945" comment="crash-eppic-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137946" comment="crash-gcore-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137947" comment="crash-kmp-default-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137948" comment="crash-kmp-desktop-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137949" comment="crash-kmp-pae-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137950" comment="crash-kmp-xen-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137951" comment="hdjmod-1.28-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137952" comment="hdjmod-kmp-default-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137953" comment="hdjmod-kmp-desktop-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137954" comment="hdjmod-kmp-pae-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137955" comment="hdjmod-kmp-xen-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137956" comment="ipset-6.23-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137957" comment="ipset-devel-6.23-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137958" comment="ipset-kmp-default-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137959" comment="ipset-kmp-desktop-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137960" comment="ipset-kmp-pae-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137961" comment="ipset-kmp-xen-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137962" comment="kernel-debug-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137963" comment="kernel-debug-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137964" comment="kernel-debug-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137965" comment="kernel-default-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137966" comment="kernel-default-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137967" comment="kernel-default-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137968" comment="kernel-desktop-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137969" comment="kernel-desktop-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137970" comment="kernel-desktop-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137971" comment="kernel-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137972" comment="kernel-docs-3.16.7-53.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137973" comment="kernel-ec2-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137974" comment="kernel-ec2-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137975" comment="kernel-ec2-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137976" comment="kernel-macros-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137977" comment="kernel-obs-build-3.16.7-53.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137978" comment="kernel-obs-qa-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137979" comment="kernel-pae-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137980" comment="kernel-pae-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137981" comment="kernel-pae-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137982" comment="kernel-source-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137983" comment="kernel-source-vanilla-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137984" comment="kernel-syms-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137985" comment="kernel-vanilla-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137986" comment="kernel-vanilla-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137987" comment="kernel-xen-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137988" comment="kernel-xen-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137989" comment="kernel-xen-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137990" comment="libipset3-6.23-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137991" comment="pcfclock-0.44-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137992" comment="pcfclock-kmp-default-0.44_k3.16.7_53-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137993" comment="pcfclock-kmp-desktop-0.44_k3.16.7_53-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137994" comment="pcfclock-kmp-pae-0.44_k3.16.7_53-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137995" comment="python-virtualbox-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137996" comment="vhba-kmp-20140629-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137997" comment="vhba-kmp-default-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137998" comment="vhba-kmp-desktop-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137999" comment="vhba-kmp-pae-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138000" comment="vhba-kmp-xen-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138001" comment="virtualbox-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138002" comment="virtualbox-devel-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138003" comment="virtualbox-guest-desktop-icons-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138004" comment="virtualbox-guest-kmp-default-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138005" comment="virtualbox-guest-kmp-desktop-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138006" comment="virtualbox-guest-kmp-pae-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138007" comment="virtualbox-guest-tools-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138008" comment="virtualbox-guest-x11-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138009" comment="virtualbox-host-kmp-default-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138010" comment="virtualbox-host-kmp-desktop-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138011" comment="virtualbox-host-kmp-pae-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138012" comment="virtualbox-host-source-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138013" comment="virtualbox-qt-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138014" comment="virtualbox-websrv-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138015" comment="xen-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138016" comment="xen-devel-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138017" comment="xen-doc-html-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138018" comment="xen-kmp-default-4.4.4_05_k3.16.7_53-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138019" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_53-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138020" comment="xen-libs-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138021" comment="xen-libs-32bit-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138022" comment="xen-tools-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138023" comment="xen-tools-domU-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138024" comment="xtables-addons-2.6-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138025" comment="xtables-addons-kmp-default-2.6_k3.16.7_53-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138026" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_53-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138027" comment="xtables-addons-kmp-pae-2.6_k3.16.7_53-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138028" comment="xtables-addons-kmp-xen-2.6_k3.16.7_53-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7911</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7911" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7911" source="CVE"/>
    <description>
    Race condition in the get_task_ioprio function in block/ioprio.c in the Linux kernel before 4.6.6 allows local users to gain privileges or cause a denial of service (use-after-free) via a crafted ioprio_get system call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137932" comment="bbswitch-0.8-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137933" comment="bbswitch-kmp-default-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137934" comment="bbswitch-kmp-desktop-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137935" comment="bbswitch-kmp-pae-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137936" comment="bbswitch-kmp-xen-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137937" comment="cloop-2.639-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137938" comment="cloop-kmp-default-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137939" comment="cloop-kmp-desktop-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137940" comment="cloop-kmp-pae-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137941" comment="cloop-kmp-xen-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137942" comment="crash-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137943" comment="crash-devel-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137944" comment="crash-doc-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137945" comment="crash-eppic-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137946" comment="crash-gcore-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137947" comment="crash-kmp-default-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137948" comment="crash-kmp-desktop-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137949" comment="crash-kmp-pae-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137950" comment="crash-kmp-xen-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137951" comment="hdjmod-1.28-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137952" comment="hdjmod-kmp-default-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137953" comment="hdjmod-kmp-desktop-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137954" comment="hdjmod-kmp-pae-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137955" comment="hdjmod-kmp-xen-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137956" comment="ipset-6.23-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137957" comment="ipset-devel-6.23-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137958" comment="ipset-kmp-default-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137959" comment="ipset-kmp-desktop-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137960" comment="ipset-kmp-pae-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137961" comment="ipset-kmp-xen-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137962" comment="kernel-debug-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137963" comment="kernel-debug-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137964" comment="kernel-debug-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137965" comment="kernel-default-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137966" comment="kernel-default-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137967" comment="kernel-default-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137968" comment="kernel-desktop-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137969" comment="kernel-desktop-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137970" comment="kernel-desktop-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137971" comment="kernel-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137972" comment="kernel-docs-3.16.7-53.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137973" comment="kernel-ec2-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137974" comment="kernel-ec2-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137975" comment="kernel-ec2-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137976" comment="kernel-macros-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137977" comment="kernel-obs-build-3.16.7-53.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137978" comment="kernel-obs-qa-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137979" comment="kernel-pae-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137980" comment="kernel-pae-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137981" comment="kernel-pae-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137982" comment="kernel-source-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137983" comment="kernel-source-vanilla-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137984" comment="kernel-syms-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137985" comment="kernel-vanilla-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137986" comment="kernel-vanilla-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137987" comment="kernel-xen-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137988" comment="kernel-xen-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137989" comment="kernel-xen-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137990" comment="libipset3-6.23-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137991" comment="pcfclock-0.44-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137992" comment="pcfclock-kmp-default-0.44_k3.16.7_53-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137993" comment="pcfclock-kmp-desktop-0.44_k3.16.7_53-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137994" comment="pcfclock-kmp-pae-0.44_k3.16.7_53-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137995" comment="python-virtualbox-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137996" comment="vhba-kmp-20140629-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137997" comment="vhba-kmp-default-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137998" comment="vhba-kmp-desktop-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137999" comment="vhba-kmp-pae-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138000" comment="vhba-kmp-xen-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138001" comment="virtualbox-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138002" comment="virtualbox-devel-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138003" comment="virtualbox-guest-desktop-icons-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138004" comment="virtualbox-guest-kmp-default-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138005" comment="virtualbox-guest-kmp-desktop-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138006" comment="virtualbox-guest-kmp-pae-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138007" comment="virtualbox-guest-tools-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138008" comment="virtualbox-guest-x11-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138009" comment="virtualbox-host-kmp-default-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138010" comment="virtualbox-host-kmp-desktop-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138011" comment="virtualbox-host-kmp-pae-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138012" comment="virtualbox-host-source-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138013" comment="virtualbox-qt-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138014" comment="virtualbox-websrv-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138015" comment="xen-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138016" comment="xen-devel-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138017" comment="xen-doc-html-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138018" comment="xen-kmp-default-4.4.4_05_k3.16.7_53-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138019" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_53-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138020" comment="xen-libs-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138021" comment="xen-libs-32bit-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138022" comment="xen-tools-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138023" comment="xen-tools-domU-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138024" comment="xtables-addons-2.6-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138025" comment="xtables-addons-kmp-default-2.6_k3.16.7_53-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138026" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_53-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138027" comment="xtables-addons-kmp-pae-2.6_k3.16.7_53-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138028" comment="xtables-addons-kmp-xen-2.6_k3.16.7_53-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7913</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7913" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7913" source="CVE"/>
    <description>
    The xc2028_set_config function in drivers/media/tuners/tuner-xc2028.c in the Linux kernel before 4.6 allows local users to gain privileges or cause a denial of service (use-after-free) via vectors involving omission of the firmware name from a certain data structure.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137932" comment="bbswitch-0.8-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137933" comment="bbswitch-kmp-default-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137934" comment="bbswitch-kmp-desktop-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137935" comment="bbswitch-kmp-pae-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137936" comment="bbswitch-kmp-xen-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137937" comment="cloop-2.639-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137938" comment="cloop-kmp-default-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137939" comment="cloop-kmp-desktop-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137940" comment="cloop-kmp-pae-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137941" comment="cloop-kmp-xen-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137942" comment="crash-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137943" comment="crash-devel-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137944" comment="crash-doc-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137945" comment="crash-eppic-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137946" comment="crash-gcore-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137947" comment="crash-kmp-default-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137948" comment="crash-kmp-desktop-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137949" comment="crash-kmp-pae-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137950" comment="crash-kmp-xen-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137951" comment="hdjmod-1.28-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137952" comment="hdjmod-kmp-default-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137953" comment="hdjmod-kmp-desktop-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137954" comment="hdjmod-kmp-pae-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137955" comment="hdjmod-kmp-xen-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137956" comment="ipset-6.23-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137957" comment="ipset-devel-6.23-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137958" comment="ipset-kmp-default-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137959" comment="ipset-kmp-desktop-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137960" comment="ipset-kmp-pae-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137961" comment="ipset-kmp-xen-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137962" comment="kernel-debug-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137963" comment="kernel-debug-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137964" comment="kernel-debug-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137965" comment="kernel-default-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137966" comment="kernel-default-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137967" comment="kernel-default-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137968" comment="kernel-desktop-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137969" comment="kernel-desktop-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137970" comment="kernel-desktop-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137971" comment="kernel-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137972" comment="kernel-docs-3.16.7-53.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137973" comment="kernel-ec2-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137974" comment="kernel-ec2-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137975" comment="kernel-ec2-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137976" comment="kernel-macros-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137977" comment="kernel-obs-build-3.16.7-53.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137978" comment="kernel-obs-qa-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137979" comment="kernel-pae-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137980" comment="kernel-pae-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137981" comment="kernel-pae-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137982" comment="kernel-source-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137983" comment="kernel-source-vanilla-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137984" comment="kernel-syms-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137985" comment="kernel-vanilla-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137986" comment="kernel-vanilla-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137987" comment="kernel-xen-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137988" comment="kernel-xen-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137989" comment="kernel-xen-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137990" comment="libipset3-6.23-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137991" comment="pcfclock-0.44-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137992" comment="pcfclock-kmp-default-0.44_k3.16.7_53-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137993" comment="pcfclock-kmp-desktop-0.44_k3.16.7_53-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137994" comment="pcfclock-kmp-pae-0.44_k3.16.7_53-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137995" comment="python-virtualbox-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137996" comment="vhba-kmp-20140629-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137997" comment="vhba-kmp-default-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137998" comment="vhba-kmp-desktop-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137999" comment="vhba-kmp-pae-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138000" comment="vhba-kmp-xen-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138001" comment="virtualbox-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138002" comment="virtualbox-devel-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138003" comment="virtualbox-guest-desktop-icons-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138004" comment="virtualbox-guest-kmp-default-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138005" comment="virtualbox-guest-kmp-desktop-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138006" comment="virtualbox-guest-kmp-pae-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138007" comment="virtualbox-guest-tools-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138008" comment="virtualbox-guest-x11-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138009" comment="virtualbox-host-kmp-default-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138010" comment="virtualbox-host-kmp-desktop-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138011" comment="virtualbox-host-kmp-pae-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138012" comment="virtualbox-host-source-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138013" comment="virtualbox-qt-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138014" comment="virtualbox-websrv-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138015" comment="xen-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138016" comment="xen-devel-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138017" comment="xen-doc-html-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138018" comment="xen-kmp-default-4.4.4_05_k3.16.7_53-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138019" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_53-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138020" comment="xen-libs-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138021" comment="xen-libs-32bit-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138022" comment="xen-tools-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138023" comment="xen-tools-domU-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138024" comment="xtables-addons-2.6-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138025" comment="xtables-addons-kmp-default-2.6_k3.16.7_53-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138026" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_53-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138027" comment="xtables-addons-kmp-pae-2.6_k3.16.7_53-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138028" comment="xtables-addons-kmp-xen-2.6_k3.16.7_53-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7914</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7914" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7914" source="CVE"/>
    <description>
    The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel before 4.5.3 does not check whether a slot is a leaf, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and out-of-bounds read) via an application that uses associative-array data structures, as demonstrated by the keyutils test suite.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137932" comment="bbswitch-0.8-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137933" comment="bbswitch-kmp-default-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137934" comment="bbswitch-kmp-desktop-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137935" comment="bbswitch-kmp-pae-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137936" comment="bbswitch-kmp-xen-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137937" comment="cloop-2.639-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137938" comment="cloop-kmp-default-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137939" comment="cloop-kmp-desktop-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137940" comment="cloop-kmp-pae-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137941" comment="cloop-kmp-xen-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137942" comment="crash-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137943" comment="crash-devel-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137944" comment="crash-doc-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137945" comment="crash-eppic-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137946" comment="crash-gcore-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137947" comment="crash-kmp-default-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137948" comment="crash-kmp-desktop-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137949" comment="crash-kmp-pae-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137950" comment="crash-kmp-xen-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137951" comment="hdjmod-1.28-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137952" comment="hdjmod-kmp-default-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137953" comment="hdjmod-kmp-desktop-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137954" comment="hdjmod-kmp-pae-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137955" comment="hdjmod-kmp-xen-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137956" comment="ipset-6.23-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137957" comment="ipset-devel-6.23-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137958" comment="ipset-kmp-default-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137959" comment="ipset-kmp-desktop-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137960" comment="ipset-kmp-pae-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137961" comment="ipset-kmp-xen-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137962" comment="kernel-debug-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137963" comment="kernel-debug-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137964" comment="kernel-debug-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137965" comment="kernel-default-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137966" comment="kernel-default-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137967" comment="kernel-default-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137968" comment="kernel-desktop-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137969" comment="kernel-desktop-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137970" comment="kernel-desktop-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137971" comment="kernel-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137972" comment="kernel-docs-3.16.7-53.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137973" comment="kernel-ec2-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137974" comment="kernel-ec2-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137975" comment="kernel-ec2-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137976" comment="kernel-macros-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137977" comment="kernel-obs-build-3.16.7-53.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137978" comment="kernel-obs-qa-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137979" comment="kernel-pae-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137980" comment="kernel-pae-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137981" comment="kernel-pae-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137982" comment="kernel-source-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137983" comment="kernel-source-vanilla-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137984" comment="kernel-syms-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137985" comment="kernel-vanilla-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137986" comment="kernel-vanilla-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137987" comment="kernel-xen-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137988" comment="kernel-xen-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137989" comment="kernel-xen-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137990" comment="libipset3-6.23-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137991" comment="pcfclock-0.44-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137992" comment="pcfclock-kmp-default-0.44_k3.16.7_53-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137993" comment="pcfclock-kmp-desktop-0.44_k3.16.7_53-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137994" comment="pcfclock-kmp-pae-0.44_k3.16.7_53-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137995" comment="python-virtualbox-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137996" comment="vhba-kmp-20140629-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137997" comment="vhba-kmp-default-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137998" comment="vhba-kmp-desktop-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137999" comment="vhba-kmp-pae-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138000" comment="vhba-kmp-xen-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138001" comment="virtualbox-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138002" comment="virtualbox-devel-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138003" comment="virtualbox-guest-desktop-icons-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138004" comment="virtualbox-guest-kmp-default-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138005" comment="virtualbox-guest-kmp-desktop-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138006" comment="virtualbox-guest-kmp-pae-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138007" comment="virtualbox-guest-tools-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138008" comment="virtualbox-guest-x11-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138009" comment="virtualbox-host-kmp-default-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138010" comment="virtualbox-host-kmp-desktop-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138011" comment="virtualbox-host-kmp-pae-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138012" comment="virtualbox-host-source-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138013" comment="virtualbox-qt-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138014" comment="virtualbox-websrv-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138015" comment="xen-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138016" comment="xen-devel-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138017" comment="xen-doc-html-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138018" comment="xen-kmp-default-4.4.4_05_k3.16.7_53-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138019" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_53-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138020" comment="xen-libs-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138021" comment="xen-libs-32bit-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138022" comment="xen-tools-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138023" comment="xen-tools-domU-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138024" comment="xtables-addons-2.6-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138025" comment="xtables-addons-kmp-default-2.6_k3.16.7_53-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138026" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_53-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138027" comment="xtables-addons-kmp-pae-2.6_k3.16.7_53-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138028" comment="xtables-addons-kmp-xen-2.6_k3.16.7_53-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7916</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7916" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7916" source="CVE"/>
    <description>
    Race condition in the environ_read function in fs/proc/base.c in the Linux kernel before 4.5.4 allows local users to obtain sensitive information from kernel memory by reading a /proc/*/environ file during a process-setup time interval in which environment-variable copying is incomplete.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137932" comment="bbswitch-0.8-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137933" comment="bbswitch-kmp-default-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137934" comment="bbswitch-kmp-desktop-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137935" comment="bbswitch-kmp-pae-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137936" comment="bbswitch-kmp-xen-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137937" comment="cloop-2.639-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137938" comment="cloop-kmp-default-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137939" comment="cloop-kmp-desktop-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137940" comment="cloop-kmp-pae-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137941" comment="cloop-kmp-xen-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137942" comment="crash-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137943" comment="crash-devel-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137944" comment="crash-doc-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137945" comment="crash-eppic-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137946" comment="crash-gcore-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137947" comment="crash-kmp-default-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137948" comment="crash-kmp-desktop-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137949" comment="crash-kmp-pae-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137950" comment="crash-kmp-xen-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137951" comment="hdjmod-1.28-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137952" comment="hdjmod-kmp-default-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137953" comment="hdjmod-kmp-desktop-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137954" comment="hdjmod-kmp-pae-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137955" comment="hdjmod-kmp-xen-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137956" comment="ipset-6.23-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137957" comment="ipset-devel-6.23-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137958" comment="ipset-kmp-default-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137959" comment="ipset-kmp-desktop-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137960" comment="ipset-kmp-pae-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137961" comment="ipset-kmp-xen-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137962" comment="kernel-debug-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137963" comment="kernel-debug-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137964" comment="kernel-debug-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137965" comment="kernel-default-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137966" comment="kernel-default-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137967" comment="kernel-default-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137968" comment="kernel-desktop-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137969" comment="kernel-desktop-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137970" comment="kernel-desktop-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137971" comment="kernel-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137972" comment="kernel-docs-3.16.7-53.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137973" comment="kernel-ec2-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137974" comment="kernel-ec2-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137975" comment="kernel-ec2-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137976" comment="kernel-macros-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137977" comment="kernel-obs-build-3.16.7-53.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137978" comment="kernel-obs-qa-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137979" comment="kernel-pae-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137980" comment="kernel-pae-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137981" comment="kernel-pae-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137982" comment="kernel-source-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137983" comment="kernel-source-vanilla-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137984" comment="kernel-syms-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137985" comment="kernel-vanilla-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137986" comment="kernel-vanilla-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137987" comment="kernel-xen-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137988" comment="kernel-xen-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137989" comment="kernel-xen-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137990" comment="libipset3-6.23-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137991" comment="pcfclock-0.44-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137992" comment="pcfclock-kmp-default-0.44_k3.16.7_53-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137993" comment="pcfclock-kmp-desktop-0.44_k3.16.7_53-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137994" comment="pcfclock-kmp-pae-0.44_k3.16.7_53-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137995" comment="python-virtualbox-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137996" comment="vhba-kmp-20140629-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137997" comment="vhba-kmp-default-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137998" comment="vhba-kmp-desktop-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137999" comment="vhba-kmp-pae-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138000" comment="vhba-kmp-xen-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138001" comment="virtualbox-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138002" comment="virtualbox-devel-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138003" comment="virtualbox-guest-desktop-icons-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138004" comment="virtualbox-guest-kmp-default-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138005" comment="virtualbox-guest-kmp-desktop-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138006" comment="virtualbox-guest-kmp-pae-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138007" comment="virtualbox-guest-tools-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138008" comment="virtualbox-guest-x11-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138009" comment="virtualbox-host-kmp-default-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138010" comment="virtualbox-host-kmp-desktop-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138011" comment="virtualbox-host-kmp-pae-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138012" comment="virtualbox-host-source-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138013" comment="virtualbox-qt-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138014" comment="virtualbox-websrv-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138015" comment="xen-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138016" comment="xen-devel-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138017" comment="xen-doc-html-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138018" comment="xen-kmp-default-4.4.4_05_k3.16.7_53-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138019" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_53-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138020" comment="xen-libs-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138021" comment="xen-libs-32bit-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138022" comment="xen-tools-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138023" comment="xen-tools-domU-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138024" comment="xtables-addons-2.6-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138025" comment="xtables-addons-kmp-default-2.6_k3.16.7_53-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138026" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_53-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138027" comment="xtables-addons-kmp-pae-2.6_k3.16.7_53-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138028" comment="xtables-addons-kmp-xen-2.6_k3.16.7_53-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7942</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7942" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7942" source="CVE"/>
    <description>
    The XGetImage function in X.org libX11 before 1.6.4 might allow remote X servers to gain privileges via vectors involving image type and geometry, which triggers out-of-bounds read operations.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136812" comment="libX11-1.6.2-5.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136813" comment="libX11-6-1.6.2-5.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136814" comment="libX11-6-32bit-1.6.2-5.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136815" comment="libX11-data-1.6.2-5.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136816" comment="libX11-devel-1.6.2-5.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136817" comment="libX11-devel-32bit-1.6.2-5.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136818" comment="libX11-xcb1-1.6.2-5.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136819" comment="libX11-xcb1-32bit-1.6.2-5.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136820" comment="libXi-1.7.4-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136821" comment="libXi-devel-1.7.4-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136822" comment="libXi-devel-32bit-1.7.4-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136823" comment="libXi6-1.7.4-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136824" comment="libXi6-32bit-1.7.4-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136825" comment="libXrandr-1.4.2-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136826" comment="libXrandr-devel-1.4.2-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136827" comment="libXrandr-devel-32bit-1.4.2-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136828" comment="libXrandr2-1.4.2-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136829" comment="libXrandr2-32bit-1.4.2-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136733" comment="libxcb-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136734" comment="libxcb-composite0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136735" comment="libxcb-composite0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136736" comment="libxcb-damage0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136737" comment="libxcb-damage0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136738" comment="libxcb-devel-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136739" comment="libxcb-devel-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136740" comment="libxcb-devel-doc-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136741" comment="libxcb-dpms0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136742" comment="libxcb-dpms0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136743" comment="libxcb-dri2-0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136744" comment="libxcb-dri2-0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136745" comment="libxcb-dri3-0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136746" comment="libxcb-dri3-0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136747" comment="libxcb-glx0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136748" comment="libxcb-glx0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136749" comment="libxcb-present0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136750" comment="libxcb-present0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136751" comment="libxcb-randr0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136752" comment="libxcb-randr0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136753" comment="libxcb-record0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136754" comment="libxcb-record0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136755" comment="libxcb-render0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136756" comment="libxcb-render0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136757" comment="libxcb-res0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136758" comment="libxcb-res0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136759" comment="libxcb-screensaver0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136760" comment="libxcb-screensaver0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136761" comment="libxcb-shape0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136762" comment="libxcb-shape0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136763" comment="libxcb-shm0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136764" comment="libxcb-shm0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136765" comment="libxcb-sync1-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136766" comment="libxcb-sync1-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136767" comment="libxcb-xevie0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136768" comment="libxcb-xevie0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136769" comment="libxcb-xf86dri0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136770" comment="libxcb-xf86dri0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136771" comment="libxcb-xfixes0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136772" comment="libxcb-xfixes0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136773" comment="libxcb-xinerama0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136774" comment="libxcb-xinerama0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136775" comment="libxcb-xkb1-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136776" comment="libxcb-xkb1-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136777" comment="libxcb-xprint0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136778" comment="libxcb-xprint0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136779" comment="libxcb-xtest0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136780" comment="libxcb-xtest0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136781" comment="libxcb-xv0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136782" comment="libxcb-xv0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136783" comment="libxcb-xvmc0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136784" comment="libxcb-xvmc0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136785" comment="libxcb1-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136786" comment="libxcb1-32bit-1.11-2.5.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7944</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7944" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7944" source="CVE"/>
    <description>
    Integer overflow in X.org libXfixes before 5.0.3 on 32-bit platforms might allow remote X servers to gain privileges via a length value of INT_MAX, which triggers the client to stop reading data and get out of sync.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137927" comment="libXfixes-5.0.1-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137928" comment="libXfixes-devel-5.0.1-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137929" comment="libXfixes-devel-32bit-5.0.1-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137930" comment="libXfixes3-5.0.1-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137931" comment="libXfixes3-32bit-5.0.1-4.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7945</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7945" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7945" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXi before 1.7.7 allow remote X servers to cause a denial of service (out-of-bounds memory access or infinite loop) via vectors involving length fields.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136812" comment="libX11-1.6.2-5.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136813" comment="libX11-6-1.6.2-5.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136814" comment="libX11-6-32bit-1.6.2-5.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136815" comment="libX11-data-1.6.2-5.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136816" comment="libX11-devel-1.6.2-5.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136817" comment="libX11-devel-32bit-1.6.2-5.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136818" comment="libX11-xcb1-1.6.2-5.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136819" comment="libX11-xcb1-32bit-1.6.2-5.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136820" comment="libXi-1.7.4-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136821" comment="libXi-devel-1.7.4-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136822" comment="libXi-devel-32bit-1.7.4-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136823" comment="libXi6-1.7.4-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136824" comment="libXi6-32bit-1.7.4-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136825" comment="libXrandr-1.4.2-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136826" comment="libXrandr-devel-1.4.2-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136827" comment="libXrandr-devel-32bit-1.4.2-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136828" comment="libXrandr2-1.4.2-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136829" comment="libXrandr2-32bit-1.4.2-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136733" comment="libxcb-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136734" comment="libxcb-composite0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136735" comment="libxcb-composite0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136736" comment="libxcb-damage0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136737" comment="libxcb-damage0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136738" comment="libxcb-devel-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136739" comment="libxcb-devel-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136740" comment="libxcb-devel-doc-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136741" comment="libxcb-dpms0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136742" comment="libxcb-dpms0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136743" comment="libxcb-dri2-0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136744" comment="libxcb-dri2-0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136745" comment="libxcb-dri3-0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136746" comment="libxcb-dri3-0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136747" comment="libxcb-glx0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136748" comment="libxcb-glx0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136749" comment="libxcb-present0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136750" comment="libxcb-present0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136751" comment="libxcb-randr0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136752" comment="libxcb-randr0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136753" comment="libxcb-record0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136754" comment="libxcb-record0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136755" comment="libxcb-render0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136756" comment="libxcb-render0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136757" comment="libxcb-res0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136758" comment="libxcb-res0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136759" comment="libxcb-screensaver0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136760" comment="libxcb-screensaver0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136761" comment="libxcb-shape0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136762" comment="libxcb-shape0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136763" comment="libxcb-shm0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136764" comment="libxcb-shm0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136765" comment="libxcb-sync1-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136766" comment="libxcb-sync1-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136767" comment="libxcb-xevie0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136768" comment="libxcb-xevie0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136769" comment="libxcb-xf86dri0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136770" comment="libxcb-xf86dri0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136771" comment="libxcb-xfixes0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136772" comment="libxcb-xfixes0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136773" comment="libxcb-xinerama0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136774" comment="libxcb-xinerama0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136775" comment="libxcb-xkb1-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136776" comment="libxcb-xkb1-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136777" comment="libxcb-xprint0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136778" comment="libxcb-xprint0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136779" comment="libxcb-xtest0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136780" comment="libxcb-xtest0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136781" comment="libxcb-xv0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136782" comment="libxcb-xv0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136783" comment="libxcb-xvmc0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136784" comment="libxcb-xvmc0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136785" comment="libxcb1-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136786" comment="libxcb1-32bit-1.11-2.5.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7946</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7946" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7946" source="CVE"/>
    <description>
    X.org libXi before 1.7.7 allows remote X servers to cause a denial of service (infinite loop) via vectors involving length fields.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136812" comment="libX11-1.6.2-5.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136813" comment="libX11-6-1.6.2-5.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136814" comment="libX11-6-32bit-1.6.2-5.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136815" comment="libX11-data-1.6.2-5.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136816" comment="libX11-devel-1.6.2-5.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136817" comment="libX11-devel-32bit-1.6.2-5.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136818" comment="libX11-xcb1-1.6.2-5.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136819" comment="libX11-xcb1-32bit-1.6.2-5.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136820" comment="libXi-1.7.4-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136821" comment="libXi-devel-1.7.4-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136822" comment="libXi-devel-32bit-1.7.4-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136823" comment="libXi6-1.7.4-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136824" comment="libXi6-32bit-1.7.4-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136825" comment="libXrandr-1.4.2-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136826" comment="libXrandr-devel-1.4.2-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136827" comment="libXrandr-devel-32bit-1.4.2-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136828" comment="libXrandr2-1.4.2-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136829" comment="libXrandr2-32bit-1.4.2-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136733" comment="libxcb-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136734" comment="libxcb-composite0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136735" comment="libxcb-composite0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136736" comment="libxcb-damage0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136737" comment="libxcb-damage0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136738" comment="libxcb-devel-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136739" comment="libxcb-devel-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136740" comment="libxcb-devel-doc-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136741" comment="libxcb-dpms0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136742" comment="libxcb-dpms0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136743" comment="libxcb-dri2-0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136744" comment="libxcb-dri2-0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136745" comment="libxcb-dri3-0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136746" comment="libxcb-dri3-0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136747" comment="libxcb-glx0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136748" comment="libxcb-glx0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136749" comment="libxcb-present0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136750" comment="libxcb-present0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136751" comment="libxcb-randr0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136752" comment="libxcb-randr0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136753" comment="libxcb-record0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136754" comment="libxcb-record0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136755" comment="libxcb-render0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136756" comment="libxcb-render0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136757" comment="libxcb-res0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136758" comment="libxcb-res0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136759" comment="libxcb-screensaver0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136760" comment="libxcb-screensaver0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136761" comment="libxcb-shape0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136762" comment="libxcb-shape0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136763" comment="libxcb-shm0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136764" comment="libxcb-shm0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136765" comment="libxcb-sync1-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136766" comment="libxcb-sync1-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136767" comment="libxcb-xevie0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136768" comment="libxcb-xevie0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136769" comment="libxcb-xf86dri0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136770" comment="libxcb-xf86dri0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136771" comment="libxcb-xfixes0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136772" comment="libxcb-xfixes0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136773" comment="libxcb-xinerama0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136774" comment="libxcb-xinerama0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136775" comment="libxcb-xkb1-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136776" comment="libxcb-xkb1-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136777" comment="libxcb-xprint0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136778" comment="libxcb-xprint0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136779" comment="libxcb-xtest0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136780" comment="libxcb-xtest0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136781" comment="libxcb-xv0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136782" comment="libxcb-xv0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136783" comment="libxcb-xvmc0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136784" comment="libxcb-xvmc0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136785" comment="libxcb1-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136786" comment="libxcb1-32bit-1.11-2.5.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7947</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7947" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7947" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXrandr before 1.5.1 allow remote X servers to trigger out-of-bounds write operations via a crafted response.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136812" comment="libX11-1.6.2-5.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136813" comment="libX11-6-1.6.2-5.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136814" comment="libX11-6-32bit-1.6.2-5.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136815" comment="libX11-data-1.6.2-5.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136816" comment="libX11-devel-1.6.2-5.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136817" comment="libX11-devel-32bit-1.6.2-5.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136818" comment="libX11-xcb1-1.6.2-5.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136819" comment="libX11-xcb1-32bit-1.6.2-5.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136820" comment="libXi-1.7.4-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136821" comment="libXi-devel-1.7.4-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136822" comment="libXi-devel-32bit-1.7.4-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136823" comment="libXi6-1.7.4-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136824" comment="libXi6-32bit-1.7.4-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136825" comment="libXrandr-1.4.2-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136826" comment="libXrandr-devel-1.4.2-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136827" comment="libXrandr-devel-32bit-1.4.2-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136828" comment="libXrandr2-1.4.2-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136829" comment="libXrandr2-32bit-1.4.2-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136733" comment="libxcb-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136734" comment="libxcb-composite0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136735" comment="libxcb-composite0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136736" comment="libxcb-damage0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136737" comment="libxcb-damage0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136738" comment="libxcb-devel-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136739" comment="libxcb-devel-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136740" comment="libxcb-devel-doc-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136741" comment="libxcb-dpms0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136742" comment="libxcb-dpms0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136743" comment="libxcb-dri2-0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136744" comment="libxcb-dri2-0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136745" comment="libxcb-dri3-0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136746" comment="libxcb-dri3-0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136747" comment="libxcb-glx0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136748" comment="libxcb-glx0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136749" comment="libxcb-present0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136750" comment="libxcb-present0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136751" comment="libxcb-randr0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136752" comment="libxcb-randr0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136753" comment="libxcb-record0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136754" comment="libxcb-record0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136755" comment="libxcb-render0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136756" comment="libxcb-render0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136757" comment="libxcb-res0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136758" comment="libxcb-res0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136759" comment="libxcb-screensaver0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136760" comment="libxcb-screensaver0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136761" comment="libxcb-shape0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136762" comment="libxcb-shape0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136763" comment="libxcb-shm0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136764" comment="libxcb-shm0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136765" comment="libxcb-sync1-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136766" comment="libxcb-sync1-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136767" comment="libxcb-xevie0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136768" comment="libxcb-xevie0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136769" comment="libxcb-xf86dri0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136770" comment="libxcb-xf86dri0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136771" comment="libxcb-xfixes0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136772" comment="libxcb-xfixes0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136773" comment="libxcb-xinerama0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136774" comment="libxcb-xinerama0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136775" comment="libxcb-xkb1-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136776" comment="libxcb-xkb1-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136777" comment="libxcb-xprint0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136778" comment="libxcb-xprint0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136779" comment="libxcb-xtest0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136780" comment="libxcb-xtest0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136781" comment="libxcb-xv0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136782" comment="libxcb-xv0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136783" comment="libxcb-xvmc0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136784" comment="libxcb-xvmc0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136785" comment="libxcb1-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136786" comment="libxcb1-32bit-1.11-2.5.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7948</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7948" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7948" source="CVE"/>
    <description>
    X.org libXrandr before 1.5.1 allows remote X servers to trigger out-of-bounds write operations by leveraging mishandling of reply data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136812" comment="libX11-1.6.2-5.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136813" comment="libX11-6-1.6.2-5.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136814" comment="libX11-6-32bit-1.6.2-5.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136815" comment="libX11-data-1.6.2-5.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136816" comment="libX11-devel-1.6.2-5.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136817" comment="libX11-devel-32bit-1.6.2-5.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136818" comment="libX11-xcb1-1.6.2-5.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136819" comment="libX11-xcb1-32bit-1.6.2-5.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136820" comment="libXi-1.7.4-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136821" comment="libXi-devel-1.7.4-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136822" comment="libXi-devel-32bit-1.7.4-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136823" comment="libXi6-1.7.4-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136824" comment="libXi6-32bit-1.7.4-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136825" comment="libXrandr-1.4.2-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136826" comment="libXrandr-devel-1.4.2-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136827" comment="libXrandr-devel-32bit-1.4.2-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136828" comment="libXrandr2-1.4.2-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136829" comment="libXrandr2-32bit-1.4.2-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136733" comment="libxcb-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136734" comment="libxcb-composite0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136735" comment="libxcb-composite0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136736" comment="libxcb-damage0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136737" comment="libxcb-damage0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136738" comment="libxcb-devel-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136739" comment="libxcb-devel-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136740" comment="libxcb-devel-doc-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136741" comment="libxcb-dpms0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136742" comment="libxcb-dpms0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136743" comment="libxcb-dri2-0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136744" comment="libxcb-dri2-0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136745" comment="libxcb-dri3-0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136746" comment="libxcb-dri3-0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136747" comment="libxcb-glx0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136748" comment="libxcb-glx0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136749" comment="libxcb-present0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136750" comment="libxcb-present0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136751" comment="libxcb-randr0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136752" comment="libxcb-randr0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136753" comment="libxcb-record0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136754" comment="libxcb-record0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136755" comment="libxcb-render0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136756" comment="libxcb-render0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136757" comment="libxcb-res0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136758" comment="libxcb-res0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136759" comment="libxcb-screensaver0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136760" comment="libxcb-screensaver0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136761" comment="libxcb-shape0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136762" comment="libxcb-shape0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136763" comment="libxcb-shm0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136764" comment="libxcb-shm0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136765" comment="libxcb-sync1-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136766" comment="libxcb-sync1-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136767" comment="libxcb-xevie0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136768" comment="libxcb-xevie0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136769" comment="libxcb-xf86dri0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136770" comment="libxcb-xf86dri0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136771" comment="libxcb-xfixes0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136772" comment="libxcb-xfixes0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136773" comment="libxcb-xinerama0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136774" comment="libxcb-xinerama0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136775" comment="libxcb-xkb1-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136776" comment="libxcb-xkb1-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136777" comment="libxcb-xprint0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136778" comment="libxcb-xprint0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136779" comment="libxcb-xtest0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136780" comment="libxcb-xtest0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136781" comment="libxcb-xv0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136782" comment="libxcb-xv0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136783" comment="libxcb-xvmc0-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136784" comment="libxcb-xvmc0-32bit-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136785" comment="libxcb1-1.11-2.5.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136786" comment="libxcb1-32bit-1.11-2.5.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7949</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7949" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7949" source="CVE"/>
    <description>
    Multiple buffer overflows in the (1) XvQueryAdaptors and (2) XvQueryEncodings functions in X.org libXrender before 0.9.10 allow remote X servers to trigger out-of-bounds write operations via vectors involving length fields.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136787" comment="libXrender-0.9.8-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136788" comment="libXrender-devel-0.9.8-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136789" comment="libXrender-devel-32bit-0.9.8-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136790" comment="libXrender1-0.9.8-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136791" comment="libXrender1-32bit-0.9.8-4.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7950</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7950" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7950" source="CVE"/>
    <description>
    The XRenderQueryFilters function in X.org libXrender before 0.9.10 allows remote X servers to trigger out-of-bounds write operations via vectors involving filter name lengths.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136787" comment="libXrender-0.9.8-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136788" comment="libXrender-devel-0.9.8-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136789" comment="libXrender-devel-32bit-0.9.8-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136790" comment="libXrender1-0.9.8-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136791" comment="libXrender1-32bit-0.9.8-4.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7951</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7951" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7951" source="CVE"/>
    <description>
    Multiple integer overflows in X.org libXtst before 1.2.3 allow remote X servers to trigger out-of-bounds memory access operations by leveraging the lack of range checks.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136792" comment="libXtst-1.2.2-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136793" comment="libXtst-devel-1.2.2-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136794" comment="libXtst-devel-32bit-1.2.2-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136795" comment="libXtst6-1.2.2-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136796" comment="libXtst6-32bit-1.2.2-4.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7952</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7952" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7952" source="CVE"/>
    <description>
    X.org libXtst before 1.2.3 allows remote X servers to cause a denial of service (infinite loop) via a reply in the (1) XRecordStartOfData, (2) XRecordEndOfData, or (3) XRecordClientDied category without a client sequence and with attached data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136792" comment="libXtst-1.2.2-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136793" comment="libXtst-devel-1.2.2-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136794" comment="libXtst-devel-32bit-1.2.2-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136795" comment="libXtst6-1.2.2-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136796" comment="libXtst6-32bit-1.2.2-4.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7953</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7953" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7953" source="CVE"/>
    <description>
    Buffer underflow in X.org libXvMC before 1.0.10 allows remote X servers to have unspecified impact via an empty string.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136802" comment="libXvMC-1.0.8-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136803" comment="libXvMC-devel-1.0.8-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136804" comment="libXvMC-devel-32bit-1.0.8-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136805" comment="libXvMC1-1.0.8-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136806" comment="libXvMC1-32bit-1.0.8-4.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7966</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7966" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7966" source="CVE"/>
    <description>
    Through a malicious URL that contained a quote character it was possible to inject HTML code in KMail's plaintext viewer. Due to the parser used on the URL it was not possible to include the equal sign (=) or a space into the injected HTML, which greatly reduces the available HTML functionality. Although it is possible to include an HTML comment indicator to hide content.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009134248" comment="kcoreaddons-5.11.0-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134249" comment="kcoreaddons-devel-5.11.0-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134250" comment="kcoreaddons-devel-32bit-5.11.0-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134251" comment="kcoreaddons-lang-5.11.0-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134252" comment="libKF5CoreAddons5-5.11.0-27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134253" comment="libKF5CoreAddons5-32bit-5.11.0-27.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7969</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7969" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7969" source="CVE"/>
    <description>
    The wrap_lines_smart function in ass_render.c in libass before 0.13.4 allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors, related to "0/3 line wrapping equalization."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009142387" comment="libass-0.12.1-2.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142388" comment="libass-devel-0.12.1-2.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142389" comment="libass5-0.12.1-2.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142390" comment="libass5-32bit-0.12.1-2.8.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7972</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7972" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7972" source="CVE"/>
    <description>
    The check_allocations function in libass/ass_shaper.c in libass before 0.13.4 allows remote attackers to cause a denial of service (memory allocation failure) via unspecified vectors.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009142387" comment="libass-0.12.1-2.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142388" comment="libass-devel-0.12.1-2.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142389" comment="libass5-0.12.1-2.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142390" comment="libass5-32bit-0.12.1-2.8.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7978</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7978" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7978" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133984" comment="ghostscript-9.15-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133985" comment="ghostscript-devel-9.15-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125319" comment="ghostscript-mini-9.15-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125320" comment="ghostscript-mini-devel-9.15-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133986" comment="ghostscript-x11-9.15-6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7979</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7979" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7979" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133984" comment="ghostscript-9.15-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133985" comment="ghostscript-devel-9.15-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125319" comment="ghostscript-mini-9.15-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125320" comment="ghostscript-mini-devel-9.15-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133986" comment="ghostscript-x11-9.15-6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7996</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7996" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7996" source="CVE"/>
    <description>
    Heap-based buffer overflow in the WPG format reader in GraphicsMagick 1.3.25 and earlier allows remote attackers to have unspecified impact via a colormap with a large number of entries.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133963" comment="GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133964" comment="GraphicsMagick-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133990" comment="ImageMagick-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133991" comment="ImageMagick-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133992" comment="ImageMagick-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133993" comment="ImageMagick-doc-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133994" comment="ImageMagick-extra-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133965" comment="libGraphicsMagick++-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133966" comment="libGraphicsMagick++-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133967" comment="libGraphicsMagick-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133968" comment="libGraphicsMagick3-config-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133969" comment="libGraphicsMagickWand-Q16-2-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133995" comment="libMagick++-6_Q16-5-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133996" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133997" comment="libMagick++-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133998" comment="libMagick++-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133999" comment="libMagickCore-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134000" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134001" comment="libMagickWand-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134002" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133970" comment="perl-GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134003" comment="perl-PerlMagick-6.8.9.8-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20167997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-7997</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-7997" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7997" source="CVE"/>
    <description>
    The WPG format reader in GraphicsMagick 1.3.25 and earlier allows remote attackers to cause a denial of service (assertion failure and crash) via vectors related to a ReferenceBlob and a NULL pointer.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133963" comment="GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133964" comment="GraphicsMagick-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133990" comment="ImageMagick-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133991" comment="ImageMagick-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133992" comment="ImageMagick-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133993" comment="ImageMagick-doc-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133994" comment="ImageMagick-extra-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133965" comment="libGraphicsMagick++-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133966" comment="libGraphicsMagick++-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133967" comment="libGraphicsMagick-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133968" comment="libGraphicsMagick3-config-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133969" comment="libGraphicsMagickWand-Q16-2-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133995" comment="libMagick++-6_Q16-5-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133996" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133997" comment="libMagick++-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133998" comment="libMagick++-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133999" comment="libMagickCore-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134000" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134001" comment="libMagickWand-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134002" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133970" comment="perl-GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134003" comment="perl-PerlMagick-6.8.9.8-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8283</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-8283" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows remote authenticated users to affect availability via vectors related to Server: Types.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135453" comment="libmysql56client18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135454" comment="libmysql56client18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135455" comment="libmysql56client_r18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135456" comment="libmysql56client_r18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135457" comment="mysql-community-server-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135458" comment="mysql-community-server-bench-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135459" comment="mysql-community-server-client-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135460" comment="mysql-community-server-errormessages-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135461" comment="mysql-community-server-test-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135462" comment="mysql-community-server-tools-5.6.34-2.23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8284</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-8284" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8284" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.31 and earlier and 5.7.13 and earlier allows local users to affect availability via vectors related to Server: Replication.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135453" comment="libmysql56client18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135454" comment="libmysql56client18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135455" comment="libmysql56client_r18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135456" comment="libmysql56client_r18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135457" comment="mysql-community-server-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135458" comment="mysql-community-server-bench-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135459" comment="mysql-community-server-client-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135460" comment="mysql-community-server-errormessages-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135461" comment="mysql-community-server-test-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135462" comment="mysql-community-server-tools-5.6.34-2.23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8288</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-8288" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8288" source="CVE"/>
    <description>
    Unspecified vulnerability in Oracle MySQL 5.6.30 and earlier and 5.7.12 and earlier allows remote authenticated users to affect integrity via vectors related to Server: InnoDB Plugin.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135453" comment="libmysql56client18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135454" comment="libmysql56client18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135455" comment="libmysql56client_r18-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135456" comment="libmysql56client_r18-32bit-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135457" comment="mysql-community-server-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135458" comment="mysql-community-server-bench-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135459" comment="mysql-community-server-client-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135460" comment="mysql-community-server-errormessages-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135461" comment="mysql-community-server-test-5.6.34-2.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135462" comment="mysql-community-server-tools-5.6.34-2.23.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8332</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-8332" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8332" source="CVE"/>
    <description>
    A buffer overflow in OpenJPEG 2.1.1 causes arbitrary code execution when parsing a crafted image. An exploitable code execution vulnerability exists in the jpeg2000 image file format parser as implemented in the OpenJpeg library. A specially crafted jpeg2000 file can cause an out of bound heap write resulting in heap corruption leading to arbitrary code execution. For a successful attack, the target user needs to open a malicious jpeg2000 file. The jpeg2000 image file format is mostly used for embedding images inside PDF documents and the OpenJpeg library is used by a number of popular PDF renderers making PDF documents a likely attack vector.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009147259" comment="libopenjp2-7-2.1.0-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147260" comment="openjpeg2-2.1.0-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147261" comment="openjpeg2-devel-2.1.0-2.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8568</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-8568" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8568" source="CVE"/>
    <description>
    The git_commit_message function in oid.c in libgit2 before 0.24.3 allows remote attackers to cause a denial of service (out-of-bounds read) via a cat-file command with a crafted object file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009147270" comment="libgit2-0.21.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147271" comment="libgit2-21-0.21.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147272" comment="libgit2-devel-0.21.5-2.6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8569</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-8569" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8569" source="CVE"/>
    <description>
    The git_oid_nfmt function in commit.c in libgit2 before 0.24.3 allows remote attackers to cause a denial of service (NULL pointer dereference) via a cat-file command with a crafted object file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009147270" comment="libgit2-0.21.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147271" comment="libgit2-21-0.21.5-2.6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147272" comment="libgit2-devel-0.21.5-2.6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8576</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-8576" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8576" source="CVE"/>
    <description>
    The xhci_ring_fetch function in hw/usb/hcd-xhci.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) by leveraging failure to limit the number of link Transfer Request Blocks (TRB) to process.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009146189" comment="xen-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146190" comment="xen-devel-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146191" comment="xen-doc-html-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146192" comment="xen-kmp-default-4.4.4_06_k3.16.7_53-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146193" comment="xen-kmp-desktop-4.4.4_06_k3.16.7_53-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146194" comment="xen-libs-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146195" comment="xen-libs-32bit-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146196" comment="xen-tools-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146197" comment="xen-tools-domU-4.4.4_06-58.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8602</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-8602" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8602" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133984" comment="ghostscript-9.15-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133985" comment="ghostscript-devel-9.15-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125319" comment="ghostscript-mini-9.15-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009125320" comment="ghostscript-mini-devel-9.15-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133986" comment="ghostscript-x11-9.15-6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8605</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-8605" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8605" source="CVE"/>
    <description>
    The mkdir procedure of GNU Guile temporarily changed the process' umask to zero. During that time window, in a multithreaded application, other threads could end up creating files with insecure permissions. For example, mkdir without the optional mode argument would create directories as 0777. This is fixed in Guile 2.0.13. Prior versions are affected.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133979" comment="guile-2.0.11-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133980" comment="guile-devel-2.0.11-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133981" comment="guile-modules-2_0-2.0.11-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133971" comment="guile1-1.8.8-16.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133982" comment="libguile-2_0-22-2.0.11-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133972" comment="libguile-srfi-srfi-1-v-3-3-1.8.8-16.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133973" comment="libguile-srfi-srfi-13-14-v-3-3-1.8.8-16.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133974" comment="libguile-srfi-srfi-4-v-3-3-1.8.8-16.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133975" comment="libguile-srfi-srfi-60-v-2-2-1.8.8-16.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133976" comment="libguile1-devel-1.8.8-16.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133977" comment="libguile17-1.8.8-16.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133978" comment="libguilereadline-v-17-17-1.8.8-16.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133983" comment="libguilereadline-v-18-18-2.0.11-3.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8606</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-8606" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8606" source="CVE"/>
    <description>
    The REPL server (--listen) in GNU Guile 2.0.12 allows an attacker to execute arbitrary code via an HTTP inter-protocol attack.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133979" comment="guile-2.0.11-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133980" comment="guile-devel-2.0.11-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133981" comment="guile-modules-2_0-2.0.11-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133982" comment="libguile-2_0-22-2.0.11-3.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133983" comment="libguilereadline-v-18-18-2.0.11-3.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8633</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-8633" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8633" source="CVE"/>
    <description>
    drivers/firewire/net.c in the Linux kernel before 4.8.7, in certain unusual hardware configurations, allows remote attackers to execute arbitrary code via crafted fragmented packets.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137932" comment="bbswitch-0.8-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137933" comment="bbswitch-kmp-default-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137934" comment="bbswitch-kmp-desktop-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137935" comment="bbswitch-kmp-pae-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137936" comment="bbswitch-kmp-xen-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137937" comment="cloop-2.639-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137938" comment="cloop-kmp-default-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137939" comment="cloop-kmp-desktop-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137940" comment="cloop-kmp-pae-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137941" comment="cloop-kmp-xen-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137942" comment="crash-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137943" comment="crash-devel-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137944" comment="crash-doc-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137945" comment="crash-eppic-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137946" comment="crash-gcore-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137947" comment="crash-kmp-default-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137948" comment="crash-kmp-desktop-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137949" comment="crash-kmp-pae-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137950" comment="crash-kmp-xen-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137951" comment="hdjmod-1.28-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137952" comment="hdjmod-kmp-default-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137953" comment="hdjmod-kmp-desktop-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137954" comment="hdjmod-kmp-pae-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137955" comment="hdjmod-kmp-xen-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137956" comment="ipset-6.23-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137957" comment="ipset-devel-6.23-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137958" comment="ipset-kmp-default-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137959" comment="ipset-kmp-desktop-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137960" comment="ipset-kmp-pae-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137961" comment="ipset-kmp-xen-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137962" comment="kernel-debug-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137963" comment="kernel-debug-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137964" comment="kernel-debug-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137965" comment="kernel-default-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137966" comment="kernel-default-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137967" comment="kernel-default-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137968" comment="kernel-desktop-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137969" comment="kernel-desktop-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137970" comment="kernel-desktop-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137971" comment="kernel-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137972" comment="kernel-docs-3.16.7-53.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137973" comment="kernel-ec2-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137974" comment="kernel-ec2-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137975" comment="kernel-ec2-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137976" comment="kernel-macros-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137977" comment="kernel-obs-build-3.16.7-53.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137978" comment="kernel-obs-qa-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137979" comment="kernel-pae-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137980" comment="kernel-pae-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137981" comment="kernel-pae-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137982" comment="kernel-source-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137983" comment="kernel-source-vanilla-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137984" comment="kernel-syms-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137985" comment="kernel-vanilla-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137986" comment="kernel-vanilla-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137987" comment="kernel-xen-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137988" comment="kernel-xen-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137989" comment="kernel-xen-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137990" comment="libipset3-6.23-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137991" comment="pcfclock-0.44-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137992" comment="pcfclock-kmp-default-0.44_k3.16.7_53-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137993" comment="pcfclock-kmp-desktop-0.44_k3.16.7_53-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137994" comment="pcfclock-kmp-pae-0.44_k3.16.7_53-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137995" comment="python-virtualbox-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137996" comment="vhba-kmp-20140629-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137997" comment="vhba-kmp-default-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137998" comment="vhba-kmp-desktop-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137999" comment="vhba-kmp-pae-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138000" comment="vhba-kmp-xen-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138001" comment="virtualbox-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138002" comment="virtualbox-devel-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138003" comment="virtualbox-guest-desktop-icons-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138004" comment="virtualbox-guest-kmp-default-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138005" comment="virtualbox-guest-kmp-desktop-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138006" comment="virtualbox-guest-kmp-pae-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138007" comment="virtualbox-guest-tools-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138008" comment="virtualbox-guest-x11-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138009" comment="virtualbox-host-kmp-default-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138010" comment="virtualbox-host-kmp-desktop-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138011" comment="virtualbox-host-kmp-pae-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138012" comment="virtualbox-host-source-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138013" comment="virtualbox-qt-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138014" comment="virtualbox-websrv-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138015" comment="xen-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138016" comment="xen-devel-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138017" comment="xen-doc-html-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138018" comment="xen-kmp-default-4.4.4_05_k3.16.7_53-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138019" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_53-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138020" comment="xen-libs-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138021" comment="xen-libs-32bit-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138022" comment="xen-tools-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138023" comment="xen-tools-domU-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138024" comment="xtables-addons-2.6-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138025" comment="xtables-addons-kmp-default-2.6_k3.16.7_53-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138026" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_53-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138027" comment="xtables-addons-kmp-pae-2.6_k3.16.7_53-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138028" comment="xtables-addons-kmp-xen-2.6_k3.16.7_53-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8646</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-8646" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8646" source="CVE"/>
    <description>
    The hash_accept function in crypto/algif_hash.c in the Linux kernel before 4.3.6 allows local users to cause a denial of service (OOPS) by attempting to trigger use of in-kernel hash algorithms for a socket that has received zero bytes of data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137932" comment="bbswitch-0.8-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137933" comment="bbswitch-kmp-default-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137934" comment="bbswitch-kmp-desktop-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137935" comment="bbswitch-kmp-pae-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137936" comment="bbswitch-kmp-xen-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137937" comment="cloop-2.639-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137938" comment="cloop-kmp-default-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137939" comment="cloop-kmp-desktop-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137940" comment="cloop-kmp-pae-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137941" comment="cloop-kmp-xen-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137942" comment="crash-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137943" comment="crash-devel-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137944" comment="crash-doc-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137945" comment="crash-eppic-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137946" comment="crash-gcore-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137947" comment="crash-kmp-default-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137948" comment="crash-kmp-desktop-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137949" comment="crash-kmp-pae-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137950" comment="crash-kmp-xen-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137951" comment="hdjmod-1.28-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137952" comment="hdjmod-kmp-default-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137953" comment="hdjmod-kmp-desktop-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137954" comment="hdjmod-kmp-pae-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137955" comment="hdjmod-kmp-xen-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137956" comment="ipset-6.23-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137957" comment="ipset-devel-6.23-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137958" comment="ipset-kmp-default-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137959" comment="ipset-kmp-desktop-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137960" comment="ipset-kmp-pae-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137961" comment="ipset-kmp-xen-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137962" comment="kernel-debug-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137963" comment="kernel-debug-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137964" comment="kernel-debug-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137965" comment="kernel-default-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137966" comment="kernel-default-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137967" comment="kernel-default-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137968" comment="kernel-desktop-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137969" comment="kernel-desktop-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137970" comment="kernel-desktop-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137971" comment="kernel-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137972" comment="kernel-docs-3.16.7-53.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137973" comment="kernel-ec2-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137974" comment="kernel-ec2-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137975" comment="kernel-ec2-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137976" comment="kernel-macros-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137977" comment="kernel-obs-build-3.16.7-53.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137978" comment="kernel-obs-qa-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137979" comment="kernel-pae-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137980" comment="kernel-pae-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137981" comment="kernel-pae-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137982" comment="kernel-source-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137983" comment="kernel-source-vanilla-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137984" comment="kernel-syms-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137985" comment="kernel-vanilla-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137986" comment="kernel-vanilla-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137987" comment="kernel-xen-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137988" comment="kernel-xen-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137989" comment="kernel-xen-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137990" comment="libipset3-6.23-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137991" comment="pcfclock-0.44-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137992" comment="pcfclock-kmp-default-0.44_k3.16.7_53-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137993" comment="pcfclock-kmp-desktop-0.44_k3.16.7_53-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137994" comment="pcfclock-kmp-pae-0.44_k3.16.7_53-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137995" comment="python-virtualbox-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137996" comment="vhba-kmp-20140629-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137997" comment="vhba-kmp-default-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137998" comment="vhba-kmp-desktop-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137999" comment="vhba-kmp-pae-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138000" comment="vhba-kmp-xen-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138001" comment="virtualbox-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138002" comment="virtualbox-devel-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138003" comment="virtualbox-guest-desktop-icons-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138004" comment="virtualbox-guest-kmp-default-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138005" comment="virtualbox-guest-kmp-desktop-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138006" comment="virtualbox-guest-kmp-pae-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138007" comment="virtualbox-guest-tools-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138008" comment="virtualbox-guest-x11-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138009" comment="virtualbox-host-kmp-default-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138010" comment="virtualbox-host-kmp-desktop-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138011" comment="virtualbox-host-kmp-pae-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138012" comment="virtualbox-host-source-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138013" comment="virtualbox-qt-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138014" comment="virtualbox-websrv-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138015" comment="xen-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138016" comment="xen-devel-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138017" comment="xen-doc-html-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138018" comment="xen-kmp-default-4.4.4_05_k3.16.7_53-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138019" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_53-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138020" comment="xen-libs-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138021" comment="xen-libs-32bit-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138022" comment="xen-tools-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138023" comment="xen-tools-domU-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138024" comment="xtables-addons-2.6-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138025" comment="xtables-addons-kmp-default-2.6_k3.16.7_53-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138026" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_53-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138027" comment="xtables-addons-kmp-pae-2.6_k3.16.7_53-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138028" comment="xtables-addons-kmp-xen-2.6_k3.16.7_53-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8649</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-8649" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8649" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009143108" comment="lxc-1.0.6-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143109" comment="lxc-devel-1.0.6-12.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8655</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-8655" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8655" source="CVE"/>
    <description>
    Race condition in net/packet/af_packet.c in the Linux kernel through 4.8.12 allows local users to gain privileges or cause a denial of service (use-after-free) by leveraging the CAP_NET_RAW capability to change a socket version, related to the packet_set_ring and packet_setsockopt functions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137932" comment="bbswitch-0.8-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137933" comment="bbswitch-kmp-default-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137934" comment="bbswitch-kmp-desktop-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137935" comment="bbswitch-kmp-pae-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137936" comment="bbswitch-kmp-xen-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137937" comment="cloop-2.639-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137938" comment="cloop-kmp-default-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137939" comment="cloop-kmp-desktop-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137940" comment="cloop-kmp-pae-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137941" comment="cloop-kmp-xen-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137942" comment="crash-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137943" comment="crash-devel-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137944" comment="crash-doc-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137945" comment="crash-eppic-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137946" comment="crash-gcore-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137947" comment="crash-kmp-default-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137948" comment="crash-kmp-desktop-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137949" comment="crash-kmp-pae-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137950" comment="crash-kmp-xen-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137951" comment="hdjmod-1.28-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137952" comment="hdjmod-kmp-default-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137953" comment="hdjmod-kmp-desktop-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137954" comment="hdjmod-kmp-pae-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137955" comment="hdjmod-kmp-xen-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137956" comment="ipset-6.23-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137957" comment="ipset-devel-6.23-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137958" comment="ipset-kmp-default-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137959" comment="ipset-kmp-desktop-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137960" comment="ipset-kmp-pae-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137961" comment="ipset-kmp-xen-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137962" comment="kernel-debug-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137963" comment="kernel-debug-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137964" comment="kernel-debug-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137965" comment="kernel-default-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137966" comment="kernel-default-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137967" comment="kernel-default-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137968" comment="kernel-desktop-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137969" comment="kernel-desktop-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137970" comment="kernel-desktop-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137971" comment="kernel-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137972" comment="kernel-docs-3.16.7-53.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137973" comment="kernel-ec2-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137974" comment="kernel-ec2-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137975" comment="kernel-ec2-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137976" comment="kernel-macros-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137977" comment="kernel-obs-build-3.16.7-53.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137978" comment="kernel-obs-qa-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137979" comment="kernel-pae-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137980" comment="kernel-pae-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137981" comment="kernel-pae-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137982" comment="kernel-source-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137983" comment="kernel-source-vanilla-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137984" comment="kernel-syms-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137985" comment="kernel-vanilla-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137986" comment="kernel-vanilla-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137987" comment="kernel-xen-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137988" comment="kernel-xen-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137989" comment="kernel-xen-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137990" comment="libipset3-6.23-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137991" comment="pcfclock-0.44-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137992" comment="pcfclock-kmp-default-0.44_k3.16.7_53-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137993" comment="pcfclock-kmp-desktop-0.44_k3.16.7_53-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137994" comment="pcfclock-kmp-pae-0.44_k3.16.7_53-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137995" comment="python-virtualbox-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137996" comment="vhba-kmp-20140629-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137997" comment="vhba-kmp-default-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137998" comment="vhba-kmp-desktop-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137999" comment="vhba-kmp-pae-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138000" comment="vhba-kmp-xen-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138001" comment="virtualbox-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138002" comment="virtualbox-devel-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138003" comment="virtualbox-guest-desktop-icons-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138004" comment="virtualbox-guest-kmp-default-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138005" comment="virtualbox-guest-kmp-desktop-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138006" comment="virtualbox-guest-kmp-pae-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138007" comment="virtualbox-guest-tools-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138008" comment="virtualbox-guest-x11-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138009" comment="virtualbox-host-kmp-default-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138010" comment="virtualbox-host-kmp-desktop-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138011" comment="virtualbox-host-kmp-pae-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138012" comment="virtualbox-host-source-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138013" comment="virtualbox-qt-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138014" comment="virtualbox-websrv-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138015" comment="xen-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138016" comment="xen-devel-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138017" comment="xen-doc-html-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138018" comment="xen-kmp-default-4.4.4_05_k3.16.7_53-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138019" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_53-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138020" comment="xen-libs-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138021" comment="xen-libs-32bit-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138022" comment="xen-tools-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138023" comment="xen-tools-domU-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138024" comment="xtables-addons-2.6-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138025" comment="xtables-addons-kmp-default-2.6_k3.16.7_53-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138026" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_53-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138027" comment="xtables-addons-kmp-pae-2.6_k3.16.7_53-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138028" comment="xtables-addons-kmp-xen-2.6_k3.16.7_53-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8658</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-8658" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8658" source="CVE"/>
    <description>
    Stack-based buffer overflow in the brcmf_cfg80211_start_ap function in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux kernel before 4.7.5 allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via a long SSID Information Element in a command to a Netlink socket.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133865" comment="bbswitch-0.8-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133866" comment="bbswitch-kmp-default-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133867" comment="bbswitch-kmp-desktop-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133868" comment="bbswitch-kmp-pae-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133869" comment="bbswitch-kmp-xen-0.8_k3.16.7_45-3.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133870" comment="cloop-2.639-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133871" comment="cloop-kmp-default-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133872" comment="cloop-kmp-desktop-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133873" comment="cloop-kmp-pae-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133874" comment="cloop-kmp-xen-2.639_k3.16.7_45-14.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133875" comment="crash-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133876" comment="crash-devel-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133877" comment="crash-doc-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133878" comment="crash-eppic-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133879" comment="crash-gcore-7.0.8-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133880" comment="crash-kmp-default-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133881" comment="crash-kmp-desktop-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133882" comment="crash-kmp-pae-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133883" comment="crash-kmp-xen-7.0.8_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133884" comment="hdjmod-1.28-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133885" comment="hdjmod-kmp-default-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133886" comment="hdjmod-kmp-desktop-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133887" comment="hdjmod-kmp-pae-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133888" comment="hdjmod-kmp-xen-1.28_k3.16.7_45-18.23.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133889" comment="ipset-6.23-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133890" comment="ipset-devel-6.23-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133891" comment="ipset-kmp-default-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133892" comment="ipset-kmp-desktop-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133893" comment="ipset-kmp-pae-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133894" comment="ipset-kmp-xen-6.23_k3.16.7_45-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133895" comment="kernel-debug-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133896" comment="kernel-debug-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133897" comment="kernel-debug-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133898" comment="kernel-default-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133899" comment="kernel-default-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133900" comment="kernel-default-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133901" comment="kernel-desktop-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133902" comment="kernel-desktop-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133903" comment="kernel-desktop-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133904" comment="kernel-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133905" comment="kernel-docs-3.16.7-45.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133906" comment="kernel-ec2-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133907" comment="kernel-ec2-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133908" comment="kernel-ec2-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133909" comment="kernel-macros-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133910" comment="kernel-obs-build-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133911" comment="kernel-obs-qa-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133912" comment="kernel-obs-qa-xen-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133913" comment="kernel-pae-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133914" comment="kernel-pae-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133915" comment="kernel-pae-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133916" comment="kernel-source-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133917" comment="kernel-source-vanilla-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133918" comment="kernel-syms-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133919" comment="kernel-vanilla-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133920" comment="kernel-vanilla-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133921" comment="kernel-xen-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133922" comment="kernel-xen-base-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133923" comment="kernel-xen-devel-3.16.7-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133924" comment="libipset3-6.23-22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133925" comment="pcfclock-0.44-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133926" comment="pcfclock-kmp-default-0.44_k3.16.7_45-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133927" comment="pcfclock-kmp-desktop-0.44_k3.16.7_45-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133928" comment="pcfclock-kmp-pae-0.44_k3.16.7_45-260.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133929" comment="python-virtualbox-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133930" comment="vhba-kmp-20140629-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133931" comment="vhba-kmp-default-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133932" comment="vhba-kmp-desktop-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133933" comment="vhba-kmp-pae-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133934" comment="vhba-kmp-xen-20140629_k3.16.7_45-2.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133935" comment="virtualbox-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133936" comment="virtualbox-devel-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133937" comment="virtualbox-guest-desktop-icons-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133938" comment="virtualbox-guest-kmp-default-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133939" comment="virtualbox-guest-kmp-desktop-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133940" comment="virtualbox-guest-kmp-pae-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133941" comment="virtualbox-guest-tools-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133942" comment="virtualbox-guest-x11-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133943" comment="virtualbox-host-kmp-default-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133944" comment="virtualbox-host-kmp-desktop-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133945" comment="virtualbox-host-kmp-pae-5.0.28_k3.16.7_45-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133946" comment="virtualbox-host-source-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133947" comment="virtualbox-qt-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133948" comment="virtualbox-websrv-5.0.28-54.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133949" comment="xen-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133950" comment="xen-devel-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133951" comment="xen-doc-html-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133952" comment="xen-kmp-default-4.4.4_05_k3.16.7_45-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133953" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_45-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133954" comment="xen-libs-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133955" comment="xen-libs-32bit-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133956" comment="xen-tools-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133957" comment="xen-tools-domU-4.4.4_05-51.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133958" comment="xtables-addons-2.6-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133959" comment="xtables-addons-kmp-default-2.6_k3.16.7_45-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133960" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_45-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133961" comment="xtables-addons-kmp-pae-2.6_k3.16.7_45-24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133962" comment="xtables-addons-kmp-xen-2.6_k3.16.7_45-24.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8667</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-8667" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8667" source="CVE"/>
    <description>
    The rc4030_write function in hw/dma/rc4030.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via a large interval timer reload value.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009146189" comment="xen-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146190" comment="xen-devel-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146191" comment="xen-doc-html-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146192" comment="xen-kmp-default-4.4.4_06_k3.16.7_53-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146193" comment="xen-kmp-desktop-4.4.4_06_k3.16.7_53-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146194" comment="xen-libs-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146195" comment="xen-libs-32bit-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146196" comment="xen-tools-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146197" comment="xen-tools-domU-4.4.4_06-58.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8669</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-8669" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8669" source="CVE"/>
    <description>
    The serial_update_parameters function in hw/char/serial.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (divide-by-zero error and QEMU process crash) via vectors involving a value of divider greater than baud base.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009146189" comment="xen-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146190" comment="xen-devel-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146191" comment="xen-doc-html-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146192" comment="xen-kmp-default-4.4.4_06_k3.16.7_53-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146193" comment="xen-kmp-desktop-4.4.4_06_k3.16.7_53-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146194" comment="xen-libs-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146195" comment="xen-libs-32bit-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146196" comment="xen-tools-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146197" comment="xen-tools-domU-4.4.4_06-58.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8670</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-8670" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8670" source="CVE"/>
    <description>
    Integer signedness error in the dynamicGetbuf function in gd_io_dp.c in the GD Graphics Library (aka libgd) through 2.2.3, as used in PHP before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact via a crafted imagecreatefromstring call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133790" comment="apache2-mod_php5-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133791" comment="php5-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133792" comment="php5-bcmath-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133793" comment="php5-bz2-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133794" comment="php5-calendar-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133795" comment="php5-ctype-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133796" comment="php5-curl-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133797" comment="php5-dba-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133798" comment="php5-devel-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133799" comment="php5-dom-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133800" comment="php5-enchant-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133801" comment="php5-exif-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133802" comment="php5-fastcgi-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133803" comment="php5-fileinfo-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133804" comment="php5-firebird-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133805" comment="php5-fpm-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133806" comment="php5-ftp-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133807" comment="php5-gd-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133808" comment="php5-gettext-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133809" comment="php5-gmp-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133810" comment="php5-iconv-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133811" comment="php5-imap-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133812" comment="php5-intl-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133813" comment="php5-json-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133814" comment="php5-ldap-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133815" comment="php5-mbstring-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133816" comment="php5-mcrypt-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133817" comment="php5-mssql-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133818" comment="php5-mysql-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133819" comment="php5-odbc-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133820" comment="php5-opcache-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133821" comment="php5-openssl-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133822" comment="php5-pcntl-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133823" comment="php5-pdo-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133824" comment="php5-pear-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133825" comment="php5-pgsql-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133826" comment="php5-phar-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133827" comment="php5-posix-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133828" comment="php5-pspell-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133829" comment="php5-readline-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133830" comment="php5-shmop-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133831" comment="php5-snmp-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133832" comment="php5-soap-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133833" comment="php5-sockets-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133834" comment="php5-sqlite-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133835" comment="php5-suhosin-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133836" comment="php5-sysvmsg-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133837" comment="php5-sysvsem-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133838" comment="php5-sysvshm-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133839" comment="php5-tidy-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133840" comment="php5-tokenizer-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133841" comment="php5-wddx-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133842" comment="php5-xmlreader-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133843" comment="php5-xmlrpc-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133844" comment="php5-xmlwriter-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133845" comment="php5-xsl-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133846" comment="php5-zip-5.6.1-83.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133847" comment="php5-zlib-5.6.1-83.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8677</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-8677" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8677" source="CVE"/>
    <description>
    The AcquireQuantumPixels function in MagickCore/quantum.c in ImageMagick before 7.0.3-1 allows remote attackers to have unspecified impact via a crafted image file, which triggers a memory allocation failure.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133990" comment="ImageMagick-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133991" comment="ImageMagick-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133992" comment="ImageMagick-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133993" comment="ImageMagick-doc-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133994" comment="ImageMagick-extra-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133995" comment="libMagick++-6_Q16-5-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133996" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133997" comment="libMagick++-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133998" comment="libMagick++-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133999" comment="libMagickCore-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134000" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134001" comment="libMagickWand-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134002" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134003" comment="perl-PerlMagick-6.8.9.8-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8682</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-8682" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8682" source="CVE"/>
    <description>
    The ReadSCTImage function in coders/sct.c in GraphicsMagick 1.3.25 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted SCT header.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133963" comment="GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133964" comment="GraphicsMagick-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133990" comment="ImageMagick-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133991" comment="ImageMagick-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133992" comment="ImageMagick-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133993" comment="ImageMagick-doc-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133994" comment="ImageMagick-extra-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133965" comment="libGraphicsMagick++-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133966" comment="libGraphicsMagick++-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133967" comment="libGraphicsMagick-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133968" comment="libGraphicsMagick3-config-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133969" comment="libGraphicsMagickWand-Q16-2-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133995" comment="libMagick++-6_Q16-5-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133996" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133997" comment="libMagick++-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133998" comment="libMagick++-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133999" comment="libMagickCore-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134000" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134001" comment="libMagickWand-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134002" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133970" comment="perl-GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134003" comment="perl-PerlMagick-6.8.9.8-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8683</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-8683" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8683" source="CVE"/>
    <description>
    The ReadPCXImage function in coders/pcx.c in GraphicsMagick 1.3.25 allows remote attackers to have unspecified impact via a crafted image, which triggers a memory allocation failure and a "file truncation error for corrupt file."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133963" comment="GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133964" comment="GraphicsMagick-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133990" comment="ImageMagick-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133991" comment="ImageMagick-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133992" comment="ImageMagick-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133993" comment="ImageMagick-doc-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133994" comment="ImageMagick-extra-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133965" comment="libGraphicsMagick++-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133966" comment="libGraphicsMagick++-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133967" comment="libGraphicsMagick-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133968" comment="libGraphicsMagick3-config-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133969" comment="libGraphicsMagickWand-Q16-2-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133995" comment="libMagick++-6_Q16-5-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133996" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133997" comment="libMagick++-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133998" comment="libMagick++-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133999" comment="libMagickCore-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134000" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134001" comment="libMagickWand-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134002" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133970" comment="perl-GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134003" comment="perl-PerlMagick-6.8.9.8-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8684</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-8684" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8684" source="CVE"/>
    <description>
    The MagickMalloc function in magick/memory.c in GraphicsMagick 1.3.25 allows remote attackers to have unspecified impact via a crafted image, which triggers a memory allocation failure and a "file truncation error for corrupt file."
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009133963" comment="GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133964" comment="GraphicsMagick-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133990" comment="ImageMagick-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133991" comment="ImageMagick-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133992" comment="ImageMagick-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133993" comment="ImageMagick-doc-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133994" comment="ImageMagick-extra-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133965" comment="libGraphicsMagick++-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133966" comment="libGraphicsMagick++-devel-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133967" comment="libGraphicsMagick-Q16-3-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133968" comment="libGraphicsMagick3-config-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133969" comment="libGraphicsMagickWand-Q16-2-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133995" comment="libMagick++-6_Q16-5-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133996" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133997" comment="libMagick++-devel-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133998" comment="libMagick++-devel-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133999" comment="libMagickCore-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134000" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134001" comment="libMagickWand-6_Q16-2-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134002" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-34.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009133970" comment="perl-GraphicsMagick-1.3.20-12.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009134003" comment="perl-PerlMagick-6.8.9.8-34.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8690</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-8690" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8690" source="CVE"/>
    <description>
    The bmp_getdata function in libjasper/bmp/bmp_dec.c in JasPer before 1.900.5 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted BMP image in an imginfo command.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135287" comment="jasper-1.900.14-163.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135288" comment="libjasper-devel-1.900.14-163.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135289" comment="libjasper1-1.900.14-163.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135290" comment="libjasper1-32bit-1.900.14-163.24.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8691</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-8691" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8691" source="CVE"/>
    <description>
    The jpc_dec_process_siz function in libjasper/jpc/jpc_dec.c in JasPer before 1.900.4 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted XRsiz value in a BMP image to the imginfo command.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135287" comment="jasper-1.900.14-163.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135288" comment="libjasper-devel-1.900.14-163.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135289" comment="libjasper1-1.900.14-163.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135290" comment="libjasper1-32bit-1.900.14-163.24.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8692</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-8692" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8692" source="CVE"/>
    <description>
    The jpc_dec_process_siz function in libjasper/jpc/jpc_dec.c in JasPer before 1.900.4 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted YRsiz value in a BMP image to the imginfo command.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135287" comment="jasper-1.900.14-163.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135288" comment="libjasper-devel-1.900.14-163.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135289" comment="libjasper1-1.900.14-163.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135290" comment="libjasper1-32bit-1.900.14-163.24.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8693</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-8693" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8693" source="CVE"/>
    <description>
    Double free vulnerability in the mem_close function in jas_stream.c in JasPer before 1.900.10 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted BMP image to the imginfo command.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135287" comment="jasper-1.900.14-163.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135288" comment="libjasper-devel-1.900.14-163.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135289" comment="libjasper1-1.900.14-163.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135290" comment="libjasper1-32bit-1.900.14-163.24.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8704</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-8704" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8704" source="CVE"/>
    <description>
    An integer overflow in the process_bin_append_prepend function in Memcached, which is responsible for processing multiple commands of Memcached binary protocol, can be abused to cause heap overflow and lead to remote code execution.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135590" comment="memcached-1.4.20-2.3.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8705</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-8705" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8705" source="CVE"/>
    <description>
    Multiple integer overflows in process_bin_update function in Memcached, which is responsible for processing multiple commands of Memcached binary protocol, can be abused to cause heap overflow and lead to remote code execution.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135590" comment="memcached-1.4.20-2.3.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8706</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-8706" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8706" source="CVE"/>
    <description>
    An integer overflow in process_bin_sasl_auth function in Memcached, which is responsible for authentication commands of Memcached binary protocol, can be abused to cause heap overflow and lead to remote code execution.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135590" comment="memcached-1.4.20-2.3.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8707</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-8707" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8707" source="CVE"/>
    <description>
    An exploitable out of bounds write exists in the handling of compressed TIFF images in ImageMagicks's convert utility. A crafted TIFF document can lead to an out of bounds write which in particular circumstances could be leveraged into remote code execution. The vulnerability can be triggered through any user controlled TIFF that is handled by this functionality.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009145788" comment="ImageMagick-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145789" comment="ImageMagick-devel-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145790" comment="ImageMagick-devel-32bit-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145791" comment="ImageMagick-doc-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145792" comment="ImageMagick-extra-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145793" comment="libMagick++-6_Q16-5-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145794" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145795" comment="libMagick++-devel-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145796" comment="libMagick++-devel-32bit-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145797" comment="libMagickCore-6_Q16-2-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145798" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145799" comment="libMagickWand-6_Q16-2-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145800" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145801" comment="perl-PerlMagick-6.8.9.8-45.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8862</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-8862" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8862" source="CVE"/>
    <description>
    The AcquireMagickMemory function in MagickCore/memory.c in GraphicsMagick before 7.0.3.3 allows remote attackers to have unspecified impact via a crafted image, which triggers a memory allocation failure.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135591" comment="GraphicsMagick-1.3.20-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135592" comment="GraphicsMagick-devel-1.3.20-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145788" comment="ImageMagick-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145789" comment="ImageMagick-devel-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145790" comment="ImageMagick-devel-32bit-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145791" comment="ImageMagick-doc-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145792" comment="ImageMagick-extra-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135565" comment="libGraphicsMagick++-Q16-3-1.3.20-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135593" comment="libGraphicsMagick++-devel-1.3.20-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135594" comment="libGraphicsMagick-Q16-3-1.3.20-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135595" comment="libGraphicsMagick3-config-1.3.20-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135596" comment="libGraphicsMagickWand-Q16-2-1.3.20-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145793" comment="libMagick++-6_Q16-5-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145794" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145795" comment="libMagick++-devel-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145796" comment="libMagick++-devel-32bit-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145797" comment="libMagickCore-6_Q16-2-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145798" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145799" comment="libMagickWand-6_Q16-2-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145800" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135597" comment="perl-GraphicsMagick-1.3.20-15.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145801" comment="perl-PerlMagick-6.8.9.8-45.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8864</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-8864" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8864" source="CVE"/>
    <description>
    named in ISC BIND 9.x before 9.9.9-P4, 9.10.x before 9.10.4-P4, and 9.11.x before 9.11.0-P1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a DNAME record in the answer section of a response to a recursive query, related to db.c and resolver.c.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135327" comment="bind-9.9.6P1-2.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135328" comment="bind-chrootenv-9.9.6P1-2.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135329" comment="bind-devel-9.9.6P1-2.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135330" comment="bind-doc-9.9.6P1-2.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135331" comment="bind-libs-9.9.6P1-2.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135332" comment="bind-libs-32bit-9.9.6P1-2.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135333" comment="bind-lwresd-9.9.6P1-2.25.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135334" comment="bind-utils-9.9.6P1-2.25.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8866</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-8866" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8866" source="CVE"/>
    <description>
    The AcquireMagickMemory function in MagickCore/memory.c in GraphicsMagick 7.0.3.3 before 7.0.3.8 allows remote attackers to have unspecified impact via a crafted image, which triggers a memory allocation failure.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-8862.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009145802" comment="GraphicsMagick-1.3.20-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145803" comment="GraphicsMagick-devel-1.3.20-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145788" comment="ImageMagick-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145789" comment="ImageMagick-devel-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145790" comment="ImageMagick-devel-32bit-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145791" comment="ImageMagick-doc-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145792" comment="ImageMagick-extra-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145782" comment="libGraphicsMagick++-Q16-3-1.3.20-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145804" comment="libGraphicsMagick++-devel-1.3.20-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145805" comment="libGraphicsMagick-Q16-3-1.3.20-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145806" comment="libGraphicsMagick3-config-1.3.20-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145807" comment="libGraphicsMagickWand-Q16-2-1.3.20-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145793" comment="libMagick++-6_Q16-5-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145794" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145795" comment="libMagick++-devel-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145796" comment="libMagick++-devel-32bit-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145797" comment="libMagickCore-6_Q16-2-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145798" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145799" comment="libMagickWand-6_Q16-2-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145800" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145808" comment="perl-GraphicsMagick-1.3.20-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145801" comment="perl-PerlMagick-6.8.9.8-45.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8880</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-8880" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8880" source="CVE"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2011-4516. Reason: This candidate is a duplicate of CVE-2011-4516. Notes: All CVE users should reference CVE-2011-4516 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135287" comment="jasper-1.900.14-163.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135288" comment="libjasper-devel-1.900.14-163.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135289" comment="libjasper1-1.900.14-163.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135290" comment="libjasper1-32bit-1.900.14-163.24.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8881</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-8881" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8881" source="CVE"/>
    <description>
    ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2011-4517. Reason: This candidate is a duplicate of CVE-2011-4517. Notes: All CVE users should reference CVE-2011-4517 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135287" comment="jasper-1.900.14-163.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135288" comment="libjasper-devel-1.900.14-163.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135289" comment="libjasper1-1.900.14-163.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135290" comment="libjasper1-32bit-1.900.14-163.24.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8882</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-8882" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8882" source="CVE"/>
    <description>
    The jpc_dec_tilefini function in libjasper/jpc/jpc_dec.c in JasPer before 1.900.8 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135287" comment="jasper-1.900.14-163.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135288" comment="libjasper-devel-1.900.14-163.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135289" comment="libjasper1-1.900.14-163.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135290" comment="libjasper1-32bit-1.900.14-163.24.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8883</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-8883" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8883" source="CVE"/>
    <description>
    The jpc_dec_tiledecode function in jpc_dec.c in JasPer before 1.900.8 allows remote attackers to cause a denial of service (assertion failure) via a crafted file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135287" comment="jasper-1.900.14-163.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135288" comment="libjasper-devel-1.900.14-163.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135289" comment="libjasper1-1.900.14-163.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135290" comment="libjasper1-32bit-1.900.14-163.24.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8886</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-8886" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8886" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135287" comment="jasper-1.900.14-163.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135288" comment="libjasper-devel-1.900.14-163.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135289" comment="libjasper1-1.900.14-163.24.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135290" comment="libjasper1-32bit-1.900.14-163.24.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8909</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-8909" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8909" source="CVE"/>
    <description>
    The intel_hda_xfer function in hw/audio/intel-hda.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) via an entry with the same value for buffer length and pointer position.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009146189" comment="xen-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146190" comment="xen-devel-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146191" comment="xen-doc-html-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146192" comment="xen-kmp-default-4.4.4_06_k3.16.7_53-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146193" comment="xen-kmp-desktop-4.4.4_06_k3.16.7_53-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146194" comment="xen-libs-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146195" comment="xen-libs-32bit-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146196" comment="xen-tools-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146197" comment="xen-tools-domU-4.4.4_06-58.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20168910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-8910</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-8910" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8910" source="CVE"/>
    <description>
    The rtl8139_cplus_transmit function in hw/net/rtl8139.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (infinite loop and CPU consumption) by leveraging failure to limit the ring descriptor count.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009146189" comment="xen-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146190" comment="xen-devel-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146191" comment="xen-doc-html-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146192" comment="xen-kmp-default-4.4.4_06_k3.16.7_53-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146193" comment="xen-kmp-desktop-4.4.4_06_k3.16.7_53-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146194" comment="xen-libs-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146195" comment="xen-libs-32bit-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146196" comment="xen-tools-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146197" comment="xen-tools-domU-4.4.4_06-58.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9063</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9063" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135702" comment="MozillaFirefox-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135703" comment="MozillaFirefox-branding-upstream-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135704" comment="MozillaFirefox-buildsymbols-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135705" comment="MozillaFirefox-devel-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135706" comment="MozillaFirefox-translations-common-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135707" comment="MozillaFirefox-translations-other-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135708" comment="libfreebl3-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135709" comment="libfreebl3-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135710" comment="libsoftokn3-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135711" comment="libsoftokn3-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135712" comment="mozilla-nss-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135713" comment="mozilla-nss-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135714" comment="mozilla-nss-certs-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135715" comment="mozilla-nss-certs-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135716" comment="mozilla-nss-devel-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135717" comment="mozilla-nss-sysinit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135718" comment="mozilla-nss-sysinit-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135719" comment="mozilla-nss-tools-3.26.2-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9064</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9064" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9064" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135702" comment="MozillaFirefox-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135703" comment="MozillaFirefox-branding-upstream-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135704" comment="MozillaFirefox-buildsymbols-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135705" comment="MozillaFirefox-devel-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135706" comment="MozillaFirefox-translations-common-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135707" comment="MozillaFirefox-translations-other-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135708" comment="libfreebl3-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135709" comment="libfreebl3-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135710" comment="libsoftokn3-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135711" comment="libsoftokn3-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135712" comment="mozilla-nss-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135713" comment="mozilla-nss-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135714" comment="mozilla-nss-certs-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135715" comment="mozilla-nss-certs-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135716" comment="mozilla-nss-devel-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135717" comment="mozilla-nss-sysinit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135718" comment="mozilla-nss-sysinit-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135719" comment="mozilla-nss-tools-3.26.2-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9066</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9066" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9066" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135702" comment="MozillaFirefox-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135703" comment="MozillaFirefox-branding-upstream-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135704" comment="MozillaFirefox-buildsymbols-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135705" comment="MozillaFirefox-devel-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135706" comment="MozillaFirefox-translations-common-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135707" comment="MozillaFirefox-translations-other-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135708" comment="libfreebl3-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135709" comment="libfreebl3-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135710" comment="libsoftokn3-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135711" comment="libsoftokn3-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135712" comment="mozilla-nss-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135713" comment="mozilla-nss-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135714" comment="mozilla-nss-certs-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135715" comment="mozilla-nss-certs-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135716" comment="mozilla-nss-devel-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135717" comment="mozilla-nss-sysinit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135718" comment="mozilla-nss-sysinit-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135719" comment="mozilla-nss-tools-3.26.2-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9067</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9067" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9067" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135702" comment="MozillaFirefox-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135703" comment="MozillaFirefox-branding-upstream-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135704" comment="MozillaFirefox-buildsymbols-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135705" comment="MozillaFirefox-devel-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135706" comment="MozillaFirefox-translations-common-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135707" comment="MozillaFirefox-translations-other-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135708" comment="libfreebl3-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135709" comment="libfreebl3-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135710" comment="libsoftokn3-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135711" comment="libsoftokn3-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135712" comment="mozilla-nss-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135713" comment="mozilla-nss-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135714" comment="mozilla-nss-certs-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135715" comment="mozilla-nss-certs-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135716" comment="mozilla-nss-devel-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135717" comment="mozilla-nss-sysinit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135718" comment="mozilla-nss-sysinit-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135719" comment="mozilla-nss-tools-3.26.2-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9068</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9068" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9068" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135702" comment="MozillaFirefox-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135703" comment="MozillaFirefox-branding-upstream-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135704" comment="MozillaFirefox-buildsymbols-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135705" comment="MozillaFirefox-devel-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135706" comment="MozillaFirefox-translations-common-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135707" comment="MozillaFirefox-translations-other-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135708" comment="libfreebl3-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135709" comment="libfreebl3-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135710" comment="libsoftokn3-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135711" comment="libsoftokn3-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135712" comment="mozilla-nss-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135713" comment="mozilla-nss-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135714" comment="mozilla-nss-certs-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135715" comment="mozilla-nss-certs-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135716" comment="mozilla-nss-devel-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135717" comment="mozilla-nss-sysinit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135718" comment="mozilla-nss-sysinit-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135719" comment="mozilla-nss-tools-3.26.2-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9069</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9069" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9069" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135702" comment="MozillaFirefox-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135703" comment="MozillaFirefox-branding-upstream-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135704" comment="MozillaFirefox-buildsymbols-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135705" comment="MozillaFirefox-devel-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135706" comment="MozillaFirefox-translations-common-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135707" comment="MozillaFirefox-translations-other-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135708" comment="libfreebl3-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135709" comment="libfreebl3-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135710" comment="libsoftokn3-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135711" comment="libsoftokn3-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135712" comment="mozilla-nss-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135713" comment="mozilla-nss-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135714" comment="mozilla-nss-certs-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135715" comment="mozilla-nss-certs-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135716" comment="mozilla-nss-devel-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135717" comment="mozilla-nss-sysinit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135718" comment="mozilla-nss-sysinit-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135719" comment="mozilla-nss-tools-3.26.2-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9070</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9070" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9070" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135702" comment="MozillaFirefox-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135703" comment="MozillaFirefox-branding-upstream-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135704" comment="MozillaFirefox-buildsymbols-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135705" comment="MozillaFirefox-devel-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135706" comment="MozillaFirefox-translations-common-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135707" comment="MozillaFirefox-translations-other-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135708" comment="libfreebl3-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135709" comment="libfreebl3-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135710" comment="libsoftokn3-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135711" comment="libsoftokn3-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135712" comment="mozilla-nss-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135713" comment="mozilla-nss-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135714" comment="mozilla-nss-certs-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135715" comment="mozilla-nss-certs-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135716" comment="mozilla-nss-devel-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135717" comment="mozilla-nss-sysinit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135718" comment="mozilla-nss-sysinit-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135719" comment="mozilla-nss-tools-3.26.2-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9071</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9071" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9071" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135702" comment="MozillaFirefox-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135703" comment="MozillaFirefox-branding-upstream-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135704" comment="MozillaFirefox-buildsymbols-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135705" comment="MozillaFirefox-devel-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135706" comment="MozillaFirefox-translations-common-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135707" comment="MozillaFirefox-translations-other-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135708" comment="libfreebl3-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135709" comment="libfreebl3-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135710" comment="libsoftokn3-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135711" comment="libsoftokn3-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135712" comment="mozilla-nss-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135713" comment="mozilla-nss-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135714" comment="mozilla-nss-certs-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135715" comment="mozilla-nss-certs-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135716" comment="mozilla-nss-devel-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135717" comment="mozilla-nss-sysinit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135718" comment="mozilla-nss-sysinit-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135719" comment="mozilla-nss-tools-3.26.2-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9073</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9073" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9073" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135702" comment="MozillaFirefox-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135703" comment="MozillaFirefox-branding-upstream-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135704" comment="MozillaFirefox-buildsymbols-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135705" comment="MozillaFirefox-devel-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135706" comment="MozillaFirefox-translations-common-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135707" comment="MozillaFirefox-translations-other-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135708" comment="libfreebl3-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135709" comment="libfreebl3-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135710" comment="libsoftokn3-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135711" comment="libsoftokn3-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135712" comment="mozilla-nss-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135713" comment="mozilla-nss-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135714" comment="mozilla-nss-certs-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135715" comment="mozilla-nss-certs-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135716" comment="mozilla-nss-devel-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135717" comment="mozilla-nss-sysinit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135718" comment="mozilla-nss-sysinit-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135719" comment="mozilla-nss-tools-3.26.2-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9074</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9074" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9074" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135702" comment="MozillaFirefox-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135703" comment="MozillaFirefox-branding-upstream-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135704" comment="MozillaFirefox-buildsymbols-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135705" comment="MozillaFirefox-devel-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135706" comment="MozillaFirefox-translations-common-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135707" comment="MozillaFirefox-translations-other-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135708" comment="libfreebl3-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135709" comment="libfreebl3-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135710" comment="libsoftokn3-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135711" comment="libsoftokn3-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135712" comment="mozilla-nss-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135713" comment="mozilla-nss-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135714" comment="mozilla-nss-certs-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135715" comment="mozilla-nss-certs-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135716" comment="mozilla-nss-devel-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135717" comment="mozilla-nss-sysinit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135718" comment="mozilla-nss-sysinit-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135719" comment="mozilla-nss-tools-3.26.2-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9075</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9075" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9075" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135702" comment="MozillaFirefox-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135703" comment="MozillaFirefox-branding-upstream-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135704" comment="MozillaFirefox-buildsymbols-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135705" comment="MozillaFirefox-devel-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135706" comment="MozillaFirefox-translations-common-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135707" comment="MozillaFirefox-translations-other-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135708" comment="libfreebl3-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135709" comment="libfreebl3-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135710" comment="libsoftokn3-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135711" comment="libsoftokn3-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135712" comment="mozilla-nss-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135713" comment="mozilla-nss-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135714" comment="mozilla-nss-certs-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135715" comment="mozilla-nss-certs-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135716" comment="mozilla-nss-devel-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135717" comment="mozilla-nss-sysinit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135718" comment="mozilla-nss-sysinit-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135719" comment="mozilla-nss-tools-3.26.2-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9076</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9076" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9076" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135702" comment="MozillaFirefox-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135703" comment="MozillaFirefox-branding-upstream-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135704" comment="MozillaFirefox-buildsymbols-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135705" comment="MozillaFirefox-devel-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135706" comment="MozillaFirefox-translations-common-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135707" comment="MozillaFirefox-translations-other-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135708" comment="libfreebl3-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135709" comment="libfreebl3-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135710" comment="libsoftokn3-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135711" comment="libsoftokn3-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135712" comment="mozilla-nss-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135713" comment="mozilla-nss-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135714" comment="mozilla-nss-certs-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135715" comment="mozilla-nss-certs-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135716" comment="mozilla-nss-devel-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135717" comment="mozilla-nss-sysinit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135718" comment="mozilla-nss-sysinit-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135719" comment="mozilla-nss-tools-3.26.2-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9077</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9077" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135702" comment="MozillaFirefox-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135703" comment="MozillaFirefox-branding-upstream-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135704" comment="MozillaFirefox-buildsymbols-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135705" comment="MozillaFirefox-devel-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135706" comment="MozillaFirefox-translations-common-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135707" comment="MozillaFirefox-translations-other-50.0-88.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135708" comment="libfreebl3-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135709" comment="libfreebl3-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135710" comment="libsoftokn3-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135711" comment="libsoftokn3-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135712" comment="mozilla-nss-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135713" comment="mozilla-nss-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135714" comment="mozilla-nss-certs-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135715" comment="mozilla-nss-certs-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135716" comment="mozilla-nss-devel-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135717" comment="mozilla-nss-sysinit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135718" comment="mozilla-nss-sysinit-32bit-3.26.2-49.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135719" comment="mozilla-nss-tools-3.26.2-49.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9078</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9078" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9078" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136343" comment="MozillaFirefox-50.0.2-91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136344" comment="MozillaFirefox-branding-upstream-50.0.2-91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136345" comment="MozillaFirefox-buildsymbols-50.0.2-91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136346" comment="MozillaFirefox-devel-50.0.2-91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136347" comment="MozillaFirefox-translations-common-50.0.2-91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136348" comment="MozillaFirefox-translations-other-50.0.2-91.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9079</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9079" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9079" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136343" comment="MozillaFirefox-50.0.2-91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136344" comment="MozillaFirefox-branding-upstream-50.0.2-91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136345" comment="MozillaFirefox-buildsymbols-50.0.2-91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136346" comment="MozillaFirefox-devel-50.0.2-91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136347" comment="MozillaFirefox-translations-common-50.0.2-91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136348" comment="MozillaFirefox-translations-other-50.0.2-91.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136349" comment="MozillaThunderbird-45.5.1-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136350" comment="MozillaThunderbird-buildsymbols-45.5.1-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136351" comment="MozillaThunderbird-devel-45.5.1-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136352" comment="MozillaThunderbird-translations-common-45.5.1-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136353" comment="MozillaThunderbird-translations-other-45.5.1-55.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9080</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9080" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9080" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009143110" comment="MozillaFirefox-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143111" comment="MozillaFirefox-branding-upstream-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143112" comment="MozillaFirefox-buildsymbols-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143113" comment="MozillaFirefox-devel-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143114" comment="MozillaFirefox-translations-common-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143115" comment="MozillaFirefox-translations-other-50.1.0-94.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9112</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9112" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9112" source="CVE"/>
    <description>
    Floating Point Exception (aka FPE or divide by zero) in opj_pi_next_cprl function in openjp2/pi.c:523 in OpenJPEG 2.1.2.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009147259" comment="libopenjp2-7-2.1.0-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147260" comment="openjpeg2-2.1.0-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147261" comment="openjpeg2-devel-2.1.0-2.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9113</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9113" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9113" source="CVE"/>
    <description>
    There is a NULL pointer dereference in function imagetobmp of convertbmp.c:980 of OpenJPEG 2.1.2. image-&gt;comps[0].data is not assigned a value after initialization(NULL). Impact is Denial of Service.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009147259" comment="libopenjp2-7-2.1.0-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147260" comment="openjpeg2-2.1.0-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147261" comment="openjpeg2-devel-2.1.0-2.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9114</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9114" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9114" source="CVE"/>
    <description>
    There is a NULL Pointer Access in function imagetopnm of convert.c:1943(jp2) of OpenJPEG 2.1.2. image-&gt;comps[compno].data is not assigned a value after initialization(NULL). Impact is Denial of Service.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009147259" comment="libopenjp2-7-2.1.0-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147260" comment="openjpeg2-2.1.0-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147261" comment="openjpeg2-devel-2.1.0-2.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9115</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9115" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9115" source="CVE"/>
    <description>
    Heap Buffer Over-read in function imagetotga of convert.c(jp2):942 in OpenJPEG 2.1.2. Impact is Denial of Service. Someone must open a crafted j2k file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009147259" comment="libopenjp2-7-2.1.0-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147260" comment="openjpeg2-2.1.0-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147261" comment="openjpeg2-devel-2.1.0-2.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9116</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9116" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9116" source="CVE"/>
    <description>
    NULL Pointer Access in function imagetopnm of convert.c:2226(jp2) in OpenJPEG 2.1.2. Impact is Denial of Service. Someone must open a crafted j2k file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009147259" comment="libopenjp2-7-2.1.0-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147260" comment="openjpeg2-2.1.0-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147261" comment="openjpeg2-devel-2.1.0-2.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9117</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9117" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9117" source="CVE"/>
    <description>
    NULL Pointer Access in function imagetopnm of convert.c(jp2):1289 in OpenJPEG 2.1.2. Impact is Denial of Service. Someone must open a crafted j2k file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009147259" comment="libopenjp2-7-2.1.0-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147260" comment="openjpeg2-2.1.0-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147261" comment="openjpeg2-devel-2.1.0-2.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9118</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9118" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9118" source="CVE"/>
    <description>
    Heap Buffer Overflow (WRITE of size 4) in function pnmtoimage of convert.c:1719 in OpenJPEG 2.1.2.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009147259" comment="libopenjp2-7-2.1.0-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147260" comment="openjpeg2-2.1.0-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147261" comment="openjpeg2-devel-2.1.0-2.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9131</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9131" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9131" source="CVE"/>
    <description>
    named in ISC BIND 9.x before 9.9.9-P5, 9.10.x before 9.10.4-P5, and 9.11.x before 9.11.0-P2 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed response to an RTYPE ANY query.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009147262" comment="bind-9.9.6P1-2.28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147263" comment="bind-chrootenv-9.9.6P1-2.28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147264" comment="bind-devel-9.9.6P1-2.28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147265" comment="bind-doc-9.9.6P1-2.28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147266" comment="bind-libs-9.9.6P1-2.28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147267" comment="bind-libs-32bit-9.9.6P1-2.28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147268" comment="bind-lwresd-9.9.6P1-2.28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147269" comment="bind-utils-9.9.6P1-2.28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9137</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9137" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9137" source="CVE"/>
    <description>
    Use-after-free vulnerability in the CURLFile implementation in ext/curl/curl_file.c in PHP before 5.6.27 and 7.x before 7.0.12 allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted serialized data that is mishandled during __wakeup processing.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135802" comment="apache2-mod_php5-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135803" comment="php5-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135804" comment="php5-bcmath-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135805" comment="php5-bz2-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135806" comment="php5-calendar-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135807" comment="php5-ctype-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135808" comment="php5-curl-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135809" comment="php5-dba-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135810" comment="php5-devel-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135811" comment="php5-dom-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135812" comment="php5-enchant-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135813" comment="php5-exif-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135814" comment="php5-fastcgi-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135815" comment="php5-fileinfo-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135816" comment="php5-firebird-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135817" comment="php5-fpm-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135818" comment="php5-ftp-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135819" comment="php5-gd-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135820" comment="php5-gettext-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135821" comment="php5-gmp-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135822" comment="php5-iconv-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135823" comment="php5-imap-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135824" comment="php5-intl-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135825" comment="php5-json-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135826" comment="php5-ldap-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135827" comment="php5-mbstring-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135828" comment="php5-mcrypt-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135829" comment="php5-mssql-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135830" comment="php5-mysql-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135831" comment="php5-odbc-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135832" comment="php5-opcache-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135833" comment="php5-openssl-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135834" comment="php5-pcntl-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135835" comment="php5-pdo-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135836" comment="php5-pear-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135837" comment="php5-pgsql-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135838" comment="php5-phar-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135839" comment="php5-posix-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135840" comment="php5-pspell-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135841" comment="php5-readline-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135842" comment="php5-shmop-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135843" comment="php5-snmp-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135844" comment="php5-soap-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135845" comment="php5-sockets-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135846" comment="php5-sqlite-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135847" comment="php5-suhosin-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135848" comment="php5-sysvmsg-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135849" comment="php5-sysvsem-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135850" comment="php5-sysvshm-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135851" comment="php5-tidy-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135852" comment="php5-tokenizer-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135853" comment="php5-wddx-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135854" comment="php5-xmlreader-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135855" comment="php5-xmlrpc-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135856" comment="php5-xmlwriter-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135857" comment="php5-xsl-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135858" comment="php5-zip-5.6.1-86.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135859" comment="php5-zlib-5.6.1-86.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9139</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9139" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9139" source="CVE"/>
    <description>
    Cross-site scripting (XSS) vulnerability in Open Ticket Request System (OTRS) 3.3.x before 3.3.16, 4.0.x before 4.0.19, and 5.0.x before 5.0.14 allows remote attackers to inject arbitrary web script or HTML via a crafted attachment.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009135587" comment="otrs-3.3.16-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135588" comment="otrs-doc-3.3.16-7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009135589" comment="otrs-itsm-3.3.14-7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9147</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9147" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9147" source="CVE"/>
    <description>
    named in ISC BIND 9.9.9-P4, 9.9.9-S6, 9.10.4-P4, and 9.11.0-P1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a response containing an inconsistency among the DNSSEC-related RRsets.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009147262" comment="bind-9.9.6P1-2.28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147263" comment="bind-chrootenv-9.9.6P1-2.28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147264" comment="bind-devel-9.9.6P1-2.28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147265" comment="bind-doc-9.9.6P1-2.28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147266" comment="bind-libs-9.9.6P1-2.28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147267" comment="bind-libs-32bit-9.9.6P1-2.28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147268" comment="bind-lwresd-9.9.6P1-2.28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147269" comment="bind-utils-9.9.6P1-2.28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9273</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9273" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9273" source="CVE"/>
    <description>
    tiffsplit in libtiff 4.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted file, related to changing td_nstrips in TIFF_STRIPCHOP mode.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136807" comment="libtiff-devel-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136808" comment="libtiff-devel-32bit-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136809" comment="libtiff5-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136810" comment="libtiff5-32bit-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136811" comment="tiff-4.0.7-10.35.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9297</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9297" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9297" source="CVE"/>
    <description>
    The TIFFFetchNormalTag function in LibTiff 4.0.6 allows remote attackers to cause a denial of service (out-of-bounds read) via crafted TIFF_SETGET_C16ASCII or TIFF_SETGET_C32_ASCII tag values.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136807" comment="libtiff-devel-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136808" comment="libtiff-devel-32bit-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136809" comment="libtiff5-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136810" comment="libtiff5-32bit-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136811" comment="tiff-4.0.7-10.35.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9379</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9379" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9379" source="CVE"/>
    <description>
    The pygrub boot loader emulator in Xen, when S-expression output format is requested, allows local pygrub-using guest OS administrators to read or delete arbitrary files on the host via string quotes and S-expressions in the bootloader configuration file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009146189" comment="xen-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146190" comment="xen-devel-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146191" comment="xen-doc-html-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146192" comment="xen-kmp-default-4.4.4_06_k3.16.7_53-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146193" comment="xen-kmp-desktop-4.4.4_06_k3.16.7_53-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146194" comment="xen-libs-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146195" comment="xen-libs-32bit-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146196" comment="xen-tools-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146197" comment="xen-tools-domU-4.4.4_06-58.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9380</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9380" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9380" source="CVE"/>
    <description>
    The pygrub boot loader emulator in Xen, when nul-delimited output format is requested, allows local pygrub-using guest OS administrators to read or delete arbitrary files on the host via NUL bytes in the bootloader configuration file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009146189" comment="xen-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146190" comment="xen-devel-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146191" comment="xen-doc-html-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146192" comment="xen-kmp-default-4.4.4_06_k3.16.7_53-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146193" comment="xen-kmp-desktop-4.4.4_06_k3.16.7_53-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146194" comment="xen-libs-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146195" comment="xen-libs-32bit-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146196" comment="xen-tools-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146197" comment="xen-tools-domU-4.4.4_06-58.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9381</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9381" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9381" source="CVE"/>
    <description>
    Race condition in QEMU in Xen allows local x86 HVM guest OS administrators to gain privileges by changing certain data on shared rings, aka a "double fetch" vulnerability.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009146189" comment="xen-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146190" comment="xen-devel-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146191" comment="xen-doc-html-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146192" comment="xen-kmp-default-4.4.4_06_k3.16.7_53-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146193" comment="xen-kmp-desktop-4.4.4_06_k3.16.7_53-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146194" comment="xen-libs-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146195" comment="xen-libs-32bit-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146196" comment="xen-tools-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146197" comment="xen-tools-domU-4.4.4_06-58.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9382</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9382" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9382" source="CVE"/>
    <description>
    Xen 4.0.x through 4.7.x mishandle x86 task switches to VM86 mode, which allows local 32-bit x86 HVM guest OS users to gain privileges or cause a denial of service (guest OS crash) by leveraging a guest operating system that uses hardware task switching and allows a new task to start in VM86 mode.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009146189" comment="xen-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146190" comment="xen-devel-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146191" comment="xen-doc-html-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146192" comment="xen-kmp-default-4.4.4_06_k3.16.7_53-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146193" comment="xen-kmp-desktop-4.4.4_06_k3.16.7_53-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146194" comment="xen-libs-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146195" comment="xen-libs-32bit-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146196" comment="xen-tools-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146197" comment="xen-tools-domU-4.4.4_06-58.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9383</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9383" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9383" source="CVE"/>
    <description>
    Xen, when running on a 64-bit hypervisor, allows local x86 guest OS users to modify arbitrary memory and consequently obtain sensitive information, cause a denial of service (host crash), or execute arbitrary code on the host by leveraging broken emulation of bit test instructions.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009146189" comment="xen-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146190" comment="xen-devel-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146191" comment="xen-doc-html-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146192" comment="xen-kmp-default-4.4.4_06_k3.16.7_53-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146193" comment="xen-kmp-desktop-4.4.4_06_k3.16.7_53-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146194" comment="xen-libs-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146195" comment="xen-libs-32bit-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146196" comment="xen-tools-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146197" comment="xen-tools-domU-4.4.4_06-58.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9385</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9385" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9385" source="CVE"/>
    <description>
    The x86 segment base write emulation functionality in Xen 4.4.x through 4.7.x allows local x86 PV guest OS administrators to cause a denial of service (host crash) by leveraging lack of canonical address checks.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009146189" comment="xen-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146190" comment="xen-devel-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146191" comment="xen-doc-html-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146192" comment="xen-kmp-default-4.4.4_06_k3.16.7_53-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146193" comment="xen-kmp-desktop-4.4.4_06_k3.16.7_53-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146194" comment="xen-libs-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146195" comment="xen-libs-32bit-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146196" comment="xen-tools-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146197" comment="xen-tools-domU-4.4.4_06-58.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9386</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9386" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9386" source="CVE"/>
    <description>
    The x86 emulator in Xen does not properly treat x86 NULL segments as unusable when accessing memory, which might allow local HVM guest users to gain privileges via vectors involving "unexpected" base/limit values.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009146189" comment="xen-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146190" comment="xen-devel-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146191" comment="xen-doc-html-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146192" comment="xen-kmp-default-4.4.4_06_k3.16.7_53-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146193" comment="xen-kmp-desktop-4.4.4_06_k3.16.7_53-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146194" comment="xen-libs-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146195" comment="xen-libs-32bit-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146196" comment="xen-tools-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146197" comment="xen-tools-domU-4.4.4_06-58.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9427</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9427" source="CVE"/>
    <description>
    Integer overflow vulnerability in bdwgc before 2016-09-27 allows attackers to cause client of bdwgc denial of service (heap buffer overflow crash) and possibly execute arbitrary code via huge allocation.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009143097" comment="gc-7.2d-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143098" comment="gc-devel-7.2d-4.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143099" comment="libgc1-7.2d-4.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9444</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9444" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9444" source="CVE"/>
    <description>
    named in ISC BIND 9.x before 9.9.9-P5, 9.10.x before 9.10.4-P5, and 9.11.x before 9.11.0-P2 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted DS resource record in an answer.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009147262" comment="bind-9.9.6P1-2.28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147263" comment="bind-chrootenv-9.9.6P1-2.28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147264" comment="bind-devel-9.9.6P1-2.28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147265" comment="bind-doc-9.9.6P1-2.28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147266" comment="bind-libs-9.9.6P1-2.28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147267" comment="bind-libs-32bit-9.9.6P1-2.28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147268" comment="bind-lwresd-9.9.6P1-2.28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147269" comment="bind-utils-9.9.6P1-2.28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9445</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9445" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9445" source="CVE"/>
    <description>
    Integer overflow in the vmnc decoder in the gstreamer allows remote attackers to cause a denial of service (crash) via large width and height values, which triggers a buffer overflow.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009142992" comment="gstreamer-0_10-plugins-bad-0.10.23-15.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142993" comment="gstreamer-0_10-plugins-bad-32bit-0.10.23-15.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142994" comment="gstreamer-0_10-plugins-bad-devel-0.10.23-15.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142995" comment="gstreamer-0_10-plugins-bad-doc-0.10.23-15.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142996" comment="gstreamer-0_10-plugins-bad-lang-0.10.23-15.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142997" comment="gstreamer-plugins-bad-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142998" comment="gstreamer-plugins-bad-32bit-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142999" comment="gstreamer-plugins-bad-devel-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143000" comment="gstreamer-plugins-bad-doc-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143001" comment="gstreamer-plugins-bad-lang-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143002" comment="libgstbadbase-1_0-0-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143003" comment="libgstbadbase-1_0-0-32bit-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143004" comment="libgstbadvideo-1_0-0-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143005" comment="libgstbadvideo-1_0-0-32bit-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143006" comment="libgstbasecamerabinsrc-0_10-23-0.10.23-15.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143007" comment="libgstbasecamerabinsrc-0_10-23-32bit-0.10.23-15.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143008" comment="libgstbasecamerabinsrc-1_0-0-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143009" comment="libgstbasecamerabinsrc-1_0-0-32bit-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143010" comment="libgstbasevideo-0_10-23-0.10.23-15.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143011" comment="libgstbasevideo-0_10-23-32bit-0.10.23-15.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143012" comment="libgstcodecparsers-0_10-23-0.10.23-15.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143013" comment="libgstcodecparsers-0_10-23-32bit-0.10.23-15.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143014" comment="libgstcodecparsers-1_0-0-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143015" comment="libgstcodecparsers-1_0-0-32bit-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143016" comment="libgstgl-1_0-0-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143017" comment="libgstgl-1_0-0-32bit-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143018" comment="libgstinsertbin-1_0-0-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143019" comment="libgstinsertbin-1_0-0-32bit-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143020" comment="libgstmpegts-1_0-0-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143021" comment="libgstmpegts-1_0-0-32bit-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143022" comment="libgstphotography-0_10-23-0.10.23-15.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143023" comment="libgstphotography-0_10-23-32bit-0.10.23-15.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143024" comment="libgstphotography-1_0-0-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143025" comment="libgstphotography-1_0-0-32bit-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143026" comment="libgstsignalprocessor-0_10-23-0.10.23-15.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143027" comment="libgstsignalprocessor-0_10-23-32bit-0.10.23-15.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143028" comment="libgsturidownloader-1_0-0-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143029" comment="libgsturidownloader-1_0-0-32bit-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143030" comment="libgstvdp-0_10-23-0.10.23-15.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143031" comment="libgstvdp-0_10-23-32bit-0.10.23-15.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9446</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9446" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9446" source="CVE"/>
    <description>
    The vmnc decoder in the gstreamer does not initialize the render canvas, which allows remote attackers to obtain sensitive information as demonstrated by thumbnailing a simple 1 frame vmnc movie that does not draw to the allocated render canvas.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009142992" comment="gstreamer-0_10-plugins-bad-0.10.23-15.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142993" comment="gstreamer-0_10-plugins-bad-32bit-0.10.23-15.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142994" comment="gstreamer-0_10-plugins-bad-devel-0.10.23-15.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142995" comment="gstreamer-0_10-plugins-bad-doc-0.10.23-15.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142996" comment="gstreamer-0_10-plugins-bad-lang-0.10.23-15.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142997" comment="gstreamer-plugins-bad-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142998" comment="gstreamer-plugins-bad-32bit-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142999" comment="gstreamer-plugins-bad-devel-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143000" comment="gstreamer-plugins-bad-doc-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143001" comment="gstreamer-plugins-bad-lang-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143002" comment="libgstbadbase-1_0-0-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143003" comment="libgstbadbase-1_0-0-32bit-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143004" comment="libgstbadvideo-1_0-0-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143005" comment="libgstbadvideo-1_0-0-32bit-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143006" comment="libgstbasecamerabinsrc-0_10-23-0.10.23-15.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143007" comment="libgstbasecamerabinsrc-0_10-23-32bit-0.10.23-15.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143008" comment="libgstbasecamerabinsrc-1_0-0-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143009" comment="libgstbasecamerabinsrc-1_0-0-32bit-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143010" comment="libgstbasevideo-0_10-23-0.10.23-15.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143011" comment="libgstbasevideo-0_10-23-32bit-0.10.23-15.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143012" comment="libgstcodecparsers-0_10-23-0.10.23-15.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143013" comment="libgstcodecparsers-0_10-23-32bit-0.10.23-15.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143014" comment="libgstcodecparsers-1_0-0-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143015" comment="libgstcodecparsers-1_0-0-32bit-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143016" comment="libgstgl-1_0-0-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143017" comment="libgstgl-1_0-0-32bit-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143018" comment="libgstinsertbin-1_0-0-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143019" comment="libgstinsertbin-1_0-0-32bit-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143020" comment="libgstmpegts-1_0-0-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143021" comment="libgstmpegts-1_0-0-32bit-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143022" comment="libgstphotography-0_10-23-0.10.23-15.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143023" comment="libgstphotography-0_10-23-32bit-0.10.23-15.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143024" comment="libgstphotography-1_0-0-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143025" comment="libgstphotography-1_0-0-32bit-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143026" comment="libgstsignalprocessor-0_10-23-0.10.23-15.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143027" comment="libgstsignalprocessor-0_10-23-32bit-0.10.23-15.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143028" comment="libgsturidownloader-1_0-0-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143029" comment="libgsturidownloader-1_0-0-32bit-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143030" comment="libgstvdp-0_10-23-0.10.23-15.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143031" comment="libgstvdp-0_10-23-32bit-0.10.23-15.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9448</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9448" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9448" source="CVE"/>
    <description>
    The TIFFFetchNormalTag function in LibTiff 4.0.6 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) by setting the tags TIFF_SETGET_C16ASCII or TIFF_SETGET_C32_ASCII to values that access 0-byte arrays.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9297.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136807" comment="libtiff-devel-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136808" comment="libtiff-devel-32bit-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136809" comment="libtiff5-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136810" comment="libtiff5-32bit-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136811" comment="tiff-4.0.7-10.35.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9453</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9453" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9453" source="CVE"/>
    <description>
    The t2p_readwrite_pdf_image_tile function in LibTIFF allows remote attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a JPEG file with a TIFFTAG_JPEGTABLES of length one.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136807" comment="libtiff-devel-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136808" comment="libtiff-devel-32bit-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136809" comment="libtiff5-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136810" comment="libtiff5-32bit-4.0.7-10.35.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136811" comment="tiff-4.0.7-10.35.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9555</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9555" source="CVE"/>
    <description>
    The sctp_sf_ootb function in net/sctp/sm_statefuns.c in the Linux kernel before 4.8.8 lacks chunk-length checking for the first chunk, which allows remote attackers to cause a denial of service (out-of-bounds slab access) or possibly have unspecified other impact via crafted SCTP data.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009137932" comment="bbswitch-0.8-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137933" comment="bbswitch-kmp-default-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137934" comment="bbswitch-kmp-desktop-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137935" comment="bbswitch-kmp-pae-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137936" comment="bbswitch-kmp-xen-0.8_k3.16.7_53-3.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137937" comment="cloop-2.639-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137938" comment="cloop-kmp-default-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137939" comment="cloop-kmp-desktop-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137940" comment="cloop-kmp-pae-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137941" comment="cloop-kmp-xen-2.639_k3.16.7_53-14.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137942" comment="crash-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137943" comment="crash-devel-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137944" comment="crash-doc-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137945" comment="crash-eppic-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137946" comment="crash-gcore-7.0.8-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137947" comment="crash-kmp-default-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137948" comment="crash-kmp-desktop-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137949" comment="crash-kmp-pae-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137950" comment="crash-kmp-xen-7.0.8_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137951" comment="hdjmod-1.28-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137952" comment="hdjmod-kmp-default-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137953" comment="hdjmod-kmp-desktop-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137954" comment="hdjmod-kmp-pae-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137955" comment="hdjmod-kmp-xen-1.28_k3.16.7_53-18.27.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137956" comment="ipset-6.23-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137957" comment="ipset-devel-6.23-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137958" comment="ipset-kmp-default-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137959" comment="ipset-kmp-desktop-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137960" comment="ipset-kmp-pae-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137961" comment="ipset-kmp-xen-6.23_k3.16.7_53-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137962" comment="kernel-debug-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137963" comment="kernel-debug-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137964" comment="kernel-debug-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137965" comment="kernel-default-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137966" comment="kernel-default-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137967" comment="kernel-default-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137968" comment="kernel-desktop-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137969" comment="kernel-desktop-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137970" comment="kernel-desktop-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137971" comment="kernel-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137972" comment="kernel-docs-3.16.7-53.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137973" comment="kernel-ec2-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137974" comment="kernel-ec2-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137975" comment="kernel-ec2-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137976" comment="kernel-macros-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137977" comment="kernel-obs-build-3.16.7-53.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137978" comment="kernel-obs-qa-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137979" comment="kernel-pae-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137980" comment="kernel-pae-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137981" comment="kernel-pae-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137982" comment="kernel-source-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137983" comment="kernel-source-vanilla-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137984" comment="kernel-syms-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137985" comment="kernel-vanilla-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137986" comment="kernel-vanilla-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137987" comment="kernel-xen-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137988" comment="kernel-xen-base-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137989" comment="kernel-xen-devel-3.16.7-53.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137990" comment="libipset3-6.23-26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137991" comment="pcfclock-0.44-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137992" comment="pcfclock-kmp-default-0.44_k3.16.7_53-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137993" comment="pcfclock-kmp-desktop-0.44_k3.16.7_53-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137994" comment="pcfclock-kmp-pae-0.44_k3.16.7_53-260.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137995" comment="python-virtualbox-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137996" comment="vhba-kmp-20140629-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137997" comment="vhba-kmp-default-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137998" comment="vhba-kmp-desktop-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009137999" comment="vhba-kmp-pae-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138000" comment="vhba-kmp-xen-20140629_k3.16.7_53-2.26.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138001" comment="virtualbox-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138002" comment="virtualbox-devel-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138003" comment="virtualbox-guest-desktop-icons-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138004" comment="virtualbox-guest-kmp-default-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138005" comment="virtualbox-guest-kmp-desktop-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138006" comment="virtualbox-guest-kmp-pae-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138007" comment="virtualbox-guest-tools-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138008" comment="virtualbox-guest-x11-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138009" comment="virtualbox-host-kmp-default-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138010" comment="virtualbox-host-kmp-desktop-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138011" comment="virtualbox-host-kmp-pae-5.0.30_k3.16.7_53-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138012" comment="virtualbox-host-source-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138013" comment="virtualbox-qt-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138014" comment="virtualbox-websrv-5.0.30-62.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138015" comment="xen-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138016" comment="xen-devel-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138017" comment="xen-doc-html-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138018" comment="xen-kmp-default-4.4.4_05_k3.16.7_53-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138019" comment="xen-kmp-desktop-4.4.4_05_k3.16.7_53-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138020" comment="xen-libs-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138021" comment="xen-libs-32bit-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138022" comment="xen-tools-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138023" comment="xen-tools-domU-4.4.4_05-55.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138024" comment="xtables-addons-2.6-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138025" comment="xtables-addons-kmp-default-2.6_k3.16.7_53-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138026" comment="xtables-addons-kmp-desktop-2.6_k3.16.7_53-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138027" comment="xtables-addons-kmp-pae-2.6_k3.16.7_53-28.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009138028" comment="xtables-addons-kmp-xen-2.6_k3.16.7_53-28.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9556</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9556" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9556" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136599" comment="GraphicsMagick-1.3.20-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136600" comment="GraphicsMagick-devel-1.3.20-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145788" comment="ImageMagick-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145789" comment="ImageMagick-devel-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145790" comment="ImageMagick-devel-32bit-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145791" comment="ImageMagick-doc-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145792" comment="ImageMagick-extra-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136601" comment="libGraphicsMagick++-Q16-3-1.3.20-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136602" comment="libGraphicsMagick++-devel-1.3.20-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136603" comment="libGraphicsMagick-Q16-3-1.3.20-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136604" comment="libGraphicsMagick3-config-1.3.20-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136605" comment="libGraphicsMagickWand-Q16-2-1.3.20-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145793" comment="libMagick++-6_Q16-5-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145794" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145795" comment="libMagick++-devel-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145796" comment="libMagick++-devel-32bit-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145797" comment="libMagickCore-6_Q16-2-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145798" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145799" comment="libMagickWand-6_Q16-2-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145800" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136606" comment="perl-GraphicsMagick-1.3.20-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145801" comment="perl-PerlMagick-6.8.9.8-45.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9559</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9559" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9559" source="CVE"/>
    <description>
    coders/tiff.c in ImageMagick before 7.0.3.7 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009136599" comment="GraphicsMagick-1.3.20-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136600" comment="GraphicsMagick-devel-1.3.20-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136585" comment="ImageMagick-6.8.9.8-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136586" comment="ImageMagick-devel-6.8.9.8-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136587" comment="ImageMagick-devel-32bit-6.8.9.8-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136588" comment="ImageMagick-doc-6.8.9.8-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136589" comment="ImageMagick-extra-6.8.9.8-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136601" comment="libGraphicsMagick++-Q16-3-1.3.20-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136602" comment="libGraphicsMagick++-devel-1.3.20-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136603" comment="libGraphicsMagick-Q16-3-1.3.20-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136604" comment="libGraphicsMagick3-config-1.3.20-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136605" comment="libGraphicsMagickWand-Q16-2-1.3.20-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136590" comment="libMagick++-6_Q16-5-6.8.9.8-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136591" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136592" comment="libMagick++-devel-6.8.9.8-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136593" comment="libMagick++-devel-32bit-6.8.9.8-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136594" comment="libMagickCore-6_Q16-2-6.8.9.8-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136595" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136596" comment="libMagickWand-6_Q16-2-6.8.9.8-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136597" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-42.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136606" comment="perl-GraphicsMagick-1.3.20-18.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009136598" comment="perl-PerlMagick-6.8.9.8-42.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9572</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9572" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9572" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009147259" comment="libopenjp2-7-2.1.0-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147260" comment="openjpeg2-2.1.0-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147261" comment="openjpeg2-devel-2.1.0-2.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9573</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9573" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9573" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009147259" comment="libopenjp2-7-2.1.0-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147260" comment="openjpeg2-2.1.0-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147261" comment="openjpeg2-devel-2.1.0-2.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9580</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9580" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9580" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009147259" comment="libopenjp2-7-2.1.0-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147260" comment="openjpeg2-2.1.0-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147261" comment="openjpeg2-devel-2.1.0-2.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9581</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9581" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9581" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009147259" comment="libopenjp2-7-2.1.0-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147260" comment="openjpeg2-2.1.0-2.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147261" comment="openjpeg2-devel-2.1.0-2.3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9634</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9634" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9634" source="CVE"/>
    <description>
    Heap-based buffer overflow in the flx_decode_delta_fli function in gst/flx/gstflxdec.c in the FLIC decoder in GStreamer before 1.10.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via the start_line parameter.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009147074" comment="gstreamer-0_10-plugin-esd-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147075" comment="gstreamer-0_10-plugin-esd-32bit-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147076" comment="gstreamer-0_10-plugins-good-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147077" comment="gstreamer-0_10-plugins-good-32bit-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147078" comment="gstreamer-0_10-plugins-good-doc-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147079" comment="gstreamer-0_10-plugins-good-extra-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147080" comment="gstreamer-0_10-plugins-good-extra-32bit-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147081" comment="gstreamer-0_10-plugins-good-lang-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146989" comment="gstreamer-plugins-good-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146990" comment="gstreamer-plugins-good-32bit-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146991" comment="gstreamer-plugins-good-doc-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146992" comment="gstreamer-plugins-good-extra-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146993" comment="gstreamer-plugins-good-extra-32bit-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146994" comment="gstreamer-plugins-good-lang-1.4.3-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9635</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9635" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9635" source="CVE"/>
    <description>
    Heap-based buffer overflow in the flx_decode_delta_fli function in gst/flx/gstflxdec.c in the FLIC decoder in GStreamer before 1.10.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) by providing a 'skip count' that goes beyond initialized buffer.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009147074" comment="gstreamer-0_10-plugin-esd-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147075" comment="gstreamer-0_10-plugin-esd-32bit-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147076" comment="gstreamer-0_10-plugins-good-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147077" comment="gstreamer-0_10-plugins-good-32bit-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147078" comment="gstreamer-0_10-plugins-good-doc-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147079" comment="gstreamer-0_10-plugins-good-extra-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147080" comment="gstreamer-0_10-plugins-good-extra-32bit-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147081" comment="gstreamer-0_10-plugins-good-lang-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146989" comment="gstreamer-plugins-good-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146990" comment="gstreamer-plugins-good-32bit-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146991" comment="gstreamer-plugins-good-doc-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146992" comment="gstreamer-plugins-good-extra-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146993" comment="gstreamer-plugins-good-extra-32bit-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146994" comment="gstreamer-plugins-good-lang-1.4.3-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9636</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9636" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9636" source="CVE"/>
    <description>
    Heap-based buffer overflow in the flx_decode_delta_fli function in gst/flx/gstflxdec.c in the FLIC decoder in GStreamer before 1.10.2 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) by providing a 'write count' that goes beyond the initialized buffer.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009147074" comment="gstreamer-0_10-plugin-esd-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147075" comment="gstreamer-0_10-plugin-esd-32bit-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147076" comment="gstreamer-0_10-plugins-good-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147077" comment="gstreamer-0_10-plugins-good-32bit-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147078" comment="gstreamer-0_10-plugins-good-doc-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147079" comment="gstreamer-0_10-plugins-good-extra-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147080" comment="gstreamer-0_10-plugins-good-extra-32bit-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147081" comment="gstreamer-0_10-plugins-good-lang-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146989" comment="gstreamer-plugins-good-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146990" comment="gstreamer-plugins-good-32bit-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146991" comment="gstreamer-plugins-good-doc-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146992" comment="gstreamer-plugins-good-extra-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146993" comment="gstreamer-plugins-good-extra-32bit-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146994" comment="gstreamer-plugins-good-lang-1.4.3-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9637</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9637" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9637" source="CVE"/>
    <description>
    The (1) ioport_read and (2) ioport_write functions in Xen, when qemu is used as a device model within Xen, might allow local x86 HVM guest OS administrators to gain qemu process privileges via vectors involving an out-of-range ioport access.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009146189" comment="xen-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146190" comment="xen-devel-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146191" comment="xen-doc-html-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146192" comment="xen-kmp-default-4.4.4_06_k3.16.7_53-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146193" comment="xen-kmp-desktop-4.4.4_06_k3.16.7_53-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146194" comment="xen-libs-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146195" comment="xen-libs-32bit-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146196" comment="xen-tools-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146197" comment="xen-tools-domU-4.4.4_06-58.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9650</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9650" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9650" source="CVE"/>
    <description>
    Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly handled iframes, which allowed a remote attacker to bypass a no-referrer policy via a crafted HTML page.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009142897" comment="chromedriver-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142898" comment="chromium-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142896" comment="chromium-ffmpegsumo-55.0.2883.75-148.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9651</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9651" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9651" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009142897" comment="chromedriver-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142898" comment="chromium-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142896" comment="chromium-ffmpegsumo-55.0.2883.75-148.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9652</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9652" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9652" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009142897" comment="chromedriver-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142898" comment="chromium-55.0.2883.75-148.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009142896" comment="chromium-ffmpegsumo-55.0.2883.75-148.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9773</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9773" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9773" source="CVE"/>
    <description>
    Heap-based buffer overflow in the IsPixelGray function in MagickCore/pixel-accessor.h in ImageMagick 7.0.3.8 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted image file.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-9556.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009145788" comment="ImageMagick-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145789" comment="ImageMagick-devel-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145790" comment="ImageMagick-devel-32bit-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145791" comment="ImageMagick-doc-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145792" comment="ImageMagick-extra-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145793" comment="libMagick++-6_Q16-5-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145794" comment="libMagick++-6_Q16-5-32bit-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145795" comment="libMagick++-devel-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145796" comment="libMagick++-devel-32bit-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145797" comment="libMagickCore-6_Q16-2-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145798" comment="libMagickCore-6_Q16-2-32bit-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145799" comment="libMagickWand-6_Q16-2-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145800" comment="libMagickWand-6_Q16-2-32bit-6.8.9.8-45.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145801" comment="perl-PerlMagick-6.8.9.8-45.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9807</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9807" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9807" source="CVE"/>
    <description>
    The flx_decode_chunks function in gst/flx/gstflxdec.c in GStreamer before 1.10.2 allows remote attackers to cause a denial of service (invalid memory read and crash) via a crafted FLIC file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009147074" comment="gstreamer-0_10-plugin-esd-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147075" comment="gstreamer-0_10-plugin-esd-32bit-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147076" comment="gstreamer-0_10-plugins-good-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147077" comment="gstreamer-0_10-plugins-good-32bit-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147078" comment="gstreamer-0_10-plugins-good-doc-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147079" comment="gstreamer-0_10-plugins-good-extra-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147080" comment="gstreamer-0_10-plugins-good-extra-32bit-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147081" comment="gstreamer-0_10-plugins-good-lang-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146989" comment="gstreamer-plugins-good-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146990" comment="gstreamer-plugins-good-32bit-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146991" comment="gstreamer-plugins-good-doc-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146992" comment="gstreamer-plugins-good-extra-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146993" comment="gstreamer-plugins-good-extra-32bit-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146994" comment="gstreamer-plugins-good-lang-1.4.3-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9808</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9808" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9808" source="CVE"/>
    <description>
    The FLIC decoder in GStreamer before 1.10.2 allows remote attackers to cause a denial of service (out-of-bounds write and crash) via a crafted series of skip and count pairs.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009147074" comment="gstreamer-0_10-plugin-esd-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147075" comment="gstreamer-0_10-plugin-esd-32bit-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147076" comment="gstreamer-0_10-plugins-good-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147077" comment="gstreamer-0_10-plugins-good-32bit-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147078" comment="gstreamer-0_10-plugins-good-doc-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147079" comment="gstreamer-0_10-plugins-good-extra-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147080" comment="gstreamer-0_10-plugins-good-extra-32bit-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147081" comment="gstreamer-0_10-plugins-good-lang-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146989" comment="gstreamer-plugins-good-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146990" comment="gstreamer-plugins-good-32bit-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146991" comment="gstreamer-plugins-good-doc-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146992" comment="gstreamer-plugins-good-extra-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146993" comment="gstreamer-plugins-good-extra-32bit-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146994" comment="gstreamer-plugins-good-lang-1.4.3-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9809</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9809" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9809" source="CVE"/>
    <description>
    Off-by-one error in the gst_h264_parse_set_caps function in GStreamer before 1.10.2 allows remote attackers to have unspecified impact via a crafted file, which triggers an out-of-bounds read.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009147018" comment="gstreamer-0_10-plugins-bad-0.10.23-15.6.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147019" comment="gstreamer-0_10-plugins-bad-32bit-0.10.23-15.6.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147020" comment="gstreamer-0_10-plugins-bad-devel-0.10.23-15.6.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147021" comment="gstreamer-0_10-plugins-bad-doc-0.10.23-15.6.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147022" comment="gstreamer-0_10-plugins-bad-lang-0.10.23-15.6.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146995" comment="gstreamer-plugins-bad-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146996" comment="gstreamer-plugins-bad-32bit-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146997" comment="gstreamer-plugins-bad-devel-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146998" comment="gstreamer-plugins-bad-doc-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146999" comment="gstreamer-plugins-bad-lang-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147000" comment="libgstbadbase-1_0-0-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147001" comment="libgstbadbase-1_0-0-32bit-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147002" comment="libgstbadvideo-1_0-0-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147003" comment="libgstbadvideo-1_0-0-32bit-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147023" comment="libgstbasecamerabinsrc-0_10-23-0.10.23-15.6.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147024" comment="libgstbasecamerabinsrc-0_10-23-32bit-0.10.23-15.6.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147004" comment="libgstbasecamerabinsrc-1_0-0-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147005" comment="libgstbasecamerabinsrc-1_0-0-32bit-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147025" comment="libgstbasevideo-0_10-23-0.10.23-15.6.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147026" comment="libgstbasevideo-0_10-23-32bit-0.10.23-15.6.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147027" comment="libgstcodecparsers-0_10-23-0.10.23-15.6.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147028" comment="libgstcodecparsers-0_10-23-32bit-0.10.23-15.6.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147006" comment="libgstcodecparsers-1_0-0-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147007" comment="libgstcodecparsers-1_0-0-32bit-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147008" comment="libgstgl-1_0-0-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147009" comment="libgstgl-1_0-0-32bit-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147010" comment="libgstinsertbin-1_0-0-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147011" comment="libgstinsertbin-1_0-0-32bit-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147012" comment="libgstmpegts-1_0-0-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147013" comment="libgstmpegts-1_0-0-32bit-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147029" comment="libgstphotography-0_10-23-0.10.23-15.6.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147030" comment="libgstphotography-0_10-23-32bit-0.10.23-15.6.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147014" comment="libgstphotography-1_0-0-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147015" comment="libgstphotography-1_0-0-32bit-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147031" comment="libgstsignalprocessor-0_10-23-0.10.23-15.6.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147032" comment="libgstsignalprocessor-0_10-23-32bit-0.10.23-15.6.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147016" comment="libgsturidownloader-1_0-0-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147017" comment="libgsturidownloader-1_0-0-32bit-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147033" comment="libgstvdp-0_10-23-0.10.23-15.6.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147034" comment="libgstvdp-0_10-23-32bit-0.10.23-15.6.2 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9810</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9810" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9810" source="CVE"/>
    <description>
    The gst_decode_chain_free_internal function in the flxdex decoder in gst-plugins-good in GStreamer before 1.10.2 allows remote attackers to cause a denial of service (invalid memory read and crash) via an invalid file, which triggers an incorrect unref call.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009147074" comment="gstreamer-0_10-plugin-esd-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147075" comment="gstreamer-0_10-plugin-esd-32bit-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147076" comment="gstreamer-0_10-plugins-good-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147077" comment="gstreamer-0_10-plugins-good-32bit-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147078" comment="gstreamer-0_10-plugins-good-doc-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147079" comment="gstreamer-0_10-plugins-good-extra-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147080" comment="gstreamer-0_10-plugins-good-extra-32bit-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147081" comment="gstreamer-0_10-plugins-good-lang-0.10.31-13.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146989" comment="gstreamer-plugins-good-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146990" comment="gstreamer-plugins-good-32bit-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146991" comment="gstreamer-plugins-good-doc-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146992" comment="gstreamer-plugins-good-extra-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146993" comment="gstreamer-plugins-good-extra-32bit-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146994" comment="gstreamer-plugins-good-lang-1.4.3-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9811</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9811" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9811" source="CVE"/>
    <description>
    The windows_icon_typefind function in gst-plugins-base in GStreamer before 1.10.2, when G_SLICE is set to always-malloc, allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted ico file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009147082" comment="gstreamer-0_10-plugin-gnomevfs-0.10.36-11.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147083" comment="gstreamer-0_10-plugins-base-0.10.36-11.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147084" comment="gstreamer-0_10-plugins-base-32bit-0.10.36-11.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147085" comment="gstreamer-0_10-plugins-base-devel-0.10.36-11.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147086" comment="gstreamer-0_10-plugins-base-doc-0.10.36-11.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147087" comment="gstreamer-0_10-plugins-base-lang-0.10.36-11.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147036" comment="gstreamer-plugins-base-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147037" comment="gstreamer-plugins-base-32bit-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147038" comment="gstreamer-plugins-base-devel-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147039" comment="gstreamer-plugins-base-doc-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147040" comment="gstreamer-plugins-base-lang-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147041" comment="libgstallocators-1_0-0-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147042" comment="libgstallocators-1_0-0-32bit-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147088" comment="libgstapp-0_10-0-0.10.36-11.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147089" comment="libgstapp-0_10-0-32bit-0.10.36-11.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147043" comment="libgstapp-1_0-0-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147044" comment="libgstapp-1_0-0-32bit-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147045" comment="libgstaudio-1_0-0-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147046" comment="libgstaudio-1_0-0-32bit-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147047" comment="libgstfft-1_0-0-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147048" comment="libgstfft-1_0-0-32bit-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147090" comment="libgstinterfaces-0_10-0-0.10.36-11.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147091" comment="libgstinterfaces-0_10-0-32bit-0.10.36-11.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147049" comment="libgstpbutils-1_0-0-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147050" comment="libgstpbutils-1_0-0-32bit-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147051" comment="libgstriff-1_0-0-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147052" comment="libgstriff-1_0-0-32bit-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147053" comment="libgstrtp-1_0-0-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147054" comment="libgstrtp-1_0-0-32bit-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147055" comment="libgstrtsp-1_0-0-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147056" comment="libgstrtsp-1_0-0-32bit-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147057" comment="libgstsdp-1_0-0-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147058" comment="libgstsdp-1_0-0-32bit-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147059" comment="libgsttag-1_0-0-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147060" comment="libgsttag-1_0-0-32bit-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147061" comment="libgstvideo-1_0-0-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147062" comment="libgstvideo-1_0-0-32bit-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147063" comment="typelib-1_0-GstAllocators-1_0-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147092" comment="typelib-1_0-GstApp-0_10-0.10.36-11.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147064" comment="typelib-1_0-GstApp-1_0-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147065" comment="typelib-1_0-GstAudio-1_0-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147066" comment="typelib-1_0-GstFft-1_0-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147093" comment="typelib-1_0-GstInterfaces-0_10-0.10.36-11.3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147067" comment="typelib-1_0-GstPbutils-1_0-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147068" comment="typelib-1_0-GstRiff-1_0-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147069" comment="typelib-1_0-GstRtp-1_0-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147070" comment="typelib-1_0-GstRtsp-1_0-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147071" comment="typelib-1_0-GstSdp-1_0-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147072" comment="typelib-1_0-GstTag-1_0-1.4.3-3.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147073" comment="typelib-1_0-GstVideo-1_0-1.4.3-3.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9812</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9812" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9812" source="CVE"/>
    <description>
    The gst_mpegts_section_new function in the mpegts decoder in GStreamer before 1.10.2 allows remote attackers to cause a denial of service (out-of-bounds read) via a too small section.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009146995" comment="gstreamer-plugins-bad-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146996" comment="gstreamer-plugins-bad-32bit-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146997" comment="gstreamer-plugins-bad-devel-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146998" comment="gstreamer-plugins-bad-doc-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146999" comment="gstreamer-plugins-bad-lang-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147000" comment="libgstbadbase-1_0-0-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147001" comment="libgstbadbase-1_0-0-32bit-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147002" comment="libgstbadvideo-1_0-0-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147003" comment="libgstbadvideo-1_0-0-32bit-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147004" comment="libgstbasecamerabinsrc-1_0-0-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147005" comment="libgstbasecamerabinsrc-1_0-0-32bit-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147006" comment="libgstcodecparsers-1_0-0-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147007" comment="libgstcodecparsers-1_0-0-32bit-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147008" comment="libgstgl-1_0-0-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147009" comment="libgstgl-1_0-0-32bit-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147010" comment="libgstinsertbin-1_0-0-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147011" comment="libgstinsertbin-1_0-0-32bit-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147012" comment="libgstmpegts-1_0-0-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147013" comment="libgstmpegts-1_0-0-32bit-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147014" comment="libgstphotography-1_0-0-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147015" comment="libgstphotography-1_0-0-32bit-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147016" comment="libgsturidownloader-1_0-0-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147017" comment="libgsturidownloader-1_0-0-32bit-1.4.3-6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9813</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9813" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9813" source="CVE"/>
    <description>
    The _parse_pat function in the mpegts parser in GStreamer before 1.10.2 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a crafted file.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009146995" comment="gstreamer-plugins-bad-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146996" comment="gstreamer-plugins-bad-32bit-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146997" comment="gstreamer-plugins-bad-devel-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146998" comment="gstreamer-plugins-bad-doc-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146999" comment="gstreamer-plugins-bad-lang-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147000" comment="libgstbadbase-1_0-0-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147001" comment="libgstbadbase-1_0-0-32bit-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147002" comment="libgstbadvideo-1_0-0-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147003" comment="libgstbadvideo-1_0-0-32bit-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147004" comment="libgstbasecamerabinsrc-1_0-0-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147005" comment="libgstbasecamerabinsrc-1_0-0-32bit-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147006" comment="libgstcodecparsers-1_0-0-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147007" comment="libgstcodecparsers-1_0-0-32bit-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147008" comment="libgstgl-1_0-0-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147009" comment="libgstgl-1_0-0-32bit-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147010" comment="libgstinsertbin-1_0-0-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147011" comment="libgstinsertbin-1_0-0-32bit-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147012" comment="libgstmpegts-1_0-0-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147013" comment="libgstmpegts-1_0-0-32bit-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147014" comment="libgstphotography-1_0-0-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147015" comment="libgstphotography-1_0-0-32bit-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147016" comment="libgsturidownloader-1_0-0-1.4.3-6.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009147017" comment="libgsturidownloader-1_0-0-32bit-1.4.3-6.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9830</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9830" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9830" source="CVE"/>
    <description>
    The MagickRealloc function in memory.c in Graphicsmagick 1.3.25 allows remote attackers to cause a denial of service (crash) via large dimensions in a jpeg image.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009145802" comment="GraphicsMagick-1.3.20-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145803" comment="GraphicsMagick-devel-1.3.20-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145782" comment="libGraphicsMagick++-Q16-3-1.3.20-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145804" comment="libGraphicsMagick++-devel-1.3.20-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145805" comment="libGraphicsMagick-Q16-3-1.3.20-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145806" comment="libGraphicsMagick3-config-1.3.20-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145807" comment="libGraphicsMagickWand-Q16-2-1.3.20-21.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145808" comment="perl-GraphicsMagick-1.3.20-21.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9840</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9840" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9840" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009144594" comment="libminizip1-1.2.8-5.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009144595" comment="libz1-1.2.8-5.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009144596" comment="libz1-32bit-1.2.8-5.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009144597" comment="minizip-devel-1.2.8-5.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009144598" comment="zlib-1.2.8-5.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009144599" comment="zlib-devel-1.2.8-5.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009144600" comment="zlib-devel-32bit-1.2.8-5.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009144601" comment="zlib-devel-static-1.2.8-5.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009144602" comment="zlib-devel-static-32bit-1.2.8-5.8.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9841</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9841" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9841" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009144594" comment="libminizip1-1.2.8-5.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009144595" comment="libz1-1.2.8-5.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009144596" comment="libz1-32bit-1.2.8-5.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009144597" comment="minizip-devel-1.2.8-5.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009144598" comment="zlib-1.2.8-5.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009144599" comment="zlib-devel-1.2.8-5.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009144600" comment="zlib-devel-32bit-1.2.8-5.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009144601" comment="zlib-devel-static-1.2.8-5.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009144602" comment="zlib-devel-static-32bit-1.2.8-5.8.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9842</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9842" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9842" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009144594" comment="libminizip1-1.2.8-5.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009144595" comment="libz1-1.2.8-5.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009144596" comment="libz1-32bit-1.2.8-5.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009144597" comment="minizip-devel-1.2.8-5.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009144598" comment="zlib-1.2.8-5.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009144599" comment="zlib-devel-1.2.8-5.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009144600" comment="zlib-devel-32bit-1.2.8-5.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009144601" comment="zlib-devel-static-1.2.8-5.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009144602" comment="zlib-devel-static-32bit-1.2.8-5.8.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9843</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9843" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9843" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009144594" comment="libminizip1-1.2.8-5.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009144595" comment="libz1-1.2.8-5.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009144596" comment="libz1-32bit-1.2.8-5.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009144597" comment="minizip-devel-1.2.8-5.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009144598" comment="zlib-1.2.8-5.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009144599" comment="zlib-devel-1.2.8-5.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009144600" comment="zlib-devel-32bit-1.2.8-5.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009144601" comment="zlib-devel-static-1.2.8-5.8.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009144602" comment="zlib-devel-static-32bit-1.2.8-5.8.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9893</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9893" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9893" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009143110" comment="MozillaFirefox-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143111" comment="MozillaFirefox-branding-upstream-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143112" comment="MozillaFirefox-buildsymbols-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143113" comment="MozillaFirefox-devel-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143114" comment="MozillaFirefox-translations-common-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143115" comment="MozillaFirefox-translations-other-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146172" comment="MozillaThunderbird-45.6.0-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146173" comment="MozillaThunderbird-buildsymbols-45.6.0-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146174" comment="MozillaThunderbird-devel-45.6.0-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146175" comment="MozillaThunderbird-translations-common-45.6.0-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146176" comment="MozillaThunderbird-translations-other-45.6.0-58.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9894</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9894" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9894" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009143110" comment="MozillaFirefox-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143111" comment="MozillaFirefox-branding-upstream-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143112" comment="MozillaFirefox-buildsymbols-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143113" comment="MozillaFirefox-devel-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143114" comment="MozillaFirefox-translations-common-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143115" comment="MozillaFirefox-translations-other-50.1.0-94.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9895</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9895" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9895" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009143110" comment="MozillaFirefox-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143111" comment="MozillaFirefox-branding-upstream-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143112" comment="MozillaFirefox-buildsymbols-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143113" comment="MozillaFirefox-devel-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143114" comment="MozillaFirefox-translations-common-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143115" comment="MozillaFirefox-translations-other-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146172" comment="MozillaThunderbird-45.6.0-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146173" comment="MozillaThunderbird-buildsymbols-45.6.0-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146174" comment="MozillaThunderbird-devel-45.6.0-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146175" comment="MozillaThunderbird-translations-common-45.6.0-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146176" comment="MozillaThunderbird-translations-other-45.6.0-58.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9896</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9896" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9896" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009143110" comment="MozillaFirefox-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143111" comment="MozillaFirefox-branding-upstream-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143112" comment="MozillaFirefox-buildsymbols-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143113" comment="MozillaFirefox-devel-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143114" comment="MozillaFirefox-translations-common-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143115" comment="MozillaFirefox-translations-other-50.1.0-94.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9897</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9897" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9897" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009143110" comment="MozillaFirefox-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143111" comment="MozillaFirefox-branding-upstream-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143112" comment="MozillaFirefox-buildsymbols-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143113" comment="MozillaFirefox-devel-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143114" comment="MozillaFirefox-translations-common-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143115" comment="MozillaFirefox-translations-other-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146172" comment="MozillaThunderbird-45.6.0-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146173" comment="MozillaThunderbird-buildsymbols-45.6.0-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146174" comment="MozillaThunderbird-devel-45.6.0-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146175" comment="MozillaThunderbird-translations-common-45.6.0-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146176" comment="MozillaThunderbird-translations-other-45.6.0-58.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9898</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9898" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9898" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009143110" comment="MozillaFirefox-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143111" comment="MozillaFirefox-branding-upstream-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143112" comment="MozillaFirefox-buildsymbols-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143113" comment="MozillaFirefox-devel-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143114" comment="MozillaFirefox-translations-common-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143115" comment="MozillaFirefox-translations-other-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146172" comment="MozillaThunderbird-45.6.0-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146173" comment="MozillaThunderbird-buildsymbols-45.6.0-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146174" comment="MozillaThunderbird-devel-45.6.0-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146175" comment="MozillaThunderbird-translations-common-45.6.0-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146176" comment="MozillaThunderbird-translations-other-45.6.0-58.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9899</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9899" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9899" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009143110" comment="MozillaFirefox-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143111" comment="MozillaFirefox-branding-upstream-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143112" comment="MozillaFirefox-buildsymbols-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143113" comment="MozillaFirefox-devel-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143114" comment="MozillaFirefox-translations-common-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143115" comment="MozillaFirefox-translations-other-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146172" comment="MozillaThunderbird-45.6.0-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146173" comment="MozillaThunderbird-buildsymbols-45.6.0-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146174" comment="MozillaThunderbird-devel-45.6.0-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146175" comment="MozillaThunderbird-translations-common-45.6.0-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146176" comment="MozillaThunderbird-translations-other-45.6.0-58.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9900</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9900" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9900" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009143110" comment="MozillaFirefox-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143111" comment="MozillaFirefox-branding-upstream-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143112" comment="MozillaFirefox-buildsymbols-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143113" comment="MozillaFirefox-devel-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143114" comment="MozillaFirefox-translations-common-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143115" comment="MozillaFirefox-translations-other-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146172" comment="MozillaThunderbird-45.6.0-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146173" comment="MozillaThunderbird-buildsymbols-45.6.0-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146174" comment="MozillaThunderbird-devel-45.6.0-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146175" comment="MozillaThunderbird-translations-common-45.6.0-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146176" comment="MozillaThunderbird-translations-other-45.6.0-58.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9901</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9901" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9901" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009143110" comment="MozillaFirefox-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143111" comment="MozillaFirefox-branding-upstream-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143112" comment="MozillaFirefox-buildsymbols-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143113" comment="MozillaFirefox-devel-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143114" comment="MozillaFirefox-translations-common-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143115" comment="MozillaFirefox-translations-other-50.1.0-94.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9902</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9902" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9902" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009143110" comment="MozillaFirefox-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143111" comment="MozillaFirefox-branding-upstream-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143112" comment="MozillaFirefox-buildsymbols-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143113" comment="MozillaFirefox-devel-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143114" comment="MozillaFirefox-translations-common-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143115" comment="MozillaFirefox-translations-other-50.1.0-94.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9903</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9903" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9903" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009143110" comment="MozillaFirefox-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143111" comment="MozillaFirefox-branding-upstream-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143112" comment="MozillaFirefox-buildsymbols-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143113" comment="MozillaFirefox-devel-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143114" comment="MozillaFirefox-translations-common-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143115" comment="MozillaFirefox-translations-other-50.1.0-94.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9904</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9904" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9904" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009143110" comment="MozillaFirefox-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143111" comment="MozillaFirefox-branding-upstream-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143112" comment="MozillaFirefox-buildsymbols-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143113" comment="MozillaFirefox-devel-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143114" comment="MozillaFirefox-translations-common-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009143115" comment="MozillaFirefox-translations-other-50.1.0-94.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146172" comment="MozillaThunderbird-45.6.0-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146173" comment="MozillaThunderbird-buildsymbols-45.6.0-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146174" comment="MozillaThunderbird-devel-45.6.0-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146175" comment="MozillaThunderbird-translations-common-45.6.0-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146176" comment="MozillaThunderbird-translations-other-45.6.0-58.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9905</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9905" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9905" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009146172" comment="MozillaThunderbird-45.6.0-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146173" comment="MozillaThunderbird-buildsymbols-45.6.0-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146174" comment="MozillaThunderbird-devel-45.6.0-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146175" comment="MozillaThunderbird-translations-common-45.6.0-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146176" comment="MozillaThunderbird-translations-other-45.6.0-58.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9932</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9932" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9932" source="CVE"/>
    <description>
    CMPXCHG8B emulation in Xen 3.3.x through 4.7.x on x86 systems allows local HVM guest OS users to obtain sensitive information from host stack memory via a "supposedly-ignored" operand size prefix.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009146189" comment="xen-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146190" comment="xen-devel-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146191" comment="xen-doc-html-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146192" comment="xen-kmp-default-4.4.4_06_k3.16.7_53-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146193" comment="xen-kmp-desktop-4.4.4_06_k3.16.7_53-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146194" comment="xen-libs-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146195" comment="xen-libs-32bit-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146196" comment="xen-tools-4.4.4_06-58.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146197" comment="xen-tools-domU-4.4.4_06-58.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9933</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9933" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9933" source="CVE"/>
    <description>
    Stack consumption vulnerability in the gdImageFillToBorder function in gd.c in the GD Graphics Library (aka libgd) before 2.2.2, as used in PHP before 5.6.28 and 7.x before 7.0.13, allows remote attackers to cause a denial of service (segmentation violation) via a crafted imagefilltoborder call that triggers use of a negative color value.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009145716" comment="apache2-mod_php5-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145774" comment="gd-2.1.0-7.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145775" comment="gd-devel-2.1.0-7.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145776" comment="libgd3-2.1.0-7.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145777" comment="libgd3-32bit-2.1.0-7.22.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145717" comment="php5-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145718" comment="php5-bcmath-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145719" comment="php5-bz2-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145720" comment="php5-calendar-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145721" comment="php5-ctype-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145722" comment="php5-curl-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145723" comment="php5-dba-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145724" comment="php5-devel-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145725" comment="php5-dom-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145726" comment="php5-enchant-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145727" comment="php5-exif-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145728" comment="php5-fastcgi-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145729" comment="php5-fileinfo-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145730" comment="php5-firebird-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145731" comment="php5-fpm-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145732" comment="php5-ftp-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145733" comment="php5-gd-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145734" comment="php5-gettext-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145735" comment="php5-gmp-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145736" comment="php5-iconv-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145737" comment="php5-imap-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145738" comment="php5-intl-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145739" comment="php5-json-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145740" comment="php5-ldap-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145741" comment="php5-mbstring-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145742" comment="php5-mcrypt-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145743" comment="php5-mssql-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145744" comment="php5-mysql-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145745" comment="php5-odbc-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145746" comment="php5-opcache-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145747" comment="php5-openssl-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145748" comment="php5-pcntl-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145749" comment="php5-pdo-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145750" comment="php5-pear-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145751" comment="php5-pgsql-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145752" comment="php5-phar-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145753" comment="php5-posix-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145754" comment="php5-pspell-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145755" comment="php5-readline-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145756" comment="php5-shmop-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145757" comment="php5-snmp-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145758" comment="php5-soap-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145759" comment="php5-sockets-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145760" comment="php5-sqlite-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145761" comment="php5-suhosin-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145762" comment="php5-sysvmsg-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145763" comment="php5-sysvsem-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145764" comment="php5-sysvshm-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145765" comment="php5-tidy-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145766" comment="php5-tokenizer-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145767" comment="php5-wddx-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145768" comment="php5-xmlreader-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145769" comment="php5-xmlrpc-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145770" comment="php5-xmlwriter-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145771" comment="php5-xsl-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145772" comment="php5-zip-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145773" comment="php5-zlib-5.6.1-89.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9934</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9934" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9934" source="CVE"/>
    <description>
    ext/wddx/wddx.c in PHP before 5.6.28 and 7.x before 7.0.13 allows remote attackers to cause a denial of service (NULL pointer dereference) via crafted serialized data in a wddxPacket XML document, as demonstrated by a PDORow string.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009145716" comment="apache2-mod_php5-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145717" comment="php5-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145718" comment="php5-bcmath-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145719" comment="php5-bz2-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145720" comment="php5-calendar-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145721" comment="php5-ctype-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145722" comment="php5-curl-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145723" comment="php5-dba-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145724" comment="php5-devel-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145725" comment="php5-dom-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145726" comment="php5-enchant-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145727" comment="php5-exif-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145728" comment="php5-fastcgi-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145729" comment="php5-fileinfo-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145730" comment="php5-firebird-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145731" comment="php5-fpm-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145732" comment="php5-ftp-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145733" comment="php5-gd-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145734" comment="php5-gettext-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145735" comment="php5-gmp-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145736" comment="php5-iconv-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145737" comment="php5-imap-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145738" comment="php5-intl-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145739" comment="php5-json-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145740" comment="php5-ldap-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145741" comment="php5-mbstring-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145742" comment="php5-mcrypt-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145743" comment="php5-mssql-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145744" comment="php5-mysql-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145745" comment="php5-odbc-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145746" comment="php5-opcache-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145747" comment="php5-openssl-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145748" comment="php5-pcntl-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145749" comment="php5-pdo-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145750" comment="php5-pear-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145751" comment="php5-pgsql-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145752" comment="php5-phar-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145753" comment="php5-posix-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145754" comment="php5-pspell-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145755" comment="php5-readline-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145756" comment="php5-shmop-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145757" comment="php5-snmp-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145758" comment="php5-soap-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145759" comment="php5-sockets-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145760" comment="php5-sqlite-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145761" comment="php5-suhosin-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145762" comment="php5-sysvmsg-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145763" comment="php5-sysvsem-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145764" comment="php5-sysvshm-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145765" comment="php5-tidy-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145766" comment="php5-tokenizer-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145767" comment="php5-wddx-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145768" comment="php5-xmlreader-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145769" comment="php5-xmlrpc-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145770" comment="php5-xmlwriter-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145771" comment="php5-xsl-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145772" comment="php5-zip-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145773" comment="php5-zlib-5.6.1-89.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20169935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-9935</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2016-9935" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9935" source="CVE"/>
    <description>
    The php_wddx_push_element function in ext/wddx/wddx.c in PHP before 5.6.29 and 7.x before 7.0.14 allows remote attackers to cause a denial of service (out-of-bounds read and memory corruption) or possibly have unspecified other impact via an empty boolean element in a wddxPacket XML document.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009145716" comment="apache2-mod_php5-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145717" comment="php5-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145718" comment="php5-bcmath-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145719" comment="php5-bz2-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145720" comment="php5-calendar-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145721" comment="php5-ctype-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145722" comment="php5-curl-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145723" comment="php5-dba-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145724" comment="php5-devel-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145725" comment="php5-dom-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145726" comment="php5-enchant-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145727" comment="php5-exif-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145728" comment="php5-fastcgi-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145729" comment="php5-fileinfo-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145730" comment="php5-firebird-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145731" comment="php5-fpm-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145732" comment="php5-ftp-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145733" comment="php5-gd-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145734" comment="php5-gettext-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145735" comment="php5-gmp-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145736" comment="php5-iconv-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145737" comment="php5-imap-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145738" comment="php5-intl-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145739" comment="php5-json-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145740" comment="php5-ldap-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145741" comment="php5-mbstring-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145742" comment="php5-mcrypt-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145743" comment="php5-mssql-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145744" comment="php5-mysql-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145745" comment="php5-odbc-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145746" comment="php5-opcache-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145747" comment="php5-openssl-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145748" comment="php5-pcntl-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145749" comment="php5-pdo-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145750" comment="php5-pear-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145751" comment="php5-pgsql-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145752" comment="php5-phar-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145753" comment="php5-posix-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145754" comment="php5-pspell-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145755" comment="php5-readline-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145756" comment="php5-shmop-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145757" comment="php5-snmp-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145758" comment="php5-soap-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145759" comment="php5-sockets-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145760" comment="php5-sqlite-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145761" comment="php5-suhosin-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145762" comment="php5-sysvmsg-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145763" comment="php5-sysvsem-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145764" comment="php5-sysvshm-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145765" comment="php5-tidy-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145766" comment="php5-tokenizer-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145767" comment="php5-wddx-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145768" comment="php5-xmlreader-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145769" comment="php5-xmlrpc-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145770" comment="php5-xmlwriter-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145771" comment="php5-xsl-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145772" comment="php5-zip-5.6.1-89.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009145773" comment="php5-zlib-5.6.1-89.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2925</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2017-2925" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2925" source="CVE"/>
    <description>
    Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable memory corruption vulnerability in the JPEG XR codec. Successful exploitation could lead to arbitrary code execution.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009146955" comment="flash-player-24.0.0.194-2.124.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146956" comment="flash-player-gnome-24.0.0.194-2.124.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146957" comment="flash-player-kde4-24.0.0.194-2.124.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2926</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2017-2926" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2926" source="CVE"/>
    <description>
    Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable memory corruption vulnerability related to processing of atoms in MP4 files. Successful exploitation could lead to arbitrary code execution.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009146955" comment="flash-player-24.0.0.194-2.124.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146956" comment="flash-player-gnome-24.0.0.194-2.124.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146957" comment="flash-player-kde4-24.0.0.194-2.124.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2927</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2017-2927" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2927" source="CVE"/>
    <description>
    Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable heap overflow vulnerability when processing Adobe Texture Format files. Successful exploitation could lead to arbitrary code execution.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009146955" comment="flash-player-24.0.0.194-2.124.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146956" comment="flash-player-gnome-24.0.0.194-2.124.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146957" comment="flash-player-kde4-24.0.0.194-2.124.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2928</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2017-2928" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2928" source="CVE"/>
    <description>
    Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable memory corruption vulnerability related to setting visual mode effects. Successful exploitation could lead to arbitrary code execution.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009146955" comment="flash-player-24.0.0.194-2.124.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146956" comment="flash-player-gnome-24.0.0.194-2.124.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146957" comment="flash-player-kde4-24.0.0.194-2.124.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2930</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2017-2930" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2930" source="CVE"/>
    <description>
    Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable memory corruption vulnerability due to a concurrency error when manipulating a display list. Successful exploitation could lead to arbitrary code execution.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009146955" comment="flash-player-24.0.0.194-2.124.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146956" comment="flash-player-gnome-24.0.0.194-2.124.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146957" comment="flash-player-kde4-24.0.0.194-2.124.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2931</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2017-2931" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2931" source="CVE"/>
    <description>
    Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable memory corruption vulnerability related to the parsing of SWF metadata. Successful exploitation could lead to arbitrary code execution.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009146955" comment="flash-player-24.0.0.194-2.124.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146956" comment="flash-player-gnome-24.0.0.194-2.124.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146957" comment="flash-player-kde4-24.0.0.194-2.124.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2932</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2017-2932" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2932" source="CVE"/>
    <description>
    Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable use after free vulnerability in the ActionScript MovieClip class. Successful exploitation could lead to arbitrary code execution.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009146955" comment="flash-player-24.0.0.194-2.124.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146956" comment="flash-player-gnome-24.0.0.194-2.124.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146957" comment="flash-player-kde4-24.0.0.194-2.124.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2933</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2017-2933" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2933" source="CVE"/>
    <description>
    Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable heap overflow vulnerability related to texture compression. Successful exploitation could lead to arbitrary code execution.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009146955" comment="flash-player-24.0.0.194-2.124.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146956" comment="flash-player-gnome-24.0.0.194-2.124.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146957" comment="flash-player-kde4-24.0.0.194-2.124.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2934</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2017-2934" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2934" source="CVE"/>
    <description>
    Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable heap overflow vulnerability when parsing Adobe Texture Format files. Successful exploitation could lead to arbitrary code execution.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009146955" comment="flash-player-24.0.0.194-2.124.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146956" comment="flash-player-gnome-24.0.0.194-2.124.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146957" comment="flash-player-kde4-24.0.0.194-2.124.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2935</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2017-2935" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2935" source="CVE"/>
    <description>
    Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable heap overflow vulnerability when processing the Flash Video container file format. Successful exploitation could lead to arbitrary code execution.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009146955" comment="flash-player-24.0.0.194-2.124.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146956" comment="flash-player-gnome-24.0.0.194-2.124.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146957" comment="flash-player-kde4-24.0.0.194-2.124.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2936</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2017-2936" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2936" source="CVE"/>
    <description>
    Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable use after free vulnerability in the ActionScript FileReference class. Successful exploitation could lead to arbitrary code execution.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009146955" comment="flash-player-24.0.0.194-2.124.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146956" comment="flash-player-gnome-24.0.0.194-2.124.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146957" comment="flash-player-kde4-24.0.0.194-2.124.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2937</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2017-2937" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2937" source="CVE"/>
    <description>
    Adobe Flash Player versions 24.0.0.186 and earlier have an exploitable use after free vulnerability in the ActionScript FileReference class, when using class inheritance. Successful exploitation could lead to arbitrary code execution.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009146955" comment="flash-player-24.0.0.194-2.124.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146956" comment="flash-player-gnome-24.0.0.194-2.124.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146957" comment="flash-player-kde4-24.0.0.194-2.124.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20172938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-2938</title>
    <affected family="unix">
            <platform>openSUSE 13.2 NonFree</platform>
    </affected>
    <reference ref_id="CVE-2017-2938" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2938" source="CVE"/>
    <description>
    Adobe Flash Player versions 24.0.0.186 and earlier have a security bypass vulnerability related to handling TCP connections.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 NonFree is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009146955" comment="flash-player-24.0.0.194-2.124.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146956" comment="flash-player-gnome-24.0.0.194-2.124.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146957" comment="flash-player-kde4-24.0.0.194-2.124.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5193</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2017-5193" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5193" source="CVE"/>
    <description>
    The nickcmp function in Irssi before 0.8.21 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a message without a nick.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009146855" comment="irssi-0.8.21-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146856" comment="irssi-devel-0.8.21-3.7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5194</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2017-5194" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5194" source="CVE"/>
    <description>
    Use-after-free vulnerability in Irssi before 0.8.21 allows remote attackers to cause a denial of service (crash) via an invalid nick message.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009146855" comment="irssi-0.8.21-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146856" comment="irssi-devel-0.8.21-3.7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5195</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2017-5195" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5195" source="CVE"/>
    <description>
    Irssi 0.8.17 before 0.8.21 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted ANSI x8 color code.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009146855" comment="irssi-0.8.21-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146856" comment="irssi-devel-0.8.21-3.7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5196</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2017-5196" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5196" source="CVE"/>
    <description>
    Irssi 0.8.18 before 0.8.21 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via vectors involving strings that are not UTF8.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
      <criteria operator="OR">
        <criterion test_ref="oval:org.opensuse.security:tst:2009146855" comment="irssi-0.8.21-3.7.1 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146856" comment="irssi-devel-0.8.21-3.7.1 is installed"/>
      </criteria>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5208</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2017-5208" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5208" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146986" comment="icoutils-0.31.1-4.3.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5331</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2017-5331" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5331" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146986" comment="icoutils-0.31.1-4.3.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5332</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2017-5332" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5332" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146986" comment="icoutils-0.31.1-4.3.1 is installed"/>
    </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20175333" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2017-5333</title>
    <affected family="unix">
            <platform>openSUSE 13.2</platform>
    </affected>
    <reference ref_id="CVE-2017-5333" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5333" source="CVE"/>
    <description>
    ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
    </description>
 </metadata>
    <criteria operator="AND">
      <criterion test_ref="oval:org.opensuse.security:tst:2009117729" comment="openSUSE 13.2 is installed"/>
        <criterion test_ref="oval:org.opensuse.security:tst:2009146986" comment="icoutils-0.31.1-4.3.1 is installed"/>
    </criteria>
</definition>
</definitions>
<tests>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147478" version="1" comment="haproxy is &lt;1.5.4-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117479" version="1" comment="suse-sle12-cloud-compute-release is ==5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147479" version="1" comment="openstack-cinder is &lt;2014.2.3.dev13-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147480" version="1" comment="openstack-cinder-volume is &lt;2014.2.3.dev13-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147481" version="1" comment="python-cinder is &lt;2014.2.3.dev13-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147482" version="1" comment="openstack-neutron is &lt;2014.2.2.dev26-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147483" version="1" comment="openstack-neutron-dhcp-agent is &lt;2014.2.2.dev26-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147484" version="1" comment="openstack-neutron-ha-tool is &lt;2014.2.2.dev26-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147485" version="1" comment="openstack-neutron-l3-agent is &lt;2014.2.2.dev26-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147486" version="1" comment="openstack-neutron-lbaas-agent is &lt;2014.2.2.dev26-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147487" version="1" comment="openstack-neutron-linuxbridge-agent is &lt;2014.2.2.dev26-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147488" version="1" comment="openstack-neutron-metadata-agent is &lt;2014.2.2.dev26-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147489" version="1" comment="openstack-neutron-metering-agent is &lt;2014.2.2.dev26-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147490" version="1" comment="openstack-neutron-openvswitch-agent is &lt;2014.2.2.dev26-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147491" version="1" comment="openstack-neutron-vpn-agent is &lt;2014.2.2.dev26-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147492" version="1" comment="python-neutron is &lt;2014.2.2.dev26-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147493" version="1" comment="python-Beaker is &lt;1.6.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147494" version="1" comment="python-keystoneclient is &lt;1.0.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147495" version="1" comment="python-keystoneclient-doc is &lt;1.0.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144245" version="1" comment="python-pycrypto is &lt;2.6.1-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147496" version="1" comment="python-pymongo is &lt;2.6.3-2.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144246" version="1" comment="python-requests is &lt;2.3.0-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147497" version="1" comment="ruby2.1-rubygem-chef is &lt;10.32.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147498" version="1" comment="rubygem-chef is &lt;10.32.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141196" version="1" comment="ImageMagick is &lt;6.8.8.1-5.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141197" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-5.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141198" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-5.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141199" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-5.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141200" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-5.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116183" version="1" comment="sled-release is ==12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141201" version="1" comment="MozillaFirefox is &lt;31.1.0esr-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141202" version="1" comment="MozillaFirefox-translations is &lt;31.1.0esr-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141203" version="1" comment="aaa_base is &lt;13.2+git20140911.61c1681-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141204" version="1" comment="aaa_base-extras is &lt;13.2+git20140911.61c1681-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141205" version="1" comment="accountsservice is &lt;0.6.35-1.126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141206" version="1" comment="accountsservice-lang is &lt;0.6.35-1.126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141207" version="1" comment="libaccountsservice0 is &lt;0.6.35-1.126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141208" version="1" comment="typelib-1_0-AccountsService-1_0 is &lt;0.6.35-1.126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141209" version="1" comment="alsa is &lt;1.0.27.2-11.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141210" version="1" comment="libasound2 is &lt;1.0.27.2-11.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140446" version="1" comment="libasound2-32bit is &lt;1.0.27.2-11.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141211" version="1" comment="argyllcms is &lt;1.6.3-1.179" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141212" version="1" comment="avahi is &lt;0.6.31-20.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141213" version="1" comment="avahi-lang is &lt;0.6.31-20.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141214" version="1" comment="libavahi-client3 is &lt;0.6.31-20.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141215" version="1" comment="libavahi-client3-32bit is &lt;0.6.31-20.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141216" version="1" comment="libavahi-common3 is &lt;0.6.31-20.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141217" version="1" comment="libavahi-common3-32bit is &lt;0.6.31-20.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141218" version="1" comment="libavahi-core7 is &lt;0.6.31-20.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141219" version="1" comment="libdns_sd is &lt;0.6.31-20.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141220" version="1" comment="libdns_sd-32bit is &lt;0.6.31-20.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141221" version="1" comment="bash is &lt;4.2-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141222" version="1" comment="bash-doc is &lt;4.2-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141223" version="1" comment="bash-lang is &lt;4.2-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141224" version="1" comment="libreadline6 is &lt;6.2-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141225" version="1" comment="libreadline6-32bit is &lt;6.2-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141226" version="1" comment="readline-doc is &lt;6.2-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141227" version="1" comment="bind-libs is &lt;9.9.5P1-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141228" version="1" comment="bind-libs-32bit is &lt;9.9.5P1-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141229" version="1" comment="bind-utils is &lt;9.9.5P1-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141230" version="1" comment="bogofilter is &lt;1.2.4-3.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141231" version="1" comment="bzip2 is &lt;1.0.6-27.1129" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141232" version="1" comment="libbz2-1 is &lt;1.0.6-27.1129" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141233" version="1" comment="libbz2-1-32bit is &lt;1.0.6-27.1129" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141234" version="1" comment="cifs-utils is &lt;6.4-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141235" version="1" comment="clamav is &lt;0.98.4-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141236" version="1" comment="colord is &lt;1.1.7-2.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141237" version="1" comment="colord-gtk-lang is &lt;0.1.25-3.113" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141238" version="1" comment="colord-lang is &lt;1.1.7-2.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141239" version="1" comment="libcolord-gtk1 is &lt;0.1.25-3.113" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141240" version="1" comment="libcolord2 is &lt;1.1.7-2.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141241" version="1" comment="libcolord2-32bit is &lt;1.1.7-2.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141242" version="1" comment="libcolorhug2 is &lt;1.1.7-2.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140495" version="1" comment="coolkey is &lt;1.1.0-147.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141243" version="1" comment="coreutils is &lt;8.22-5.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141244" version="1" comment="coreutils-lang is &lt;8.22-5.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141245" version="1" comment="cpio is &lt;2.11-26.182" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141246" version="1" comment="cpio-lang is &lt;2.11-26.182" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141247" version="1" comment="tar is &lt;1.27.1-2.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141248" version="1" comment="tar-lang is &lt;1.27.1-2.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141249" version="1" comment="cpp48 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141250" version="1" comment="gcc48 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141251" version="1" comment="gcc48-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141252" version="1" comment="gcc48-c++ is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141253" version="1" comment="gcc48-gij is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141254" version="1" comment="gcc48-gij-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141255" version="1" comment="gcc48-info is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141256" version="1" comment="libasan0 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141257" version="1" comment="libasan0-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141258" version="1" comment="libatomic1 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141259" version="1" comment="libatomic1-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141260" version="1" comment="libffi4 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141261" version="1" comment="libffi4-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141262" version="1" comment="libgcc_s1 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141263" version="1" comment="libgcc_s1-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141264" version="1" comment="libgcj48 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141265" version="1" comment="libgcj48-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141266" version="1" comment="libgcj48-jar is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141267" version="1" comment="libgcj_bc1 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141268" version="1" comment="libgfortran3 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141269" version="1" comment="libgomp1 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141270" version="1" comment="libgomp1-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141271" version="1" comment="libitm1 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141272" version="1" comment="libitm1-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141273" version="1" comment="libquadmath0 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141274" version="1" comment="libstdc++48-devel is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141275" version="1" comment="libstdc++48-devel-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141276" version="1" comment="libstdc++6 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141277" version="1" comment="libstdc++6-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141278" version="1" comment="libtsan0 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141279" version="1" comment="cron is &lt;4.2-55.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141280" version="1" comment="cronie is &lt;1.4.11-55.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141281" version="1" comment="cups is &lt;1.7.5-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141282" version="1" comment="cups-client is &lt;1.7.5-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141283" version="1" comment="cups-libs is &lt;1.7.5-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141284" version="1" comment="cups-libs-32bit is &lt;1.7.5-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141285" version="1" comment="cups-filters is &lt;1.0.58-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141286" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141287" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141288" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140514" version="1" comment="cups-pk-helper is &lt;0.2.5-3.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140515" version="1" comment="cups-pk-helper-lang is &lt;0.2.5-3.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141289" version="1" comment="curl is &lt;7.37.0-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141290" version="1" comment="libcurl4 is &lt;7.37.0-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141291" version="1" comment="libcurl4-32bit is &lt;7.37.0-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140516" version="1" comment="cvs is &lt;1.12.12-181.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140518" version="1" comment="cyrus-sasl is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140519" version="1" comment="cyrus-sasl-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140520" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140521" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140522" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141292" version="1" comment="cyrus-sasl-digestmd5-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140523" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140524" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140527" version="1" comment="cyrus-sasl-plain is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140528" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140529" version="1" comment="cyrus-sasl-saslauthd is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140532" version="1" comment="libsasl2-3 is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140533" version="1" comment="libsasl2-3-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141293" version="1" comment="dbus-1 is &lt;1.8.8-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141294" version="1" comment="dbus-1-x11 is &lt;1.8.8-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141295" version="1" comment="libdbus-1-3 is &lt;1.8.8-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141296" version="1" comment="libdbus-1-3-32bit is &lt;1.8.8-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140539" version="1" comment="dbus-1-glib is &lt;0.100.2-3.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140540" version="1" comment="dbus-1-glib-32bit is &lt;0.100.2-3.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141297" version="1" comment="dhcp is &lt;4.2.6-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141298" version="1" comment="dhcp-client is &lt;4.2.6-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141299" version="1" comment="dia is &lt;0.97.2-13.253" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141300" version="1" comment="dia-lang is &lt;0.97.2-13.253" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141301" version="1" comment="dracut is &lt;037-34.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141302" version="1" comment="ecryptfs-utils is &lt;103-5.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141303" version="1" comment="ecryptfs-utils-32bit is &lt;103-5.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141304" version="1" comment="elfutils is &lt;0.158-3.200" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141305" version="1" comment="libasm1 is &lt;0.158-3.200" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141306" version="1" comment="libdw1 is &lt;0.158-3.200" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141307" version="1" comment="libdw1-32bit is &lt;0.158-3.200" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141308" version="1" comment="libebl1 is &lt;0.158-3.200" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141309" version="1" comment="libebl1-32bit is &lt;0.158-3.200" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141310" version="1" comment="libelf1 is &lt;0.158-3.200" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141311" version="1" comment="libelf1-32bit is &lt;0.158-3.200" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141312" version="1" comment="emacs is &lt;24.3-14.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141313" version="1" comment="emacs-info is &lt;24.3-14.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141314" version="1" comment="emacs-x11 is &lt;24.3-14.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141315" version="1" comment="etags is &lt;24.3-14.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141316" version="1" comment="empathy is &lt;3.10.3-1.131" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141317" version="1" comment="empathy-lang is &lt;3.10.3-1.131" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141318" version="1" comment="telepathy-mission-control-plugin-goa is &lt;3.10.3-1.131" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141319" version="1" comment="evince is &lt;3.10.3-1.213" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141320" version="1" comment="evince-lang is &lt;3.10.3-1.213" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141321" version="1" comment="libevdocument3-4 is &lt;3.10.3-1.213" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141322" version="1" comment="libevview3-3 is &lt;3.10.3-1.213" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141323" version="1" comment="typelib-1_0-EvinceDocument-3_0 is &lt;3.10.3-1.213" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141324" version="1" comment="typelib-1_0-EvinceView-3_0 is &lt;3.10.3-1.213" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141325" version="1" comment="expat is &lt;2.1.0-13.232" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141326" version="1" comment="libexpat1 is &lt;2.1.0-13.232" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141327" version="1" comment="libexpat1-32bit is &lt;2.1.0-13.232" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141328" version="1" comment="facter is &lt;2.0.2-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141329" version="1" comment="fetchmail is &lt;6.3.26-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141330" version="1" comment="file is &lt;5.19-2.149" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141331" version="1" comment="file-magic is &lt;5.19-2.149" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141332" version="1" comment="libmagic1 is &lt;5.19-2.149" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141333" version="1" comment="libmagic1-32bit is &lt;5.19-2.149" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141334" version="1" comment="finch is &lt;2.10.9-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141335" version="1" comment="libpurple is &lt;2.10.9-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141336" version="1" comment="libpurple-lang is &lt;2.10.9-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141337" version="1" comment="libpurple-meanwhile is &lt;2.10.9-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141338" version="1" comment="libpurple-tcl is &lt;2.10.9-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141339" version="1" comment="pidgin is &lt;2.10.9-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141340" version="1" comment="flash-player is &lt;11.2.202.406-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141341" version="1" comment="flash-player-gnome is &lt;11.2.202.406-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141342" version="1" comment="freerdp is &lt;1.0.2-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141343" version="1" comment="libfreerdp-1_0 is &lt;1.0.2-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141344" version="1" comment="libfreerdp-1_0-plugins is &lt;1.0.2-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141345" version="1" comment="ft2demos is &lt;2.5.3-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141346" version="1" comment="fuse is &lt;2.9.3-3.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141347" version="1" comment="libfuse2 is &lt;2.9.3-3.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141348" version="1" comment="g3utils is &lt;1.1.36-54.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141349" version="1" comment="mgetty is &lt;1.1.36-54.100" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141350" version="1" comment="gd is &lt;2.1.0-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141351" version="1" comment="gd-32bit is &lt;2.1.0-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141352" version="1" comment="gdk-pixbuf-lang is &lt;2.30.6-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141353" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.30.6-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141354" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.30.6-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141355" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.30.6-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141356" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.30.6-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141357" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.30.6-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141358" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.40.2-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141359" version="1" comment="librsvg-2-2 is &lt;2.40.2-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141360" version="1" comment="librsvg-2-2-32bit is &lt;2.40.2-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141361" version="1" comment="rsvg-view is &lt;2.40.2-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141362" version="1" comment="gdm is &lt;3.10.0.1-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141363" version="1" comment="gdm-branding-upstream is &lt;3.10.0.1-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141364" version="1" comment="gdm-lang is &lt;3.10.0.1-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141365" version="1" comment="gdmflexiserver is &lt;3.10.0.1-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141366" version="1" comment="libgdm1 is &lt;3.10.0.1-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141367" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.10.0.1-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141368" version="1" comment="gimp is &lt;2.8.10-1.164" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141369" version="1" comment="gimp-lang is &lt;2.8.10-1.164" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141370" version="1" comment="gimp-plugins-python is &lt;2.8.10-1.164" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141371" version="1" comment="libgimp-2_0-0 is &lt;2.8.10-1.164" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141372" version="1" comment="libgimpui-2_0-0 is &lt;2.8.10-1.164" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141373" version="1" comment="glib2-lang is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141374" version="1" comment="glib2-tools is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141375" version="1" comment="libgio-2_0-0 is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141376" version="1" comment="libgio-2_0-0-32bit is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141377" version="1" comment="libgio-fam is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141378" version="1" comment="libglib-2_0-0 is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141379" version="1" comment="libglib-2_0-0-32bit is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141380" version="1" comment="libgmodule-2_0-0 is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141381" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141382" version="1" comment="libgobject-2_0-0 is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141383" version="1" comment="libgobject-2_0-0-32bit is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141384" version="1" comment="libgthread-2_0-0 is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141385" version="1" comment="libgthread-2_0-0-32bit is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141386" version="1" comment="glibc is &lt;2.19-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141387" version="1" comment="glibc-32bit is &lt;2.19-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141388" version="1" comment="glibc-devel is &lt;2.19-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141389" version="1" comment="glibc-devel-32bit is &lt;2.19-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141390" version="1" comment="glibc-i18ndata is &lt;2.19-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141391" version="1" comment="glibc-locale is &lt;2.19-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141392" version="1" comment="glibc-locale-32bit is &lt;2.19-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141393" version="1" comment="nscd is &lt;2.19-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141394" version="1" comment="gnome-keyring is &lt;3.10.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141395" version="1" comment="gnome-keyring-32bit is &lt;3.10.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141396" version="1" comment="gnome-keyring-lang is &lt;3.10.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141397" version="1" comment="gnome-keyring-pam is &lt;3.10.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141398" version="1" comment="gnome-keyring-pam-32bit is &lt;3.10.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141399" version="1" comment="libgck-modules-gnome-keyring is &lt;3.10.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141400" version="1" comment="gnome-online-accounts is &lt;3.10.5-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141401" version="1" comment="gnome-online-accounts-lang is &lt;3.10.5-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141402" version="1" comment="libgoa-1_0-0 is &lt;3.10.5-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141403" version="1" comment="libgoa-backend-1_0-1 is &lt;3.10.5-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141404" version="1" comment="typelib-1_0-Goa-1_0 is &lt;3.10.5-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141405" version="1" comment="gnome-shell is &lt;3.10.4-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141406" version="1" comment="gnome-shell-browser-plugin is &lt;3.10.4-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141407" version="1" comment="gnome-shell-calendar is &lt;3.10.4-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141408" version="1" comment="gnome-shell-lang is &lt;3.10.4-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141409" version="1" comment="gnutls is &lt;3.2.15-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141410" version="1" comment="libgnutls28 is &lt;3.2.15-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141411" version="1" comment="libgnutls28-32bit is &lt;3.2.15-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141412" version="1" comment="gpg2 is &lt;2.0.24-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141413" version="1" comment="gpg2-lang is &lt;2.0.24-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140643" version="1" comment="gpgme is &lt;1.5.1-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140644" version="1" comment="libgpgme11 is &lt;1.5.1-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140645" version="1" comment="groff is &lt;1.22.2-5.429" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140673" version="1" comment="gvim is &lt;7.4.326-2.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140674" version="1" comment="vim is &lt;7.4.326-2.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140675" version="1" comment="vim-data is &lt;7.4.326-2.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140677" version="1" comment="gzip is &lt;1.6-7.392" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140678" version="1" comment="hardlink is &lt;1.0-6.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141414" version="1" comment="hplip is &lt;3.14.6-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141415" version="1" comment="hplip-hpijs is &lt;3.14.6-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141416" version="1" comment="hplip-sane is &lt;3.14.6-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141417" version="1" comment="ibus-chewing is &lt;1.4.10.1-2.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141418" version="1" comment="ibus-pinyin is &lt;1.5.0-2.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140686" version="1" comment="iputils is &lt;s20121221-2.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141419" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.65-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141420" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.65-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141421" version="1" comment="java-1_7_0-openjdk-plugin is &lt;1.5.1-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141422" version="1" comment="kbd is &lt;1.15.5-7.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141423" version="1" comment="kernel-default is &lt;3.12.28-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141424" version="1" comment="kernel-default-devel is &lt;3.12.28-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141425" version="1" comment="kernel-default-extra is &lt;3.12.28-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141426" version="1" comment="kernel-devel is &lt;3.12.28-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141427" version="1" comment="kernel-macros is &lt;3.12.28-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141428" version="1" comment="kernel-source is &lt;3.12.28-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141429" version="1" comment="kernel-syms is &lt;3.12.28-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141430" version="1" comment="kernel-xen is &lt;3.12.28-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141431" version="1" comment="kernel-xen-devel is &lt;3.12.28-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141432" version="1" comment="krb5 is &lt;1.12.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141433" version="1" comment="krb5-32bit is &lt;1.12.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141434" version="1" comment="krb5-client is &lt;1.12.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140711" version="1" comment="krb5-appl-clients is &lt;1.0.3-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141435" version="1" comment="lcms is &lt;1.19-17.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140713" version="1" comment="liblcms1 is &lt;1.19-17.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140714" version="1" comment="liblcms1-32bit is &lt;1.19-17.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140717" version="1" comment="libHX28 is &lt;3.18-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140718" version="1" comment="libHX28-32bit is &lt;3.18-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140719" version="1" comment="libIlmImf-Imf_2_1-21 is &lt;2.1.0-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141436" version="1" comment="libIlmImf-Imf_2_1-21-32bit is &lt;2.1.0-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140720" version="1" comment="openexr is &lt;2.1.0-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140739" version="1" comment="libX11-6 is &lt;1.6.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140740" version="1" comment="libX11-6-32bit is &lt;1.6.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140741" version="1" comment="libX11-data is &lt;1.6.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140742" version="1" comment="libX11-xcb1 is &lt;1.6.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140743" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140744" version="1" comment="libXRes1 is &lt;1.0.7-3.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140745" version="1" comment="libXRes1-32bit is &lt;1.0.7-3.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140746" version="1" comment="libXcursor1 is &lt;1.1.14-3.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140747" version="1" comment="libXcursor1-32bit is &lt;1.1.14-3.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140748" version="1" comment="libXext6 is &lt;1.3.2-3.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140749" version="1" comment="libXext6-32bit is &lt;1.3.2-3.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140750" version="1" comment="libXfixes3 is &lt;5.0.1-3.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140751" version="1" comment="libXfixes3-32bit is &lt;5.0.1-3.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141437" version="1" comment="libXfont1 is &lt;1.4.7-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141438" version="1" comment="libXi6 is &lt;1.7.2-3.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141439" version="1" comment="libXi6-32bit is &lt;1.7.2-3.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140755" version="1" comment="libXinerama1 is &lt;1.1.3-3.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140756" version="1" comment="libXinerama1-32bit is &lt;1.1.3-3.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140757" version="1" comment="libXp6 is &lt;1.0.2-3.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140758" version="1" comment="libXp6-32bit is &lt;1.0.2-3.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141440" version="1" comment="libXrandr2 is &lt;1.4.2-3.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141441" version="1" comment="libXrandr2-32bit is &lt;1.4.2-3.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140761" version="1" comment="libXrender1 is &lt;0.9.8-3.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140762" version="1" comment="libXrender1-32bit is &lt;0.9.8-3.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140763" version="1" comment="libXt6 is &lt;1.1.4-3.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140764" version="1" comment="libXt6-32bit is &lt;1.1.4-3.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140765" version="1" comment="libXtst6 is &lt;1.2.2-3.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140766" version="1" comment="libXtst6-32bit is &lt;1.2.2-3.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140767" version="1" comment="libXv1 is &lt;1.0.10-3.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140768" version="1" comment="libXv1-32bit is &lt;1.0.10-3.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140769" version="1" comment="libXvMC1 is &lt;1.0.8-3.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140773" version="1" comment="libXxf86dga1 is &lt;1.1.4-3.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140774" version="1" comment="libXxf86vm1 is &lt;1.1.3-3.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140775" version="1" comment="libXxf86vm1-32bit is &lt;1.1.3-3.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141442" version="1" comment="libaugeas0 is &lt;1.2.0-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141443" version="1" comment="libblkid1 is &lt;2.25-6.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141444" version="1" comment="libblkid1-32bit is &lt;2.25-6.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141445" version="1" comment="libmount1 is &lt;2.25-6.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141446" version="1" comment="libmount1-32bit is &lt;2.25-6.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141447" version="1" comment="libsmartcols1 is &lt;2.25-6.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141448" version="1" comment="libuuid-devel is &lt;2.25-6.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141449" version="1" comment="libuuid1 is &lt;2.25-6.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141450" version="1" comment="libuuid1-32bit is &lt;2.25-6.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141451" version="1" comment="python-libmount is &lt;2.25-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141452" version="1" comment="util-linux is &lt;2.25-6.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141453" version="1" comment="util-linux-lang is &lt;2.25-6.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141454" version="1" comment="util-linux-systemd is &lt;2.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141455" version="1" comment="uuidd is &lt;2.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141456" version="1" comment="libcgroup1 is &lt;0.41.rc1-1.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141457" version="1" comment="libdcerpc-binding0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141458" version="1" comment="libdcerpc-binding0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141459" version="1" comment="libdcerpc0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141460" version="1" comment="libdcerpc0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141461" version="1" comment="libgensec0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141462" version="1" comment="libgensec0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141463" version="1" comment="libndr-krb5pac0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141464" version="1" comment="libndr-krb5pac0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141465" version="1" comment="libndr-nbt0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141466" version="1" comment="libndr-nbt0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141467" version="1" comment="libndr-standard0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141468" version="1" comment="libndr-standard0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141469" version="1" comment="libndr0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141470" version="1" comment="libndr0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141471" version="1" comment="libnetapi0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141472" version="1" comment="libnetapi0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141473" version="1" comment="libpdb0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141474" version="1" comment="libpdb0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141475" version="1" comment="libregistry0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141476" version="1" comment="libsamba-credentials0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141477" version="1" comment="libsamba-credentials0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141478" version="1" comment="libsamba-hostconfig0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141479" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141480" version="1" comment="libsamba-util0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141481" version="1" comment="libsamba-util0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141482" version="1" comment="libsamdb0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141483" version="1" comment="libsamdb0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141484" version="1" comment="libsmbclient-raw0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141485" version="1" comment="libsmbclient-raw0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141486" version="1" comment="libsmbclient0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141487" version="1" comment="libsmbclient0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141488" version="1" comment="libsmbconf0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141489" version="1" comment="libsmbconf0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141490" version="1" comment="libsmbldap0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141491" version="1" comment="libsmbldap0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141492" version="1" comment="libtevent-util0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141493" version="1" comment="libtevent-util0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141494" version="1" comment="libwbclient0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141495" version="1" comment="libwbclient0-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141496" version="1" comment="samba is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141497" version="1" comment="samba-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141498" version="1" comment="samba-client is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141499" version="1" comment="samba-client-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141500" version="1" comment="samba-doc is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141501" version="1" comment="samba-libs is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141502" version="1" comment="samba-libs-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141503" version="1" comment="samba-winbind is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141504" version="1" comment="samba-winbind-32bit is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140838" version="1" comment="libdmx1 is &lt;1.1.3-3.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141505" version="1" comment="libecpg6 is &lt;9.3.5-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141506" version="1" comment="libpq5 is &lt;9.3.5-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141507" version="1" comment="libpq5-32bit is &lt;9.3.5-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141508" version="1" comment="postgresql93 is &lt;9.3.5-2.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140839" version="1" comment="libevent-2_0-5 is &lt;2.0.21-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140840" version="1" comment="libexif12 is &lt;0.6.21-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140841" version="1" comment="libexif12-32bit is &lt;0.6.21-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141509" version="1" comment="libfbembed2_5 is &lt;2.5.2.26539-13.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141510" version="1" comment="libfreebl3 is &lt;3.16.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141511" version="1" comment="libfreebl3-32bit is &lt;3.16.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141512" version="1" comment="libsoftokn3 is &lt;3.16.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141513" version="1" comment="libsoftokn3-32bit is &lt;3.16.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141514" version="1" comment="mozilla-nss is &lt;3.16.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141515" version="1" comment="mozilla-nss-32bit is &lt;3.16.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141516" version="1" comment="mozilla-nss-certs is &lt;3.16.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141517" version="1" comment="mozilla-nss-certs-32bit is &lt;3.16.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141518" version="1" comment="mozilla-nss-tools is &lt;3.16.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141519" version="1" comment="libfreetype6 is &lt;2.5.3-2.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141520" version="1" comment="libfreetype6-32bit is &lt;2.5.3-2.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141521" version="1" comment="libgadu3 is &lt;1.11.4-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140590" version="1" comment="libgc1 is &lt;7.2d-3.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141522" version="1" comment="libgcrypt20 is &lt;1.6.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141523" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141524" version="1" comment="libgnomesu is &lt;1.0.0-352.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141525" version="1" comment="libgnomesu-lang is &lt;1.0.0-352.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141526" version="1" comment="libgnomesu0 is &lt;1.0.0-352.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140845" version="1" comment="libgssglue1 is &lt;0.4-3.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140846" version="1" comment="libgssglue1-32bit is &lt;0.4-3.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141527" version="1" comment="libgudev-1_0-0 is &lt;210-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141528" version="1" comment="libgudev-1_0-0-32bit is &lt;210-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141529" version="1" comment="libudev1 is &lt;210-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141530" version="1" comment="libudev1-32bit is &lt;210-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141531" version="1" comment="systemd is &lt;210-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141532" version="1" comment="systemd-32bit is &lt;210-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141533" version="1" comment="systemd-bash-completion is &lt;210-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141534" version="1" comment="systemd-sysvinit is &lt;210-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141535" version="1" comment="udev is &lt;210-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141536" version="1" comment="libid3tag0 is &lt;0.15.1b-182.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141537" version="1" comment="libipa_hbac0 is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141538" version="1" comment="libsss_idmap0 is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141539" version="1" comment="python-sssd-config is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141540" version="1" comment="sssd is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141541" version="1" comment="sssd-32bit is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141542" version="1" comment="sssd-ad is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141543" version="1" comment="sssd-ipa is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141544" version="1" comment="sssd-krb5 is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141545" version="1" comment="sssd-krb5-common is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141546" version="1" comment="sssd-ldap is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141547" version="1" comment="sssd-proxy is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141548" version="1" comment="sssd-tools is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141549" version="1" comment="libjavascriptcoregtk-1_0-0 is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141550" version="1" comment="libjavascriptcoregtk-1_0-0-32bit is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141551" version="1" comment="libjavascriptcoregtk-3_0-0 is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141552" version="1" comment="libwebkit2gtk-3_0-25 is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141553" version="1" comment="libwebkitgtk-1_0-0 is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141554" version="1" comment="libwebkitgtk-1_0-0-32bit is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141555" version="1" comment="libwebkitgtk-3_0-0 is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141556" version="1" comment="libwebkitgtk2-lang is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141557" version="1" comment="libwebkitgtk3-lang is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141558" version="1" comment="typelib-1_0-JavaScriptCore-3_0 is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141559" version="1" comment="typelib-1_0-WebKit-3_0 is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141560" version="1" comment="libjbig2 is &lt;2.0-12.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140690" version="1" comment="libjbig2-32bit is &lt;2.0-12.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140691" version="1" comment="libjson-c2 is &lt;0.11-2.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140692" version="1" comment="libjson-c2-32bit is &lt;0.11-2.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140875" version="1" comment="libltdl7 is &lt;2.4.2-14.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140876" version="1" comment="libltdl7-32bit is &lt;2.4.2-14.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140879" version="1" comment="liblua5_2 is &lt;5.2.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140881" version="1" comment="lua is &lt;5.2.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141561" version="1" comment="liblzo2-2 is &lt;2.08-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140883" version="1" comment="liblzo2-2-32bit is &lt;2.08-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141562" version="1" comment="libmikmod3 is &lt;3.2.0-4.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141563" version="1" comment="libmikmod3-32bit is &lt;3.2.0-4.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140884" version="1" comment="libmms0 is &lt;0.6.2-15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140885" version="1" comment="libmodplug1 is &lt;0.8.8.4-13.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141564" version="1" comment="libmspack0 is &lt;0.4-3.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140886" version="1" comment="libmusicbrainz4 is &lt;2.1.5-27.86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141565" version="1" comment="libmysqlclient18 is &lt;10.0.11-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141566" version="1" comment="libmysqlclient18-32bit is &lt;10.0.11-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141567" version="1" comment="libmysqlclient_r18 is &lt;10.0.11-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141568" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.11-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141569" version="1" comment="mariadb is &lt;10.0.11-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141570" version="1" comment="mariadb-client is &lt;10.0.11-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141571" version="1" comment="mariadb-errormessages is &lt;10.0.11-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140887" version="1" comment="libneon27 is &lt;0.30.0-3.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141572" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-59.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141573" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-59.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141574" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141575" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141576" version="1" comment="openssl is &lt;1.0.1i-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141577" version="1" comment="libpango-1_0-0 is &lt;1.36.3-4.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141578" version="1" comment="libpango-1_0-0-32bit is &lt;1.36.3-4.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141579" version="1" comment="pango-modules is &lt;1.36.3-4.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141580" version="1" comment="pango-modules-32bit is &lt;1.36.3-4.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141581" version="1" comment="typelib-1_0-Pango-1_0 is &lt;1.36.3-4.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140900" version="1" comment="libpcsclite1 is &lt;1.8.10-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141582" version="1" comment="libpcsclite1-32bit is &lt;1.8.10-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140901" version="1" comment="pcsc-lite is &lt;1.8.10-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141583" version="1" comment="libpng12-0 is &lt;1.2.50-8.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141584" version="1" comment="libpng12-0-32bit is &lt;1.2.50-8.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141585" version="1" comment="libpng16-16 is &lt;1.6.8-2.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141586" version="1" comment="libpng16-16-32bit is &lt;1.6.8-2.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141587" version="1" comment="libpolkit0 is &lt;0.112-2.189" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141588" version="1" comment="libpolkit0-32bit is &lt;0.112-2.189" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141589" version="1" comment="polkit is &lt;0.112-2.189" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141590" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.112-2.189" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141591" version="1" comment="libpoppler-glib8 is &lt;0.24.4-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141592" version="1" comment="libpoppler-qt4-4 is &lt;0.24.4-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141593" version="1" comment="libpoppler44 is &lt;0.24.4-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141594" version="1" comment="poppler-tools is &lt;0.24.4-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141595" version="1" comment="libproxy1 is &lt;0.4.11-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141596" version="1" comment="libproxy1-32bit is &lt;0.4.11-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141597" version="1" comment="libproxy1-config-gnome3 is &lt;0.4.11-11.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141598" version="1" comment="libproxy1-config-gnome3-32bit is &lt;0.4.11-11.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141599" version="1" comment="libproxy1-networkmanager is &lt;0.4.11-11.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141600" version="1" comment="libproxy1-networkmanager-32bit is &lt;0.4.11-11.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140915" version="1" comment="libpulse-mainloop-glib0 is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140916" version="1" comment="libpulse-mainloop-glib0-32bit is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140917" version="1" comment="libpulse0 is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140918" version="1" comment="libpulse0-32bit is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140919" version="1" comment="pulseaudio is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140920" version="1" comment="pulseaudio-esound-compat is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140921" version="1" comment="pulseaudio-gdm-hooks is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140922" version="1" comment="pulseaudio-lang is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141601" version="1" comment="pulseaudio-module-bluetooth is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141602" version="1" comment="pulseaudio-module-gconf is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141603" version="1" comment="pulseaudio-module-jack is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141604" version="1" comment="pulseaudio-module-lirc is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140923" version="1" comment="pulseaudio-module-x11 is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140924" version="1" comment="pulseaudio-module-zeroconf is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140925" version="1" comment="pulseaudio-utils is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141605" version="1" comment="libpython2_7-1_0 is &lt;2.7.7-2.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141606" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.7-2.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141607" version="1" comment="python-base is &lt;2.7.7-2.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141608" version="1" comment="python-devel is &lt;2.7.7-2.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141609" version="1" comment="python-xml is &lt;2.7.7-2.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141610" version="1" comment="libpython3_4m1_0 is &lt;3.4.1-2.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141611" version="1" comment="python3-base is &lt;3.4.1-2.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141612" version="1" comment="libqt4 is &lt;4.8.6-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141613" version="1" comment="libqt4-32bit is &lt;4.8.6-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141614" version="1" comment="libqt4-qt3support is &lt;4.8.6-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141615" version="1" comment="libqt4-qt3support-32bit is &lt;4.8.6-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141616" version="1" comment="libqt4-sql is &lt;4.8.6-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141617" version="1" comment="libqt4-sql-32bit is &lt;4.8.6-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141618" version="1" comment="libqt4-sql-mysql is &lt;4.8.6-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141619" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.8.6-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141620" version="1" comment="libqt4-sql-postgresql is &lt;4.8.6-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141621" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.8.6-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141622" version="1" comment="libqt4-sql-sqlite is &lt;4.8.6-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141623" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.8.6-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141624" version="1" comment="libqt4-sql-unixODBC is &lt;4.8.6-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141625" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.8.6-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141626" version="1" comment="libqt4-x11 is &lt;4.8.6-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141627" version="1" comment="libqt4-x11-32bit is &lt;4.8.6-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140928" version="1" comment="libraptor2-0 is &lt;2.0.10-3.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141628" version="1" comment="raptor is &lt;2.0.10-3.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141629" version="1" comment="libraw9 is &lt;0.15.4-3.88" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141630" version="1" comment="libreoffice is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141631" version="1" comment="libreoffice-base is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141632" version="1" comment="libreoffice-base-drivers-mysql is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141633" version="1" comment="libreoffice-base-drivers-postgresql is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141634" version="1" comment="libreoffice-calc is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141635" version="1" comment="libreoffice-calc-extensions is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141636" version="1" comment="libreoffice-draw is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141637" version="1" comment="libreoffice-filters-optional is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141638" version="1" comment="libreoffice-gnome is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141639" version="1" comment="libreoffice-icon-theme-tango is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141640" version="1" comment="libreoffice-impress is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141641" version="1" comment="libreoffice-l10n-af is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141642" version="1" comment="libreoffice-l10n-ar is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141643" version="1" comment="libreoffice-l10n-ca is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141644" version="1" comment="libreoffice-l10n-cs is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141645" version="1" comment="libreoffice-l10n-da is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141646" version="1" comment="libreoffice-l10n-de is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141647" version="1" comment="libreoffice-l10n-en is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141648" version="1" comment="libreoffice-l10n-es is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141649" version="1" comment="libreoffice-l10n-fi is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141650" version="1" comment="libreoffice-l10n-fr is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141651" version="1" comment="libreoffice-l10n-gu is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141652" version="1" comment="libreoffice-l10n-hi is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141653" version="1" comment="libreoffice-l10n-hu is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141654" version="1" comment="libreoffice-l10n-it is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141655" version="1" comment="libreoffice-l10n-ja is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141656" version="1" comment="libreoffice-l10n-ko is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141657" version="1" comment="libreoffice-l10n-nb is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141658" version="1" comment="libreoffice-l10n-nl is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141659" version="1" comment="libreoffice-l10n-nn is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141660" version="1" comment="libreoffice-l10n-pl is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141661" version="1" comment="libreoffice-l10n-pt-BR is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141662" version="1" comment="libreoffice-l10n-pt-PT is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141663" version="1" comment="libreoffice-l10n-ru is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141664" version="1" comment="libreoffice-l10n-sk is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141665" version="1" comment="libreoffice-l10n-sv is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141666" version="1" comment="libreoffice-l10n-xh is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141667" version="1" comment="libreoffice-l10n-zh-Hans is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141668" version="1" comment="libreoffice-l10n-zh-Hant is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141669" version="1" comment="libreoffice-l10n-zu is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141670" version="1" comment="libreoffice-mailmerge is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141671" version="1" comment="libreoffice-math is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141672" version="1" comment="libreoffice-officebean is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141673" version="1" comment="libreoffice-pyuno is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141674" version="1" comment="libreoffice-writer is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141675" version="1" comment="libreoffice-writer-extensions is &lt;4.3.1.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141676" version="1" comment="librpcsecgss3 is &lt;0.19-16.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141677" version="1" comment="libsilc-1_1-2 is &lt;1.1.10-24.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141678" version="1" comment="libsilcclient-1_1-3 is &lt;1.1.10-24.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141679" version="1" comment="silc-toolkit is &lt;1.1.10-24.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140932" version="1" comment="libsmi is &lt;0.4.8-18.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140933" version="1" comment="libsmi2 is &lt;0.4.8-18.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141680" version="1" comment="libsndfile1 is &lt;1.0.25-18.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141681" version="1" comment="libsndfile1-32bit is &lt;1.0.25-18.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141682" version="1" comment="libsnmp30 is &lt;5.7.2.1-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141683" version="1" comment="libsnmp30-32bit is &lt;5.7.2.1-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141684" version="1" comment="net-snmp is &lt;5.7.2.1-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141685" version="1" comment="perl-SNMP is &lt;5.7.2.1-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141686" version="1" comment="snmp-mibs is &lt;5.7.2.1-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141687" version="1" comment="libsoup-2_4-1 is &lt;2.44.2-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141688" version="1" comment="libsoup-2_4-1-32bit is &lt;2.44.2-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141689" version="1" comment="libsoup-lang is &lt;2.44.2-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141690" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.44.2-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141691" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.25-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141692" version="1" comment="libspice-client-gtk-2_0-4 is &lt;0.25-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141693" version="1" comment="libspice-client-gtk-3_0-4 is &lt;0.25-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141694" version="1" comment="libspice-controller0 is &lt;0.25-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141695" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.25-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141696" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.25-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141697" version="1" comment="libssh4 is &lt;0.6.3-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140963" version="1" comment="libtag1 is &lt;1.9.1-1.265" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141698" version="1" comment="libtag1-32bit is &lt;1.9.1-1.265" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140964" version="1" comment="libtag_c0 is &lt;1.9.1-1.265" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141699" version="1" comment="libtag_c0-32bit is &lt;1.9.1-1.265" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140965" version="1" comment="taglib is &lt;1.9.1-1.265" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141700" version="1" comment="libtasn1 is &lt;3.7-2.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141701" version="1" comment="libtasn1-6 is &lt;3.7-2.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141702" version="1" comment="libtasn1-6-32bit is &lt;3.7-2.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141703" version="1" comment="libtiff5 is &lt;4.0.3-9.78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141704" version="1" comment="libtiff5-32bit is &lt;4.0.3-9.78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140969" version="1" comment="libudisks2-0 is &lt;2.1.3-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140970" version="1" comment="udisks2 is &lt;2.1.3-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140971" version="1" comment="udisks2-lang is &lt;2.1.3-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141705" version="1" comment="libvirt is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141706" version="1" comment="libvirt-client is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141707" version="1" comment="libvirt-client-32bit is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141708" version="1" comment="libvirt-daemon is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141709" version="1" comment="libvirt-daemon-config-network is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141710" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141711" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141712" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141713" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141714" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141715" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141716" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141717" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141718" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141719" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141720" version="1" comment="libvirt-daemon-lxc is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141721" version="1" comment="libvirt-daemon-qemu is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141722" version="1" comment="libvirt-daemon-xen is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141723" version="1" comment="libvirt-doc is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141724" version="1" comment="libvorbis0 is &lt;1.3.3-8.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140999" version="1" comment="libvorbis0-32bit is &lt;1.3.3-8.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141725" version="1" comment="libvorbisenc2 is &lt;1.3.3-8.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141001" version="1" comment="libvorbisenc2-32bit is &lt;1.3.3-8.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141726" version="1" comment="libvorbisfile3 is &lt;1.3.3-8.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141003" version="1" comment="libvorbisfile3-32bit is &lt;1.3.3-8.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141727" version="1" comment="libvte9 is &lt;0.28.2-17.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141728" version="1" comment="libxcb-dri2-0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141729" version="1" comment="libxcb-dri2-0-32bit is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141730" version="1" comment="libxcb-glx0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141731" version="1" comment="libxcb-glx0-32bit is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141732" version="1" comment="libxcb-randr0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141733" version="1" comment="libxcb-render0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141734" version="1" comment="libxcb-render0-32bit is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141735" version="1" comment="libxcb-shape0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141736" version="1" comment="libxcb-shm0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141737" version="1" comment="libxcb-shm0-32bit is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141738" version="1" comment="libxcb-sync1 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141739" version="1" comment="libxcb-xf86dri0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141740" version="1" comment="libxcb-xfixes0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141741" version="1" comment="libxcb-xfixes0-32bit is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141742" version="1" comment="libxcb-xkb1 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141743" version="1" comment="libxcb-xkb1-32bit is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141744" version="1" comment="libxcb-xv0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141745" version="1" comment="libxcb1 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141746" version="1" comment="libxcb1-32bit is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141747" version="1" comment="libxerces-c-3_1 is &lt;3.1.1-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141748" version="1" comment="libxerces-c-3_1-32bit is &lt;3.1.1-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141749" version="1" comment="libxml2-2 is &lt;2.9.1-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141750" version="1" comment="libxml2-2-32bit is &lt;2.9.1-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141751" version="1" comment="libxml2-tools is &lt;2.9.1-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141752" version="1" comment="libyaml-0-2 is &lt;0.1.6-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141753" version="1" comment="libzip2 is &lt;0.11.1-4.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141754" version="1" comment="libzmq3 is &lt;4.0.4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141038" version="1" comment="logrotate is &lt;3.8.7-3.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140466" version="1" comment="m4 is &lt;1.4.16-15.74" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141042" version="1" comment="mipv6d is &lt;2.0.2.umip.0.4-19.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141755" version="1" comment="mozilla-nspr is &lt;4.10.7-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141756" version="1" comment="mozilla-nspr-32bit is &lt;4.10.7-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141757" version="1" comment="mutt is &lt;1.5.21-44.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141758" version="1" comment="ntp is &lt;4.2.6p5-24.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141759" version="1" comment="ntp-doc is &lt;4.2.6p5-24.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141044" version="1" comment="opensc is &lt;0.13.0-1.122" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141760" version="1" comment="openslp is &lt;2.0.0-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141761" version="1" comment="openslp-32bit is &lt;2.0.0-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141762" version="1" comment="openssh is &lt;6.6p1-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141763" version="1" comment="openssh-helpers is &lt;6.6p1-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141764" version="1" comment="pam is &lt;1.1.8-11.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141765" version="1" comment="pam-32bit is &lt;1.1.8-11.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141766" version="1" comment="pam-doc is &lt;1.1.8-11.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141767" version="1" comment="pam-modules is &lt;12.1-23.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141060" version="1" comment="pam-modules-32bit is &lt;12.1-23.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141061" version="1" comment="pam_krb5 is &lt;2.4.4-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141062" version="1" comment="pam_krb5-32bit is &lt;2.4.4-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141063" version="1" comment="pam_ssh is &lt;2.0-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141064" version="1" comment="pam_ssh-32bit is &lt;2.0-1.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141768" version="1" comment="patch is &lt;2.7.1-5.191" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141065" version="1" comment="pcsc-ccid is &lt;1.4.14-1.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141769" version="1" comment="perl is &lt;5.18.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141770" version="1" comment="perl-32bit is &lt;5.18.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141771" version="1" comment="perl-base is &lt;5.18.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141772" version="1" comment="perl-doc is &lt;5.18.2-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141066" version="1" comment="perl-Config-IniFiles is &lt;2.82-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141067" version="1" comment="perl-HTML-Parser is &lt;3.71-1.178" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141068" version="1" comment="perl-LWP-Protocol-https is &lt;6.04-5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141069" version="1" comment="perl-Tk is &lt;804.031-3.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141773" version="1" comment="perl-YAML-LibYAML is &lt;0.38-7.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141774" version="1" comment="pidgin-otr is &lt;4.0.0-6.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141072" version="1" comment="ppp is &lt;2.4.7-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141775" version="1" comment="procmail is &lt;3.22-267.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141776" version="1" comment="puppet is &lt;3.6.2-3.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141777" version="1" comment="python is &lt;2.7.7-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141778" version="1" comment="python-curses is &lt;2.7.7-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141779" version="1" comment="python-tk is &lt;2.7.7-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141780" version="1" comment="python3 is &lt;3.4.1-2.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141781" version="1" comment="python-cupshelpers is &lt;1.4.5-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141782" version="1" comment="system-config-printer is &lt;1.4.5-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141783" version="1" comment="system-config-printer-common is &lt;1.4.5-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141784" version="1" comment="system-config-printer-common-lang is &lt;1.4.5-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141785" version="1" comment="system-config-printer-dbus-service is &lt;1.4.5-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141786" version="1" comment="udev-configure-printer is &lt;1.4.5-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141787" version="1" comment="python-imaging is &lt;1.1.7-21.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141788" version="1" comment="python-libxml2 is &lt;2.9.1-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141789" version="1" comment="python-pyOpenSSL is &lt;0.14-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141085" version="1" comment="python-pywbem is &lt;0.7.0-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141790" version="1" comment="qemu is &lt;2.0.0-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141791" version="1" comment="qemu-block-curl is &lt;2.0.0-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141792" version="1" comment="qemu-ipxe is &lt;1.0.0-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141793" version="1" comment="qemu-kvm is &lt;2.0.0-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141794" version="1" comment="qemu-seabios is &lt;1.7.4-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141795" version="1" comment="qemu-sgabios is &lt;8-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141796" version="1" comment="qemu-tools is &lt;2.0.0-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141797" version="1" comment="qemu-vgabios is &lt;1.7.4-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141798" version="1" comment="qemu-x86 is &lt;2.0.0-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141103" version="1" comment="radvd is &lt;1.9.7-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141799" version="1" comment="rhythmbox is &lt;3.0.2-1.92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141800" version="1" comment="rhythmbox-lang is &lt;3.0.2-1.92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141801" version="1" comment="rsync is &lt;3.1.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141802" version="1" comment="rsyslog is &lt;8.4.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141122" version="1" comment="rtkit is &lt;0.11_git201205151338-8.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141123" version="1" comment="ruby is &lt;2.1-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141803" version="1" comment="shim is &lt;0.7-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141804" version="1" comment="socat is &lt;1.7.2.4-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141805" version="1" comment="squashfs is &lt;4.3-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141806" version="1" comment="strongswan is &lt;5.1.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141807" version="1" comment="strongswan-doc is &lt;5.1.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141808" version="1" comment="strongswan-ipsec is &lt;5.1.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141809" version="1" comment="strongswan-libs0 is &lt;5.1.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141810" version="1" comment="sudo is &lt;1.8.10p3-1.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141811" version="1" comment="sysconfig is &lt;0.83.7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141812" version="1" comment="sysconfig-netconfig is &lt;0.83.7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141134" version="1" comment="syslog-service is &lt;2.0-778.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141813" version="1" comment="sysvinit-tools is &lt;2.88+-94.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141139" version="1" comment="whois is &lt;5.1.1-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141814" version="1" comment="telepathy-gabble is &lt;0.18.1-3.268" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141815" version="1" comment="telepathy-idle is &lt;0.2.0-1.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141816" version="1" comment="tftp is &lt;5.2-8.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141817" version="1" comment="tigervnc is &lt;1.3.0-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141818" version="1" comment="xorg-x11-Xvnc is &lt;1.3.0-17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141819" version="1" comment="unixODBC is &lt;2.3.1-4.95" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141820" version="1" comment="unixODBC-32bit is &lt;2.3.1-4.95" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141821" version="1" comment="vino is &lt;3.10.1-1.86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141822" version="1" comment="vino-lang is &lt;3.10.1-1.86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141823" version="1" comment="vorbis-tools is &lt;1.4.0-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141824" version="1" comment="vorbis-tools-lang is &lt;1.4.0-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141825" version="1" comment="w3m is &lt;0.5.3-153.145" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140672" version="1" comment="wdiff is &lt;1.2.1-3.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141826" version="1" comment="wget is &lt;1.14-4.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141827" version="1" comment="wireshark is &lt;1.10.9-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141828" version="1" comment="xalan-j2 is &lt;2.7.0-264.133" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141829" version="1" comment="xen is &lt;4.4.1_06-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141830" version="1" comment="xen-kmp-default is &lt;4.4.1_06_k3.12.28_4-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141831" version="1" comment="xen-libs is &lt;4.4.1_06-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141832" version="1" comment="xen-libs-32bit is &lt;4.4.1_06-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141833" version="1" comment="xf86-video-intel is &lt;2.99.914-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141167" version="1" comment="xinetd is &lt;2.3.15-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141168" version="1" comment="xlockmore is &lt;5.43-5.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141834" version="1" comment="xorg-x11 is &lt;7.6_1-14.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141835" version="1" comment="xorg-x11-essentials is &lt;7.6_1-14.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141171" version="1" comment="xrdb is &lt;1.1.0-3.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141836" version="1" comment="xorg-x11-libs is &lt;7.6-45.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141837" version="1" comment="xorg-x11-server is &lt;7.6_1.15.2-12.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141838" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.15.2-12.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141839" version="1" comment="yast2 is &lt;3.1.108-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141840" version="1" comment="yast2-core is &lt;3.1.11-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141178" version="1" comment="zoo is &lt;2.10-1020.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109224" version="1" comment="DirectFB is &lt;1.7.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109231" version="1" comment="lib++dfb-1_7-1 is &lt;1.7.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109233" version="1" comment="libdirectfb-1_7-1 is &lt;1.7.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109234" version="1" comment="libdirectfb-1_7-1-32bit is &lt;1.7.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118774" version="1" comment="sled-release is ==12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102628" version="1" comment="ImageMagick is &lt;6.8.8.1-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102634" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102638" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102637" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102640" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116011" version="1" comment="MozillaFirefox is &lt;38.4.0esr-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116014" version="1" comment="MozillaFirefox-translations is &lt;38.4.0esr-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141841" version="1" comment="aaa_base is &lt;13.2+git20140911.61c1681-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141842" version="1" comment="aaa_base-extras is &lt;13.2+git20140911.61c1681-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141843" version="1" comment="accountsservice is &lt;0.6.35-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141844" version="1" comment="accountsservice-lang is &lt;0.6.35-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141845" version="1" comment="libaccountsservice0 is &lt;0.6.35-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141846" version="1" comment="typelib-1_0-AccountsService-1_0 is &lt;0.6.35-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110200" version="1" comment="autofs is &lt;5.0.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141847" version="1" comment="bind-libs is &lt;9.9.6P1-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141848" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141849" version="1" comment="bind-utils is &lt;9.9.6P1-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141850" version="1" comment="binutils is &lt;2.25.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113975" version="1" comment="busybox is &lt;1.21.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141851" version="1" comment="cifs-utils is &lt;6.4-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109618" version="1" comment="clamav is &lt;0.98.7-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141852" version="1" comment="colord is &lt;1.1.7-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141853" version="1" comment="colord-lang is &lt;1.1.7-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141854" version="1" comment="libcolord2 is &lt;1.1.7-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141855" version="1" comment="libcolord2-32bit is &lt;1.1.7-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141856" version="1" comment="libcolorhug2 is &lt;1.1.7-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114699" version="1" comment="coreutils is &lt;8.22-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114700" version="1" comment="coreutils-lang is &lt;8.22-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102938" version="1" comment="cpio is &lt;2.11-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102939" version="1" comment="cpio-lang is &lt;2.11-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115214" version="1" comment="cpp48 is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115215" version="1" comment="gcc48 is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115258" version="1" comment="gcc48-32bit is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115217" version="1" comment="gcc48-c++ is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115239" version="1" comment="gcc48-gij is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115238" version="1" comment="gcc48-gij-32bit is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115219" version="1" comment="gcc48-info is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115224" version="1" comment="libasan0 is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115263" version="1" comment="libasan0-32bit is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115242" version="1" comment="libgcj48 is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115241" version="1" comment="libgcj48-32bit is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115245" version="1" comment="libgcj48-jar is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115246" version="1" comment="libgcj_bc1 is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115232" version="1" comment="libstdc++48-devel is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115271" version="1" comment="libstdc++48-devel-32bit is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140508" version="1" comment="cron is &lt;4.2-58.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140509" version="1" comment="cronie is &lt;1.4.11-58.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110315" version="1" comment="cups is &lt;1.7.5-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110316" version="1" comment="cups-client is &lt;1.7.5-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110319" version="1" comment="cups-libs is &lt;1.7.5-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110320" version="1" comment="cups-libs-32bit is &lt;1.7.5-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113515" version="1" comment="cups-filters is &lt;1.0.58-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113516" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113518" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113519" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110168" version="1" comment="curl is &lt;7.37.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110172" version="1" comment="libcurl4 is &lt;7.37.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110171" version="1" comment="libcurl4-32bit is &lt;7.37.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107559" version="1" comment="dbus-1 is &lt;1.8.16-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107561" version="1" comment="dbus-1-x11 is &lt;1.8.16-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107564" version="1" comment="libdbus-1-3 is &lt;1.8.16-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107565" version="1" comment="libdbus-1-3-32bit is &lt;1.8.16-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141857" version="1" comment="dhcp is &lt;4.3.3-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141858" version="1" comment="dhcp-client is &lt;4.3.3-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141859" version="1" comment="dnsmasq is &lt;2.71-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138243" version="1" comment="dracut is &lt;037-66.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113256" version="1" comment="e2fsprogs is &lt;1.42.11-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113260" version="1" comment="libcom_err2 is &lt;1.42.11-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113261" version="1" comment="libcom_err2-32bit is &lt;1.42.11-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113264" version="1" comment="libext2fs2 is &lt;1.42.11-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106094" version="1" comment="elfutils is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106096" version="1" comment="libasm1 is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106099" version="1" comment="libdw1 is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106100" version="1" comment="libdw1-32bit is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106102" version="1" comment="libebl1 is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106103" version="1" comment="libebl1-32bit is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106106" version="1" comment="libelf1 is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106107" version="1" comment="libelf1-32bit is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141860" version="1" comment="facter is &lt;2.0.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103557" version="1" comment="file is &lt;5.19-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103559" version="1" comment="file-magic is &lt;5.19-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103561" version="1" comment="libmagic1 is &lt;5.19-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103560" version="1" comment="libmagic1-32bit is &lt;5.19-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102676" version="1" comment="finch is &lt;2.10.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102678" version="1" comment="libpurple is &lt;2.10.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102681" version="1" comment="libpurple-lang is &lt;2.10.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102682" version="1" comment="libpurple-meanwhile is &lt;2.10.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102683" version="1" comment="libpurple-tcl is &lt;2.10.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102684" version="1" comment="pidgin is &lt;2.10.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116120" version="1" comment="flash-player is &lt;11.2.202.548-111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116121" version="1" comment="flash-player-gnome is &lt;11.2.202.548-111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141861" version="1" comment="ft2demos is &lt;2.5.5-7.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110488" version="1" comment="fuse is &lt;2.9.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110491" version="1" comment="libfuse2 is &lt;2.9.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109545" version="1" comment="gd is &lt;2.1.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109546" version="1" comment="gd-32bit is &lt;2.1.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141862" version="1" comment="gdm is &lt;3.10.0.1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141863" version="1" comment="gdm-branding-upstream is &lt;3.10.0.1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141864" version="1" comment="gdm-lang is &lt;3.10.0.1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141865" version="1" comment="gdmflexiserver is &lt;3.10.0.1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141866" version="1" comment="libgdm1 is &lt;3.10.0.1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141867" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.10.0.1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141868" version="1" comment="glibc is &lt;2.19-31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141869" version="1" comment="glibc-32bit is &lt;2.19-31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141870" version="1" comment="glibc-devel is &lt;2.19-31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141871" version="1" comment="glibc-devel-32bit is &lt;2.19-31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141872" version="1" comment="glibc-i18ndata is &lt;2.19-31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141873" version="1" comment="glibc-locale is &lt;2.19-31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141874" version="1" comment="glibc-locale-32bit is &lt;2.19-31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141875" version="1" comment="nscd is &lt;2.19-31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141876" version="1" comment="gnome-keyring is &lt;3.10.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141877" version="1" comment="gnome-keyring-32bit is &lt;3.10.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141878" version="1" comment="gnome-keyring-lang is &lt;3.10.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141879" version="1" comment="gnome-keyring-pam is &lt;3.10.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141880" version="1" comment="gnome-keyring-pam-32bit is &lt;3.10.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141881" version="1" comment="libgck-modules-gnome-keyring is &lt;3.10.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107802" version="1" comment="gnome-settings-daemon is &lt;3.10.2-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107804" version="1" comment="gnome-settings-daemon-lang is &lt;3.10.2-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141882" version="1" comment="gnome-shell is &lt;3.10.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141883" version="1" comment="gnome-shell-browser-plugin is &lt;3.10.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141884" version="1" comment="gnome-shell-calendar is &lt;3.10.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141885" version="1" comment="gnome-shell-lang is &lt;3.10.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114253" version="1" comment="gnutls is &lt;3.2.15-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114258" version="1" comment="libgnutls28 is &lt;3.2.15-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114259" version="1" comment="libgnutls28-32bit is &lt;3.2.15-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109841" version="1" comment="gstreamer-0_10-plugins-bad is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109845" version="1" comment="gstreamer-0_10-plugins-bad-lang is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109846" version="1" comment="libgstbasecamerabinsrc-0_10-23 is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109847" version="1" comment="libgstbasecamerabinsrc-0_10-23-32bit is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109848" version="1" comment="libgstbasevideo-0_10-23 is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109849" version="1" comment="libgstbasevideo-0_10-23-32bit is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109850" version="1" comment="libgstcodecparsers-0_10-23 is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109852" version="1" comment="libgstphotography-0_10-23 is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109853" version="1" comment="libgstphotography-0_10-23-32bit is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109854" version="1" comment="libgstsignalprocessor-0_10-23 is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109855" version="1" comment="libgstsignalprocessor-0_10-23-32bit is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109856" version="1" comment="libgstvdp-0_10-23 is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109857" version="1" comment="libgstvdp-0_10-23-32bit is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141886" version="1" comment="hyper-v is &lt;6-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107566" version="1" comment="icu is &lt;52.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107572" version="1" comment="libicu52_1 is &lt;52.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107571" version="1" comment="libicu52_1-32bit is &lt;52.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107573" version="1" comment="libicu52_1-data is &lt;52.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115439" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.91-21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115443" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.91-21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114769" version="1" comment="java-1_7_0-openjdk-plugin is &lt;1.6.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141887" version="1" comment="java-1_8_0-openjdk-plugin is &lt;1.6.1-2.4.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141888" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.65-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141889" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.65-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141890" version="1" comment="kbd is &lt;1.15.5-8.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141891" version="1" comment="kernel-default is &lt;3.12.49-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141892" version="1" comment="kernel-default-devel is &lt;3.12.49-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141893" version="1" comment="kernel-default-extra is &lt;3.12.49-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141894" version="1" comment="kernel-devel is &lt;3.12.49-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141895" version="1" comment="kernel-macros is &lt;3.12.49-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141896" version="1" comment="kernel-source is &lt;3.12.49-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141897" version="1" comment="kernel-syms is &lt;3.12.49-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141898" version="1" comment="kernel-xen is &lt;3.12.49-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141899" version="1" comment="kernel-xen-devel is &lt;3.12.49-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115941" version="1" comment="krb5 is &lt;1.12.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115942" version="1" comment="krb5-32bit is &lt;1.12.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115943" version="1" comment="krb5-client is &lt;1.12.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102936" version="1" comment="libFLAC8 is &lt;1.3.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102937" version="1" comment="libFLAC8-32bit is &lt;1.3.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141900" version="1" comment="libQt5Core5 is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141901" version="1" comment="libQt5DBus5 is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141902" version="1" comment="libQt5Gui5 is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141903" version="1" comment="libQt5Widgets5 is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108654" version="1" comment="libXfont1 is &lt;1.4.7-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140753" version="1" comment="libXi6 is &lt;1.7.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140754" version="1" comment="libXi6-32bit is &lt;1.7.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108423" version="1" comment="libarchive13 is &lt;3.1.2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111372" version="1" comment="libaugeas0 is &lt;1.2.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141904" version="1" comment="libblkid1 is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141905" version="1" comment="libblkid1-32bit is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141906" version="1" comment="libmount1 is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141907" version="1" comment="libmount1-32bit is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141908" version="1" comment="libsmartcols1 is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141909" version="1" comment="libuuid-devel is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141910" version="1" comment="libuuid1 is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141911" version="1" comment="libuuid1-32bit is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141912" version="1" comment="python-libmount is &lt;2.25-30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141913" version="1" comment="util-linux is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141914" version="1" comment="util-linux-lang is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141915" version="1" comment="util-linux-systemd is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141916" version="1" comment="uuidd is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140793" version="1" comment="libcgroup1 is &lt;0.41.rc1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141917" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141918" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141919" version="1" comment="libdcerpc0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141920" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141921" version="1" comment="libgensec0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141922" version="1" comment="libgensec0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141923" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141924" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141925" version="1" comment="libndr-nbt0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141926" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141927" version="1" comment="libndr-standard0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141928" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141929" version="1" comment="libndr0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141930" version="1" comment="libndr0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141931" version="1" comment="libnetapi0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141932" version="1" comment="libnetapi0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141933" version="1" comment="libregistry0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141934" version="1" comment="libsamba-credentials0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141935" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141936" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141937" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141938" version="1" comment="libsamba-passdb0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141939" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141940" version="1" comment="libsamba-util0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141941" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141942" version="1" comment="libsamdb0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141943" version="1" comment="libsamdb0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141944" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141945" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141946" version="1" comment="libsmbclient0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141947" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141948" version="1" comment="libsmbconf0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141949" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141950" version="1" comment="libsmbldap0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141951" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141952" version="1" comment="libtevent-util0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141953" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141954" version="1" comment="libwbclient0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141955" version="1" comment="libwbclient0-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141956" version="1" comment="samba is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141957" version="1" comment="samba-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141958" version="1" comment="samba-client is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141959" version="1" comment="samba-client-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141960" version="1" comment="samba-doc is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141961" version="1" comment="samba-libs is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141962" version="1" comment="samba-libs-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141963" version="1" comment="samba-winbind is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141964" version="1" comment="samba-winbind-32bit is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141965" version="1" comment="libecpg6 is &lt;9.4.5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141966" version="1" comment="libpq5 is &lt;9.4.5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141967" version="1" comment="libpq5-32bit is &lt;9.4.5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141968" version="1" comment="postgresql94 is &lt;9.4.5-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116018" version="1" comment="libfreebl3 is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116019" version="1" comment="libfreebl3-32bit is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116022" version="1" comment="libsoftokn3 is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116023" version="1" comment="libsoftokn3-32bit is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116026" version="1" comment="mozilla-nss is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116027" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116029" version="1" comment="mozilla-nss-certs is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116030" version="1" comment="mozilla-nss-certs-32bit is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116032" version="1" comment="mozilla-nss-sysinit is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116033" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116034" version="1" comment="mozilla-nss-tools is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141969" version="1" comment="libfreetype6 is &lt;2.5.5-7.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141970" version="1" comment="libfreetype6-32bit is &lt;2.5.5-7.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114243" version="1" comment="libgcrypt20 is &lt;1.6.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114244" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141971" version="1" comment="libgudev-1_0-0 is &lt;210-83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141972" version="1" comment="libgudev-1_0-0-32bit is &lt;210-83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141973" version="1" comment="libudev1 is &lt;210-83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141974" version="1" comment="libudev1-32bit is &lt;210-83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141975" version="1" comment="systemd is &lt;210-83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141976" version="1" comment="systemd-32bit is &lt;210-83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141977" version="1" comment="systemd-bash-completion is &lt;210-83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141978" version="1" comment="systemd-sysvinit is &lt;210-83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141979" version="1" comment="udev is &lt;210-83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141980" version="1" comment="libipa_hbac0 is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141981" version="1" comment="libsss_idmap0 is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141982" version="1" comment="libsss_sudo is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141983" version="1" comment="python-sssd-config is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141984" version="1" comment="sssd is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141985" version="1" comment="sssd-32bit is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141986" version="1" comment="sssd-ad is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141987" version="1" comment="sssd-ipa is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141988" version="1" comment="sssd-krb5 is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141989" version="1" comment="sssd-krb5-common is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141990" version="1" comment="sssd-ldap is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141991" version="1" comment="sssd-proxy is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141992" version="1" comment="sssd-tools is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106110" version="1" comment="libjasper1 is &lt;1.900.1-170.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106111" version="1" comment="libjasper1-32bit is &lt;1.900.1-170.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108618" version="1" comment="libjavascriptcoregtk-1_0-0 is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108619" version="1" comment="libjavascriptcoregtk-1_0-0-32bit is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108628" version="1" comment="libjavascriptcoregtk-3_0-0 is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108630" version="1" comment="libwebkit2gtk-3_0-25 is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108620" version="1" comment="libwebkitgtk-1_0-0 is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108621" version="1" comment="libwebkitgtk-1_0-0-32bit is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108631" version="1" comment="libwebkitgtk-3_0-0 is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108623" version="1" comment="libwebkitgtk2-lang is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108634" version="1" comment="libwebkitgtk3-lang is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108635" version="1" comment="typelib-1_0-JavaScriptCore-3_0 is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108636" version="1" comment="typelib-1_0-WebKit-3_0 is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105080" version="1" comment="libjpeg-turbo is &lt;1.3.1-30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105088" version="1" comment="libjpeg62 is &lt;62.1.0-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105087" version="1" comment="libjpeg62-32bit is &lt;62.1.0-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105091" version="1" comment="libjpeg62-turbo is &lt;1.3.1-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105082" version="1" comment="libjpeg8 is &lt;8.0.2-30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105081" version="1" comment="libjpeg8-32bit is &lt;8.0.2-30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105086" version="1" comment="libturbojpeg0 is &lt;8.0.2-30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105094" version="1" comment="libksba8 is &lt;1.3.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105814" version="1" comment="libmpfr4 is &lt;3.1.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107709" version="1" comment="libmspack0 is &lt;0.4-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141993" version="1" comment="libmysqlclient18 is &lt;10.0.21-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141994" version="1" comment="libmysqlclient18-32bit is &lt;10.0.21-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141995" version="1" comment="libmysqlclient_r18 is &lt;10.0.21-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141996" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.21-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141997" version="1" comment="mariadb is &lt;10.0.21-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141998" version="1" comment="mariadb-client is &lt;10.0.21-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141999" version="1" comment="mariadb-errormessages is &lt;10.0.21-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142000" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-81.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142001" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-81.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142002" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142003" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142004" version="1" comment="openssl is &lt;1.0.1i-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142005" version="1" comment="libpng15-15 is &lt;1.5.22-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105438" version="1" comment="libpng16-16 is &lt;1.6.8-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105439" version="1" comment="libpng16-16-32bit is &lt;1.6.8-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115371" version="1" comment="libpolkit0 is &lt;0.113-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115372" version="1" comment="libpolkit0-32bit is &lt;0.113-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115373" version="1" comment="polkit is &lt;0.113-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115376" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142006" version="1" comment="libpython2_7-1_0 is &lt;2.7.9-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142007" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.9-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142008" version="1" comment="python-base is &lt;2.7.9-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142009" version="1" comment="python-devel is &lt;2.7.9-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142010" version="1" comment="python-xml is &lt;2.7.9-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140926" version="1" comment="libpython3_4m1_0 is &lt;3.4.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140927" version="1" comment="python3-base is &lt;3.4.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113431" version="1" comment="libqt4 is &lt;4.8.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113430" version="1" comment="libqt4-32bit is &lt;4.8.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113436" version="1" comment="libqt4-qt3support is &lt;4.8.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113435" version="1" comment="libqt4-qt3support-32bit is &lt;4.8.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113438" version="1" comment="libqt4-sql is &lt;4.8.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113437" version="1" comment="libqt4-sql-32bit is &lt;4.8.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113424" version="1" comment="libqt4-sql-mysql is &lt;4.8.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113423" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.8.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113427" version="1" comment="libqt4-sql-postgresql is &lt;4.8.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113426" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.8.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113440" version="1" comment="libqt4-sql-sqlite is &lt;4.8.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113439" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.8.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113429" version="1" comment="libqt4-sql-unixODBC is &lt;4.8.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113428" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.8.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113442" version="1" comment="libqt4-x11 is &lt;4.8.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113441" version="1" comment="libqt4-x11-32bit is &lt;4.8.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115661" version="1" comment="libreoffice is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115662" version="1" comment="libreoffice-base is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115663" version="1" comment="libreoffice-base-drivers-mysql is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115664" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115666" version="1" comment="libreoffice-calc is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115667" version="1" comment="libreoffice-calc-extensions is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115668" version="1" comment="libreoffice-draw is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115669" version="1" comment="libreoffice-filters-optional is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115670" version="1" comment="libreoffice-gnome is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115677" version="1" comment="libreoffice-icon-theme-tango is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115678" version="1" comment="libreoffice-impress is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115680" version="1" comment="libreoffice-l10n-af is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115681" version="1" comment="libreoffice-l10n-ar is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115686" version="1" comment="libreoffice-l10n-ca is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115687" version="1" comment="libreoffice-l10n-cs is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115689" version="1" comment="libreoffice-l10n-da is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115690" version="1" comment="libreoffice-l10n-de is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115693" version="1" comment="libreoffice-l10n-en is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115694" version="1" comment="libreoffice-l10n-es is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115698" version="1" comment="libreoffice-l10n-fi is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115699" version="1" comment="libreoffice-l10n-fr is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115702" version="1" comment="libreoffice-l10n-gu is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115704" version="1" comment="libreoffice-l10n-hi is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115706" version="1" comment="libreoffice-l10n-hu is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115707" version="1" comment="libreoffice-l10n-it is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115708" version="1" comment="libreoffice-l10n-ja is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115711" version="1" comment="libreoffice-l10n-ko is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115717" version="1" comment="libreoffice-l10n-nb is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115718" version="1" comment="libreoffice-l10n-nl is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115719" version="1" comment="libreoffice-l10n-nn is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115724" version="1" comment="libreoffice-l10n-pl is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115725" version="1" comment="libreoffice-l10n-pt-BR is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115726" version="1" comment="libreoffice-l10n-pt-PT is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115728" version="1" comment="libreoffice-l10n-ru is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115730" version="1" comment="libreoffice-l10n-sk is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115735" version="1" comment="libreoffice-l10n-sv is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115744" version="1" comment="libreoffice-l10n-xh is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115745" version="1" comment="libreoffice-l10n-zh-Hans is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115746" version="1" comment="libreoffice-l10n-zh-Hant is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115747" version="1" comment="libreoffice-l10n-zu is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115748" version="1" comment="libreoffice-mailmerge is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115749" version="1" comment="libreoffice-math is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115750" version="1" comment="libreoffice-officebean is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115751" version="1" comment="libreoffice-pyuno is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115754" version="1" comment="libreoffice-writer is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115755" version="1" comment="libreoffice-writer-extensions is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105408" version="1" comment="libruby2_1-2_1 is &lt;2.1.2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105409" version="1" comment="ruby2.1 is &lt;2.1.2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105414" version="1" comment="ruby2.1-stdlib is &lt;2.1.2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105600" version="1" comment="libsndfile1 is &lt;1.0.25-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105601" version="1" comment="libsndfile1-32bit is &lt;1.0.25-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140934" version="1" comment="libsnmp30 is &lt;5.7.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140935" version="1" comment="libsnmp30-32bit is &lt;5.7.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140936" version="1" comment="net-snmp is &lt;5.7.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140937" version="1" comment="perl-SNMP is &lt;5.7.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140938" version="1" comment="snmp-mibs is &lt;5.7.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142011" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.29-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142012" version="1" comment="libspice-client-gtk-2_0-4 is &lt;0.29-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142013" version="1" comment="libspice-client-gtk-3_0-4 is &lt;0.29-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142014" version="1" comment="libspice-controller0 is &lt;0.29-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142015" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.29-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142016" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.29-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142017" version="1" comment="libspice-server1 is &lt;0.12.5-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108425" version="1" comment="libssh2-1 is &lt;1.4.3-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108426" version="1" comment="libssh2-1-32bit is &lt;1.4.3-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114957" version="1" comment="libssh4 is &lt;0.6.3-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109692" version="1" comment="libtasn1 is &lt;3.7-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109693" version="1" comment="libtasn1-6 is &lt;3.7-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109694" version="1" comment="libtasn1-6-32bit is &lt;3.7-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114060" version="1" comment="libtiff5 is &lt;4.0.4-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114059" version="1" comment="libtiff5-32bit is &lt;4.0.4-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115565" version="1" comment="libvdpau1 is &lt;0.8-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115566" version="1" comment="libvdpau1-32bit is &lt;0.8-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142018" version="1" comment="libvirt is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142019" version="1" comment="libvirt-client is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142020" version="1" comment="libvirt-client-32bit is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142021" version="1" comment="libvirt-daemon is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142022" version="1" comment="libvirt-daemon-config-network is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142023" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142024" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142025" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142026" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142027" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142028" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142029" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142030" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142031" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142032" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142033" version="1" comment="libvirt-daemon-lxc is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142034" version="1" comment="libvirt-daemon-qemu is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142035" version="1" comment="libvirt-daemon-xen is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142036" version="1" comment="libvirt-doc is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114120" version="1" comment="libwmf-0_2-7 is &lt;0.2.8.4-242.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108092" version="1" comment="libxerces-c-3_1 is &lt;3.1.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108093" version="1" comment="libxerces-c-3_1-32bit is &lt;3.1.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103731" version="1" comment="libxml2-2 is &lt;2.9.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103732" version="1" comment="libxml2-2-32bit is &lt;2.9.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103737" version="1" comment="libxml2-tools is &lt;2.9.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141036" version="1" comment="libyaml-0-2 is &lt;0.1.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142037" version="1" comment="libzip2 is &lt;0.11.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114236" version="1" comment="libzmq3 is &lt;4.0.4-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142038" version="1" comment="mailx is &lt;12.5-25.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116016" version="1" comment="mozilla-nspr is &lt;4.10.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116015" version="1" comment="mozilla-nspr-32bit is &lt;4.10.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105068" version="1" comment="mutt is &lt;1.5.21-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142039" version="1" comment="ntp is &lt;4.2.8p4-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142040" version="1" comment="ntp-doc is &lt;4.2.8p4-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142041" version="1" comment="openslp is &lt;2.0.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142042" version="1" comment="openslp-32bit is &lt;2.0.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114322" version="1" comment="openssh is &lt;6.6p1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114325" version="1" comment="openssh-helpers is &lt;6.6p1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142043" version="1" comment="openvpn is &lt;2.3.8-16.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113958" version="1" comment="p7zip is &lt;9.20.1-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141056" version="1" comment="pam is &lt;1.1.8-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141057" version="1" comment="pam-32bit is &lt;1.1.8-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141058" version="1" comment="pam-doc is &lt;1.1.8-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110205" version="1" comment="patch is &lt;2.7.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113959" version="1" comment="perl-XML-LibXML is &lt;2.0019-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109959" version="1" comment="perl-YAML-LibYAML is &lt;0.38-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108432" version="1" comment="pigz is &lt;2.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142044" version="1" comment="python is &lt;2.7.9-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142045" version="1" comment="python-curses is &lt;2.7.9-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142046" version="1" comment="python-tk is &lt;2.7.9-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141074" version="1" comment="python3 is &lt;3.4.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103738" version="1" comment="python-libxml2 is &lt;2.9.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142047" version="1" comment="python-requests is &lt;2.3.0-6.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142048" version="1" comment="qemu is &lt;2.3.1-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142049" version="1" comment="qemu-block-curl is &lt;2.3.1-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142050" version="1" comment="qemu-ipxe is &lt;1.0.0-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142051" version="1" comment="qemu-kvm is &lt;2.3.1-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142052" version="1" comment="qemu-seabios is &lt;1.8.1-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142053" version="1" comment="qemu-sgabios is &lt;8-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142054" version="1" comment="qemu-tools is &lt;2.3.1-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142055" version="1" comment="qemu-vgabios is &lt;1.8.1-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142056" version="1" comment="qemu-x86 is &lt;2.3.1-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142057" version="1" comment="rpcbind is &lt;0.2.1_rc4-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105405" version="1" comment="rpm is &lt;4.11.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105404" version="1" comment="rpm-32bit is &lt;4.11.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105406" version="1" comment="rpm-build is &lt;4.11.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142058" version="1" comment="rsyslog is &lt;8.4.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141124" version="1" comment="sblim-sfcb is &lt;1.4.8-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142059" version="1" comment="shim is &lt;0.9-2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110995" version="1" comment="strongswan is &lt;5.1.3-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110997" version="1" comment="strongswan-doc is &lt;5.1.3-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110999" version="1" comment="strongswan-ipsec is &lt;5.1.3-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111000" version="1" comment="strongswan-libs0 is &lt;5.1.3-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142060" version="1" comment="sysconfig is &lt;0.83.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142061" version="1" comment="sysconfig-netconfig is &lt;0.83.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139103" version="1" comment="tar is &lt;1.27.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009139104" version="1" comment="tar-lang is &lt;1.27.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108642" version="1" comment="tcpdump is &lt;4.5.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141141" version="1" comment="tftp is &lt;5.2-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142062" version="1" comment="tigervnc is &lt;1.4.3-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142063" version="1" comment="xorg-x11-Xvnc is &lt;1.4.3-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106381" version="1" comment="unzip is &lt;6.00-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115051" version="1" comment="vorbis-tools is &lt;1.4.0-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115052" version="1" comment="vorbis-tools-lang is &lt;1.4.0-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102008" version="1" comment="wget is &lt;1.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114951" version="1" comment="wireshark is &lt;1.12.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110201" version="1" comment="wpa_supplicant is &lt;2.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106065" version="1" comment="xdg-utils is &lt;20140630-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142064" version="1" comment="xen is &lt;4.5.1_12-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142065" version="1" comment="xen-kmp-default is &lt;4.5.1_12_k3.12.49_11-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142066" version="1" comment="xen-libs is &lt;4.5.1_12-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142067" version="1" comment="xen-libs-32bit is &lt;4.5.1_12-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142068" version="1" comment="xf86-video-intel is &lt;2.99.914-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142069" version="1" comment="xorg-x11-server is &lt;7.6_1.15.2-36.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142070" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.15.2-36.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142071" version="1" comment="yast2 is &lt;3.1.155-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142072" version="1" comment="yast2-core is &lt;3.1.18-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140428" version="1" comment="DirectFB is &lt;1.7.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140429" version="1" comment="lib++dfb-1_7-1 is &lt;1.7.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140430" version="1" comment="libdirectfb-1_7-1 is &lt;1.7.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142073" version="1" comment="libdirectfb-1_7-1-32bit is &lt;1.7.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128016" version="1" comment="sled-release is ==12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130983" version="1" comment="ImageMagick is &lt;6.8.8.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130984" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130985" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130986" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130987" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131144" version="1" comment="MozillaFirefox is &lt;45.4.0esr-81.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131145" version="1" comment="MozillaFirefox-translations is &lt;45.4.0esr-81.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142074" version="1" comment="NetworkManager is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142075" version="1" comment="NetworkManager-lang is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140431" version="1" comment="libnm-glib-vpn1 is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140432" version="1" comment="libnm-glib4 is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140433" version="1" comment="libnm-util2 is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140434" version="1" comment="libnm0 is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142076" version="1" comment="typelib-1_0-NM-1_0 is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140435" version="1" comment="typelib-1_0-NMClient-1_0 is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140436" version="1" comment="typelib-1_0-NetworkManager-1_0 is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140437" version="1" comment="aaa_base is &lt;13.2+git20140911.61c1681-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140438" version="1" comment="aaa_base-extras is &lt;13.2+git20140911.61c1681-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140439" version="1" comment="accountsservice is &lt;0.6.42-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140440" version="1" comment="accountsservice-lang is &lt;0.6.42-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140441" version="1" comment="libaccountsservice0 is &lt;0.6.42-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140442" version="1" comment="typelib-1_0-AccountsService-1_0 is &lt;0.6.42-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142077" version="1" comment="argyllcms is &lt;1.6.3-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131107" version="1" comment="at is &lt;3.1.14-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131109" version="1" comment="libQtWebKit4 is &lt;4.8.6+2.3.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131110" version="1" comment="libQtWebKit4-32bit is &lt;4.8.6+2.3.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131111" version="1" comment="libbonobo is &lt;2.32.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131112" version="1" comment="libbonobo-32bit is &lt;2.32.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131113" version="1" comment="libbonobo-lang is &lt;2.32.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131114" version="1" comment="libkde4 is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131115" version="1" comment="libkde4-32bit is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131116" version="1" comment="libkdecore4 is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131117" version="1" comment="libkdecore4-32bit is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131118" version="1" comment="libksuseinstall1 is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131119" version="1" comment="libksuseinstall1-32bit is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131120" version="1" comment="libnetpbm11 is &lt;10.66.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131121" version="1" comment="libnetpbm11-32bit is &lt;10.66.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131122" version="1" comment="netpbm is &lt;10.66.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140461" version="1" comment="augeas is &lt;1.2.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140462" version="1" comment="augeas-lenses is &lt;1.2.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140463" version="1" comment="libaugeas0 is &lt;1.2.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140464" version="1" comment="autofs is &lt;5.0.9-21.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140467" version="1" comment="avahi is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140468" version="1" comment="avahi-lang is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140470" version="1" comment="libavahi-client3 is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140471" version="1" comment="libavahi-client3-32bit is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140472" version="1" comment="libavahi-common3 is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140473" version="1" comment="libavahi-common3-32bit is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140474" version="1" comment="libavahi-core7 is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140475" version="1" comment="libdns_sd is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140476" version="1" comment="libdns_sd-32bit is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140477" version="1" comment="bash is &lt;4.3-78.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140478" version="1" comment="bash-doc is &lt;4.3-78.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142078" version="1" comment="bash-lang is &lt;4.3-78.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140479" version="1" comment="libreadline6 is &lt;6.3-78.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140480" version="1" comment="libreadline6-32bit is &lt;6.3-78.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140481" version="1" comment="readline-doc is &lt;6.3-78.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131136" version="1" comment="bind-libs is &lt;9.9.9P1-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131137" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131138" version="1" comment="bind-utils is &lt;9.9.9P1-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140482" version="1" comment="binutils is &lt;2.26.1-9.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131108" version="1" comment="bogofilter is &lt;1.2.4-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140483" version="1" comment="bzip2 is &lt;1.0.6-29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140485" version="1" comment="libbz2-1 is &lt;1.0.6-29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140486" version="1" comment="libbz2-1-32bit is &lt;1.0.6-29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140488" version="1" comment="cifs-utils is &lt;6.5-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140489" version="1" comment="clamav is &lt;0.99.2-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142079" version="1" comment="colord is &lt;1.3.3-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140490" version="1" comment="colord-gtk-lang is &lt;0.1.26-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142080" version="1" comment="colord-lang is &lt;1.3.3-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140491" version="1" comment="libcolord-gtk1 is &lt;0.1.26-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140492" version="1" comment="libcolord2 is &lt;1.3.3-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140493" version="1" comment="libcolord2-32bit is &lt;1.3.3-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140494" version="1" comment="libcolorhug2 is &lt;1.3.3-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140496" version="1" comment="coreutils is &lt;8.25-12.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140497" version="1" comment="coreutils-lang is &lt;8.25-12.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140498" version="1" comment="cpp48 is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140499" version="1" comment="gcc48 is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140500" version="1" comment="gcc48-32bit is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140501" version="1" comment="gcc48-c++ is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142081" version="1" comment="gcc48-gij is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142082" version="1" comment="gcc48-gij-32bit is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140502" version="1" comment="gcc48-info is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140504" version="1" comment="libasan0 is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140505" version="1" comment="libasan0-32bit is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142083" version="1" comment="libgcj48 is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142084" version="1" comment="libgcj48-32bit is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142085" version="1" comment="libgcj48-jar is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142086" version="1" comment="libgcj_bc1 is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140506" version="1" comment="libstdc++48-devel is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140507" version="1" comment="libstdc++48-devel-32bit is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130930" version="1" comment="cracklib is &lt;2.9.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131013" version="1" comment="libcrack2 is &lt;2.9.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131014" version="1" comment="libcrack2-32bit is &lt;2.9.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130995" version="1" comment="ctags is &lt;5.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140510" version="1" comment="cups is &lt;1.7.5-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140511" version="1" comment="cups-client is &lt;1.7.5-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140512" version="1" comment="cups-libs is &lt;1.7.5-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140513" version="1" comment="cups-libs-32bit is &lt;1.7.5-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119506" version="1" comment="cups-filters is &lt;1.0.58-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119507" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119508" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119509" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131101" version="1" comment="curl is &lt;7.37.0-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131102" version="1" comment="libcurl4 is &lt;7.37.0-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131103" version="1" comment="libcurl4-32bit is &lt;7.37.0-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140535" version="1" comment="dbus-1 is &lt;1.8.16-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140536" version="1" comment="dbus-1-x11 is &lt;1.8.16-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140537" version="1" comment="libdbus-1-3 is &lt;1.8.16-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140538" version="1" comment="libdbus-1-3-32bit is &lt;1.8.16-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130039" version="1" comment="dhcp is &lt;4.3.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130040" version="1" comment="dhcp-client is &lt;4.3.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142087" version="1" comment="dia is &lt;0.97.3-15.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142088" version="1" comment="dia-lang is &lt;0.97.3-15.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140541" version="1" comment="dnsmasq is &lt;2.71-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131020" version="1" comment="dosfstools is &lt;3.0.26-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140546" version="1" comment="dracut is &lt;044-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121566" version="1" comment="ecryptfs-utils is &lt;103-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121567" version="1" comment="ecryptfs-utils-32bit is &lt;103-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140549" version="1" comment="emacs is &lt;24.3-16.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140551" version="1" comment="emacs-info is &lt;24.3-16.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140553" version="1" comment="emacs-x11 is &lt;24.3-16.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140554" version="1" comment="etags is &lt;24.3-16.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142089" version="1" comment="empathy is &lt;3.12.12-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142090" version="1" comment="empathy-lang is &lt;3.12.12-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142091" version="1" comment="telepathy-mission-control-plugin-goa is &lt;3.12.12-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140555" version="1" comment="eog is &lt;3.20.4-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140556" version="1" comment="eog-lang is &lt;3.20.4-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140557" version="1" comment="evince is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140558" version="1" comment="evince-browser-plugin is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140559" version="1" comment="evince-lang is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140560" version="1" comment="evince-plugin-djvudocument is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140561" version="1" comment="evince-plugin-dvidocument is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140562" version="1" comment="evince-plugin-pdfdocument is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140563" version="1" comment="evince-plugin-psdocument is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140564" version="1" comment="evince-plugin-tiffdocument is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140565" version="1" comment="evince-plugin-xpsdocument is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140566" version="1" comment="libevdocument3-4 is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140567" version="1" comment="libevview3-3 is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140568" version="1" comment="nautilus-evince is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142092" version="1" comment="typelib-1_0-EvinceDocument-3_0 is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142093" version="1" comment="typelib-1_0-EvinceView-3_0 is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128464" version="1" comment="expat is &lt;2.1.0-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128465" version="1" comment="libexpat1 is &lt;2.1.0-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128466" version="1" comment="libexpat1-32bit is &lt;2.1.0-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140569" version="1" comment="fetchmail is &lt;6.3.26-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142094" version="1" comment="finch is &lt;2.11.0-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142095" version="1" comment="libpurple is &lt;2.11.0-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142096" version="1" comment="libpurple-lang is &lt;2.11.0-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142097" version="1" comment="libpurple-meanwhile is &lt;2.11.0-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142098" version="1" comment="libpurple-tcl is &lt;2.11.0-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142099" version="1" comment="pidgin is &lt;2.11.0-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140574" version="1" comment="fontconfig is &lt;2.11.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140575" version="1" comment="fontconfig-32bit is &lt;2.11.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142100" version="1" comment="freerdp is &lt;2.0.0~git.1463131968.4e66df7-11.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142101" version="1" comment="libfreerdp2 is &lt;2.0.0~git.1463131968.4e66df7-11.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140589" version="1" comment="ft2demos is &lt;2.6.3-7.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131048" version="1" comment="gd is &lt;2.1.0-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131049" version="1" comment="gd-32bit is &lt;2.1.0-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140591" version="1" comment="gdk-pixbuf-lang is &lt;2.34.0-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140592" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.34.0-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140593" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.34.0-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140594" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.34.0-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140595" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.34.0-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140596" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.34.0-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140597" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.40.15-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140598" version="1" comment="librsvg-2-2 is &lt;2.40.15-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140599" version="1" comment="librsvg-2-2-32bit is &lt;2.40.15-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140600" version="1" comment="rsvg-view is &lt;2.40.15-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140601" version="1" comment="gdm is &lt;3.10.0.1-52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140602" version="1" comment="gdm-lang is &lt;3.10.0.1-52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140603" version="1" comment="gdmflexiserver is &lt;3.10.0.1-52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140604" version="1" comment="libgdm1 is &lt;3.10.0.1-52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140605" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.10.0.1-52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125321" version="1" comment="ghostscript is &lt;9.15-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125322" version="1" comment="ghostscript-x11 is &lt;9.15-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142102" version="1" comment="gimp is &lt;2.8.18-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142103" version="1" comment="gimp-lang is &lt;2.8.18-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142104" version="1" comment="gimp-plugins-python is &lt;2.8.18-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142105" version="1" comment="libgimp-2_0-0 is &lt;2.8.18-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142106" version="1" comment="libgimpui-2_0-0 is &lt;2.8.18-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140606" version="1" comment="glib2-lang is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140607" version="1" comment="glib2-tools is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140608" version="1" comment="libgio-2_0-0 is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140609" version="1" comment="libgio-2_0-0-32bit is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142107" version="1" comment="libgio-fam is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140610" version="1" comment="libglib-2_0-0 is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140611" version="1" comment="libglib-2_0-0-32bit is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140612" version="1" comment="libgmodule-2_0-0 is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140613" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140614" version="1" comment="libgobject-2_0-0 is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140615" version="1" comment="libgobject-2_0-0-32bit is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140616" version="1" comment="libgthread-2_0-0 is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140617" version="1" comment="libgthread-2_0-0-32bit is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140618" version="1" comment="glibc is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140619" version="1" comment="glibc-32bit is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140620" version="1" comment="glibc-devel is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140621" version="1" comment="glibc-devel-32bit is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140623" version="1" comment="glibc-i18ndata is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140625" version="1" comment="glibc-locale is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140626" version="1" comment="glibc-locale-32bit is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140629" version="1" comment="nscd is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140630" version="1" comment="gnome-keyring is &lt;3.20.0-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140631" version="1" comment="gnome-keyring-32bit is &lt;3.20.0-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140632" version="1" comment="gnome-keyring-lang is &lt;3.20.0-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140633" version="1" comment="gnome-keyring-pam is &lt;3.20.0-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140634" version="1" comment="gnome-keyring-pam-32bit is &lt;3.20.0-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140635" version="1" comment="libgck-modules-gnome-keyring is &lt;3.20.0-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142108" version="1" comment="gnome-online-accounts is &lt;3.20.4-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142109" version="1" comment="gnome-online-accounts-lang is &lt;3.20.4-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140636" version="1" comment="libgoa-1_0-0 is &lt;3.20.4-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142110" version="1" comment="libgoa-1_0-0-32bit is &lt;3.20.4-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140637" version="1" comment="libgoa-backend-1_0-1 is &lt;3.20.4-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142111" version="1" comment="typelib-1_0-Goa-1_0 is &lt;3.20.4-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140638" version="1" comment="gnome-settings-daemon is &lt;3.20.1-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140639" version="1" comment="gnome-settings-daemon-lang is &lt;3.20.1-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140640" version="1" comment="gnome-shell is &lt;3.20.4-70.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140641" version="1" comment="gnome-shell-browser-plugin is &lt;3.20.4-70.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142112" version="1" comment="gnome-shell-calendar is &lt;3.20.4-70.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140642" version="1" comment="gnome-shell-lang is &lt;3.20.4-70.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119616" version="1" comment="gpg2 is &lt;2.0.24-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119617" version="1" comment="gpg2-lang is &lt;2.0.24-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140648" version="1" comment="grub2 is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140650" version="1" comment="grub2-i386-pc is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140653" version="1" comment="grub2-snapper-plugin is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140654" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140655" version="1" comment="grub2-x86_64-efi is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140656" version="1" comment="grub2-x86_64-xen is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142113" version="1" comment="gstreamer-0_10-plugins-bad is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142114" version="1" comment="gstreamer-0_10-plugins-bad-lang is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142115" version="1" comment="libgstbasecamerabinsrc-0_10-23 is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142116" version="1" comment="libgstbasecamerabinsrc-0_10-23-32bit is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142117" version="1" comment="libgstbasevideo-0_10-23 is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142118" version="1" comment="libgstbasevideo-0_10-23-32bit is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142119" version="1" comment="libgstcodecparsers-0_10-23 is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142120" version="1" comment="libgstphotography-0_10-23 is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142121" version="1" comment="libgstphotography-0_10-23-32bit is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142122" version="1" comment="libgstsignalprocessor-0_10-23 is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142123" version="1" comment="libgstsignalprocessor-0_10-23-32bit is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142124" version="1" comment="libgstvdp-0_10-23 is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142125" version="1" comment="libgstvdp-0_10-23-32bit is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140657" version="1" comment="gtk2-data is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140658" version="1" comment="gtk2-lang is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140659" version="1" comment="gtk2-tools is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140660" version="1" comment="gtk2-tools-32bit is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140661" version="1" comment="libgtk-2_0-0 is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140662" version="1" comment="libgtk-2_0-0-32bit is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142126" version="1" comment="typelib-1_0-Gtk-2_0 is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140682" version="1" comment="hyper-v is &lt;7-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140683" version="1" comment="ibus-chewing is &lt;1.4.14-4.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140684" version="1" comment="ibus-pinyin is &lt;1.5.0-7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142127" version="1" comment="imobiledevice-tools is &lt;1.2.0-7.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140847" version="1" comment="libimobiledevice6 is &lt;1.2.0-7.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130960" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.111-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130961" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.111-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130962" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.101-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130963" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.101-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140693" version="1" comment="kbd is &lt;1.15.5-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140694" version="1" comment="kdump is &lt;0.8.15-28.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140695" version="1" comment="kernel-default is &lt;4.4.21-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140697" version="1" comment="kernel-default-devel is &lt;4.4.21-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142128" version="1" comment="kernel-default-extra is &lt;4.4.21-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140699" version="1" comment="kernel-devel is &lt;4.4.21-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140700" version="1" comment="kernel-macros is &lt;4.4.21-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140701" version="1" comment="kernel-source is &lt;4.4.21-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140702" version="1" comment="kernel-syms is &lt;4.4.21-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140703" version="1" comment="krb5 is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140704" version="1" comment="krb5-32bit is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140705" version="1" comment="krb5-client is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126431" version="1" comment="lhasa is &lt;0.2.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126432" version="1" comment="liblhasa0 is &lt;0.2.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140571" version="1" comment="libFLAC++6 is &lt;1.3.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142129" version="1" comment="libFLAC++6-32bit is &lt;1.3.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140572" version="1" comment="libFLAC8 is &lt;1.3.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140573" version="1" comment="libFLAC8-32bit is &lt;1.3.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140721" version="1" comment="libQt5Concurrent5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140722" version="1" comment="libQt5Core5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140723" version="1" comment="libQt5DBus5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140724" version="1" comment="libQt5Gui5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140725" version="1" comment="libQt5Network5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140726" version="1" comment="libQt5OpenGL5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140727" version="1" comment="libQt5PrintSupport5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140728" version="1" comment="libQt5Sql5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140729" version="1" comment="libQt5Sql5-mysql is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140730" version="1" comment="libQt5Sql5-postgresql is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140731" version="1" comment="libQt5Sql5-sqlite is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140732" version="1" comment="libQt5Sql5-unixODBC is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140733" version="1" comment="libQt5Test5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140734" version="1" comment="libQt5Widgets5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140735" version="1" comment="libQt5Xml5 is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140736" version="1" comment="libQt5WebKit5 is &lt;5.6.1-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140737" version="1" comment="libQt5WebKit5-imports is &lt;5.6.1-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140738" version="1" comment="libQt5WebKitWidgets5 is &lt;5.6.1-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140752" version="1" comment="libXfont1 is &lt;1.5.1-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140759" version="1" comment="libXrandr2 is &lt;1.5.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140760" version="1" comment="libXrandr2-32bit is &lt;1.5.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140770" version="1" comment="libXvnc1 is &lt;1.6.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140771" version="1" comment="tigervnc is &lt;1.6.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140772" version="1" comment="xorg-x11-Xvnc is &lt;1.6.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130724" version="1" comment="libarchive13 is &lt;3.1.2-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125716" version="1" comment="libasan2 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125717" version="1" comment="libasan2-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125723" version="1" comment="libffi4 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125724" version="1" comment="libffi4-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125734" version="1" comment="libmpx0 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125735" version="1" comment="libmpx0-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125736" version="1" comment="libmpxwrappers0 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125737" version="1" comment="libmpxwrappers0-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140779" version="1" comment="libblkid1 is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140780" version="1" comment="libblkid1-32bit is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140781" version="1" comment="libfdisk1 is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140782" version="1" comment="libmount1 is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140783" version="1" comment="libmount1-32bit is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140784" version="1" comment="libsmartcols1 is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142130" version="1" comment="libuuid-devel is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140785" version="1" comment="libuuid1 is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140786" version="1" comment="libuuid1-32bit is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140787" version="1" comment="python-libmount is &lt;2.28-40.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140788" version="1" comment="util-linux is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140789" version="1" comment="util-linux-lang is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140790" version="1" comment="util-linux-systemd is &lt;2.28-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140791" version="1" comment="uuidd is &lt;2.28-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131768" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140794" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140795" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140796" version="1" comment="libdcerpc0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140797" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140798" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140799" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140800" version="1" comment="libndr-nbt0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140801" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140802" version="1" comment="libndr-standard0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140803" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140804" version="1" comment="libndr0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140805" version="1" comment="libndr0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140806" version="1" comment="libnetapi0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140807" version="1" comment="libnetapi0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140808" version="1" comment="libsamba-credentials0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140809" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140810" version="1" comment="libsamba-errors0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140811" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140812" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140813" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140814" version="1" comment="libsamba-passdb0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140815" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140816" version="1" comment="libsamba-util0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140817" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140818" version="1" comment="libsamdb0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140819" version="1" comment="libsamdb0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140820" version="1" comment="libsmbclient0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140821" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140822" version="1" comment="libsmbconf0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140823" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140824" version="1" comment="libsmbldap0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140825" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140826" version="1" comment="libtevent-util0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140827" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140828" version="1" comment="libwbclient0 is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140829" version="1" comment="libwbclient0-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140830" version="1" comment="samba is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140831" version="1" comment="samba-client is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140832" version="1" comment="samba-client-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140833" version="1" comment="samba-doc is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140834" version="1" comment="samba-libs is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140835" version="1" comment="samba-libs-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140836" version="1" comment="samba-winbind is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140837" version="1" comment="samba-winbind-32bit is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131139" version="1" comment="libecpg6 is &lt;9.4.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131140" version="1" comment="libpq5 is &lt;9.4.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131141" version="1" comment="libpq5-32bit is &lt;9.4.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131142" version="1" comment="postgresql94 is &lt;9.4.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129282" version="1" comment="libfreebl3 is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129283" version="1" comment="libfreebl3-32bit is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129284" version="1" comment="libsoftokn3 is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129285" version="1" comment="libsoftokn3-32bit is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129288" version="1" comment="mozilla-nss is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129289" version="1" comment="mozilla-nss-32bit is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129290" version="1" comment="mozilla-nss-certs is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129291" version="1" comment="mozilla-nss-certs-32bit is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129292" version="1" comment="mozilla-nss-sysinit is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129293" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129294" version="1" comment="mozilla-nss-tools is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140587" version="1" comment="libfreetype6 is &lt;2.6.3-7.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140588" version="1" comment="libfreetype6-32bit is &lt;2.6.3-7.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131105" version="1" comment="libgcrypt20 is &lt;1.6.1-16.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131106" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126709" version="1" comment="libgif6 is &lt;5.0.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126710" version="1" comment="libgif6-32bit is &lt;5.0.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140842" version="1" comment="libgnomesu is &lt;2.0.0-353.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140843" version="1" comment="libgnomesu-lang is &lt;2.0.0-353.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140844" version="1" comment="libgnomesu0 is &lt;2.0.0-353.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124729" version="1" comment="libgraphite2-3 is &lt;1.3.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124730" version="1" comment="libgraphite2-3-32bit is &lt;1.3.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140676" version="1" comment="libgypsy0 is &lt;0.9-6.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123011" version="1" comment="libhogweed2 is &lt;2.7.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123012" version="1" comment="libhogweed2-32bit is &lt;2.7.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123014" version="1" comment="libnettle4 is &lt;2.7.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123015" version="1" comment="libnettle4-32bit is &lt;2.7.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130989" version="1" comment="libidn11 is &lt;1.28-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130990" version="1" comment="libidn11-32bit is &lt;1.28-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140848" version="1" comment="libipa_hbac0 is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140849" version="1" comment="libsss_idmap0 is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140850" version="1" comment="libsss_sudo is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140851" version="1" comment="python-sssd-config is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140852" version="1" comment="sssd is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140853" version="1" comment="sssd-32bit is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140854" version="1" comment="sssd-ad is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140855" version="1" comment="sssd-ipa is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140856" version="1" comment="sssd-krb5 is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140857" version="1" comment="sssd-krb5-common is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140858" version="1" comment="sssd-ldap is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140859" version="1" comment="sssd-proxy is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140860" version="1" comment="sssd-tools is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142131" version="1" comment="libjavascriptcoregtk-1_0-0 is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142132" version="1" comment="libjavascriptcoregtk-1_0-0-32bit is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140862" version="1" comment="libjavascriptcoregtk-3_0-0 is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142133" version="1" comment="libwebkitgtk-1_0-0 is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142134" version="1" comment="libwebkitgtk-1_0-0-32bit is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140863" version="1" comment="libwebkitgtk-3_0-0 is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142135" version="1" comment="libwebkitgtk2-lang is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140864" version="1" comment="libwebkitgtk3-lang is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142136" version="1" comment="typelib-1_0-JavaScriptCore-3_0 is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142137" version="1" comment="typelib-1_0-WebKit-3_0 is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140865" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.12.5-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140866" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.12.5-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142138" version="1" comment="libwebkit2gtk3-lang is &lt;2.12.5-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140867" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.12.5-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140868" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.12.5-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140869" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.12.5-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128468" version="1" comment="libksba8 is &lt;1.3.0-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140870" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140871" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140874" version="1" comment="openldap2-client is &lt;2.4.41-18.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140715" version="1" comment="libldb1 is &lt;1.1.26-10.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140716" version="1" comment="libldb1-32bit is &lt;1.1.26-10.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118765" version="1" comment="libmspack0 is &lt;0.4-14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131128" version="1" comment="libmysqlclient18 is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131129" version="1" comment="libmysqlclient18-32bit is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131130" version="1" comment="libmysqlclient_r18 is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131131" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131132" version="1" comment="mariadb is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131133" version="1" comment="mariadb-client is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131134" version="1" comment="mariadb-errormessages is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142139" version="1" comment="libndp0 is &lt;1.6-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142140" version="1" comment="libnewt0_52 is &lt;0.52.16-1.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140890" version="1" comment="libopenssl-devel is &lt;1.0.2j-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140891" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140892" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140895" version="1" comment="openssl is &lt;1.0.2j-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131148" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131149" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124478" version="1" comment="libotr5 is &lt;4.0.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140897" version="1" comment="libpango-1_0-0 is &lt;1.40.1-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140898" version="1" comment="libpango-1_0-0-32bit is &lt;1.40.1-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140899" version="1" comment="typelib-1_0-Pango-1_0 is &lt;1.40.1-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119221" version="1" comment="libpng12-0 is &lt;1.2.50-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119222" version="1" comment="libpng12-0-32bit is &lt;1.2.50-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119233" version="1" comment="libpng15-15 is &lt;1.5.22-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119224" version="1" comment="libpng16-16 is &lt;1.6.8-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119225" version="1" comment="libpng16-16-32bit is &lt;1.6.8-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140902" version="1" comment="libpolkit0 is &lt;0.113-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142141" version="1" comment="libpolkit0-32bit is &lt;0.113-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140903" version="1" comment="polkit is &lt;0.113-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140904" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140905" version="1" comment="libpoppler-glib8 is &lt;0.43.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140906" version="1" comment="libpoppler-qt4-4 is &lt;0.43.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140907" version="1" comment="libpoppler60 is &lt;0.43.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140908" version="1" comment="poppler-tools is &lt;0.43.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128640" version="1" comment="libpoppler44 is &lt;0.24.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140909" version="1" comment="libproxy1 is &lt;0.4.13-16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140910" version="1" comment="libproxy1-32bit is &lt;0.4.13-16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140911" version="1" comment="libproxy1-config-gnome3 is &lt;0.4.13-16.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140912" version="1" comment="libproxy1-config-gnome3-32bit is &lt;0.4.13-16.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140913" version="1" comment="libproxy1-networkmanager is &lt;0.4.13-16.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142142" version="1" comment="libproxy1-networkmanager-32bit is &lt;0.4.13-16.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140914" version="1" comment="libproxy1-pacrunner-webkit is &lt;0.4.13-16.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130996" version="1" comment="libpython2_7-1_0 is &lt;2.7.9-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130997" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.9-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130999" version="1" comment="python-base is &lt;2.7.9-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131001" version="1" comment="python-devel is &lt;2.7.9-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131003" version="1" comment="python-xml is &lt;2.7.9-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125268" version="1" comment="libqt4 is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125269" version="1" comment="libqt4-32bit is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125270" version="1" comment="libqt4-qt3support is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125271" version="1" comment="libqt4-qt3support-32bit is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125272" version="1" comment="libqt4-sql is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125273" version="1" comment="libqt4-sql-32bit is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125274" version="1" comment="libqt4-sql-mysql is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125275" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125277" version="1" comment="libqt4-sql-postgresql is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125278" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125279" version="1" comment="libqt4-sql-sqlite is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125280" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125281" version="1" comment="libqt4-sql-unixODBC is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125282" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125283" version="1" comment="libqt4-x11 is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125284" version="1" comment="libqt4-x11-32bit is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130948" version="1" comment="libreoffice is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131150" version="1" comment="libreoffice-base is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131151" version="1" comment="libreoffice-base-drivers-mysql is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131152" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131153" version="1" comment="libreoffice-calc is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131154" version="1" comment="libreoffice-calc-extensions is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131155" version="1" comment="libreoffice-draw is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131156" version="1" comment="libreoffice-filters-optional is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131157" version="1" comment="libreoffice-gnome is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131158" version="1" comment="libreoffice-icon-theme-galaxy is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131159" version="1" comment="libreoffice-icon-theme-tango is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131160" version="1" comment="libreoffice-impress is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131161" version="1" comment="libreoffice-l10n-af is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131162" version="1" comment="libreoffice-l10n-ar is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131163" version="1" comment="libreoffice-l10n-ca is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131164" version="1" comment="libreoffice-l10n-cs is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131165" version="1" comment="libreoffice-l10n-da is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131166" version="1" comment="libreoffice-l10n-de is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131167" version="1" comment="libreoffice-l10n-en is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131168" version="1" comment="libreoffice-l10n-es is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131169" version="1" comment="libreoffice-l10n-fi is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131170" version="1" comment="libreoffice-l10n-fr is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131171" version="1" comment="libreoffice-l10n-gu is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131172" version="1" comment="libreoffice-l10n-hi is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131173" version="1" comment="libreoffice-l10n-hu is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131174" version="1" comment="libreoffice-l10n-it is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131175" version="1" comment="libreoffice-l10n-ja is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131176" version="1" comment="libreoffice-l10n-ko is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131177" version="1" comment="libreoffice-l10n-nb is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131178" version="1" comment="libreoffice-l10n-nl is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131179" version="1" comment="libreoffice-l10n-nn is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131180" version="1" comment="libreoffice-l10n-pl is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131181" version="1" comment="libreoffice-l10n-pt-BR is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131182" version="1" comment="libreoffice-l10n-pt-PT is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142143" version="1" comment="libreoffice-l10n-ro is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131183" version="1" comment="libreoffice-l10n-ru is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131184" version="1" comment="libreoffice-l10n-sk is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131185" version="1" comment="libreoffice-l10n-sv is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131186" version="1" comment="libreoffice-l10n-xh is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131187" version="1" comment="libreoffice-l10n-zh-Hans is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131188" version="1" comment="libreoffice-l10n-zh-Hant is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131189" version="1" comment="libreoffice-l10n-zu is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131190" version="1" comment="libreoffice-mailmerge is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131191" version="1" comment="libreoffice-math is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131192" version="1" comment="libreoffice-officebean is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131193" version="1" comment="libreoffice-pyuno is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131194" version="1" comment="libreoffice-writer is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131195" version="1" comment="libreoffice-writer-extensions is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142144" version="1" comment="libreofficekit is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140929" version="1" comment="libruby2_1-2_1 is &lt;2.1.2-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140930" version="1" comment="ruby2.1 is &lt;2.1.2-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140931" version="1" comment="ruby2.1-stdlib is &lt;2.1.2-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119271" version="1" comment="libsndfile1 is &lt;1.0.25-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119272" version="1" comment="libsndfile1-32bit is &lt;1.0.25-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140939" version="1" comment="libsoup-2_4-1 is &lt;2.54.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140940" version="1" comment="libsoup-2_4-1-32bit is &lt;2.54.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140941" version="1" comment="libsoup-lang is &lt;2.54.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140942" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.54.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140943" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.31-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140944" version="1" comment="libspice-client-glib-helper is &lt;0.31-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140945" version="1" comment="libspice-client-gtk-2_0-4 is &lt;0.31-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140946" version="1" comment="libspice-client-gtk-3_0-4 is &lt;0.31-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140947" version="1" comment="libspice-controller0 is &lt;0.31-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140948" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.31-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140949" version="1" comment="typelib-1_0-SpiceClientGtk-3_0 is &lt;0.31-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140950" version="1" comment="libspice-server1 is &lt;0.12.7-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130774" version="1" comment="libsqlite3-0 is &lt;3.8.10.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130775" version="1" comment="libsqlite3-0-32bit is &lt;3.8.10.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130776" version="1" comment="sqlite3 is &lt;3.8.10.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140951" version="1" comment="libsrtp1 is &lt;1.5.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140952" version="1" comment="libssh2-1 is &lt;1.4.3-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140953" version="1" comment="libssh2-1-32bit is &lt;1.4.3-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123868" version="1" comment="libssh4 is &lt;0.6.3-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140954" version="1" comment="libsystemd0 is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140955" version="1" comment="libsystemd0-32bit is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140956" version="1" comment="libudev1 is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140957" version="1" comment="libudev1-32bit is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140958" version="1" comment="systemd is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140959" version="1" comment="systemd-32bit is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140960" version="1" comment="systemd-bash-completion is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140961" version="1" comment="systemd-sysvinit is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140962" version="1" comment="udev is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128901" version="1" comment="libtasn1 is &lt;3.7-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128902" version="1" comment="libtasn1-6 is &lt;3.7-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128903" version="1" comment="libtasn1-6-32bit is &lt;3.7-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140966" version="1" comment="libthai-data is &lt;0.1.25-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140967" version="1" comment="libthai0 is &lt;0.1.25-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140968" version="1" comment="libthai0-32bit is &lt;0.1.25-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131042" version="1" comment="libtiff5 is &lt;4.0.6-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131043" version="1" comment="libtiff5-32bit is &lt;4.0.6-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140975" version="1" comment="libusbmuxd4 is &lt;1.0.10-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140976" version="1" comment="libvdpau1 is &lt;1.1.1-6.73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142145" version="1" comment="libvdpau1-32bit is &lt;1.1.1-6.73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140977" version="1" comment="libvirt is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140978" version="1" comment="libvirt-client is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142146" version="1" comment="libvirt-client-32bit is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140979" version="1" comment="libvirt-daemon is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140980" version="1" comment="libvirt-daemon-config-network is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140981" version="1" comment="libvirt-daemon-config-nwfilter is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140982" version="1" comment="libvirt-daemon-driver-interface is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140983" version="1" comment="libvirt-daemon-driver-libxl is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140984" version="1" comment="libvirt-daemon-driver-lxc is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140985" version="1" comment="libvirt-daemon-driver-network is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140986" version="1" comment="libvirt-daemon-driver-nodedev is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140987" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140988" version="1" comment="libvirt-daemon-driver-qemu is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140989" version="1" comment="libvirt-daemon-driver-secret is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140990" version="1" comment="libvirt-daemon-driver-storage is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140991" version="1" comment="libvirt-daemon-lxc is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140992" version="1" comment="libvirt-daemon-qemu is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140993" version="1" comment="libvirt-daemon-xen is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140994" version="1" comment="libvirt-doc is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141004" version="1" comment="libvte9 is &lt;0.28.2-19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141007" version="1" comment="libxcb-dri2-0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141008" version="1" comment="libxcb-dri2-0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141009" version="1" comment="libxcb-dri3-0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141010" version="1" comment="libxcb-dri3-0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141011" version="1" comment="libxcb-glx0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141012" version="1" comment="libxcb-glx0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141013" version="1" comment="libxcb-present0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141014" version="1" comment="libxcb-present0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141015" version="1" comment="libxcb-randr0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141016" version="1" comment="libxcb-render0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141017" version="1" comment="libxcb-render0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141018" version="1" comment="libxcb-shape0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141019" version="1" comment="libxcb-shm0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141020" version="1" comment="libxcb-shm0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141021" version="1" comment="libxcb-sync1 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141022" version="1" comment="libxcb-sync1-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141023" version="1" comment="libxcb-xf86dri0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141024" version="1" comment="libxcb-xfixes0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141025" version="1" comment="libxcb-xfixes0-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141026" version="1" comment="libxcb-xinerama0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141027" version="1" comment="libxcb-xkb1 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141028" version="1" comment="libxcb-xkb1-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141029" version="1" comment="libxcb-xv0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141030" version="1" comment="libxcb1 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141031" version="1" comment="libxcb1-32bit is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131022" version="1" comment="libxerces-c-3_1 is &lt;3.1.1-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131023" version="1" comment="libxerces-c-3_1-32bit is &lt;3.1.1-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141032" version="1" comment="libxml2-2 is &lt;2.9.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141033" version="1" comment="libxml2-2-32bit is &lt;2.9.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141035" version="1" comment="libxml2-tools is &lt;2.9.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141037" version="1" comment="libzip2 is &lt;0.11.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142147" version="1" comment="libzmq3 is &lt;4.0.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141041" version="1" comment="mailx is &lt;12.5-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129286" version="1" comment="mozilla-nspr is &lt;4.12-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129287" version="1" comment="mozilla-nspr-32bit is &lt;4.12-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141043" version="1" comment="mutt is &lt;1.6.0-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128799" version="1" comment="ntp is &lt;4.2.8p8-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128800" version="1" comment="ntp-doc is &lt;4.2.8p8-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131123" version="1" comment="openslp is &lt;2.0.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131124" version="1" comment="openslp-32bit is &lt;2.0.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141045" version="1" comment="openssh is &lt;7.2p2-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141047" version="1" comment="openssh-helpers is &lt;7.2p2-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141048" version="1" comment="openvpn is &lt;2.3.8-16.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128891" version="1" comment="p7zip is &lt;9.20.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131038" version="1" comment="perl is &lt;5.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131039" version="1" comment="perl-32bit is &lt;5.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131040" version="1" comment="perl-base is &lt;5.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131041" version="1" comment="perl-doc is &lt;5.18.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142148" version="1" comment="pidgin-otr is &lt;4.0.0-11.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142149" version="1" comment="puppet is &lt;3.8.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130998" version="1" comment="python is &lt;2.7.9-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131000" version="1" comment="python-curses is &lt;2.7.9-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131002" version="1" comment="python-tk is &lt;2.7.9-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141075" version="1" comment="python3-curses is &lt;3.4.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141076" version="1" comment="python-cupshelpers is &lt;1.5.7-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141077" version="1" comment="system-config-printer is &lt;1.5.7-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141078" version="1" comment="system-config-printer-common is &lt;1.5.7-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141079" version="1" comment="system-config-printer-common-lang is &lt;1.5.7-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141080" version="1" comment="system-config-printer-dbus-service is &lt;1.5.7-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141081" version="1" comment="udev-configure-printer is &lt;1.5.7-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141083" version="1" comment="python-libxml2 is &lt;2.9.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141084" version="1" comment="python-pyOpenSSL is &lt;16.0.0-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141086" version="1" comment="python-requests is &lt;2.8.1-6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141087" version="1" comment="qemu is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141089" version="1" comment="qemu-block-curl is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141093" version="1" comment="qemu-ipxe is &lt;1.0.0-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141094" version="1" comment="qemu-kvm is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141098" version="1" comment="qemu-seabios is &lt;1.9.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141099" version="1" comment="qemu-sgabios is &lt;8-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141100" version="1" comment="qemu-tools is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141101" version="1" comment="qemu-vgabios is &lt;1.9.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141102" version="1" comment="qemu-x86 is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142150" version="1" comment="rhythmbox is &lt;3.4-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142151" version="1" comment="rhythmbox-lang is &lt;3.4-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141107" version="1" comment="rpcbind is &lt;0.2.3-21.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141108" version="1" comment="rpm is &lt;4.11.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141109" version="1" comment="rpm-32bit is &lt;4.11.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141110" version="1" comment="rpm-build is &lt;4.11.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141111" version="1" comment="rsync is &lt;3.1.0-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141112" version="1" comment="rsyslog is &lt;8.4.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141125" version="1" comment="shim is &lt;0.9-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122758" version="1" comment="socat is &lt;1.7.2.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141126" version="1" comment="squashfs is &lt;4.3-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119278" version="1" comment="strongswan is &lt;5.1.3-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119279" version="1" comment="strongswan-doc is &lt;5.1.3-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119280" version="1" comment="strongswan-ipsec is &lt;5.1.3-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119281" version="1" comment="strongswan-libs0 is &lt;5.1.3-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141130" version="1" comment="sudo is &lt;1.8.10p3-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141131" version="1" comment="supportutils is &lt;3.0-85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141132" version="1" comment="sysconfig is &lt;0.84.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141133" version="1" comment="sysconfig-netconfig is &lt;0.84.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141138" version="1" comment="sysvinit-tools is &lt;2.88+-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136443" version="1" comment="tar is &lt;1.27.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136445" version="1" comment="tar-lang is &lt;1.27.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141140" version="1" comment="tcpdump is &lt;4.5.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142152" version="1" comment="telepathy-gabble is &lt;0.18.3-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141151" version="1" comment="unixODBC is &lt;2.3.4-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141152" version="1" comment="unixODBC-32bit is &lt;2.3.4-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141153" version="1" comment="update-alternatives is &lt;1.18.4-14.216" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141154" version="1" comment="vino is &lt;3.20.2-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141155" version="1" comment="vino-lang is &lt;3.20.2-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141157" version="1" comment="w3m is &lt;0.5.3-157.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131037" version="1" comment="wget is &lt;1.14-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131146" version="1" comment="wireshark is &lt;1.12.13-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131098" version="1" comment="wpa_supplicant is &lt;2.2-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141159" version="1" comment="xen is &lt;4.7.0_12-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141161" version="1" comment="xen-libs is &lt;4.7.0_12-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141162" version="1" comment="xen-libs-32bit is &lt;4.7.0_12-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141165" version="1" comment="xf86-video-intel is &lt;2.99.917.641_ge4ef6e9-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141166" version="1" comment="xfsprogs is &lt;4.3.0-8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141173" version="1" comment="xorg-x11-server is &lt;7.6_1.18.3-57.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141174" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.18.3-57.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119273" version="1" comment="xscreensaver is &lt;5.22-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119274" version="1" comment="xscreensaver-data is &lt;5.22-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141175" version="1" comment="yast2 is &lt;3.1.206-37.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141176" version="1" comment="yast2-core is &lt;3.1.23-6.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141177" version="1" comment="yast2-users is &lt;3.1.57-16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147499" version="1" comment="sle-module-adv-systems-management-release is &gt;=12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147500" version="1" comment="puppet-server is &lt;3.6.2-3.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110039" version="1" comment="docker is &lt;1.6.2-31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117868" version="1" comment="sle-module-containers-release is &gt;=12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109714" version="1" comment="python-PyYAML is &lt;3.10-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147501" version="1" comment="cups154 is &lt;1.5.4-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147502" version="1" comment="cups154-client is &lt;1.5.4-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147503" version="1" comment="cups154-filters is &lt;1.5.4-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147504" version="1" comment="cups154-libs is &lt;1.5.4-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117869" version="1" comment="sle-module-legacy-release is &gt;=12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147505" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.1-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147506" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.1-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147507" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.1-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147508" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.1-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147509" version="1" comment="syslog-ng is &lt;3.4.5-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117870" version="1" comment="sle-module-public-cloud is &gt;=12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125865" version="1" comment="cpp5 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125710" version="1" comment="gcc5 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125869" version="1" comment="gcc5-c++ is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125871" version="1" comment="gcc5-fortran is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125873" version="1" comment="gcc5-info is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125874" version="1" comment="gcc5-locale is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125877" version="1" comment="libffi-devel-gcc5 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125879" version="1" comment="libstdc++6-devel-gcc5 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125881" version="1" comment="sle-module-toolchain-release is &gt;=12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116126" version="1" comment="sles-release is ==12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143118" version="1" comment="aaa_base is &lt;13.2+git20140911.61c1681-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143119" version="1" comment="aaa_base-extras is &lt;13.2+git20140911.61c1681-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143120" version="1" comment="accountsservice is &lt;0.6.35-1.96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143121" version="1" comment="accountsservice-lang is &lt;0.6.35-1.96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143122" version="1" comment="libaccountsservice0 is &lt;0.6.35-1.96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143123" version="1" comment="typelib-1_0-AccountsService-1_0 is &lt;0.6.35-1.96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140443" version="1" comment="alsa is &lt;1.0.27.2-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140444" version="1" comment="alsa-docs is &lt;1.0.27.2-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140445" version="1" comment="libasound2 is &lt;1.0.27.2-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140447" version="1" comment="ant is &lt;1.9.4-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140448" version="1" comment="apache-commons-beanutils is &lt;1.9.2-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140449" version="1" comment="apache-commons-beanutils-javadoc is &lt;1.9.2-1.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140450" version="1" comment="apache-commons-daemon is &lt;1.0.15-4.221" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140451" version="1" comment="apache-commons-daemon-javadoc is &lt;1.0.15-4.221" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140452" version="1" comment="apache-commons-httpclient is &lt;3.1-4.498" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143124" version="1" comment="apache2 is &lt;2.4.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143125" version="1" comment="apache2-doc is &lt;2.4.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143126" version="1" comment="apache2-example-pages is &lt;2.4.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143127" version="1" comment="apache2-prefork is &lt;2.4.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143128" version="1" comment="apache2-utils is &lt;2.4.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143129" version="1" comment="apache2-worker is &lt;2.4.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143130" version="1" comment="apache2-mod_jk is &lt;1.2.40-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143131" version="1" comment="apache2-mod_nss is &lt;1.0.8-9.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143132" version="1" comment="apache2-mod_perl is &lt;2.0.8-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143133" version="1" comment="augeas is &lt;1.2.0-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143134" version="1" comment="augeas-lenses is &lt;1.2.0-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143135" version="1" comment="automake is &lt;1.13.4-4.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143136" version="1" comment="avahi-utils is &lt;0.6.31-20.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143137" version="1" comment="bind is &lt;9.9.5P1-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143138" version="1" comment="bind-chrootenv is &lt;9.9.5P1-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143139" version="1" comment="bind-doc is &lt;9.9.5P1-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143140" version="1" comment="bind-libs is &lt;9.9.5P1-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143141" version="1" comment="bind-utils is &lt;9.9.5P1-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143142" version="1" comment="bzip2 is &lt;1.0.6-27.886" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143143" version="1" comment="bzip2-doc is &lt;1.0.6-27.886" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143144" version="1" comment="libbz2-1 is &lt;1.0.6-27.886" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143145" version="1" comment="coreutils is &lt;8.22-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143146" version="1" comment="coreutils-lang is &lt;8.22-5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143147" version="1" comment="cpp48 is &lt;4.8.3+r212056-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143148" version="1" comment="gcc48 is &lt;4.8.3+r212056-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143149" version="1" comment="gcc48-c++ is &lt;4.8.3+r212056-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143150" version="1" comment="gcc48-info is &lt;4.8.3+r212056-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143151" version="1" comment="gcc48-locale is &lt;4.8.3+r212056-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143152" version="1" comment="libffi4 is &lt;4.8.3+r212056-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143153" version="1" comment="libgcc_s1 is &lt;4.8.3+r212056-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143154" version="1" comment="libgfortran3 is &lt;4.8.3+r212056-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143155" version="1" comment="libgomp1 is &lt;4.8.3+r212056-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143156" version="1" comment="libstdc++48-devel is &lt;4.8.3+r212056-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143157" version="1" comment="libstdc++6 is &lt;4.8.3+r212056-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140517" version="1" comment="cvs-doc is &lt;1.12.12-181.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140525" version="1" comment="cyrus-sasl-otp is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140526" version="1" comment="cyrus-sasl-otp-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140530" version="1" comment="cyrus-sasl-sqlauxprop is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140531" version="1" comment="cyrus-sasl-sqlauxprop-32bit is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143158" version="1" comment="libdbus-1-3 is &lt;1.8.8-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143159" version="1" comment="dhcp-relay is &lt;4.2.6-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143160" version="1" comment="dhcp-server is &lt;4.2.6-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143161" version="1" comment="docker is &lt;1.2.0-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140542" version="1" comment="dovecot22 is &lt;2.2.13-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140543" version="1" comment="dovecot22-backend-mysql is &lt;2.2.13-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140544" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.13-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140545" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.13-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143162" version="1" comment="dracut-fips is &lt;037-34.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143163" version="1" comment="ecryptfs-utils is &lt;103-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143164" version="1" comment="elfutils is &lt;0.158-3.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143165" version="1" comment="libasm1 is &lt;0.158-3.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143166" version="1" comment="libasm1-32bit is &lt;0.158-3.200" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143167" version="1" comment="libdw1 is &lt;0.158-3.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143168" version="1" comment="libebl1 is &lt;0.158-3.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143169" version="1" comment="libelf1 is &lt;0.158-3.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143170" version="1" comment="emacs-el is &lt;24.3-14.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143171" version="1" comment="emacs-nox is &lt;24.3-14.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143172" version="1" comment="fetchmail is &lt;6.3.26-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143173" version="1" comment="fetchmailconf is &lt;6.3.26-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143174" version="1" comment="file is &lt;5.19-2.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143175" version="1" comment="file-magic is &lt;5.19-2.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143176" version="1" comment="libmagic1 is &lt;5.19-2.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143177" version="1" comment="freeradius-server is &lt;3.0.3-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143178" version="1" comment="freeradius-server-doc is &lt;3.0.3-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143179" version="1" comment="freeradius-server-libs is &lt;3.0.3-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143180" version="1" comment="freeradius-server-utils is &lt;3.0.3-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143181" version="1" comment="ft2demos is &lt;2.5.3-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143182" version="1" comment="g3utils is &lt;1.1.36-54.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143183" version="1" comment="mgetty is &lt;1.1.36-54.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143184" version="1" comment="gd is &lt;2.1.0-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143185" version="1" comment="git-core is &lt;1.8.5.2-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143186" version="1" comment="glib2-lang is &lt;2.38.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143187" version="1" comment="glib2-tools is &lt;2.38.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143188" version="1" comment="libgio-2_0-0 is &lt;2.38.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143189" version="1" comment="libglib-2_0-0 is &lt;2.38.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143190" version="1" comment="libgmodule-2_0-0 is &lt;2.38.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143191" version="1" comment="libgobject-2_0-0 is &lt;2.38.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143192" version="1" comment="libgthread-2_0-0 is &lt;2.38.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143193" version="1" comment="glibc-html is &lt;2.19-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143194" version="1" comment="glibc-info is &lt;2.19-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143195" version="1" comment="glibc-profile is &lt;2.19-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143196" version="1" comment="glibc-profile-32bit is &lt;2.19-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143197" version="1" comment="gnome-shell is &lt;3.10.4-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143198" version="1" comment="gnome-shell-browser-plugin is &lt;3.10.4-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143199" version="1" comment="gnome-shell-lang is &lt;3.10.4-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143200" version="1" comment="libgnutls-openssl27 is &lt;3.2.15-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140646" version="1" comment="groff-full is &lt;1.22.2-5.429" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140647" version="1" comment="gxditview is &lt;1.22.2-5.429" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143201" version="1" comment="guestfs-data is &lt;1.26.9-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143202" version="1" comment="guestfs-tools is &lt;1.26.9-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143203" version="1" comment="guestfsd is &lt;1.26.9-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143204" version="1" comment="libguestfs0 is &lt;1.26.9-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143205" version="1" comment="perl-Sys-Guestfs is &lt;1.26.9-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140671" version="1" comment="gv is &lt;3.7.4-1.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140679" version="1" comment="hplip is &lt;3.14.6-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140680" version="1" comment="hplip-hpijs is &lt;3.14.6-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140681" version="1" comment="hplip-sane is &lt;3.14.6-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143206" version="1" comment="hyper-v is &lt;6-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143207" version="1" comment="ibus-pinyin is &lt;1.5.0-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140687" version="1" comment="jakarta-commons-fileupload is &lt;1.1.1-120.238" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140688" version="1" comment="jakarta-commons-fileupload-javadoc is &lt;1.1.1-120.238" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143208" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.6-33.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143209" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.6-33.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143210" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.6-33.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143211" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.6-33.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143212" version="1" comment="kbd is &lt;1.15.5-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143213" version="1" comment="kernel-default-base is &lt;3.12.28-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143214" version="1" comment="kernel-default-man is &lt;3.12.28-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143215" version="1" comment="kernel-xen-base is &lt;3.12.28-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143216" version="1" comment="krb5-doc is &lt;1.12.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143217" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143218" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143219" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143220" version="1" comment="krb5-server is &lt;1.12.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140712" version="1" comment="krb5-appl-servers is &lt;1.0.3-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143221" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143222" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140776" version="1" comment="libapr-util1 is &lt;1.5.3-1.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140777" version="1" comment="libapr-util1-dbd-sqlite3 is &lt;1.5.3-1.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140778" version="1" comment="libapr1 is &lt;1.5.1-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143223" version="1" comment="libcgroup-tools is &lt;0.41.rc1-1.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143224" version="1" comment="postgresql93-contrib is &lt;9.3.5-2.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143225" version="1" comment="postgresql93-docs is &lt;9.3.5-2.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143226" version="1" comment="postgresql93-server is &lt;9.3.5-2.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143227" version="1" comment="libfreebl3-hmac is &lt;3.16.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143228" version="1" comment="libfreebl3-hmac-32bit is &lt;3.16.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143229" version="1" comment="libsoftokn3-hmac is &lt;3.16.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143230" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.16.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143231" version="1" comment="libfreetype6 is &lt;2.5.3-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143232" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143233" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143234" version="1" comment="libgoa-1_0-0 is &lt;3.10.5-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143235" version="1" comment="libgoa-backend-1_0-1 is &lt;3.10.5-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140689" version="1" comment="libjbig2 is &lt;2.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140877" version="1" comment="libtool is &lt;2.4.2-14.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140878" version="1" comment="libtool-32bit is &lt;2.4.2-14.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140880" version="1" comment="liblua5_2-32bit is &lt;5.2.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140882" version="1" comment="liblzo2-2 is &lt;2.08-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143236" version="1" comment="mariadb-tools is &lt;10.0.11-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140888" version="1" comment="libneon27-32bit is &lt;0.30.0-3.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143237" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143238" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143239" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143240" version="1" comment="openssl is &lt;1.0.1i-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143241" version="1" comment="openssl-doc is &lt;1.0.1i-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143242" version="1" comment="libpango-1_0-0 is &lt;1.36.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143243" version="1" comment="pango-modules is &lt;1.36.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143244" version="1" comment="typelib-1_0-Pango-1_0 is &lt;1.36.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143245" version="1" comment="libpoppler-glib8 is &lt;0.24.4-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143246" version="1" comment="libpoppler-qt4-4 is &lt;0.24.4-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143247" version="1" comment="libpoppler44 is &lt;0.24.4-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143248" version="1" comment="poppler-tools is &lt;0.24.4-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143249" version="1" comment="python-base-32bit is &lt;2.7.7-2.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143250" version="1" comment="libqt4 is &lt;4.8.6-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143251" version="1" comment="libqt4-qt3support is &lt;4.8.6-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143252" version="1" comment="libqt4-sql is &lt;4.8.6-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143253" version="1" comment="libqt4-sql-sqlite is &lt;4.8.6-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143254" version="1" comment="libqt4-x11 is &lt;4.8.6-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143255" version="1" comment="qt4-x11-tools is &lt;4.8.6-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143256" version="1" comment="libtasn1 is &lt;3.7-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143257" version="1" comment="libtasn1-6 is &lt;3.7-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143258" version="1" comment="tiff is &lt;4.0.3-9.78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140972" version="1" comment="libupsclient1 is &lt;2.7.1-4.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140973" version="1" comment="nut is &lt;2.7.1-4.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140974" version="1" comment="nut-drivers-net is &lt;2.7.1-4.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143259" version="1" comment="libvirt-lock-sanlock is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140997" version="1" comment="libvorbis-doc is &lt;1.3.3-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140998" version="1" comment="libvorbis0 is &lt;1.3.3-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141000" version="1" comment="libvorbisenc2 is &lt;1.3.3-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141002" version="1" comment="libvorbisfile3 is &lt;1.3.3-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143260" version="1" comment="python-vte is &lt;0.28.2-17.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143261" version="1" comment="vte2-lang is &lt;0.28.2-17.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143262" version="1" comment="libxml2-doc is &lt;2.9.1-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143263" version="1" comment="logwatch is &lt;7.4.0-13.131" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141040" version="1" comment="mailman is &lt;2.1.17-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143264" version="1" comment="mozilla-nspr is &lt;4.10.7-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143265" version="1" comment="openslp-server is &lt;2.0.0-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143266" version="1" comment="openssh-fips is &lt;6.6p1-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143267" version="1" comment="openvswitch is &lt;2.1.2-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143268" version="1" comment="openvswitch-kmp-default is &lt;2.1.2_k3.12.28_4-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143269" version="1" comment="openvswitch-kmp-xen is &lt;2.1.2_k3.12.28_4-8.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143270" version="1" comment="openvswitch-switch is &lt;2.1.2-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141054" version="1" comment="opie is &lt;2.4-724.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141055" version="1" comment="opie-32bit is &lt;2.4-724.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141059" version="1" comment="pam-modules is &lt;12.1-23.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143271" version="1" comment="perl-Cyrus-IMAP is &lt;2.3.18-35.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143272" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.3.18-35.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143273" version="1" comment="ppc64-diag is &lt;2.6.7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141073" version="1" comment="procmail is &lt;3.22-267.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143274" version="1" comment="python is &lt;2.7.7-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143275" version="1" comment="python-32bit is &lt;2.7.7-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143276" version="1" comment="python-curses is &lt;2.7.7-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143277" version="1" comment="python-demo is &lt;2.7.7-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143278" version="1" comment="python-gdbm is &lt;2.7.7-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143279" version="1" comment="python-idle is &lt;2.7.7-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143280" version="1" comment="python-tk is &lt;2.7.7-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141082" version="1" comment="python-imaging is &lt;1.1.7-21.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143281" version="1" comment="qemu-guest-agent is &lt;2.0.0-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143282" version="1" comment="qemu-lang is &lt;2.0.0-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143283" version="1" comment="qemu-ppc is &lt;2.0.0-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143284" version="1" comment="qemu-s390 is &lt;2.0.0-40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143285" version="1" comment="quagga is &lt;0.99.22.1-3.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143286" version="1" comment="rsyslog-diag-tools is &lt;8.4.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143287" version="1" comment="rsyslog-doc is &lt;8.4.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143288" version="1" comment="rsyslog-module-gssapi is &lt;8.4.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143289" version="1" comment="rsyslog-module-gtls is &lt;8.4.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143290" version="1" comment="rsyslog-module-mysql is &lt;8.4.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143291" version="1" comment="rsyslog-module-pgsql is &lt;8.4.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143292" version="1" comment="rsyslog-module-relp is &lt;8.4.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143293" version="1" comment="rsyslog-module-snmp is &lt;8.4.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143294" version="1" comment="rsyslog-module-udpspoof is &lt;8.4.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143295" version="1" comment="squashfs is &lt;4.3-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143296" version="1" comment="squid is &lt;3.3.13-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141128" version="1" comment="squidGuard is &lt;1.4-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141129" version="1" comment="squidGuard-doc is &lt;1.4-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143297" version="1" comment="stunnel is &lt;5.00-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143298" version="1" comment="systemtap is &lt;2.5-1.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143299" version="1" comment="systemtap-runtime is &lt;2.5-1.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143300" version="1" comment="systemtap-server is &lt;2.5-1.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143301" version="1" comment="sysvinit-tools is &lt;2.88+-94.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143302" version="1" comment="tomcat is &lt;7.0.55-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143303" version="1" comment="tomcat-admin-webapps is &lt;7.0.55-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143304" version="1" comment="tomcat-docs-webapp is &lt;7.0.55-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143305" version="1" comment="tomcat-el-2_2-api is &lt;7.0.55-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143306" version="1" comment="tomcat-javadoc is &lt;7.0.55-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143307" version="1" comment="tomcat-jsp-2_2-api is &lt;7.0.55-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143308" version="1" comment="tomcat-lib is &lt;7.0.55-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143309" version="1" comment="tomcat-servlet-3_0-api is &lt;7.0.55-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143310" version="1" comment="tomcat-webapps is &lt;7.0.55-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143311" version="1" comment="wireshark is &lt;1.10.9-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141158" version="1" comment="xalan-j2 is &lt;2.7.0-264.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143312" version="1" comment="xen-doc-html is &lt;4.4.1_06-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143313" version="1" comment="xen-tools is &lt;4.4.1_06-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143314" version="1" comment="xen-tools-domU is &lt;4.4.1_06-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141169" version="1" comment="xorg-x11 is &lt;7.6_1-14.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141170" version="1" comment="xorg-x11-essentials is &lt;7.6_1-14.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141172" version="1" comment="xorg-x11-libs is &lt;7.6-45.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137922" version="1" comment="yast2 is &lt;3.1.108-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118803" version="1" comment="sles-release is ==12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143315" version="1" comment="accountsservice is &lt;0.6.35-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143316" version="1" comment="accountsservice-lang is &lt;0.6.35-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143317" version="1" comment="libaccountsservice0 is &lt;0.6.35-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143318" version="1" comment="typelib-1_0-AccountsService-1_0 is &lt;0.6.35-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143319" version="1" comment="apache2 is &lt;2.4.16-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143320" version="1" comment="apache2-doc is &lt;2.4.16-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143321" version="1" comment="apache2-example-pages is &lt;2.4.16-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143322" version="1" comment="apache2-prefork is &lt;2.4.16-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143323" version="1" comment="apache2-utils is &lt;2.4.16-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143324" version="1" comment="apache2-worker is &lt;2.4.16-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140459" version="1" comment="apache2-mod_jk is &lt;1.2.40-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143325" version="1" comment="apache2-mod_nss is &lt;1.0.8-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140460" version="1" comment="apache2-mod_perl is &lt;2.0.8-11.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111367" version="1" comment="augeas is &lt;1.2.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111371" version="1" comment="augeas-lenses is &lt;1.2.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143326" version="1" comment="bind is &lt;9.9.6P1-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143327" version="1" comment="bind-chrootenv is &lt;9.9.6P1-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143328" version="1" comment="bind-doc is &lt;9.9.6P1-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115220" version="1" comment="gcc48-locale is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140534" version="1" comment="davfs2 is &lt;1.5.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143329" version="1" comment="dhcp-relay is &lt;4.3.3-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143330" version="1" comment="dhcp-server is &lt;4.3.3-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143331" version="1" comment="dracut-fips is &lt;037-66.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106097" version="1" comment="libasm1-32bit is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140576" version="1" comment="freeradius-server is &lt;3.0.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140577" version="1" comment="freeradius-server-doc is &lt;3.0.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140578" version="1" comment="freeradius-server-krb5 is &lt;3.0.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140579" version="1" comment="freeradius-server-ldap is &lt;3.0.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140580" version="1" comment="freeradius-server-libs is &lt;3.0.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140581" version="1" comment="freeradius-server-mysql is &lt;3.0.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140582" version="1" comment="freeradius-server-perl is &lt;3.0.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140583" version="1" comment="freeradius-server-postgresql is &lt;3.0.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140584" version="1" comment="freeradius-server-python is &lt;3.0.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140585" version="1" comment="freeradius-server-sqlite is &lt;3.0.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140586" version="1" comment="freeradius-server-utils is &lt;3.0.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143332" version="1" comment="git-core is &lt;1.8.5.6-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143333" version="1" comment="glibc-html is &lt;2.19-31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143334" version="1" comment="glibc-info is &lt;2.19-31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143335" version="1" comment="glibc-profile is &lt;2.19-31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143336" version="1" comment="glibc-profile-32bit is &lt;2.19-31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114257" version="1" comment="libgnutls-openssl27 is &lt;3.2.15-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143337" version="1" comment="guestfs-data is &lt;1.26.10-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143338" version="1" comment="guestfs-tools is &lt;1.26.10-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143339" version="1" comment="guestfsd is &lt;1.26.10-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143340" version="1" comment="libguestfs0 is &lt;1.26.10-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143341" version="1" comment="perl-Sys-Guestfs is &lt;1.26.10-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143342" version="1" comment="python-libguestfs is &lt;1.26.10-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143343" version="1" comment="ipsec-tools is &lt;0.8.0-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107700" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.75-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107702" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.75-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107703" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.75-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107704" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.75-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113202" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.10-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113204" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.10-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113209" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.10-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113211" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.10-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143344" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr1.10-2.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143345" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr1.10-2.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143346" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr1.10-2.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143347" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.65-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143348" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.65-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143349" version="1" comment="kernel-default is &lt;4.1.13-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143350" version="1" comment="kernel-default-base is &lt;4.1.13-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143351" version="1" comment="kernel-default-devel is &lt;4.1.13-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143352" version="1" comment="kernel-default-man is &lt;3.12.49-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143353" version="1" comment="kernel-devel is &lt;4.1.13-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143354" version="1" comment="kernel-macros is &lt;4.1.13-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143355" version="1" comment="kernel-source is &lt;4.1.13-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143356" version="1" comment="kernel-syms is &lt;4.1.13-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143357" version="1" comment="kernel-xen-base is &lt;3.12.49-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115946" version="1" comment="krb5-doc is &lt;1.12.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115947" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115948" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115949" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115950" version="1" comment="krb5-server is &lt;1.12.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102934" version="1" comment="libFLAC++6 is &lt;1.3.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140792" version="1" comment="libcgroup-tools is &lt;0.41.rc1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143358" version="1" comment="postgresql94-contrib is &lt;9.4.5-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143359" version="1" comment="postgresql94-docs is &lt;9.4.5-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143360" version="1" comment="postgresql94-server is &lt;9.4.5-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116020" version="1" comment="libfreebl3-hmac is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116021" version="1" comment="libfreebl3-hmac-32bit is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116024" version="1" comment="libsoftokn3-hmac is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116025" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114245" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114246" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106170" version="1" comment="libhivex0 is &lt;1.3.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106171" version="1" comment="perl-Win-Hivex is &lt;1.3.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107570" version="1" comment="libicu-doc is &lt;52.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140861" version="1" comment="libjansson4 is &lt;2.7-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105815" version="1" comment="libmpfr4-32bit is &lt;3.1.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143361" version="1" comment="mariadb-tools is &lt;10.0.21-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143362" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143363" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143364" version="1" comment="openssl-doc is &lt;1.0.1i-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143365" version="1" comment="python-base-32bit is &lt;2.7.9-20.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113422" version="1" comment="qt4-x11-tools is &lt;4.8.6-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114061" version="1" comment="tiff is &lt;4.0.4-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143366" version="1" comment="libvirt-lock-sanlock is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103736" version="1" comment="libxml2-doc is &lt;2.9.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143367" version="1" comment="openldap2 is &lt;2.4.41-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143368" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143369" version="1" comment="openslp-server is &lt;2.0.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114324" version="1" comment="openssh-fips is &lt;6.6p1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143370" version="1" comment="openvpn-auth-pam-plugin is &lt;2.3.8-16.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143371" version="1" comment="openvswitch is &lt;2.1.2-4.5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143372" version="1" comment="openvswitch-kmp-default is &lt;2.1.2_k3.12.49_11-4.5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143373" version="1" comment="openvswitch-kmp-xen is &lt;2.1.2_k3.12.49_11-4.5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143374" version="1" comment="openvswitch-switch is &lt;2.1.2-4.5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143375" version="1" comment="powerpc-utils is &lt;1.2.26-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143376" version="1" comment="ppc64-diag is &lt;2.6.9-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143377" version="1" comment="python-32bit is &lt;2.7.9-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143378" version="1" comment="python-demo is &lt;2.7.9-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143379" version="1" comment="python-gdbm is &lt;2.7.9-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143380" version="1" comment="python-idle is &lt;2.7.9-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143381" version="1" comment="qemu-block-rbd is &lt;2.3.1-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143382" version="1" comment="qemu-guest-agent is &lt;2.3.1-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143383" version="1" comment="qemu-lang is &lt;2.3.1-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143384" version="1" comment="qemu-ppc is &lt;2.3.1-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143385" version="1" comment="qemu-s390 is &lt;2.3.1-5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143386" version="1" comment="rsyslog-diag-tools is &lt;8.4.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143387" version="1" comment="rsyslog-doc is &lt;8.4.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143388" version="1" comment="rsyslog-module-gssapi is &lt;8.4.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143389" version="1" comment="rsyslog-module-gtls is &lt;8.4.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143390" version="1" comment="rsyslog-module-mysql is &lt;8.4.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143391" version="1" comment="rsyslog-module-pgsql is &lt;8.4.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143392" version="1" comment="rsyslog-module-relp is &lt;8.4.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143393" version="1" comment="rsyslog-module-snmp is &lt;8.4.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143394" version="1" comment="rsyslog-module-udpspoof is &lt;8.4.0-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143395" version="1" comment="smt is &lt;3.0.8-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143396" version="1" comment="smt-support is &lt;3.0.8-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105076" version="1" comment="squid is &lt;3.3.13-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110998" version="1" comment="strongswan-hmac is &lt;5.1.3-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110494" version="1" comment="stunnel is &lt;5.00-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143397" version="1" comment="systemtap is &lt;2.5-4.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143398" version="1" comment="systemtap-runtime is &lt;2.5-4.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143399" version="1" comment="systemtap-server is &lt;2.5-4.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143400" version="1" comment="tomcat is &lt;8.0.23-1.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143401" version="1" comment="tomcat-admin-webapps is &lt;8.0.23-1.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143402" version="1" comment="tomcat-docs-webapp is &lt;8.0.23-1.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143403" version="1" comment="tomcat-el-3_0-api is &lt;8.0.23-1.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143404" version="1" comment="tomcat-javadoc is &lt;8.0.23-1.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143405" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.23-1.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143406" version="1" comment="tomcat-lib is &lt;8.0.23-1.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143407" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.23-1.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143408" version="1" comment="tomcat-webapps is &lt;8.0.23-1.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143409" version="1" comment="vsftpd is &lt;3.0.2-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143410" version="1" comment="xen-doc-html is &lt;4.5.1_12-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143411" version="1" comment="xen-tools is &lt;4.5.1_12-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143412" version="1" comment="xen-tools-domU is &lt;4.5.1_12-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128018" version="1" comment="sles-release is ==12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140453" version="1" comment="apache2 is &lt;2.4.23-14.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140454" version="1" comment="apache2-doc is &lt;2.4.23-14.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140455" version="1" comment="apache2-example-pages is &lt;2.4.23-14.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140456" version="1" comment="apache2-prefork is &lt;2.4.23-14.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140457" version="1" comment="apache2-utils is &lt;2.4.23-14.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140458" version="1" comment="apache2-worker is &lt;2.4.23-14.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131934" version="1" comment="apache2-mod_nss is &lt;1.0.14-18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131796" version="1" comment="flex is &lt;2.5.37-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131938" version="1" comment="flex-32bit is &lt;2.5.37-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131939" version="1" comment="libbonobo-doc is &lt;2.32.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140465" version="1" comment="automake is &lt;1.13.4-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140469" version="1" comment="avahi-utils is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131135" version="1" comment="bind is &lt;9.9.9P1-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131947" version="1" comment="bind-chrootenv is &lt;9.9.9P1-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131948" version="1" comment="bind-doc is &lt;9.9.9P1-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140484" version="1" comment="bzip2-doc is &lt;1.0.6-29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140487" version="1" comment="chrony is &lt;2.3-3.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140503" version="1" comment="gcc48-locale is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130042" version="1" comment="dhcp-relay is &lt;4.3.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130043" version="1" comment="dhcp-server is &lt;4.3.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140547" version="1" comment="dracut-fips is &lt;044-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140548" version="1" comment="dstat is &lt;0.7.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140550" version="1" comment="emacs-el is &lt;24.3-16.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140552" version="1" comment="emacs-nox is &lt;24.3-16.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140570" version="1" comment="fetchmailconf is &lt;6.3.26-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126715" version="1" comment="giflib-progs is &lt;5.0.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124820" version="1" comment="git-core is &lt;1.8.5.6-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140622" version="1" comment="glibc-html is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140624" version="1" comment="glibc-info is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140627" version="1" comment="glibc-profile is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140628" version="1" comment="glibc-profile-32bit is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140649" version="1" comment="grub2-arm64-efi is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140651" version="1" comment="grub2-powerpc-ieee1275 is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140652" version="1" comment="grub2-s390x-emu is &lt;2.02~beta2-104.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140663" version="1" comment="guestfs-data is &lt;1.32.4-14.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140664" version="1" comment="guestfs-tools is &lt;1.32.4-14.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140665" version="1" comment="guestfsd is &lt;1.32.4-14.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140666" version="1" comment="libguestfs0 is &lt;1.32.4-14.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140667" version="1" comment="perl-Sys-Guestfs is &lt;1.32.4-14.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140668" version="1" comment="python-libguestfs is &lt;1.32.4-14.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140669" version="1" comment="virt-p2v is &lt;1.32.4-14.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140670" version="1" comment="virt-v2v is &lt;1.32.4-14.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140685" version="1" comment="ipsec-tools is &lt;0.8.0-15.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131900" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.111-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131901" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.111-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131658" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.50-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131659" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.50-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131661" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.50-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131662" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.50-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128388" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr3.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128390" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr3.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128391" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr3.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131902" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.101-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131903" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.101-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140696" version="1" comment="kernel-default-base is &lt;4.4.21-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140698" version="1" comment="kernel-default-man is &lt;4.4.21-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140706" version="1" comment="krb5-doc is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140707" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140708" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140709" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140710" version="1" comment="krb5-server is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131949" version="1" comment="postgresql94-contrib is &lt;9.4.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131950" version="1" comment="postgresql94-docs is &lt;9.4.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131951" version="1" comment="postgresql94-server is &lt;9.4.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129312" version="1" comment="libfreebl3-hmac is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129313" version="1" comment="libfreebl3-hmac-32bit is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129314" version="1" comment="libsoftokn3-hmac is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129315" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131935" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-16.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131936" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-16.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131905" version="1" comment="libidn-tools is &lt;1.28-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140872" version="1" comment="openldap2 is &lt;2.4.41-18.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140873" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131946" version="1" comment="mariadb-tools is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140889" version="1" comment="libnghttp2-14 is &lt;1.7.1-1.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140893" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140894" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140896" version="1" comment="openssl-doc is &lt;1.0.2j-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131910" version="1" comment="python-base-32bit is &lt;2.7.9-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125290" version="1" comment="qt4-x11-tools is &lt;4.8.6-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131759" version="1" comment="libtcnative-1-0 is &lt;1.1.32-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131044" version="1" comment="tiff is &lt;4.0.6-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140995" version="1" comment="libvirt-lock-sanlock is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140996" version="1" comment="libvirt-nss is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119309" version="1" comment="libvncclient0 is &lt;0.9.9-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119310" version="1" comment="libvncserver0 is &lt;0.9.9-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141005" version="1" comment="python-vte is &lt;0.28.2-19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141006" version="1" comment="vte2-lang is &lt;0.28.2-19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141034" version="1" comment="libxml2-doc is &lt;2.9.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141039" version="1" comment="logwatch is &lt;7.4.3-15.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131940" version="1" comment="openslp-server is &lt;2.0.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141046" version="1" comment="openssh-fips is &lt;7.2p2-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141049" version="1" comment="openvpn-auth-pam-plugin is &lt;2.3.8-16.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141050" version="1" comment="openvswitch is &lt;2.5.1-24.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141051" version="1" comment="openvswitch-dpdk is &lt;2.5.1-24.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141052" version="1" comment="openvswitch-dpdk-switch is &lt;2.5.1-24.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141053" version="1" comment="openvswitch-switch is &lt;2.5.1-24.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141070" version="1" comment="powerpc-utils is &lt;1.3.2-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141071" version="1" comment="ppc64-diag is &lt;2.7.1-5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131909" version="1" comment="python-32bit is &lt;2.7.9-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131911" version="1" comment="python-demo is &lt;2.7.9-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131914" version="1" comment="python-gdbm is &lt;2.7.9-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131915" version="1" comment="python-idle is &lt;2.7.9-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141088" version="1" comment="qemu-arm is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141090" version="1" comment="qemu-block-rbd is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141091" version="1" comment="qemu-block-ssh is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141092" version="1" comment="qemu-guest-agent is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141095" version="1" comment="qemu-lang is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141096" version="1" comment="qemu-ppc is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141097" version="1" comment="qemu-s390 is &lt;2.6.1-27.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128392" version="1" comment="quagga is &lt;0.99.22.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141104" version="1" comment="res-signingkeys is &lt;3.0.18-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141105" version="1" comment="smt is &lt;3.0.18-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141106" version="1" comment="smt-support is &lt;3.0.18-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141113" version="1" comment="rsyslog-diag-tools is &lt;8.4.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141114" version="1" comment="rsyslog-doc is &lt;8.4.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141115" version="1" comment="rsyslog-module-gssapi is &lt;8.4.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141116" version="1" comment="rsyslog-module-gtls is &lt;8.4.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141117" version="1" comment="rsyslog-module-mysql is &lt;8.4.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141118" version="1" comment="rsyslog-module-pgsql is &lt;8.4.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141119" version="1" comment="rsyslog-module-relp is &lt;8.4.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141120" version="1" comment="rsyslog-module-snmp is &lt;8.4.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141121" version="1" comment="rsyslog-module-udpspoof is &lt;8.4.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141127" version="1" comment="squid is &lt;3.5.21-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119300" version="1" comment="strongswan-hmac is &lt;5.1.3-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141135" version="1" comment="systemtap is &lt;3.0-7.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141136" version="1" comment="systemtap-runtime is &lt;3.0-7.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141137" version="1" comment="systemtap-server is &lt;3.0-7.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141142" version="1" comment="tomcat is &lt;8.0.36-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141143" version="1" comment="tomcat-admin-webapps is &lt;8.0.36-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141144" version="1" comment="tomcat-docs-webapp is &lt;8.0.36-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141145" version="1" comment="tomcat-el-3_0-api is &lt;8.0.36-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141146" version="1" comment="tomcat-javadoc is &lt;8.0.36-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141147" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.36-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141148" version="1" comment="tomcat-lib is &lt;8.0.36-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141149" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.36-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141150" version="1" comment="tomcat-webapps is &lt;8.0.36-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141156" version="1" comment="vsftpd is &lt;3.0.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141160" version="1" comment="xen-doc-html is &lt;4.7.0_12-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141163" version="1" comment="xen-tools is &lt;4.7.0_12-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141164" version="1" comment="xen-tools-domU is &lt;4.7.0_12-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147510" version="1" comment="apache-commons-daemon is &lt;1.0.15-4.181" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147511" version="1" comment="apache-commons-daemon-javadoc is &lt;1.0.15-4.181" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147512" version="1" comment="apache-commons-httpclient is &lt;3.1-4.364" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147513" version="1" comment="m4 is &lt;1.4.16-15.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147514" version="1" comment="coolkey is &lt;1.1.0-147.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147515" version="1" comment="cups-pk-helper is &lt;0.2.5-3.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147516" version="1" comment="cups-pk-helper-lang is &lt;0.2.5-3.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147517" version="1" comment="cvs is &lt;1.12.12-181.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147518" version="1" comment="cvs-doc is &lt;1.12.12-181.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147519" version="1" comment="dovecot22 is &lt;2.2.13-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147520" version="1" comment="dovecot22-backend-mysql is &lt;2.2.13-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147521" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.13-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147522" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.13-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147523" version="1" comment="gpgme is &lt;1.5.1-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147524" version="1" comment="libgpgme11 is &lt;1.5.1-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147525" version="1" comment="groff is &lt;1.22.2-5.287" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147526" version="1" comment="groff-full is &lt;1.22.2-5.287" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147527" version="1" comment="gxditview is &lt;1.22.2-5.287" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147528" version="1" comment="gv is &lt;3.7.4-1.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147529" version="1" comment="wdiff is &lt;1.2.1-3.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147530" version="1" comment="gvim is &lt;7.4.326-2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147531" version="1" comment="vim is &lt;7.4.326-2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147532" version="1" comment="vim-data is &lt;7.4.326-2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147533" version="1" comment="gzip is &lt;1.6-7.209" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147534" version="1" comment="hardlink is &lt;1.0-6.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147535" version="1" comment="iputils is &lt;s20121221-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147536" version="1" comment="jakarta-commons-fileupload is &lt;1.1.1-120.113" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147537" version="1" comment="jakarta-commons-fileupload-javadoc is &lt;1.1.1-120.113" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147538" version="1" comment="krb5-appl-clients is &lt;1.0.3-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147539" version="1" comment="krb5-appl-servers is &lt;1.0.3-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147540" version="1" comment="libHX28 is &lt;3.18-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147541" version="1" comment="libIlmImf-Imf_2_1-21 is &lt;2.1.0-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147542" version="1" comment="openexr is &lt;2.1.0-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147543" version="1" comment="libX11-6 is &lt;1.6.2-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147544" version="1" comment="libX11-data is &lt;1.6.2-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147545" version="1" comment="libX11-xcb1 is &lt;1.6.2-4.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147546" version="1" comment="libXRes1 is &lt;1.0.7-3.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147547" version="1" comment="libXcursor1 is &lt;1.1.14-3.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147548" version="1" comment="libXext6 is &lt;1.3.2-3.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147549" version="1" comment="libXfixes3 is &lt;5.0.1-3.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147550" version="1" comment="libXinerama1 is &lt;1.1.3-3.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147551" version="1" comment="libXp6 is &lt;1.0.2-3.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147552" version="1" comment="libXrender1 is &lt;0.9.8-3.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147553" version="1" comment="libXt6 is &lt;1.1.4-3.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147554" version="1" comment="libXtst6 is &lt;1.2.2-3.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147555" version="1" comment="libXv1 is &lt;1.0.10-3.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147556" version="1" comment="libXvMC1 is &lt;1.0.8-3.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147557" version="1" comment="libXxf86dga1 is &lt;1.1.4-3.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147558" version="1" comment="libXxf86vm1 is &lt;1.1.3-3.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147559" version="1" comment="libapr-util1 is &lt;1.5.3-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147560" version="1" comment="libapr-util1-dbd-sqlite3 is &lt;1.5.3-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147561" version="1" comment="libapr1 is &lt;1.5.1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147562" version="1" comment="libdmx1 is &lt;1.1.3-3.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147563" version="1" comment="libexif12 is &lt;0.6.21-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147564" version="1" comment="libgc1 is &lt;7.2d-3.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147565" version="1" comment="libgssglue1 is &lt;0.4-3.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147566" version="1" comment="libgypsy0 is &lt;0.9-6.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147567" version="1" comment="libjson-c2 is &lt;0.11-2.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147568" version="1" comment="liblcms1 is &lt;1.19-17.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147569" version="1" comment="libltdl7 is &lt;2.4.2-14.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147570" version="1" comment="libtool is &lt;2.4.2-14.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147571" version="1" comment="libmodplug1 is &lt;0.8.8.4-13.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147572" version="1" comment="libmusicbrainz4 is &lt;2.1.5-27.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147573" version="1" comment="libneon27 is &lt;0.30.0-3.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147574" version="1" comment="libpcsclite1 is &lt;1.8.10-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147575" version="1" comment="pcsc-lite is &lt;1.8.10-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147576" version="1" comment="libpulse-mainloop-glib0 is &lt;5.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147577" version="1" comment="libpulse0 is &lt;5.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147578" version="1" comment="pulseaudio is &lt;5.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147579" version="1" comment="pulseaudio-esound-compat is &lt;5.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147580" version="1" comment="pulseaudio-gdm-hooks is &lt;5.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147581" version="1" comment="pulseaudio-lang is &lt;5.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147582" version="1" comment="pulseaudio-module-x11 is &lt;5.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147583" version="1" comment="pulseaudio-module-zeroconf is &lt;5.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147584" version="1" comment="pulseaudio-utils is &lt;5.0-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147585" version="1" comment="libraptor2-0 is &lt;2.0.10-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147586" version="1" comment="libsmi is &lt;0.4.8-18.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147587" version="1" comment="libsmi2 is &lt;0.4.8-18.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147588" version="1" comment="libtag1 is &lt;1.9.1-1.218" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147589" version="1" comment="libtag_c0 is &lt;1.9.1-1.218" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147590" version="1" comment="taglib is &lt;1.9.1-1.218" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147591" version="1" comment="libudisks2-0 is &lt;2.1.3-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147592" version="1" comment="udisks2 is &lt;2.1.3-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147593" version="1" comment="udisks2-lang is &lt;2.1.3-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147594" version="1" comment="libupsclient1 is &lt;2.7.1-4.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147595" version="1" comment="nut is &lt;2.7.1-4.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147596" version="1" comment="nut-drivers-net is &lt;2.7.1-4.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147597" version="1" comment="logrotate is &lt;3.8.7-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147598" version="1" comment="mipv6d is &lt;2.0.2.umip.0.4-19.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147599" version="1" comment="opensc is &lt;0.13.0-1.107" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147600" version="1" comment="opie is &lt;2.4-724.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147601" version="1" comment="pam_krb5 is &lt;2.4.4-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147602" version="1" comment="pam_ssh is &lt;2.0-1.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147603" version="1" comment="pcsc-ccid is &lt;1.4.14-1.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147604" version="1" comment="perl-Config-IniFiles is &lt;2.82-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147605" version="1" comment="perl-HTML-Parser is &lt;3.71-1.145" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147606" version="1" comment="perl-Tk is &lt;804.031-3.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147607" version="1" comment="ppp is &lt;2.4.7-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147608" version="1" comment="python-pywbem is &lt;0.7.0-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147609" version="1" comment="radvd is &lt;1.9.7-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147610" version="1" comment="rtkit is &lt;0.11_git201205151338-8.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147611" version="1" comment="ruby is &lt;2.1-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147612" version="1" comment="whois is &lt;5.1.1-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147613" version="1" comment="xinetd is &lt;2.3.15-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147614" version="1" comment="xlockmore is &lt;5.43-5.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147615" version="1" comment="xrdb is &lt;1.1.0-3.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147616" version="1" comment="yast2 is &lt;3.1.206-36.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147617" version="1" comment="zoo is &lt;2.10-1020.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144701" version="1" comment="FastCGI is &lt;2.4.0-167.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144702" version="1" comment="perl-FastCGI is &lt;2.4.0-167.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117457" version="1" comment="sle-sdk-release is ==12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144703" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-5.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144704" version="1" comment="libMagick++-devel is &lt;6.8.8.1-5.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144705" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-5.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144706" version="1" comment="MozillaFirefox-devel is &lt;31.1.0esr-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144707" version="1" comment="aaa_base-malloccheck is &lt;13.2+git20140911.61c1681-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144708" version="1" comment="accountsservice-devel is &lt;0.6.35-1.126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144709" version="1" comment="alsa-devel is &lt;1.0.27.2-11.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144710" version="1" comment="ant-jmf is &lt;1.9.4-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144711" version="1" comment="ant-scripts is &lt;1.9.4-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144712" version="1" comment="ant-swing is &lt;1.9.4-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144713" version="1" comment="apache2-devel is &lt;2.4.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144714" version="1" comment="augeas-devel is &lt;1.2.0-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144715" version="1" comment="avahi-compat-howl-devel is &lt;0.6.31-20.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144716" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.6.31-20.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144717" version="1" comment="libavahi-devel is &lt;0.6.31-20.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144718" version="1" comment="libhowl0 is &lt;0.6.31-20.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144719" version="1" comment="bash-devel is &lt;4.2-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144720" version="1" comment="readline-devel is &lt;6.2-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144721" version="1" comment="bind-devel is &lt;9.9.5P1-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144722" version="1" comment="checkbashisms is &lt;2.12.6-3.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144723" version="1" comment="cifs-utils-devel is &lt;6.4-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144724" version="1" comment="coolkey-devel is &lt;1.1.0-147.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144725" version="1" comment="ctdb-devel is &lt;2.5.3-4.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144726" version="1" comment="cups-devel is &lt;1.7.5-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144727" version="1" comment="cyrus-sasl-devel is &lt;2.1.26-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144728" version="1" comment="dbus-1-devel is &lt;1.8.8-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144729" version="1" comment="dbus-1-devel-doc is &lt;1.8.8-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144730" version="1" comment="dbus-1-glib-devel is &lt;0.100.2-3.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144731" version="1" comment="dhcp-devel is &lt;4.2.6-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144732" version="1" comment="dovecot22-devel is &lt;2.2.13-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144733" version="1" comment="evince-devel is &lt;3.10.3-1.213" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144734" version="1" comment="file-devel is &lt;5.19-2.149" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144735" version="1" comment="finch-devel is &lt;2.10.9-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144736" version="1" comment="libpurple-devel is &lt;2.10.9-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144737" version="1" comment="pidgin-devel is &lt;2.10.9-5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144738" version="1" comment="firebird-devel is &lt;2.5.2.26539-13.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144739" version="1" comment="libfbembed-devel is &lt;2.5.2.26539-13.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144740" version="1" comment="freeradius-server-devel is &lt;3.0.3-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144741" version="1" comment="freerdp-devel is &lt;1.0.2-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144742" version="1" comment="freetype2-devel is &lt;2.5.3-2.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144743" version="1" comment="fuse-devel is &lt;2.9.3-3.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144744" version="1" comment="fuse-devel-static is &lt;2.9.3-3.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144745" version="1" comment="libulockmgr1 is &lt;2.9.3-3.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144746" version="1" comment="gc-devel is &lt;7.2d-3.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144747" version="1" comment="gcc48-ada is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144748" version="1" comment="gcc48-fortran is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144749" version="1" comment="gcc48-java is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144750" version="1" comment="gcc48-obj-c++ is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144751" version="1" comment="gcc48-objc is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144752" version="1" comment="gcc48-objc-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144753" version="1" comment="libada48 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144754" version="1" comment="libffi48-devel is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144755" version="1" comment="libgcj48-devel is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144756" version="1" comment="libgfortran3-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144757" version="1" comment="libobjc4 is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144758" version="1" comment="libobjc4-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144759" version="1" comment="libquadmath0-32bit is &lt;4.8.3+r212056-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144760" version="1" comment="gd-devel is &lt;2.1.0-3.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144761" version="1" comment="gdk-pixbuf-devel is &lt;2.30.6-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144762" version="1" comment="gdm-devel is &lt;3.10.0.1-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144763" version="1" comment="gimp-devel is &lt;2.8.10-1.164" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144764" version="1" comment="git is &lt;1.8.5.2-2.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144765" version="1" comment="git-arch is &lt;1.8.5.2-2.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144766" version="1" comment="git-core is &lt;1.8.5.2-2.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144767" version="1" comment="git-cvs is &lt;1.8.5.2-2.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144768" version="1" comment="git-daemon is &lt;1.8.5.2-2.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144769" version="1" comment="git-email is &lt;1.8.5.2-2.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144770" version="1" comment="git-gui is &lt;1.8.5.2-2.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144771" version="1" comment="git-svn is &lt;1.8.5.2-2.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144772" version="1" comment="git-web is &lt;1.8.5.2-2.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144773" version="1" comment="gitk is &lt;1.8.5.2-2.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144774" version="1" comment="glib2-devel is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144775" version="1" comment="glib2-devel-static is &lt;2.38.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144776" version="1" comment="glibc-devel-static is &lt;2.19-17.72" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144777" version="1" comment="gnome-online-accounts-devel is &lt;3.10.5-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144778" version="1" comment="gnome-shell-devel is &lt;3.10.4-22.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144779" version="1" comment="hplip-devel is &lt;3.14.6-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144780" version="1" comment="icecream is &lt;1.0.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144781" version="1" comment="lzo-devel is &lt;2.08-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144782" version="1" comment="id3lib is &lt;3.8.3-261.135" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144783" version="1" comment="kernel-docs is &lt;3.12.28-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144784" version="1" comment="kernel-obs-build is &lt;3.12.28-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144785" version="1" comment="kernel-zfcpdump is &lt;3.12.28-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144786" version="1" comment="krb5-devel is &lt;1.12.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144787" version="1" comment="lib3ds-1-3 is &lt;1.3.0-25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144788" version="1" comment="libHX-devel is &lt;3.18-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144789" version="1" comment="libX11-devel is &lt;1.6.2-4.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144790" version="1" comment="libXcursor-devel is &lt;1.1.14-3.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144791" version="1" comment="libXext-devel is &lt;1.3.2-3.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144792" version="1" comment="libXfixes-devel is &lt;5.0.1-3.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144793" version="1" comment="libXfont-devel is &lt;1.4.7-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144794" version="1" comment="libXi-devel is &lt;1.7.2-3.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144795" version="1" comment="libXinerama-devel is &lt;1.1.3-3.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144796" version="1" comment="libXp-devel is &lt;1.0.2-3.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144797" version="1" comment="libXrandr-devel is &lt;1.4.2-3.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144798" version="1" comment="libXrender-devel is &lt;0.9.8-3.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144799" version="1" comment="libXres-devel is &lt;1.0.7-3.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144800" version="1" comment="libXt-devel is &lt;1.1.4-3.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144801" version="1" comment="libXtst-devel is &lt;1.2.2-3.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144802" version="1" comment="libXv-devel is &lt;1.0.10-3.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144803" version="1" comment="libXvMC-devel is &lt;1.0.8-3.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144804" version="1" comment="libXxf86dga-devel is &lt;1.1.4-3.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144805" version="1" comment="libXxf86vm-devel is &lt;1.1.3-3.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144806" version="1" comment="libapr-util1-devel is &lt;1.5.3-1.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144807" version="1" comment="libapr1-devel is &lt;1.5.1-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144808" version="1" comment="libasm-devel is &lt;0.158-3.200" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144809" version="1" comment="libdw-devel is &lt;0.158-3.200" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144810" version="1" comment="libebl-devel is &lt;0.158-3.200" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144811" version="1" comment="libelf-devel is &lt;0.158-3.200" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144812" version="1" comment="libblkid-devel is &lt;2.25-6.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144813" version="1" comment="libmount-devel is &lt;2.25-6.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144814" version="1" comment="libsmartcols-devel is &lt;2.25-6.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144815" version="1" comment="libbz2-devel is &lt;1.0.6-27.1129" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144816" version="1" comment="libcgroup-devel is &lt;0.41.rc1-1.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144817" version="1" comment="libcolord-devel is &lt;1.1.7-2.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144818" version="1" comment="libcolord-gtk-devel is &lt;0.1.25-3.113" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144819" version="1" comment="typelib-1_0-ColorHug-1_0 is &lt;1.1.7-2.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144820" version="1" comment="typelib-1_0-Colord-1_0 is &lt;1.1.7-2.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144821" version="1" comment="typelib-1_0-ColordGtk-1_0 is &lt;0.1.25-3.113" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144822" version="1" comment="libcurl-devel is &lt;7.37.0-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144823" version="1" comment="libdcerpc-atsvc-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144824" version="1" comment="libdcerpc-atsvc0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144825" version="1" comment="libdcerpc-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144826" version="1" comment="libdcerpc-samr-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144827" version="1" comment="libdcerpc-samr0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144828" version="1" comment="libgensec-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144829" version="1" comment="libndr-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144830" version="1" comment="libndr-krb5pac-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144831" version="1" comment="libndr-nbt-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144832" version="1" comment="libndr-standard-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144833" version="1" comment="libnetapi-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144834" version="1" comment="libpdb-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144835" version="1" comment="libregistry-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144836" version="1" comment="libsamba-credentials-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144837" version="1" comment="libsamba-hostconfig-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144838" version="1" comment="libsamba-policy-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144839" version="1" comment="libsamba-policy0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144840" version="1" comment="libsamba-util-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144841" version="1" comment="libsamdb-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144842" version="1" comment="libsmbclient-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144843" version="1" comment="libsmbclient-raw-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144844" version="1" comment="libsmbconf-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144845" version="1" comment="libsmbldap-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144846" version="1" comment="libsmbsharemodes-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144847" version="1" comment="libsmbsharemodes0 is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144848" version="1" comment="libtevent-util-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144849" version="1" comment="libwbclient-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144850" version="1" comment="samba-core-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144851" version="1" comment="samba-test-devel is &lt;4.1.12-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144852" version="1" comment="libdmx-devel is &lt;1.1.3-3.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144853" version="1" comment="libevent-devel is &lt;2.0.21-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144854" version="1" comment="libexif-devel is &lt;0.6.21-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144855" version="1" comment="libexpat-devel is &lt;2.1.0-13.232" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144856" version="1" comment="libgadu-devel is &lt;1.11.4-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144857" version="1" comment="libgcrypt-devel is &lt;1.6.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144858" version="1" comment="libgnomesu-devel is &lt;1.0.0-352.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144859" version="1" comment="libgnutls-devel is &lt;3.2.15-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144860" version="1" comment="libgnutls-openssl-devel is &lt;3.2.15-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144861" version="1" comment="libgnutlsxx-devel is &lt;3.2.15-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144862" version="1" comment="libgnutlsxx28 is &lt;3.2.15-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144863" version="1" comment="libgpgme-devel is &lt;1.5.1-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144864" version="1" comment="libgssglue-devel is &lt;0.4-3.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144865" version="1" comment="libgudev-1_0-devel is &lt;210-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144866" version="1" comment="libudev-devel is &lt;210-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144867" version="1" comment="systemd-devel is &lt;210-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144868" version="1" comment="typelib-1_0-GUdev-1_0 is &lt;210-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144869" version="1" comment="libguestfs-devel is &lt;1.26.9-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144870" version="1" comment="ocaml-libguestfs-devel is &lt;1.26.9-1.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144871" version="1" comment="libid3tag-devel is &lt;0.15.1b-182.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144872" version="1" comment="libipa_hbac-devel is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144873" version="1" comment="libsss_idmap-devel is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144874" version="1" comment="libsss_nss_idmap-devel is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144875" version="1" comment="libsss_nss_idmap0 is &lt;1.11.5.1-5.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144876" version="1" comment="libwebkitgtk-devel is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144877" version="1" comment="libwebkitgtk3-devel is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144878" version="1" comment="typelib-1_0-JavaScriptCore-1_0 is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144879" version="1" comment="typelib-1_0-WebKit-1_0 is &lt;2.2.7-3.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144880" version="1" comment="libjbig-devel is &lt;2.0-12.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144881" version="1" comment="libjson-c-devel is &lt;0.11-2.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144882" version="1" comment="liblcms-devel is &lt;1.19-17.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144883" version="1" comment="libmikmod-devel is &lt;3.2.0-4.59" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144884" version="1" comment="libmms-devel is &lt;0.6.2-15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144885" version="1" comment="libmodplug-devel is &lt;0.8.8.4-13.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144886" version="1" comment="libmspack-devel is &lt;0.4-3.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144887" version="1" comment="libmusicbrainz-devel is &lt;2.1.5-27.86" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144888" version="1" comment="libmysqlclient-devel is &lt;10.0.11-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144889" version="1" comment="libmysqld-devel is &lt;10.0.11-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144890" version="1" comment="libmysqld18 is &lt;10.0.11-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144891" version="1" comment="libneon-devel is &lt;0.30.0-3.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144892" version="1" comment="libopenssl-devel is &lt;1.0.1i-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144893" version="1" comment="libpacemaker-devel is &lt;1.1.12-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144894" version="1" comment="pacemaker-cts is &lt;1.1.12-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144895" version="1" comment="libpcp3 is &lt;3.6.10-4.124" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144896" version="1" comment="pcp is &lt;3.6.10-4.124" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144897" version="1" comment="pcp-import-iostat2pcp is &lt;3.6.10-4.124" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144898" version="1" comment="pcp-import-mrtg2pcp is &lt;3.6.10-4.124" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144899" version="1" comment="pcp-import-sar2pcp is &lt;3.6.10-4.124" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144900" version="1" comment="pcp-import-sheet2pcp is &lt;3.6.10-4.124" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144901" version="1" comment="perl-PCP-LogImport is &lt;3.6.10-4.124" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144902" version="1" comment="perl-PCP-LogSummary is &lt;3.6.10-4.124" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144903" version="1" comment="perl-PCP-MMV is &lt;3.6.10-4.124" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144904" version="1" comment="perl-PCP-PMDA is &lt;3.6.10-4.124" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144905" version="1" comment="libpcscspy0 is &lt;1.8.10-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144906" version="1" comment="pcsc-lite-devel is &lt;1.8.10-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144907" version="1" comment="libpng12-compat-devel is &lt;1.2.50-8.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144908" version="1" comment="libpng12-devel is &lt;1.2.50-8.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144909" version="1" comment="libpng16-compat-devel is &lt;1.6.8-2.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144910" version="1" comment="libpng16-devel is &lt;1.6.8-2.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144911" version="1" comment="libpoppler-devel is &lt;0.24.4-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144912" version="1" comment="libpoppler-glib-devel is &lt;0.24.4-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144913" version="1" comment="libpoppler-qt4-devel is &lt;0.24.4-3.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144914" version="1" comment="typelib-1_0-Poppler-0_18 is &lt;0.24.4-3.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144915" version="1" comment="libproxy-devel is &lt;0.4.11-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144916" version="1" comment="libpulse-devel is &lt;5.0-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144917" version="1" comment="libqt4-devel is &lt;4.8.6-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144918" version="1" comment="libqt4-devel-doc is &lt;4.8.6-2.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144919" version="1" comment="libqt4-devel-doc-data is &lt;4.8.6-2.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144920" version="1" comment="libqt4-linguist is &lt;4.8.6-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144921" version="1" comment="libqt4-private-headers-devel is &lt;4.8.6-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144922" version="1" comment="libraptor-devel is &lt;2.0.10-3.67" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144923" version="1" comment="libraw-devel is &lt;0.15.4-3.88" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144924" version="1" comment="libraw-devel-static is &lt;0.15.4-3.88" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144925" version="1" comment="librpcsecgss-devel is &lt;0.19-16.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144926" version="1" comment="librsvg-devel is &lt;2.40.2-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144927" version="1" comment="typelib-1_0-Rsvg-2_0 is &lt;2.40.2-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144928" version="1" comment="libserf-1-1 is &lt;1.3.7-1.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144929" version="1" comment="silc-toolkit-devel is &lt;1.1.10-24.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144930" version="1" comment="libsmi-devel is &lt;0.4.8-18.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144931" version="1" comment="libsndfile-devel is &lt;1.0.25-18.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144932" version="1" comment="libsoup-devel is &lt;2.44.2-1.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144933" version="1" comment="libssh-devel is &lt;0.6.3-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144934" version="1" comment="libssh-devel-doc is &lt;0.6.3-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144935" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.8.10-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144936" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.8.10-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144937" version="1" comment="subversion is &lt;1.8.10-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144938" version="1" comment="subversion-bash-completion is &lt;1.8.10-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144939" version="1" comment="subversion-devel is &lt;1.8.10-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144940" version="1" comment="subversion-perl is &lt;1.8.10-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144941" version="1" comment="subversion-python is &lt;1.8.10-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144942" version="1" comment="subversion-server is &lt;1.8.10-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144943" version="1" comment="subversion-tools is &lt;1.8.10-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144944" version="1" comment="libtag-devel is &lt;1.9.1-1.265" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144945" version="1" comment="libtasn1-devel is &lt;3.7-2.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144946" version="1" comment="libtiff-devel is &lt;4.0.3-9.78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144947" version="1" comment="libvirt-devel is &lt;1.2.5-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144948" version="1" comment="libvorbis-devel is &lt;1.3.3-8.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144949" version="1" comment="libxcb-composite0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144950" version="1" comment="libxcb-damage0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144951" version="1" comment="libxcb-devel is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144952" version="1" comment="libxcb-devel-doc is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144953" version="1" comment="libxcb-dpms0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144954" version="1" comment="libxcb-dri3-0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144955" version="1" comment="libxcb-present0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144956" version="1" comment="libxcb-record0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144957" version="1" comment="libxcb-res0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144958" version="1" comment="libxcb-screensaver0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144959" version="1" comment="libxcb-xevie0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144960" version="1" comment="libxcb-xinerama0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144961" version="1" comment="libxcb-xprint0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144962" version="1" comment="libxcb-xtest0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144963" version="1" comment="libxcb-xvmc0 is &lt;1.10-1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144964" version="1" comment="libxml2-devel is &lt;2.9.1-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144965" version="1" comment="libyaml-devel is &lt;0.1.6-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144966" version="1" comment="libzip-devel is &lt;0.11.1-4.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144967" version="1" comment="zeromq-devel is &lt;4.0.4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144968" version="1" comment="lua-devel is &lt;5.2.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144969" version="1" comment="mozilla-nspr-devel is &lt;4.10.7-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144970" version="1" comment="mozilla-nss-devel is &lt;3.16.4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144971" version="1" comment="net-snmp-devel is &lt;5.7.2.1-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144972" version="1" comment="newt-devel is &lt;0.52.16-1.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144973" version="1" comment="newt-static is &lt;0.52.16-1.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144974" version="1" comment="nut-cgi is &lt;2.7.1-4.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144975" version="1" comment="nut-devel is &lt;2.7.1-4.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144976" version="1" comment="openexr-devel is &lt;2.1.0-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144977" version="1" comment="openslp-devel is &lt;2.0.0-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144978" version="1" comment="osc is &lt;0.148.1-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144979" version="1" comment="pam-devel is &lt;1.1.8-11.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144980" version="1" comment="pango-devel is &lt;1.36.3-4.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144981" version="1" comment="perl-Tk-devel is &lt;804.031-3.82" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144982" version="1" comment="php5-devel is &lt;5.5.14-4.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144983" version="1" comment="polkit-devel is &lt;0.112-2.189" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144984" version="1" comment="postgresql93-devel is &lt;9.3.5-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144985" version="1" comment="ppp-devel is &lt;2.4.7-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144986" version="1" comment="python3-devel is &lt;3.4.1-2.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144987" version="1" comment="quagga-devel is &lt;0.99.22.1-3.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144988" version="1" comment="rhythmbox-devel is &lt;3.0.2-1.92" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144989" version="1" comment="ruby-devel is &lt;2.1-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144990" version="1" comment="ruby2.1-rubygem-bundler is &lt;1.7.3-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144991" version="1" comment="spice-gtk-devel is &lt;0.25-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144992" version="1" comment="typelib-1_0-SpiceClientGtk-2_0 is &lt;0.25-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144993" version="1" comment="sudo-devel is &lt;1.8.10p3-1.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144994" version="1" comment="systemtap-sdt-devel is &lt;2.5-1.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144995" version="1" comment="udisks2-devel is &lt;2.1.3-1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144996" version="1" comment="unixODBC-devel is &lt;2.3.1-4.95" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144997" version="1" comment="vte2-devel is &lt;0.28.2-17.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144998" version="1" comment="wireshark-devel is &lt;1.10.9-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144999" version="1" comment="xalan-j2-demo is &lt;2.7.0-264.133" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145000" version="1" comment="xalan-j2-manual is &lt;2.7.0-264.133" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145001" version="1" comment="xen-devel is &lt;4.4.1_06-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145002" version="1" comment="xfig is &lt;3.2.5c-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145003" version="1" comment="xorg-x11-devel is &lt;7.6-45.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145004" version="1" comment="xorg-x11-server-sdk is &lt;7.6_1.15.2-12.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145005" version="1" comment="yast2-core-devel is &lt;3.1.11-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145006" version="1" comment="yast2-devel-doc is &lt;3.1.108-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109226" version="1" comment="DirectFB-devel is &lt;1.7.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109232" version="1" comment="lib++dfb-devel is &lt;1.7.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118658" version="1" comment="sle-sdk-release is ==12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102630" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102636" version="1" comment="libMagick++-devel is &lt;6.8.8.1-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102641" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114772" version="1" comment="MozillaFirefox-devel is &lt;38.3.0esr-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145007" version="1" comment="aaa_base-malloccheck is &lt;13.2+git20140911.61c1681-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145008" version="1" comment="accountsservice-devel is &lt;0.6.35-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145009" version="1" comment="alsa-devel is &lt;1.0.27.2-11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145010" version="1" comment="ant-jmf is &lt;1.9.4-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145011" version="1" comment="ant-scripts is &lt;1.9.4-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145012" version="1" comment="ant-swing is &lt;1.9.4-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145013" version="1" comment="apache2-devel is &lt;2.4.16-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111368" version="1" comment="augeas-devel is &lt;1.2.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145014" version="1" comment="bind-devel is &lt;9.9.6P1-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145015" version="1" comment="binutils-devel is &lt;2.25.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145016" version="1" comment="binutils-gold is &lt;2.25.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145017" version="1" comment="cross-ppc-binutils is &lt;2.25.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145018" version="1" comment="cross-spu-binutils is &lt;2.25.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145019" version="1" comment="cifs-utils-devel is &lt;6.4-6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145020" version="1" comment="ctdb-devel is &lt;2.5.5-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110318" version="1" comment="cups-devel is &lt;1.7.5-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107562" version="1" comment="dbus-1-devel is &lt;1.8.16-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107560" version="1" comment="dbus-1-devel-doc is &lt;1.8.16-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145021" version="1" comment="dhcp-devel is &lt;4.3.3-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113257" version="1" comment="e2fsprogs-devel is &lt;1.42.11-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113258" version="1" comment="libcom_err-devel is &lt;1.42.11-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113262" version="1" comment="libext2fs-devel is &lt;1.42.11-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103558" version="1" comment="file-devel is &lt;5.19-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102677" version="1" comment="finch-devel is &lt;2.10.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102680" version="1" comment="libpurple-devel is &lt;2.10.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102685" version="1" comment="pidgin-devel is &lt;2.10.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102932" version="1" comment="flac-devel is &lt;1.3.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145022" version="1" comment="freeradius-server-devel is &lt;3.0.3-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145023" version="1" comment="freetype2-devel is &lt;2.5.5-7.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110489" version="1" comment="fuse-devel is &lt;2.9.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110490" version="1" comment="fuse-devel-static is &lt;2.9.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110493" version="1" comment="libulockmgr1 is &lt;2.9.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115216" version="1" comment="gcc48-ada is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115218" version="1" comment="gcc48-fortran is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115240" version="1" comment="gcc48-java is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115221" version="1" comment="gcc48-obj-c++ is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115222" version="1" comment="gcc48-objc is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115261" version="1" comment="gcc48-objc-32bit is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115223" version="1" comment="libada48 is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115237" version="1" comment="libffi48-devel is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115244" version="1" comment="libgcj48-devel is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115230" version="1" comment="libobjc4 is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115269" version="1" comment="libobjc4-32bit is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109547" version="1" comment="gd-devel is &lt;2.1.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145024" version="1" comment="gdm-devel is &lt;3.10.0.1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145025" version="1" comment="git is &lt;1.8.5.6-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145026" version="1" comment="git-arch is &lt;1.8.5.6-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145027" version="1" comment="git-cvs is &lt;1.8.5.6-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145028" version="1" comment="git-daemon is &lt;1.8.5.6-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145029" version="1" comment="git-email is &lt;1.8.5.6-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145030" version="1" comment="git-gui is &lt;1.8.5.6-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145031" version="1" comment="git-svn is &lt;1.8.5.6-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145032" version="1" comment="git-web is &lt;1.8.5.6-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145033" version="1" comment="gitk is &lt;1.8.5.6-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145034" version="1" comment="glib2-devel is &lt;2.38.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145035" version="1" comment="glib2-devel-static is &lt;2.38.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145036" version="1" comment="libgio-fam is &lt;2.38.2-5.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145037" version="1" comment="glibc-devel-static is &lt;2.19-31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145038" version="1" comment="gnome-online-accounts-devel is &lt;3.10.5-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145039" version="1" comment="typelib-1_0-Goa-1_0 is &lt;3.10.5-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107803" version="1" comment="gnome-settings-daemon-devel is &lt;3.10.2-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145040" version="1" comment="gnome-shell-devel is &lt;3.10.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109843" version="1" comment="gstreamer-0_10-plugins-bad-devel is &lt;0.10.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106169" version="1" comment="hivex-devel is &lt;1.3.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145041" version="1" comment="hplip-devel is &lt;3.14.6-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145042" version="1" comment="lzo-devel is &lt;2.08-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113207" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.10-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145043" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr1.10-2.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145044" version="1" comment="kernel-docs is &lt;4.1.13-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145045" version="1" comment="kernel-obs-build is &lt;4.1.13-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115944" version="1" comment="krb5-devel is &lt;1.12.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145046" version="1" comment="libQt5Bootstrap-devel-static is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145047" version="1" comment="libQt5Concurrent-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145048" version="1" comment="libQt5Concurrent5 is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145049" version="1" comment="libQt5Core-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145050" version="1" comment="libQt5Core-private-headers-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145051" version="1" comment="libQt5DBus-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145052" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145053" version="1" comment="libQt5Gui-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145054" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145055" version="1" comment="libQt5Network-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145056" version="1" comment="libQt5Network-private-headers-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145057" version="1" comment="libQt5Network5 is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145058" version="1" comment="libQt5OpenGL-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145059" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145060" version="1" comment="libQt5OpenGL5 is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145061" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145062" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145063" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145064" version="1" comment="libQt5PrintSupport-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145065" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145066" version="1" comment="libQt5PrintSupport5 is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145067" version="1" comment="libQt5Sql-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145068" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145069" version="1" comment="libQt5Sql5 is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145070" version="1" comment="libQt5Sql5-mysql is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145071" version="1" comment="libQt5Sql5-postgresql is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145072" version="1" comment="libQt5Sql5-sqlite is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145073" version="1" comment="libQt5Sql5-unixODBC is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145074" version="1" comment="libQt5Test-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145075" version="1" comment="libQt5Test-private-headers-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145076" version="1" comment="libQt5Test5 is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145077" version="1" comment="libQt5Widgets-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145078" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145079" version="1" comment="libQt5Xml-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145080" version="1" comment="libQt5Xml5 is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145081" version="1" comment="libqt5-qtbase-common-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145082" version="1" comment="libqt5-qtbase-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145083" version="1" comment="libqt5-qtbase-doc is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145084" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.3.2-1.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108652" version="1" comment="libXfont-devel is &lt;1.4.7-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145085" version="1" comment="libXi-devel is &lt;1.7.4-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108422" version="1" comment="libarchive-devel is &lt;3.1.2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106095" version="1" comment="libasm-devel is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106098" version="1" comment="libdw-devel is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106101" version="1" comment="libebl-devel is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106104" version="1" comment="libelf-devel is &lt;0.158-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145086" version="1" comment="libblkid-devel is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145087" version="1" comment="libmount-devel is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145088" version="1" comment="libsmartcols-devel is &lt;2.25-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145089" version="1" comment="libbz2-devel is &lt;1.0.6-27.886" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145090" version="1" comment="libcgroup-devel is &lt;0.41.rc1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145091" version="1" comment="libcolord-devel is &lt;1.1.7-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145092" version="1" comment="typelib-1_0-ColorHug-1_0 is &lt;1.1.7-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145093" version="1" comment="typelib-1_0-Colord-1_0 is &lt;1.1.7-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110170" version="1" comment="libcurl-devel is &lt;7.37.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145094" version="1" comment="libdcerpc-atsvc-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145095" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145096" version="1" comment="libdcerpc-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145097" version="1" comment="libdcerpc-samr-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145098" version="1" comment="libdcerpc-samr0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145099" version="1" comment="libgensec-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145100" version="1" comment="libndr-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145101" version="1" comment="libndr-krb5pac-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145102" version="1" comment="libndr-nbt-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145103" version="1" comment="libndr-standard-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145104" version="1" comment="libnetapi-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145105" version="1" comment="libregistry-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145106" version="1" comment="libsamba-credentials-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145107" version="1" comment="libsamba-hostconfig-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145108" version="1" comment="libsamba-passdb-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145109" version="1" comment="libsamba-policy-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145110" version="1" comment="libsamba-policy0 is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145111" version="1" comment="libsamba-util-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145112" version="1" comment="libsamdb-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145113" version="1" comment="libsmbclient-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145114" version="1" comment="libsmbclient-raw-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145115" version="1" comment="libsmbconf-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145116" version="1" comment="libsmbldap-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145117" version="1" comment="libtevent-util-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145118" version="1" comment="libwbclient-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145119" version="1" comment="samba-core-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145120" version="1" comment="samba-test-devel is &lt;4.2.4-4.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145121" version="1" comment="libgadu-devel is &lt;1.11.4-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145122" version="1" comment="libgadu3 is &lt;1.11.4-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114241" version="1" comment="libgcrypt-devel is &lt;1.6.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114254" version="1" comment="libgnutls-devel is &lt;3.2.15-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114256" version="1" comment="libgnutls-openssl-devel is &lt;3.2.15-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114260" version="1" comment="libgnutlsxx-devel is &lt;3.2.15-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114261" version="1" comment="libgnutlsxx28 is &lt;3.2.15-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145123" version="1" comment="libgudev-1_0-devel is &lt;210-83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145124" version="1" comment="libudev-devel is &lt;210-83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145125" version="1" comment="systemd-devel is &lt;210-83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145126" version="1" comment="typelib-1_0-GUdev-1_0 is &lt;210-83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145127" version="1" comment="libguestfs-devel is &lt;1.26.10-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145128" version="1" comment="ocaml-libguestfs-devel is &lt;1.26.10-4.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145129" version="1" comment="libgypsy-devel is &lt;0.9-6.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107569" version="1" comment="libicu-devel is &lt;52.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145130" version="1" comment="libipa_hbac-devel is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145131" version="1" comment="libsss_idmap-devel is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145132" version="1" comment="libsss_nss_idmap-devel is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145133" version="1" comment="libsss_nss_idmap0 is &lt;1.11.5.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106109" version="1" comment="libjasper-devel is &lt;1.900.1-170.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145134" version="1" comment="libjavascriptcoregtk-1_0-0 is &lt;2.2.7-3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145135" version="1" comment="libwebkit2gtk-3_0-25 is &lt;2.2.7-3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145136" version="1" comment="libwebkitgtk-1_0-0 is &lt;2.2.7-3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145137" version="1" comment="libwebkitgtk-devel is &lt;2.2.7-3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145138" version="1" comment="libwebkitgtk3-devel is &lt;2.2.7-3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145139" version="1" comment="typelib-1_0-JavaScriptCore-1_0 is &lt;2.2.7-3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145140" version="1" comment="typelib-1_0-JavaScriptCore-3_0 is &lt;2.2.7-3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145141" version="1" comment="typelib-1_0-WebKit-1_0 is &lt;2.2.7-3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145142" version="1" comment="typelib-1_0-WebKit-3_0 is &lt;2.2.7-3.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145143" version="1" comment="libjbig-devel is &lt;2.0-12.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105090" version="1" comment="libjpeg62-devel is &lt;62.1.0-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105084" version="1" comment="libjpeg8-devel is &lt;8.0.2-30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105093" version="1" comment="libksba-devel is &lt;1.3.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107708" version="1" comment="libmspack-devel is &lt;0.4-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145144" version="1" comment="libmysqlclient-devel is &lt;10.0.21-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145145" version="1" comment="libmysqld-devel is &lt;10.0.21-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145146" version="1" comment="libmysqld18 is &lt;10.0.21-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145147" version="1" comment="libopenssl-devel is &lt;1.0.1i-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145148" version="1" comment="libpacemaker-devel is &lt;1.1.13-10.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145149" version="1" comment="pacemaker-cts is &lt;1.1.13-10.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145150" version="1" comment="libpcp-devel is &lt;3.6.10-4.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145151" version="1" comment="libpcp3 is &lt;3.6.10-4.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145152" version="1" comment="pcp is &lt;3.6.10-4.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145153" version="1" comment="pcp-import-iostat2pcp is &lt;3.6.10-4.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145154" version="1" comment="pcp-import-mrtg2pcp is &lt;3.6.10-4.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145155" version="1" comment="pcp-import-sar2pcp is &lt;3.6.10-4.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145156" version="1" comment="pcp-import-sheet2pcp is &lt;3.6.10-4.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145157" version="1" comment="perl-PCP-LogImport is &lt;3.6.10-4.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145158" version="1" comment="perl-PCP-LogSummary is &lt;3.6.10-4.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145159" version="1" comment="perl-PCP-MMV is &lt;3.6.10-4.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145160" version="1" comment="perl-PCP-PMDA is &lt;3.6.10-4.97" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105440" version="1" comment="libpng16-compat-devel is &lt;1.6.8-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105442" version="1" comment="libpng16-devel is &lt;1.6.8-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145161" version="1" comment="libpoppler-devel is &lt;0.24.4-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145162" version="1" comment="libpoppler-glib-devel is &lt;0.24.4-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145163" version="1" comment="libpoppler-qt4-devel is &lt;0.24.4-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145164" version="1" comment="typelib-1_0-Poppler-0_18 is &lt;0.24.4-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113432" version="1" comment="libqt4-devel is &lt;4.8.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113420" version="1" comment="libqt4-devel-doc is &lt;4.8.6-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113421" version="1" comment="libqt4-devel-doc-data is &lt;4.8.6-4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113433" version="1" comment="libqt4-linguist is &lt;4.8.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113434" version="1" comment="libqt4-private-headers-devel is &lt;4.8.6-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145165" version="1" comment="libraw-devel is &lt;0.15.4-3.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145166" version="1" comment="libraw-devel-static is &lt;0.15.4-3.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145167" version="1" comment="libraw9 is &lt;0.15.4-3.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145168" version="1" comment="libserf-1-1 is &lt;1.3.7-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105599" version="1" comment="libsndfile-devel is &lt;1.0.25-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145169" version="1" comment="libspice-server-devel is &lt;0.12.5-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114955" version="1" comment="libssh-devel is &lt;0.6.3-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114956" version="1" comment="libssh-devel-doc is &lt;0.6.3-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108427" version="1" comment="libssh2-devel is &lt;1.4.3-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113993" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.8.10-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113994" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.8.10-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113995" version="1" comment="subversion is &lt;1.8.10-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113996" version="1" comment="subversion-bash-completion is &lt;1.8.10-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113997" version="1" comment="subversion-devel is &lt;1.8.10-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113998" version="1" comment="subversion-perl is &lt;1.8.10-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113999" version="1" comment="subversion-python is &lt;1.8.10-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114001" version="1" comment="subversion-server is &lt;1.8.10-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114002" version="1" comment="subversion-tools is &lt;1.8.10-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109695" version="1" comment="libtasn1-devel is &lt;3.7-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114232" version="1" comment="libtidy-0_99-0 is &lt;1.0.20100204cvs-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114233" version="1" comment="libtidy-0_99-0-devel is &lt;1.0.20100204cvs-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114234" version="1" comment="tidy is &lt;1.0.20100204cvs-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114058" version="1" comment="libtiff-devel is &lt;4.0.4-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115563" version="1" comment="libvdpau-devel is &lt;0.8-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145170" version="1" comment="libvirt-devel is &lt;1.2.18.1-4.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145171" version="1" comment="libvorbis-devel is &lt;1.3.3-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114122" version="1" comment="libwmf-devel is &lt;0.2.8.4-242.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114123" version="1" comment="libwmf-gnome is &lt;0.2.8.4-242.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108094" version="1" comment="libxerces-c-devel is &lt;3.1.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103734" version="1" comment="libxml2-devel is &lt;2.9.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145172" version="1" comment="libyaml-devel is &lt;0.1.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145173" version="1" comment="libzip-devel is &lt;0.11.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114238" version="1" comment="zeromq-devel is &lt;4.0.4-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109222" version="1" comment="mercurial is &lt;2.8.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116017" version="1" comment="mozilla-nspr-devel is &lt;4.10.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116031" version="1" comment="mozilla-nss-devel is &lt;3.19.2.1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105817" version="1" comment="mpfr-devel is &lt;3.1.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145174" version="1" comment="net-snmp-devel is &lt;5.7.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145175" version="1" comment="openldap2-back-perl is &lt;2.4.41-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145176" version="1" comment="openslp-devel is &lt;2.0.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145177" version="1" comment="osc is &lt;0.152.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145178" version="1" comment="pam-devel is &lt;1.1.8-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145179" version="1" comment="pango-devel is &lt;1.36.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145180" version="1" comment="php5-devel is &lt;5.5.14-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115374" version="1" comment="polkit-devel is &lt;0.113-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145181" version="1" comment="postgresql94-devel is &lt;9.4.5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145182" version="1" comment="python3-devel is &lt;3.4.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105407" version="1" comment="rpm-devel is &lt;4.11.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105410" version="1" comment="ruby2.1-devel is &lt;2.1.2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145183" version="1" comment="ruby2.1-rubygem-bundler is &lt;1.7.3-3.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145184" version="1" comment="spice-gtk-devel is &lt;0.29-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145185" version="1" comment="typelib-1_0-SpiceClientGtk-2_0 is &lt;0.29-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145186" version="1" comment="systemtap-sdt-devel is &lt;2.5-4.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114952" version="1" comment="wireshark-devel is &lt;1.12.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145187" version="1" comment="xalan-j2-demo is &lt;2.7.0-264.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145188" version="1" comment="xalan-j2-manual is &lt;2.7.0-264.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145189" version="1" comment="xen-devel is &lt;4.5.1_12-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145190" version="1" comment="xorg-x11-devel is &lt;7.6-45.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145191" version="1" comment="xorg-x11-server-sdk is &lt;7.6_1.15.2-36.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145192" version="1" comment="yast2-core-devel is &lt;3.1.18-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145193" version="1" comment="yast2-devel-doc is &lt;3.1.155-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145194" version="1" comment="DirectFB-devel is &lt;1.7.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145195" version="1" comment="lib++dfb-devel is &lt;1.7.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135224" version="1" comment="sle-sdk-release is ==12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131744" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131745" version="1" comment="libMagick++-devel is &lt;6.8.8.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131746" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119325" version="1" comment="LibVNCServer-devel is &lt;0.9.9-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131809" version="1" comment="MozillaFirefox-devel is &lt;45.4.0esr-81.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145196" version="1" comment="NetworkManager-devel is &lt;1.0.12-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145197" version="1" comment="aaa_base-malloccheck is &lt;13.2+git20140911.61c1681-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145198" version="1" comment="accountsservice-devel is &lt;0.6.42-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145199" version="1" comment="apache2-devel is &lt;2.4.23-14.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145200" version="1" comment="augeas-devel is &lt;1.2.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145201" version="1" comment="avahi-compat-howl-devel is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145202" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145203" version="1" comment="libavahi-devel is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145204" version="1" comment="libhowl0 is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145205" version="1" comment="python-avahi is &lt;0.6.32-30.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145206" version="1" comment="bash-devel is &lt;4.3-78.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145207" version="1" comment="readline-devel is &lt;6.3-78.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131806" version="1" comment="bind-devel is &lt;9.9.9P1-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145208" version="1" comment="binutils-devel is &lt;2.26.1-9.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145209" version="1" comment="binutils-gold is &lt;2.26.1-9.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145210" version="1" comment="cross-ppc-binutils is &lt;2.26.1-9.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145211" version="1" comment="cross-spu-binutils is &lt;2.26.1-9.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124479" version="1" comment="bsh2 is &lt;2.0.0.b5-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124480" version="1" comment="bsh2-classgen is &lt;2.0.0.b5-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124481" version="1" comment="bsh2-javadoc is &lt;2.0.0.b5-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145212" version="1" comment="cifs-utils-devel is &lt;6.5-8.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131751" version="1" comment="cracklib-devel is &lt;2.9.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145213" version="1" comment="cups-ddk is &lt;1.7.5-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145214" version="1" comment="cups-devel is &lt;1.7.5-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145215" version="1" comment="dbus-1-devel is &lt;1.8.16-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145216" version="1" comment="dbus-1-devel-doc is &lt;1.8.16-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130041" version="1" comment="dhcp-devel is &lt;4.3.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145217" version="1" comment="eog-devel is &lt;3.20.4-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145218" version="1" comment="evince-devel is &lt;3.20.1-5.66" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145219" version="1" comment="finch-devel is &lt;2.11.0-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145220" version="1" comment="libpurple-devel is &lt;2.11.0-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145221" version="1" comment="pidgin-devel is &lt;2.11.0-12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145222" version="1" comment="flac-devel is &lt;1.3.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131797" version="1" comment="libQtWebKit-devel is &lt;4.8.6+2.3.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131798" version="1" comment="libbonobo-devel is &lt;2.32.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131799" version="1" comment="libnetpbm-devel is &lt;10.66.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130943" version="1" comment="mdbtools is &lt;0.7-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131801" version="1" comment="sgmltool is &lt;1.0.9-1075.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145223" version="1" comment="fontconfig-devel is &lt;2.11.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145224" version="1" comment="freerdp-devel is &lt;2.0.0~git.1463131968.4e66df7-11.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145225" version="1" comment="freetype2-devel is &lt;2.6.3-7.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145226" version="1" comment="gcc48-ada is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145227" version="1" comment="gcc48-fortran is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145228" version="1" comment="gcc48-java is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145229" version="1" comment="gcc48-obj-c++ is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145230" version="1" comment="gcc48-objc is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145231" version="1" comment="gcc48-objc-32bit is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145232" version="1" comment="libada48 is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145233" version="1" comment="libffi48-devel is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145234" version="1" comment="libgcj48-devel is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145235" version="1" comment="libobjc4 is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145236" version="1" comment="libobjc4-32bit is &lt;4.8.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131765" version="1" comment="gd-devel is &lt;2.1.0-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145237" version="1" comment="gdk-pixbuf-devel is &lt;2.34.0-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145238" version="1" comment="gdm-devel is &lt;3.10.0.1-52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125327" version="1" comment="ghostscript-devel is &lt;9.15-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126713" version="1" comment="giflib-devel is &lt;5.0.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145239" version="1" comment="gimp-devel is &lt;2.8.18-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124818" version="1" comment="git is &lt;1.8.5.6-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124819" version="1" comment="git-arch is &lt;1.8.5.6-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124821" version="1" comment="git-cvs is &lt;1.8.5.6-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124822" version="1" comment="git-daemon is &lt;1.8.5.6-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124823" version="1" comment="git-email is &lt;1.8.5.6-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124824" version="1" comment="git-gui is &lt;1.8.5.6-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124825" version="1" comment="git-svn is &lt;1.8.5.6-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124826" version="1" comment="git-web is &lt;1.8.5.6-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124827" version="1" comment="gitk is &lt;1.8.5.6-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145240" version="1" comment="glib2-devel is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145241" version="1" comment="glib2-devel-static is &lt;2.48.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145242" version="1" comment="glibc-devel-static is &lt;2.22-49.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145243" version="1" comment="gnome-online-accounts-devel is &lt;3.20.4-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145244" version="1" comment="gnome-settings-daemon-devel is &lt;3.20.1-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145245" version="1" comment="gnome-shell-devel is &lt;3.20.4-70.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124736" version="1" comment="graphite2-devel is &lt;1.3.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145246" version="1" comment="gstreamer-0_10-plugins-bad-devel is &lt;0.10.23-20.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145247" version="1" comment="gtk2-devel is &lt;2.24.31-7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131660" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.50-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128389" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr3.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145248" version="1" comment="kernel-docs is &lt;4.4.21-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145249" version="1" comment="kernel-obs-build is &lt;4.4.21-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145250" version="1" comment="krb5-devel is &lt;1.12.5-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126434" version="1" comment="lhasa-devel is &lt;0.2.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145251" version="1" comment="libQt5Bootstrap-devel-static is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145252" version="1" comment="libQt5Concurrent-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145253" version="1" comment="libQt5Core-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145254" version="1" comment="libQt5Core-private-headers-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145255" version="1" comment="libQt5DBus-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145256" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145257" version="1" comment="libQt5Gui-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145258" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145259" version="1" comment="libQt5Network-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145260" version="1" comment="libQt5Network-private-headers-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145261" version="1" comment="libQt5OpenGL-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145262" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145263" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145264" version="1" comment="libQt5PlatformHeaders-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145265" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145266" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145267" version="1" comment="libQt5PrintSupport-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145268" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145269" version="1" comment="libQt5Sql-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145270" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145271" version="1" comment="libQt5Test-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145272" version="1" comment="libQt5Test-private-headers-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145273" version="1" comment="libQt5Widgets-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145274" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145275" version="1" comment="libQt5Xml-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145276" version="1" comment="libqt5-qtbase-common-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145277" version="1" comment="libqt5-qtbase-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145278" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.6.1-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145279" version="1" comment="libQt5WebKit-private-headers-devel is &lt;5.6.1-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145280" version="1" comment="libQt5WebKit5-devel is &lt;5.6.1-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145281" version="1" comment="libQt5WebKitWidgets-devel is &lt;5.6.1-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145282" version="1" comment="libQt5WebKitWidgets-private-headers-devel is &lt;5.6.1-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145283" version="1" comment="libXfont-devel is &lt;1.5.1-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145284" version="1" comment="libXrandr-devel is &lt;1.5.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130725" version="1" comment="libarchive-devel is &lt;3.1.2-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145285" version="1" comment="libblkid-devel is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145286" version="1" comment="libmount-devel is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145287" version="1" comment="libsmartcols-devel is &lt;2.28-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145288" version="1" comment="libbz2-devel is &lt;1.0.6-29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145289" version="1" comment="libcolord-devel is &lt;1.3.3-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145290" version="1" comment="libcolord-gtk-devel is &lt;0.1.26-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145291" version="1" comment="typelib-1_0-ColorHug-1_0 is &lt;1.3.3-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145292" version="1" comment="typelib-1_0-Colord-1_0 is &lt;1.3.3-10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145293" version="1" comment="typelib-1_0-ColordGtk-1_0 is &lt;0.1.26-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131794" version="1" comment="libcurl-devel is &lt;7.37.0-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128469" version="1" comment="libexpat-devel is &lt;2.1.0-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131795" version="1" comment="libgcrypt-devel is &lt;1.6.1-16.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145294" version="1" comment="libgnomesu-devel is &lt;2.0.0-353.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145295" version="1" comment="libguestfs-devel is &lt;1.32.4-14.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145296" version="1" comment="ocaml-libguestfs-devel is &lt;1.32.4-14.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131747" version="1" comment="libidn-devel is &lt;1.28-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145297" version="1" comment="libimobiledevice-devel is &lt;1.2.0-7.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145298" version="1" comment="libipa_hbac-devel is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145299" version="1" comment="libsss_idmap-devel is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145300" version="1" comment="libsss_nss_idmap-devel is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145301" version="1" comment="libsss_nss_idmap0 is &lt;1.13.4-18.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145302" version="1" comment="libwebkitgtk-devel is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145303" version="1" comment="libwebkitgtk3-devel is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145304" version="1" comment="typelib-1_0-JavaScriptCore-1_0 is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145305" version="1" comment="typelib-1_0-WebKit-1_0 is &lt;2.4.11-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128470" version="1" comment="libksba-devel is &lt;1.3.0-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145306" version="1" comment="libldb-devel is &lt;1.1.26-10.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145307" version="1" comment="pyldb is &lt;1.1.26-10.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145308" version="1" comment="pyldb-devel is &lt;1.1.26-10.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118766" version="1" comment="libmspack-devel is &lt;0.4-14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131803" version="1" comment="libmysqlclient-devel is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131804" version="1" comment="libmysqld-devel is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131805" version="1" comment="libmysqld18 is &lt;10.0.27-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123021" version="1" comment="libnettle-devel is &lt;2.7.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124482" version="1" comment="libotr-devel is &lt;4.0.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145309" version="1" comment="libpacemaker-devel is &lt;1.1.15-19.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145310" version="1" comment="pacemaker-cts is &lt;1.1.15-19.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119234" version="1" comment="libpng12-compat-devel is &lt;1.2.50-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119235" version="1" comment="libpng12-devel is &lt;1.2.50-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119236" version="1" comment="libpng16-compat-devel is &lt;1.6.8-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119237" version="1" comment="libpng16-devel is &lt;1.6.8-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145311" version="1" comment="libpoppler-cpp0 is &lt;0.43.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145312" version="1" comment="libpoppler-devel is &lt;0.43.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145313" version="1" comment="libpoppler-glib-devel is &lt;0.43.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145314" version="1" comment="libpoppler-qt4-devel is &lt;0.43.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145315" version="1" comment="typelib-1_0-Poppler-0_18 is &lt;0.43.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145316" version="1" comment="libproxy-devel is &lt;0.4.13-16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125285" version="1" comment="libqt4-devel is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125286" version="1" comment="libqt4-devel-doc is &lt;4.8.6-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125287" version="1" comment="libqt4-devel-doc-data is &lt;4.8.6-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125288" version="1" comment="libqt4-linguist is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125289" version="1" comment="libqt4-private-headers-devel is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130949" version="1" comment="libreoffice-sdk is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145317" version="1" comment="librsvg-devel is &lt;2.40.15-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145318" version="1" comment="typelib-1_0-Rsvg-2_0 is &lt;2.40.15-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145319" version="1" comment="libsmbclient-devel is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145320" version="1" comment="libwbclient-devel is &lt;4.4.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119287" version="1" comment="libsndfile-devel is &lt;1.0.25-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145321" version="1" comment="libsoup-devel is &lt;2.54.1-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145322" version="1" comment="libspice-server-devel is &lt;0.12.7-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123873" version="1" comment="libssh-devel is &lt;0.6.3-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123874" version="1" comment="libssh-devel-doc is &lt;0.6.3-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145323" version="1" comment="libssh2-devel is &lt;1.4.3-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145324" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.8.10-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145325" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.8.10-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145326" version="1" comment="subversion is &lt;1.8.10-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145327" version="1" comment="subversion-bash-completion is &lt;1.8.10-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145328" version="1" comment="subversion-devel is &lt;1.8.10-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145329" version="1" comment="subversion-perl is &lt;1.8.10-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145330" version="1" comment="subversion-python is &lt;1.8.10-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145331" version="1" comment="subversion-server is &lt;1.8.10-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145332" version="1" comment="subversion-tools is &lt;1.8.10-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128912" version="1" comment="libtasn1-devel is &lt;3.7-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131760" version="1" comment="libtcnative-1-0-devel is &lt;1.1.32-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131764" version="1" comment="libtiff-devel is &lt;4.0.6-26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145333" version="1" comment="libudev-devel is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145334" version="1" comment="systemd-devel is &lt;228-117.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145335" version="1" comment="libusbmuxd-devel is &lt;1.0.10-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145336" version="1" comment="libvdpau-devel is &lt;1.1.1-6.73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145337" version="1" comment="libvirt-devel is &lt;2.0.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114125" version="1" comment="libwmf-tools is &lt;0.2.8.4-242.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145338" version="1" comment="libxcb-composite0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145339" version="1" comment="libxcb-damage0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145340" version="1" comment="libxcb-devel is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145341" version="1" comment="libxcb-devel-doc is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145342" version="1" comment="libxcb-dpms0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145343" version="1" comment="libxcb-record0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145344" version="1" comment="libxcb-res0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145345" version="1" comment="libxcb-screensaver0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145346" version="1" comment="libxcb-xevie0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145347" version="1" comment="libxcb-xprint0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145348" version="1" comment="libxcb-xtest0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145349" version="1" comment="libxcb-xvmc0 is &lt;1.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131754" version="1" comment="libxerces-c-devel is &lt;3.1.1-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145350" version="1" comment="libxml2-devel is &lt;2.9.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145351" version="1" comment="libzip-devel is &lt;0.11.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145352" version="1" comment="zeromq-devel is &lt;4.0.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128191" version="1" comment="mercurial is &lt;2.8.2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129305" version="1" comment="mozilla-nspr-devel is &lt;4.12-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129306" version="1" comment="mozilla-nss-devel is &lt;3.21.1-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109976" version="1" comment="mysql-connector-java is &lt;5.1.35-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145353" version="1" comment="ocaml is &lt;4.03.0-6.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145354" version="1" comment="ocaml-compiler-libs is &lt;4.03.0-6.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145355" version="1" comment="ocaml-rpm-macros is &lt;4.03.0-6.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145356" version="1" comment="ocaml-runtime is &lt;4.03.0-6.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145357" version="1" comment="openldap2-back-perl is &lt;2.4.41-18.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145358" version="1" comment="openldap2-devel is &lt;2.4.41-18.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145359" version="1" comment="openldap2-devel-static is &lt;2.4.41-18.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131800" version="1" comment="openslp-devel is &lt;2.0.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145360" version="1" comment="pango-devel is &lt;1.40.1-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131807" version="1" comment="php5-devel is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131811" version="1" comment="php7-devel is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145361" version="1" comment="polkit-devel is &lt;0.113-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131808" version="1" comment="postgresql94-devel is &lt;9.4.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128393" version="1" comment="quagga-devel is &lt;0.99.22.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145362" version="1" comment="rhythmbox-devel is &lt;3.4-6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145363" version="1" comment="rpm-devel is &lt;4.11.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145364" version="1" comment="ruby2.1-devel is &lt;2.1.2-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131793" version="1" comment="samba-test-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145365" version="1" comment="spice-gtk-devel is &lt;0.31-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145366" version="1" comment="typelib-1_0-SpiceClientGtk-2_0 is &lt;0.31-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130778" version="1" comment="sqlite3-devel is &lt;3.8.10.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145367" version="1" comment="sudo-devel is &lt;1.8.10p3-6.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145368" version="1" comment="systemtap-sdt-devel is &lt;3.0-7.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145369" version="1" comment="unixODBC-devel is &lt;2.3.4-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145370" version="1" comment="vte2-devel is &lt;0.28.2-19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145371" version="1" comment="webkit2gtk3-devel is &lt;2.12.5-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131810" version="1" comment="wireshark-devel is &lt;1.12.13-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145372" version="1" comment="xen-devel is &lt;4.7.0_12-23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145373" version="1" comment="xfsprogs-devel is &lt;4.3.0-8.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145374" version="1" comment="xorg-x11-server-sdk is &lt;7.6_1.18.3-57.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145375" version="1" comment="yast2-core-devel is &lt;3.1.23-6.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117478" version="1" comment="sle-we-release is ==12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118890" version="1" comment="sle-we-release is ==12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136016" version="1" comment="sle-we-release is ==12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144630" version="1" comment="libreoffice-l10n-bg is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144631" version="1" comment="libreoffice-l10n-hr is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144632" version="1" comment="libreoffice-l10n-lt is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144633" version="1" comment="libreoffice-l10n-uk is &lt;5.1.5.2-29.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103563" version="1" comment="libreoffice is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103653" version="1" comment="libreoffice-sdk is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117415" version="1" comment="sle-bsk-release is ==12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102212" version="1" comment="libreoffice is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102302" version="1" comment="libreoffice-sdk is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107603" version="1" comment="cups is &lt;1.7.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107605" version="1" comment="cups-ddk is &lt;1.7.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107854" version="1" comment="kernel-zfcpdump is &lt;3.12.38-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108390" version="1" comment="kernel-zfcpdump is &lt;3.12.39-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105335" version="1" comment="kernel-zfcpdump is &lt;3.12.32-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110317" version="1" comment="cups-ddk is &lt;1.7.5-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110528" version="1" comment="kernel-zfcpdump is &lt;3.12.43-52.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111355" version="1" comment="krb5-mini is &lt;1.12.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111356" version="1" comment="krb5-mini-devel is &lt;1.12.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111593" version="1" comment="kernel-zfcpdump is &lt;3.12.44-52.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113199" version="1" comment="python-Jinja2 is &lt;2.7.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105766" version="1" comment="kernel-zfcpdump is &lt;3.12.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114119" version="1" comment="libwmf is &lt;0.2.8.4-242.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114453" version="1" comment="kernel-zfcpdump is &lt;3.12.44-52.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115006" version="1" comment="kernel-zfcpdump is &lt;3.12.48-52.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106082" version="1" comment="krb5-mini is &lt;1.12.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106083" version="1" comment="krb5-mini-devel is &lt;1.12.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115939" version="1" comment="krb5-mini is &lt;1.12.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115940" version="1" comment="krb5-mini-devel is &lt;1.12.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115575" version="1" comment="flute is &lt;1.3.0-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115590" version="1" comment="libbase is &lt;1.1.3-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115611" version="1" comment="libfonts is &lt;1.1.3-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115613" version="1" comment="libformula is &lt;1.1.3-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115632" version="1" comment="liblayout is &lt;0.2.10-4.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115634" version="1" comment="libloader is &lt;1.1.3-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115752" version="1" comment="libreoffice-sdk is &lt;5.0.2.2-13.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115756" version="1" comment="librepository is &lt;1.1.3-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115758" version="1" comment="librevenge is &lt;0.0.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115760" version="1" comment="librevenge-devel is &lt;0.0.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115762" version="1" comment="librevenge-generators-0_0-0 is &lt;0.0.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115764" version="1" comment="libserializer is &lt;1.1.2-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115781" version="1" comment="mdds is &lt;0.12.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115782" version="1" comment="mdds-devel is &lt;0.12.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115925" version="1" comment="pentaho-libxml is &lt;1.1.3-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115927" version="1" comment="pentaho-reporting-flow-engine is &lt;0.9.4-4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115929" version="1" comment="sac is &lt;1.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106173" version="1" comment="perl-Capture-Tiny is &lt;0.23-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118154" version="1" comment="kernel-zfcpdump is &lt;3.12.51-52.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118556" version="1" comment="krb5-mini is &lt;1.12.1-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118557" version="1" comment="krb5-mini-devel is &lt;1.12.1-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119006" version="1" comment="python-tdb is &lt;1.3.8-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119007" version="1" comment="python-tevent is &lt;0.9.26-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119008" version="1" comment="tdb is &lt;1.3.8-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119009" version="1" comment="tevent is &lt;0.9.26-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129267" version="1" comment="kernel-zfcpdump is &lt;3.12.60-52.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129383" version="1" comment="kernel-zfcpdump is &lt;3.12.60-52.54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129446" version="1" comment="libreoffice is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129447" version="1" comment="libreoffice-sdk is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121130" version="1" comment="kernel-zfcpdump is &lt;3.12.51-52.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121621" version="1" comment="kernel-zfcpdump is &lt;3.12.51-52.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122485" version="1" comment="krb5-mini is &lt;1.12.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122486" version="1" comment="krb5-mini-devel is &lt;1.12.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124799" version="1" comment="kernel-zfcpdump is &lt;3.12.55-52.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125319" version="1" comment="ghostscript-mini is &lt;9.15-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125320" version="1" comment="ghostscript-mini-devel is &lt;9.15-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125667" version="1" comment="go is &lt;1.5.3-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125668" version="1" comment="go-doc is &lt;1.5.3-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125711" version="1" comment="gcc5-go is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125712" version="1" comment="libgo7 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125713" version="1" comment="krb5-mini is &lt;1.12.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125714" version="1" comment="krb5-mini-devel is &lt;1.12.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126706" version="1" comment="go is &lt;1.5.4-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126707" version="1" comment="go-doc is &lt;1.5.4-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127131" version="1" comment="go is &lt;1.6.1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127132" version="1" comment="go-doc is &lt;1.6.1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127705" version="1" comment="libudev-mini-devel is &lt;210-70.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127706" version="1" comment="libudev-mini1 is &lt;210-70.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127707" version="1" comment="systemd-mini is &lt;210-70.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127708" version="1" comment="systemd-mini-devel is &lt;210-70.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127709" version="1" comment="udev-mini is &lt;210-70.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128636" version="1" comment="libpoppler-cpp0 is &lt;0.24.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128637" version="1" comment="poppler is &lt;0.24.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128890" version="1" comment="kernel-zfcpdump is &lt;3.12.55-52.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118982" version="1" comment="kernel-zfcpdump is &lt;3.12.51-60.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118772" version="1" comment="sle-bsk-release is ==12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119010" version="1" comment="python-tdb is &lt;1.3.8-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119011" version="1" comment="python-tevent is &lt;0.9.26-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119012" version="1" comment="tdb is &lt;1.3.8-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119013" version="1" comment="tevent is &lt;0.9.26-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129343" version="1" comment="kernel-zfcpdump is &lt;3.12.59-60.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129384" version="1" comment="kernel-zfcpdump is &lt;3.12.59-60.45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121526" version="1" comment="kernel-zfcpdump is &lt;3.12.51-60.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130929" version="1" comment="kernel-zfcpdump is &lt;3.12.62-60.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130931" version="1" comment="cracklib-dict-small is &lt;2.9.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130932" version="1" comment="krb5-mini is &lt;1.12.1-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130933" version="1" comment="krb5-mini-devel is &lt;1.12.1-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130934" version="1" comment="ocaml is &lt;4.02.3-6.6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130935" version="1" comment="ocaml-ocamldoc is &lt;4.02.3-6.6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130936" version="1" comment="kdelibs4 is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130937" version="1" comment="kdelibs4-branding-upstream is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130938" version="1" comment="kdelibs4-core is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130939" version="1" comment="kdelibs4-doc is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130940" version="1" comment="libkde4-devel is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130941" version="1" comment="libkdecore4-devel is &lt;4.12.0-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130942" version="1" comment="libmdbodbc1 is &lt;0.7-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130944" version="1" comment="mdbtools-devel is &lt;0.7-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130945" version="1" comment="virtuoso is &lt;6.1.6-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130946" version="1" comment="virtuoso-drivers is &lt;6.1.6-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130947" version="1" comment="virtuoso-server is &lt;6.1.6-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130950" version="1" comment="libudev-mini-devel is &lt;210-114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130951" version="1" comment="libudev-mini1 is &lt;210-114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130952" version="1" comment="systemd-mini is &lt;210-114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130953" version="1" comment="systemd-mini-devel is &lt;210-114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130954" version="1" comment="udev-mini is &lt;210-114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130955" version="1" comment="ghostscript-mini is &lt;9.15-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130956" version="1" comment="ghostscript-mini-devel is &lt;9.15-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130957" version="1" comment="kernel-zfcpdump is &lt;3.12.62-60.64.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130958" version="1" comment="ghostscript-mini is &lt;9.15-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130959" version="1" comment="ghostscript-mini-devel is &lt;9.15-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135535" version="1" comment="ghostscript-mini is &lt;9.15-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135536" version="1" comment="ghostscript-mini-devel is &lt;9.15-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135962" version="1" comment="kernel-zfcpdump is &lt;3.12.67-60.64.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136628" version="1" comment="kernel-zfcpdump is &lt;3.12.67-60.64.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143054" version="1" comment="kernel-zfcpdump is &lt;3.12.67-60.64.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123251" version="1" comment="kernel-zfcpdump is &lt;3.12.53-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125715" version="1" comment="kernel-zfcpdump is &lt;3.12.57-60.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127710" version="1" comment="libudev-mini-devel is &lt;210-104.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127711" version="1" comment="libudev-mini1 is &lt;210-104.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127712" version="1" comment="systemd-mini is &lt;210-104.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127713" version="1" comment="systemd-mini-devel is &lt;210-104.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127714" version="1" comment="udev-mini is &lt;210-104.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148394" version="1" comment="kernel-zfcpdump is &lt;3.12.69-60.64.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148657" version="1" comment="kernel-zfcpdump is &lt;3.12.69-60.64.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149121" version="1" comment="lynx is &lt;2.8.7-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146958" version="1" comment="python-Twisted is &lt;15.2.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135537" version="1" comment="sle-bsk-release is ==12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136629" version="1" comment="kernel-zfcpdump is &lt;4.4.21-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142719" version="1" comment="kernel-zfcpdump is &lt;4.4.21-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147618" version="1" comment="libudev-mini-devel is &lt;228-132.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147619" version="1" comment="libudev-mini1 is &lt;228-132.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147620" version="1" comment="systemd-mini is &lt;228-132.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147621" version="1" comment="systemd-mini-devel is &lt;228-132.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147622" version="1" comment="udev-mini is &lt;228-132.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149008" version="1" comment="kernel-zfcpdump is &lt;4.4.49-92.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147203" version="1" comment="kernel-zfcpdump is &lt;4.4.38-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102623" version="1" comment="tigervnc is &lt;1.3.0-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102624" version="1" comment="xorg-x11-Xvnc is &lt;1.3.0-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102886" version="1" comment="gnutls is &lt;3.2.15-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102891" version="1" comment="libgnutls28 is &lt;3.2.15-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102892" version="1" comment="libgnutls28-32bit is &lt;3.2.15-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102895" version="1" comment="flash-player is &lt;11.2.202.425-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102896" version="1" comment="flash-player-gnome is &lt;11.2.202.425-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102940" version="1" comment="mailx is &lt;12.5-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102931" version="1" comment="flac is &lt;1.3.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103131" version="1" comment="ntp is &lt;4.2.6p5-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103132" version="1" comment="ntp-doc is &lt;4.2.6p5-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103128" version="1" comment="openvpn is &lt;2.3.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103545" version="1" comment="dbus-1 is &lt;1.8.12-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103547" version="1" comment="dbus-1-x11 is &lt;1.8.12-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103551" version="1" comment="libdbus-1-3 is &lt;1.8.12-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103552" version="1" comment="libdbus-1-3-32bit is &lt;1.8.12-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103556" version="1" comment="tcpdump is &lt;4.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103657" version="1" comment="libssh is &lt;0.6.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103660" version="1" comment="libssh4 is &lt;0.6.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103564" version="1" comment="libreoffice-base is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103565" version="1" comment="libreoffice-base-drivers-mysql is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103566" version="1" comment="libreoffice-base-drivers-postgresql is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103568" version="1" comment="libreoffice-calc is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103569" version="1" comment="libreoffice-calc-extensions is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103570" version="1" comment="libreoffice-draw is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103571" version="1" comment="libreoffice-filters-optional is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103572" version="1" comment="libreoffice-gnome is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103578" version="1" comment="libreoffice-icon-theme-tango is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103579" version="1" comment="libreoffice-impress is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103581" version="1" comment="libreoffice-l10n-af is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103582" version="1" comment="libreoffice-l10n-ar is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103587" version="1" comment="libreoffice-l10n-ca is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103588" version="1" comment="libreoffice-l10n-cs is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103590" version="1" comment="libreoffice-l10n-da is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103591" version="1" comment="libreoffice-l10n-de is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103594" version="1" comment="libreoffice-l10n-en is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103595" version="1" comment="libreoffice-l10n-es is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103599" version="1" comment="libreoffice-l10n-fi is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103600" version="1" comment="libreoffice-l10n-fr is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103603" version="1" comment="libreoffice-l10n-gu is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103605" version="1" comment="libreoffice-l10n-hi is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103607" version="1" comment="libreoffice-l10n-hu is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103608" version="1" comment="libreoffice-l10n-it is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103609" version="1" comment="libreoffice-l10n-ja is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103612" version="1" comment="libreoffice-l10n-ko is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103618" version="1" comment="libreoffice-l10n-nb is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103619" version="1" comment="libreoffice-l10n-nl is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103620" version="1" comment="libreoffice-l10n-nn is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103625" version="1" comment="libreoffice-l10n-pl is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103626" version="1" comment="libreoffice-l10n-pt-BR is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103627" version="1" comment="libreoffice-l10n-pt-PT is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103629" version="1" comment="libreoffice-l10n-ru is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103631" version="1" comment="libreoffice-l10n-sk is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103636" version="1" comment="libreoffice-l10n-sv is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103645" version="1" comment="libreoffice-l10n-xh is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103646" version="1" comment="libreoffice-l10n-zh-Hans is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103647" version="1" comment="libreoffice-l10n-zh-Hant is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103648" version="1" comment="libreoffice-l10n-zu is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103649" version="1" comment="libreoffice-mailmerge is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103650" version="1" comment="libreoffice-math is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103651" version="1" comment="libreoffice-officebean is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103652" version="1" comment="libreoffice-pyuno is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103655" version="1" comment="libreoffice-writer is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103656" version="1" comment="libreoffice-writer-extensions is &lt;4.3.5.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101424" version="1" comment="flash-player is &lt;11.2.202.411-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101425" version="1" comment="flash-player-gnome is &lt;11.2.202.411-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101430" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.71-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101434" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.71-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101705" version="1" comment="rsyslog is &lt;8.4.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102009" version="1" comment="flash-player is &lt;11.2.202.418-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102010" version="1" comment="flash-player-gnome is &lt;11.2.202.418-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102213" version="1" comment="libreoffice-base is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102214" version="1" comment="libreoffice-base-drivers-mysql is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102215" version="1" comment="libreoffice-base-drivers-postgresql is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102217" version="1" comment="libreoffice-calc is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102218" version="1" comment="libreoffice-calc-extensions is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102219" version="1" comment="libreoffice-draw is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102220" version="1" comment="libreoffice-filters-optional is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102221" version="1" comment="libreoffice-gnome is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102227" version="1" comment="libreoffice-icon-theme-tango is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102228" version="1" comment="libreoffice-impress is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102230" version="1" comment="libreoffice-l10n-af is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102231" version="1" comment="libreoffice-l10n-ar is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102236" version="1" comment="libreoffice-l10n-ca is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102237" version="1" comment="libreoffice-l10n-cs is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102239" version="1" comment="libreoffice-l10n-da is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102240" version="1" comment="libreoffice-l10n-de is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102243" version="1" comment="libreoffice-l10n-en is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102244" version="1" comment="libreoffice-l10n-es is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102248" version="1" comment="libreoffice-l10n-fi is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102249" version="1" comment="libreoffice-l10n-fr is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102252" version="1" comment="libreoffice-l10n-gu is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102254" version="1" comment="libreoffice-l10n-hi is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102256" version="1" comment="libreoffice-l10n-hu is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102257" version="1" comment="libreoffice-l10n-it is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102258" version="1" comment="libreoffice-l10n-ja is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102261" version="1" comment="libreoffice-l10n-ko is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102267" version="1" comment="libreoffice-l10n-nb is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102268" version="1" comment="libreoffice-l10n-nl is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102269" version="1" comment="libreoffice-l10n-nn is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102274" version="1" comment="libreoffice-l10n-pl is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102275" version="1" comment="libreoffice-l10n-pt-BR is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102276" version="1" comment="libreoffice-l10n-pt-PT is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102278" version="1" comment="libreoffice-l10n-ru is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102280" version="1" comment="libreoffice-l10n-sk is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102285" version="1" comment="libreoffice-l10n-sv is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102294" version="1" comment="libreoffice-l10n-xh is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102295" version="1" comment="libreoffice-l10n-zh-Hans is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102296" version="1" comment="libreoffice-l10n-zh-Hant is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102297" version="1" comment="libreoffice-l10n-zu is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102298" version="1" comment="libreoffice-mailmerge is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102299" version="1" comment="libreoffice-math is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102300" version="1" comment="libreoffice-officebean is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102301" version="1" comment="libreoffice-pyuno is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102304" version="1" comment="libreoffice-writer is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102305" version="1" comment="libreoffice-writer-extensions is &lt;4.3.3.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102643" version="1" comment="MozillaFirefox is &lt;31.3.0esr-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102642" version="1" comment="MozillaFirefox-branding-SLE is &lt;31.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102646" version="1" comment="MozillaFirefox-translations is &lt;31.3.0esr-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102647" version="1" comment="libfreebl3 is &lt;3.17.2-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102648" version="1" comment="libfreebl3-32bit is &lt;3.17.2-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102651" version="1" comment="libsoftokn3 is &lt;3.17.2-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102652" version="1" comment="libsoftokn3-32bit is &lt;3.17.2-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102655" version="1" comment="mozilla-nss is &lt;3.17.2-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102656" version="1" comment="mozilla-nss-32bit is &lt;3.17.2-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102657" version="1" comment="mozilla-nss-certs is &lt;3.17.2-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102658" version="1" comment="mozilla-nss-certs-32bit is &lt;3.17.2-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102662" version="1" comment="mozilla-nss-tools is &lt;3.17.2-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102867" version="1" comment="libpython2_7-1_0 is &lt;2.7.7-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102868" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.7-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102875" version="1" comment="python is &lt;2.7.7-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102869" version="1" comment="python-base is &lt;2.7.7-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102877" version="1" comment="python-curses is &lt;2.7.7-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102871" version="1" comment="python-devel is &lt;2.7.7-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102881" version="1" comment="python-tk is &lt;2.7.7-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102872" version="1" comment="python-xml is &lt;2.7.7-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102625" version="1" comment="compat-openssl098 is &lt;0.9.8j-66.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102626" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-66.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102627" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-66.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102665" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102666" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102669" version="1" comment="openssl is &lt;1.0.1i-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102488" version="1" comment="flash-player is &lt;11.2.202.424-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102489" version="1" comment="flash-player-gnome is &lt;11.2.202.424-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102467" version="1" comment="file is &lt;5.19-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102469" version="1" comment="file-magic is &lt;5.19-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102471" version="1" comment="libmagic1 is &lt;5.19-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102470" version="1" comment="libmagic1-32bit is &lt;5.19-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103733" version="1" comment="libxml2 is &lt;2.9.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118566" version="1" comment="xen is &lt;4.4.3_06-22.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118567" version="1" comment="xen-kmp-default is &lt;4.4.3_06_k3.12.48_52.27-22.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118568" version="1" comment="xen-libs is &lt;4.4.3_06-22.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118569" version="1" comment="xen-libs-32bit is &lt;4.4.3_06-22.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119510" version="1" comment="MozillaFirefox is &lt;38.5.0esr-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119511" version="1" comment="MozillaFirefox-translations is &lt;38.5.0esr-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119311" version="1" comment="bind is &lt;9.9.6P1-28.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119312" version="1" comment="bind-libs is &lt;9.9.6P1-28.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119313" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-28.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119314" version="1" comment="bind-utils is &lt;9.9.6P1-28.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118719" version="1" comment="compat-openssl098 is &lt;0.9.8j-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118720" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118721" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106878" version="1" comment="xorg-x11-server is &lt;7.6_1.15.2-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106879" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.15.2-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116182" version="1" comment="xfsprogs is &lt;3.2.1-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119797" version="1" comment="grub2 is &lt;2.02~beta2-56.9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119798" version="1" comment="grub2-i386-pc is &lt;2.02~beta2-56.9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119799" version="1" comment="grub2-snapper-plugin is &lt;2.02~beta2-56.9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119800" version="1" comment="grub2-x86_64-efi is &lt;2.02~beta2-56.9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119801" version="1" comment="grub2-x86_64-xen is &lt;2.02~beta2-56.9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120801" version="1" comment="flash-player is &lt;11.2.202.559-117.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120802" version="1" comment="flash-player-gnome is &lt;11.2.202.559-117.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106933" version="1" comment="MozillaFirefox is &lt;31.5.0esr-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106936" version="1" comment="MozillaFirefox-translations is &lt;31.5.0esr-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107574" version="1" comment="freetype2 is &lt;2.5.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107579" version="1" comment="ft2demos is &lt;2.5.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107577" version="1" comment="libfreetype6 is &lt;2.5.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107578" version="1" comment="libfreetype6-32bit is &lt;2.5.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107604" version="1" comment="cups-client is &lt;1.7.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107607" version="1" comment="cups-libs is &lt;1.7.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107608" version="1" comment="cups-libs-32bit is &lt;1.7.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107616" version="1" comment="libecpg6 is &lt;9.3.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107618" version="1" comment="libpq5 is &lt;9.3.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107617" version="1" comment="libpq5-32bit is &lt;9.3.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107621" version="1" comment="postgresql93 is &lt;9.3.6-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107620" version="1" comment="postgresql93-libs is &lt;9.3.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105078" version="1" comment="unzip is &lt;6.00-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107710" version="1" comment="flash-player is &lt;11.2.202.451-77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107711" version="1" comment="flash-player-gnome is &lt;11.2.202.451-77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107690" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.75-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107694" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.75-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107707" version="1" comment="libmspack is &lt;0.4-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107808" version="1" comment="glibc is &lt;2.19-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107819" version="1" comment="glibc-32bit is &lt;2.19-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107809" version="1" comment="glibc-devel is &lt;2.19-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107820" version="1" comment="glibc-devel-32bit is &lt;2.19-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107813" version="1" comment="glibc-i18ndata is &lt;2.19-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107815" version="1" comment="glibc-locale is &lt;2.19-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107822" version="1" comment="glibc-locale-32bit is &lt;2.19-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107818" version="1" comment="nscd is &lt;2.19-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107833" version="1" comment="kernel-default is &lt;3.12.38-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107835" version="1" comment="kernel-default-devel is &lt;3.12.38-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107836" version="1" comment="kernel-default-extra is &lt;3.12.38-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107825" version="1" comment="kernel-devel is &lt;3.12.38-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107826" version="1" comment="kernel-macros is &lt;3.12.38-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107827" version="1" comment="kernel-source is &lt;3.12.38-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107843" version="1" comment="kernel-syms is &lt;3.12.38-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107846" version="1" comment="kernel-xen is &lt;3.12.38-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107848" version="1" comment="kernel-xen-devel is &lt;3.12.38-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107890" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107891" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107894" version="1" comment="openssl is &lt;1.0.1i-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107968" version="1" comment="compat-openssl098 is &lt;0.9.8j-73.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107969" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-73.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107970" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-73.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108095" version="1" comment="xerces-c is &lt;3.1.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108131" version="1" comment="xen is &lt;4.4.1_10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108137" version="1" comment="xen-kmp-default is &lt;4.4.1_10_k3.12.36_38-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108134" version="1" comment="xen-libs is &lt;4.4.1_10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108133" version="1" comment="xen-libs-32bit is &lt;4.4.1_10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108202" version="1" comment="MozillaFirefox is &lt;31.5.3esr-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108205" version="1" comment="MozillaFirefox-translations is &lt;31.5.3esr-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108358" version="1" comment="wireshark is &lt;1.10.13-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108369" version="1" comment="kernel-default is &lt;3.12.39-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108371" version="1" comment="kernel-default-devel is &lt;3.12.39-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108372" version="1" comment="kernel-default-extra is &lt;3.12.39-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108361" version="1" comment="kernel-devel is &lt;3.12.39-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108362" version="1" comment="kernel-macros is &lt;3.12.39-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108363" version="1" comment="kernel-source is &lt;3.12.39-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108379" version="1" comment="kernel-syms is &lt;3.12.39-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108382" version="1" comment="kernel-xen is &lt;3.12.39-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108384" version="1" comment="kernel-xen-devel is &lt;3.12.39-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108429" version="1" comment="libzip is &lt;0.11.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108431" version="1" comment="libzip2 is &lt;0.11.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108421" version="1" comment="libarchive is &lt;3.1.2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108428" version="1" comment="libssh2_org is &lt;1.4.3-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105092" version="1" comment="libksba is &lt;1.3.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108627" version="1" comment="webkitgtk is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108641" version="1" comment="webkitgtk3 is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108651" version="1" comment="libXfont is &lt;1.4.7-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108656" version="1" comment="xen is &lt;4.4.2_02-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108662" version="1" comment="xen-kmp-default is &lt;4.4.2_02_k3.12.38_44-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108659" version="1" comment="xen-libs is &lt;4.4.2_02-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108658" version="1" comment="xen-libs-32bit is &lt;4.4.2_02-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108664" version="1" comment="MozillaFirefox is &lt;31.6.0esr-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108667" version="1" comment="MozillaFirefox-translations is &lt;31.6.0esr-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108877" version="1" comment="flash-player is &lt;11.2.202.457-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108878" version="1" comment="flash-player-gnome is &lt;11.2.202.457-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108906" version="1" comment="gnutls is &lt;3.2.15-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108911" version="1" comment="libgnutls28 is &lt;3.2.15-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108912" version="1" comment="libgnutls28-32bit is &lt;3.2.15-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108923" version="1" comment="libmysqlclient18 is &lt;10.0.16-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108924" version="1" comment="libmysqlclient18-32bit is &lt;10.0.16-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108925" version="1" comment="libmysqlclient_r18 is &lt;10.0.16-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108926" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.16-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108929" version="1" comment="mariadb is &lt;10.0.16-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108931" version="1" comment="mariadb-client is &lt;10.0.16-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108933" version="1" comment="mariadb-errormessages is &lt;10.0.16-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109136" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.79-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109140" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.79-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109167" version="1" comment="cups-filters is &lt;1.0.58-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109168" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109170" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109171" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109160" version="1" comment="gdm is &lt;3.10.0.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109161" version="1" comment="gdm-branding-upstream is &lt;3.10.0.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109163" version="1" comment="gdm-lang is &lt;3.10.0.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109164" version="1" comment="gdmflexiserver is &lt;3.10.0.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109165" version="1" comment="libgdm1 is &lt;3.10.0.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109166" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.10.0.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105374" version="1" comment="xorg-x11-server is &lt;7.6_1.15.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105375" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.15.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105445" version="1" comment="flash-player is &lt;11.2.202.429-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105446" version="1" comment="flash-player-gnome is &lt;11.2.202.429-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109543" version="1" comment="ntp is &lt;4.2.6p5-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109544" version="1" comment="ntp-doc is &lt;4.2.6p5-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109608" version="1" comment="flash-player is &lt;11.2.202.460-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109609" version="1" comment="flash-player-gnome is &lt;11.2.202.460-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109615" version="1" comment="libspice-server1 is &lt;0.12.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109616" version="1" comment="spice is &lt;0.12.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109666" version="1" comment="qemu is &lt;2.0.2-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109668" version="1" comment="qemu-block-curl is &lt;2.0.2-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109671" version="1" comment="qemu-ipxe is &lt;1.0.0-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109672" version="1" comment="qemu-kvm is &lt;2.0.2-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109676" version="1" comment="qemu-seabios is &lt;1.7.4-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109677" version="1" comment="qemu-sgabios is &lt;8-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109678" version="1" comment="qemu-tools is &lt;2.0.2-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109679" version="1" comment="qemu-vgabios is &lt;1.7.4-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109680" version="1" comment="qemu-x86 is &lt;2.0.2-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109715" version="1" comment="xen is &lt;4.4.2_04-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109721" version="1" comment="xen-kmp-default is &lt;4.4.2_04_k3.12.39_47-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109718" version="1" comment="xen-libs is &lt;4.4.2_04-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109717" version="1" comment="xen-libs-32bit is &lt;4.4.2_04-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105317" version="1" comment="kernel-default is &lt;3.12.32-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105319" version="1" comment="kernel-default-devel is &lt;3.12.32-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105320" version="1" comment="kernel-default-extra is &lt;3.12.32-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105309" version="1" comment="kernel-devel is &lt;3.12.32-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105310" version="1" comment="kernel-macros is &lt;3.12.32-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105311" version="1" comment="kernel-source is &lt;3.12.32-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105327" version="1" comment="kernel-syms is &lt;3.12.32-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105330" version="1" comment="kernel-xen is &lt;3.12.32-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105332" version="1" comment="kernel-xen-devel is &lt;3.12.32-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109833" version="1" comment="fltk is &lt;1.3.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109837" version="1" comment="libfltk1 is &lt;1.3.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109839" version="1" comment="tigervnc is &lt;1.4.1-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109840" version="1" comment="xorg-x11-Xvnc is &lt;1.4.1-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109960" version="1" comment="MozillaFirefox is &lt;31.7.0esr-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109963" version="1" comment="MozillaFirefox-translations is &lt;31.7.0esr-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109991" version="1" comment="dnsmasq is &lt;2.71-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110203" version="1" comment="vorbis-tools is &lt;1.4.0-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110204" version="1" comment="vorbis-tools-lang is &lt;1.4.0-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105448" version="1" comment="MozillaFirefox is &lt;31.4.0esr-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105451" version="1" comment="MozillaFirefox-translations is &lt;31.4.0esr-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105452" version="1" comment="libfreebl3 is &lt;3.17.3-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105453" version="1" comment="libfreebl3-32bit is &lt;3.17.3-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105456" version="1" comment="libsoftokn3 is &lt;3.17.3-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105457" version="1" comment="libsoftokn3-32bit is &lt;3.17.3-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105460" version="1" comment="mozilla-nss is &lt;3.17.3-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105461" version="1" comment="mozilla-nss-32bit is &lt;3.17.3-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105462" version="1" comment="mozilla-nss-certs is &lt;3.17.3-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105463" version="1" comment="mozilla-nss-certs-32bit is &lt;3.17.3-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105467" version="1" comment="mozilla-nss-tools is &lt;3.17.3-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110329" version="1" comment="xen is &lt;4.4.2_06-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110335" version="1" comment="xen-kmp-default is &lt;4.4.2_06_k3.12.39_47-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110332" version="1" comment="xen-libs is &lt;4.4.2_06-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110331" version="1" comment="xen-libs-32bit is &lt;4.4.2_06-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110337" version="1" comment="flash-player is &lt;11.2.202.466-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110338" version="1" comment="flash-player-gnome is &lt;11.2.202.466-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110327" version="1" comment="wireshark is &lt;1.10.14-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110507" version="1" comment="kernel-default is &lt;3.12.43-52.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110509" version="1" comment="kernel-default-devel is &lt;3.12.43-52.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110510" version="1" comment="kernel-default-extra is &lt;3.12.43-52.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110499" version="1" comment="kernel-devel is &lt;3.12.43-52.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110500" version="1" comment="kernel-macros is &lt;3.12.43-52.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110501" version="1" comment="kernel-source is &lt;3.12.43-52.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110517" version="1" comment="kernel-syms is &lt;3.12.43-52.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110520" version="1" comment="kernel-xen is &lt;3.12.43-52.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110522" version="1" comment="kernel-xen-devel is &lt;3.12.43-52.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110560" version="1" comment="libldap-2_4-2 is &lt;2.4.39-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110561" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.39-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110562" version="1" comment="openldap2-client is &lt;2.4.39-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110629" version="1" comment="xorg-x11-server is &lt;7.6_1.15.2-28.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110630" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.15.2-28.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110661" version="1" comment="flash-player is &lt;11.2.202.468-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110662" version="1" comment="flash-player-gnome is &lt;11.2.202.468-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110698" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110699" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110702" version="1" comment="openssl is &lt;1.0.1i-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110759" version="1" comment="compat-openssl098 is &lt;0.9.8j-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110760" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110761" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105415" version="1" comment="curl is &lt;7.37.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105418" version="1" comment="libcurl4 is &lt;7.37.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105417" version="1" comment="libcurl4-32bit is &lt;7.37.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110847" version="1" comment="libgcrypt is &lt;1.6.1-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110851" version="1" comment="libgcrypt20 is &lt;1.6.1-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110852" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111024" version="1" comment="bind is &lt;9.9.6P1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111029" version="1" comment="bind-libs is &lt;9.9.6P1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111028" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111031" version="1" comment="bind-utils is &lt;9.9.6P1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111113" version="1" comment="flash-player is &lt;11.2.202.481-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111114" version="1" comment="flash-player-gnome is &lt;11.2.202.481-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111508" version="1" comment="flash-player is &lt;11.2.202.491-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111509" version="1" comment="flash-player-gnome is &lt;11.2.202.491-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111445" version="1" comment="libecpg6 is &lt;9.3.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111447" version="1" comment="libpq5 is &lt;9.3.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111446" version="1" comment="libpq5-32bit is &lt;9.3.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111450" version="1" comment="postgresql93 is &lt;9.3.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111449" version="1" comment="postgresql93-libs is &lt;9.3.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105437" version="1" comment="libpng16 is &lt;1.6.8-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111472" version="1" comment="MozillaFirefox is &lt;31.8.0esr-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111475" version="1" comment="MozillaFirefox-translations is &lt;31.8.0esr-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111479" version="1" comment="libfreebl3 is &lt;3.19.2_CKBI_1.98-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111480" version="1" comment="libfreebl3-32bit is &lt;3.19.2_CKBI_1.98-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111483" version="1" comment="libsoftokn3 is &lt;3.19.2_CKBI_1.98-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111484" version="1" comment="libsoftokn3-32bit is &lt;3.19.2_CKBI_1.98-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111477" version="1" comment="mozilla-nspr is &lt;4.10.8-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111476" version="1" comment="mozilla-nspr-32bit is &lt;4.10.8-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111487" version="1" comment="mozilla-nss is &lt;3.19.2_CKBI_1.98-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111488" version="1" comment="mozilla-nss-32bit is &lt;3.19.2_CKBI_1.98-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111490" version="1" comment="mozilla-nss-certs is &lt;3.19.2_CKBI_1.98-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111491" version="1" comment="mozilla-nss-certs-32bit is &lt;3.19.2_CKBI_1.98-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111495" version="1" comment="mozilla-nss-tools is &lt;3.19.2_CKBI_1.98-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111459" version="1" comment="libmysqlclient18 is &lt;10.0.20-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111460" version="1" comment="libmysqlclient18-32bit is &lt;10.0.20-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111461" version="1" comment="libmysqlclient_r18 is &lt;10.0.20-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111462" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.20-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111465" version="1" comment="mariadb is &lt;10.0.20-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111467" version="1" comment="mariadb-client is &lt;10.0.20-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111469" version="1" comment="mariadb-errormessages is &lt;10.0.20-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111500" version="1" comment="xen is &lt;4.4.2_08-22.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111506" version="1" comment="xen-kmp-default is &lt;4.4.2_08_k3.12.43_52.6-22.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111503" version="1" comment="xen-libs is &lt;4.4.2_08-22.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111502" version="1" comment="xen-libs-32bit is &lt;4.4.2_08-22.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111511" version="1" comment="bind is &lt;9.9.6P1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111516" version="1" comment="bind-libs is &lt;9.9.6P1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111515" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111518" version="1" comment="bind-utils is &lt;9.9.6P1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111526" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.85-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111530" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.85-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111572" version="1" comment="kernel-default is &lt;3.12.44-52.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111574" version="1" comment="kernel-default-devel is &lt;3.12.44-52.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111575" version="1" comment="kernel-default-extra is &lt;3.12.44-52.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111564" version="1" comment="kernel-devel is &lt;3.12.44-52.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111565" version="1" comment="kernel-macros is &lt;3.12.44-52.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111566" version="1" comment="kernel-source is &lt;3.12.44-52.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111582" version="1" comment="kernel-syms is &lt;3.12.44-52.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111585" version="1" comment="kernel-xen is &lt;3.12.44-52.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111587" version="1" comment="kernel-xen-devel is &lt;3.12.44-52.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105429" version="1" comment="bind is &lt;9.9.5P1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105434" version="1" comment="bind-libs is &lt;9.9.5P1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105433" version="1" comment="bind-libs-32bit is &lt;9.9.5P1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105436" version="1" comment="bind-utils is &lt;9.9.5P1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113266" version="1" comment="libpython2_7-1_0 is &lt;2.7.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113267" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113274" version="1" comment="python is &lt;2.7.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113268" version="1" comment="python-base is &lt;2.7.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113276" version="1" comment="python-curses is &lt;2.7.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113270" version="1" comment="python-devel is &lt;2.7.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113280" version="1" comment="python-tk is &lt;2.7.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113271" version="1" comment="python-xml is &lt;2.7.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113425" version="1" comment="libqt4-sql-plugins is &lt;4.8.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105336" version="1" comment="evolution-data-server is &lt;3.10.4-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105339" version="1" comment="evolution-data-server-lang is &lt;3.10.4-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105340" version="1" comment="libcamel-1_2-45 is &lt;3.10.4-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105341" version="1" comment="libcamel-1_2-45-32bit is &lt;3.10.4-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105342" version="1" comment="libebackend-1_2-7 is &lt;3.10.4-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105343" version="1" comment="libebackend-1_2-7-32bit is &lt;3.10.4-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105344" version="1" comment="libebook-1_2-14 is &lt;3.10.4-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105345" version="1" comment="libebook-1_2-14-32bit is &lt;3.10.4-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105346" version="1" comment="libebook-contacts-1_2-0 is &lt;3.10.4-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105347" version="1" comment="libebook-contacts-1_2-0-32bit is &lt;3.10.4-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105348" version="1" comment="libecal-1_2-16 is &lt;3.10.4-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105349" version="1" comment="libecal-1_2-16-32bit is &lt;3.10.4-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105350" version="1" comment="libedata-book-1_2-20 is &lt;3.10.4-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105351" version="1" comment="libedata-book-1_2-20-32bit is &lt;3.10.4-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105352" version="1" comment="libedata-cal-1_2-23 is &lt;3.10.4-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105353" version="1" comment="libedata-cal-1_2-23-32bit is &lt;3.10.4-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105354" version="1" comment="libedataserver-1_2-18 is &lt;3.10.4-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105355" version="1" comment="libedataserver-1_2-18-32bit is &lt;3.10.4-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113504" version="1" comment="flash-player is &lt;11.2.202.508-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113505" version="1" comment="flash-player-gnome is &lt;11.2.202.508-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113520" version="1" comment="MozillaFirefox is &lt;31.8.0esr-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113523" version="1" comment="MozillaFirefox-translations is &lt;31.8.0esr-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113777" version="1" comment="xen is &lt;4.4.2_10-22.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113783" version="1" comment="xen-kmp-default is &lt;4.4.2_10_k3.12.44_52.10-22.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113780" version="1" comment="xen-libs is &lt;4.4.2_10-22.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113779" version="1" comment="xen-libs-32bit is &lt;4.4.2_10-22.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113667" version="1" comment="libQt5Core5 is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113672" version="1" comment="libQt5DBus5 is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113677" version="1" comment="libQt5Gui5 is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113720" version="1" comment="libQt5Widgets5 is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113725" version="1" comment="libqt5-qtbase is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105070" version="1" comment="libyaml is &lt;0.1.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105069" version="1" comment="libyaml-0-2 is &lt;0.1.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105403" version="1" comment="rpm-python is &lt;4.11.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113856" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-27.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113857" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-27.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113860" version="1" comment="openssl is &lt;1.0.1i-27.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105468" version="1" comment="flash-player is &lt;11.2.202.438-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105469" version="1" comment="flash-player-gnome is &lt;11.2.202.438-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105471" version="1" comment="flash-player is &lt;11.2.202.440-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105472" version="1" comment="flash-player-gnome is &lt;11.2.202.440-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105377" version="1" comment="binutils is &lt;2.24-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105598" version="1" comment="libsndfile is &lt;1.0.25-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114063" version="1" comment="MozillaFirefox is &lt;38.2.1esr-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114062" version="1" comment="MozillaFirefox-branding-SLE is &lt;31.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114066" version="1" comment="MozillaFirefox-translations is &lt;38.2.1esr-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114067" version="1" comment="libfreebl3 is &lt;3.19.2.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114068" version="1" comment="libfreebl3-32bit is &lt;3.19.2.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114071" version="1" comment="libsoftokn3 is &lt;3.19.2.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114072" version="1" comment="libsoftokn3-32bit is &lt;3.19.2.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114075" version="1" comment="mozilla-nss is &lt;3.19.2.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114076" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114078" version="1" comment="mozilla-nss-certs is &lt;3.19.2.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114079" version="1" comment="mozilla-nss-certs-32bit is &lt;3.19.2.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114083" version="1" comment="mozilla-nss-tools is &lt;3.19.2.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114049" version="1" comment="bind is &lt;9.9.6P1-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114054" version="1" comment="bind-libs is &lt;9.9.6P1-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114053" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114056" version="1" comment="bind-utils is &lt;9.9.6P1-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105748" version="1" comment="kernel-default is &lt;3.12.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105750" version="1" comment="kernel-default-devel is &lt;3.12.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105751" version="1" comment="kernel-default-extra is &lt;3.12.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105740" version="1" comment="kernel-devel is &lt;3.12.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105741" version="1" comment="kernel-macros is &lt;3.12.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105742" version="1" comment="kernel-source is &lt;3.12.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105758" version="1" comment="kernel-syms is &lt;3.12.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105761" version="1" comment="kernel-xen is &lt;3.12.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105763" version="1" comment="kernel-xen-devel is &lt;3.12.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105738" version="1" comment="clamav is &lt;0.98.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114237" version="1" comment="zeromq is &lt;4.0.4-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105072" version="1" comment="jasper is &lt;1.900.1-166.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105074" version="1" comment="libjasper1 is &lt;1.900.1-166.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105075" version="1" comment="libjasper1-32bit is &lt;1.900.1-166.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114239" version="1" comment="libgcrypt is &lt;1.6.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114263" version="1" comment="qemu is &lt;2.0.2-48.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114265" version="1" comment="qemu-block-curl is &lt;2.0.2-48.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114268" version="1" comment="qemu-ipxe is &lt;1.0.0-48.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114269" version="1" comment="qemu-kvm is &lt;2.0.2-48.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114273" version="1" comment="qemu-seabios is &lt;1.7.4-48.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114274" version="1" comment="qemu-sgabios is &lt;8-48.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114275" version="1" comment="qemu-tools is &lt;2.0.2-48.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114276" version="1" comment="qemu-vgabios is &lt;1.7.4-48.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114277" version="1" comment="qemu-x86 is &lt;2.0.2-48.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105785" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105786" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105789" version="1" comment="openssl is &lt;1.0.1i-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114321" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105816" version="1" comment="mpfr is &lt;3.1.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114336" version="1" comment="libsnmp30 is &lt;5.7.2.1-4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114335" version="1" comment="libsnmp30-32bit is &lt;5.7.2.1-4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114337" version="1" comment="net-snmp is &lt;5.7.2.1-4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114341" version="1" comment="perl-SNMP is &lt;5.7.2.1-4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114342" version="1" comment="snmp-mibs is &lt;5.7.2.1-4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105980" version="1" comment="flash-player is &lt;11.2.202.442-67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105981" version="1" comment="flash-player-gnome is &lt;11.2.202.442-67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114454" version="1" comment="flash-player is &lt;11.2.202.521-102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114455" version="1" comment="flash-player-gnome is &lt;11.2.202.521-102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114432" version="1" comment="kernel-default is &lt;3.12.44-52.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114434" version="1" comment="kernel-default-devel is &lt;3.12.44-52.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114435" version="1" comment="kernel-default-extra is &lt;3.12.44-52.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114424" version="1" comment="kernel-devel is &lt;3.12.44-52.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114425" version="1" comment="kernel-macros is &lt;3.12.44-52.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114426" version="1" comment="kernel-source is &lt;3.12.44-52.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114442" version="1" comment="kernel-syms is &lt;3.12.44-52.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114445" version="1" comment="kernel-xen is &lt;3.12.44-52.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114447" version="1" comment="kernel-xen-devel is &lt;3.12.44-52.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105957" version="1" comment="libvirt is &lt;1.2.5-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105958" version="1" comment="libvirt-client is &lt;1.2.5-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105959" version="1" comment="libvirt-client-32bit is &lt;1.2.5-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105960" version="1" comment="libvirt-daemon is &lt;1.2.5-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105961" version="1" comment="libvirt-daemon-config-network is &lt;1.2.5-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105962" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.5-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105963" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.5-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105978" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.5-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105964" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.5-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105965" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.5-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105966" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.5-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105967" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.5-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105968" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.5-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105969" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.5-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105970" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.5-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105971" version="1" comment="libvirt-daemon-lxc is &lt;1.2.5-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105972" version="1" comment="libvirt-daemon-qemu is &lt;1.2.5-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105979" version="1" comment="libvirt-daemon-xen is &lt;1.2.5-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105975" version="1" comment="libvirt-doc is &lt;1.2.5-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114770" version="1" comment="MozillaFirefox is &lt;38.3.0esr-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114773" version="1" comment="MozillaFirefox-translations is &lt;38.3.0esr-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114775" version="1" comment="mozilla-nspr is &lt;4.10.9-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114774" version="1" comment="mozilla-nspr-32bit is &lt;4.10.9-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114953" version="1" comment="rpcbind is &lt;0.2.1_rc4-13.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114954" version="1" comment="libssh is &lt;0.6.3-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114985" version="1" comment="kernel-default is &lt;3.12.48-52.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114987" version="1" comment="kernel-default-devel is &lt;3.12.48-52.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114988" version="1" comment="kernel-default-extra is &lt;3.12.48-52.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114977" version="1" comment="kernel-devel is &lt;3.12.48-52.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114978" version="1" comment="kernel-macros is &lt;3.12.48-52.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114979" version="1" comment="kernel-source is &lt;3.12.48-52.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114995" version="1" comment="kernel-syms is &lt;3.12.48-52.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114998" version="1" comment="kernel-xen is &lt;3.12.48-52.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115000" version="1" comment="kernel-xen-devel is &lt;3.12.48-52.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106050" version="1" comment="libblkid1 is &lt;2.25-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106051" version="1" comment="libblkid1-32bit is &lt;2.25-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106054" version="1" comment="libmount1 is &lt;2.25-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106055" version="1" comment="libmount1-32bit is &lt;2.25-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106057" version="1" comment="libsmartcols1 is &lt;2.25-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106058" version="1" comment="libuuid-devel is &lt;2.25-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106060" version="1" comment="libuuid1 is &lt;2.25-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106061" version="1" comment="libuuid1-32bit is &lt;2.25-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106045" version="1" comment="python-libmount is &lt;2.25-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106062" version="1" comment="util-linux is &lt;2.25-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106063" version="1" comment="util-linux-lang is &lt;2.25-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106046" version="1" comment="util-linux-systemd is &lt;2.25-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106047" version="1" comment="uuidd is &lt;2.25-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115020" version="1" comment="libspice-server1 is &lt;0.12.4-8.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115021" version="1" comment="spice is &lt;0.12.4-8.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115023" version="1" comment="flash-player is &lt;11.2.202.535-105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115024" version="1" comment="flash-player-gnome is &lt;11.2.202.535-105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106066" version="1" comment="ntp is &lt;4.2.6p5-37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106067" version="1" comment="ntp-doc is &lt;4.2.6p5-37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115053" version="1" comment="flash-player is &lt;11.2.202.540-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115054" version="1" comment="flash-player-gnome is &lt;11.2.202.540-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116187" version="1" comment="strongswan is &lt;5.1.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116188" version="1" comment="strongswan-doc is &lt;5.1.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116189" version="1" comment="strongswan-ipsec is &lt;5.1.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116190" version="1" comment="strongswan-libs0 is &lt;5.1.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115065" version="1" comment="qemu is &lt;2.0.2-48.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115067" version="1" comment="qemu-block-curl is &lt;2.0.2-48.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115070" version="1" comment="qemu-ipxe is &lt;1.0.0-48.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115071" version="1" comment="qemu-kvm is &lt;2.0.2-48.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115075" version="1" comment="qemu-seabios is &lt;1.7.4-48.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115076" version="1" comment="qemu-sgabios is &lt;8-48.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115077" version="1" comment="qemu-tools is &lt;2.0.2-48.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115078" version="1" comment="qemu-vgabios is &lt;1.7.4-48.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115079" version="1" comment="qemu-x86 is &lt;2.0.2-48.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106108" version="1" comment="jasper is &lt;1.900.1-170.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106084" version="1" comment="krb5 is &lt;1.12.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106085" version="1" comment="krb5-32bit is &lt;1.12.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106086" version="1" comment="krb5-client is &lt;1.12.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115143" version="1" comment="postgresql93 is &lt;9.3.10-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115142" version="1" comment="postgresql93-libs is &lt;9.3.10-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106112" version="1" comment="clamav is &lt;0.98.6-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115384" version="1" comment="glibc is &lt;2.19-22.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115395" version="1" comment="glibc-32bit is &lt;2.19-22.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115385" version="1" comment="glibc-devel is &lt;2.19-22.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115396" version="1" comment="glibc-devel-32bit is &lt;2.19-22.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115389" version="1" comment="glibc-i18ndata is &lt;2.19-22.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115391" version="1" comment="glibc-locale is &lt;2.19-22.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115398" version="1" comment="glibc-locale-32bit is &lt;2.19-22.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115394" version="1" comment="nscd is &lt;2.19-22.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106135" version="1" comment="compat-openssl098 is &lt;0.9.8j-70.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106136" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-70.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106137" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-70.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115562" version="1" comment="libvdpau is &lt;0.8-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115931" version="1" comment="xen is &lt;4.4.3_02-22.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115937" version="1" comment="xen-kmp-default is &lt;4.4.3_02_k3.12.48_52.27-22.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115934" version="1" comment="xen-libs is &lt;4.4.3_02-22.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115933" version="1" comment="xen-libs-32bit is &lt;4.4.3_02-22.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115569" version="1" comment="apache-commons-logging is &lt;1.1.3-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115570" version="1" comment="cmis-client is &lt;0.5.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115578" version="1" comment="graphite2 is &lt;1.3.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115582" version="1" comment="hyphen is &lt;2.8.8-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115585" version="1" comment="libabw is &lt;0.1.1-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115586" version="1" comment="libabw-0_1-1 is &lt;0.1.1-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115592" version="1" comment="libcdr is &lt;0.1.1-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115593" version="1" comment="libcdr-0_1-1 is &lt;0.1.1-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115571" version="1" comment="libcmis-0_5-5 is &lt;0.5.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115597" version="1" comment="libe-book is &lt;0.1.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115598" version="1" comment="libe-book-0_1-1 is &lt;0.1.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115606" version="1" comment="libetonyek is &lt;0.1.3-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115607" version="1" comment="libetonyek-0_1-1 is &lt;0.1.3-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115615" version="1" comment="libfreehand is &lt;0.1.1-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115616" version="1" comment="libfreehand-0_1-1 is &lt;0.1.1-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115620" version="1" comment="libgltf is &lt;0.0.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115621" version="1" comment="libgltf-0_0-0 is &lt;0.0.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115580" version="1" comment="libgraphite2-3 is &lt;1.3.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115581" version="1" comment="libgraphite2-3-32bit is &lt;1.3.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115584" version="1" comment="libhyphen0 is &lt;2.8.8-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115623" version="1" comment="libixion is &lt;0.9.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115624" version="1" comment="libixion-0_10-0 is &lt;0.9.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115628" version="1" comment="liblangtag is &lt;0.5.7-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115631" version="1" comment="liblangtag1 is &lt;0.5.7-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115636" version="1" comment="libmspub is &lt;0.1.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115637" version="1" comment="libmspub-0_1-1 is &lt;0.1.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115641" version="1" comment="libmwaw is &lt;0.3.6-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115642" version="1" comment="libmwaw-0_3-3 is &lt;0.3.6-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115646" version="1" comment="libodfgen is &lt;0.1.4-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115647" version="1" comment="libodfgen-0_1-1 is &lt;0.1.4-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115650" version="1" comment="liborcus is &lt;0.7.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115651" version="1" comment="liborcus-0_8-0 is &lt;0.7.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115654" version="1" comment="libpagemaker is &lt;0.0.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115655" version="1" comment="libpagemaker-0_0-0 is &lt;0.0.2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115659" version="1" comment="libreoffice-share-linker is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115660" version="1" comment="libreoffice-voikko is &lt;4.1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115759" version="1" comment="librevenge-0_0-0 is &lt;0.0.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115763" version="1" comment="librevenge-stream-0_0-0 is &lt;0.0.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115766" version="1" comment="libvisio is &lt;0.1.3-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115767" version="1" comment="libvisio-0_1-1 is &lt;0.1.3-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115771" version="1" comment="libvoikko is &lt;3.7.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115773" version="1" comment="libvoikko1 is &lt;3.7.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115776" version="1" comment="libwps is &lt;0.4.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115777" version="1" comment="libwps-0_4-4 is &lt;0.4.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115780" version="1" comment="malaga-suomi is &lt;1.18-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115784" version="1" comment="myspell-af_ZA is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115787" version="1" comment="myspell-ar is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115805" version="1" comment="myspell-be_BY is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115806" version="1" comment="myspell-bg_BG is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115807" version="1" comment="myspell-bn_BD is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115811" version="1" comment="myspell-bs_BA is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115812" version="1" comment="myspell-ca is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115818" version="1" comment="myspell-cs_CZ is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115819" version="1" comment="myspell-da_DK is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115820" version="1" comment="myspell-de is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115824" version="1" comment="myspell-dictionaries is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115825" version="1" comment="myspell-el_GR is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115826" version="1" comment="myspell-en is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115844" version="1" comment="myspell-es is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115865" version="1" comment="myspell-et_EE is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115869" version="1" comment="myspell-fr_FR is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115875" version="1" comment="myspell-gu_IN is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115876" version="1" comment="myspell-he_IL is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115877" version="1" comment="myspell-hi_IN is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115878" version="1" comment="myspell-hr_HR is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115879" version="1" comment="myspell-hu_HU is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115882" version="1" comment="myspell-it_IT is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115890" version="1" comment="myspell-lo_LA is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115891" version="1" comment="myspell-lt_LT is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115892" version="1" comment="myspell-lv_LV is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115896" version="1" comment="myspell-nl_NL is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115898" version="1" comment="myspell-no is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115900" version="1" comment="myspell-pl_PL is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115902" version="1" comment="myspell-pt_BR is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115903" version="1" comment="myspell-pt_PT is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115904" version="1" comment="myspell-ro is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115906" version="1" comment="myspell-ru_RU is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115908" version="1" comment="myspell-sk_SK is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115909" version="1" comment="myspell-sl_SI is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115910" version="1" comment="myspell-sr is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115916" version="1" comment="myspell-sv_SE is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115919" version="1" comment="myspell-te_IN is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115920" version="1" comment="myspell-th_TH is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115922" version="1" comment="myspell-vi is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115924" version="1" comment="myspell-zu_ZA is &lt;20150827-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105060" version="1" comment="xen is &lt;4.4.1_08-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105066" version="1" comment="xen-kmp-default is &lt;4.4.1_08_k3.12.28_4-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105063" version="1" comment="xen-libs is &lt;4.4.1_08-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105062" version="1" comment="xen-libs-32bit is &lt;4.4.1_08-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116010" version="1" comment="MozillaFirefox-branding-SLE is &lt;31.0-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106166" version="1" comment="wireshark is &lt;1.10.12-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119270" version="1" comment="libsndfile is &lt;1.0.25-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117928" version="1" comment="libpng12 is &lt;1.2.50-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117929" version="1" comment="libpng12-0 is &lt;1.2.50-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117930" version="1" comment="libpng12-0-32bit is &lt;1.2.50-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117931" version="1" comment="libpng16 is &lt;1.6.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117932" version="1" comment="libpng16-16 is &lt;1.6.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117933" version="1" comment="libpng16-16-32bit is &lt;1.6.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119619" version="1" comment="libksba is &lt;1.3.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119620" version="1" comment="libksba8 is &lt;1.3.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116168" version="1" comment="dracut is &lt;037-51.17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106365" version="1" comment="qemu is &lt;2.0.2-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106367" version="1" comment="qemu-block-curl is &lt;2.0.2-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106370" version="1" comment="qemu-ipxe is &lt;1.0.0-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106371" version="1" comment="qemu-kvm is &lt;2.0.2-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106375" version="1" comment="qemu-seabios is &lt;1.7.4-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106376" version="1" comment="qemu-sgabios is &lt;8-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106377" version="1" comment="qemu-tools is &lt;2.0.2-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106378" version="1" comment="qemu-vgabios is &lt;1.7.4-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106379" version="1" comment="qemu-x86 is &lt;2.0.2-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119308" version="1" comment="LibVNCServer is &lt;0.9.9-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116129" version="1" comment="sblim-sfcb is &lt;1.4.8-5.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106387" version="1" comment="libdcerpc-binding0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106386" version="1" comment="libdcerpc-binding0-32bit is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106393" version="1" comment="libdcerpc0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106392" version="1" comment="libdcerpc0-32bit is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106396" version="1" comment="libgensec0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106395" version="1" comment="libgensec0-32bit is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106400" version="1" comment="libndr-krb5pac0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106399" version="1" comment="libndr-krb5pac0-32bit is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106403" version="1" comment="libndr-nbt0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106402" version="1" comment="libndr-nbt0-32bit is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106406" version="1" comment="libndr-standard0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106405" version="1" comment="libndr-standard0-32bit is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106408" version="1" comment="libndr0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106407" version="1" comment="libndr0-32bit is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106411" version="1" comment="libnetapi0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106410" version="1" comment="libnetapi0-32bit is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106414" version="1" comment="libpdb0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106413" version="1" comment="libpdb0-32bit is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106417" version="1" comment="libregistry0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106420" version="1" comment="libsamba-credentials0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106419" version="1" comment="libsamba-credentials0-32bit is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106423" version="1" comment="libsamba-hostconfig0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106422" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106429" version="1" comment="libsamba-util0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106428" version="1" comment="libsamba-util0-32bit is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106432" version="1" comment="libsamdb0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106431" version="1" comment="libsamdb0-32bit is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106436" version="1" comment="libsmbclient-raw0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106435" version="1" comment="libsmbclient-raw0-32bit is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106438" version="1" comment="libsmbclient0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106437" version="1" comment="libsmbclient0-32bit is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106441" version="1" comment="libsmbconf0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106440" version="1" comment="libsmbconf0-32bit is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106444" version="1" comment="libsmbldap0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106443" version="1" comment="libsmbldap0-32bit is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106449" version="1" comment="libtevent-util0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106448" version="1" comment="libtevent-util0-32bit is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106452" version="1" comment="libwbclient0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106451" version="1" comment="libwbclient0-32bit is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106454" version="1" comment="samba is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106453" version="1" comment="samba-32bit is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106456" version="1" comment="samba-client is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106455" version="1" comment="samba-client-32bit is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106458" version="1" comment="samba-doc is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106460" version="1" comment="samba-libs is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106459" version="1" comment="samba-libs-32bit is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106466" version="1" comment="samba-winbind is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106465" version="1" comment="samba-winbind-32bit is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118162" version="1" comment="kernel-default is &lt;3.12.51-52.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118163" version="1" comment="kernel-default-devel is &lt;3.12.51-52.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118164" version="1" comment="kernel-default-extra is &lt;3.12.51-52.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118165" version="1" comment="kernel-devel is &lt;3.12.51-52.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118166" version="1" comment="kernel-macros is &lt;3.12.51-52.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118167" version="1" comment="kernel-source is &lt;3.12.51-52.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118168" version="1" comment="kernel-syms is &lt;3.12.51-52.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118169" version="1" comment="kernel-xen is &lt;3.12.51-52.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118170" version="1" comment="kernel-xen-devel is &lt;3.12.51-52.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119604" version="1" comment="gdk-pixbuf is &lt;2.30.6-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119605" version="1" comment="gdk-pixbuf-lang is &lt;2.30.6-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119606" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.30.6-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119607" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.30.6-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119608" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.30.6-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119609" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.30.6-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119610" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.30.6-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106469" version="1" comment="libmspack is &lt;0.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106471" version="1" comment="libmspack0 is &lt;0.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118716" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-27.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118717" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-27.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118718" version="1" comment="openssl is &lt;1.0.1i-27.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118875" version="1" comment="flash-player is &lt;11.2.202.554-114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118876" version="1" comment="flash-player-gnome is &lt;11.2.202.554-114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106467" version="1" comment="vorbis-tools is &lt;1.4.0-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106468" version="1" comment="vorbis-tools-lang is &lt;1.4.0-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118563" version="1" comment="krb5 is &lt;1.12.1-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118564" version="1" comment="krb5-32bit is &lt;1.12.1-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118565" version="1" comment="krb5-client is &lt;1.12.1-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119014" version="1" comment="ldb is &lt;1.1.24-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119015" version="1" comment="libdcerpc-binding0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119016" version="1" comment="libdcerpc-binding0-32bit is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119017" version="1" comment="libdcerpc0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119018" version="1" comment="libdcerpc0-32bit is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119019" version="1" comment="libgensec0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119020" version="1" comment="libgensec0-32bit is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119021" version="1" comment="libldb1 is &lt;1.1.24-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119022" version="1" comment="libldb1-32bit is &lt;1.1.24-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119023" version="1" comment="libndr-krb5pac0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119024" version="1" comment="libndr-krb5pac0-32bit is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119025" version="1" comment="libndr-nbt0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119026" version="1" comment="libndr-nbt0-32bit is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119027" version="1" comment="libndr-standard0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119028" version="1" comment="libndr-standard0-32bit is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119029" version="1" comment="libndr0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119030" version="1" comment="libndr0-32bit is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119031" version="1" comment="libnetapi0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119032" version="1" comment="libnetapi0-32bit is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119033" version="1" comment="libpdb0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119034" version="1" comment="libpdb0-32bit is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119035" version="1" comment="libregistry0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119036" version="1" comment="libsamba-credentials0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119037" version="1" comment="libsamba-credentials0-32bit is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119038" version="1" comment="libsamba-hostconfig0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119039" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119040" version="1" comment="libsamba-util0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119041" version="1" comment="libsamba-util0-32bit is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119042" version="1" comment="libsamdb0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119043" version="1" comment="libsamdb0-32bit is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119044" version="1" comment="libsmbclient-raw0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119045" version="1" comment="libsmbclient-raw0-32bit is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119046" version="1" comment="libsmbclient0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119047" version="1" comment="libsmbclient0-32bit is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119048" version="1" comment="libsmbconf0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119049" version="1" comment="libsmbconf0-32bit is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119050" version="1" comment="libsmbldap0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119051" version="1" comment="libsmbldap0-32bit is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119052" version="1" comment="libtalloc2 is &lt;2.1.5-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119053" version="1" comment="libtalloc2-32bit is &lt;2.1.5-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119054" version="1" comment="libtdb1 is &lt;1.3.8-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119055" version="1" comment="libtdb1-32bit is &lt;1.3.8-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119056" version="1" comment="libtevent-util0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119057" version="1" comment="libtevent-util0-32bit is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119058" version="1" comment="libtevent0 is &lt;0.9.26-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119059" version="1" comment="libtevent0-32bit is &lt;0.9.26-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119060" version="1" comment="libwbclient0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119061" version="1" comment="libwbclient0-32bit is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119062" version="1" comment="pytalloc is &lt;2.1.5-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119063" version="1" comment="pytalloc-32bit is &lt;2.1.5-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119064" version="1" comment="samba is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119065" version="1" comment="samba-32bit is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119066" version="1" comment="samba-client is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119067" version="1" comment="samba-client-32bit is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119068" version="1" comment="samba-doc is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119069" version="1" comment="samba-libs is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119070" version="1" comment="samba-libs-32bit is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119071" version="1" comment="samba-winbind is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119072" version="1" comment="samba-winbind-32bit is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119073" version="1" comment="talloc is &lt;2.1.5-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129268" version="1" comment="kernel-default is &lt;3.12.60-52.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129269" version="1" comment="kernel-default-devel is &lt;3.12.60-52.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129270" version="1" comment="kernel-default-extra is &lt;3.12.60-52.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129271" version="1" comment="kernel-devel is &lt;3.12.60-52.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129272" version="1" comment="kernel-macros is &lt;3.12.60-52.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129273" version="1" comment="kernel-source is &lt;3.12.60-52.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129274" version="1" comment="kernel-syms is &lt;3.12.60-52.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129275" version="1" comment="kernel-xen is &lt;3.12.60-52.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129276" version="1" comment="kernel-xen-devel is &lt;3.12.60-52.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129277" version="1" comment="dhcp is &lt;4.2.6-14.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129278" version="1" comment="dhcp-client is &lt;4.2.6-14.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129279" version="1" comment="MozillaFirefox is &lt;45.2.0esr-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129280" version="1" comment="MozillaFirefox-branding-SLE is &lt;45.0-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129281" version="1" comment="MozillaFirefox-translations is &lt;45.2.0esr-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129385" version="1" comment="kernel-default is &lt;3.12.60-52.54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129386" version="1" comment="kernel-default-devel is &lt;3.12.60-52.54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129387" version="1" comment="kernel-default-extra is &lt;3.12.60-52.54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129388" version="1" comment="kernel-devel is &lt;3.12.60-52.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129389" version="1" comment="kernel-macros is &lt;3.12.60-52.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129390" version="1" comment="kernel-source is &lt;3.12.60-52.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129391" version="1" comment="kernel-syms is &lt;3.12.60-52.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129392" version="1" comment="kernel-xen is &lt;3.12.60-52.54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129393" version="1" comment="kernel-xen-devel is &lt;3.12.60-52.54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129394" version="1" comment="glibc is &lt;2.19-22.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129395" version="1" comment="glibc-32bit is &lt;2.19-22.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129396" version="1" comment="glibc-devel is &lt;2.19-22.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129397" version="1" comment="glibc-devel-32bit is &lt;2.19-22.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129398" version="1" comment="glibc-i18ndata is &lt;2.19-22.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129399" version="1" comment="glibc-locale is &lt;2.19-22.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129400" version="1" comment="glibc-locale-32bit is &lt;2.19-22.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129401" version="1" comment="nscd is &lt;2.19-22.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129448" version="1" comment="boost is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129449" version="1" comment="boost-license1_54_0 is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129450" version="1" comment="cmis-client is &lt;0.5.1-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129451" version="1" comment="hunspell is &lt;1.3.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129452" version="1" comment="hunspell-32bit is &lt;1.3.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129453" version="1" comment="hunspell-tools is &lt;1.3.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129454" version="1" comment="hyphen is &lt;2.8.8-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129455" version="1" comment="libOpenCOLLADA0 is &lt;1_3335ac1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129456" version="1" comment="libboost_atomic1_54_0 is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129457" version="1" comment="libboost_date_time1_54_0 is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129458" version="1" comment="libboost_filesystem1_54_0 is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129459" version="1" comment="libboost_iostreams1_54_0 is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129460" version="1" comment="libboost_program_options1_54_0 is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129461" version="1" comment="libboost_regex1_54_0 is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129462" version="1" comment="libboost_signals1_54_0 is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129463" version="1" comment="libboost_system1_54_0 is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129464" version="1" comment="libboost_thread1_54_0 is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129465" version="1" comment="libcmis-0_5-5 is &lt;0.5.1-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129466" version="1" comment="libetonyek is &lt;0.1.6-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129467" version="1" comment="libetonyek-0_1-1 is &lt;0.1.6-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129468" version="1" comment="libhyphen0 is &lt;2.8.8-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129469" version="1" comment="libixion is &lt;0.11.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129470" version="1" comment="libixion-0_11-0 is &lt;0.11.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129471" version="1" comment="liborcus is &lt;0.11.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129472" version="1" comment="liborcus-0_11-0 is &lt;0.11.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129473" version="1" comment="libreoffice-base is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129474" version="1" comment="libreoffice-base-drivers-mysql is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129475" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129476" version="1" comment="libreoffice-calc is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129477" version="1" comment="libreoffice-calc-extensions is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129478" version="1" comment="libreoffice-draw is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129479" version="1" comment="libreoffice-filters-optional is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129480" version="1" comment="libreoffice-gnome is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129481" version="1" comment="libreoffice-icon-theme-galaxy is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129482" version="1" comment="libreoffice-icon-theme-tango is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129483" version="1" comment="libreoffice-impress is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129484" version="1" comment="libreoffice-l10n-af is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129485" version="1" comment="libreoffice-l10n-ar is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129486" version="1" comment="libreoffice-l10n-ca is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129487" version="1" comment="libreoffice-l10n-cs is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129488" version="1" comment="libreoffice-l10n-da is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129489" version="1" comment="libreoffice-l10n-de is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129490" version="1" comment="libreoffice-l10n-en is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129491" version="1" comment="libreoffice-l10n-es is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129492" version="1" comment="libreoffice-l10n-fi is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129493" version="1" comment="libreoffice-l10n-fr is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129494" version="1" comment="libreoffice-l10n-gu is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129495" version="1" comment="libreoffice-l10n-hi is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129496" version="1" comment="libreoffice-l10n-hu is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129497" version="1" comment="libreoffice-l10n-it is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129498" version="1" comment="libreoffice-l10n-ja is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129499" version="1" comment="libreoffice-l10n-ko is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129500" version="1" comment="libreoffice-l10n-nb is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129501" version="1" comment="libreoffice-l10n-nl is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129502" version="1" comment="libreoffice-l10n-nn is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129503" version="1" comment="libreoffice-l10n-pl is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129504" version="1" comment="libreoffice-l10n-pt-BR is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129505" version="1" comment="libreoffice-l10n-pt-PT is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129506" version="1" comment="libreoffice-l10n-ru is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129507" version="1" comment="libreoffice-l10n-sk is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129508" version="1" comment="libreoffice-l10n-sv is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129509" version="1" comment="libreoffice-l10n-xh is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129510" version="1" comment="libreoffice-l10n-zh-Hans is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129511" version="1" comment="libreoffice-l10n-zh-Hant is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129512" version="1" comment="libreoffice-l10n-zu is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129513" version="1" comment="libreoffice-mailmerge is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129514" version="1" comment="libreoffice-math is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129515" version="1" comment="libreoffice-officebean is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129516" version="1" comment="libreoffice-pyuno is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129517" version="1" comment="libreoffice-writer is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129518" version="1" comment="libreoffice-writer-extensions is &lt;5.1.3.2-22.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129519" version="1" comment="libvisio is &lt;0.1.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129520" version="1" comment="libvisio-0_1-1 is &lt;0.1.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129521" version="1" comment="libwps is &lt;0.4.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129522" version="1" comment="libwps-0_4-4 is &lt;0.4.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129523" version="1" comment="myspell-af_NA is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129524" version="1" comment="myspell-af_ZA is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129525" version="1" comment="myspell-ar is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129526" version="1" comment="myspell-ar_AE is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129527" version="1" comment="myspell-ar_BH is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129528" version="1" comment="myspell-ar_DZ is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129529" version="1" comment="myspell-ar_EG is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129530" version="1" comment="myspell-ar_IQ is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129531" version="1" comment="myspell-ar_JO is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129532" version="1" comment="myspell-ar_KW is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129533" version="1" comment="myspell-ar_LB is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129534" version="1" comment="myspell-ar_LY is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129535" version="1" comment="myspell-ar_MA is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129536" version="1" comment="myspell-ar_OM is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129537" version="1" comment="myspell-ar_QA is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129538" version="1" comment="myspell-ar_SA is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129539" version="1" comment="myspell-ar_SD is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129540" version="1" comment="myspell-ar_SY is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129541" version="1" comment="myspell-ar_TN is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129542" version="1" comment="myspell-ar_YE is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129543" version="1" comment="myspell-be_BY is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129544" version="1" comment="myspell-bg_BG is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129545" version="1" comment="myspell-bn_BD is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129546" version="1" comment="myspell-bn_IN is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129547" version="1" comment="myspell-bs is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129548" version="1" comment="myspell-bs_BA is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129549" version="1" comment="myspell-ca is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129550" version="1" comment="myspell-ca_AD is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129551" version="1" comment="myspell-ca_ES is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129552" version="1" comment="myspell-ca_ES_valencia is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129553" version="1" comment="myspell-ca_FR is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129554" version="1" comment="myspell-ca_IT is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129555" version="1" comment="myspell-cs_CZ is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129556" version="1" comment="myspell-da_DK is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129557" version="1" comment="myspell-de is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129558" version="1" comment="myspell-de_AT is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129559" version="1" comment="myspell-de_CH is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129560" version="1" comment="myspell-de_DE is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129561" version="1" comment="myspell-dictionaries is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129562" version="1" comment="myspell-el_GR is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129563" version="1" comment="myspell-en is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129564" version="1" comment="myspell-en_AU is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129565" version="1" comment="myspell-en_BS is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129566" version="1" comment="myspell-en_BZ is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129567" version="1" comment="myspell-en_CA is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129568" version="1" comment="myspell-en_GB is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129569" version="1" comment="myspell-en_GH is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129570" version="1" comment="myspell-en_IE is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129571" version="1" comment="myspell-en_IN is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129572" version="1" comment="myspell-en_JM is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129573" version="1" comment="myspell-en_MW is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129574" version="1" comment="myspell-en_NA is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129575" version="1" comment="myspell-en_NZ is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129576" version="1" comment="myspell-en_PH is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129577" version="1" comment="myspell-en_TT is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129578" version="1" comment="myspell-en_US is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129579" version="1" comment="myspell-en_ZA is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129580" version="1" comment="myspell-en_ZW is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129581" version="1" comment="myspell-es is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129582" version="1" comment="myspell-es_AR is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129583" version="1" comment="myspell-es_BO is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129584" version="1" comment="myspell-es_CL is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129585" version="1" comment="myspell-es_CO is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129586" version="1" comment="myspell-es_CR is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129587" version="1" comment="myspell-es_CU is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129588" version="1" comment="myspell-es_DO is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129589" version="1" comment="myspell-es_EC is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129590" version="1" comment="myspell-es_ES is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129591" version="1" comment="myspell-es_GT is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129592" version="1" comment="myspell-es_HN is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129593" version="1" comment="myspell-es_MX is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129594" version="1" comment="myspell-es_NI is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129595" version="1" comment="myspell-es_PA is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129596" version="1" comment="myspell-es_PE is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129597" version="1" comment="myspell-es_PR is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129598" version="1" comment="myspell-es_PY is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129599" version="1" comment="myspell-es_SV is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129600" version="1" comment="myspell-es_UY is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129601" version="1" comment="myspell-es_VE is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129602" version="1" comment="myspell-et_EE is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129603" version="1" comment="myspell-fr_BE is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129604" version="1" comment="myspell-fr_CA is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129605" version="1" comment="myspell-fr_CH is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129606" version="1" comment="myspell-fr_FR is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129607" version="1" comment="myspell-fr_LU is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129608" version="1" comment="myspell-fr_MC is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129609" version="1" comment="myspell-gu_IN is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129610" version="1" comment="myspell-he_IL is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129611" version="1" comment="myspell-hi_IN is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129612" version="1" comment="myspell-hr_HR is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129613" version="1" comment="myspell-hu_HU is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129614" version="1" comment="myspell-it_IT is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129615" version="1" comment="myspell-lightproof-en is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129616" version="1" comment="myspell-lightproof-hu_HU is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129617" version="1" comment="myspell-lightproof-pt_BR is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129618" version="1" comment="myspell-lightproof-ru_RU is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129619" version="1" comment="myspell-lo_LA is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129620" version="1" comment="myspell-lt_LT is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129621" version="1" comment="myspell-lv_LV is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129622" version="1" comment="myspell-nb_NO is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129623" version="1" comment="myspell-nl_BE is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129624" version="1" comment="myspell-nl_NL is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129625" version="1" comment="myspell-nn_NO is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129626" version="1" comment="myspell-no is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129627" version="1" comment="myspell-pl_PL is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129628" version="1" comment="myspell-pt_AO is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129629" version="1" comment="myspell-pt_BR is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129630" version="1" comment="myspell-pt_PT is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129631" version="1" comment="myspell-ro is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129632" version="1" comment="myspell-ro_RO is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129633" version="1" comment="myspell-ru_RU is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129634" version="1" comment="myspell-sk_SK is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129635" version="1" comment="myspell-sl_SI is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129636" version="1" comment="myspell-sr is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129637" version="1" comment="myspell-sr_CS is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129638" version="1" comment="myspell-sr_Latn_CS is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129639" version="1" comment="myspell-sr_Latn_RS is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129640" version="1" comment="myspell-sr_RS is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129641" version="1" comment="myspell-sv_FI is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129642" version="1" comment="myspell-sv_SE is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129643" version="1" comment="myspell-te is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129644" version="1" comment="myspell-te_IN is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129645" version="1" comment="myspell-th_TH is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129646" version="1" comment="myspell-vi is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129647" version="1" comment="myspell-vi_VN is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129648" version="1" comment="myspell-zu_ZA is &lt;20160511-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129649" version="1" comment="openCOLLADA is &lt;1_3335ac1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121563" version="1" comment="libtiff5 is &lt;4.0.6-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121564" version="1" comment="libtiff5-32bit is &lt;4.0.6-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121565" version="1" comment="tiff is &lt;4.0.6-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121131" version="1" comment="kernel-default is &lt;3.12.51-52.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121132" version="1" comment="kernel-default-devel is &lt;3.12.51-52.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121133" version="1" comment="kernel-default-extra is &lt;3.12.51-52.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121134" version="1" comment="kernel-devel is &lt;3.12.51-52.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121135" version="1" comment="kernel-macros is &lt;3.12.51-52.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121136" version="1" comment="kernel-source is &lt;3.12.51-52.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121137" version="1" comment="kernel-syms is &lt;3.12.51-52.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121138" version="1" comment="kernel-xen is &lt;3.12.51-52.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121139" version="1" comment="kernel-xen-devel is &lt;3.12.51-52.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118755" version="1" comment="qemu is &lt;2.0.2-48.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118756" version="1" comment="qemu-block-curl is &lt;2.0.2-48.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118757" version="1" comment="qemu-ipxe is &lt;1.0.0-48.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118758" version="1" comment="qemu-kvm is &lt;2.0.2-48.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118759" version="1" comment="qemu-seabios is &lt;1.7.4-48.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118760" version="1" comment="qemu-sgabios is &lt;8-48.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118761" version="1" comment="qemu-tools is &lt;2.0.2-48.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118762" version="1" comment="qemu-vgabios is &lt;1.7.4-48.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118763" version="1" comment="qemu-x86 is &lt;2.0.2-48.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121168" version="1" comment="rsync is &lt;3.1.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121331" version="1" comment="libxml2 is &lt;2.9.1-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121332" version="1" comment="libxml2-2 is &lt;2.9.1-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121333" version="1" comment="libxml2-2-32bit is &lt;2.9.1-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121334" version="1" comment="libxml2-tools is &lt;2.9.1-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121335" version="1" comment="python-libxml2 is &lt;2.9.1-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121634" version="1" comment="bind is &lt;9.9.6P1-28.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121635" version="1" comment="bind-libs is &lt;9.9.6P1-28.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121636" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-28.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121637" version="1" comment="bind-utils is &lt;9.9.6P1-28.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121622" version="1" comment="giflib is &lt;5.0.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121623" version="1" comment="libgif6 is &lt;5.0.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121624" version="1" comment="libgif6-32bit is &lt;5.0.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121625" version="1" comment="kernel-default is &lt;3.12.51-52.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121626" version="1" comment="kernel-default-devel is &lt;3.12.51-52.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121627" version="1" comment="kernel-default-extra is &lt;3.12.51-52.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121628" version="1" comment="kernel-devel is &lt;3.12.51-52.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121629" version="1" comment="kernel-macros is &lt;3.12.51-52.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121630" version="1" comment="kernel-source is &lt;3.12.51-52.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121631" version="1" comment="kernel-syms is &lt;3.12.51-52.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121632" version="1" comment="kernel-xen is &lt;3.12.51-52.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121633" version="1" comment="kernel-xen-devel is &lt;3.12.51-52.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118608" version="1" comment="libldap-2_4-2 is &lt;2.4.41-18.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118609" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.41-18.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118610" version="1" comment="openldap2-client is &lt;2.4.41-18.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121140" version="1" comment="gdk-pixbuf is &lt;2.30.6-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121141" version="1" comment="gdk-pixbuf-lang is &lt;2.30.6-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121142" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.30.6-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121143" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.30.6-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121144" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.30.6-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121145" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.30.6-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121146" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.30.6-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119223" version="1" comment="libpng16 is &lt;1.6.8-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122055" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.95-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122058" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.95-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121001" version="1" comment="libvirt is &lt;1.2.5-27.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121002" version="1" comment="libvirt-client is &lt;1.2.5-27.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121003" version="1" comment="libvirt-client-32bit is &lt;1.2.5-27.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121004" version="1" comment="libvirt-daemon is &lt;1.2.5-27.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121005" version="1" comment="libvirt-daemon-config-network is &lt;1.2.5-27.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121006" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.5-27.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121007" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.5-27.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121008" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.5-27.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121009" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.5-27.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121010" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.5-27.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121011" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.5-27.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121012" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.5-27.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121013" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.5-27.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121014" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.5-27.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121015" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.5-27.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121016" version="1" comment="libvirt-daemon-lxc is &lt;1.2.5-27.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121017" version="1" comment="libvirt-daemon-qemu is &lt;1.2.5-27.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121018" version="1" comment="libvirt-daemon-xen is &lt;1.2.5-27.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121019" version="1" comment="libvirt-doc is &lt;1.2.5-27.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122759" version="1" comment="MozillaFirefox is &lt;38.6.0esr-57.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122404" version="1" comment="MozillaFirefox-branding-SLE is &lt;31.0-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122760" version="1" comment="MozillaFirefox-translations is &lt;38.6.0esr-57.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122761" version="1" comment="libfreebl3 is &lt;3.20.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122762" version="1" comment="libfreebl3-32bit is &lt;3.20.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122763" version="1" comment="libsoftokn3 is &lt;3.20.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122764" version="1" comment="libsoftokn3-32bit is &lt;3.20.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122765" version="1" comment="mozilla-nss is &lt;3.20.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122766" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122767" version="1" comment="mozilla-nss-certs is &lt;3.20.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122768" version="1" comment="mozilla-nss-certs-32bit is &lt;3.20.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122769" version="1" comment="mozilla-nss-sysinit is &lt;3.20.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122770" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.20.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122771" version="1" comment="mozilla-nss-tools is &lt;3.20.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118764" version="1" comment="libmspack is &lt;0.4-14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122211" version="1" comment="curl is &lt;7.37.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122212" version="1" comment="libcurl4 is &lt;7.37.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122213" version="1" comment="libcurl4-32bit is &lt;7.37.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123016" version="1" comment="flash-player is &lt;11.2.202.569-120.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123017" version="1" comment="flash-player-gnome is &lt;11.2.202.569-120.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122487" version="1" comment="krb5 is &lt;1.12.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122488" version="1" comment="krb5-32bit is &lt;1.12.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122489" version="1" comment="krb5-client is &lt;1.12.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123013" version="1" comment="libnettle is &lt;2.7.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122324" version="1" comment="glibc is &lt;2.19-22.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122325" version="1" comment="glibc-32bit is &lt;2.19-22.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122326" version="1" comment="glibc-devel is &lt;2.19-22.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122327" version="1" comment="glibc-devel-32bit is &lt;2.19-22.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122328" version="1" comment="glibc-i18ndata is &lt;2.19-22.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122329" version="1" comment="glibc-locale is &lt;2.19-22.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122330" version="1" comment="glibc-locale-32bit is &lt;2.19-22.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122331" version="1" comment="nscd is &lt;2.19-22.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123489" version="1" comment="postgresql93 is &lt;9.3.11-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122214" version="1" comment="dhcp is &lt;4.2.6-14.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122215" version="1" comment="dhcp-client is &lt;4.2.6-14.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123662" version="1" comment="libecpg6 is &lt;9.4.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123663" version="1" comment="libpq5 is &lt;9.4.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123664" version="1" comment="libpq5-32bit is &lt;9.4.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123665" version="1" comment="postgresql94 is &lt;9.4.6-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123666" version="1" comment="postgresql94-libs is &lt;9.4.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123667" version="1" comment="MozillaFirefox is &lt;38.6.1esr-60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123668" version="1" comment="MozillaFirefox-translations is &lt;38.6.1esr-60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123864" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-27.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123865" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-27.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123866" version="1" comment="openssl is &lt;1.0.1i-27.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123867" version="1" comment="libssh is &lt;0.6.3-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124405" version="1" comment="compat-openssl098 is &lt;0.9.8j-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124406" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124407" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119220" version="1" comment="libpng12 is &lt;1.2.50-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119282" version="1" comment="libxml2 is &lt;2.9.1-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119283" version="1" comment="libxml2-2 is &lt;2.9.1-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119284" version="1" comment="libxml2-2-32bit is &lt;2.9.1-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119285" version="1" comment="libxml2-tools is &lt;2.9.1-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119286" version="1" comment="python-libxml2 is &lt;2.9.1-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124477" version="1" comment="libotr is &lt;4.0.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124589" version="1" comment="flash-player is &lt;11.2.202.577-123.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124590" version="1" comment="flash-player-gnome is &lt;11.2.202.577-123.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124591" version="1" comment="libssh2-1 is &lt;1.4.3-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124592" version="1" comment="libssh2-1-32bit is &lt;1.4.3-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124593" version="1" comment="libssh2_org is &lt;1.4.3-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124594" version="1" comment="MozillaFirefox is &lt;38.7.0esr-63.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124595" version="1" comment="MozillaFirefox-translations is &lt;38.7.0esr-63.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124596" version="1" comment="libfreebl3 is &lt;3.20.2-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124597" version="1" comment="libfreebl3-32bit is &lt;3.20.2-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124598" version="1" comment="libsoftokn3 is &lt;3.20.2-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124599" version="1" comment="libsoftokn3-32bit is &lt;3.20.2-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124600" version="1" comment="mozilla-nspr is &lt;4.12-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124601" version="1" comment="mozilla-nspr-32bit is &lt;4.12-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124602" version="1" comment="mozilla-nss is &lt;3.20.2-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124603" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124604" version="1" comment="mozilla-nss-certs is &lt;3.20.2-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124605" version="1" comment="mozilla-nss-certs-32bit is &lt;3.20.2-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124606" version="1" comment="mozilla-nss-sysinit is &lt;3.20.2-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124607" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.20.2-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124608" version="1" comment="mozilla-nss-tools is &lt;3.20.2-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124728" version="1" comment="graphite2 is &lt;1.3.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124731" version="1" comment="bind is &lt;9.9.6P1-28.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124732" version="1" comment="bind-libs is &lt;9.9.6P1-28.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124733" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-28.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124734" version="1" comment="bind-utils is &lt;9.9.6P1-28.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124800" version="1" comment="kernel-default is &lt;3.12.55-52.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124801" version="1" comment="kernel-default-devel is &lt;3.12.55-52.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124802" version="1" comment="kernel-default-extra is &lt;3.12.55-52.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124803" version="1" comment="kernel-devel is &lt;3.12.55-52.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124804" version="1" comment="kernel-macros is &lt;3.12.55-52.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124805" version="1" comment="kernel-source is &lt;3.12.55-52.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124806" version="1" comment="kernel-syms is &lt;3.12.55-52.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124807" version="1" comment="kernel-xen is &lt;3.12.55-52.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124808" version="1" comment="kernel-xen-devel is &lt;3.12.55-52.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124880" version="1" comment="libdcerpc-binding0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124881" version="1" comment="libdcerpc-binding0-32bit is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124882" version="1" comment="libdcerpc0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124883" version="1" comment="libdcerpc0-32bit is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124884" version="1" comment="libgensec0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124885" version="1" comment="libgensec0-32bit is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124886" version="1" comment="libndr-krb5pac0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124887" version="1" comment="libndr-krb5pac0-32bit is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124888" version="1" comment="libndr-nbt0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124889" version="1" comment="libndr-nbt0-32bit is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124890" version="1" comment="libndr-standard0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124891" version="1" comment="libndr-standard0-32bit is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124892" version="1" comment="libndr0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124893" version="1" comment="libndr0-32bit is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124894" version="1" comment="libnetapi0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124895" version="1" comment="libnetapi0-32bit is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124896" version="1" comment="libpdb0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124897" version="1" comment="libpdb0-32bit is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124898" version="1" comment="libregistry0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124899" version="1" comment="libsamba-credentials0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124900" version="1" comment="libsamba-credentials0-32bit is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124901" version="1" comment="libsamba-hostconfig0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124902" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124903" version="1" comment="libsamba-util0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124904" version="1" comment="libsamba-util0-32bit is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124905" version="1" comment="libsamdb0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124906" version="1" comment="libsamdb0-32bit is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124907" version="1" comment="libsmbclient-raw0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124908" version="1" comment="libsmbclient-raw0-32bit is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124909" version="1" comment="libsmbclient0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124910" version="1" comment="libsmbclient0-32bit is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124911" version="1" comment="libsmbconf0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124912" version="1" comment="libsmbconf0-32bit is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124913" version="1" comment="libsmbldap0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124914" version="1" comment="libsmbldap0-32bit is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124915" version="1" comment="libtevent-util0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124916" version="1" comment="libtevent-util0-32bit is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124917" version="1" comment="libwbclient0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124918" version="1" comment="libwbclient0-32bit is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124919" version="1" comment="samba is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124920" version="1" comment="samba-32bit is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124921" version="1" comment="samba-client is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124922" version="1" comment="samba-client-32bit is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124923" version="1" comment="samba-doc is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124924" version="1" comment="samba-libs is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124925" version="1" comment="samba-libs-32bit is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124926" version="1" comment="samba-winbind is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124927" version="1" comment="samba-winbind-32bit is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125276" version="1" comment="libqt4-sql-plugins is &lt;4.8.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125492" version="1" comment="pidgin-otr is &lt;4.0.0-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125669" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.99-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125670" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.99-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125718" version="1" comment="libatomic1 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125719" version="1" comment="libatomic1-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125720" version="1" comment="libcilkrts5 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125721" version="1" comment="libcilkrts5-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125722" version="1" comment="libffi-gcc5 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125725" version="1" comment="libgcc_s1 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125726" version="1" comment="libgcc_s1-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125727" version="1" comment="libgfortran3 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125728" version="1" comment="libgfortran3-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125729" version="1" comment="libgomp1 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125730" version="1" comment="libgomp1-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125731" version="1" comment="libitm1 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125732" version="1" comment="libitm1-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125733" version="1" comment="liblsan0 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125738" version="1" comment="libquadmath0 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125739" version="1" comment="libquadmath0-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125740" version="1" comment="libstdc++6 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125741" version="1" comment="libstdc++6-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125742" version="1" comment="libstdc++6-locale is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125743" version="1" comment="libtsan0 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125744" version="1" comment="libubsan0 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125745" version="1" comment="libubsan0-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125746" version="1" comment="flash-player is &lt;11.2.202.616-126.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125747" version="1" comment="flash-player-gnome is &lt;11.2.202.616-126.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125748" version="1" comment="krb5 is &lt;1.12.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125749" version="1" comment="krb5-32bit is &lt;1.12.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125750" version="1" comment="krb5-client is &lt;1.12.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127078" version="1" comment="python-backports.ssl_match_hostname is &lt;3.4.0.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127079" version="1" comment="python-tornado is &lt;4.2.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125751" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125752" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125753" version="1" comment="libdcerpc0 is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125754" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125755" version="1" comment="libgensec0 is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125756" version="1" comment="libgensec0-32bit is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125757" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125758" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125759" version="1" comment="libndr-nbt0 is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125760" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125761" version="1" comment="libndr-standard0 is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125762" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125763" version="1" comment="libndr0 is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125764" version="1" comment="libndr0-32bit is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125765" version="1" comment="libnetapi0 is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125766" version="1" comment="libnetapi0-32bit is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125767" version="1" comment="libregistry0 is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125768" version="1" comment="libsamba-credentials0 is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125769" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125770" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125771" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125772" version="1" comment="libsamba-passdb0 is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125773" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125774" version="1" comment="libsamba-util0 is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125775" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125776" version="1" comment="libsamdb0 is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125777" version="1" comment="libsamdb0-32bit is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125778" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125779" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125780" version="1" comment="libsmbclient0 is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125781" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125782" version="1" comment="libsmbconf0 is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125783" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125784" version="1" comment="libsmbldap0 is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125785" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125786" version="1" comment="libtevent-util0 is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125787" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125788" version="1" comment="libwbclient0 is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125789" version="1" comment="libwbclient0-32bit is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125790" version="1" comment="samba is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125791" version="1" comment="samba-32bit is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125792" version="1" comment="samba-client is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125793" version="1" comment="samba-client-32bit is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125794" version="1" comment="samba-doc is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125795" version="1" comment="samba-libs is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125796" version="1" comment="samba-libs-32bit is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125797" version="1" comment="samba-winbind is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125798" version="1" comment="samba-winbind-32bit is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126091" version="1" comment="libxerces-c-3_1 is &lt;3.1.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126092" version="1" comment="libxerces-c-3_1-32bit is &lt;3.1.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126093" version="1" comment="xerces-c is &lt;3.1.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126428" version="1" comment="libgcrypt is &lt;1.6.1-16.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126429" version="1" comment="libgcrypt20 is &lt;1.6.1-16.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126430" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-16.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126453" version="1" comment="cairo is &lt;1.12.16-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126454" version="1" comment="libcairo-gobject2 is &lt;1.12.16-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126455" version="1" comment="libcairo-gobject2-32bit is &lt;1.12.16-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126456" version="1" comment="libcairo2 is &lt;1.12.16-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126457" version="1" comment="libcairo2-32bit is &lt;1.12.16-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126708" version="1" comment="giflib is &lt;5.0.5-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127080" version="1" comment="libxml2 is &lt;2.9.1-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127081" version="1" comment="libxml2-2 is &lt;2.9.1-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127082" version="1" comment="libxml2-2-32bit is &lt;2.9.1-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127083" version="1" comment="libxml2-tools is &lt;2.9.1-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127084" version="1" comment="python-libxml2 is &lt;2.9.1-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127133" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-27.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127134" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-27.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127135" version="1" comment="openssl is &lt;1.0.1i-27.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127260" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.101-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127261" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.101-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127262" version="1" comment="ntp is &lt;4.2.8p6-46.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127263" version="1" comment="ntp-doc is &lt;4.2.8p6-46.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127264" version="1" comment="yast2-ntp-client is &lt;3.1.12.4-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127265" version="1" comment="MozillaFirefox is &lt;38.8.0esr-66.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127266" version="1" comment="MozillaFirefox-translations is &lt;38.8.0esr-66.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127284" version="1" comment="ImageMagick is &lt;6.8.8.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127285" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127286" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127287" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127288" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127361" version="1" comment="compat-openssl098 is &lt;0.9.8j-97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127362" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127363" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120991" version="1" comment="wireshark is &lt;1.12.9-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127579" version="1" comment="flash-player is &lt;11.2.202.621-130.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127580" version="1" comment="flash-player-gnome is &lt;11.2.202.621-130.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127594" version="1" comment="xen is &lt;4.4.4_02-22.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127595" version="1" comment="xen-kmp-default is &lt;4.4.4_02_k3.12.55_52.42-22.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127596" version="1" comment="xen-libs is &lt;4.4.4_02-22.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127597" version="1" comment="xen-libs-32bit is &lt;4.4.4_02-22.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127715" version="1" comment="wireshark is &lt;1.12.11-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127716" version="1" comment="libgudev-1_0-0 is &lt;210-70.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127717" version="1" comment="libgudev-1_0-0-32bit is &lt;210-70.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127718" version="1" comment="libudev1 is &lt;210-70.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127719" version="1" comment="libudev1-32bit is &lt;210-70.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127720" version="1" comment="systemd is &lt;210-70.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127721" version="1" comment="systemd-32bit is &lt;210-70.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127722" version="1" comment="systemd-bash-completion is &lt;210-70.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127723" version="1" comment="systemd-sysvinit is &lt;210-70.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127724" version="1" comment="udev is &lt;210-70.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128012" version="1" comment="openssh is &lt;6.6p1-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128013" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128014" version="1" comment="openssh-helpers is &lt;6.6p1-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121336" version="1" comment="openssh is &lt;6.6p1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121337" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121338" version="1" comment="openssh-helpers is &lt;6.6p1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119512" version="1" comment="libmysqlclient18 is &lt;10.0.22-20.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119513" version="1" comment="libmysqlclient18-32bit is &lt;10.0.22-20.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119514" version="1" comment="libmysqlclient_r18 is &lt;10.0.22-20.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119515" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.22-20.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119516" version="1" comment="mariadb is &lt;10.0.22-20.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119517" version="1" comment="mariadb-client is &lt;10.0.22-20.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119518" version="1" comment="mariadb-errormessages is &lt;10.0.22-20.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128463" version="1" comment="supportutils is &lt;3.0-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128467" version="1" comment="libksba is &lt;1.3.0-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128615" version="1" comment="libxml2 is &lt;2.9.1-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128616" version="1" comment="libxml2-2 is &lt;2.9.1-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128617" version="1" comment="libxml2-2-32bit is &lt;2.9.1-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128618" version="1" comment="libxml2-tools is &lt;2.9.1-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128619" version="1" comment="python-libxml2 is &lt;2.9.1-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128638" version="1" comment="libpoppler-glib8 is &lt;0.24.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128639" version="1" comment="libpoppler-qt4-4 is &lt;0.24.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128641" version="1" comment="poppler-qt is &lt;0.24.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128642" version="1" comment="poppler-tools is &lt;0.24.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128786" version="1" comment="qemu is &lt;2.0.2-48.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128787" version="1" comment="qemu-block-curl is &lt;2.0.2-48.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128788" version="1" comment="qemu-ipxe is &lt;1.0.0-48.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128789" version="1" comment="qemu-kvm is &lt;2.0.2-48.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128790" version="1" comment="qemu-seabios is &lt;1.7.4-48.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128791" version="1" comment="qemu-sgabios is &lt;8-48.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128792" version="1" comment="qemu-tools is &lt;2.0.2-48.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128793" version="1" comment="qemu-vgabios is &lt;1.7.4-48.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128794" version="1" comment="qemu-x86 is &lt;2.0.2-48.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128795" version="1" comment="libspice-server1 is &lt;0.12.4-8.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128796" version="1" comment="spice is &lt;0.12.4-8.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128808" version="1" comment="ntp is &lt;4.2.8p8-46.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128809" version="1" comment="ntp-doc is &lt;4.2.8p8-46.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128810" version="1" comment="ImageMagick is &lt;6.8.8.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128811" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128812" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128813" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128814" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128883" version="1" comment="libarchive is &lt;3.1.2-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128884" version="1" comment="libarchive13 is &lt;3.1.2-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128892" version="1" comment="kernel-default is &lt;3.12.55-52.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128893" version="1" comment="kernel-default-devel is &lt;3.12.55-52.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128894" version="1" comment="kernel-default-extra is &lt;3.12.55-52.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128895" version="1" comment="kernel-devel is &lt;3.12.55-52.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128896" version="1" comment="kernel-macros is &lt;3.12.55-52.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128897" version="1" comment="kernel-source is &lt;3.12.55-52.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128898" version="1" comment="kernel-syms is &lt;3.12.55-52.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128899" version="1" comment="kernel-xen is &lt;3.12.55-52.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128900" version="1" comment="kernel-xen-devel is &lt;3.12.55-52.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128937" version="1" comment="flash-player is &lt;11.2.202.626-133.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128938" version="1" comment="flash-player-gnome is &lt;11.2.202.626-133.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128939" version="1" comment="libmysqlclient18 is &lt;10.0.25-20.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128940" version="1" comment="libmysqlclient18-32bit is &lt;10.0.25-20.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128941" version="1" comment="libmysqlclient_r18 is &lt;10.0.25-20.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128942" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.25-20.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128943" version="1" comment="mariadb is &lt;10.0.25-20.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128944" version="1" comment="mariadb-client is &lt;10.0.25-20.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128945" version="1" comment="mariadb-errormessages is &lt;10.0.25-20.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129017" version="1" comment="imap is &lt;2007e_suse-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129018" version="1" comment="libc-client2007e_suse is &lt;2007e_suse-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129089" version="1" comment="libimobiledevice is &lt;1.1.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129090" version="1" comment="libimobiledevice-tools is &lt;1.1.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129091" version="1" comment="libimobiledevice4 is &lt;1.1.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129092" version="1" comment="libusbmuxd2 is &lt;1.0.8-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129093" version="1" comment="usbmuxd is &lt;1.0.8-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120771" version="1" comment="libfreebl3 is &lt;3.19.2.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120772" version="1" comment="libfreebl3-32bit is &lt;3.19.2.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120773" version="1" comment="libsoftokn3 is &lt;3.19.2.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120774" version="1" comment="libsoftokn3-32bit is &lt;3.19.2.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120775" version="1" comment="mozilla-nss is &lt;3.19.2.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120776" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120777" version="1" comment="mozilla-nss-certs is &lt;3.19.2.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120778" version="1" comment="mozilla-nss-certs-32bit is &lt;3.19.2.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120779" version="1" comment="mozilla-nss-sysinit is &lt;3.19.2.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120780" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.19.2.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120781" version="1" comment="mozilla-nss-tools is &lt;3.19.2.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119519" version="1" comment="bind is &lt;9.9.6P1-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119520" version="1" comment="bind-libs is &lt;9.9.6P1-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119521" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119522" version="1" comment="bind-utils is &lt;9.9.6P1-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118775" version="1" comment="grub2 is &lt;2.02~beta2-73.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118776" version="1" comment="grub2-i386-pc is &lt;2.02~beta2-73.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118777" version="1" comment="grub2-snapper-plugin is &lt;2.02~beta2-73.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118778" version="1" comment="grub2-x86_64-efi is &lt;2.02~beta2-73.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118779" version="1" comment="grub2-x86_64-xen is &lt;2.02~beta2-73.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118801" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118802" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118734" version="1" comment="openssl is &lt;1.0.1i-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118983" version="1" comment="kernel-default is &lt;3.12.51-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118984" version="1" comment="kernel-default-devel is &lt;3.12.51-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118985" version="1" comment="kernel-default-extra is &lt;3.12.51-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118986" version="1" comment="kernel-devel is &lt;3.12.51-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118987" version="1" comment="kernel-macros is &lt;3.12.51-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118988" version="1" comment="kernel-source is &lt;3.12.51-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118989" version="1" comment="kernel-syms is &lt;3.12.51-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118990" version="1" comment="kernel-xen is &lt;3.12.51-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118991" version="1" comment="kernel-xen-devel is &lt;3.12.51-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119074" version="1" comment="ldb is &lt;1.1.24-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119075" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119076" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119077" version="1" comment="libdcerpc0 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119078" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119079" version="1" comment="libgensec0 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119080" version="1" comment="libgensec0-32bit is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119081" version="1" comment="libldb1 is &lt;1.1.24-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119082" version="1" comment="libldb1-32bit is &lt;1.1.24-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119083" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119084" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119085" version="1" comment="libndr-nbt0 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119086" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119087" version="1" comment="libndr-standard0 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119088" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119089" version="1" comment="libndr0 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119090" version="1" comment="libndr0-32bit is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119091" version="1" comment="libnetapi0 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119092" version="1" comment="libnetapi0-32bit is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119093" version="1" comment="libregistry0 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119094" version="1" comment="libsamba-credentials0 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119095" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119096" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119097" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119098" version="1" comment="libsamba-passdb0 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119099" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119100" version="1" comment="libsamba-util0 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119101" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119102" version="1" comment="libsamdb0 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119103" version="1" comment="libsamdb0-32bit is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119104" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119105" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119106" version="1" comment="libsmbclient0 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119107" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119108" version="1" comment="libsmbconf0 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119109" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119110" version="1" comment="libsmbldap0 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119111" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119112" version="1" comment="libtalloc2 is &lt;2.1.5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119113" version="1" comment="libtalloc2-32bit is &lt;2.1.5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119114" version="1" comment="libtdb1 is &lt;1.3.8-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119115" version="1" comment="libtdb1-32bit is &lt;1.3.8-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119116" version="1" comment="libtevent-util0 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119117" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119118" version="1" comment="libtevent0 is &lt;0.9.26-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119119" version="1" comment="libtevent0-32bit is &lt;0.9.26-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119120" version="1" comment="libwbclient0 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119121" version="1" comment="libwbclient0-32bit is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119122" version="1" comment="pytalloc is &lt;2.1.5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119123" version="1" comment="pytalloc-32bit is &lt;2.1.5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119124" version="1" comment="samba is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119125" version="1" comment="samba-32bit is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119126" version="1" comment="samba-client is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119127" version="1" comment="samba-client-32bit is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119128" version="1" comment="samba-doc is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119129" version="1" comment="samba-libs is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119130" version="1" comment="samba-libs-32bit is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119131" version="1" comment="samba-winbind is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119132" version="1" comment="samba-winbind-32bit is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119133" version="1" comment="talloc is &lt;2.1.5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118661" version="1" comment="xen is &lt;4.5.2_02-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118780" version="1" comment="xen-kmp-default is &lt;4.5.2_02_k3.12.49_11-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118781" version="1" comment="xen-libs is &lt;4.5.2_02-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118782" version="1" comment="xen-libs-32bit is &lt;4.5.2_02-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129344" version="1" comment="kernel-default is &lt;3.12.59-60.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129345" version="1" comment="kernel-default-devel is &lt;3.12.59-60.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129346" version="1" comment="kernel-default-extra is &lt;3.12.59-60.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129347" version="1" comment="kernel-devel is &lt;3.12.59-60.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129348" version="1" comment="kernel-macros is &lt;3.12.59-60.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129349" version="1" comment="kernel-source is &lt;3.12.59-60.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129350" version="1" comment="kernel-syms is &lt;3.12.59-60.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129351" version="1" comment="kernel-xen is &lt;3.12.59-60.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129352" version="1" comment="kernel-xen-devel is &lt;3.12.59-60.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129369" version="1" comment="qemu is &lt;2.3.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129370" version="1" comment="qemu-block-curl is &lt;2.3.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129371" version="1" comment="qemu-ipxe is &lt;1.0.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129372" version="1" comment="qemu-kvm is &lt;2.3.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129373" version="1" comment="qemu-seabios is &lt;1.8.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129374" version="1" comment="qemu-sgabios is &lt;8-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129375" version="1" comment="qemu-tools is &lt;2.3.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129376" version="1" comment="qemu-vgabios is &lt;1.8.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129377" version="1" comment="qemu-x86 is &lt;2.3.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129402" version="1" comment="kernel-default is &lt;3.12.59-60.45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129403" version="1" comment="kernel-default-devel is &lt;3.12.59-60.45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129404" version="1" comment="kernel-default-extra is &lt;3.12.59-60.45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129405" version="1" comment="kernel-devel is &lt;3.12.59-60.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129406" version="1" comment="kernel-macros is &lt;3.12.59-60.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129407" version="1" comment="kernel-source is &lt;3.12.59-60.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129408" version="1" comment="kernel-syms is &lt;3.12.59-60.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129409" version="1" comment="kernel-xen is &lt;3.12.59-60.45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129410" version="1" comment="kernel-xen-devel is &lt;3.12.59-60.45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129722" version="1" comment="glibc is &lt;2.19-38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129723" version="1" comment="glibc-32bit is &lt;2.19-38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129724" version="1" comment="glibc-devel is &lt;2.19-38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129725" version="1" comment="glibc-devel-32bit is &lt;2.19-38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129726" version="1" comment="glibc-i18ndata is &lt;2.19-38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129727" version="1" comment="glibc-locale is &lt;2.19-38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129728" version="1" comment="glibc-locale-32bit is &lt;2.19-38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129729" version="1" comment="nscd is &lt;2.19-38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129904" version="1" comment="ImageMagick is &lt;6.8.8.1-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129905" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129906" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129907" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129908" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130569" version="1" comment="flash-player is &lt;11.2.202.632-137.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130570" version="1" comment="flash-player-gnome is &lt;11.2.202.632-137.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130723" version="1" comment="libarchive is &lt;3.1.2-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121638" version="1" comment="bind is &lt;9.9.6P1-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121639" version="1" comment="bind-libs is &lt;9.9.6P1-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121640" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121641" version="1" comment="bind-utils is &lt;9.9.6P1-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130787" version="1" comment="gimp is &lt;2.8.10-7.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130788" version="1" comment="gimp-lang is &lt;2.8.10-7.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130789" version="1" comment="gimp-plugins-python is &lt;2.8.10-7.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130790" version="1" comment="libgimp-2_0-0 is &lt;2.8.10-7.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130791" version="1" comment="libgimpui-2_0-0 is &lt;2.8.10-7.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130964" version="1" comment="libvirt is &lt;1.2.18.4-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130965" version="1" comment="libvirt-client is &lt;1.2.18.4-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130966" version="1" comment="libvirt-client-32bit is &lt;1.2.18.4-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130967" version="1" comment="libvirt-daemon is &lt;1.2.18.4-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130968" version="1" comment="libvirt-daemon-config-network is &lt;1.2.18.4-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130969" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.18.4-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130970" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.18.4-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130971" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.18.4-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130972" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.18.4-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130973" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.18.4-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130974" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.18.4-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130975" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.18.4-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130976" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.18.4-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130977" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.18.4-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130978" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.18.4-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130979" version="1" comment="libvirt-daemon-lxc is &lt;1.2.18.4-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130980" version="1" comment="libvirt-daemon-qemu is &lt;1.2.18.4-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130981" version="1" comment="libvirt-daemon-xen is &lt;1.2.18.4-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130982" version="1" comment="libvirt-doc is &lt;1.2.18.4-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130988" version="1" comment="libidn is &lt;1.28-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130991" version="1" comment="xen is &lt;4.5.3_08-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130992" version="1" comment="xen-kmp-default is &lt;4.5.3_08_k3.12.59_60.45-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130993" version="1" comment="xen-libs is &lt;4.5.3_08-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130994" version="1" comment="xen-libs-32bit is &lt;4.5.3_08-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121536" version="1" comment="kernel-default is &lt;3.12.51-60.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121537" version="1" comment="kernel-default-devel is &lt;3.12.51-60.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121538" version="1" comment="kernel-default-extra is &lt;3.12.51-60.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121539" version="1" comment="kernel-devel is &lt;3.12.51-60.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121540" version="1" comment="kernel-macros is &lt;3.12.51-60.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121541" version="1" comment="kernel-source is &lt;3.12.51-60.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121542" version="1" comment="kernel-syms is &lt;3.12.51-60.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121543" version="1" comment="kernel-xen is &lt;3.12.51-60.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121544" version="1" comment="kernel-xen-devel is &lt;3.12.51-60.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131004" version="1" comment="kernel-default is &lt;3.12.62-60.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131005" version="1" comment="kernel-default-devel is &lt;3.12.62-60.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131006" version="1" comment="kernel-default-extra is &lt;3.12.62-60.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131007" version="1" comment="kernel-devel is &lt;3.12.62-60.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131008" version="1" comment="kernel-macros is &lt;3.12.62-60.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131009" version="1" comment="kernel-source is &lt;3.12.62-60.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131010" version="1" comment="kernel-syms is &lt;3.12.62-60.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131011" version="1" comment="kernel-xen is &lt;3.12.62-60.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131012" version="1" comment="kernel-xen-devel is &lt;3.12.62-60.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131015" version="1" comment="MozillaFirefox is &lt;45.3.0esr-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131016" version="1" comment="MozillaFirefox-translations is &lt;45.3.0esr-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131017" version="1" comment="krb5 is &lt;1.12.1-36.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131018" version="1" comment="krb5-32bit is &lt;1.12.1-36.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131019" version="1" comment="krb5-client is &lt;1.12.1-36.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131021" version="1" comment="rsync is &lt;3.1.0-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131024" version="1" comment="xerces-c is &lt;3.1.1-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131025" version="1" comment="libstorage is &lt;2.25.35.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131026" version="1" comment="libstorage-ruby is &lt;2.25.35.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131027" version="1" comment="libstorage6 is &lt;2.25.35.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131028" version="1" comment="fontconfig is &lt;2.11.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131029" version="1" comment="fontconfig-32bit is &lt;2.11.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131030" version="1" comment="libmysqlclient18 is &lt;10.0.26-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131031" version="1" comment="libmysqlclient18-32bit is &lt;10.0.26-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131032" version="1" comment="libmysqlclient_r18 is &lt;10.0.26-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131033" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.26-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131034" version="1" comment="mariadb is &lt;10.0.26-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131035" version="1" comment="mariadb-client is &lt;10.0.26-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131036" version="1" comment="mariadb-errormessages is &lt;10.0.26-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131045" version="1" comment="openssh is &lt;6.6p1-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131046" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131047" version="1" comment="openssh-helpers is &lt;6.6p1-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131050" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131051" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131052" version="1" comment="libdcerpc0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131053" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131054" version="1" comment="libgensec0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131055" version="1" comment="libgensec0-32bit is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131056" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131057" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131058" version="1" comment="libndr-nbt0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131059" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131060" version="1" comment="libndr-standard0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131061" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131062" version="1" comment="libndr0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131063" version="1" comment="libndr0-32bit is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131064" version="1" comment="libnetapi0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131065" version="1" comment="libnetapi0-32bit is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131066" version="1" comment="libregistry0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131067" version="1" comment="libsamba-credentials0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131068" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131069" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131070" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131071" version="1" comment="libsamba-passdb0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131072" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131073" version="1" comment="libsamba-util0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131074" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131075" version="1" comment="libsamdb0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131076" version="1" comment="libsamdb0-32bit is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131077" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131078" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131079" version="1" comment="libsmbclient0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131080" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131081" version="1" comment="libsmbconf0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131082" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131083" version="1" comment="libsmbldap0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131084" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131085" version="1" comment="libtevent-util0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131086" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131087" version="1" comment="libwbclient0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131088" version="1" comment="libwbclient0-32bit is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131089" version="1" comment="samba is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131090" version="1" comment="samba-32bit is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131091" version="1" comment="samba-client is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131092" version="1" comment="samba-client-32bit is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131093" version="1" comment="samba-doc is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131094" version="1" comment="samba-libs is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131095" version="1" comment="samba-libs-32bit is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131096" version="1" comment="samba-winbind is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131097" version="1" comment="samba-winbind-32bit is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131099" version="1" comment="flash-player is &lt;11.2.202.635-140.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131100" version="1" comment="flash-player-gnome is &lt;11.2.202.635-140.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131104" version="1" comment="libgcrypt is &lt;1.6.1-16.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131125" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131126" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131127" version="1" comment="openssl is &lt;1.0.1i-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131143" version="1" comment="postgresql94-libs is &lt;9.4.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131147" version="1" comment="compat-openssl098 is &lt;0.9.8j-102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131196" version="1" comment="xen is &lt;4.5.3_10-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131197" version="1" comment="xen-kmp-default is &lt;4.5.3_10_k3.12.62_60.62-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131198" version="1" comment="xen-libs is &lt;4.5.3_10-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131199" version="1" comment="xen-libs-32bit is &lt;4.5.3_10-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131200" version="1" comment="libgudev-1_0-0 is &lt;210-114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131201" version="1" comment="libgudev-1_0-0-32bit is &lt;210-114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131202" version="1" comment="libudev1 is &lt;210-114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131203" version="1" comment="libudev1-32bit is &lt;210-114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131204" version="1" comment="systemd is &lt;210-114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131205" version="1" comment="systemd-32bit is &lt;210-114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131206" version="1" comment="systemd-bash-completion is &lt;210-114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131207" version="1" comment="systemd-sysvinit is &lt;210-114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131208" version="1" comment="udev is &lt;210-114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131209" version="1" comment="ghostscript is &lt;9.15-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131210" version="1" comment="ghostscript-x11 is &lt;9.15-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131211" version="1" comment="libtiff5 is &lt;4.0.6-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131212" version="1" comment="libtiff5-32bit is &lt;4.0.6-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131213" version="1" comment="tiff is &lt;4.0.6-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131214" version="1" comment="freerdp is &lt;1.0.2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131215" version="1" comment="libfreerdp-1_0 is &lt;1.0.2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131216" version="1" comment="libfreerdp-1_0-plugins is &lt;1.0.2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131217" version="1" comment="libX11 is &lt;1.6.2-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131218" version="1" comment="libX11-6 is &lt;1.6.2-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131219" version="1" comment="libX11-6-32bit is &lt;1.6.2-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131220" version="1" comment="libX11-data is &lt;1.6.2-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131221" version="1" comment="libX11-xcb1 is &lt;1.6.2-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131222" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131223" version="1" comment="libXfixes is &lt;5.0.1-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131224" version="1" comment="libXfixes3 is &lt;5.0.1-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131225" version="1" comment="libXfixes3-32bit is &lt;5.0.1-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131226" version="1" comment="libXi is &lt;1.7.4-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131227" version="1" comment="libXi6 is &lt;1.7.4-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131228" version="1" comment="libXi6-32bit is &lt;1.7.4-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131229" version="1" comment="libXrandr is &lt;1.4.2-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131230" version="1" comment="libXrandr2 is &lt;1.4.2-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131231" version="1" comment="libXrandr2-32bit is &lt;1.4.2-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131232" version="1" comment="libXrender is &lt;0.9.8-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131233" version="1" comment="libXrender1 is &lt;0.9.8-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131234" version="1" comment="libXrender1-32bit is &lt;0.9.8-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131235" version="1" comment="libXtst is &lt;1.2.2-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131236" version="1" comment="libXtst6 is &lt;1.2.2-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131237" version="1" comment="libXtst6-32bit is &lt;1.2.2-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131238" version="1" comment="libXv is &lt;1.0.10-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131239" version="1" comment="libXv1 is &lt;1.0.10-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131240" version="1" comment="libXv1-32bit is &lt;1.0.10-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131241" version="1" comment="libXvMC is &lt;1.0.8-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131242" version="1" comment="libXvMC1 is &lt;1.0.8-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131243" version="1" comment="flash-player is &lt;11.2.202.637-143.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131244" version="1" comment="flash-player-gnome is &lt;11.2.202.637-143.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131245" version="1" comment="gtk2 is &lt;2.24.24-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131246" version="1" comment="gtk2-lang is &lt;2.24.24-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131247" version="1" comment="gtk2-tools is &lt;2.24.24-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131248" version="1" comment="gtk2-tools-32bit is &lt;2.24.24-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131249" version="1" comment="libgtk-2_0-0 is &lt;2.24.24-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131250" version="1" comment="libgtk-2_0-0-32bit is &lt;2.24.24-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131251" version="1" comment="typelib-1_0-Gtk-2_0 is &lt;2.24.24-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131252" version="1" comment="kdump is &lt;0.8.15-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131253" version="1" comment="dbus-1 is &lt;1.8.22-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131254" version="1" comment="dbus-1-x11 is &lt;1.8.22-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131255" version="1" comment="libdbus-1-3 is &lt;1.8.22-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131256" version="1" comment="libdbus-1-3-32bit is &lt;1.8.22-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131257" version="1" comment="libipa_hbac0 is &lt;1.11.5.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131258" version="1" comment="libsss_idmap0 is &lt;1.11.5.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131259" version="1" comment="libsss_sudo is &lt;1.11.5.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131260" version="1" comment="python-sssd-config is &lt;1.11.5.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131261" version="1" comment="sssd is &lt;1.11.5.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131262" version="1" comment="sssd-32bit is &lt;1.11.5.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131263" version="1" comment="sssd-ad is &lt;1.11.5.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131264" version="1" comment="sssd-ipa is &lt;1.11.5.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131265" version="1" comment="sssd-krb5 is &lt;1.11.5.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131266" version="1" comment="sssd-krb5-common is &lt;1.11.5.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131267" version="1" comment="sssd-ldap is &lt;1.11.5.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131268" version="1" comment="sssd-proxy is &lt;1.11.5.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131269" version="1" comment="sssd-tools is &lt;1.11.5.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131270" version="1" comment="kernel-default is &lt;3.12.62-60.64.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131271" version="1" comment="kernel-default-devel is &lt;3.12.62-60.64.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131272" version="1" comment="kernel-default-extra is &lt;3.12.62-60.64.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131273" version="1" comment="kernel-devel is &lt;3.12.62-60.64.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131274" version="1" comment="kernel-macros is &lt;3.12.62-60.64.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131275" version="1" comment="kernel-source is &lt;3.12.62-60.64.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131276" version="1" comment="kernel-syms is &lt;3.12.62-60.64.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131277" version="1" comment="kernel-xen is &lt;3.12.62-60.64.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131278" version="1" comment="kernel-xen-devel is &lt;3.12.62-60.64.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131279" version="1" comment="qemu is &lt;2.3.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131280" version="1" comment="qemu-block-curl is &lt;2.3.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131281" version="1" comment="qemu-ipxe is &lt;1.0.0-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131282" version="1" comment="qemu-kvm is &lt;2.3.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131283" version="1" comment="qemu-seabios is &lt;1.8.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131284" version="1" comment="qemu-sgabios is &lt;8-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131285" version="1" comment="qemu-tools is &lt;2.3.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131286" version="1" comment="qemu-vgabios is &lt;1.8.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131287" version="1" comment="qemu-x86 is &lt;2.3.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131288" version="1" comment="libxml2 is &lt;2.9.1-26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131289" version="1" comment="libxml2-2 is &lt;2.9.1-26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131290" version="1" comment="libxml2-2-32bit is &lt;2.9.1-26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131291" version="1" comment="libxml2-tools is &lt;2.9.1-26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131292" version="1" comment="python-libxml2 is &lt;2.9.1-26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131293" version="1" comment="ghostscript is &lt;9.15-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131294" version="1" comment="ghostscript-x11 is &lt;9.15-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131295" version="1" comment="libpython3_4m1_0 is &lt;3.4.5-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131296" version="1" comment="python3 is &lt;3.4.5-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131297" version="1" comment="python3-base is &lt;3.4.5-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131298" version="1" comment="openslp is &lt;2.0.0-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131299" version="1" comment="openslp-32bit is &lt;2.0.0-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131300" version="1" comment="flash-player is &lt;11.2.202.643-146.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131301" version="1" comment="flash-player-gnome is &lt;11.2.202.643-146.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131302" version="1" comment="gd is &lt;2.1.0-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131303" version="1" comment="gd-32bit is &lt;2.1.0-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131304" version="1" comment="ImageMagick is &lt;6.8.8.1-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131305" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131306" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131307" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131308" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135207" version="1" comment="bind is &lt;9.9.9P1-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135208" version="1" comment="bind-libs is &lt;9.9.9P1-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135209" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135210" version="1" comment="bind-utils is &lt;9.9.9P1-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135211" version="1" comment="curl is &lt;7.37.0-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135212" version="1" comment="libcurl4 is &lt;7.37.0-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135213" version="1" comment="libcurl4-32bit is &lt;7.37.0-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122059" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.72-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122062" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.72-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135356" version="1" comment="libblkid1 is &lt;2.25-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135357" version="1" comment="libblkid1-32bit is &lt;2.25-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135358" version="1" comment="libmount1 is &lt;2.25-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135359" version="1" comment="libmount1-32bit is &lt;2.25-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135360" version="1" comment="libsmartcols1 is &lt;2.25-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135361" version="1" comment="libuuid-devel is &lt;2.25-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135362" version="1" comment="libuuid1 is &lt;2.25-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135363" version="1" comment="libuuid1-32bit is &lt;2.25-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135364" version="1" comment="python-libmount is &lt;2.25-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135365" version="1" comment="util-linux is &lt;2.25-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135366" version="1" comment="util-linux-lang is &lt;2.25-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135367" version="1" comment="util-linux-systemd is &lt;2.25-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135368" version="1" comment="uuidd is &lt;2.25-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135369" version="1" comment="jasper is &lt;1.900.14-181.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135370" version="1" comment="libjasper1 is &lt;1.900.14-181.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135371" version="1" comment="libjasper1-32bit is &lt;1.900.14-181.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135487" version="1" comment="flash-player is &lt;11.2.202.644-149.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135488" version="1" comment="flash-player-gnome is &lt;11.2.202.644-149.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135538" version="1" comment="ghostscript is &lt;9.15-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135539" version="1" comment="ghostscript-x11 is &lt;9.15-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135541" version="1" comment="eog is &lt;3.10.2-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135542" version="1" comment="eog-lang is &lt;3.10.2-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135860" version="1" comment="bash is &lt;4.2-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135861" version="1" comment="bash-doc is &lt;4.2-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135862" version="1" comment="bash-lang is &lt;4.2-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135863" version="1" comment="libreadline6 is &lt;6.2-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135864" version="1" comment="libreadline6-32bit is &lt;6.2-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135865" version="1" comment="readline-doc is &lt;6.2-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135929" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.111-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135930" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.111-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135939" version="1" comment="tar is &lt;1.27.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135940" version="1" comment="tar-lang is &lt;1.27.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135941" version="1" comment="sudo is &lt;1.8.10p3-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135963" version="1" comment="libarchive is &lt;3.1.2-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135964" version="1" comment="libarchive13 is &lt;3.1.2-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135965" version="1" comment="kernel-default is &lt;3.12.67-60.64.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135966" version="1" comment="kernel-default-devel is &lt;3.12.67-60.64.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135967" version="1" comment="kernel-default-extra is &lt;3.12.67-60.64.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135968" version="1" comment="kernel-devel is &lt;3.12.67-60.64.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135969" version="1" comment="kernel-macros is &lt;3.12.67-60.64.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135970" version="1" comment="kernel-source is &lt;3.12.67-60.64.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135971" version="1" comment="kernel-syms is &lt;3.12.67-60.64.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135972" version="1" comment="kernel-xen is &lt;3.12.67-60.64.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135973" version="1" comment="kernel-xen-devel is &lt;3.12.67-60.64.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135995" version="1" comment="libmysqlclient18 is &lt;10.0.28-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135996" version="1" comment="libmysqlclient18-32bit is &lt;10.0.28-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135997" version="1" comment="libmysqlclient_r18 is &lt;10.0.28-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135998" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.28-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135999" version="1" comment="mariadb is &lt;10.0.28-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136000" version="1" comment="mariadb-client is &lt;10.0.28-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136001" version="1" comment="mariadb-errormessages is &lt;10.0.28-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136056" version="1" comment="gvim is &lt;7.4.326-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136057" version="1" comment="vim is &lt;7.4.326-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136058" version="1" comment="vim-data is &lt;7.4.326-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136131" version="1" comment="ImageMagick is &lt;6.8.8.1-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136132" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136133" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136134" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136135" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136136" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.121-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136137" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.121-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129316" version="1" comment="imap is &lt;2007e_suse-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129318" version="1" comment="libc-client2007e_suse is &lt;2007e_suse-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136208" version="1" comment="libpcre1 is &lt;8.39-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136209" version="1" comment="libpcre1-32bit is &lt;8.39-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136210" version="1" comment="libpcre16-0 is &lt;8.39-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136211" version="1" comment="libpcrecpp0 is &lt;8.39-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136212" version="1" comment="libpcrecpp0-32bit is &lt;8.39-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136213" version="1" comment="pcre is &lt;8.39-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136214" version="1" comment="qemu is &lt;2.3.1-24.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136215" version="1" comment="qemu-block-curl is &lt;2.3.1-24.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136216" version="1" comment="qemu-ipxe is &lt;1.0.0-24.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136217" version="1" comment="qemu-kvm is &lt;2.3.1-24.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136218" version="1" comment="qemu-seabios is &lt;1.8.1-24.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136219" version="1" comment="qemu-sgabios is &lt;8-24.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136220" version="1" comment="qemu-tools is &lt;2.3.1-24.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136221" version="1" comment="qemu-vgabios is &lt;1.8.1-24.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136222" version="1" comment="qemu-x86 is &lt;2.3.1-24.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136380" version="1" comment="libX11 is &lt;1.6.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136381" version="1" comment="libX11-6 is &lt;1.6.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136382" version="1" comment="libX11-6-32bit is &lt;1.6.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136383" version="1" comment="libX11-data is &lt;1.6.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136384" version="1" comment="libX11-xcb1 is &lt;1.6.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136385" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136386" version="1" comment="MozillaFirefox is &lt;45.5.0esr-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136387" version="1" comment="MozillaFirefox-translations is &lt;45.5.0esr-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136388" version="1" comment="libfreebl3 is &lt;3.21.3-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136389" version="1" comment="libfreebl3-32bit is &lt;3.21.3-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136390" version="1" comment="libsoftokn3 is &lt;3.21.3-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136391" version="1" comment="libsoftokn3-32bit is &lt;3.21.3-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136392" version="1" comment="mozilla-nss is &lt;3.21.3-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136393" version="1" comment="mozilla-nss-32bit is &lt;3.21.3-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136394" version="1" comment="mozilla-nss-certs is &lt;3.21.3-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136395" version="1" comment="mozilla-nss-certs-32bit is &lt;3.21.3-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136396" version="1" comment="mozilla-nss-sysinit is &lt;3.21.3-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136397" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.21.3-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136398" version="1" comment="mozilla-nss-tools is &lt;3.21.3-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136630" version="1" comment="kernel-default is &lt;3.12.67-60.64.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136631" version="1" comment="kernel-default-devel is &lt;3.12.67-60.64.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136632" version="1" comment="kernel-default-extra is &lt;3.12.67-60.64.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136633" version="1" comment="kernel-devel is &lt;3.12.67-60.64.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136634" version="1" comment="kernel-macros is &lt;3.12.67-60.64.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136635" version="1" comment="kernel-source is &lt;3.12.67-60.64.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136636" version="1" comment="kernel-syms is &lt;3.12.67-60.64.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136637" version="1" comment="kernel-xen is &lt;3.12.67-60.64.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136638" version="1" comment="kernel-xen-devel is &lt;3.12.67-60.64.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136639" version="1" comment="libXi is &lt;1.7.4-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136640" version="1" comment="libXi6 is &lt;1.7.4-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136641" version="1" comment="libXi6-32bit is &lt;1.7.4-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136642" version="1" comment="MozillaFirefox is &lt;45.5.1esr-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136643" version="1" comment="MozillaFirefox-translations is &lt;45.5.1esr-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136644" version="1" comment="w3m is &lt;0.5.3.git20161120-160.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136645" version="1" comment="gc is &lt;7.2d-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136646" version="1" comment="libgc1 is &lt;7.2d-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142349" version="1" comment="xen is &lt;4.5.5_02-22.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142350" version="1" comment="xen-kmp-default is &lt;4.5.5_02_k3.12.67_60.64.18-22.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142351" version="1" comment="xen-libs is &lt;4.5.5_02-22.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142352" version="1" comment="xen-libs-32bit is &lt;4.5.5_02-22.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142720" version="1" comment="libass is &lt;0.10.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142721" version="1" comment="libass5 is &lt;0.10.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142941" version="1" comment="flash-player is &lt;24.0.0.186-152.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142942" version="1" comment="flash-player-gnome is &lt;24.0.0.186-152.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143034" version="1" comment="libpcre1 is &lt;8.39-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143035" version="1" comment="libpcre1-32bit is &lt;8.39-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143036" version="1" comment="libpcre16-0 is &lt;8.39-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143037" version="1" comment="libpcrecpp0 is &lt;8.39-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143038" version="1" comment="libpcrecpp0-32bit is &lt;8.39-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143039" version="1" comment="pcre is &lt;8.39-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119621" version="1" comment="libmysqlclient18 is &lt;10.0.22-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119622" version="1" comment="libmysqlclient18-32bit is &lt;10.0.22-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119623" version="1" comment="libmysqlclient_r18 is &lt;10.0.22-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119624" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.22-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119625" version="1" comment="mariadb is &lt;10.0.22-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119626" version="1" comment="mariadb-client is &lt;10.0.22-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119627" version="1" comment="mariadb-errormessages is &lt;10.0.22-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143055" version="1" comment="kernel-default is &lt;3.12.67-60.64.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143056" version="1" comment="kernel-default-devel is &lt;3.12.67-60.64.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143057" version="1" comment="kernel-default-extra is &lt;3.12.67-60.64.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143058" version="1" comment="kernel-devel is &lt;3.12.67-60.64.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143059" version="1" comment="kernel-macros is &lt;3.12.67-60.64.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143060" version="1" comment="kernel-source is &lt;3.12.67-60.64.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143061" version="1" comment="kernel-syms is &lt;3.12.67-60.64.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143062" version="1" comment="kernel-xen is &lt;3.12.67-60.64.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143063" version="1" comment="kernel-xen-devel is &lt;3.12.67-60.64.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143413" version="1" comment="ntp is &lt;4.2.8p9-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143414" version="1" comment="ntp-doc is &lt;4.2.8p9-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144634" version="1" comment="xen is &lt;4.5.5_04-22.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144635" version="1" comment="xen-kmp-default is &lt;4.5.5_04_k3.12.67_60.64.24-22.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144636" version="1" comment="xen-libs is &lt;4.5.5_04-22.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144637" version="1" comment="xen-libs-32bit is &lt;4.5.5_04-22.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144638" version="1" comment="gd is &lt;2.1.0-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144639" version="1" comment="gd-32bit is &lt;2.1.0-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144640" version="1" comment="MozillaFirefox is &lt;45.6.0esr-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144641" version="1" comment="MozillaFirefox-translations is &lt;45.6.0esr-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145376" version="1" comment="libgme is &lt;0.6.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145377" version="1" comment="libgme0 is &lt;0.6.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145837" version="1" comment="ImageMagick is &lt;6.8.8.1-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145838" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145839" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145840" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145841" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145842" version="1" comment="wget is &lt;1.14-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145843" version="1" comment="dnsmasq is &lt;2.71-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145859" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145860" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145861" version="1" comment="libdcerpc0 is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145862" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145863" version="1" comment="libgensec0 is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145864" version="1" comment="libgensec0-32bit is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145865" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145866" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145867" version="1" comment="libndr-nbt0 is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145868" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145869" version="1" comment="libndr-standard0 is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145870" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145871" version="1" comment="libndr0 is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145872" version="1" comment="libndr0-32bit is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145873" version="1" comment="libnetapi0 is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145874" version="1" comment="libnetapi0-32bit is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145875" version="1" comment="libregistry0 is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145876" version="1" comment="libsamba-credentials0 is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145877" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145878" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145879" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145880" version="1" comment="libsamba-passdb0 is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145881" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145882" version="1" comment="libsamba-util0 is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145883" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145884" version="1" comment="libsamdb0 is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145885" version="1" comment="libsamdb0-32bit is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145886" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145887" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145888" version="1" comment="libsmbclient0 is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145889" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145890" version="1" comment="libsmbconf0 is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145891" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145892" version="1" comment="libsmbldap0 is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145893" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145894" version="1" comment="libtevent-util0 is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145895" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145896" version="1" comment="libwbclient0 is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145897" version="1" comment="libwbclient0-32bit is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145898" version="1" comment="samba is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145899" version="1" comment="samba-32bit is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145900" version="1" comment="samba-client is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145901" version="1" comment="samba-client-32bit is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145902" version="1" comment="samba-doc is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145903" version="1" comment="samba-libs is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145904" version="1" comment="samba-libs-32bit is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145905" version="1" comment="samba-winbind is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145906" version="1" comment="samba-winbind-32bit is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146001" version="1" comment="gstreamer-plugins-good is &lt;1.2.4-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146002" version="1" comment="gstreamer-plugins-good-lang is &lt;1.2.4-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146003" version="1" comment="libcares2 is &lt;1.9.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146004" version="1" comment="libcares2-32bit is &lt;1.9.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146005" version="1" comment="gstreamer-plugins-bad is &lt;1.2.4-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146006" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.2.4-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146007" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.2.4-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146008" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.2.4-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146009" version="1" comment="libgstegl-1_0-0 is &lt;1.2.4-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146010" version="1" comment="libgstmpegts-1_0-0 is &lt;1.2.4-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146011" version="1" comment="libgstphotography-1_0-0 is &lt;1.2.4-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146012" version="1" comment="libtiff5 is &lt;4.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146013" version="1" comment="libtiff5-32bit is &lt;4.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146014" version="1" comment="tiff is &lt;4.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118792" version="1" comment="qemu is &lt;2.3.1-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118793" version="1" comment="qemu-block-curl is &lt;2.3.1-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118794" version="1" comment="qemu-ipxe is &lt;1.0.0-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118795" version="1" comment="qemu-kvm is &lt;2.3.1-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118796" version="1" comment="qemu-seabios is &lt;1.8.1-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118797" version="1" comment="qemu-sgabios is &lt;8-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118798" version="1" comment="qemu-tools is &lt;2.3.1-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118799" version="1" comment="qemu-vgabios is &lt;1.8.1-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118800" version="1" comment="qemu-x86 is &lt;2.3.1-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122332" version="1" comment="glibc is &lt;2.19-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122333" version="1" comment="glibc-32bit is &lt;2.19-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122334" version="1" comment="glibc-devel is &lt;2.19-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122335" version="1" comment="glibc-devel-32bit is &lt;2.19-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122336" version="1" comment="glibc-i18ndata is &lt;2.19-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122337" version="1" comment="glibc-locale is &lt;2.19-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122338" version="1" comment="glibc-locale-32bit is &lt;2.19-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122339" version="1" comment="nscd is &lt;2.19-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122216" version="1" comment="dhcp is &lt;4.3.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122217" version="1" comment="dhcp-client is &lt;4.3.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123221" version="1" comment="kernel-default is &lt;3.12.53-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123222" version="1" comment="kernel-default-devel is &lt;3.12.53-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123223" version="1" comment="kernel-default-extra is &lt;3.12.53-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123224" version="1" comment="kernel-devel is &lt;3.12.53-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123225" version="1" comment="kernel-macros is &lt;3.12.53-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123226" version="1" comment="kernel-source is &lt;3.12.53-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123227" version="1" comment="kernel-syms is &lt;3.12.53-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123228" version="1" comment="kernel-xen is &lt;3.12.53-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123229" version="1" comment="kernel-xen-devel is &lt;3.12.53-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119232" version="1" comment="libpng15 is &lt;1.5.22-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123869" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123870" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123871" version="1" comment="openssl is &lt;1.0.1i-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124720" version="1" comment="bind is &lt;9.9.6P1-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124721" version="1" comment="bind-libs is &lt;9.9.6P1-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124722" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124723" version="1" comment="bind-utils is &lt;9.9.6P1-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124928" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124929" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124930" version="1" comment="libdcerpc0 is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124931" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124932" version="1" comment="libgensec0 is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124933" version="1" comment="libgensec0-32bit is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124934" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124935" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124936" version="1" comment="libndr-nbt0 is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124937" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124938" version="1" comment="libndr-standard0 is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124939" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124940" version="1" comment="libndr0 is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124941" version="1" comment="libndr0-32bit is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124942" version="1" comment="libnetapi0 is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124943" version="1" comment="libnetapi0-32bit is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124944" version="1" comment="libregistry0 is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124945" version="1" comment="libsamba-credentials0 is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124946" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124947" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124948" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124949" version="1" comment="libsamba-passdb0 is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124950" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124951" version="1" comment="libsamba-util0 is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124952" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124953" version="1" comment="libsamdb0 is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124954" version="1" comment="libsamdb0-32bit is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124955" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124956" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124957" version="1" comment="libsmbclient0 is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124958" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124959" version="1" comment="libsmbconf0 is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124960" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124961" version="1" comment="libsmbldap0 is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124962" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124963" version="1" comment="libtevent-util0 is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124964" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124965" version="1" comment="libwbclient0 is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124966" version="1" comment="libwbclient0-32bit is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124967" version="1" comment="samba is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124968" version="1" comment="samba-32bit is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124969" version="1" comment="samba-client is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124970" version="1" comment="samba-client-32bit is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124971" version="1" comment="samba-doc is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124972" version="1" comment="samba-libs is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124973" version="1" comment="samba-libs-32bit is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124974" version="1" comment="samba-winbind is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124975" version="1" comment="samba-winbind-32bit is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125323" version="1" comment="xen is &lt;4.5.2_06-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125324" version="1" comment="xen-kmp-default is &lt;4.5.2_06_k3.12.53_60.30-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125325" version="1" comment="xen-libs is &lt;4.5.2_06-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125326" version="1" comment="xen-libs-32bit is &lt;4.5.2_06-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125608" version="1" comment="libvirt is &lt;1.2.18.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125609" version="1" comment="libvirt-client is &lt;1.2.18.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125610" version="1" comment="libvirt-client-32bit is &lt;1.2.18.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125611" version="1" comment="libvirt-daemon is &lt;1.2.18.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125612" version="1" comment="libvirt-daemon-config-network is &lt;1.2.18.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125613" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.18.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125614" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.18.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125615" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.18.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125616" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.18.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125617" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.18.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125618" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.18.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125619" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.18.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125620" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.18.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125621" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.18.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125622" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.18.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125623" version="1" comment="libvirt-daemon-lxc is &lt;1.2.18.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125624" version="1" comment="libvirt-daemon-qemu is &lt;1.2.18.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125625" version="1" comment="libvirt-daemon-xen is &lt;1.2.18.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125626" version="1" comment="libvirt-doc is &lt;1.2.18.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125671" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.77-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125672" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.77-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125799" version="1" comment="kernel-default is &lt;3.12.57-60.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125800" version="1" comment="kernel-default-devel is &lt;3.12.57-60.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125801" version="1" comment="kernel-default-extra is &lt;3.12.57-60.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125802" version="1" comment="kernel-devel is &lt;3.12.57-60.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125803" version="1" comment="kernel-macros is &lt;3.12.57-60.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125804" version="1" comment="kernel-source is &lt;3.12.57-60.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125805" version="1" comment="kernel-syms is &lt;3.12.57-60.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125806" version="1" comment="kernel-xen is &lt;3.12.57-60.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125807" version="1" comment="kernel-xen-devel is &lt;3.12.57-60.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125808" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125809" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125810" version="1" comment="libdcerpc0 is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125811" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125812" version="1" comment="libgensec0 is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125813" version="1" comment="libgensec0-32bit is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125814" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125815" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125816" version="1" comment="libndr-nbt0 is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125817" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125818" version="1" comment="libndr-standard0 is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125819" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125820" version="1" comment="libndr0 is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125821" version="1" comment="libndr0-32bit is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125822" version="1" comment="libnetapi0 is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125823" version="1" comment="libnetapi0-32bit is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125824" version="1" comment="libregistry0 is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125825" version="1" comment="libsamba-credentials0 is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125826" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125827" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125828" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125829" version="1" comment="libsamba-passdb0 is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125830" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125831" version="1" comment="libsamba-util0 is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125832" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125833" version="1" comment="libsamdb0 is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125834" version="1" comment="libsamdb0-32bit is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125835" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125836" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125837" version="1" comment="libsmbclient0 is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125838" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125839" version="1" comment="libsmbconf0 is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125840" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125841" version="1" comment="libsmbldap0 is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125842" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125843" version="1" comment="libtevent-util0 is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125844" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125845" version="1" comment="libwbclient0 is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125846" version="1" comment="libwbclient0-32bit is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125847" version="1" comment="samba is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125848" version="1" comment="samba-32bit is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125849" version="1" comment="samba-client is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125850" version="1" comment="samba-client-32bit is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125851" version="1" comment="samba-doc is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125852" version="1" comment="samba-libs is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125853" version="1" comment="samba-libs-32bit is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125854" version="1" comment="samba-winbind is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125855" version="1" comment="samba-winbind-32bit is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126458" version="1" comment="libcairo-script-interpreter2 is &lt;1.12.16-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126711" version="1" comment="yast2-users is &lt;3.1.41.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126902" version="1" comment="ntp is &lt;4.2.8p6-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126903" version="1" comment="ntp-doc is &lt;4.2.8p6-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126904" version="1" comment="yast2-ntp-client is &lt;3.1.22-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127136" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127137" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127138" version="1" comment="openssl is &lt;1.0.1i-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127267" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.91-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127268" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.91-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127475" version="1" comment="ntp is &lt;4.2.8p7-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127476" version="1" comment="ntp-doc is &lt;4.2.8p7-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127725" version="1" comment="libgudev-1_0-0 is &lt;210-104.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127726" version="1" comment="libgudev-1_0-0-32bit is &lt;210-104.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127727" version="1" comment="libudev1 is &lt;210-104.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127728" version="1" comment="libudev1-32bit is &lt;210-104.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127729" version="1" comment="systemd is &lt;210-104.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127730" version="1" comment="systemd-32bit is &lt;210-104.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127731" version="1" comment="systemd-bash-completion is &lt;210-104.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127732" version="1" comment="systemd-sysvinit is &lt;210-104.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127733" version="1" comment="udev is &lt;210-104.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121339" version="1" comment="python-requests is &lt;2.8.1-6.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128797" version="1" comment="libspice-server1 is &lt;0.12.5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128798" version="1" comment="spice is &lt;0.12.5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128946" version="1" comment="libmysqlclient18 is &lt;10.0.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128947" version="1" comment="libmysqlclient18-32bit is &lt;10.0.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128948" version="1" comment="libmysqlclient_r18 is &lt;10.0.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128949" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128950" version="1" comment="mariadb is &lt;10.0.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128951" version="1" comment="mariadb-client is &lt;10.0.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128952" version="1" comment="mariadb-errormessages is &lt;10.0.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147398" version="1" comment="gstreamer-0_10-plugins-good is &lt;0.10.31-13.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147399" version="1" comment="gstreamer-0_10-plugins-good-lang is &lt;0.10.31-13.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147083" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.36-11.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147084" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.36-11.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147087" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.36-11.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147088" version="1" comment="libgstapp-0_10-0 is &lt;0.10.36-11.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147089" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.36-11.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147090" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.36-11.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147091" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.36-11.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146506" version="1" comment="gstreamer-0_10-plugins-bad is &lt;0.10.23-19.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146507" version="1" comment="gstreamer-0_10-plugins-bad-lang is &lt;0.10.23-19.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146508" version="1" comment="libgstbasecamerabinsrc-0_10-23 is &lt;0.10.23-19.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146509" version="1" comment="libgstbasecamerabinsrc-0_10-23-32bit is &lt;0.10.23-19.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146510" version="1" comment="libgstbasevideo-0_10-23 is &lt;0.10.23-19.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146511" version="1" comment="libgstbasevideo-0_10-23-32bit is &lt;0.10.23-19.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146512" version="1" comment="libgstcodecparsers-0_10-23 is &lt;0.10.23-19.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146513" version="1" comment="libgstphotography-0_10-23 is &lt;0.10.23-19.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146514" version="1" comment="libgstphotography-0_10-23-32bit is &lt;0.10.23-19.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146515" version="1" comment="libgstsignalprocessor-0_10-23 is &lt;0.10.23-19.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146516" version="1" comment="libgstsignalprocessor-0_10-23-32bit is &lt;0.10.23-19.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146517" version="1" comment="libgstvdp-0_10-23 is &lt;0.10.23-19.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146518" version="1" comment="libgstvdp-0_10-23-32bit is &lt;0.10.23-19.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147923" version="1" comment="gstreamer-0_10-plugins-bad is &lt;0.10.23-19.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147924" version="1" comment="gstreamer-0_10-plugins-bad-lang is &lt;0.10.23-19.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147925" version="1" comment="libgstbasecamerabinsrc-0_10-23 is &lt;0.10.23-19.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147926" version="1" comment="libgstbasecamerabinsrc-0_10-23-32bit is &lt;0.10.23-19.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147927" version="1" comment="libgstbasevideo-0_10-23 is &lt;0.10.23-19.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147928" version="1" comment="libgstbasevideo-0_10-23-32bit is &lt;0.10.23-19.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147929" version="1" comment="libgstcodecparsers-0_10-23 is &lt;0.10.23-19.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147930" version="1" comment="libgstphotography-0_10-23 is &lt;0.10.23-19.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147931" version="1" comment="libgstphotography-0_10-23-32bit is &lt;0.10.23-19.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147932" version="1" comment="libgstsignalprocessor-0_10-23 is &lt;0.10.23-19.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147933" version="1" comment="libgstsignalprocessor-0_10-23-32bit is &lt;0.10.23-19.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147934" version="1" comment="libgstvdp-0_10-23 is &lt;0.10.23-19.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147935" version="1" comment="libgstvdp-0_10-23-32bit is &lt;0.10.23-19.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147966" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.121-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147967" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.121-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148004" version="1" comment="gnutls is &lt;3.2.15-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148005" version="1" comment="libgnutls28 is &lt;3.2.15-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148006" version="1" comment="libgnutls28-32bit is &lt;3.2.15-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148035" version="1" comment="cpio is &lt;2.11-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148036" version="1" comment="cpio-lang is &lt;2.11-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148134" version="1" comment="guile is &lt;2.0.9-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148135" version="1" comment="guile-modules-2_0 is &lt;2.0.9-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148136" version="1" comment="libguile-2_0-22 is &lt;2.0.9-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148137" version="1" comment="libspice-server1 is &lt;0.12.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148138" version="1" comment="spice is &lt;0.12.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148197" version="1" comment="libmysqlclient18 is &lt;10.0.29-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148198" version="1" comment="libmysqlclient18-32bit is &lt;10.0.29-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148199" version="1" comment="libmysqlclient_r18 is &lt;10.0.29-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148200" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.29-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148201" version="1" comment="mariadb is &lt;10.0.29-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148202" version="1" comment="mariadb-client is &lt;10.0.29-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148203" version="1" comment="mariadb-errormessages is &lt;10.0.29-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148243" version="1" comment="expat is &lt;2.1.0-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148244" version="1" comment="libexpat1 is &lt;2.1.0-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148245" version="1" comment="libexpat1-32bit is &lt;2.1.0-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148246" version="1" comment="MozillaFirefox is &lt;45.7.0esr-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148247" version="1" comment="MozillaFirefox-translations is &lt;45.7.0esr-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148261" version="1" comment="libopus0 is &lt;1.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148262" version="1" comment="opus is &lt;1.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148341" version="1" comment="libtiff5 is &lt;4.0.7-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148342" version="1" comment="libtiff5-32bit is &lt;4.0.7-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148343" version="1" comment="tiff is &lt;4.0.7-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148395" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-54.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148396" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-54.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148397" version="1" comment="openssl is &lt;1.0.1i-54.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148398" version="1" comment="kernel-default is &lt;3.12.69-60.64.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148399" version="1" comment="kernel-default-devel is &lt;3.12.69-60.64.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148400" version="1" comment="kernel-default-extra is &lt;3.12.69-60.64.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148401" version="1" comment="kernel-devel is &lt;3.12.69-60.64.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148402" version="1" comment="kernel-macros is &lt;3.12.69-60.64.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148403" version="1" comment="kernel-source is &lt;3.12.69-60.64.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148404" version="1" comment="kernel-syms is &lt;3.12.69-60.64.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148405" version="1" comment="kernel-xen is &lt;3.12.69-60.64.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148406" version="1" comment="kernel-xen-devel is &lt;3.12.69-60.64.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148435" version="1" comment="libXpm is &lt;3.5.11-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148436" version="1" comment="libXpm4 is &lt;3.5.11-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148437" version="1" comment="libXpm4-32bit is &lt;3.5.11-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148438" version="1" comment="gd is &lt;2.1.0-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148439" version="1" comment="gd-32bit is &lt;2.1.0-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148440" version="1" comment="ppp is &lt;2.4.7-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148539" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.131-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148540" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.131-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148658" version="1" comment="tigervnc is &lt;1.4.3-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148659" version="1" comment="xorg-x11-Xvnc is &lt;1.4.3-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148660" version="1" comment="kernel-default is &lt;3.12.69-60.64.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148661" version="1" comment="kernel-default-devel is &lt;3.12.69-60.64.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148662" version="1" comment="kernel-default-extra is &lt;3.12.69-60.64.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148663" version="1" comment="kernel-devel is &lt;3.12.69-60.64.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148664" version="1" comment="kernel-macros is &lt;3.12.69-60.64.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148665" version="1" comment="kernel-source is &lt;3.12.69-60.64.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148666" version="1" comment="kernel-syms is &lt;3.12.69-60.64.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148667" version="1" comment="kernel-xen is &lt;3.12.69-60.64.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148668" version="1" comment="kernel-xen-devel is &lt;3.12.69-60.64.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148669" version="1" comment="flash-player is &lt;24.0.0.221-158.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148670" version="1" comment="flash-player-gnome is &lt;24.0.0.221-158.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146849" version="1" comment="jasper is &lt;1.900.14-184.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146850" version="1" comment="libjasper1 is &lt;1.900.14-184.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146851" version="1" comment="libjasper1-32bit is &lt;1.900.14-184.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148700" version="1" comment="ImageMagick is &lt;6.8.8.1-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148701" version="1" comment="libMagick++-6_Q16-3 is &lt;6.8.8.1-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148702" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.8.1-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148703" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.8.1-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148704" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.8.1-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148828" version="1" comment="libblkid1 is &lt;2.25-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148829" version="1" comment="libblkid1-32bit is &lt;2.25-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148830" version="1" comment="libmount1 is &lt;2.25-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148831" version="1" comment="libmount1-32bit is &lt;2.25-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148832" version="1" comment="libsmartcols1 is &lt;2.25-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148833" version="1" comment="libuuid-devel is &lt;2.25-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148834" version="1" comment="libuuid1 is &lt;2.25-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148835" version="1" comment="libuuid1-32bit is &lt;2.25-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148836" version="1" comment="python-libmount is &lt;2.25-40.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148837" version="1" comment="util-linux is &lt;2.25-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148838" version="1" comment="util-linux-lang is &lt;2.25-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148839" version="1" comment="util-linux-systemd is &lt;2.25-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148840" version="1" comment="uuidd is &lt;2.25-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148939" version="1" comment="xen is &lt;4.5.5_06-22.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148940" version="1" comment="xen-kmp-default is &lt;4.5.5_06_k3.12.69_60.64.32-22.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148941" version="1" comment="xen-libs is &lt;4.5.5_06-22.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148942" version="1" comment="xen-libs-32bit is &lt;4.5.5_06-22.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146177" version="1" comment="libz1 is &lt;1.2.8-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146178" version="1" comment="libz1-32bit is &lt;1.2.8-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146179" version="1" comment="zlib is &lt;1.2.8-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149099" version="1" comment="bind is &lt;9.9.9P1-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149100" version="1" comment="bind-libs is &lt;9.9.9P1-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149101" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149102" version="1" comment="bind-utils is &lt;9.9.9P1-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149122" version="1" comment="compat-openssl098 is &lt;0.9.8j-105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149123" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149124" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149133" version="1" comment="openssh is &lt;6.6p1-54.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149134" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-54.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149135" version="1" comment="openssh-helpers is &lt;6.6p1-54.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149136" version="1" comment="libquicktime is &lt;1.2.4-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149137" version="1" comment="libquicktime0 is &lt;1.2.4-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149424" version="1" comment="dracut is &lt;037-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149562" version="1" comment="dbus-1 is &lt;1.8.22-24.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149563" version="1" comment="dbus-1-x11 is &lt;1.8.22-24.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149564" version="1" comment="libdbus-1-3 is &lt;1.8.22-24.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149565" version="1" comment="libdbus-1-3-32bit is &lt;1.8.22-24.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149566" version="1" comment="gegl is &lt;0.2.0-10.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149567" version="1" comment="gegl-0_2 is &lt;0.2.0-10.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149568" version="1" comment="gegl-0_2-lang is &lt;0.2.0-10.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149569" version="1" comment="libgegl-0_2-0 is &lt;0.2.0-10.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149570" version="1" comment="libvmtools0 is &lt;10.1.0-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149571" version="1" comment="open-vm-tools is &lt;10.1.0-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149572" version="1" comment="open-vm-tools-desktop is &lt;10.1.0-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149573" version="1" comment="flash-player is &lt;25.0.0.127-162.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149574" version="1" comment="flash-player-gnome is &lt;25.0.0.127-162.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149619" version="1" comment="MozillaFirefox is &lt;45.8.0esr-102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149620" version="1" comment="MozillaFirefox-translations is &lt;45.8.0esr-102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149621" version="1" comment="sane-backends is &lt;1.0.24-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149622" version="1" comment="sane-backends-32bit is &lt;1.0.24-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149623" version="1" comment="sane-backends-autoconfig is &lt;1.0.24-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146857" version="1" comment="rrdtool is &lt;1.4.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146858" version="1" comment="rrdtool-cached is &lt;1.4.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146876" version="1" comment="flash-player is &lt;24.0.0.194-155.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146877" version="1" comment="flash-player-gnome is &lt;24.0.0.194-155.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146878" version="1" comment="bind is &lt;9.9.9P1-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146879" version="1" comment="bind-libs is &lt;9.9.9P1-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146880" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146881" version="1" comment="bind-utils is &lt;9.9.9P1-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147204" version="1" comment="gstreamer-plugins-base is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147205" version="1" comment="gstreamer-plugins-base-lang is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147206" version="1" comment="libgstallocators-1_0-0 is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147207" version="1" comment="libgstapp-1_0-0 is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147208" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147209" version="1" comment="libgstaudio-1_0-0 is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147210" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147211" version="1" comment="libgstfft-1_0-0 is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147212" version="1" comment="libgstfft-1_0-0-32bit is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147213" version="1" comment="libgstpbutils-1_0-0 is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147214" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147215" version="1" comment="libgstriff-1_0-0 is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147216" version="1" comment="libgstrtp-1_0-0 is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147217" version="1" comment="libgstrtsp-1_0-0 is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147218" version="1" comment="libgstsdp-1_0-0 is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147219" version="1" comment="libgsttag-1_0-0 is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147220" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147221" version="1" comment="libgstvideo-1_0-0 is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147222" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147223" version="1" comment="typelib-1_0-GstAudio-1_0 is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147224" version="1" comment="typelib-1_0-GstPbutils-1_0 is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147225" version="1" comment="typelib-1_0-GstTag-1_0 is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147226" version="1" comment="typelib-1_0-GstVideo-1_0 is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135543" version="1" comment="libX11 is &lt;1.6.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135544" version="1" comment="libX11-6 is &lt;1.6.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135545" version="1" comment="libX11-6-32bit is &lt;1.6.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135546" version="1" comment="libX11-data is &lt;1.6.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135547" version="1" comment="libX11-xcb1 is &lt;1.6.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135548" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135058" version="1" comment="libXfixes is &lt;5.0.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135061" version="1" comment="libXfixes3 is &lt;5.0.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135062" version="1" comment="libXfixes3-32bit is &lt;5.0.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135549" version="1" comment="libXi is &lt;1.7.4-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135550" version="1" comment="libXi6 is &lt;1.7.4-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135551" version="1" comment="libXi6-32bit is &lt;1.7.4-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135552" version="1" comment="libXrender is &lt;0.9.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135553" version="1" comment="libXrender1 is &lt;0.9.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135554" version="1" comment="libXrender1-32bit is &lt;0.9.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135078" version="1" comment="libXtst is &lt;1.2.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135081" version="1" comment="libXtst6 is &lt;1.2.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135082" version="1" comment="libXtst6-32bit is &lt;1.2.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135083" version="1" comment="libXv is &lt;1.0.10-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135086" version="1" comment="libXv1 is &lt;1.0.10-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135087" version="1" comment="libXv1-32bit is &lt;1.0.10-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135555" version="1" comment="libXvMC is &lt;1.0.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135556" version="1" comment="libXvMC1 is &lt;1.0.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135679" version="1" comment="libpython3_4m1_0 is &lt;3.4.5-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135680" version="1" comment="python3 is &lt;3.4.5-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135681" version="1" comment="python3-base is &lt;3.4.5-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135682" version="1" comment="python3-curses is &lt;3.4.5-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135866" version="1" comment="qemu is &lt;2.6.2-31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135867" version="1" comment="qemu-block-curl is &lt;2.6.2-31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135868" version="1" comment="qemu-ipxe is &lt;1.0.0-31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135869" version="1" comment="qemu-kvm is &lt;2.6.2-31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135870" version="1" comment="qemu-seabios is &lt;1.9.1-31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135871" version="1" comment="qemu-sgabios is &lt;8-31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135872" version="1" comment="qemu-tools is &lt;2.6.2-31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135873" version="1" comment="qemu-vgabios is &lt;1.9.1-31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135874" version="1" comment="qemu-x86 is &lt;2.6.2-31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135931" version="1" comment="sudo is &lt;1.8.10p3-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136138" version="1" comment="libblkid1 is &lt;2.28-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136139" version="1" comment="libblkid1-32bit is &lt;2.28-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136140" version="1" comment="libfdisk1 is &lt;2.28-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136141" version="1" comment="libmount1 is &lt;2.28-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136142" version="1" comment="libmount1-32bit is &lt;2.28-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136143" version="1" comment="libsmartcols1 is &lt;2.28-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136144" version="1" comment="libuuid-devel is &lt;2.28-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136145" version="1" comment="libuuid1 is &lt;2.28-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136146" version="1" comment="libuuid1-32bit is &lt;2.28-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136147" version="1" comment="python-libmount is &lt;2.28-42.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136148" version="1" comment="util-linux is &lt;2.28-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136149" version="1" comment="util-linux-lang is &lt;2.28-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136150" version="1" comment="util-linux-systemd is &lt;2.28-42.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136151" version="1" comment="uuidd is &lt;2.28-42.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136647" version="1" comment="kernel-default is &lt;4.4.21-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136648" version="1" comment="kernel-default-devel is &lt;4.4.21-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136649" version="1" comment="kernel-default-extra is &lt;4.4.21-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136650" version="1" comment="kernel-devel is &lt;4.4.21-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136651" version="1" comment="kernel-macros is &lt;4.4.21-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136652" version="1" comment="kernel-source is &lt;4.4.21-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136653" version="1" comment="kernel-syms is &lt;4.4.21-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142153" version="1" comment="xen is &lt;4.7.1_02-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142154" version="1" comment="xen-libs is &lt;4.7.1_02-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142155" version="1" comment="xen-libs-32bit is &lt;4.7.1_02-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142722" version="1" comment="kernel-default is &lt;4.4.21-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142723" version="1" comment="kernel-default-devel is &lt;4.4.21-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142724" version="1" comment="kernel-default-extra is &lt;4.4.21-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142725" version="1" comment="kernel-devel is &lt;4.4.21-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142726" version="1" comment="kernel-macros is &lt;4.4.21-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142727" version="1" comment="kernel-source is &lt;4.4.21-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142728" version="1" comment="kernel-syms is &lt;4.4.21-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144642" version="1" comment="xen is &lt;4.7.1_04-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144643" version="1" comment="xen-libs is &lt;4.7.1_04-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144644" version="1" comment="xen-libs-32bit is &lt;4.7.1_04-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145907" version="1" comment="libopenjp2-7 is &lt;2.1.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145908" version="1" comment="openjpeg2 is &lt;2.1.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145909" version="1" comment="libdcerpc-binding0 is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145910" version="1" comment="libdcerpc-binding0-32bit is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145911" version="1" comment="libdcerpc0 is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145912" version="1" comment="libdcerpc0-32bit is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145913" version="1" comment="libndr-krb5pac0 is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145914" version="1" comment="libndr-krb5pac0-32bit is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145915" version="1" comment="libndr-nbt0 is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145916" version="1" comment="libndr-nbt0-32bit is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145917" version="1" comment="libndr-standard0 is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145918" version="1" comment="libndr-standard0-32bit is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145919" version="1" comment="libndr0 is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145920" version="1" comment="libndr0-32bit is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145921" version="1" comment="libnetapi0 is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145922" version="1" comment="libnetapi0-32bit is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145923" version="1" comment="libsamba-credentials0 is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145924" version="1" comment="libsamba-credentials0-32bit is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145925" version="1" comment="libsamba-errors0 is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145926" version="1" comment="libsamba-errors0-32bit is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145927" version="1" comment="libsamba-hostconfig0 is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145928" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145929" version="1" comment="libsamba-passdb0 is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145930" version="1" comment="libsamba-passdb0-32bit is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145931" version="1" comment="libsamba-util0 is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145932" version="1" comment="libsamba-util0-32bit is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145933" version="1" comment="libsamdb0 is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145934" version="1" comment="libsamdb0-32bit is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145935" version="1" comment="libsmbclient0 is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145936" version="1" comment="libsmbclient0-32bit is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145937" version="1" comment="libsmbconf0 is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145938" version="1" comment="libsmbconf0-32bit is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145939" version="1" comment="libsmbldap0 is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145940" version="1" comment="libsmbldap0-32bit is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145941" version="1" comment="libtevent-util0 is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145942" version="1" comment="libtevent-util0-32bit is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145943" version="1" comment="libwbclient0 is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145944" version="1" comment="libwbclient0-32bit is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145945" version="1" comment="samba is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145946" version="1" comment="samba-client is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145947" version="1" comment="samba-client-32bit is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145948" version="1" comment="samba-doc is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145949" version="1" comment="samba-libs is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145950" version="1" comment="samba-libs-32bit is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145951" version="1" comment="samba-winbind is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145952" version="1" comment="samba-winbind-32bit is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145953" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146015" version="1" comment="gstreamer-plugins-bad is &lt;1.8.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146016" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.8.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146017" version="1" comment="libgstadaptivedemux-1_0-0 is &lt;1.8.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146018" version="1" comment="libgstbadaudio-1_0-0 is &lt;1.8.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146019" version="1" comment="libgstbadbase-1_0-0 is &lt;1.8.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146020" version="1" comment="libgstbadvideo-1_0-0 is &lt;1.8.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146021" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.8.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146022" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.8.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146023" version="1" comment="libgstgl-1_0-0 is &lt;1.8.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146024" version="1" comment="libgstmpegts-1_0-0 is &lt;1.8.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146025" version="1" comment="libgstphotography-1_0-0 is &lt;1.8.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146026" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.8.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146145" version="1" comment="gstreamer-plugins-good is &lt;1.8.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146146" version="1" comment="gstreamer-plugins-good-lang is &lt;1.8.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147348" version="1" comment="gstreamer-plugins-base is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147349" version="1" comment="gstreamer-plugins-base-lang is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147350" version="1" comment="libgstallocators-1_0-0 is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147351" version="1" comment="libgstapp-1_0-0 is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147352" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147353" version="1" comment="libgstaudio-1_0-0 is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147354" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147355" version="1" comment="libgstfft-1_0-0 is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147356" version="1" comment="libgstfft-1_0-0-32bit is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147357" version="1" comment="libgstpbutils-1_0-0 is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147358" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147359" version="1" comment="libgstriff-1_0-0 is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147360" version="1" comment="libgstrtp-1_0-0 is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147361" version="1" comment="libgstrtsp-1_0-0 is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147362" version="1" comment="libgstsdp-1_0-0 is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147363" version="1" comment="libgsttag-1_0-0 is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147364" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147365" version="1" comment="libgstvideo-1_0-0 is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147366" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147367" version="1" comment="typelib-1_0-GstAudio-1_0 is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147368" version="1" comment="typelib-1_0-GstPbutils-1_0 is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147369" version="1" comment="typelib-1_0-GstTag-1_0 is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147370" version="1" comment="typelib-1_0-GstVideo-1_0 is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147371" version="1" comment="gstreamer-0_10-plugins-good is &lt;0.10.31-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147372" version="1" comment="gstreamer-0_10-plugins-good-lang is &lt;0.10.31-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147400" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.36-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147401" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.36-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147402" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.36-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147403" version="1" comment="libgstapp-0_10-0 is &lt;0.10.36-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147404" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.36-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147405" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.36-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147406" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.36-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146519" version="1" comment="gstreamer-0_10-plugins-bad is &lt;0.10.23-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146520" version="1" comment="gstreamer-0_10-plugins-bad-lang is &lt;0.10.23-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146521" version="1" comment="libgstbasecamerabinsrc-0_10-23 is &lt;0.10.23-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146522" version="1" comment="libgstbasecamerabinsrc-0_10-23-32bit is &lt;0.10.23-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146523" version="1" comment="libgstbasevideo-0_10-23 is &lt;0.10.23-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146524" version="1" comment="libgstbasevideo-0_10-23-32bit is &lt;0.10.23-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146525" version="1" comment="libgstcodecparsers-0_10-23 is &lt;0.10.23-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146526" version="1" comment="libgstphotography-0_10-23 is &lt;0.10.23-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146527" version="1" comment="libgstphotography-0_10-23-32bit is &lt;0.10.23-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146528" version="1" comment="libgstsignalprocessor-0_10-23 is &lt;0.10.23-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146529" version="1" comment="libgstsignalprocessor-0_10-23-32bit is &lt;0.10.23-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146530" version="1" comment="libgstvdp-0_10-23 is &lt;0.10.23-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146531" version="1" comment="libgstvdp-0_10-23-32bit is &lt;0.10.23-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147473" version="1" comment="openssh is &lt;7.2p2-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147474" version="1" comment="openssh-askpass-gnome is &lt;7.2p2-66.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147475" version="1" comment="openssh-helpers is &lt;7.2p2-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147623" version="1" comment="libsystemd0 is &lt;228-132.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147624" version="1" comment="libsystemd0-32bit is &lt;228-132.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147625" version="1" comment="libudev1 is &lt;228-132.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147626" version="1" comment="libudev1-32bit is &lt;228-132.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147627" version="1" comment="systemd is &lt;228-132.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147628" version="1" comment="systemd-32bit is &lt;228-132.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147629" version="1" comment="systemd-bash-completion is &lt;228-132.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147630" version="1" comment="systemd-sysvinit is &lt;228-132.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147631" version="1" comment="udev is &lt;228-132.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147770" version="1" comment="libpcsclite1 is &lt;1.8.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147771" version="1" comment="libpcsclite1-32bit is &lt;1.8.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147772" version="1" comment="pcsc-lite is &lt;1.8.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147810" version="1" comment="dbus-1 is &lt;1.8.22-24.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147811" version="1" comment="dbus-1-x11 is &lt;1.8.22-24.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147812" version="1" comment="libdbus-1-3 is &lt;1.8.22-24.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147813" version="1" comment="libdbus-1-3-32bit is &lt;1.8.22-24.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147825" version="1" comment="gstreamer-0_10-plugins-bad is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147829" version="1" comment="gstreamer-0_10-plugins-bad-lang is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147830" version="1" comment="libgstbasecamerabinsrc-0_10-23 is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147831" version="1" comment="libgstbasecamerabinsrc-0_10-23-32bit is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147832" version="1" comment="libgstbasevideo-0_10-23 is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147833" version="1" comment="libgstbasevideo-0_10-23-32bit is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147834" version="1" comment="libgstcodecparsers-0_10-23 is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147836" version="1" comment="libgstphotography-0_10-23 is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147837" version="1" comment="libgstphotography-0_10-23-32bit is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147838" version="1" comment="libgstsignalprocessor-0_10-23 is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147839" version="1" comment="libgstsignalprocessor-0_10-23-32bit is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147840" version="1" comment="libgstvdp-0_10-23 is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147841" version="1" comment="libgstvdp-0_10-23-32bit is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148047" version="1" comment="libxml2 is &lt;2.9.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148048" version="1" comment="libxml2-2 is &lt;2.9.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148049" version="1" comment="libxml2-2-32bit is &lt;2.9.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148050" version="1" comment="libxml2-tools is &lt;2.9.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148051" version="1" comment="python-libxml2 is &lt;2.9.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146180" version="1" comment="libz1 is &lt;1.2.8-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146181" version="1" comment="libz1-32bit is &lt;1.2.8-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146182" version="1" comment="zlib is &lt;1.2.8-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146183" version="1" comment="zlib-devel is &lt;1.2.8-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148139" version="1" comment="libspice-server1 is &lt;0.12.7-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148140" version="1" comment="spice is &lt;0.12.7-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148318" version="1" comment="libopenssl-devel is &lt;1.0.2j-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148319" version="1" comment="libopenssl1_0_0 is &lt;1.0.2j-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148320" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.2j-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148321" version="1" comment="openssl is &lt;1.0.2j-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148841" version="1" comment="libblkid1 is &lt;2.28-44.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148842" version="1" comment="libblkid1-32bit is &lt;2.28-44.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148843" version="1" comment="libfdisk1 is &lt;2.28-44.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148844" version="1" comment="libmount1 is &lt;2.28-44.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148845" version="1" comment="libmount1-32bit is &lt;2.28-44.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148846" version="1" comment="libsmartcols1 is &lt;2.28-44.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148847" version="1" comment="libuuid-devel is &lt;2.28-44.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148848" version="1" comment="libuuid1 is &lt;2.28-44.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148849" version="1" comment="libuuid1-32bit is &lt;2.28-44.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148850" version="1" comment="python-libmount is &lt;2.28-44.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148851" version="1" comment="util-linux is &lt;2.28-44.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148852" version="1" comment="util-linux-lang is &lt;2.28-44.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148853" version="1" comment="util-linux-systemd is &lt;2.28-44.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148854" version="1" comment="uuidd is &lt;2.28-44.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148943" version="1" comment="xen is &lt;4.7.1_06-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148944" version="1" comment="xen-libs is &lt;4.7.1_06-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148945" version="1" comment="xen-libs-32bit is &lt;4.7.1_06-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149009" version="1" comment="kernel-default is &lt;4.4.49-92.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149010" version="1" comment="kernel-default-devel is &lt;4.4.49-92.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149011" version="1" comment="kernel-default-extra is &lt;4.4.49-92.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149012" version="1" comment="kernel-devel is &lt;4.4.49-92.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149013" version="1" comment="kernel-macros is &lt;4.4.49-92.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149014" version="1" comment="kernel-source is &lt;4.4.49-92.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149015" version="1" comment="kernel-syms is &lt;4.4.49-92.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149403" version="1" comment="libXvnc1 is &lt;1.6.0-16.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149404" version="1" comment="tigervnc is &lt;1.6.0-16.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149405" version="1" comment="xorg-x11-Xvnc is &lt;1.6.0-16.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149406" version="1" comment="qemu is &lt;2.6.2-41.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149407" version="1" comment="qemu-block-curl is &lt;2.6.2-41.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149408" version="1" comment="qemu-ipxe is &lt;1.0.0-41.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149409" version="1" comment="qemu-kvm is &lt;2.6.2-41.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149410" version="1" comment="qemu-seabios is &lt;1.9.1-41.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149411" version="1" comment="qemu-sgabios is &lt;8-41.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149412" version="1" comment="qemu-tools is &lt;2.6.2-41.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149413" version="1" comment="qemu-vgabios is &lt;1.9.1-41.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149414" version="1" comment="qemu-x86 is &lt;2.6.2-41.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149575" version="1" comment="gegl is &lt;0.2.0-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149576" version="1" comment="gegl-0_2 is &lt;0.2.0-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149577" version="1" comment="gegl-0_2-lang is &lt;0.2.0-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149578" version="1" comment="libgegl-0_2-0 is &lt;0.2.0-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149579" version="1" comment="libvmtools0 is &lt;10.1.0-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149580" version="1" comment="open-vm-tools is &lt;10.1.0-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149581" version="1" comment="open-vm-tools-desktop is &lt;10.1.0-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146960" version="1" comment="qemu is &lt;2.6.2-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146961" version="1" comment="qemu-block-curl is &lt;2.6.2-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146962" version="1" comment="qemu-ipxe is &lt;1.0.0-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146963" version="1" comment="qemu-kvm is &lt;2.6.2-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146964" version="1" comment="qemu-seabios is &lt;1.9.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146965" version="1" comment="qemu-sgabios is &lt;8-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146966" version="1" comment="qemu-tools is &lt;2.6.2-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146967" version="1" comment="qemu-vgabios is &lt;1.9.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146968" version="1" comment="qemu-x86 is &lt;2.6.2-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147227" version="1" comment="kernel-default is &lt;4.4.38-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147228" version="1" comment="kernel-default-devel is &lt;4.4.38-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147229" version="1" comment="kernel-default-extra is &lt;4.4.38-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147230" version="1" comment="kernel-devel is &lt;4.4.38-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147231" version="1" comment="kernel-macros is &lt;4.4.38-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147232" version="1" comment="kernel-source is &lt;4.4.38-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147233" version="1" comment="kernel-syms is &lt;4.4.38-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117426" version="1" comment="sle-ha-release is ==12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114326" version="1" comment="conntrack-tools is &lt;1.4.2-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114327" version="1" comment="libnetfilter_cthelper is &lt;1.0.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114329" version="1" comment="libnetfilter_cthelper0 is &lt;1.0.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114331" version="1" comment="libnetfilter_cttimeout is &lt;1.0.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114333" version="1" comment="libnetfilter_cttimeout1 is &lt;1.0.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114744" version="1" comment="haproxy is &lt;1.5.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146027" version="1" comment="ctdb is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146028" version="1" comment="samba is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125856" version="1" comment="ctdb is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130777" version="1" comment="hawk2 is &lt;1.0.1+git.1456406635.49e230d-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125858" version="1" comment="sle-ha-release is ==12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131309" version="1" comment="ctdb is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136223" version="1" comment="libpacemaker3 is &lt;1.1.13-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136224" version="1" comment="pacemaker is &lt;1.1.13-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136225" version="1" comment="pacemaker-cli is &lt;1.1.13-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136226" version="1" comment="pacemaker-cts is &lt;1.1.13-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136227" version="1" comment="pacemaker-remote is &lt;1.1.13-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136228" version="1" comment="libpcreposix0 is &lt;8.39-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143040" version="1" comment="libpcreposix0 is &lt;8.39-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145954" version="1" comment="ctdb is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125857" version="1" comment="ctdb is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149624" version="1" comment="lighttpd is &lt;1.4.35-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135875" version="1" comment="libpacemaker3 is &lt;1.1.15-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135876" version="1" comment="pacemaker is &lt;1.1.15-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135877" version="1" comment="pacemaker-cli is &lt;1.1.15-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135878" version="1" comment="pacemaker-cts is &lt;1.1.15-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135879" version="1" comment="pacemaker-remote is &lt;1.1.15-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135880" version="1" comment="sle-ha-release is ==12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136654" version="1" comment="cluster-md-kmp-default is &lt;4.4.21-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136655" version="1" comment="cluster-network-kmp-default is &lt;4.4.21-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136656" version="1" comment="dlm-kmp-default is &lt;4.4.21-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136657" version="1" comment="gfs2-kmp-default is &lt;4.4.21-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136658" version="1" comment="ocfs2-kmp-default is &lt;4.4.21-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142729" version="1" comment="cluster-md-kmp-default is &lt;4.4.21-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142730" version="1" comment="cluster-network-kmp-default is &lt;4.4.21-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142731" version="1" comment="dlm-kmp-default is &lt;4.4.21-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142732" version="1" comment="gfs2-kmp-default is &lt;4.4.21-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142733" version="1" comment="ocfs2-kmp-default is &lt;4.4.21-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145955" version="1" comment="ctdb is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149016" version="1" comment="cluster-md-kmp-default is &lt;4.4.49-92.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149017" version="1" comment="cluster-network-kmp-default is &lt;4.4.49-92.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149018" version="1" comment="dlm-kmp-default is &lt;4.4.49-92.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149019" version="1" comment="gfs2-kmp-default is &lt;4.4.49-92.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149020" version="1" comment="ocfs2-kmp-default is &lt;4.4.49-92.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147234" version="1" comment="cluster-md-kmp-default is &lt;4.4.38-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147235" version="1" comment="cluster-network-kmp-default is &lt;4.4.38-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147236" version="1" comment="dlm-kmp-default is &lt;4.4.38-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147237" version="1" comment="gfs2-kmp-default is &lt;4.4.38-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147238" version="1" comment="ocfs2-kmp-default is &lt;4.4.38-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107850" version="1" comment="kgraft-patch-3_12_38-44-default is &lt;1-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107851" version="1" comment="kgraft-patch-3_12_38-44-xen is &lt;1-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107852" version="1" comment="kgraft-patch-SLE12_Update_3 is &lt;1-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117427" version="1" comment="sle-live-patching-release is &gt;=12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108386" version="1" comment="kgraft-patch-3_12_39-47-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108387" version="1" comment="kgraft-patch-3_12_39-47-xen is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108388" version="1" comment="kgraft-patch-SLE12_Update_4 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117449" version="1" comment="kgraft-patch-3_12_32-33-default is &lt;2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117450" version="1" comment="kgraft-patch-3_12_32-33-xen is &lt;2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109209" version="1" comment="kgraft-patch-3_12_36-38-default is &lt;2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109210" version="1" comment="kgraft-patch-3_12_36-38-xen is &lt;2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117451" version="1" comment="kgraft-patch-SLE12_Update_1 is &lt;2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109211" version="1" comment="kgraft-patch-SLE12_Update_2 is &lt;2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110524" version="1" comment="kgraft-patch-3_12_43-52_6-default is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110525" version="1" comment="kgraft-patch-3_12_43-52_6-xen is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110526" version="1" comment="kgraft-patch-SLE12_Update_5 is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111589" version="1" comment="kgraft-patch-3_12_44-52_10-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111590" version="1" comment="kgraft-patch-3_12_44-52_10-xen is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111591" version="1" comment="kgraft-patch-SLE12_Update_6 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114149" version="1" comment="kgraft-patch-3_12_32-33-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114150" version="1" comment="kgraft-patch-3_12_32-33-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114151" version="1" comment="kgraft-patch-SLE12_Update_1 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114152" version="1" comment="kgraft-patch-3_12_36-38-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114153" version="1" comment="kgraft-patch-3_12_36-38-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114154" version="1" comment="kgraft-patch-SLE12_Update_2 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114155" version="1" comment="kgraft-patch-3_12_38-44-default is &lt;2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114156" version="1" comment="kgraft-patch-3_12_38-44-xen is &lt;2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114157" version="1" comment="kgraft-patch-SLE12_Update_3 is &lt;2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114158" version="1" comment="kgraft-patch-3_12_39-47-default is &lt;2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114159" version="1" comment="kgraft-patch-3_12_39-47-xen is &lt;2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114160" version="1" comment="kgraft-patch-SLE12_Update_4 is &lt;2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114161" version="1" comment="kgraft-patch-3_12_43-52_6-default is &lt;2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114162" version="1" comment="kgraft-patch-3_12_43-52_6-xen is &lt;2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114163" version="1" comment="kgraft-patch-SLE12_Update_5 is &lt;2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114449" version="1" comment="kgraft-patch-3_12_44-52_18-default is &lt;1-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114450" version="1" comment="kgraft-patch-3_12_44-52_18-xen is &lt;1-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114451" version="1" comment="kgraft-patch-SLE12_Update_7 is &lt;1-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115002" version="1" comment="kgraft-patch-3_12_48-52_27-default is &lt;1-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115003" version="1" comment="kgraft-patch-3_12_48-52_27-xen is &lt;1-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115004" version="1" comment="kgraft-patch-SLE12_Update_8 is &lt;1-2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117428" version="1" comment="kgraft-patch-3_12_32-33-default is &lt;4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117429" version="1" comment="kgraft-patch-3_12_32-33-xen is &lt;4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117430" version="1" comment="kgraft-patch-SLE12_Update_1 is &lt;4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117431" version="1" comment="kgraft-patch-3_12_36-38-default is &lt;4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117432" version="1" comment="kgraft-patch-3_12_36-38-xen is &lt;4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117433" version="1" comment="kgraft-patch-SLE12_Update_2 is &lt;4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117440" version="1" comment="kgraft-patch-3_12_38-44-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117441" version="1" comment="kgraft-patch-3_12_38-44-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117442" version="1" comment="kgraft-patch-SLE12_Update_3 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117443" version="1" comment="kgraft-patch-3_12_39-47-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117444" version="1" comment="kgraft-patch-3_12_39-47-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117445" version="1" comment="kgraft-patch-SLE12_Update_4 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117446" version="1" comment="kgraft-patch-3_12_43-52_6-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117447" version="1" comment="kgraft-patch-3_12_43-52_6-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117448" version="1" comment="kgraft-patch-SLE12_Update_5 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117434" version="1" comment="kgraft-patch-3_12_44-52_10-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117435" version="1" comment="kgraft-patch-3_12_44-52_10-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117436" version="1" comment="kgraft-patch-SLE12_Update_6 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117437" version="1" comment="kgraft-patch-3_12_44-52_18-default is &lt;2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117438" version="1" comment="kgraft-patch-3_12_44-52_18-xen is &lt;2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117439" version="1" comment="kgraft-patch-SLE12_Update_7 is &lt;2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118189" version="1" comment="kgraft-patch-3_12_51-52_31-default is &lt;1-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118190" version="1" comment="kgraft-patch-3_12_51-52_31-xen is &lt;1-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118191" version="1" comment="kgraft-patch-SLE12_Update_9 is &lt;1-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118992" version="1" comment="kgraft-patch-3_12_51-60_20-default is &lt;1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118993" version="1" comment="kgraft-patch-3_12_51-60_20-xen is &lt;1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118994" version="1" comment="kgraft-patch-SLE12-SP1_Update_1 is &lt;1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129295" version="1" comment="kgraft-patch-3_12_60-52_49-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129296" version="1" comment="kgraft-patch-3_12_60-52_49-xen is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129297" version="1" comment="kgraft-patch-SLE12_Update_14 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129353" version="1" comment="kgraft-patch-3_12_59-60_41-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129354" version="1" comment="kgraft-patch-3_12_59-60_41-xen is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129355" version="1" comment="kgraft-patch-SLE12-SP1_Update_5 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129411" version="1" comment="kgraft-patch-3_12_59-60_45-default is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129412" version="1" comment="kgraft-patch-3_12_59-60_45-xen is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129413" version="1" comment="kgraft-patch-SLE12-SP1_Update_6 is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129414" version="1" comment="kgraft-patch-3_12_60-52_54-default is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129415" version="1" comment="kgraft-patch-3_12_60-52_54-xen is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129416" version="1" comment="kgraft-patch-SLE12_Update_15 is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121147" version="1" comment="kgraft-patch-3_12_51-52_34-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121148" version="1" comment="kgraft-patch-3_12_51-52_34-xen is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121149" version="1" comment="kgraft-patch-SLE12_Update_10 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130792" version="1" comment="kgraft-patch-3_12_49-11-default is &lt;5-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130793" version="1" comment="kgraft-patch-3_12_49-11-xen is &lt;5-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130794" version="1" comment="kgraft-patch-SLE12-SP1_Update_0 is &lt;5-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131310" version="1" comment="kgraft-patch-3_12_59-60_45-default is &lt;2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131311" version="1" comment="kgraft-patch-3_12_59-60_45-xen is &lt;2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131312" version="1" comment="kgraft-patch-SLE12-SP1_Update_6 is &lt;2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131313" version="1" comment="kgraft-patch-3_12_57-60_35-default is &lt;2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131314" version="1" comment="kgraft-patch-3_12_57-60_35-xen is &lt;2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131315" version="1" comment="kgraft-patch-SLE12-SP1_Update_4 is &lt;2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131316" version="1" comment="kgraft-patch-3_12_59-60_41-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131317" version="1" comment="kgraft-patch-3_12_59-60_41-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131318" version="1" comment="kgraft-patch-SLE12-SP1_Update_5 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131319" version="1" comment="kgraft-patch-3_12_53-60_30-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131320" version="1" comment="kgraft-patch-3_12_53-60_30-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131321" version="1" comment="kgraft-patch-SLE12-SP1_Update_3 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131322" version="1" comment="kgraft-patch-3_12_51-60_25-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131323" version="1" comment="kgraft-patch-3_12_51-60_25-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131324" version="1" comment="kgraft-patch-SLE12-SP1_Update_2 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131325" version="1" comment="kgraft-patch-3_12_51-60_20-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131326" version="1" comment="kgraft-patch-3_12_51-60_20-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131327" version="1" comment="kgraft-patch-SLE12-SP1_Update_1 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121560" version="1" comment="kgraft-patch-3_12_51-60_25-default is &lt;1-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121561" version="1" comment="kgraft-patch-3_12_51-60_25-xen is &lt;1-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121562" version="1" comment="kgraft-patch-SLE12-SP1_Update_2 is &lt;1-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131328" version="1" comment="kgraft-patch-3_12_62-60_62-default is &lt;1-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131329" version="1" comment="kgraft-patch-3_12_62-60_62-xen is &lt;1-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131330" version="1" comment="kgraft-patch-SLE12-SP1_Update_7 is &lt;1-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131331" version="1" comment="kgraft-patch-3_12_59-60_45-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131332" version="1" comment="kgraft-patch-3_12_59-60_45-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131333" version="1" comment="kgraft-patch-SLE12-SP1_Update_6 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131334" version="1" comment="kgraft-patch-3_12_59-60_41-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131335" version="1" comment="kgraft-patch-3_12_59-60_41-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131336" version="1" comment="kgraft-patch-SLE12-SP1_Update_5 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131337" version="1" comment="kgraft-patch-3_12_57-60_35-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131338" version="1" comment="kgraft-patch-3_12_57-60_35-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131339" version="1" comment="kgraft-patch-SLE12-SP1_Update_4 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131340" version="1" comment="kgraft-patch-3_12_53-60_30-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131341" version="1" comment="kgraft-patch-3_12_53-60_30-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131342" version="1" comment="kgraft-patch-SLE12-SP1_Update_3 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131343" version="1" comment="kgraft-patch-3_12_51-60_25-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131344" version="1" comment="kgraft-patch-3_12_51-60_25-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131345" version="1" comment="kgraft-patch-SLE12-SP1_Update_2 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131346" version="1" comment="kgraft-patch-3_12_49-11-default is &lt;6-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131347" version="1" comment="kgraft-patch-3_12_49-11-xen is &lt;6-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131348" version="1" comment="kgraft-patch-SLE12-SP1_Update_0 is &lt;6-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131349" version="1" comment="kgraft-patch-3_12_51-60_20-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131350" version="1" comment="kgraft-patch-3_12_51-60_20-xen is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131351" version="1" comment="kgraft-patch-SLE12-SP1_Update_1 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131352" version="1" comment="kgraft-patch-3_12_62-60_62-default is &lt;2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131353" version="1" comment="kgraft-patch-3_12_62-60_62-xen is &lt;2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131354" version="1" comment="kgraft-patch-SLE12-SP1_Update_7 is &lt;2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121642" version="1" comment="kgraft-patch-3_12_51-52_39-default is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121643" version="1" comment="kgraft-patch-3_12_51-52_39-xen is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121644" version="1" comment="kgraft-patch-SLE12_Update_11 is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131355" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &lt;1-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131356" version="1" comment="kgraft-patch-3_12_62-60_64_8-xen is &lt;1-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131357" version="1" comment="kgraft-patch-SLE12-SP1_Update_8 is &lt;1-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131358" version="1" comment="kgraft-patch-3_12_49-11-default is &lt;7-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131359" version="1" comment="kgraft-patch-3_12_49-11-xen is &lt;7-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131360" version="1" comment="kgraft-patch-SLE12-SP1_Update_0 is &lt;7-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131361" version="1" comment="kgraft-patch-3_12_51-60_25-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131362" version="1" comment="kgraft-patch-3_12_51-60_25-xen is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131363" version="1" comment="kgraft-patch-SLE12-SP1_Update_2 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131364" version="1" comment="kgraft-patch-3_12_51-60_20-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131365" version="1" comment="kgraft-patch-3_12_51-60_20-xen is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131366" version="1" comment="kgraft-patch-SLE12-SP1_Update_1 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131367" version="1" comment="kgraft-patch-3_12_59-60_41-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131368" version="1" comment="kgraft-patch-3_12_59-60_41-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131369" version="1" comment="kgraft-patch-SLE12-SP1_Update_5 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131370" version="1" comment="kgraft-patch-3_12_53-60_30-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131371" version="1" comment="kgraft-patch-3_12_53-60_30-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131372" version="1" comment="kgraft-patch-SLE12-SP1_Update_3 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131373" version="1" comment="kgraft-patch-3_12_57-60_35-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131374" version="1" comment="kgraft-patch-3_12_57-60_35-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131375" version="1" comment="kgraft-patch-SLE12-SP1_Update_4 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131376" version="1" comment="kgraft-patch-3_12_59-60_45-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131377" version="1" comment="kgraft-patch-3_12_59-60_45-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131378" version="1" comment="kgraft-patch-SLE12-SP1_Update_6 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131379" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131380" version="1" comment="kgraft-patch-3_12_62-60_64_8-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131381" version="1" comment="kgraft-patch-SLE12-SP1_Update_8 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131382" version="1" comment="kgraft-patch-3_12_62-60_62-default is &lt;3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131383" version="1" comment="kgraft-patch-3_12_62-60_62-xen is &lt;3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131384" version="1" comment="kgraft-patch-SLE12-SP1_Update_7 is &lt;3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135974" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &lt;1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135975" version="1" comment="kgraft-patch-3_12_67-60_64_18-xen is &lt;1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135976" version="1" comment="kgraft-patch-SLE12-SP1_Update_9 is &lt;1-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136659" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136660" version="1" comment="kgraft-patch-3_12_67-60_64_21-xen is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136661" version="1" comment="kgraft-patch-SLE12-SP1_Update_10 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136662" version="1" comment="kgraft-patch-4_4_21-84-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136663" version="1" comment="kgraft-patch-SLE12-SP2_Update_2 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142353" version="1" comment="kgraft-patch-3_12_49-11-default is &lt;8-23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142354" version="1" comment="kgraft-patch-3_12_49-11-xen is &lt;8-23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142355" version="1" comment="kgraft-patch-SLE12-SP1_Update_0 is &lt;8-23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142356" version="1" comment="kgraft-patch-3_12_51-60_20-default is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142357" version="1" comment="kgraft-patch-3_12_51-60_20-xen is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142358" version="1" comment="kgraft-patch-SLE12-SP1_Update_1 is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142359" version="1" comment="kgraft-patch-3_12_51-60_25-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142360" version="1" comment="kgraft-patch-3_12_51-60_25-xen is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142361" version="1" comment="kgraft-patch-SLE12-SP1_Update_2 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142362" version="1" comment="kgraft-patch-3_12_53-60_30-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142363" version="1" comment="kgraft-patch-3_12_53-60_30-xen is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142364" version="1" comment="kgraft-patch-SLE12-SP1_Update_3 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142365" version="1" comment="kgraft-patch-3_12_57-60_35-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142366" version="1" comment="kgraft-patch-3_12_57-60_35-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142367" version="1" comment="kgraft-patch-SLE12-SP1_Update_4 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142368" version="1" comment="kgraft-patch-3_12_59-60_45-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142369" version="1" comment="kgraft-patch-3_12_59-60_45-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142370" version="1" comment="kgraft-patch-SLE12-SP1_Update_6 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142734" version="1" comment="kgraft-patch-3_12_59-60_41-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142735" version="1" comment="kgraft-patch-3_12_59-60_41-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142736" version="1" comment="kgraft-patch-SLE12-SP1_Update_5 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142737" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142738" version="1" comment="kgraft-patch-3_12_62-60_64_8-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142739" version="1" comment="kgraft-patch-SLE12-SP1_Update_8 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142740" version="1" comment="kgraft-patch-4_4_21-90-default is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142741" version="1" comment="kgraft-patch-SLE12-SP2_Update_3 is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143041" version="1" comment="kgraft-patch-4_4_21-69-default is &lt;2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143042" version="1" comment="kgraft-patch-SLE12-SP2_Update_0 is &lt;2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143064" version="1" comment="kgraft-patch-3_12_62-60_62-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143065" version="1" comment="kgraft-patch-3_12_62-60_62-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143066" version="1" comment="kgraft-patch-SLE12-SP1_Update_7 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143067" version="1" comment="kgraft-patch-3_12_67-60_64_24-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143068" version="1" comment="kgraft-patch-3_12_67-60_64_24-xen is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143069" version="1" comment="kgraft-patch-SLE12-SP1_Update_11 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144645" version="1" comment="kgraft-patch-4_4_21-81-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144646" version="1" comment="kgraft-patch-SLE12-SP2_Update_1 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144647" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144648" version="1" comment="kgraft-patch-3_12_67-60_64_18-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144649" version="1" comment="kgraft-patch-SLE12-SP1_Update_9 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121645" version="1" comment="kgraft-patch-3_12_51-52_34-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121646" version="1" comment="kgraft-patch-3_12_51-52_34-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121647" version="1" comment="kgraft-patch-SLE12_Update_10 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121308" version="1" comment="kgraft-patch-3_12_49-11-default is &lt;2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121309" version="1" comment="kgraft-patch-3_12_49-11-xen is &lt;2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121310" version="1" comment="kgraft-patch-SLE12-SP1_Update_0 is &lt;2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121302" version="1" comment="kgraft-patch-3_12_51-52_31-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121303" version="1" comment="kgraft-patch-3_12_51-52_31-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121304" version="1" comment="kgraft-patch-SLE12_Update_9 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121305" version="1" comment="kgraft-patch-3_12_51-60_20-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121306" version="1" comment="kgraft-patch-3_12_51-60_20-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121307" version="1" comment="kgraft-patch-SLE12-SP1_Update_1 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121299" version="1" comment="kgraft-patch-3_12_48-52_27-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121300" version="1" comment="kgraft-patch-3_12_48-52_27-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121301" version="1" comment="kgraft-patch-SLE12_Update_8 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121290" version="1" comment="kgraft-patch-3_12_43-52_6-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121291" version="1" comment="kgraft-patch-3_12_43-52_6-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121292" version="1" comment="kgraft-patch-SLE12_Update_5 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121287" version="1" comment="kgraft-patch-3_12_39-47-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121288" version="1" comment="kgraft-patch-3_12_39-47-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121289" version="1" comment="kgraft-patch-SLE12_Update_4 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121284" version="1" comment="kgraft-patch-3_12_38-44-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121285" version="1" comment="kgraft-patch-3_12_38-44-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121286" version="1" comment="kgraft-patch-SLE12_Update_3 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121293" version="1" comment="kgraft-patch-3_12_44-52_10-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121294" version="1" comment="kgraft-patch-3_12_44-52_10-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121295" version="1" comment="kgraft-patch-SLE12_Update_6 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121296" version="1" comment="kgraft-patch-3_12_44-52_18-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121297" version="1" comment="kgraft-patch-3_12_44-52_18-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121298" version="1" comment="kgraft-patch-SLE12_Update_7 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121281" version="1" comment="kgraft-patch-3_12_36-38-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121282" version="1" comment="kgraft-patch-3_12_36-38-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121283" version="1" comment="kgraft-patch-SLE12_Update_2 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121278" version="1" comment="kgraft-patch-3_12_32-33-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121279" version="1" comment="kgraft-patch-3_12_32-33-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121280" version="1" comment="kgraft-patch-SLE12_Update_1 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123252" version="1" comment="kgraft-patch-3_12_53-60_30-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123253" version="1" comment="kgraft-patch-3_12_53-60_30-xen is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123254" version="1" comment="kgraft-patch-SLE12-SP1_Update_3 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123018" version="1" comment="kgraft-patch-3_12_38-44-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123019" version="1" comment="kgraft-patch-3_12_38-44-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123020" version="1" comment="kgraft-patch-SLE12_Update_3 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123164" version="1" comment="kgraft-patch-3_12_39-47-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123165" version="1" comment="kgraft-patch-3_12_39-47-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123166" version="1" comment="kgraft-patch-SLE12_Update_4 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123167" version="1" comment="kgraft-patch-3_12_43-52_6-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123168" version="1" comment="kgraft-patch-3_12_43-52_6-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123169" version="1" comment="kgraft-patch-SLE12_Update_5 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123170" version="1" comment="kgraft-patch-3_12_44-52_10-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123171" version="1" comment="kgraft-patch-3_12_44-52_10-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123172" version="1" comment="kgraft-patch-SLE12_Update_6 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123173" version="1" comment="kgraft-patch-3_12_44-52_18-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123174" version="1" comment="kgraft-patch-3_12_44-52_18-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123175" version="1" comment="kgraft-patch-SLE12_Update_7 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123176" version="1" comment="kgraft-patch-3_12_48-52_27-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123177" version="1" comment="kgraft-patch-3_12_48-52_27-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123178" version="1" comment="kgraft-patch-SLE12_Update_8 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123179" version="1" comment="kgraft-patch-3_12_51-52_31-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123180" version="1" comment="kgraft-patch-3_12_51-52_31-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123181" version="1" comment="kgraft-patch-SLE12_Update_9 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123182" version="1" comment="kgraft-patch-3_12_51-52_34-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123183" version="1" comment="kgraft-patch-3_12_51-52_34-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123184" version="1" comment="kgraft-patch-SLE12_Update_10 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123185" version="1" comment="kgraft-patch-3_12_51-52_39-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123186" version="1" comment="kgraft-patch-3_12_51-52_39-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123187" version="1" comment="kgraft-patch-SLE12_Update_11 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123230" version="1" comment="kgraft-patch-3_12_49-11-default is &lt;3-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123231" version="1" comment="kgraft-patch-3_12_49-11-xen is &lt;3-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123232" version="1" comment="kgraft-patch-SLE12-SP1_Update_0 is &lt;3-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123233" version="1" comment="kgraft-patch-3_12_51-60_20-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123234" version="1" comment="kgraft-patch-3_12_51-60_20-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123235" version="1" comment="kgraft-patch-SLE12-SP1_Update_1 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123236" version="1" comment="kgraft-patch-3_12_51-60_25-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123237" version="1" comment="kgraft-patch-3_12_51-60_25-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123238" version="1" comment="kgraft-patch-SLE12-SP1_Update_2 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124809" version="1" comment="kgraft-patch-3_12_55-52_42-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124810" version="1" comment="kgraft-patch-3_12_55-52_42-xen is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124811" version="1" comment="kgraft-patch-SLE12_Update_12 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125859" version="1" comment="kgraft-patch-3_12_57-60_35-default is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125860" version="1" comment="kgraft-patch-3_12_57-60_35-xen is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125861" version="1" comment="kgraft-patch-SLE12-SP1_Update_4 is &lt;1-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126206" version="1" comment="kgraft-patch-3_12_51-52_39-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126207" version="1" comment="kgraft-patch-3_12_51-52_39-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126208" version="1" comment="kgraft-patch-SLE12_Update_11 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126209" version="1" comment="kgraft-patch-3_12_49-11-default is &lt;4-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126210" version="1" comment="kgraft-patch-3_12_49-11-xen is &lt;4-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126211" version="1" comment="kgraft-patch-SLE12-SP1_Update_0 is &lt;4-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126212" version="1" comment="kgraft-patch-3_12_51-60_20-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126213" version="1" comment="kgraft-patch-3_12_51-60_20-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126214" version="1" comment="kgraft-patch-SLE12-SP1_Update_1 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126215" version="1" comment="kgraft-patch-3_12_51-60_25-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126216" version="1" comment="kgraft-patch-3_12_51-60_25-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126217" version="1" comment="kgraft-patch-SLE12-SP1_Update_2 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126218" version="1" comment="kgraft-patch-3_12_53-60_30-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126219" version="1" comment="kgraft-patch-3_12_53-60_30-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126220" version="1" comment="kgraft-patch-SLE12-SP1_Update_3 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126221" version="1" comment="kgraft-patch-3_12_39-47-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126222" version="1" comment="kgraft-patch-3_12_39-47-xen is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126223" version="1" comment="kgraft-patch-SLE12_Update_4 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126224" version="1" comment="kgraft-patch-3_12_44-52_10-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126225" version="1" comment="kgraft-patch-3_12_44-52_10-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126226" version="1" comment="kgraft-patch-SLE12_Update_6 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126227" version="1" comment="kgraft-patch-3_12_44-52_18-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126228" version="1" comment="kgraft-patch-3_12_44-52_18-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126229" version="1" comment="kgraft-patch-SLE12_Update_7 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126230" version="1" comment="kgraft-patch-3_12_48-52_27-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126231" version="1" comment="kgraft-patch-3_12_48-52_27-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126232" version="1" comment="kgraft-patch-SLE12_Update_8 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126233" version="1" comment="kgraft-patch-3_12_51-52_31-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126234" version="1" comment="kgraft-patch-3_12_51-52_31-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126235" version="1" comment="kgraft-patch-SLE12_Update_9 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126252" version="1" comment="kgraft-patch-3_12_51-52_34-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126253" version="1" comment="kgraft-patch-3_12_51-52_34-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126254" version="1" comment="kgraft-patch-SLE12_Update_10 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126255" version="1" comment="kgraft-patch-3_12_43-52_6-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126256" version="1" comment="kgraft-patch-3_12_43-52_6-xen is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126257" version="1" comment="kgraft-patch-SLE12_Update_5 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128904" version="1" comment="kgraft-patch-3_12_55-52_45-default is &lt;1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128905" version="1" comment="kgraft-patch-3_12_55-52_45-xen is &lt;1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128906" version="1" comment="kgraft-patch-SLE12_Update_13 is &lt;1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147407" version="1" comment="kgraft-patch-4_4_21-69-default is &lt;3-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147408" version="1" comment="kgraft-patch-SLE12-SP2_Update_0 is &lt;3-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147409" version="1" comment="kgraft-patch-4_4_21-90-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147410" version="1" comment="kgraft-patch-SLE12-SP2_Update_3 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147411" version="1" comment="kgraft-patch-4_4_21-81-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147412" version="1" comment="kgraft-patch-SLE12-SP2_Update_1 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147413" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147414" version="1" comment="kgraft-patch-3_12_67-60_64_18-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147415" version="1" comment="kgraft-patch-SLE12-SP1_Update_9 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147416" version="1" comment="kgraft-patch-3_12_62-60_62-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147417" version="1" comment="kgraft-patch-3_12_62-60_62-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147418" version="1" comment="kgraft-patch-SLE12-SP1_Update_7 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147419" version="1" comment="kgraft-patch-3_12_59-60_45-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147420" version="1" comment="kgraft-patch-3_12_59-60_45-xen is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147421" version="1" comment="kgraft-patch-SLE12-SP1_Update_6 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147422" version="1" comment="kgraft-patch-3_12_59-60_41-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147423" version="1" comment="kgraft-patch-3_12_59-60_41-xen is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147424" version="1" comment="kgraft-patch-SLE12-SP1_Update_5 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147425" version="1" comment="kgraft-patch-3_12_57-60_35-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147426" version="1" comment="kgraft-patch-3_12_57-60_35-xen is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147427" version="1" comment="kgraft-patch-SLE12-SP1_Update_4 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147428" version="1" comment="kgraft-patch-3_12_51-60_25-default is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147429" version="1" comment="kgraft-patch-3_12_51-60_25-xen is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147430" version="1" comment="kgraft-patch-SLE12-SP1_Update_2 is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147431" version="1" comment="kgraft-patch-3_12_53-60_30-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147432" version="1" comment="kgraft-patch-3_12_53-60_30-xen is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147433" version="1" comment="kgraft-patch-SLE12-SP1_Update_3 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147632" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147633" version="1" comment="kgraft-patch-3_12_62-60_64_8-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147634" version="1" comment="kgraft-patch-SLE12-SP1_Update_8 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147814" version="1" comment="kgraft-patch-4_4_21-84-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147815" version="1" comment="kgraft-patch-SLE12-SP2_Update_2 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147816" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147817" version="1" comment="kgraft-patch-3_12_67-60_64_21-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147818" version="1" comment="kgraft-patch-SLE12-SP1_Update_10 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147842" version="1" comment="kgraft-patch-4_4_38-93-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147843" version="1" comment="kgraft-patch-SLE12-SP2_Update_4 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148407" version="1" comment="kgraft-patch-3_12_69-60_64_29-default is &lt;1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148408" version="1" comment="kgraft-patch-3_12_69-60_64_29-xen is &lt;1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148409" version="1" comment="kgraft-patch-SLE12-SP1_Update_12 is &lt;1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148671" version="1" comment="kgraft-patch-3_12_69-60_64_32-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148672" version="1" comment="kgraft-patch-3_12_69-60_64_32-xen is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148673" version="1" comment="kgraft-patch-SLE12-SP1_Update_13 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149021" version="1" comment="kgraft-patch-4_4_49-92_11-default is &lt;1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149022" version="1" comment="kgraft-patch-SLE12-SP2_Update_5 is &lt;1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147239" version="1" comment="kgraft-patch-4_4_38-93-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147240" version="1" comment="kgraft-patch-SLE12-SP2_Update_4 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118611" version="1" comment="ruby2.1-rubygem-passenger is &lt;5.0.18-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118612" version="1" comment="rubygem-passenger is &lt;5.0.18-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118613" version="1" comment="rubygem-passenger-apache2 is &lt;5.0.18-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111432" version="1" comment="python-setuptools is &lt;1.1.7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115047" version="1" comment="docker is &lt;1.8.3-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118570" version="1" comment="ruby2.1-rubygem-rack-1_4 is &lt;1.4.5-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118571" version="1" comment="rubygem-rack-1_4 is &lt;1.4.5-8.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130756" version="1" comment="sles12-docker-image is &lt;1.1.2-20160727" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130757" version="1" comment="sles12sp1-docker-image is &lt;1.0.5-20160727" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142371" version="1" comment="containerd is &lt;0.2.4+gitr565_0366d7e-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142372" version="1" comment="docker is &lt;1.12.3-81.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142373" version="1" comment="ruby2.1-rubygem-docker-api is &lt;1.31.0-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142374" version="1" comment="ruby2.1-rubygem-excon is &lt;0.52.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142375" version="1" comment="rubygem-docker-api is &lt;1.31.0-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142376" version="1" comment="rubygem-excon is &lt;0.52.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142377" version="1" comment="runc is &lt;0.1.1+gitr2816_02f8fa7-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124724" version="1" comment="sles12sp1-docker-image is &lt;1.0.4-20160308170633" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124735" version="1" comment="sles11sp4-docker-image is &lt;1.1.1-20160304104123" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124812" version="1" comment="sles12-docker-image is &lt;1.1.1-20160307082632" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126712" version="1" comment="portus is &lt;2.0.3-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126780" version="1" comment="docker is &lt;1.10.3-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148141" version="1" comment="containerd is &lt;0.2.5+gitr569_2a5e70c-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148142" version="1" comment="docker is &lt;1.12.6-87.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148143" version="1" comment="runc is &lt;0.1.1+gitr2819_50a19c6-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102454" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102461" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102462" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102464" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107609" version="1" comment="cups154 is &lt;1.5.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107610" version="1" comment="cups154-client is &lt;1.5.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107613" version="1" comment="cups154-filters is &lt;1.5.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107614" version="1" comment="cups154-libs is &lt;1.5.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110321" version="1" comment="cups154 is &lt;1.5.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110322" version="1" comment="cups154-client is &lt;1.5.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110325" version="1" comment="cups154-filters is &lt;1.5.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110326" version="1" comment="cups154-libs is &lt;1.5.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110566" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110567" version="1" comment="openldap2 is &lt;2.4.39-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110783" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110790" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110791" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110793" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113283" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.7-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113289" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.7-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113290" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.7-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113292" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.7-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106138" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.3-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106145" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.3-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106146" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.3-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106148" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.3-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118092" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.15-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118093" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.15-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118094" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.15-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118095" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.15-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120902" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-18.13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120903" version="1" comment="openldap2 is &lt;2.4.41-18.13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131385" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.30-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131386" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.30-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131387" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.30-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131388" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.30-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136399" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.35-43.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136400" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.35-43.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136401" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.35-43.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136402" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.35-43.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122490" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.20-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122491" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.20-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122492" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.20-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122493" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.20-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127548" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.25-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127549" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.25-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127550" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.25-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127551" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.25-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128319" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.26-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128320" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.26-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128321" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.26-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128322" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.26-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149625" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.41-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149626" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.41-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149627" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.41-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149628" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.41-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107837" version="1" comment="kernel-ec2 is &lt;3.12.38-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107839" version="1" comment="kernel-ec2-devel is &lt;3.12.38-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107840" version="1" comment="kernel-ec2-extra is &lt;3.12.38-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108373" version="1" comment="kernel-ec2 is &lt;3.12.39-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108375" version="1" comment="kernel-ec2-devel is &lt;3.12.39-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108376" version="1" comment="kernel-ec2-extra is &lt;3.12.39-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105321" version="1" comment="kernel-ec2 is &lt;3.12.32-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105323" version="1" comment="kernel-ec2-devel is &lt;3.12.32-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105324" version="1" comment="kernel-ec2-extra is &lt;3.12.32-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110511" version="1" comment="kernel-ec2 is &lt;3.12.43-52.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110513" version="1" comment="kernel-ec2-devel is &lt;3.12.43-52.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110514" version="1" comment="kernel-ec2-extra is &lt;3.12.43-52.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111576" version="1" comment="kernel-ec2 is &lt;3.12.44-52.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111578" version="1" comment="kernel-ec2-devel is &lt;3.12.44-52.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111579" version="1" comment="kernel-ec2-extra is &lt;3.12.44-52.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105752" version="1" comment="kernel-ec2 is &lt;3.12.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105754" version="1" comment="kernel-ec2-devel is &lt;3.12.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105755" version="1" comment="kernel-ec2-extra is &lt;3.12.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114436" version="1" comment="kernel-ec2 is &lt;3.12.44-52.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114438" version="1" comment="kernel-ec2-devel is &lt;3.12.44-52.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114439" version="1" comment="kernel-ec2-extra is &lt;3.12.44-52.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114989" version="1" comment="kernel-ec2 is &lt;3.12.48-52.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114991" version="1" comment="kernel-ec2-devel is &lt;3.12.48-52.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114992" version="1" comment="kernel-ec2-extra is &lt;3.12.48-52.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118171" version="1" comment="kernel-ec2 is &lt;3.12.51-52.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118172" version="1" comment="kernel-ec2-devel is &lt;3.12.51-52.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118173" version="1" comment="kernel-ec2-extra is &lt;3.12.51-52.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118995" version="1" comment="kernel-ec2 is &lt;3.12.51-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118996" version="1" comment="kernel-ec2-devel is &lt;3.12.51-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118997" version="1" comment="kernel-ec2-extra is &lt;3.12.51-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129298" version="1" comment="kernel-ec2 is &lt;3.12.60-52.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129299" version="1" comment="kernel-ec2-devel is &lt;3.12.60-52.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129300" version="1" comment="kernel-ec2-extra is &lt;3.12.60-52.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129356" version="1" comment="kernel-ec2 is &lt;3.12.59-60.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129357" version="1" comment="kernel-ec2-devel is &lt;3.12.59-60.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129358" version="1" comment="kernel-ec2-extra is &lt;3.12.59-60.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129417" version="1" comment="kernel-ec2 is &lt;3.12.59-60.45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129418" version="1" comment="kernel-ec2-devel is &lt;3.12.59-60.45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129419" version="1" comment="kernel-ec2-extra is &lt;3.12.59-60.45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129420" version="1" comment="kernel-ec2 is &lt;3.12.60-52.54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129421" version="1" comment="kernel-ec2-devel is &lt;3.12.60-52.54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129422" version="1" comment="kernel-ec2-extra is &lt;3.12.60-52.54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121150" version="1" comment="kernel-ec2 is &lt;3.12.51-52.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121151" version="1" comment="kernel-ec2-devel is &lt;3.12.51-52.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121152" version="1" comment="kernel-ec2-extra is &lt;3.12.51-52.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121545" version="1" comment="kernel-ec2 is &lt;3.12.51-60.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121546" version="1" comment="kernel-ec2-devel is &lt;3.12.51-60.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121547" version="1" comment="kernel-ec2-extra is &lt;3.12.51-60.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131389" version="1" comment="kernel-ec2 is &lt;3.12.62-60.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131390" version="1" comment="kernel-ec2-devel is &lt;3.12.62-60.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131391" version="1" comment="kernel-ec2-extra is &lt;3.12.62-60.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121648" version="1" comment="kernel-ec2 is &lt;3.12.51-52.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121649" version="1" comment="kernel-ec2-devel is &lt;3.12.51-52.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121650" version="1" comment="kernel-ec2-extra is &lt;3.12.51-52.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131392" version="1" comment="kernel-ec2 is &lt;3.12.62-60.64.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131393" version="1" comment="kernel-ec2-devel is &lt;3.12.62-60.64.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131394" version="1" comment="kernel-ec2-extra is &lt;3.12.62-60.64.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131395" version="1" comment="kernel-ec2 is &lt;3.12.60-52.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131396" version="1" comment="kernel-ec2-devel is &lt;3.12.60-52.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131397" version="1" comment="kernel-ec2-extra is &lt;3.12.60-52.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135977" version="1" comment="kernel-ec2 is &lt;3.12.67-60.64.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135978" version="1" comment="kernel-ec2-devel is &lt;3.12.67-60.64.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135979" version="1" comment="kernel-ec2-extra is &lt;3.12.67-60.64.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136664" version="1" comment="kernel-ec2 is &lt;3.12.67-60.64.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136665" version="1" comment="kernel-ec2-devel is &lt;3.12.67-60.64.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136666" version="1" comment="kernel-ec2-extra is &lt;3.12.67-60.64.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141179" version="1" comment="kernel-ec2 is &lt;3.12.60-52.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141180" version="1" comment="kernel-ec2-devel is &lt;3.12.60-52.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141181" version="1" comment="kernel-ec2-extra is &lt;3.12.60-52.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143070" version="1" comment="kernel-ec2 is &lt;3.12.67-60.64.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143071" version="1" comment="kernel-ec2-devel is &lt;3.12.67-60.64.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143072" version="1" comment="kernel-ec2-extra is &lt;3.12.67-60.64.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144650" version="1" comment="kernel-ec2 is &lt;3.12.60-52.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144651" version="1" comment="kernel-ec2-devel is &lt;3.12.60-52.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144652" version="1" comment="kernel-ec2-extra is &lt;3.12.60-52.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123683" version="1" comment="kernel-ec2 is &lt;3.12.53-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123684" version="1" comment="kernel-ec2-devel is &lt;3.12.53-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123685" version="1" comment="kernel-ec2-extra is &lt;3.12.53-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124813" version="1" comment="kernel-ec2 is &lt;3.12.55-52.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124814" version="1" comment="kernel-ec2-devel is &lt;3.12.55-52.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124815" version="1" comment="kernel-ec2-extra is &lt;3.12.55-52.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125862" version="1" comment="kernel-ec2 is &lt;3.12.57-60.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125863" version="1" comment="kernel-ec2-devel is &lt;3.12.57-60.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125864" version="1" comment="kernel-ec2-extra is &lt;3.12.57-60.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121153" version="1" comment="python-rsa is &lt;3.1.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128907" version="1" comment="kernel-ec2 is &lt;3.12.55-52.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128908" version="1" comment="kernel-ec2-devel is &lt;3.12.55-52.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128909" version="1" comment="kernel-ec2-extra is &lt;3.12.55-52.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148410" version="1" comment="kernel-ec2 is &lt;3.12.69-60.64.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148411" version="1" comment="kernel-ec2-devel is &lt;3.12.69-60.64.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148412" version="1" comment="kernel-ec2-extra is &lt;3.12.69-60.64.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148441" version="1" comment="kernel-ec2 is &lt;3.12.61-52.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148442" version="1" comment="kernel-ec2-devel is &lt;3.12.61-52.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148443" version="1" comment="kernel-ec2-extra is &lt;3.12.61-52.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148674" version="1" comment="kernel-ec2 is &lt;3.12.69-60.64.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148675" version="1" comment="kernel-ec2-devel is &lt;3.12.69-60.64.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148676" version="1" comment="kernel-ec2-extra is &lt;3.12.69-60.64.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125866" version="1" comment="gcc5-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125867" version="1" comment="gcc5-ada is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125868" version="1" comment="gcc5-ada-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125870" version="1" comment="gcc5-c++-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125872" version="1" comment="gcc5-fortran-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125875" version="1" comment="libada5 is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125876" version="1" comment="libada5-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125878" version="1" comment="libffi-devel-gcc5-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125880" version="1" comment="libstdc++6-devel-gcc5-32bit is &lt;5.3.1+r233831-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102154" version="1" comment="apache2-mod_php5 is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102155" version="1" comment="php5 is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102156" version="1" comment="php5-bcmath is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102157" version="1" comment="php5-bz2 is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102158" version="1" comment="php5-calendar is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102159" version="1" comment="php5-ctype is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102160" version="1" comment="php5-curl is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102161" version="1" comment="php5-dba is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102163" version="1" comment="php5-dom is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102164" version="1" comment="php5-enchant is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102165" version="1" comment="php5-exif is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102166" version="1" comment="php5-fastcgi is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102167" version="1" comment="php5-fileinfo is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102169" version="1" comment="php5-fpm is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102170" version="1" comment="php5-ftp is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102171" version="1" comment="php5-gd is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102172" version="1" comment="php5-gettext is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102173" version="1" comment="php5-gmp is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102174" version="1" comment="php5-iconv is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102176" version="1" comment="php5-intl is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102177" version="1" comment="php5-json is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102178" version="1" comment="php5-ldap is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102179" version="1" comment="php5-mbstring is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102180" version="1" comment="php5-mcrypt is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102182" version="1" comment="php5-mysql is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102183" version="1" comment="php5-odbc is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102185" version="1" comment="php5-openssl is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102186" version="1" comment="php5-pcntl is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102187" version="1" comment="php5-pdo is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102188" version="1" comment="php5-pear is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102189" version="1" comment="php5-pgsql is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102192" version="1" comment="php5-pspell is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102194" version="1" comment="php5-shmop is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102195" version="1" comment="php5-snmp is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102196" version="1" comment="php5-soap is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102197" version="1" comment="php5-sockets is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102198" version="1" comment="php5-sqlite is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102199" version="1" comment="php5-suhosin is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102200" version="1" comment="php5-sysvmsg is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102201" version="1" comment="php5-sysvsem is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102202" version="1" comment="php5-sysvshm is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102204" version="1" comment="php5-tokenizer is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102205" version="1" comment="php5-wddx is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102206" version="1" comment="php5-xmlreader is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102207" version="1" comment="php5-xmlrpc is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102208" version="1" comment="php5-xmlwriter is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102209" version="1" comment="php5-xsl is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102210" version="1" comment="php5-zip is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102211" version="1" comment="php5-zlib is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117871" version="1" comment="sle-module-web-scripting is &gt;=12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106946" version="1" comment="apache2-mod_php5 is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106947" version="1" comment="php5 is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106948" version="1" comment="php5-bcmath is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106949" version="1" comment="php5-bz2 is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106950" version="1" comment="php5-calendar is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106951" version="1" comment="php5-ctype is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106952" version="1" comment="php5-curl is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106953" version="1" comment="php5-dba is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106955" version="1" comment="php5-dom is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106956" version="1" comment="php5-enchant is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106957" version="1" comment="php5-exif is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106958" version="1" comment="php5-fastcgi is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106959" version="1" comment="php5-fileinfo is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106961" version="1" comment="php5-fpm is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106962" version="1" comment="php5-ftp is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106963" version="1" comment="php5-gd is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106964" version="1" comment="php5-gettext is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106965" version="1" comment="php5-gmp is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106966" version="1" comment="php5-iconv is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106968" version="1" comment="php5-intl is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106969" version="1" comment="php5-json is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106970" version="1" comment="php5-ldap is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106971" version="1" comment="php5-mbstring is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106972" version="1" comment="php5-mcrypt is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106974" version="1" comment="php5-mysql is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106975" version="1" comment="php5-odbc is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106977" version="1" comment="php5-openssl is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106978" version="1" comment="php5-pcntl is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106979" version="1" comment="php5-pdo is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106980" version="1" comment="php5-pear is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106981" version="1" comment="php5-pgsql is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106984" version="1" comment="php5-pspell is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106986" version="1" comment="php5-shmop is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106987" version="1" comment="php5-snmp is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106988" version="1" comment="php5-soap is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106989" version="1" comment="php5-sockets is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106990" version="1" comment="php5-sqlite is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106991" version="1" comment="php5-suhosin is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106992" version="1" comment="php5-sysvmsg is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106993" version="1" comment="php5-sysvsem is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106994" version="1" comment="php5-sysvshm is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106996" version="1" comment="php5-tokenizer is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106997" version="1" comment="php5-wddx is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106998" version="1" comment="php5-xmlreader is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106999" version="1" comment="php5-xmlrpc is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107000" version="1" comment="php5-xmlwriter is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107001" version="1" comment="php5-xsl is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107002" version="1" comment="php5-zip is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107003" version="1" comment="php5-zlib is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109548" version="1" comment="apache2-mod_php5 is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109549" version="1" comment="php5 is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109550" version="1" comment="php5-bcmath is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109551" version="1" comment="php5-bz2 is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109552" version="1" comment="php5-calendar is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109553" version="1" comment="php5-ctype is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109554" version="1" comment="php5-curl is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109555" version="1" comment="php5-dba is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109557" version="1" comment="php5-dom is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109558" version="1" comment="php5-enchant is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109559" version="1" comment="php5-exif is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109560" version="1" comment="php5-fastcgi is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109561" version="1" comment="php5-fileinfo is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109563" version="1" comment="php5-fpm is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109564" version="1" comment="php5-ftp is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109565" version="1" comment="php5-gd is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109566" version="1" comment="php5-gettext is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109567" version="1" comment="php5-gmp is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109568" version="1" comment="php5-iconv is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109570" version="1" comment="php5-intl is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109571" version="1" comment="php5-json is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109572" version="1" comment="php5-ldap is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109573" version="1" comment="php5-mbstring is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109574" version="1" comment="php5-mcrypt is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109576" version="1" comment="php5-mysql is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109577" version="1" comment="php5-odbc is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109579" version="1" comment="php5-openssl is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109580" version="1" comment="php5-pcntl is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109581" version="1" comment="php5-pdo is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109582" version="1" comment="php5-pear is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109583" version="1" comment="php5-pgsql is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109586" version="1" comment="php5-pspell is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109588" version="1" comment="php5-shmop is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109589" version="1" comment="php5-snmp is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109590" version="1" comment="php5-soap is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109591" version="1" comment="php5-sockets is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109592" version="1" comment="php5-sqlite is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109593" version="1" comment="php5-suhosin is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109594" version="1" comment="php5-sysvmsg is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109595" version="1" comment="php5-sysvsem is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109596" version="1" comment="php5-sysvshm is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109598" version="1" comment="php5-tokenizer is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109599" version="1" comment="php5-wddx is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109600" version="1" comment="php5-xmlreader is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109601" version="1" comment="php5-xmlrpc is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109602" version="1" comment="php5-xmlwriter is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109603" version="1" comment="php5-xsl is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109604" version="1" comment="php5-zip is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109605" version="1" comment="php5-zlib is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111374" version="1" comment="apache2-mod_php5 is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111375" version="1" comment="php5 is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111376" version="1" comment="php5-bcmath is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111377" version="1" comment="php5-bz2 is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111378" version="1" comment="php5-calendar is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111379" version="1" comment="php5-ctype is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111380" version="1" comment="php5-curl is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111381" version="1" comment="php5-dba is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111383" version="1" comment="php5-dom is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111384" version="1" comment="php5-enchant is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111385" version="1" comment="php5-exif is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111386" version="1" comment="php5-fastcgi is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111387" version="1" comment="php5-fileinfo is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111389" version="1" comment="php5-fpm is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111390" version="1" comment="php5-ftp is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111391" version="1" comment="php5-gd is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111392" version="1" comment="php5-gettext is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111393" version="1" comment="php5-gmp is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111394" version="1" comment="php5-iconv is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111396" version="1" comment="php5-intl is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111397" version="1" comment="php5-json is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111398" version="1" comment="php5-ldap is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111399" version="1" comment="php5-mbstring is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111400" version="1" comment="php5-mcrypt is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111402" version="1" comment="php5-mysql is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111403" version="1" comment="php5-odbc is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111405" version="1" comment="php5-openssl is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111406" version="1" comment="php5-pcntl is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111407" version="1" comment="php5-pdo is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111408" version="1" comment="php5-pear is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111409" version="1" comment="php5-pgsql is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111412" version="1" comment="php5-pspell is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111414" version="1" comment="php5-shmop is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111415" version="1" comment="php5-snmp is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111416" version="1" comment="php5-soap is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111417" version="1" comment="php5-sockets is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111418" version="1" comment="php5-sqlite is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111419" version="1" comment="php5-suhosin is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111420" version="1" comment="php5-sysvmsg is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111421" version="1" comment="php5-sysvsem is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111422" version="1" comment="php5-sysvshm is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111424" version="1" comment="php5-tokenizer is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111425" version="1" comment="php5-wddx is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111426" version="1" comment="php5-xmlreader is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111427" version="1" comment="php5-xmlrpc is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111428" version="1" comment="php5-xmlwriter is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111429" version="1" comment="php5-xsl is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111430" version="1" comment="php5-zip is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111431" version="1" comment="php5-zlib is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113863" version="1" comment="apache2-mod_php5 is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113864" version="1" comment="php5 is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113865" version="1" comment="php5-bcmath is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113866" version="1" comment="php5-bz2 is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113867" version="1" comment="php5-calendar is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113868" version="1" comment="php5-ctype is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113869" version="1" comment="php5-curl is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113870" version="1" comment="php5-dba is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113872" version="1" comment="php5-dom is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113873" version="1" comment="php5-enchant is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113874" version="1" comment="php5-exif is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113875" version="1" comment="php5-fastcgi is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113876" version="1" comment="php5-fileinfo is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113878" version="1" comment="php5-fpm is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113879" version="1" comment="php5-ftp is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113880" version="1" comment="php5-gd is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113881" version="1" comment="php5-gettext is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113882" version="1" comment="php5-gmp is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113883" version="1" comment="php5-iconv is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113885" version="1" comment="php5-intl is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113886" version="1" comment="php5-json is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113887" version="1" comment="php5-ldap is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113888" version="1" comment="php5-mbstring is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113889" version="1" comment="php5-mcrypt is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113891" version="1" comment="php5-mysql is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113892" version="1" comment="php5-odbc is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113893" version="1" comment="php5-opcache is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113894" version="1" comment="php5-openssl is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113895" version="1" comment="php5-pcntl is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113896" version="1" comment="php5-pdo is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113897" version="1" comment="php5-pear is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113898" version="1" comment="php5-pgsql is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113900" version="1" comment="php5-posix is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113901" version="1" comment="php5-pspell is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113903" version="1" comment="php5-shmop is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113904" version="1" comment="php5-snmp is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113905" version="1" comment="php5-soap is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113906" version="1" comment="php5-sockets is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113907" version="1" comment="php5-sqlite is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113908" version="1" comment="php5-suhosin is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113909" version="1" comment="php5-sysvmsg is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113910" version="1" comment="php5-sysvsem is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113911" version="1" comment="php5-sysvshm is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113913" version="1" comment="php5-tokenizer is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113914" version="1" comment="php5-wddx is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113915" version="1" comment="php5-xmlreader is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113916" version="1" comment="php5-xmlrpc is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113917" version="1" comment="php5-xmlwriter is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113918" version="1" comment="php5-xsl is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113919" version="1" comment="php5-zip is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113920" version="1" comment="php5-zlib is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114640" version="1" comment="apache2-mod_php5 is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114641" version="1" comment="php5 is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114642" version="1" comment="php5-bcmath is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114643" version="1" comment="php5-bz2 is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114644" version="1" comment="php5-calendar is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114645" version="1" comment="php5-ctype is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114646" version="1" comment="php5-curl is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114647" version="1" comment="php5-dba is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114649" version="1" comment="php5-dom is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114650" version="1" comment="php5-enchant is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114651" version="1" comment="php5-exif is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114652" version="1" comment="php5-fastcgi is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114653" version="1" comment="php5-fileinfo is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114655" version="1" comment="php5-fpm is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114656" version="1" comment="php5-ftp is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114657" version="1" comment="php5-gd is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114658" version="1" comment="php5-gettext is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114659" version="1" comment="php5-gmp is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114660" version="1" comment="php5-iconv is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114662" version="1" comment="php5-intl is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114663" version="1" comment="php5-json is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114664" version="1" comment="php5-ldap is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114665" version="1" comment="php5-mbstring is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114666" version="1" comment="php5-mcrypt is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114668" version="1" comment="php5-mysql is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114669" version="1" comment="php5-odbc is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114670" version="1" comment="php5-opcache is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114671" version="1" comment="php5-openssl is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114672" version="1" comment="php5-pcntl is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114673" version="1" comment="php5-pdo is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114674" version="1" comment="php5-pear is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114675" version="1" comment="php5-pgsql is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114677" version="1" comment="php5-posix is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114678" version="1" comment="php5-pspell is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114680" version="1" comment="php5-shmop is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114681" version="1" comment="php5-snmp is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114682" version="1" comment="php5-soap is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114683" version="1" comment="php5-sockets is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114684" version="1" comment="php5-sqlite is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114685" version="1" comment="php5-suhosin is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114686" version="1" comment="php5-sysvmsg is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114687" version="1" comment="php5-sysvsem is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114688" version="1" comment="php5-sysvshm is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114690" version="1" comment="php5-tokenizer is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114691" version="1" comment="php5-wddx is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114692" version="1" comment="php5-xmlreader is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114693" version="1" comment="php5-xmlrpc is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114694" version="1" comment="php5-xmlwriter is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114695" version="1" comment="php5-xsl is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114696" version="1" comment="php5-zip is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114697" version="1" comment="php5-zlib is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106472" version="1" comment="apache2-mod_php5 is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106473" version="1" comment="php5 is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106474" version="1" comment="php5-bcmath is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106475" version="1" comment="php5-bz2 is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106476" version="1" comment="php5-calendar is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106477" version="1" comment="php5-ctype is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106478" version="1" comment="php5-curl is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106479" version="1" comment="php5-dba is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106481" version="1" comment="php5-dom is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106482" version="1" comment="php5-enchant is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106483" version="1" comment="php5-exif is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106484" version="1" comment="php5-fastcgi is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106485" version="1" comment="php5-fileinfo is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106487" version="1" comment="php5-fpm is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106488" version="1" comment="php5-ftp is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106489" version="1" comment="php5-gd is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106490" version="1" comment="php5-gettext is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106491" version="1" comment="php5-gmp is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106492" version="1" comment="php5-iconv is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106494" version="1" comment="php5-intl is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106495" version="1" comment="php5-json is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106496" version="1" comment="php5-ldap is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106497" version="1" comment="php5-mbstring is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106498" version="1" comment="php5-mcrypt is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106500" version="1" comment="php5-mysql is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106501" version="1" comment="php5-odbc is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106503" version="1" comment="php5-openssl is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106504" version="1" comment="php5-pcntl is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106505" version="1" comment="php5-pdo is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106506" version="1" comment="php5-pear is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106507" version="1" comment="php5-pgsql is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106510" version="1" comment="php5-pspell is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106512" version="1" comment="php5-shmop is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106513" version="1" comment="php5-snmp is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106514" version="1" comment="php5-soap is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106515" version="1" comment="php5-sockets is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106516" version="1" comment="php5-sqlite is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106517" version="1" comment="php5-suhosin is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106518" version="1" comment="php5-sysvmsg is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106519" version="1" comment="php5-sysvsem is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106520" version="1" comment="php5-sysvshm is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106522" version="1" comment="php5-tokenizer is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106523" version="1" comment="php5-wddx is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106524" version="1" comment="php5-xmlreader is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106525" version="1" comment="php5-xmlrpc is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106526" version="1" comment="php5-xmlwriter is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106527" version="1" comment="php5-xsl is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106528" version="1" comment="php5-zip is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106529" version="1" comment="php5-zlib is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130571" version="1" comment="apache2-mod_php5 is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130572" version="1" comment="php5 is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130573" version="1" comment="php5-bcmath is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130574" version="1" comment="php5-bz2 is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130575" version="1" comment="php5-calendar is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130576" version="1" comment="php5-ctype is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130577" version="1" comment="php5-curl is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130578" version="1" comment="php5-dba is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130579" version="1" comment="php5-dom is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130580" version="1" comment="php5-enchant is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130581" version="1" comment="php5-exif is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130582" version="1" comment="php5-fastcgi is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130583" version="1" comment="php5-fileinfo is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130584" version="1" comment="php5-fpm is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130585" version="1" comment="php5-ftp is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130586" version="1" comment="php5-gd is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130587" version="1" comment="php5-gettext is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130588" version="1" comment="php5-gmp is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130589" version="1" comment="php5-iconv is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130590" version="1" comment="php5-imap is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130591" version="1" comment="php5-intl is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130592" version="1" comment="php5-json is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130593" version="1" comment="php5-ldap is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130594" version="1" comment="php5-mbstring is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130595" version="1" comment="php5-mcrypt is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130596" version="1" comment="php5-mysql is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130597" version="1" comment="php5-odbc is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130598" version="1" comment="php5-opcache is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130599" version="1" comment="php5-openssl is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130600" version="1" comment="php5-pcntl is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130601" version="1" comment="php5-pdo is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130602" version="1" comment="php5-pear is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130603" version="1" comment="php5-pgsql is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130604" version="1" comment="php5-phar is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130605" version="1" comment="php5-posix is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130606" version="1" comment="php5-pspell is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130607" version="1" comment="php5-shmop is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130608" version="1" comment="php5-snmp is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130609" version="1" comment="php5-soap is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130610" version="1" comment="php5-sockets is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130611" version="1" comment="php5-sqlite is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130612" version="1" comment="php5-suhosin is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130613" version="1" comment="php5-sysvmsg is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130614" version="1" comment="php5-sysvsem is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130615" version="1" comment="php5-sysvshm is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130616" version="1" comment="php5-tokenizer is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130617" version="1" comment="php5-wddx is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130618" version="1" comment="php5-xmlreader is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130619" version="1" comment="php5-xmlrpc is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130620" version="1" comment="php5-xmlwriter is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130621" version="1" comment="php5-xsl is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130622" version="1" comment="php5-zip is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130623" version="1" comment="php5-zlib is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131398" version="1" comment="apache2-mod_php5 is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131399" version="1" comment="php5 is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131400" version="1" comment="php5-bcmath is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131401" version="1" comment="php5-bz2 is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131402" version="1" comment="php5-calendar is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131403" version="1" comment="php5-ctype is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131404" version="1" comment="php5-curl is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131405" version="1" comment="php5-dba is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131406" version="1" comment="php5-dom is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131407" version="1" comment="php5-enchant is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131408" version="1" comment="php5-exif is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131409" version="1" comment="php5-fastcgi is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131410" version="1" comment="php5-fileinfo is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131411" version="1" comment="php5-fpm is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131412" version="1" comment="php5-ftp is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131413" version="1" comment="php5-gd is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131414" version="1" comment="php5-gettext is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131415" version="1" comment="php5-gmp is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131416" version="1" comment="php5-iconv is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131417" version="1" comment="php5-imap is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131418" version="1" comment="php5-intl is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131419" version="1" comment="php5-json is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131420" version="1" comment="php5-ldap is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131421" version="1" comment="php5-mbstring is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131422" version="1" comment="php5-mcrypt is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131423" version="1" comment="php5-mysql is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131424" version="1" comment="php5-odbc is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131425" version="1" comment="php5-opcache is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131426" version="1" comment="php5-openssl is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131427" version="1" comment="php5-pcntl is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131428" version="1" comment="php5-pdo is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131429" version="1" comment="php5-pear is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131430" version="1" comment="php5-pgsql is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131431" version="1" comment="php5-phar is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131432" version="1" comment="php5-posix is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131433" version="1" comment="php5-pspell is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131434" version="1" comment="php5-shmop is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131435" version="1" comment="php5-snmp is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131436" version="1" comment="php5-soap is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131437" version="1" comment="php5-sockets is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131438" version="1" comment="php5-sqlite is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131439" version="1" comment="php5-suhosin is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131440" version="1" comment="php5-sysvmsg is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131441" version="1" comment="php5-sysvsem is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131442" version="1" comment="php5-sysvshm is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131443" version="1" comment="php5-tokenizer is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131444" version="1" comment="php5-wddx is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131445" version="1" comment="php5-xmlreader is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131446" version="1" comment="php5-xmlrpc is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131447" version="1" comment="php5-xmlwriter is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131448" version="1" comment="php5-xsl is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131449" version="1" comment="php5-zip is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131450" version="1" comment="php5-zlib is &lt;5.5.14-73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131451" version="1" comment="apache2-mod_php7 is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131452" version="1" comment="php7 is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131453" version="1" comment="php7-bcmath is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131454" version="1" comment="php7-bz2 is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131455" version="1" comment="php7-calendar is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131456" version="1" comment="php7-ctype is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131457" version="1" comment="php7-curl is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131458" version="1" comment="php7-dba is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131459" version="1" comment="php7-dom is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131460" version="1" comment="php7-enchant is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131461" version="1" comment="php7-exif is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131462" version="1" comment="php7-fastcgi is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131463" version="1" comment="php7-fileinfo is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131464" version="1" comment="php7-fpm is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131465" version="1" comment="php7-ftp is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131466" version="1" comment="php7-gd is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131467" version="1" comment="php7-gettext is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131468" version="1" comment="php7-gmp is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131469" version="1" comment="php7-iconv is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131470" version="1" comment="php7-imap is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131471" version="1" comment="php7-intl is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131472" version="1" comment="php7-json is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131473" version="1" comment="php7-ldap is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131474" version="1" comment="php7-mbstring is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131475" version="1" comment="php7-mcrypt is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131476" version="1" comment="php7-mysql is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131477" version="1" comment="php7-odbc is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131478" version="1" comment="php7-opcache is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131479" version="1" comment="php7-openssl is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131480" version="1" comment="php7-pcntl is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131481" version="1" comment="php7-pdo is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131482" version="1" comment="php7-pear is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131483" version="1" comment="php7-pear-Archive_Tar is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131484" version="1" comment="php7-pgsql is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131485" version="1" comment="php7-phar is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131486" version="1" comment="php7-posix is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131487" version="1" comment="php7-pspell is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131488" version="1" comment="php7-shmop is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131489" version="1" comment="php7-snmp is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131490" version="1" comment="php7-soap is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131491" version="1" comment="php7-sockets is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131492" version="1" comment="php7-sqlite is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131493" version="1" comment="php7-sysvmsg is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131494" version="1" comment="php7-sysvsem is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131495" version="1" comment="php7-sysvshm is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131496" version="1" comment="php7-tokenizer is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131497" version="1" comment="php7-wddx is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131498" version="1" comment="php7-xmlreader is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131499" version="1" comment="php7-xmlrpc is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131500" version="1" comment="php7-xmlwriter is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131501" version="1" comment="php7-xsl is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131502" version="1" comment="php7-zip is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131503" version="1" comment="php7-zlib is &lt;7.0.7-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131504" version="1" comment="nodejs4 is &lt;4.6.0-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131505" version="1" comment="nodejs4-devel is &lt;4.6.0-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131506" version="1" comment="nodejs4-docs is &lt;4.6.0-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131507" version="1" comment="npm4 is &lt;4.6.0-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131508" version="1" comment="apache2-mod_php5 is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131509" version="1" comment="php5 is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131510" version="1" comment="php5-bcmath is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131511" version="1" comment="php5-bz2 is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131512" version="1" comment="php5-calendar is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131513" version="1" comment="php5-ctype is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131514" version="1" comment="php5-curl is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131515" version="1" comment="php5-dba is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131516" version="1" comment="php5-dom is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131517" version="1" comment="php5-enchant is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131518" version="1" comment="php5-exif is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131519" version="1" comment="php5-fastcgi is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131520" version="1" comment="php5-fileinfo is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131521" version="1" comment="php5-fpm is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131522" version="1" comment="php5-ftp is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131523" version="1" comment="php5-gd is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131524" version="1" comment="php5-gettext is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131525" version="1" comment="php5-gmp is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131526" version="1" comment="php5-iconv is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131527" version="1" comment="php5-imap is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131528" version="1" comment="php5-intl is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131529" version="1" comment="php5-json is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131530" version="1" comment="php5-ldap is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131531" version="1" comment="php5-mbstring is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131532" version="1" comment="php5-mcrypt is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131533" version="1" comment="php5-mysql is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131534" version="1" comment="php5-odbc is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131535" version="1" comment="php5-opcache is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131536" version="1" comment="php5-openssl is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131537" version="1" comment="php5-pcntl is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131538" version="1" comment="php5-pdo is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131539" version="1" comment="php5-pear is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131540" version="1" comment="php5-pgsql is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131541" version="1" comment="php5-phar is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131542" version="1" comment="php5-posix is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131543" version="1" comment="php5-pspell is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131544" version="1" comment="php5-shmop is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131545" version="1" comment="php5-snmp is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131546" version="1" comment="php5-soap is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131547" version="1" comment="php5-sockets is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131548" version="1" comment="php5-sqlite is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131549" version="1" comment="php5-suhosin is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131550" version="1" comment="php5-sysvmsg is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131551" version="1" comment="php5-sysvsem is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131552" version="1" comment="php5-sysvshm is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131553" version="1" comment="php5-tokenizer is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131554" version="1" comment="php5-wddx is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131555" version="1" comment="php5-xmlreader is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131556" version="1" comment="php5-xmlrpc is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131557" version="1" comment="php5-xmlwriter is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131558" version="1" comment="php5-xsl is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131559" version="1" comment="php5-zip is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131560" version="1" comment="php5-zlib is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131561" version="1" comment="apache2-mod_php7 is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131562" version="1" comment="php7 is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131563" version="1" comment="php7-bcmath is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131564" version="1" comment="php7-bz2 is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131565" version="1" comment="php7-calendar is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131566" version="1" comment="php7-ctype is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131567" version="1" comment="php7-curl is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131568" version="1" comment="php7-dba is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131569" version="1" comment="php7-dom is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131570" version="1" comment="php7-enchant is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131571" version="1" comment="php7-exif is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131572" version="1" comment="php7-fastcgi is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131573" version="1" comment="php7-fileinfo is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131574" version="1" comment="php7-fpm is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131575" version="1" comment="php7-ftp is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131576" version="1" comment="php7-gd is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131577" version="1" comment="php7-gettext is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131578" version="1" comment="php7-gmp is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131579" version="1" comment="php7-iconv is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131580" version="1" comment="php7-imap is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131581" version="1" comment="php7-intl is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131582" version="1" comment="php7-json is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131583" version="1" comment="php7-ldap is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131584" version="1" comment="php7-mbstring is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131585" version="1" comment="php7-mcrypt is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131586" version="1" comment="php7-mysql is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131587" version="1" comment="php7-odbc is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131588" version="1" comment="php7-opcache is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131589" version="1" comment="php7-openssl is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131590" version="1" comment="php7-pcntl is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131591" version="1" comment="php7-pdo is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131592" version="1" comment="php7-pear is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131593" version="1" comment="php7-pear-Archive_Tar is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131594" version="1" comment="php7-pgsql is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131595" version="1" comment="php7-phar is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131596" version="1" comment="php7-posix is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131597" version="1" comment="php7-pspell is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131598" version="1" comment="php7-shmop is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131599" version="1" comment="php7-snmp is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131600" version="1" comment="php7-soap is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131601" version="1" comment="php7-sockets is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131602" version="1" comment="php7-sqlite is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131603" version="1" comment="php7-sysvmsg is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131604" version="1" comment="php7-sysvsem is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131605" version="1" comment="php7-sysvshm is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131606" version="1" comment="php7-tokenizer is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131607" version="1" comment="php7-wddx is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131608" version="1" comment="php7-xmlreader is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131609" version="1" comment="php7-xmlrpc is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131610" version="1" comment="php7-xmlwriter is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131611" version="1" comment="php7-xsl is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131612" version="1" comment="php7-zip is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131613" version="1" comment="php7-zlib is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135372" version="1" comment="apache2-mod_php5 is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135373" version="1" comment="php5 is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135374" version="1" comment="php5-bcmath is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135375" version="1" comment="php5-bz2 is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135376" version="1" comment="php5-calendar is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135377" version="1" comment="php5-ctype is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135378" version="1" comment="php5-curl is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135379" version="1" comment="php5-dba is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135380" version="1" comment="php5-dom is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135381" version="1" comment="php5-enchant is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135382" version="1" comment="php5-exif is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135383" version="1" comment="php5-fastcgi is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135384" version="1" comment="php5-fileinfo is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135385" version="1" comment="php5-fpm is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135386" version="1" comment="php5-ftp is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135387" version="1" comment="php5-gd is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135388" version="1" comment="php5-gettext is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135389" version="1" comment="php5-gmp is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135390" version="1" comment="php5-iconv is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135391" version="1" comment="php5-imap is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135392" version="1" comment="php5-intl is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135393" version="1" comment="php5-json is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135394" version="1" comment="php5-ldap is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135395" version="1" comment="php5-mbstring is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135396" version="1" comment="php5-mcrypt is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135397" version="1" comment="php5-mysql is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135398" version="1" comment="php5-odbc is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135399" version="1" comment="php5-opcache is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135400" version="1" comment="php5-openssl is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135401" version="1" comment="php5-pcntl is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135402" version="1" comment="php5-pdo is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135403" version="1" comment="php5-pear is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135404" version="1" comment="php5-pgsql is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135405" version="1" comment="php5-phar is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135406" version="1" comment="php5-posix is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135407" version="1" comment="php5-pspell is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135408" version="1" comment="php5-shmop is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135409" version="1" comment="php5-snmp is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135410" version="1" comment="php5-soap is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135411" version="1" comment="php5-sockets is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135412" version="1" comment="php5-sqlite is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135413" version="1" comment="php5-suhosin is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135414" version="1" comment="php5-sysvmsg is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135415" version="1" comment="php5-sysvsem is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135416" version="1" comment="php5-sysvshm is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135417" version="1" comment="php5-tokenizer is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135418" version="1" comment="php5-wddx is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135419" version="1" comment="php5-xmlreader is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135420" version="1" comment="php5-xmlrpc is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135421" version="1" comment="php5-xmlwriter is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135422" version="1" comment="php5-xsl is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135423" version="1" comment="php5-zip is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135424" version="1" comment="php5-zlib is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135942" version="1" comment="nodejs4 is &lt;4.6.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135943" version="1" comment="nodejs4-devel is &lt;4.6.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135944" version="1" comment="nodejs4-docs is &lt;4.6.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135945" version="1" comment="npm4 is &lt;4.6.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136059" version="1" comment="apache2-mod_php7 is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136060" version="1" comment="php7 is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136061" version="1" comment="php7-bcmath is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136062" version="1" comment="php7-bz2 is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136063" version="1" comment="php7-calendar is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136064" version="1" comment="php7-ctype is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136065" version="1" comment="php7-curl is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136066" version="1" comment="php7-dba is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136067" version="1" comment="php7-dom is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136068" version="1" comment="php7-enchant is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136069" version="1" comment="php7-exif is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136070" version="1" comment="php7-fastcgi is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136071" version="1" comment="php7-fileinfo is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136072" version="1" comment="php7-fpm is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136073" version="1" comment="php7-ftp is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136074" version="1" comment="php7-gd is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136075" version="1" comment="php7-gettext is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136076" version="1" comment="php7-gmp is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136077" version="1" comment="php7-iconv is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136078" version="1" comment="php7-imap is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136079" version="1" comment="php7-intl is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136080" version="1" comment="php7-json is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136081" version="1" comment="php7-ldap is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136082" version="1" comment="php7-mbstring is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136083" version="1" comment="php7-mcrypt is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136084" version="1" comment="php7-mysql is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136085" version="1" comment="php7-odbc is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136086" version="1" comment="php7-opcache is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136087" version="1" comment="php7-openssl is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136088" version="1" comment="php7-pcntl is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136089" version="1" comment="php7-pdo is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136090" version="1" comment="php7-pear is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136091" version="1" comment="php7-pear-Archive_Tar is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136092" version="1" comment="php7-pgsql is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136093" version="1" comment="php7-phar is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136094" version="1" comment="php7-posix is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136095" version="1" comment="php7-pspell is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136096" version="1" comment="php7-shmop is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136097" version="1" comment="php7-snmp is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136098" version="1" comment="php7-soap is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136099" version="1" comment="php7-sockets is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136100" version="1" comment="php7-sqlite is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136101" version="1" comment="php7-sysvmsg is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136102" version="1" comment="php7-sysvsem is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136103" version="1" comment="php7-sysvshm is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136104" version="1" comment="php7-tokenizer is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136105" version="1" comment="php7-wddx is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136106" version="1" comment="php7-xmlreader is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136107" version="1" comment="php7-xmlrpc is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136108" version="1" comment="php7-xmlwriter is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136109" version="1" comment="php7-xsl is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136110" version="1" comment="php7-zip is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136111" version="1" comment="php7-zlib is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121568" version="1" comment="apache2-mod_php5 is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121569" version="1" comment="php5 is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121570" version="1" comment="php5-bcmath is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121571" version="1" comment="php5-bz2 is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121572" version="1" comment="php5-calendar is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121573" version="1" comment="php5-ctype is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121574" version="1" comment="php5-curl is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121575" version="1" comment="php5-dba is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121576" version="1" comment="php5-dom is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121577" version="1" comment="php5-enchant is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121578" version="1" comment="php5-exif is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121579" version="1" comment="php5-fastcgi is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121580" version="1" comment="php5-fileinfo is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121581" version="1" comment="php5-fpm is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121582" version="1" comment="php5-ftp is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121583" version="1" comment="php5-gd is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121584" version="1" comment="php5-gettext is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121585" version="1" comment="php5-gmp is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121586" version="1" comment="php5-iconv is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121587" version="1" comment="php5-intl is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121588" version="1" comment="php5-json is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121589" version="1" comment="php5-ldap is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121590" version="1" comment="php5-mbstring is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121591" version="1" comment="php5-mcrypt is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121592" version="1" comment="php5-mysql is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121593" version="1" comment="php5-odbc is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121594" version="1" comment="php5-opcache is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121595" version="1" comment="php5-openssl is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121596" version="1" comment="php5-pcntl is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121597" version="1" comment="php5-pdo is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121598" version="1" comment="php5-pear is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121599" version="1" comment="php5-pgsql is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121600" version="1" comment="php5-posix is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121601" version="1" comment="php5-pspell is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121602" version="1" comment="php5-shmop is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121603" version="1" comment="php5-snmp is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121604" version="1" comment="php5-soap is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121605" version="1" comment="php5-sockets is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121606" version="1" comment="php5-sqlite is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121607" version="1" comment="php5-suhosin is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121608" version="1" comment="php5-sysvmsg is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121609" version="1" comment="php5-sysvsem is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121610" version="1" comment="php5-sysvshm is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121611" version="1" comment="php5-tokenizer is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121612" version="1" comment="php5-wddx is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121613" version="1" comment="php5-xmlreader is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121614" version="1" comment="php5-xmlrpc is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121615" version="1" comment="php5-xmlwriter is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121616" version="1" comment="php5-xsl is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121617" version="1" comment="php5-zip is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121618" version="1" comment="php5-zlib is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136229" version="1" comment="apache2-mod_php5 is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136230" version="1" comment="php5 is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136231" version="1" comment="php5-bcmath is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136232" version="1" comment="php5-bz2 is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136233" version="1" comment="php5-calendar is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136234" version="1" comment="php5-ctype is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136235" version="1" comment="php5-curl is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136236" version="1" comment="php5-dba is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136237" version="1" comment="php5-dom is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136238" version="1" comment="php5-enchant is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136239" version="1" comment="php5-exif is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136240" version="1" comment="php5-fastcgi is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136241" version="1" comment="php5-fileinfo is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136242" version="1" comment="php5-fpm is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136243" version="1" comment="php5-ftp is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136244" version="1" comment="php5-gd is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136245" version="1" comment="php5-gettext is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136246" version="1" comment="php5-gmp is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136247" version="1" comment="php5-iconv is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136248" version="1" comment="php5-imap is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136249" version="1" comment="php5-intl is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136250" version="1" comment="php5-json is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136251" version="1" comment="php5-ldap is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136252" version="1" comment="php5-mbstring is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136253" version="1" comment="php5-mcrypt is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136254" version="1" comment="php5-mysql is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136255" version="1" comment="php5-odbc is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136256" version="1" comment="php5-opcache is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136257" version="1" comment="php5-openssl is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136258" version="1" comment="php5-pcntl is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136259" version="1" comment="php5-pdo is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136260" version="1" comment="php5-pear is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136261" version="1" comment="php5-pgsql is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136262" version="1" comment="php5-phar is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136263" version="1" comment="php5-posix is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136264" version="1" comment="php5-pspell is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136265" version="1" comment="php5-shmop is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136266" version="1" comment="php5-snmp is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136267" version="1" comment="php5-soap is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136268" version="1" comment="php5-sockets is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136269" version="1" comment="php5-sqlite is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136270" version="1" comment="php5-suhosin is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136271" version="1" comment="php5-sysvmsg is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136272" version="1" comment="php5-sysvsem is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136273" version="1" comment="php5-sysvshm is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136274" version="1" comment="php5-tokenizer is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136275" version="1" comment="php5-wddx is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136276" version="1" comment="php5-xmlreader is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136277" version="1" comment="php5-xmlrpc is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136278" version="1" comment="php5-xmlwriter is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136279" version="1" comment="php5-xsl is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136280" version="1" comment="php5-zip is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136281" version="1" comment="php5-zlib is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126792" version="1" comment="apache2-mod_php5 is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126793" version="1" comment="php5 is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126794" version="1" comment="php5-bcmath is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126795" version="1" comment="php5-bz2 is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126796" version="1" comment="php5-calendar is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126797" version="1" comment="php5-ctype is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126798" version="1" comment="php5-curl is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126799" version="1" comment="php5-dba is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126800" version="1" comment="php5-dom is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126801" version="1" comment="php5-enchant is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126802" version="1" comment="php5-exif is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126803" version="1" comment="php5-fastcgi is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126804" version="1" comment="php5-fileinfo is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126805" version="1" comment="php5-fpm is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126806" version="1" comment="php5-ftp is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126807" version="1" comment="php5-gd is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126808" version="1" comment="php5-gettext is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126809" version="1" comment="php5-gmp is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126810" version="1" comment="php5-iconv is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126811" version="1" comment="php5-intl is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126812" version="1" comment="php5-json is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126813" version="1" comment="php5-ldap is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126814" version="1" comment="php5-mbstring is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126815" version="1" comment="php5-mcrypt is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126816" version="1" comment="php5-mysql is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126817" version="1" comment="php5-odbc is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126818" version="1" comment="php5-opcache is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126819" version="1" comment="php5-openssl is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126820" version="1" comment="php5-pcntl is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126821" version="1" comment="php5-pdo is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126822" version="1" comment="php5-pear is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126823" version="1" comment="php5-pgsql is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126824" version="1" comment="php5-posix is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126825" version="1" comment="php5-pspell is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126826" version="1" comment="php5-shmop is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126827" version="1" comment="php5-snmp is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126828" version="1" comment="php5-soap is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126829" version="1" comment="php5-sockets is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126830" version="1" comment="php5-sqlite is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126831" version="1" comment="php5-suhosin is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126832" version="1" comment="php5-sysvmsg is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126833" version="1" comment="php5-sysvsem is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126834" version="1" comment="php5-sysvshm is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126835" version="1" comment="php5-tokenizer is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126836" version="1" comment="php5-wddx is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126837" version="1" comment="php5-xmlreader is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126838" version="1" comment="php5-xmlrpc is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126839" version="1" comment="php5-xmlwriter is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126840" version="1" comment="php5-xsl is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126841" version="1" comment="php5-zip is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126842" version="1" comment="php5-zlib is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127401" version="1" comment="apache2-mod_php5 is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127402" version="1" comment="php5 is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127403" version="1" comment="php5-bcmath is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127404" version="1" comment="php5-bz2 is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127405" version="1" comment="php5-calendar is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127406" version="1" comment="php5-ctype is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127407" version="1" comment="php5-curl is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127408" version="1" comment="php5-dba is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127409" version="1" comment="php5-dom is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127410" version="1" comment="php5-enchant is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127411" version="1" comment="php5-exif is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127412" version="1" comment="php5-fastcgi is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127413" version="1" comment="php5-fileinfo is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127414" version="1" comment="php5-fpm is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127415" version="1" comment="php5-ftp is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127416" version="1" comment="php5-gd is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127417" version="1" comment="php5-gettext is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127418" version="1" comment="php5-gmp is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127419" version="1" comment="php5-iconv is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127420" version="1" comment="php5-intl is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127421" version="1" comment="php5-json is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127422" version="1" comment="php5-ldap is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127423" version="1" comment="php5-mbstring is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127424" version="1" comment="php5-mcrypt is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127425" version="1" comment="php5-mysql is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127426" version="1" comment="php5-odbc is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127427" version="1" comment="php5-opcache is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127428" version="1" comment="php5-openssl is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127429" version="1" comment="php5-pcntl is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127430" version="1" comment="php5-pdo is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127431" version="1" comment="php5-pear is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127432" version="1" comment="php5-pgsql is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127433" version="1" comment="php5-phar is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127434" version="1" comment="php5-posix is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127435" version="1" comment="php5-pspell is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127436" version="1" comment="php5-shmop is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127437" version="1" comment="php5-snmp is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127438" version="1" comment="php5-soap is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127439" version="1" comment="php5-sockets is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127440" version="1" comment="php5-sqlite is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127441" version="1" comment="php5-suhosin is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127442" version="1" comment="php5-sysvmsg is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127443" version="1" comment="php5-sysvsem is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127444" version="1" comment="php5-sysvshm is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127445" version="1" comment="php5-tokenizer is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127446" version="1" comment="php5-wddx is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127447" version="1" comment="php5-xmlreader is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127448" version="1" comment="php5-xmlrpc is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127449" version="1" comment="php5-xmlwriter is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127450" version="1" comment="php5-xsl is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127451" version="1" comment="php5-zip is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127452" version="1" comment="php5-zlib is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128410" version="1" comment="apache2-mod_php5 is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128411" version="1" comment="php5 is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128412" version="1" comment="php5-bcmath is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128413" version="1" comment="php5-bz2 is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128414" version="1" comment="php5-calendar is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128415" version="1" comment="php5-ctype is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128416" version="1" comment="php5-curl is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128417" version="1" comment="php5-dba is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128418" version="1" comment="php5-dom is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128419" version="1" comment="php5-enchant is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128420" version="1" comment="php5-exif is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128421" version="1" comment="php5-fastcgi is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128422" version="1" comment="php5-fileinfo is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128423" version="1" comment="php5-fpm is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128424" version="1" comment="php5-ftp is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128425" version="1" comment="php5-gd is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128426" version="1" comment="php5-gettext is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128427" version="1" comment="php5-gmp is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128428" version="1" comment="php5-iconv is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128429" version="1" comment="php5-intl is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128430" version="1" comment="php5-json is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128431" version="1" comment="php5-ldap is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128432" version="1" comment="php5-mbstring is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128433" version="1" comment="php5-mcrypt is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128434" version="1" comment="php5-mysql is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128435" version="1" comment="php5-odbc is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128436" version="1" comment="php5-opcache is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128437" version="1" comment="php5-openssl is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128438" version="1" comment="php5-pcntl is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128439" version="1" comment="php5-pdo is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128440" version="1" comment="php5-pear is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128441" version="1" comment="php5-pgsql is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128442" version="1" comment="php5-phar is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128443" version="1" comment="php5-posix is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128444" version="1" comment="php5-pspell is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128445" version="1" comment="php5-shmop is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128446" version="1" comment="php5-snmp is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128447" version="1" comment="php5-soap is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128448" version="1" comment="php5-sockets is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128449" version="1" comment="php5-sqlite is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128450" version="1" comment="php5-suhosin is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128451" version="1" comment="php5-sysvmsg is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128452" version="1" comment="php5-sysvsem is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128453" version="1" comment="php5-sysvshm is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128454" version="1" comment="php5-tokenizer is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128455" version="1" comment="php5-wddx is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128456" version="1" comment="php5-xmlreader is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128457" version="1" comment="php5-xmlrpc is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128458" version="1" comment="php5-xmlwriter is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128459" version="1" comment="php5-xsl is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128460" version="1" comment="php5-zip is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128461" version="1" comment="php5-zlib is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129019" version="1" comment="apache2-mod_php5 is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129020" version="1" comment="php5 is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129021" version="1" comment="php5-bcmath is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129022" version="1" comment="php5-bz2 is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129023" version="1" comment="php5-calendar is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129024" version="1" comment="php5-ctype is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129025" version="1" comment="php5-curl is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129026" version="1" comment="php5-dba is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129027" version="1" comment="php5-dom is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129028" version="1" comment="php5-enchant is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129029" version="1" comment="php5-exif is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129030" version="1" comment="php5-fastcgi is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129031" version="1" comment="php5-fileinfo is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129032" version="1" comment="php5-fpm is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129033" version="1" comment="php5-ftp is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129034" version="1" comment="php5-gd is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129035" version="1" comment="php5-gettext is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129036" version="1" comment="php5-gmp is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129037" version="1" comment="php5-iconv is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129038" version="1" comment="php5-imap is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129039" version="1" comment="php5-intl is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129040" version="1" comment="php5-json is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129041" version="1" comment="php5-ldap is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129042" version="1" comment="php5-mbstring is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129043" version="1" comment="php5-mcrypt is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129044" version="1" comment="php5-mysql is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129045" version="1" comment="php5-odbc is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129046" version="1" comment="php5-opcache is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129047" version="1" comment="php5-openssl is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129048" version="1" comment="php5-pcntl is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129049" version="1" comment="php5-pdo is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129050" version="1" comment="php5-pear is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129051" version="1" comment="php5-pgsql is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129052" version="1" comment="php5-phar is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129053" version="1" comment="php5-posix is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129054" version="1" comment="php5-pspell is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129055" version="1" comment="php5-shmop is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129056" version="1" comment="php5-snmp is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129057" version="1" comment="php5-soap is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129058" version="1" comment="php5-sockets is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129059" version="1" comment="php5-sqlite is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129060" version="1" comment="php5-suhosin is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129061" version="1" comment="php5-sysvmsg is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129062" version="1" comment="php5-sysvsem is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129063" version="1" comment="php5-sysvshm is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129064" version="1" comment="php5-tokenizer is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129065" version="1" comment="php5-wddx is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129066" version="1" comment="php5-xmlreader is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129067" version="1" comment="php5-xmlrpc is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129068" version="1" comment="php5-xmlwriter is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129069" version="1" comment="php5-xsl is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129070" version="1" comment="php5-zip is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129071" version="1" comment="php5-zlib is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146532" version="1" comment="apache2-mod_php5 is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146533" version="1" comment="php5 is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146534" version="1" comment="php5-bcmath is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146535" version="1" comment="php5-bz2 is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146536" version="1" comment="php5-calendar is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146537" version="1" comment="php5-ctype is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146538" version="1" comment="php5-curl is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146539" version="1" comment="php5-dba is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146540" version="1" comment="php5-dom is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146541" version="1" comment="php5-enchant is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146542" version="1" comment="php5-exif is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146543" version="1" comment="php5-fastcgi is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146544" version="1" comment="php5-fileinfo is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146545" version="1" comment="php5-fpm is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146546" version="1" comment="php5-ftp is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146547" version="1" comment="php5-gd is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146548" version="1" comment="php5-gettext is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146549" version="1" comment="php5-gmp is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146550" version="1" comment="php5-iconv is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146551" version="1" comment="php5-imap is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146552" version="1" comment="php5-intl is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146553" version="1" comment="php5-json is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146554" version="1" comment="php5-ldap is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146555" version="1" comment="php5-mbstring is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146556" version="1" comment="php5-mcrypt is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146557" version="1" comment="php5-mysql is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146558" version="1" comment="php5-odbc is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146559" version="1" comment="php5-opcache is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146560" version="1" comment="php5-openssl is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146561" version="1" comment="php5-pcntl is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146562" version="1" comment="php5-pdo is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146563" version="1" comment="php5-pear is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146564" version="1" comment="php5-pgsql is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146565" version="1" comment="php5-phar is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146566" version="1" comment="php5-posix is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146567" version="1" comment="php5-pspell is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146568" version="1" comment="php5-shmop is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146569" version="1" comment="php5-snmp is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146570" version="1" comment="php5-soap is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146571" version="1" comment="php5-sockets is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146572" version="1" comment="php5-sqlite is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146573" version="1" comment="php5-suhosin is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146574" version="1" comment="php5-sysvmsg is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146575" version="1" comment="php5-sysvsem is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146576" version="1" comment="php5-sysvshm is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146577" version="1" comment="php5-tokenizer is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146578" version="1" comment="php5-wddx is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146579" version="1" comment="php5-xmlreader is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146580" version="1" comment="php5-xmlrpc is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146581" version="1" comment="php5-xmlwriter is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146582" version="1" comment="php5-xsl is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146583" version="1" comment="php5-zip is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146584" version="1" comment="php5-zlib is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148263" version="1" comment="nodejs6 is &lt;6.9.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148264" version="1" comment="nodejs6-devel is &lt;6.9.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148265" version="1" comment="nodejs6-docs is &lt;6.9.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148266" version="1" comment="npm6 is &lt;6.9.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148705" version="1" comment="apache2-mod_php7 is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148706" version="1" comment="php7 is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148707" version="1" comment="php7-bcmath is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148708" version="1" comment="php7-bz2 is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148709" version="1" comment="php7-calendar is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148710" version="1" comment="php7-ctype is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148711" version="1" comment="php7-curl is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148712" version="1" comment="php7-dba is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148713" version="1" comment="php7-dom is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148714" version="1" comment="php7-enchant is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148715" version="1" comment="php7-exif is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148716" version="1" comment="php7-fastcgi is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148717" version="1" comment="php7-fileinfo is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148718" version="1" comment="php7-fpm is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148719" version="1" comment="php7-ftp is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148720" version="1" comment="php7-gd is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148721" version="1" comment="php7-gettext is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148722" version="1" comment="php7-gmp is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148723" version="1" comment="php7-iconv is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148724" version="1" comment="php7-imap is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148725" version="1" comment="php7-intl is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148726" version="1" comment="php7-json is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148727" version="1" comment="php7-ldap is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148728" version="1" comment="php7-mbstring is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148729" version="1" comment="php7-mcrypt is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148730" version="1" comment="php7-mysql is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148731" version="1" comment="php7-odbc is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148732" version="1" comment="php7-opcache is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148733" version="1" comment="php7-openssl is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148734" version="1" comment="php7-pcntl is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148735" version="1" comment="php7-pdo is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148736" version="1" comment="php7-pear is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148737" version="1" comment="php7-pear-Archive_Tar is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148738" version="1" comment="php7-pgsql is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148739" version="1" comment="php7-phar is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148740" version="1" comment="php7-posix is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148741" version="1" comment="php7-pspell is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148742" version="1" comment="php7-shmop is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148743" version="1" comment="php7-snmp is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148744" version="1" comment="php7-soap is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148745" version="1" comment="php7-sockets is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148746" version="1" comment="php7-sqlite is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148747" version="1" comment="php7-sysvmsg is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148748" version="1" comment="php7-sysvsem is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148749" version="1" comment="php7-sysvshm is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148750" version="1" comment="php7-tokenizer is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148751" version="1" comment="php7-wddx is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148752" version="1" comment="php7-xmlreader is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148753" version="1" comment="php7-xmlrpc is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148754" version="1" comment="php7-xmlwriter is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148755" version="1" comment="php7-xsl is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148756" version="1" comment="php7-zip is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148757" version="1" comment="php7-zlib is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148855" version="1" comment="apache2-mod_php5 is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148856" version="1" comment="php5 is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148857" version="1" comment="php5-bcmath is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148858" version="1" comment="php5-bz2 is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148859" version="1" comment="php5-calendar is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148860" version="1" comment="php5-ctype is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148861" version="1" comment="php5-curl is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148862" version="1" comment="php5-dba is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148863" version="1" comment="php5-dom is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148864" version="1" comment="php5-enchant is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148865" version="1" comment="php5-exif is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148866" version="1" comment="php5-fastcgi is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148867" version="1" comment="php5-fileinfo is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148868" version="1" comment="php5-fpm is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148869" version="1" comment="php5-ftp is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148870" version="1" comment="php5-gd is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148871" version="1" comment="php5-gettext is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148872" version="1" comment="php5-gmp is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148873" version="1" comment="php5-iconv is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148874" version="1" comment="php5-imap is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148875" version="1" comment="php5-intl is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148876" version="1" comment="php5-json is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148877" version="1" comment="php5-ldap is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148878" version="1" comment="php5-mbstring is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148879" version="1" comment="php5-mcrypt is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148880" version="1" comment="php5-mysql is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148881" version="1" comment="php5-odbc is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148882" version="1" comment="php5-opcache is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148883" version="1" comment="php5-openssl is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148884" version="1" comment="php5-pcntl is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148885" version="1" comment="php5-pdo is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148886" version="1" comment="php5-pear is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148887" version="1" comment="php5-pgsql is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148888" version="1" comment="php5-phar is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148889" version="1" comment="php5-posix is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148890" version="1" comment="php5-pspell is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148891" version="1" comment="php5-shmop is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148892" version="1" comment="php5-snmp is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148893" version="1" comment="php5-soap is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148894" version="1" comment="php5-sockets is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148895" version="1" comment="php5-sqlite is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148896" version="1" comment="php5-suhosin is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148897" version="1" comment="php5-sysvmsg is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148898" version="1" comment="php5-sysvsem is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148899" version="1" comment="php5-sysvshm is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148900" version="1" comment="php5-tokenizer is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148901" version="1" comment="php5-wddx is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148902" version="1" comment="php5-xmlreader is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148903" version="1" comment="php5-xmlrpc is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148904" version="1" comment="php5-xmlwriter is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148905" version="1" comment="php5-xsl is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148906" version="1" comment="php5-zip is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148907" version="1" comment="php5-zlib is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146260" version="1" comment="apache2-mod_php7 is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146261" version="1" comment="php7 is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146262" version="1" comment="php7-bcmath is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146263" version="1" comment="php7-bz2 is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146264" version="1" comment="php7-calendar is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146265" version="1" comment="php7-ctype is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146266" version="1" comment="php7-curl is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146267" version="1" comment="php7-dba is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146268" version="1" comment="php7-dom is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146269" version="1" comment="php7-enchant is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146270" version="1" comment="php7-exif is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146271" version="1" comment="php7-fastcgi is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146272" version="1" comment="php7-fileinfo is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146273" version="1" comment="php7-fpm is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146274" version="1" comment="php7-ftp is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146275" version="1" comment="php7-gd is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146276" version="1" comment="php7-gettext is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146277" version="1" comment="php7-gmp is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146278" version="1" comment="php7-iconv is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146279" version="1" comment="php7-imap is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146280" version="1" comment="php7-intl is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146281" version="1" comment="php7-json is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146282" version="1" comment="php7-ldap is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146283" version="1" comment="php7-mbstring is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146284" version="1" comment="php7-mcrypt is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146285" version="1" comment="php7-mysql is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146286" version="1" comment="php7-odbc is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146287" version="1" comment="php7-opcache is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146288" version="1" comment="php7-openssl is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146289" version="1" comment="php7-pcntl is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146290" version="1" comment="php7-pdo is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146291" version="1" comment="php7-pear is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146292" version="1" comment="php7-pear-Archive_Tar is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146293" version="1" comment="php7-pgsql is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146294" version="1" comment="php7-phar is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146295" version="1" comment="php7-posix is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146296" version="1" comment="php7-pspell is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146297" version="1" comment="php7-shmop is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146298" version="1" comment="php7-snmp is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146299" version="1" comment="php7-soap is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146300" version="1" comment="php7-sockets is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146301" version="1" comment="php7-sqlite is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146302" version="1" comment="php7-sysvmsg is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146303" version="1" comment="php7-sysvsem is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146304" version="1" comment="php7-sysvshm is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146305" version="1" comment="php7-tokenizer is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146306" version="1" comment="php7-wddx is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146307" version="1" comment="php7-xmlreader is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146308" version="1" comment="php7-xmlrpc is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146309" version="1" comment="php7-xmlwriter is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146310" version="1" comment="php7-xsl is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146311" version="1" comment="php7-zip is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146312" version="1" comment="php7-zlib is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135214" version="1" comment="bind-chrootenv is &lt;9.9.9P1-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135215" version="1" comment="bind-doc is &lt;9.9.9P1-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135881" version="1" comment="libtcnative-1-0 is &lt;1.1.34-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135882" version="1" comment="qemu-arm is &lt;2.6.2-31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135883" version="1" comment="qemu-block-rbd is &lt;2.6.2-31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135884" version="1" comment="qemu-block-ssh is &lt;2.6.2-31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135885" version="1" comment="qemu-guest-agent is &lt;2.6.2-31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135886" version="1" comment="qemu-lang is &lt;2.6.2-31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135932" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.111-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135933" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.111-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135980" version="1" comment="dovecot22 is &lt;2.2.13-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135981" version="1" comment="dovecot22-backend-mysql is &lt;2.2.13-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135982" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.13-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135983" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.13-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136002" version="1" comment="mariadb-tools is &lt;10.0.28-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136152" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.121-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136153" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.121-36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136403" version="1" comment="libfreebl3-hmac is &lt;3.21.3-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136404" version="1" comment="libsoftokn3-hmac is &lt;3.21.3-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136667" version="1" comment="kernel-default-base is &lt;4.4.21-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142199" version="1" comment="tomcat is &lt;8.0.36-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142200" version="1" comment="tomcat-admin-webapps is &lt;8.0.36-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142201" version="1" comment="tomcat-docs-webapp is &lt;8.0.36-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142202" version="1" comment="tomcat-el-3_0-api is &lt;8.0.36-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142203" version="1" comment="tomcat-javadoc is &lt;8.0.36-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142204" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.36-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142205" version="1" comment="tomcat-lib is &lt;8.0.36-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142206" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.36-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142207" version="1" comment="tomcat-webapps is &lt;8.0.36-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142742" version="1" comment="kernel-default-base is &lt;4.4.21-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147476" version="1" comment="openssh-fips is &lt;7.2p2-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147968" version="1" comment="policycoreutils is &lt;2.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147969" version="1" comment="policycoreutils-python is &lt;2.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147970" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.121-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147971" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.121-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148007" version="1" comment="libgnutls-openssl27 is &lt;3.2.15-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148052" version="1" comment="libxml2-doc is &lt;2.9.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148204" version="1" comment="mariadb-tools is &lt;10.0.29-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148322" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.2j-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148323" version="1" comment="openssl-doc is &lt;1.0.2j-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148541" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.131-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148542" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.131-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149023" version="1" comment="kernel-default-base is &lt;4.4.49-92.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149103" version="1" comment="bind-chrootenv is &lt;9.9.9P1-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149104" version="1" comment="bind-doc is &lt;9.9.9P1-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149415" version="1" comment="qemu-arm is &lt;2.6.2-41.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149416" version="1" comment="qemu-block-rbd is &lt;2.6.2-41.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149417" version="1" comment="qemu-block-ssh is &lt;2.6.2-41.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149418" version="1" comment="qemu-guest-agent is &lt;2.6.2-41.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149419" version="1" comment="qemu-lang is &lt;2.6.2-41.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146859" version="1" comment="freeradius-server is &lt;3.0.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146860" version="1" comment="freeradius-server-doc is &lt;3.0.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146861" version="1" comment="freeradius-server-krb5 is &lt;3.0.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146862" version="1" comment="freeradius-server-ldap is &lt;3.0.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146863" version="1" comment="freeradius-server-libs is &lt;3.0.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146864" version="1" comment="freeradius-server-mysql is &lt;3.0.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146865" version="1" comment="freeradius-server-perl is &lt;3.0.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146866" version="1" comment="freeradius-server-postgresql is &lt;3.0.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146867" version="1" comment="freeradius-server-python is &lt;3.0.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146868" version="1" comment="freeradius-server-sqlite is &lt;3.0.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146869" version="1" comment="freeradius-server-utils is &lt;3.0.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146882" version="1" comment="bind-chrootenv is &lt;9.9.9P1-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146883" version="1" comment="bind-doc is &lt;9.9.9P1-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146969" version="1" comment="perl-DBD-mysql is &lt;4.021-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146970" version="1" comment="squid is &lt;3.5.21-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146971" version="1" comment="qemu-arm is &lt;2.6.2-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146972" version="1" comment="qemu-block-rbd is &lt;2.6.2-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146973" version="1" comment="qemu-block-ssh is &lt;2.6.2-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146974" version="1" comment="qemu-guest-agent is &lt;2.6.2-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146975" version="1" comment="qemu-lang is &lt;2.6.2-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147241" version="1" comment="kernel-default-base is &lt;4.4.38-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147373" version="1" comment="apache2 is &lt;2.4.23-16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147374" version="1" comment="apache2-doc is &lt;2.4.23-16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147375" version="1" comment="apache2-example-pages is &lt;2.4.23-16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147376" version="1" comment="apache2-prefork is &lt;2.4.23-16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147377" version="1" comment="apache2-utils is &lt;2.4.23-16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147378" version="1" comment="apache2-worker is &lt;2.4.23-16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129852" version="1" comment="kernel-compute is &lt;3.12.58-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129853" version="1" comment="kernel-compute-base is &lt;3.12.58-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129854" version="1" comment="kernel-compute-devel is &lt;3.12.58-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129855" version="1" comment="kernel-compute_debug is &lt;3.12.58-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129856" version="1" comment="kernel-compute_debug-devel is &lt;3.12.58-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129857" version="1" comment="kernel-devel-rt is &lt;3.12.58-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129858" version="1" comment="kernel-rt is &lt;3.12.58-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129859" version="1" comment="kernel-rt-base is &lt;3.12.58-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129860" version="1" comment="kernel-rt-devel is &lt;3.12.58-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129861" version="1" comment="kernel-rt_debug is &lt;3.12.58-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129862" version="1" comment="kernel-rt_debug-devel is &lt;3.12.58-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129863" version="1" comment="kernel-source-rt is &lt;3.12.58-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129864" version="1" comment="kernel-syms-rt is &lt;3.12.58-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129865" version="1" comment="SUSE-Linux-Enterprise-RT-release is ==12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130758" version="1" comment="kernel-compute is &lt;3.12.61-60.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130759" version="1" comment="kernel-compute-base is &lt;3.12.61-60.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130760" version="1" comment="kernel-compute-devel is &lt;3.12.61-60.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130761" version="1" comment="kernel-compute_debug is &lt;3.12.61-60.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130762" version="1" comment="kernel-compute_debug-devel is &lt;3.12.61-60.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130763" version="1" comment="kernel-devel-rt is &lt;3.12.61-60.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130764" version="1" comment="kernel-rt is &lt;3.12.61-60.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130765" version="1" comment="kernel-rt-base is &lt;3.12.61-60.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130766" version="1" comment="kernel-rt-devel is &lt;3.12.61-60.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130767" version="1" comment="kernel-rt_debug is &lt;3.12.61-60.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130768" version="1" comment="kernel-rt_debug-devel is &lt;3.12.61-60.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130769" version="1" comment="kernel-source-rt is &lt;3.12.61-60.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130770" version="1" comment="kernel-syms-rt is &lt;3.12.61-60.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146147" version="1" comment="kernel-compute is &lt;3.12.67-60.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146148" version="1" comment="kernel-compute-base is &lt;3.12.67-60.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146149" version="1" comment="kernel-compute-devel is &lt;3.12.67-60.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146150" version="1" comment="kernel-compute_debug is &lt;3.12.67-60.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146151" version="1" comment="kernel-compute_debug-devel is &lt;3.12.67-60.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146152" version="1" comment="kernel-devel-rt is &lt;3.12.67-60.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146153" version="1" comment="kernel-rt is &lt;3.12.67-60.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146154" version="1" comment="kernel-rt-base is &lt;3.12.67-60.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146155" version="1" comment="kernel-rt-devel is &lt;3.12.67-60.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146156" version="1" comment="kernel-rt_debug is &lt;3.12.67-60.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146157" version="1" comment="kernel-rt_debug-devel is &lt;3.12.67-60.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146158" version="1" comment="kernel-source-rt is &lt;3.12.67-60.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146159" version="1" comment="kernel-syms-rt is &lt;3.12.67-60.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148144" version="1" comment="kernel-compute is &lt;3.12.69-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148145" version="1" comment="kernel-compute-base is &lt;3.12.69-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148146" version="1" comment="kernel-compute-devel is &lt;3.12.69-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148147" version="1" comment="kernel-compute_debug is &lt;3.12.69-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148148" version="1" comment="kernel-compute_debug-devel is &lt;3.12.69-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148149" version="1" comment="kernel-devel-rt is &lt;3.12.69-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148150" version="1" comment="kernel-rt is &lt;3.12.69-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148151" version="1" comment="kernel-rt-base is &lt;3.12.69-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148152" version="1" comment="kernel-rt-devel is &lt;3.12.69-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148153" version="1" comment="kernel-rt_debug is &lt;3.12.69-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148154" version="1" comment="kernel-rt_debug-devel is &lt;3.12.69-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148155" version="1" comment="kernel-source-rt is &lt;3.12.69-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148156" version="1" comment="kernel-syms-rt is &lt;3.12.69-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117456" version="1" comment="SUSE_SLES_SAP-release is ==12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131614" version="1" comment="kgraft-patch-3_12_60-52_54-default is &lt;2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131615" version="1" comment="kgraft-patch-3_12_60-52_54-xen is &lt;2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131616" version="1" comment="kgraft-patch-SLE12_Update_15 is &lt;2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131617" version="1" comment="kgraft-patch-3_12_60-52_49-default is &lt;2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131618" version="1" comment="kgraft-patch-3_12_60-52_49-xen is &lt;2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131619" version="1" comment="kgraft-patch-SLE12_Update_14 is &lt;2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131620" version="1" comment="kgraft-patch-3_12_55-52_45-default is &lt;2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131621" version="1" comment="kgraft-patch-3_12_55-52_45-xen is &lt;2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131622" version="1" comment="kgraft-patch-SLE12_Update_13 is &lt;2-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131623" version="1" comment="kgraft-patch-3_12_55-52_42-default is &lt;2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131624" version="1" comment="kgraft-patch-3_12_55-52_42-xen is &lt;2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131625" version="1" comment="kgraft-patch-SLE12_Update_12 is &lt;2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131626" version="1" comment="kgraft-patch-3_12_51-52_39-default is &lt;4-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131627" version="1" comment="kgraft-patch-3_12_51-52_39-xen is &lt;4-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131628" version="1" comment="kgraft-patch-SLE12_Update_11 is &lt;4-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131629" version="1" comment="kgraft-patch-3_12_51-52_31-default is &lt;5-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131630" version="1" comment="kgraft-patch-3_12_51-52_31-xen is &lt;5-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131631" version="1" comment="kgraft-patch-SLE12_Update_9 is &lt;5-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131632" version="1" comment="kgraft-patch-3_12_48-52_27-default is &lt;5-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131633" version="1" comment="kgraft-patch-3_12_48-52_27-xen is &lt;5-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131634" version="1" comment="kgraft-patch-SLE12_Update_8 is &lt;5-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131635" version="1" comment="kgraft-patch-3_12_44-52_18-default is &lt;6-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131636" version="1" comment="kgraft-patch-3_12_44-52_18-xen is &lt;6-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131637" version="1" comment="kgraft-patch-SLE12_Update_7 is &lt;6-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131638" version="1" comment="kgraft-patch-3_12_51-52_34-default is &lt;5-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131639" version="1" comment="kgraft-patch-3_12_51-52_34-xen is &lt;5-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131640" version="1" comment="kgraft-patch-SLE12_Update_10 is &lt;5-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131641" version="1" comment="libmysqlclient-devel is &lt;10.0.26-20.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131642" version="1" comment="libmysqlclient18 is &lt;10.0.26-20.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131643" version="1" comment="libmysqlclient18-32bit is &lt;10.0.26-20.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131644" version="1" comment="libmysqlclient_r18 is &lt;10.0.26-20.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131645" version="1" comment="libmysqld-devel is &lt;10.0.26-20.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131646" version="1" comment="libmysqld18 is &lt;10.0.26-20.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131647" version="1" comment="mariadb is &lt;10.0.26-20.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131648" version="1" comment="mariadb-client is &lt;10.0.26-20.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131649" version="1" comment="mariadb-errormessages is &lt;10.0.26-20.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131650" version="1" comment="mariadb-tools is &lt;10.0.26-20.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131651" version="1" comment="apache2 is &lt;2.4.10-14.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131652" version="1" comment="apache2-doc is &lt;2.4.10-14.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131653" version="1" comment="apache2-example-pages is &lt;2.4.10-14.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131654" version="1" comment="apache2-prefork is &lt;2.4.10-14.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131655" version="1" comment="apache2-utils is &lt;2.4.10-14.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131656" version="1" comment="apache2-worker is &lt;2.4.10-14.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131657" version="1" comment="openssh-fips is &lt;6.6p1-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131663" version="1" comment="libstorage is &lt;2.25.16.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131664" version="1" comment="libstorage-ruby is &lt;2.25.16.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131665" version="1" comment="libstorage5 is &lt;2.25.16.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131666" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-27.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131667" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-27.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131668" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-27.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131669" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-27.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131670" version="1" comment="openssl is &lt;1.0.1i-27.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131671" version="1" comment="openssl-doc is &lt;1.0.1i-27.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131672" version="1" comment="apache2-mod_nss is &lt;1.0.14-10.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131673" version="1" comment="libmysqlclient-devel is &lt;10.0.27-20.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131674" version="1" comment="libmysqlclient18 is &lt;10.0.27-20.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131675" version="1" comment="libmysqlclient18-32bit is &lt;10.0.27-20.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131676" version="1" comment="libmysqlclient_r18 is &lt;10.0.27-20.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131677" version="1" comment="libmysqld-devel is &lt;10.0.27-20.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131678" version="1" comment="libmysqld18 is &lt;10.0.27-20.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131679" version="1" comment="mariadb is &lt;10.0.27-20.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131680" version="1" comment="mariadb-client is &lt;10.0.27-20.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131681" version="1" comment="mariadb-errormessages is &lt;10.0.27-20.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131682" version="1" comment="mariadb-tools is &lt;10.0.27-20.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131683" version="1" comment="bind is &lt;9.9.9P1-28.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131684" version="1" comment="bind-chrootenv is &lt;9.9.9P1-28.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131685" version="1" comment="bind-doc is &lt;9.9.9P1-28.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131686" version="1" comment="bind-libs is &lt;9.9.9P1-28.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131687" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-28.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131688" version="1" comment="bind-utils is &lt;9.9.9P1-28.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131689" version="1" comment="postgresql93 is &lt;9.3.14-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131690" version="1" comment="postgresql93-contrib is &lt;9.3.14-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131691" version="1" comment="postgresql93-docs is &lt;9.3.14-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131692" version="1" comment="postgresql93-server is &lt;9.3.14-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131693" version="1" comment="libgudev-1_0-0 is &lt;210-70.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131694" version="1" comment="libgudev-1_0-0-32bit is &lt;210-70.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131695" version="1" comment="libudev1 is &lt;210-70.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131696" version="1" comment="libudev1-32bit is &lt;210-70.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131697" version="1" comment="systemd is &lt;210-70.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131698" version="1" comment="systemd-32bit is &lt;210-70.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131699" version="1" comment="systemd-bash-completion is &lt;210-70.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131700" version="1" comment="systemd-sysvinit is &lt;210-70.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131701" version="1" comment="udev is &lt;210-70.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131702" version="1" comment="xen is &lt;4.4.4_04-22.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131703" version="1" comment="xen-doc-html is &lt;4.4.4_04-22.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131704" version="1" comment="xen-kmp-default is &lt;4.4.4_04_k3.12.60_52.54-22.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131705" version="1" comment="xen-libs is &lt;4.4.4_04-22.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131706" version="1" comment="xen-libs-32bit is &lt;4.4.4_04-22.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131707" version="1" comment="xen-tools is &lt;4.4.4_04-22.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131708" version="1" comment="xen-tools-domU is &lt;4.4.4_04-22.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131709" version="1" comment="kernel-default is &lt;3.12.60-52.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131710" version="1" comment="kernel-default-base is &lt;3.12.60-52.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131711" version="1" comment="kernel-default-devel is &lt;3.12.60-52.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131712" version="1" comment="kernel-devel is &lt;3.12.60-52.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131713" version="1" comment="kernel-macros is &lt;3.12.60-52.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131714" version="1" comment="kernel-source is &lt;3.12.60-52.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131715" version="1" comment="kernel-syms is &lt;3.12.60-52.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131716" version="1" comment="kernel-xen is &lt;3.12.60-52.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131717" version="1" comment="kernel-xen-base is &lt;3.12.60-52.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131718" version="1" comment="kernel-xen-devel is &lt;3.12.60-52.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131719" version="1" comment="kgraft-patch-3_12_60-52_57-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131720" version="1" comment="kgraft-patch-3_12_60-52_57-xen is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131721" version="1" comment="kgraft-patch-SLE12_Update_16 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131722" version="1" comment="kgraft-patch-3_12_51-52_39-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131723" version="1" comment="kgraft-patch-3_12_51-52_39-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131724" version="1" comment="kgraft-patch-SLE12_Update_11 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131725" version="1" comment="kgraft-patch-3_12_51-52_31-default is &lt;6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131726" version="1" comment="kgraft-patch-3_12_51-52_31-xen is &lt;6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131727" version="1" comment="kgraft-patch-SLE12_Update_9 is &lt;6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131728" version="1" comment="kgraft-patch-3_12_51-52_34-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131729" version="1" comment="kgraft-patch-3_12_51-52_34-xen is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131730" version="1" comment="kgraft-patch-SLE12_Update_10 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131731" version="1" comment="kgraft-patch-3_12_55-52_42-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131732" version="1" comment="kgraft-patch-3_12_55-52_42-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131733" version="1" comment="kgraft-patch-SLE12_Update_12 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131734" version="1" comment="kgraft-patch-3_12_60-52_49-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131735" version="1" comment="kgraft-patch-3_12_60-52_49-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131736" version="1" comment="kgraft-patch-SLE12_Update_14 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131737" version="1" comment="kgraft-patch-3_12_60-52_54-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131738" version="1" comment="kgraft-patch-3_12_60-52_54-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131739" version="1" comment="kgraft-patch-SLE12_Update_15 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131740" version="1" comment="kgraft-patch-3_12_55-52_45-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131741" version="1" comment="kgraft-patch-3_12_55-52_45-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131742" version="1" comment="kgraft-patch-SLE12_Update_13 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135216" version="1" comment="bind is &lt;9.9.9P1-28.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135217" version="1" comment="bind-chrootenv is &lt;9.9.9P1-28.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135218" version="1" comment="bind-doc is &lt;9.9.9P1-28.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135219" version="1" comment="bind-libs is &lt;9.9.9P1-28.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135220" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-28.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135221" version="1" comment="bind-utils is &lt;9.9.9P1-28.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135489" version="1" comment="qemu is &lt;2.0.2-48.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135490" version="1" comment="qemu-block-curl is &lt;2.0.2-48.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135491" version="1" comment="qemu-block-rbd is &lt;2.0.2-48.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135492" version="1" comment="qemu-guest-agent is &lt;2.0.2-48.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135493" version="1" comment="qemu-ipxe is &lt;1.0.0-48.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135494" version="1" comment="qemu-kvm is &lt;2.0.2-48.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135495" version="1" comment="qemu-lang is &lt;2.0.2-48.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135496" version="1" comment="qemu-seabios is &lt;1.7.4-48.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135497" version="1" comment="qemu-sgabios is &lt;8-48.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135498" version="1" comment="qemu-tools is &lt;2.0.2-48.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135499" version="1" comment="qemu-vgabios is &lt;1.7.4-48.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135500" version="1" comment="qemu-x86 is &lt;2.0.2-48.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136003" version="1" comment="libmysqlclient-devel is &lt;10.0.28-20.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136004" version="1" comment="libmysqlclient18 is &lt;10.0.28-20.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136005" version="1" comment="libmysqlclient18-32bit is &lt;10.0.28-20.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136006" version="1" comment="libmysqlclient_r18 is &lt;10.0.28-20.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136007" version="1" comment="libmysqld-devel is &lt;10.0.28-20.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136008" version="1" comment="libmysqld18 is &lt;10.0.28-20.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136009" version="1" comment="mariadb is &lt;10.0.28-20.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136010" version="1" comment="mariadb-client is &lt;10.0.28-20.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136011" version="1" comment="mariadb-errormessages is &lt;10.0.28-20.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136012" version="1" comment="mariadb-tools is &lt;10.0.28-20.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136112" version="1" comment="qemu is &lt;2.0.2-48.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136113" version="1" comment="qemu-block-curl is &lt;2.0.2-48.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136114" version="1" comment="qemu-block-rbd is &lt;2.0.2-48.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136115" version="1" comment="qemu-guest-agent is &lt;2.0.2-48.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136116" version="1" comment="qemu-ipxe is &lt;1.0.0-48.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136117" version="1" comment="qemu-kvm is &lt;2.0.2-48.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136118" version="1" comment="qemu-lang is &lt;2.0.2-48.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136119" version="1" comment="qemu-seabios is &lt;1.7.4-48.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136120" version="1" comment="qemu-sgabios is &lt;8-48.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136121" version="1" comment="qemu-tools is &lt;2.0.2-48.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136122" version="1" comment="qemu-vgabios is &lt;1.7.4-48.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136123" version="1" comment="qemu-x86 is &lt;2.0.2-48.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136405" version="1" comment="libfreebl3-hmac-32bit is &lt;3.21.3-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136406" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.21.3-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136668" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.60-31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136669" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.60-31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136670" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.60-31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136671" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.60-31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136672" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.60-31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141182" version="1" comment="kernel-default is &lt;3.12.60-52.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141183" version="1" comment="kernel-default-base is &lt;3.12.60-52.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141184" version="1" comment="kernel-default-devel is &lt;3.12.60-52.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141185" version="1" comment="kernel-devel is &lt;3.12.60-52.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141186" version="1" comment="kernel-macros is &lt;3.12.60-52.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141187" version="1" comment="kernel-source is &lt;3.12.60-52.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141188" version="1" comment="kernel-syms is &lt;3.12.60-52.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141189" version="1" comment="kernel-xen is &lt;3.12.60-52.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141190" version="1" comment="kernel-xen-base is &lt;3.12.60-52.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141191" version="1" comment="kernel-xen-devel is &lt;3.12.60-52.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141192" version="1" comment="kgraft-patch-3_12_60-52_60-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141193" version="1" comment="kgraft-patch-3_12_60-52_60-xen is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141194" version="1" comment="kgraft-patch-SLE12_Update_17 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142743" version="1" comment="kgraft-patch-3_12_51-52_31-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142744" version="1" comment="kgraft-patch-3_12_51-52_31-xen is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142745" version="1" comment="kgraft-patch-SLE12_Update_9 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142746" version="1" comment="kgraft-patch-3_12_55-52_42-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142747" version="1" comment="kgraft-patch-3_12_55-52_42-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142748" version="1" comment="kgraft-patch-SLE12_Update_12 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142749" version="1" comment="kgraft-patch-3_12_60-52_49-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142750" version="1" comment="kgraft-patch-3_12_60-52_49-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142751" version="1" comment="kgraft-patch-SLE12_Update_14 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142752" version="1" comment="kgraft-patch-3_12_55-52_45-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142753" version="1" comment="kgraft-patch-3_12_55-52_45-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142754" version="1" comment="kgraft-patch-SLE12_Update_13 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142755" version="1" comment="kgraft-patch-3_12_51-52_39-default is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142756" version="1" comment="kgraft-patch-3_12_51-52_39-xen is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142757" version="1" comment="kgraft-patch-SLE12_Update_11 is &lt;6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142943" version="1" comment="xen is &lt;4.4.4_05-22.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142944" version="1" comment="xen-doc-html is &lt;4.4.4_05-22.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142945" version="1" comment="xen-kmp-default is &lt;4.4.4_05_k3.12.60_52.57-22.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142946" version="1" comment="xen-libs is &lt;4.4.4_05-22.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142947" version="1" comment="xen-libs-32bit is &lt;4.4.4_05-22.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142948" version="1" comment="xen-tools is &lt;4.4.4_05-22.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142949" version="1" comment="xen-tools-domU is &lt;4.4.4_05-22.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143415" version="1" comment="ntp is &lt;4.2.8p9-46.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143416" version="1" comment="ntp-doc is &lt;4.2.8p9-46.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144247" version="1" comment="kgraft-patch-3_12_60-52_54-default is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144248" version="1" comment="kgraft-patch-3_12_60-52_54-xen is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144249" version="1" comment="kgraft-patch-SLE12_Update_15 is &lt;4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144653" version="1" comment="kernel-default is &lt;3.12.60-52.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144654" version="1" comment="kernel-default-base is &lt;3.12.60-52.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144655" version="1" comment="kernel-default-devel is &lt;3.12.60-52.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144656" version="1" comment="kernel-devel is &lt;3.12.60-52.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144657" version="1" comment="kernel-macros is &lt;3.12.60-52.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144658" version="1" comment="kernel-source is &lt;3.12.60-52.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144659" version="1" comment="kernel-syms is &lt;3.12.60-52.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144660" version="1" comment="kernel-xen is &lt;3.12.60-52.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144661" version="1" comment="kernel-xen-base is &lt;3.12.60-52.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144662" version="1" comment="kernel-xen-devel is &lt;3.12.60-52.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144663" version="1" comment="kgraft-patch-3_12_60-52_63-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144664" version="1" comment="kgraft-patch-3_12_60-52_63-xen is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144665" version="1" comment="kgraft-patch-SLE12_Update_18 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145378" version="1" comment="xen is &lt;4.4.4_05-22.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145379" version="1" comment="xen-doc-html is &lt;4.4.4_05-22.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145380" version="1" comment="xen-kmp-default is &lt;4.4.4_05_k3.12.60_52.63-22.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145381" version="1" comment="xen-libs is &lt;4.4.4_05-22.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145382" version="1" comment="xen-libs-32bit is &lt;4.4.4_05-22.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145383" version="1" comment="xen-tools is &lt;4.4.4_05-22.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145384" version="1" comment="xen-tools-domU is &lt;4.4.4_05-22.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145385" version="1" comment="kgraft-patch-3_12_60-52_57-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145386" version="1" comment="kgraft-patch-3_12_60-52_57-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145387" version="1" comment="kgraft-patch-SLE12_Update_16 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145388" version="1" comment="kgraft-patch-3_12_51-52_34-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145389" version="1" comment="kgraft-patch-3_12_51-52_34-xen is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145390" version="1" comment="kgraft-patch-SLE12_Update_10 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146029" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146030" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146031" version="1" comment="libdcerpc0 is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146032" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146033" version="1" comment="libgensec0 is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146034" version="1" comment="libgensec0-32bit is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146035" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146036" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146037" version="1" comment="libndr-nbt0 is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146038" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146039" version="1" comment="libndr-standard0 is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146040" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146041" version="1" comment="libndr0 is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146042" version="1" comment="libndr0-32bit is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146043" version="1" comment="libnetapi0 is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146044" version="1" comment="libnetapi0-32bit is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146045" version="1" comment="libregistry0 is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146046" version="1" comment="libsamba-credentials0 is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146047" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146048" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146049" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146050" version="1" comment="libsamba-passdb0 is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146051" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146052" version="1" comment="libsamba-util0 is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146053" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146054" version="1" comment="libsamdb0 is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146055" version="1" comment="libsamdb0-32bit is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146056" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146057" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146058" version="1" comment="libsmbclient0 is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146059" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146060" version="1" comment="libsmbconf0 is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146061" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146062" version="1" comment="libsmbldap0 is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146063" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146064" version="1" comment="libtevent-util0 is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146065" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146066" version="1" comment="libwbclient0 is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146067" version="1" comment="libwbclient0-32bit is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146068" version="1" comment="samba-32bit is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146069" version="1" comment="samba-client is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146070" version="1" comment="samba-client-32bit is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146071" version="1" comment="samba-doc is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146072" version="1" comment="samba-libs is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146073" version="1" comment="samba-libs-32bit is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146074" version="1" comment="samba-winbind is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146075" version="1" comment="samba-winbind-32bit is &lt;4.2.4-18.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120803" version="1" comment="clamsap is &lt;0.98.9-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147440" version="1" comment="kgraft-patch-3_12_60-52_57-default is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147441" version="1" comment="kgraft-patch-3_12_60-52_57-xen is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147442" version="1" comment="kgraft-patch-SLE12_Update_16 is &lt;3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147443" version="1" comment="kgraft-patch-3_12_60-52_54-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147444" version="1" comment="kgraft-patch-3_12_60-52_54-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147445" version="1" comment="kgraft-patch-SLE12_Update_15 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147446" version="1" comment="kgraft-patch-3_12_60-52_49-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147447" version="1" comment="kgraft-patch-3_12_60-52_49-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147448" version="1" comment="kgraft-patch-SLE12_Update_14 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147449" version="1" comment="kgraft-patch-3_12_55-52_45-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147450" version="1" comment="kgraft-patch-3_12_55-52_45-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147451" version="1" comment="kgraft-patch-SLE12_Update_13 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147452" version="1" comment="kgraft-patch-3_12_55-52_42-default is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147453" version="1" comment="kgraft-patch-3_12_55-52_42-xen is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147454" version="1" comment="kgraft-patch-SLE12_Update_12 is &lt;5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147455" version="1" comment="kgraft-patch-3_12_51-52_34-default is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147456" version="1" comment="kgraft-patch-3_12_51-52_34-xen is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147457" version="1" comment="kgraft-patch-SLE12_Update_10 is &lt;8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147635" version="1" comment="kgraft-patch-3_12_51-52_39-default is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147636" version="1" comment="kgraft-patch-3_12_51-52_39-xen is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147637" version="1" comment="kgraft-patch-SLE12_Update_11 is &lt;7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147638" version="1" comment="kgraft-patch-3_12_60-52_60-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147639" version="1" comment="kgraft-patch-3_12_60-52_60-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147640" version="1" comment="kgraft-patch-SLE12_Update_17 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147844" version="1" comment="kgraft-patch-3_12_60-52_63-default is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147845" version="1" comment="kgraft-patch-3_12_60-52_63-xen is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147846" version="1" comment="kgraft-patch-SLE12_Update_18 is &lt;2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148157" version="1" comment="libspice-server1 is &lt;0.12.4-8.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148158" version="1" comment="spice is &lt;0.12.4-8.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148205" version="1" comment="libmysqlclient-devel is &lt;10.0.29-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148206" version="1" comment="libmysqlclient18 is &lt;10.0.29-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148207" version="1" comment="libmysqlclient18-32bit is &lt;10.0.29-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148208" version="1" comment="libmysqlclient_r18 is &lt;10.0.29-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148209" version="1" comment="libmysqld-devel is &lt;10.0.29-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148210" version="1" comment="libmysqld18 is &lt;10.0.29-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148211" version="1" comment="mariadb is &lt;10.0.29-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148212" version="1" comment="mariadb-client is &lt;10.0.29-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148213" version="1" comment="mariadb-errormessages is &lt;10.0.29-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148214" version="1" comment="mariadb-tools is &lt;10.0.29-20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148444" version="1" comment="kernel-default is &lt;3.12.61-52.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148445" version="1" comment="kernel-default-base is &lt;3.12.61-52.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148446" version="1" comment="kernel-default-devel is &lt;3.12.61-52.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148447" version="1" comment="kernel-devel is &lt;3.12.61-52.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148448" version="1" comment="kernel-macros is &lt;3.12.61-52.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148449" version="1" comment="kernel-source is &lt;3.12.61-52.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148450" version="1" comment="kernel-syms is &lt;3.12.61-52.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148451" version="1" comment="kernel-xen is &lt;3.12.61-52.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148452" version="1" comment="kernel-xen-base is &lt;3.12.61-52.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148453" version="1" comment="kernel-xen-devel is &lt;3.12.61-52.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148454" version="1" comment="kgraft-patch-3_12_61-52_66-default is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148455" version="1" comment="kgraft-patch-3_12_61-52_66-xen is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148456" version="1" comment="kgraft-patch-SLE12_Update_19 is &lt;1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148908" version="1" comment="libblkid1 is &lt;2.25-24.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148909" version="1" comment="libblkid1-32bit is &lt;2.25-24.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148910" version="1" comment="libmount1 is &lt;2.25-24.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148911" version="1" comment="libmount1-32bit is &lt;2.25-24.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148912" version="1" comment="libsmartcols1 is &lt;2.25-24.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148913" version="1" comment="libuuid1 is &lt;2.25-24.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148914" version="1" comment="libuuid1-32bit is &lt;2.25-24.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148915" version="1" comment="python-libmount is &lt;2.25-24.10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148916" version="1" comment="util-linux is &lt;2.25-24.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148917" version="1" comment="util-linux-lang is &lt;2.25-24.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148918" version="1" comment="util-linux-systemd is &lt;2.25-24.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148919" version="1" comment="uuidd is &lt;2.25-24.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149024" version="1" comment="xen is &lt;4.4.4_14-22.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149025" version="1" comment="xen-doc-html is &lt;4.4.4_14-22.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149026" version="1" comment="xen-kmp-default is &lt;4.4.4_14_k3.12.61_52.66-22.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149027" version="1" comment="xen-libs is &lt;4.4.4_14-22.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149028" version="1" comment="xen-libs-32bit is &lt;4.4.4_14-22.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149029" version="1" comment="xen-tools is &lt;4.4.4_14-22.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149030" version="1" comment="xen-tools-domU is &lt;4.4.4_14-22.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149105" version="1" comment="bind is &lt;9.9.9P1-28.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149106" version="1" comment="bind-chrootenv is &lt;9.9.9P1-28.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149107" version="1" comment="bind-doc is &lt;9.9.9P1-28.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149108" version="1" comment="bind-libs is &lt;9.9.9P1-28.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149109" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-28.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149110" version="1" comment="bind-utils is &lt;9.9.9P1-28.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149138" version="1" comment="openssh-fips is &lt;6.6p1-54.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149447" version="1" comment="qemu is &lt;2.0.2-48.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149448" version="1" comment="qemu-block-curl is &lt;2.0.2-48.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149449" version="1" comment="qemu-block-rbd is &lt;2.0.2-48.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149450" version="1" comment="qemu-guest-agent is &lt;2.0.2-48.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149451" version="1" comment="qemu-ipxe is &lt;1.0.0-48.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149452" version="1" comment="qemu-kvm is &lt;2.0.2-48.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149453" version="1" comment="qemu-lang is &lt;2.0.2-48.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149454" version="1" comment="qemu-seabios is &lt;1.7.4-48.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149455" version="1" comment="qemu-sgabios is &lt;8-48.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149456" version="1" comment="qemu-tools is &lt;2.0.2-48.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149457" version="1" comment="qemu-vgabios is &lt;1.7.4-48.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149458" version="1" comment="qemu-x86 is &lt;2.0.2-48.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149629" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.1-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149630" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.1-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149631" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.1-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149632" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.1-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149633" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.1-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149634" version="1" comment="lighttpd-mod_cml is &lt;1.4.35-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149635" version="1" comment="lighttpd-mod_magnet is &lt;1.4.35-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149636" version="1" comment="lighttpd-mod_mysql_vhost is &lt;1.4.35-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149637" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.35-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149638" version="1" comment="lighttpd-mod_trigger_b4_dl is &lt;1.4.35-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149639" version="1" comment="lighttpd-mod_webdav is &lt;1.4.35-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146884" version="1" comment="bind is &lt;9.9.9P1-28.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146885" version="1" comment="bind-chrootenv is &lt;9.9.9P1-28.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146886" version="1" comment="bind-doc is &lt;9.9.9P1-28.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146887" version="1" comment="bind-libs is &lt;9.9.9P1-28.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146888" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-28.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146889" version="1" comment="bind-utils is &lt;9.9.9P1-28.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124408" version="1" comment="SUSE_SLES_SAP-release is ==12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149125" version="1" comment="SUSE_SLES_SAP-release is ==12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102887" version="1" comment="libgnutls-devel is &lt;3.2.15-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102889" version="1" comment="libgnutls-openssl-devel is &lt;3.2.15-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102893" version="1" comment="libgnutlsxx-devel is &lt;3.2.15-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102894" version="1" comment="libgnutlsxx28 is &lt;3.2.15-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103548" version="1" comment="dbus-1 is &lt;1.8.12-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103549" version="1" comment="dbus-1-devel is &lt;1.8.12-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103546" version="1" comment="dbus-1-devel-doc is &lt;1.8.12-6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103658" version="1" comment="libssh-devel is &lt;0.6.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103659" version="1" comment="libssh-devel-doc is &lt;0.6.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103562" version="1" comment="python-magic is &lt;5.19-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102162" version="1" comment="php5-devel is &lt;5.5.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102645" version="1" comment="MozillaFirefox-devel is &lt;31.3.0esr-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102659" version="1" comment="mozilla-nss-devel is &lt;3.17.2-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102663" version="1" comment="libopenssl-devel is &lt;1.0.1i-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102476" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr2.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102481" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr2.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102468" version="1" comment="file-devel is &lt;5.19-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102472" version="1" comment="python-magic is &lt;5.19-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118573" version="1" comment="xen-devel is &lt;4.4.3_06-22.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119523" version="1" comment="MozillaFirefox-devel is &lt;38.5.0esr-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119335" version="1" comment="bind-devel is &lt;9.9.6P1-28.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106880" version="1" comment="xorg-x11-server-sdk is &lt;7.6_1.15.2-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117477" version="1" comment="xfsprogs-devel is &lt;3.2.1-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106935" version="1" comment="MozillaFirefox-devel is &lt;31.5.0esr-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106954" version="1" comment="php5-devel is &lt;5.5.14-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107575" version="1" comment="freetype2-devel is &lt;2.5.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107606" version="1" comment="cups-devel is &lt;1.7.5-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107619" version="1" comment="postgresql93-devel is &lt;9.3.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107657" version="1" comment="osc is &lt;0.151.0-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107810" version="1" comment="glibc-devel-static is &lt;2.19-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107824" version="1" comment="kernel-docs is &lt;3.12.38-44.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107841" version="1" comment="kernel-obs-build is &lt;3.12.38-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107888" version="1" comment="libopenssl-devel is &lt;1.0.1i-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108132" version="1" comment="xen-devel is &lt;4.4.1_10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108204" version="1" comment="MozillaFirefox-devel is &lt;31.5.3esr-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108359" version="1" comment="wireshark-devel is &lt;1.10.13-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108360" version="1" comment="kernel-docs is &lt;3.12.39-47.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108377" version="1" comment="kernel-obs-build is &lt;3.12.39-47.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108430" version="1" comment="libzip-devel is &lt;0.11.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108622" version="1" comment="libwebkitgtk-devel is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108633" version="1" comment="libwebkitgtk3-devel is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108624" version="1" comment="typelib-1_0-JavaScriptCore-1_0 is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108625" version="1" comment="typelib-1_0-WebKit-1_0 is &lt;2.4.8-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108657" version="1" comment="xen-devel is &lt;4.4.2_02-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108666" version="1" comment="MozillaFirefox-devel is &lt;31.6.0esr-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108907" version="1" comment="libgnutls-devel is &lt;3.2.15-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108909" version="1" comment="libgnutls-openssl-devel is &lt;3.2.15-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108913" version="1" comment="libgnutlsxx-devel is &lt;3.2.15-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108914" version="1" comment="libgnutlsxx28 is &lt;3.2.15-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108922" version="1" comment="libmysqlclient-devel is &lt;10.0.16-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108927" version="1" comment="libmysqld-devel is &lt;10.0.16-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108928" version="1" comment="libmysqld18 is &lt;10.0.16-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109123" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.8.10-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109124" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.8.10-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109125" version="1" comment="subversion is &lt;1.8.10-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109126" version="1" comment="subversion-bash-completion is &lt;1.8.10-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109127" version="1" comment="subversion-devel is &lt;1.8.10-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109128" version="1" comment="subversion-perl is &lt;1.8.10-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109129" version="1" comment="subversion-python is &lt;1.8.10-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109131" version="1" comment="subversion-server is &lt;1.8.10-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109132" version="1" comment="subversion-tools is &lt;1.8.10-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109162" version="1" comment="gdm-devel is &lt;3.10.0.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105376" version="1" comment="xorg-x11-server-sdk is &lt;7.6_1.15.2-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109556" version="1" comment="php5-devel is &lt;5.5.14-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109614" version="1" comment="libspice-server-devel is &lt;0.12.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109716" version="1" comment="xen-devel is &lt;4.4.2_04-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105308" version="1" comment="kernel-docs is &lt;3.12.32-33.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105325" version="1" comment="kernel-obs-build is &lt;3.12.32-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109834" version="1" comment="fltk-devel is &lt;1.3.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109836" version="1" comment="fltk-devel-static is &lt;1.3.2-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109962" version="1" comment="MozillaFirefox-devel is &lt;31.7.0esr-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109983" version="1" comment="apache2 is &lt;2.4.10-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109984" version="1" comment="apache2-devel is &lt;2.4.10-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105450" version="1" comment="MozillaFirefox-devel is &lt;31.4.0esr-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105464" version="1" comment="mozilla-nss-devel is &lt;3.17.3-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110330" version="1" comment="xen-devel is &lt;4.4.2_06-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110328" version="1" comment="wireshark-devel is &lt;1.10.14-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110498" version="1" comment="kernel-docs is &lt;3.12.43-52.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110515" version="1" comment="kernel-obs-build is &lt;3.12.43-52.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110530" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110535" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110569" version="1" comment="openldap2-back-perl is &lt;2.4.39-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110563" version="1" comment="openldap2-devel is &lt;2.4.39-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110565" version="1" comment="openldap2-devel-static is &lt;2.4.39-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110631" version="1" comment="xorg-x11-server-sdk is &lt;7.6_1.15.2-28.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110696" version="1" comment="libopenssl-devel is &lt;1.0.1i-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105416" version="1" comment="libcurl-devel is &lt;7.37.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110849" version="1" comment="libgcrypt-devel is &lt;1.6.1-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111026" version="1" comment="bind-devel is &lt;9.9.6P1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111382" version="1" comment="php5-devel is &lt;5.5.14-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111448" version="1" comment="postgresql93-devel is &lt;9.3.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111474" version="1" comment="MozillaFirefox-devel is &lt;31.8.0esr-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111478" version="1" comment="mozilla-nspr-devel is &lt;4.10.8-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111492" version="1" comment="mozilla-nss-devel is &lt;3.19.2_CKBI_1.98-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111458" version="1" comment="libmysqlclient-devel is &lt;10.0.20-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111463" version="1" comment="libmysqld-devel is &lt;10.0.20-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111464" version="1" comment="libmysqld18 is &lt;10.0.20-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111357" version="1" comment="krb5 is &lt;1.12.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111360" version="1" comment="krb5-devel is &lt;1.12.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111501" version="1" comment="xen-devel is &lt;4.4.2_08-22.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111513" version="1" comment="bind-devel is &lt;9.9.6P1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111563" version="1" comment="kernel-docs is &lt;3.12.44-52.10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111580" version="1" comment="kernel-obs-build is &lt;3.12.44-52.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105431" version="1" comment="bind-devel is &lt;9.9.5P1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105419" version="1" comment="git is &lt;1.8.5.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105420" version="1" comment="git-arch is &lt;1.8.5.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105421" version="1" comment="git-core is &lt;1.8.5.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105422" version="1" comment="git-cvs is &lt;1.8.5.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105423" version="1" comment="git-daemon is &lt;1.8.5.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105424" version="1" comment="git-email is &lt;1.8.5.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105425" version="1" comment="git-gui is &lt;1.8.5.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105426" version="1" comment="git-svn is &lt;1.8.5.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105427" version="1" comment="git-web is &lt;1.8.5.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105428" version="1" comment="gitk is &lt;1.8.5.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105337" version="1" comment="evolution-data-server-devel is &lt;3.10.4-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105356" version="1" comment="typelib-1_0-EBook-1_2 is &lt;3.10.4-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105357" version="1" comment="typelib-1_0-EBookContacts-1_2 is &lt;3.10.4-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105358" version="1" comment="typelib-1_0-EDataServer-1_2 is &lt;3.10.4-5.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113522" version="1" comment="MozillaFirefox-devel is &lt;31.8.0esr-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113778" version="1" comment="xen-devel is &lt;4.4.2_10-22.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113658" version="1" comment="libQt5Bootstrap-devel-static is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113660" version="1" comment="libQt5Concurrent-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113662" version="1" comment="libQt5Concurrent5 is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113664" version="1" comment="libQt5Core-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113665" version="1" comment="libQt5Core-private-headers-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113669" version="1" comment="libQt5DBus-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113670" version="1" comment="libQt5DBus-private-headers-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113674" version="1" comment="libQt5Gui-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113675" version="1" comment="libQt5Gui-private-headers-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113679" version="1" comment="libQt5Network-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113680" version="1" comment="libQt5Network-private-headers-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113682" version="1" comment="libQt5Network5 is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113684" version="1" comment="libQt5OpenGL-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113685" version="1" comment="libQt5OpenGL-private-headers-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113687" version="1" comment="libQt5OpenGL5 is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113689" version="1" comment="libQt5OpenGLExtensions-devel-static is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113691" version="1" comment="libQt5PlatformSupport-devel-static is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113692" version="1" comment="libQt5PlatformSupport-private-headers-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113694" version="1" comment="libQt5PrintSupport-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113695" version="1" comment="libQt5PrintSupport-private-headers-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113697" version="1" comment="libQt5PrintSupport5 is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113699" version="1" comment="libQt5Sql-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113700" version="1" comment="libQt5Sql-private-headers-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113702" version="1" comment="libQt5Sql5 is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113704" version="1" comment="libQt5Sql5-mysql is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113706" version="1" comment="libQt5Sql5-postgresql is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113708" version="1" comment="libQt5Sql5-sqlite is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113710" version="1" comment="libQt5Sql5-unixODBC is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113712" version="1" comment="libQt5Test-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113713" version="1" comment="libQt5Test-private-headers-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113715" version="1" comment="libQt5Test5 is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113717" version="1" comment="libQt5Widgets-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113718" version="1" comment="libQt5Widgets-private-headers-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113722" version="1" comment="libQt5Xml-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113724" version="1" comment="libQt5Xml5 is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113726" version="1" comment="libqt5-qtbase-common-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113727" version="1" comment="libqt5-qtbase-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113728" version="1" comment="libqt5-qtbase-doc is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113731" version="1" comment="libqt5-qtbase-private-headers-devel is &lt;5.3.1-4.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105071" version="1" comment="libyaml-devel is &lt;0.1.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113854" version="1" comment="libopenssl-devel is &lt;1.0.1i-27.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113871" version="1" comment="php5-devel is &lt;5.5.14-33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105378" version="1" comment="binutils-devel is &lt;2.24-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105380" version="1" comment="binutils-gold is &lt;2.24-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105389" version="1" comment="cross-ppc-binutils is &lt;2.24-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105396" version="1" comment="cross-spu-binutils is &lt;2.24-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111345" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.8.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111346" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.8.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111347" version="1" comment="subversion is &lt;1.8.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111348" version="1" comment="subversion-bash-completion is &lt;1.8.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111349" version="1" comment="subversion-devel is &lt;1.8.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111350" version="1" comment="subversion-perl is &lt;1.8.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111351" version="1" comment="subversion-python is &lt;1.8.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111353" version="1" comment="subversion-server is &lt;1.8.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111354" version="1" comment="subversion-tools is &lt;1.8.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114065" version="1" comment="MozillaFirefox-devel is &lt;38.2.1esr-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114080" version="1" comment="mozilla-nss-devel is &lt;3.19.2.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114051" version="1" comment="bind-devel is &lt;9.9.6P1-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105739" version="1" comment="kernel-docs is &lt;3.12.36-38.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105756" version="1" comment="kernel-obs-build is &lt;3.12.36-38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105073" version="1" comment="libjasper-devel is &lt;1.900.1-166.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105783" version="1" comment="libopenssl-devel is &lt;1.0.1i-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114328" version="1" comment="libnetfilter_cthelper-devel is &lt;1.0.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114332" version="1" comment="libnetfilter_cttimeout-devel is &lt;1.0.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114339" version="1" comment="net-snmp-devel is &lt;5.7.2.1-4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114423" version="1" comment="kernel-docs is &lt;3.12.44-52.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114440" version="1" comment="kernel-obs-build is &lt;3.12.44-52.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105973" version="1" comment="libvirt-devel is &lt;1.2.5-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114648" version="1" comment="php5-devel is &lt;5.5.14-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114776" version="1" comment="mozilla-nspr-devel is &lt;4.10.9-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114976" version="1" comment="kernel-docs is &lt;3.12.48-52.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114993" version="1" comment="kernel-obs-build is &lt;3.12.48-52.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106048" version="1" comment="libblkid-devel is &lt;2.25-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106052" version="1" comment="libmount-devel is &lt;2.25-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106056" version="1" comment="libsmartcols-devel is &lt;2.25-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115019" version="1" comment="libspice-server-devel is &lt;0.12.4-8.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106087" version="1" comment="krb5-devel is &lt;1.12.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115141" version="1" comment="postgresql93-devel is &lt;9.3.10-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115236" version="1" comment="libffi48 is &lt;4.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115386" version="1" comment="glibc-devel-static is &lt;2.19-22.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115404" version="1" comment="apache2 is &lt;2.4.10-14.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115405" version="1" comment="apache2-devel is &lt;2.4.10-14.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115932" version="1" comment="xen-devel is &lt;4.4.3_02-22.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115579" version="1" comment="graphite2-devel is &lt;1.3.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115583" version="1" comment="hyphen-devel is &lt;2.8.8-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115587" version="1" comment="libabw-devel is &lt;0.1.1-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115588" version="1" comment="libabw-devel-doc is &lt;0.1.1-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115594" version="1" comment="libcdr-devel is &lt;0.1.1-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115595" version="1" comment="libcdr-devel-doc is &lt;0.1.1-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115572" version="1" comment="libcmis-c-0_5-5 is &lt;0.5.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115573" version="1" comment="libcmis-c-devel is &lt;0.5.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115574" version="1" comment="libcmis-devel is &lt;0.5.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115599" version="1" comment="libe-book-devel is &lt;0.1.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115600" version="1" comment="libe-book-devel-doc is &lt;0.1.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115608" version="1" comment="libetonyek-devel is &lt;0.1.3-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115609" version="1" comment="libetonyek-devel-doc is &lt;0.1.3-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115617" version="1" comment="libfreehand-devel is &lt;0.1.1-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115618" version="1" comment="libfreehand-devel-doc is &lt;0.1.1-4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115625" version="1" comment="libixion-devel is &lt;0.9.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115629" version="1" comment="liblangtag-devel is &lt;0.5.7-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115638" version="1" comment="libmspub-devel is &lt;0.1.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115639" version="1" comment="libmspub-devel-doc is &lt;0.1.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115643" version="1" comment="libmwaw-devel is &lt;0.3.6-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115644" version="1" comment="libmwaw-devel-doc is &lt;0.3.6-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115648" version="1" comment="libodfgen-devel is &lt;0.1.4-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115649" version="1" comment="libodfgen-devel-doc is &lt;0.1.4-3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115652" version="1" comment="liborcus-devel is &lt;0.7.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115768" version="1" comment="libvisio-devel is &lt;0.1.3-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115769" version="1" comment="libvisio-devel-doc is &lt;0.1.3-4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115772" version="1" comment="libvoikko-devel is &lt;3.7.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115778" version="1" comment="libwps-devel is &lt;0.4.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105061" version="1" comment="xen-devel is &lt;4.4.1_08-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106151" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr2.10-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106156" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr2.10-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116013" version="1" comment="MozillaFirefox-devel is &lt;38.4.0esr-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106167" version="1" comment="wireshark-devel is &lt;1.10.12-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106168" version="1" comment="hivex is &lt;1.3.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117934" version="1" comment="libpng12-compat-devel is &lt;1.2.50-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117935" version="1" comment="libpng12-devel is &lt;1.2.50-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117936" version="1" comment="libpng16-compat-devel is &lt;1.6.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117937" version="1" comment="libpng16-devel is &lt;1.6.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119315" version="1" comment="git is &lt;1.8.5.6-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119316" version="1" comment="git-arch is &lt;1.8.5.6-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119317" version="1" comment="git-core is &lt;1.8.5.6-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119318" version="1" comment="git-cvs is &lt;1.8.5.6-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119319" version="1" comment="git-daemon is &lt;1.8.5.6-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119320" version="1" comment="git-email is &lt;1.8.5.6-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119321" version="1" comment="git-gui is &lt;1.8.5.6-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119322" version="1" comment="git-svn is &lt;1.8.5.6-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119323" version="1" comment="git-web is &lt;1.8.5.6-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119324" version="1" comment="gitk is &lt;1.8.5.6-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119635" version="1" comment="libksba-devel is &lt;1.3.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106383" version="1" comment="libdcerpc-atsvc-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106385" version="1" comment="libdcerpc-atsvc0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106388" version="1" comment="libdcerpc-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106389" version="1" comment="libdcerpc-samr-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106391" version="1" comment="libdcerpc-samr0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106394" version="1" comment="libgensec-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106397" version="1" comment="libndr-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106398" version="1" comment="libndr-krb5pac-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106401" version="1" comment="libndr-nbt-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106404" version="1" comment="libndr-standard-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106409" version="1" comment="libnetapi-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106412" version="1" comment="libpdb-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106415" version="1" comment="libregistry-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106418" version="1" comment="libsamba-credentials-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106421" version="1" comment="libsamba-hostconfig-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106424" version="1" comment="libsamba-policy-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106426" version="1" comment="libsamba-policy0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106427" version="1" comment="libsamba-util-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106430" version="1" comment="libsamdb-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106433" version="1" comment="libsmbclient-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106434" version="1" comment="libsmbclient-raw-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106439" version="1" comment="libsmbconf-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106442" version="1" comment="libsmbldap-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106445" version="1" comment="libsmbsharemodes-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106446" version="1" comment="libsmbsharemodes0 is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106447" version="1" comment="libtevent-util-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106450" version="1" comment="libwbclient-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106457" version="1" comment="samba-core-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106464" version="1" comment="samba-test-devel is &lt;4.1.12-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118692" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.20-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118693" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.20-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106480" version="1" comment="php5-devel is &lt;5.5.14-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118192" version="1" comment="kernel-docs is &lt;3.12.51-52.31.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118176" version="1" comment="kernel-obs-build is &lt;3.12.51-52.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119630" version="1" comment="gdk-pixbuf-devel is &lt;2.30.6-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106470" version="1" comment="libmspack-devel is &lt;0.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118729" version="1" comment="libopenssl-devel is &lt;1.0.1i-27.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118572" version="1" comment="krb5-devel is &lt;1.12.1-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119134" version="1" comment="libdcerpc-atsvc-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119135" version="1" comment="libdcerpc-atsvc0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119136" version="1" comment="libdcerpc-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119137" version="1" comment="libdcerpc-samr-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119138" version="1" comment="libdcerpc-samr0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119139" version="1" comment="libgensec-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119140" version="1" comment="libldb-devel is &lt;1.1.24-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119141" version="1" comment="libndr-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119142" version="1" comment="libndr-krb5pac-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119143" version="1" comment="libndr-nbt-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119144" version="1" comment="libndr-standard-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119145" version="1" comment="libnetapi-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119146" version="1" comment="libpdb-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119147" version="1" comment="libregistry-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119148" version="1" comment="libsamba-credentials-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119149" version="1" comment="libsamba-hostconfig-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119150" version="1" comment="libsamba-policy-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119151" version="1" comment="libsamba-policy0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119152" version="1" comment="libsamba-util-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119153" version="1" comment="libsamdb-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119154" version="1" comment="libsmbclient-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119155" version="1" comment="libsmbclient-raw-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119156" version="1" comment="libsmbconf-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119157" version="1" comment="libsmbldap-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119158" version="1" comment="libsmbsharemodes-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119159" version="1" comment="libsmbsharemodes0 is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119160" version="1" comment="libtalloc-devel is &lt;2.1.5-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119161" version="1" comment="libtdb-devel is &lt;1.3.8-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119162" version="1" comment="libtevent-devel is &lt;0.9.26-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119163" version="1" comment="libtevent-util-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119164" version="1" comment="libwbclient-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119165" version="1" comment="pyldb is &lt;1.1.24-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119166" version="1" comment="pyldb-devel is &lt;1.1.24-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119167" version="1" comment="pytalloc-devel is &lt;2.1.5-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119168" version="1" comment="samba-core-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119169" version="1" comment="samba-test-devel is &lt;4.1.12-18.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129301" version="1" comment="kernel-docs is &lt;3.12.60-52.49.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129302" version="1" comment="kernel-obs-build is &lt;3.12.60-52.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129303" version="1" comment="dhcp-devel is &lt;4.2.6-14.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129304" version="1" comment="MozillaFirefox-devel is &lt;45.2.0esr-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129423" version="1" comment="kernel-docs is &lt;3.12.60-52.54.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129424" version="1" comment="kernel-obs-build is &lt;3.12.60-52.54.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129425" version="1" comment="glibc-devel-static is &lt;2.19-22.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129650" version="1" comment="boost-devel is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129651" version="1" comment="hunspell-devel is &lt;1.3.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129652" version="1" comment="hunspell-devel-32bit is &lt;1.3.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129653" version="1" comment="hyphen-devel is &lt;2.8.8-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129654" version="1" comment="libboost_chrono1_54_0 is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129655" version="1" comment="libboost_graph1_54_0 is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129656" version="1" comment="libboost_graph_parallel1_54_0 is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129657" version="1" comment="libboost_locale1_54_0 is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129658" version="1" comment="libboost_log1_54_0 is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129659" version="1" comment="libboost_math1_54_0 is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129660" version="1" comment="libboost_mpi1_54_0 is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129661" version="1" comment="libboost_python1_54_0 is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129662" version="1" comment="libboost_random1_54_0 is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129663" version="1" comment="libboost_serialization1_54_0 is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129664" version="1" comment="libboost_test1_54_0 is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129665" version="1" comment="libboost_timer1_54_0 is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129666" version="1" comment="libboost_wave1_54_0 is &lt;1.54.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129667" version="1" comment="libcmis-c-0_5-5 is &lt;0.5.1-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129668" version="1" comment="libcmis-c-devel is &lt;0.5.1-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129669" version="1" comment="libcmis-devel is &lt;0.5.1-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129670" version="1" comment="libetonyek-devel is &lt;0.1.6-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129671" version="1" comment="libetonyek-devel-doc is &lt;0.1.6-6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129672" version="1" comment="libhyphen0-32bit is &lt;2.8.8-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129673" version="1" comment="libixion-devel is &lt;0.11.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129674" version="1" comment="liborcus-devel is &lt;0.11.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129675" version="1" comment="libvisio-devel is &lt;0.1.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129676" version="1" comment="libvisio-devel-doc is &lt;0.1.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129677" version="1" comment="libwps-devel is &lt;0.4.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121619" version="1" comment="libtiff-devel is &lt;4.0.6-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121154" version="1" comment="kernel-docs is &lt;3.12.51-52.34.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121155" version="1" comment="kernel-obs-build is &lt;3.12.51-52.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121340" version="1" comment="libxml2-devel is &lt;2.9.1-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121654" version="1" comment="bind-devel is &lt;9.9.6P1-28.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121651" version="1" comment="giflib-devel is &lt;5.0.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121652" version="1" comment="kernel-docs is &lt;3.12.51-52.39.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121653" version="1" comment="kernel-obs-build is &lt;3.12.51-52.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120904" version="1" comment="openldap2-back-perl is &lt;2.4.41-18.13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118617" version="1" comment="openldap2-devel is &lt;2.4.41-18.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118618" version="1" comment="openldap2-devel-static is &lt;2.4.41-18.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121156" version="1" comment="gdk-pixbuf-devel is &lt;2.30.6-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121620" version="1" comment="php5-devel is &lt;5.5.14-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121020" version="1" comment="libvirt-devel is &lt;1.2.5-27.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122773" version="1" comment="MozillaFirefox-devel is &lt;38.6.0esr-57.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122774" version="1" comment="mozilla-nss-devel is &lt;3.20.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122219" version="1" comment="libcurl-devel is &lt;7.37.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122494" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.30-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122495" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.30-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122496" version="1" comment="krb5-devel is &lt;1.12.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122340" version="1" comment="glibc-devel-static is &lt;2.19-22.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123490" version="1" comment="postgresql93-devel is &lt;9.3.11-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123491" version="1" comment="postgresql93-libs is &lt;9.3.11-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122220" version="1" comment="dhcp-devel is &lt;4.2.6-14.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123669" version="1" comment="postgresql94-devel is &lt;9.4.6-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123670" version="1" comment="MozillaFirefox-devel is &lt;38.6.1esr-60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119636" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.8.10-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119637" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.8.10-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119638" version="1" comment="subversion is &lt;1.8.10-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119639" version="1" comment="subversion-bash-completion is &lt;1.8.10-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119640" version="1" comment="subversion-devel is &lt;1.8.10-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119641" version="1" comment="subversion-perl is &lt;1.8.10-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119642" version="1" comment="subversion-python is &lt;1.8.10-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119643" version="1" comment="subversion-server is &lt;1.8.10-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119644" version="1" comment="subversion-tools is &lt;1.8.10-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123872" version="1" comment="libopenssl-devel is &lt;1.0.1i-27.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119299" version="1" comment="libxml2-devel is &lt;2.9.1-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124609" version="1" comment="libssh2-devel is &lt;1.4.3-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124610" version="1" comment="MozillaFirefox-devel is &lt;38.7.0esr-63.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124611" version="1" comment="mozilla-nspr-devel is &lt;4.12-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124612" version="1" comment="mozilla-nss-devel is &lt;3.20.2-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124737" version="1" comment="bind-devel is &lt;9.9.6P1-28.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124816" version="1" comment="kernel-docs is &lt;3.12.55-52.42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124817" version="1" comment="kernel-obs-build is &lt;3.12.55-52.42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124976" version="1" comment="libdcerpc-atsvc-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124977" version="1" comment="libdcerpc-atsvc0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124978" version="1" comment="libdcerpc-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124979" version="1" comment="libdcerpc-samr-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124980" version="1" comment="libdcerpc-samr0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124981" version="1" comment="libgensec-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124982" version="1" comment="libndr-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124983" version="1" comment="libndr-krb5pac-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124984" version="1" comment="libndr-nbt-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124985" version="1" comment="libndr-standard-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124986" version="1" comment="libnetapi-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124987" version="1" comment="libpdb-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124988" version="1" comment="libregistry-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124989" version="1" comment="libsamba-credentials-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124990" version="1" comment="libsamba-hostconfig-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124991" version="1" comment="libsamba-policy-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124992" version="1" comment="libsamba-policy0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124993" version="1" comment="libsamba-util-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124994" version="1" comment="libsamdb-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124995" version="1" comment="libsmbclient-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124996" version="1" comment="libsmbclient-raw-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124997" version="1" comment="libsmbconf-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124998" version="1" comment="libsmbldap-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124999" version="1" comment="libsmbsharemodes-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125000" version="1" comment="libsmbsharemodes0 is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125001" version="1" comment="libtevent-util-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125002" version="1" comment="libwbclient-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125003" version="1" comment="samba-core-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125004" version="1" comment="samba-test-devel is &lt;4.1.12-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125643" version="1" comment="quagga is &lt;0.99.22.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125644" version="1" comment="quagga-devel is &lt;0.99.22.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125673" version="1" comment="quagga is &lt;0.99.22.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125674" version="1" comment="quagga-devel is &lt;0.99.22.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125882" version="1" comment="krb5-devel is &lt;1.12.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125883" version="1" comment="mercurial is &lt;2.8.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125884" version="1" comment="ctdb-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125885" version="1" comment="libdcerpc-atsvc-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125886" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125887" version="1" comment="libdcerpc-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125888" version="1" comment="libdcerpc-samr-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125889" version="1" comment="libdcerpc-samr0 is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125890" version="1" comment="libgensec-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125891" version="1" comment="libndr-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125892" version="1" comment="libndr-krb5pac-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125893" version="1" comment="libndr-nbt-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125894" version="1" comment="libndr-standard-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125895" version="1" comment="libnetapi-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125896" version="1" comment="libregistry-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125897" version="1" comment="libsamba-credentials-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125898" version="1" comment="libsamba-hostconfig-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125899" version="1" comment="libsamba-passdb-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125900" version="1" comment="libsamba-policy-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125901" version="1" comment="libsamba-policy0 is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125902" version="1" comment="libsamba-util-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125903" version="1" comment="libsamdb-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125904" version="1" comment="libsmbclient-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125905" version="1" comment="libsmbclient-raw-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125906" version="1" comment="libsmbconf-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125907" version="1" comment="libsmbldap-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125908" version="1" comment="libtevent-util-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125909" version="1" comment="libwbclient-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125910" version="1" comment="samba-core-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125911" version="1" comment="samba-test-devel is &lt;4.2.4-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126433" version="1" comment="libgcrypt-devel is &lt;1.6.1-16.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126459" version="1" comment="cairo-devel is &lt;1.12.16-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126843" version="1" comment="php5-devel is &lt;5.5.14-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127085" version="1" comment="libxml2-devel is &lt;2.9.1-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127139" version="1" comment="libopenssl-devel is &lt;1.0.1i-27.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127269" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.8.10-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127270" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.8.10-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127271" version="1" comment="subversion is &lt;1.8.10-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127272" version="1" comment="subversion-bash-completion is &lt;1.8.10-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127273" version="1" comment="subversion-devel is &lt;1.8.10-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127274" version="1" comment="subversion-perl is &lt;1.8.10-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127275" version="1" comment="subversion-python is &lt;1.8.10-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127276" version="1" comment="subversion-server is &lt;1.8.10-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127277" version="1" comment="subversion-tools is &lt;1.8.10-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127278" version="1" comment="yast2-ntp-client-devel-doc is &lt;3.1.12.4-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127279" version="1" comment="MozillaFirefox-devel is &lt;38.8.0esr-66.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127289" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127290" version="1" comment="libMagick++-devel is &lt;6.8.8.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127291" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127453" version="1" comment="php5-devel is &lt;5.5.14-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120992" version="1" comment="wireshark-devel is &lt;1.12.9-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127552" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.40-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127553" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.40-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127598" version="1" comment="xen-devel is &lt;4.4.4_02-22.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127734" version="1" comment="wireshark-devel is &lt;1.12.11-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127735" version="1" comment="libgudev-1_0-devel is &lt;210-70.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127736" version="1" comment="libudev-devel is &lt;210-70.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127737" version="1" comment="systemd-devel is &lt;210-70.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127738" version="1" comment="typelib-1_0-GUdev-1_0 is &lt;210-70.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119524" version="1" comment="libmysqlclient-devel is &lt;10.0.22-20.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119525" version="1" comment="libmysqld-devel is &lt;10.0.22-20.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119526" version="1" comment="libmysqld18 is &lt;10.0.22-20.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128462" version="1" comment="php5-devel is &lt;5.5.14-59.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128620" version="1" comment="libxml2-devel is &lt;2.9.1-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128643" version="1" comment="libpoppler-devel is &lt;0.24.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128644" version="1" comment="libpoppler-glib-devel is &lt;0.24.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128645" version="1" comment="libpoppler-qt4-devel is &lt;0.24.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128646" version="1" comment="typelib-1_0-Poppler-0_18 is &lt;0.24.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128801" version="1" comment="libspice-server-devel is &lt;0.12.4-8.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128815" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128816" version="1" comment="libMagick++-devel is &lt;6.8.8.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128817" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128885" version="1" comment="libarchive-devel is &lt;3.1.2-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128910" version="1" comment="kernel-docs is &lt;3.12.55-52.45.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128911" version="1" comment="kernel-obs-build is &lt;3.12.55-52.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128953" version="1" comment="libmysqlclient-devel is &lt;10.0.25-20.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128954" version="1" comment="libmysqld-devel is &lt;10.0.25-20.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128955" version="1" comment="libmysqld18 is &lt;10.0.25-20.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129072" version="1" comment="imap-devel is &lt;2007e_suse-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129073" version="1" comment="php5-devel is &lt;5.5.14-64.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129094" version="1" comment="libimobiledevice-devel is &lt;1.1.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129095" version="1" comment="libusbmuxd-devel is &lt;1.0.8-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120782" version="1" comment="mozilla-nss-devel is &lt;3.19.2.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119527" version="1" comment="bind-devel is &lt;9.9.6P1-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118733" version="1" comment="libopenssl-devel is &lt;1.0.1i-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118659" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr2.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118660" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr2.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118998" version="1" comment="kernel-docs is &lt;3.12.51-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118999" version="1" comment="kernel-obs-build is &lt;3.12.51-60.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119170" version="1" comment="libdcerpc-atsvc-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119171" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119172" version="1" comment="libdcerpc-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119173" version="1" comment="libdcerpc-samr-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119174" version="1" comment="libdcerpc-samr0 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119175" version="1" comment="libgensec-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119176" version="1" comment="libldb-devel is &lt;1.1.24-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119177" version="1" comment="libndr-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119178" version="1" comment="libndr-krb5pac-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119179" version="1" comment="libndr-nbt-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119180" version="1" comment="libndr-standard-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119181" version="1" comment="libnetapi-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119182" version="1" comment="libregistry-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119183" version="1" comment="libsamba-credentials-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119184" version="1" comment="libsamba-hostconfig-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119185" version="1" comment="libsamba-passdb-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119186" version="1" comment="libsamba-policy-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119187" version="1" comment="libsamba-policy0 is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119188" version="1" comment="libsamba-util-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119189" version="1" comment="libsamdb-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119190" version="1" comment="libsmbclient-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119191" version="1" comment="libsmbclient-raw-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119192" version="1" comment="libsmbconf-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119193" version="1" comment="libsmbldap-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119194" version="1" comment="libtalloc-devel is &lt;2.1.5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119195" version="1" comment="libtdb-devel is &lt;1.3.8-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119196" version="1" comment="libtevent-devel is &lt;0.9.26-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119197" version="1" comment="libtevent-util-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119198" version="1" comment="libwbclient-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119199" version="1" comment="pyldb is &lt;1.1.24-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119200" version="1" comment="pyldb-devel is &lt;1.1.24-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119201" version="1" comment="pytalloc-devel is &lt;2.1.5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119202" version="1" comment="samba-core-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119203" version="1" comment="samba-test-devel is &lt;4.2.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118662" version="1" comment="xen-devel is &lt;4.5.2_02-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129359" version="1" comment="kernel-docs is &lt;3.12.59-60.41.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129360" version="1" comment="kernel-obs-build is &lt;3.12.59-60.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129426" version="1" comment="kernel-docs is &lt;3.12.59-60.45.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129427" version="1" comment="kernel-obs-build is &lt;3.12.59-60.45.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129730" version="1" comment="glibc-devel-static is &lt;2.19-38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129731" version="1" comment="glibc-info is &lt;2.19-38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129909" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129910" version="1" comment="libMagick++-devel is &lt;6.8.8.1-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129911" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130446" version="1" comment="apache2 is &lt;2.4.16-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130447" version="1" comment="apache2-devel is &lt;2.4.16-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130624" version="1" comment="obs-service-source_validator is &lt;0.6+git20160531.fbfe336-5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130625" version="1" comment="php5-devel is &lt;5.5.14-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121655" version="1" comment="bind-devel is &lt;9.9.6P1-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130795" version="1" comment="gimp-devel is &lt;2.8.10-7.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131743" version="1" comment="libvirt-devel is &lt;1.2.18.4-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131748" version="1" comment="xen-devel is &lt;4.5.3_08-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121553" version="1" comment="kernel-docs is &lt;3.12.51-60.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121554" version="1" comment="kernel-obs-build is &lt;3.12.51-60.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131749" version="1" comment="kernel-docs is &lt;3.12.62-60.62.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131750" version="1" comment="kernel-obs-build is &lt;3.12.62-60.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131752" version="1" comment="MozillaFirefox-devel is &lt;45.3.0esr-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131753" version="1" comment="krb5-devel is &lt;1.12.1-36.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131755" version="1" comment="libstorage-devel is &lt;2.25.35.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131756" version="1" comment="fontconfig-devel is &lt;2.11.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131757" version="1" comment="ocaml-compiler-libs is &lt;4.02.3-6.6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131758" version="1" comment="ocaml-runtime is &lt;4.02.3-6.6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131761" version="1" comment="libmysqlclient-devel is &lt;10.0.26-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131762" version="1" comment="libmysqld-devel is &lt;10.0.26-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131763" version="1" comment="libmysqld18 is &lt;10.0.26-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131766" version="1" comment="ctdb-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131767" version="1" comment="libdcerpc-atsvc-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131769" version="1" comment="libdcerpc-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131770" version="1" comment="libdcerpc-samr-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131771" version="1" comment="libdcerpc-samr0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131772" version="1" comment="libgensec-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131773" version="1" comment="libndr-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131774" version="1" comment="libndr-krb5pac-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131775" version="1" comment="libndr-nbt-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131776" version="1" comment="libndr-standard-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131777" version="1" comment="libnetapi-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131778" version="1" comment="libregistry-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131779" version="1" comment="libsamba-credentials-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131780" version="1" comment="libsamba-hostconfig-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131781" version="1" comment="libsamba-passdb-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131782" version="1" comment="libsamba-policy-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131783" version="1" comment="libsamba-policy0 is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131784" version="1" comment="libsamba-util-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131785" version="1" comment="libsamdb-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131786" version="1" comment="libsmbclient-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131787" version="1" comment="libsmbclient-raw-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131788" version="1" comment="libsmbconf-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131789" version="1" comment="libsmbldap-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131790" version="1" comment="libtevent-util-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131791" version="1" comment="libwbclient-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131792" version="1" comment="samba-core-devel is &lt;4.2.4-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131802" version="1" comment="libopenssl-devel is &lt;1.0.1i-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131812" version="1" comment="xen-devel is &lt;4.5.3_10-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131813" version="1" comment="php5-devel is &lt;5.5.14-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131814" version="1" comment="libgudev-1_0-devel is &lt;210-114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131815" version="1" comment="libudev-devel is &lt;210-114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131816" version="1" comment="systemd-devel is &lt;210-114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131817" version="1" comment="typelib-1_0-GUdev-1_0 is &lt;210-114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131818" version="1" comment="ghostscript-devel is &lt;9.15-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131819" version="1" comment="libtiff-devel is &lt;4.0.6-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131820" version="1" comment="freerdp-devel is &lt;1.0.2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131821" version="1" comment="libX11-devel is &lt;1.6.2-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131822" version="1" comment="libXfixes-devel is &lt;5.0.1-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131823" version="1" comment="libXi-devel is &lt;1.7.4-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131824" version="1" comment="libXrandr-devel is &lt;1.4.2-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131825" version="1" comment="libXrender-devel is &lt;0.9.8-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131826" version="1" comment="libXtst-devel is &lt;1.2.2-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131827" version="1" comment="libXv-devel is &lt;1.0.10-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131828" version="1" comment="libXvMC-devel is &lt;1.0.8-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131829" version="1" comment="gtk2-devel is &lt;2.24.24-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131830" version="1" comment="dbus-1-devel is &lt;1.8.22-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131831" version="1" comment="dbus-1-devel-doc is &lt;1.8.22-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131832" version="1" comment="libipa_hbac-devel is &lt;1.11.5.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131833" version="1" comment="libsss_idmap-devel is &lt;1.11.5.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131834" version="1" comment="libsss_nss_idmap-devel is &lt;1.11.5.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131835" version="1" comment="libsss_nss_idmap0 is &lt;1.11.5.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131836" version="1" comment="kernel-docs is &lt;3.12.62-60.64.8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131837" version="1" comment="kernel-obs-build is &lt;3.12.62-60.64.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131838" version="1" comment="quagga is &lt;0.99.22.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131839" version="1" comment="quagga-devel is &lt;0.99.22.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131840" version="1" comment="libxml2-devel is &lt;2.9.1-26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131841" version="1" comment="ghostscript-devel is &lt;9.15-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131842" version="1" comment="python3-devel is &lt;3.4.5-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131843" version="1" comment="openslp-devel is &lt;2.0.0-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131844" version="1" comment="gd-devel is &lt;2.1.0-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131845" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131846" version="1" comment="libMagick++-devel is &lt;6.8.8.1-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131847" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131848" version="1" comment="php7-devel is &lt;7.0.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135222" version="1" comment="bind-devel is &lt;9.9.9P1-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135223" version="1" comment="libcurl-devel is &lt;7.37.0-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135261" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr3.10-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135262" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr3.10-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135425" version="1" comment="php5-devel is &lt;5.5.14-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135426" version="1" comment="libblkid-devel is &lt;2.25-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135427" version="1" comment="libmount-devel is &lt;2.25-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135428" version="1" comment="libsmartcols-devel is &lt;2.25-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135429" version="1" comment="libjasper-devel is &lt;1.900.14-181.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135540" version="1" comment="ghostscript-devel is &lt;9.15-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135557" version="1" comment="eog-devel is &lt;3.10.2-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135887" version="1" comment="libtcnative-1-0-devel is &lt;1.1.34-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135888" version="1" comment="bash-devel is &lt;4.2-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135889" version="1" comment="readline-devel is &lt;6.2-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135946" version="1" comment="sudo-devel is &lt;1.8.10p3-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135984" version="1" comment="libarchive-devel is &lt;3.1.2-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135985" version="1" comment="kernel-docs is &lt;3.12.67-60.64.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135986" version="1" comment="kernel-obs-build is &lt;3.12.67-60.64.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135987" version="1" comment="dovecot22-devel is &lt;2.2.13-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136013" version="1" comment="libmysqlclient-devel is &lt;10.0.28-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136014" version="1" comment="libmysqld-devel is &lt;10.0.28-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136015" version="1" comment="libmysqld18 is &lt;10.0.28-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136124" version="1" comment="php7-devel is &lt;7.0.7-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136154" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136155" version="1" comment="libMagick++-devel is &lt;6.8.8.1-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136156" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129317" version="1" comment="imap-devel is &lt;2007e_suse-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136282" version="1" comment="php5-devel is &lt;5.5.14-86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136283" version="1" comment="libpacemaker-devel is &lt;1.1.13-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136284" version="1" comment="pcre-devel is &lt;8.39-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136285" version="1" comment="pcre-devel-static is &lt;8.39-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136286" version="1" comment="pcre-tools is &lt;8.39-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136407" version="1" comment="libX11-devel is &lt;1.6.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136408" version="1" comment="MozillaFirefox-devel is &lt;45.5.0esr-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136409" version="1" comment="mozilla-nss-devel is &lt;3.21.3-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136673" version="1" comment="kernel-docs is &lt;3.12.67-60.64.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136674" version="1" comment="kernel-obs-build is &lt;3.12.67-60.64.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136675" version="1" comment="libXi-devel is &lt;1.7.4-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136676" version="1" comment="MozillaFirefox-devel is &lt;45.5.1esr-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136677" version="1" comment="gc-devel is &lt;7.2d-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142208" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr3.21-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142209" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr3.21-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142378" version="1" comment="xen-devel is &lt;4.5.5_02-22.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142758" version="1" comment="libass-devel is &lt;0.10.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143043" version="1" comment="pcre-devel is &lt;8.39-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143044" version="1" comment="pcre-devel-static is &lt;8.39-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143045" version="1" comment="pcre-tools is &lt;8.39-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119645" version="1" comment="libmysqlclient-devel is &lt;10.0.22-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119646" version="1" comment="libmysqld-devel is &lt;10.0.22-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119647" version="1" comment="libmysqld18 is &lt;10.0.22-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143073" version="1" comment="kernel-docs is &lt;3.12.67-60.64.24.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143074" version="1" comment="kernel-obs-build is &lt;3.12.67-60.64.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144666" version="1" comment="xen-devel is &lt;4.5.5_04-22.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144667" version="1" comment="gd-devel is &lt;2.1.0-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144668" version="1" comment="MozillaFirefox-devel is &lt;45.6.0esr-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145391" version="1" comment="libgme-devel is &lt;0.6.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145844" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145845" version="1" comment="libMagick++-devel is &lt;6.8.8.1-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145846" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145956" version="1" comment="ctdb-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145957" version="1" comment="libdcerpc-atsvc-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145958" version="1" comment="libdcerpc-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145959" version="1" comment="libdcerpc-samr-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145960" version="1" comment="libdcerpc-samr0 is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145961" version="1" comment="libgensec-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145962" version="1" comment="libndr-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145963" version="1" comment="libndr-krb5pac-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145964" version="1" comment="libndr-nbt-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145965" version="1" comment="libndr-standard-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145966" version="1" comment="libnetapi-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145967" version="1" comment="libregistry-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145968" version="1" comment="libsamba-credentials-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145969" version="1" comment="libsamba-hostconfig-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145970" version="1" comment="libsamba-passdb-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145971" version="1" comment="libsamba-policy-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145972" version="1" comment="libsamba-policy0 is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145973" version="1" comment="libsamba-util-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145974" version="1" comment="libsamdb-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145975" version="1" comment="libsmbclient-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145976" version="1" comment="libsmbclient-raw-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145977" version="1" comment="libsmbconf-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145978" version="1" comment="libsmbldap-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145979" version="1" comment="libtevent-util-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145980" version="1" comment="libwbclient-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145981" version="1" comment="samba-core-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145982" version="1" comment="samba-test-devel is &lt;4.2.4-28.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146076" version="1" comment="libcares-devel is &lt;1.9.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146077" version="1" comment="gstreamer-plugins-bad-devel is &lt;1.2.4-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146078" version="1" comment="libgstinsertbin-1_0-0 is &lt;1.2.4-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146079" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.2.4-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146080" version="1" comment="libtiff-devel is &lt;4.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122497" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr2.10-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122498" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr2.10-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122341" version="1" comment="glibc-devel-static is &lt;2.19-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122342" version="1" comment="glibc-info is &lt;2.19-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122221" version="1" comment="dhcp-devel is &lt;4.3.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123239" version="1" comment="kernel-docs is &lt;3.12.53-60.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123240" version="1" comment="kernel-obs-build is &lt;3.12.53-60.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123875" version="1" comment="libopenssl-devel is &lt;1.0.1i-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124725" version="1" comment="bind-devel is &lt;9.9.6P1-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125005" version="1" comment="libdcerpc-atsvc-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125006" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125007" version="1" comment="libdcerpc-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125008" version="1" comment="libdcerpc-samr-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125009" version="1" comment="libdcerpc-samr0 is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125010" version="1" comment="libgensec-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125011" version="1" comment="libndr-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125012" version="1" comment="libndr-krb5pac-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125013" version="1" comment="libndr-nbt-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125014" version="1" comment="libndr-standard-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125015" version="1" comment="libnetapi-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125016" version="1" comment="libregistry-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125017" version="1" comment="libsamba-credentials-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125018" version="1" comment="libsamba-hostconfig-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125019" version="1" comment="libsamba-passdb-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125020" version="1" comment="libsamba-policy-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125021" version="1" comment="libsamba-policy0 is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125022" version="1" comment="libsamba-util-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125023" version="1" comment="libsamdb-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125024" version="1" comment="libsmbclient-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125025" version="1" comment="libsmbclient-raw-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125026" version="1" comment="libsmbconf-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125027" version="1" comment="libsmbldap-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125028" version="1" comment="libtevent-util-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125029" version="1" comment="libwbclient-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125030" version="1" comment="samba-core-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125031" version="1" comment="samba-test-devel is &lt;4.2.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125328" version="1" comment="xen-devel is &lt;4.5.2_06-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125627" version="1" comment="libvirt-devel is &lt;1.2.18.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125912" version="1" comment="kernel-docs is &lt;3.12.57-60.35.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125913" version="1" comment="kernel-obs-build is &lt;3.12.57-60.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125914" version="1" comment="ctdb-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125915" version="1" comment="libdcerpc-atsvc-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125916" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125917" version="1" comment="libdcerpc-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125918" version="1" comment="libdcerpc-samr-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125919" version="1" comment="libdcerpc-samr0 is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125920" version="1" comment="libgensec-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125921" version="1" comment="libndr-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125922" version="1" comment="libndr-krb5pac-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125923" version="1" comment="libndr-nbt-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125924" version="1" comment="libndr-standard-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125925" version="1" comment="libnetapi-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125926" version="1" comment="libregistry-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125927" version="1" comment="libsamba-credentials-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125928" version="1" comment="libsamba-hostconfig-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125929" version="1" comment="libsamba-passdb-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125930" version="1" comment="libsamba-policy-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125931" version="1" comment="libsamba-policy0 is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125932" version="1" comment="libsamba-util-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125933" version="1" comment="libsamdb-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125934" version="1" comment="libsmbclient-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125935" version="1" comment="libsmbclient-raw-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125936" version="1" comment="libsmbconf-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125937" version="1" comment="libsmbldap-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125938" version="1" comment="libtevent-util-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125939" version="1" comment="libwbclient-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125940" version="1" comment="samba-core-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125941" version="1" comment="samba-test-devel is &lt;4.2.4-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126094" version="1" comment="libxerces-c-devel is &lt;3.1.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126714" version="1" comment="yast2-users-devel-doc is &lt;3.1.41.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126905" version="1" comment="yast2-ntp-client-devel-doc is &lt;3.1.22-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127140" version="1" comment="libopenssl-devel is &lt;1.0.1i-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127739" version="1" comment="libgudev-1_0-devel is &lt;210-104.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127740" version="1" comment="libudev-devel is &lt;210-104.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127741" version="1" comment="systemd-devel is &lt;210-104.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127742" version="1" comment="typelib-1_0-GUdev-1_0 is &lt;210-104.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128802" version="1" comment="libspice-server-devel is &lt;0.12.5-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128956" version="1" comment="libmysqlclient-devel is &lt;10.0.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128957" version="1" comment="libmysqld-devel is &lt;10.0.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128958" version="1" comment="libmysqld18 is &lt;10.0.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147085" version="1" comment="gstreamer-0_10-plugins-base-devel is &lt;0.10.36-11.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147092" version="1" comment="typelib-1_0-GstApp-0_10 is &lt;0.10.36-11.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147093" version="1" comment="typelib-1_0-GstInterfaces-0_10 is &lt;0.10.36-11.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146585" version="1" comment="gstreamer-0_10-plugins-bad-devel is &lt;0.10.23-19.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147936" version="1" comment="gstreamer-0_10-plugins-bad-devel is &lt;0.10.23-19.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148008" version="1" comment="libgnutls-devel is &lt;3.2.15-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148009" version="1" comment="libgnutls-openssl-devel is &lt;3.2.15-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148010" version="1" comment="libgnutlsxx-devel is &lt;3.2.15-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148011" version="1" comment="libgnutlsxx28 is &lt;3.2.15-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148159" version="1" comment="guile-devel is &lt;2.0.9-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148160" version="1" comment="libguilereadline-v-18-18 is &lt;2.0.9-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148161" version="1" comment="libspice-server-devel is &lt;0.12.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148215" version="1" comment="libmysqlclient-devel is &lt;10.0.29-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148216" version="1" comment="libmysqld-devel is &lt;10.0.29-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148217" version="1" comment="libmysqld18 is &lt;10.0.29-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146586" version="1" comment="php5-devel is &lt;5.5.14-89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148248" version="1" comment="libexpat-devel is &lt;2.1.0-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148249" version="1" comment="MozillaFirefox-devel is &lt;45.7.0esr-99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148267" version="1" comment="libopus-devel is &lt;1.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148268" version="1" comment="libopus-devel-static is &lt;1.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148344" version="1" comment="libtiff-devel is &lt;4.0.7-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148413" version="1" comment="libopenssl-devel is &lt;1.0.1i-54.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148414" version="1" comment="java-1_8_0-ibm is &lt;1.8.0_sr4.0-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148415" version="1" comment="java-1_8_0-ibm-devel is &lt;1.8.0_sr4.0-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148416" version="1" comment="kernel-docs is &lt;3.12.69-60.64.29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148417" version="1" comment="kernel-obs-build is &lt;3.12.69-60.64.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148457" version="1" comment="libXpm-devel is &lt;3.5.11-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148458" version="1" comment="gd-devel is &lt;2.1.0-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148459" version="1" comment="ppp-devel is &lt;2.4.7-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148677" version="1" comment="kernel-docs is &lt;3.12.69-60.64.32.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148678" version="1" comment="kernel-obs-build is &lt;3.12.69-60.64.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146852" version="1" comment="libjasper-devel is &lt;1.900.14-184.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148758" version="1" comment="ImageMagick-devel is &lt;6.8.8.1-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148759" version="1" comment="libMagick++-devel is &lt;6.8.8.1-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148760" version="1" comment="perl-PerlMagick is &lt;6.8.8.1-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148761" version="1" comment="php7-devel is &lt;7.0.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148920" version="1" comment="libblkid-devel is &lt;2.25-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148921" version="1" comment="libmount-devel is &lt;2.25-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148922" version="1" comment="libsmartcols-devel is &lt;2.25-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148923" version="1" comment="php5-devel is &lt;5.5.14-96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148946" version="1" comment="xen-devel is &lt;4.5.5_06-22.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146184" version="1" comment="zlib-devel is &lt;1.2.8-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146185" version="1" comment="zlib-devel-32bit is &lt;1.2.8-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146186" version="1" comment="zlib-devel-static is &lt;1.2.8-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149111" version="1" comment="bind-devel is &lt;9.9.9P1-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149139" version="1" comment="libquicktime-devel is &lt;1.2.4-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149582" version="1" comment="dbus-1-devel is &lt;1.8.22-24.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149583" version="1" comment="dbus-1-devel-doc is &lt;1.8.22-24.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149584" version="1" comment="gegl-devel is &lt;0.2.0-10.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149640" version="1" comment="MozillaFirefox-devel is &lt;45.8.0esr-102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149641" version="1" comment="sane-backends-devel is &lt;1.0.24-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146870" version="1" comment="freeradius-server-devel is &lt;3.0.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146871" version="1" comment="rrdtool-devel is &lt;1.4.7-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146890" version="1" comment="bind-devel is &lt;9.9.9P1-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146313" version="1" comment="php7-devel is &lt;7.0.7-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147242" version="1" comment="gstreamer-plugins-base-devel is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147243" version="1" comment="typelib-1_0-GstAllocators-1_0 is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147244" version="1" comment="typelib-1_0-GstApp-1_0 is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147245" version="1" comment="typelib-1_0-GstFft-1_0 is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147246" version="1" comment="typelib-1_0-GstRiff-1_0 is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147247" version="1" comment="typelib-1_0-GstRtp-1_0 is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147248" version="1" comment="typelib-1_0-GstRtsp-1_0 is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147249" version="1" comment="typelib-1_0-GstSdp-1_0 is &lt;1.2.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135558" version="1" comment="libX11-devel is &lt;1.6.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135059" version="1" comment="libXfixes-devel is &lt;5.0.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135559" version="1" comment="libXi-devel is &lt;1.7.4-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135560" version="1" comment="libXrender-devel is &lt;0.9.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135079" version="1" comment="libXtst-devel is &lt;1.2.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135084" version="1" comment="libXv-devel is &lt;1.0.10-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135561" version="1" comment="libXvMC-devel is &lt;1.0.8-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135683" version="1" comment="python3-devel is &lt;3.4.5-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135890" version="1" comment="libpacemaker-devel is &lt;1.1.15-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135934" version="1" comment="sudo-devel is &lt;1.8.10p3-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136157" version="1" comment="libblkid-devel is &lt;2.28-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136158" version="1" comment="libmount-devel is &lt;2.28-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136159" version="1" comment="libsmartcols-devel is &lt;2.28-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136287" version="1" comment="libgit2 is &lt;0.24.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136288" version="1" comment="libgit2-24 is &lt;0.24.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136678" version="1" comment="kernel-docs is &lt;4.4.21-84.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136679" version="1" comment="kernel-obs-build is &lt;4.4.21-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142156" version="1" comment="xen-devel is &lt;4.7.1_02-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142759" version="1" comment="kernel-docs is &lt;4.4.21-90.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142760" version="1" comment="kernel-obs-build is &lt;4.4.21-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144669" version="1" comment="xen-devel is &lt;4.7.1_04-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145983" version="1" comment="libsmbclient-devel is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145984" version="1" comment="libwbclient-devel is &lt;4.4.2-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146081" version="1" comment="gstreamer-plugins-bad-devel is &lt;1.8.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146082" version="1" comment="libgstinsertbin-1_0-0 is &lt;1.8.3-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147379" version="1" comment="gstreamer-plugins-base-devel is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147380" version="1" comment="typelib-1_0-GstAllocators-1_0 is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147381" version="1" comment="typelib-1_0-GstApp-1_0 is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147382" version="1" comment="typelib-1_0-GstFft-1_0 is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147383" version="1" comment="typelib-1_0-GstRtp-1_0 is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147384" version="1" comment="typelib-1_0-GstRtsp-1_0 is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147385" version="1" comment="typelib-1_0-GstSdp-1_0 is &lt;1.8.3-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147434" version="1" comment="gstreamer-0_10-plugins-base-devel is &lt;0.10.36-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147435" version="1" comment="typelib-1_0-GstApp-0_10 is &lt;0.10.36-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147436" version="1" comment="typelib-1_0-GstInterfaces-0_10 is &lt;0.10.36-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146587" version="1" comment="gstreamer-0_10-plugins-bad-devel is &lt;0.10.23-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147641" version="1" comment="libudev-devel is &lt;228-132.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147642" version="1" comment="systemd-devel is &lt;228-132.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147773" version="1" comment="libpcscspy0 is &lt;1.8.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147774" version="1" comment="pcsc-lite-devel is &lt;1.8.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147819" version="1" comment="dbus-1-devel is &lt;1.8.22-24.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147820" version="1" comment="dbus-1-devel-doc is &lt;1.8.22-24.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147827" version="1" comment="gstreamer-0_10-plugins-bad-devel is &lt;0.10.23-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148053" version="1" comment="libxml2-devel is &lt;2.9.4-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146187" version="1" comment="zlib-devel-32bit is &lt;1.2.8-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146188" version="1" comment="zlib-devel-static is &lt;1.2.8-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148162" version="1" comment="libspice-server-devel is &lt;0.12.7-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148269" version="1" comment="libgit2 is &lt;0.24.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148270" version="1" comment="libgit2-24 is &lt;0.24.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148460" version="1" comment="libXpm-tools is &lt;3.5.11-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148924" version="1" comment="libblkid-devel is &lt;2.28-44.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148925" version="1" comment="libmount-devel is &lt;2.28-44.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148926" version="1" comment="libsmartcols-devel is &lt;2.28-44.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148947" version="1" comment="xen-devel is &lt;4.7.1_06-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149031" version="1" comment="kernel-docs is &lt;4.4.49-92.11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149032" version="1" comment="kernel-obs-build is &lt;4.4.49-92.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149585" version="1" comment="gegl-devel is &lt;0.2.0-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147250" version="1" comment="kernel-docs is &lt;4.4.38-93.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147251" version="1" comment="kernel-obs-build is &lt;4.4.38-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147386" version="1" comment="apache2-devel is &lt;2.4.23-16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102890" version="1" comment="libgnutls-openssl27 is &lt;3.2.15-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102615" version="1" comment="docker is &lt;1.3.2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102864" version="1" comment="ruby2.1-rubygem-sle2docker is &lt;0.2.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102866" version="1" comment="sle2docker is &lt;0.2.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103129" version="1" comment="openvpn-auth-pam-plugin is &lt;2.3.2-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101432" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.71-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101433" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.71-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101706" version="1" comment="rsyslog-diag-tools is &lt;8.4.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101707" version="1" comment="rsyslog-doc is &lt;8.4.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101711" version="1" comment="rsyslog-module-gssapi is &lt;8.4.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101712" version="1" comment="rsyslog-module-gtls is &lt;8.4.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101715" version="1" comment="rsyslog-module-mysql is &lt;8.4.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101716" version="1" comment="rsyslog-module-pgsql is &lt;8.4.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101717" version="1" comment="rsyslog-module-relp is &lt;8.4.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101718" version="1" comment="rsyslog-module-snmp is &lt;8.4.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101719" version="1" comment="rsyslog-module-udpspoof is &lt;8.4.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102649" version="1" comment="libfreebl3-hmac is &lt;3.17.2-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102650" version="1" comment="libfreebl3-hmac-32bit is &lt;3.17.2-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102653" version="1" comment="libsoftokn3-hmac is &lt;3.17.2-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102654" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.17.2-12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102876" version="1" comment="python-32bit is &lt;2.7.7-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102870" version="1" comment="python-base-32bit is &lt;2.7.7-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102878" version="1" comment="python-demo is &lt;2.7.7-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102873" version="1" comment="python-doc is &lt;2.7.7-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102874" version="1" comment="python-doc-pdf is &lt;2.7.7-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102879" version="1" comment="python-gdbm is &lt;2.7.7-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102880" version="1" comment="python-idle is &lt;2.7.7-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102667" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102668" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102670" version="1" comment="openssl-doc is &lt;1.0.1i-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102478" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr2.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102483" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr2.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102485" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr2.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118581" version="1" comment="xen-doc-html is &lt;4.4.3_06-22.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118582" version="1" comment="xen-tools is &lt;4.4.3_06-22.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118583" version="1" comment="xen-tools-domU is &lt;4.4.3_06-22.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119336" version="1" comment="bind-chrootenv is &lt;9.9.6P1-28.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119337" version="1" comment="bind-doc is &lt;9.9.6P1-28.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119802" version="1" comment="grub2-powerpc-ieee1275 is &lt;2.02~beta2-56.9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119803" version="1" comment="grub2-s390x-emu is &lt;2.02~beta2-56.9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107622" version="1" comment="postgresql93-contrib is &lt;9.3.6-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107623" version="1" comment="postgresql93-docs is &lt;9.3.6-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107627" version="1" comment="postgresql93-server is &lt;9.3.6-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107692" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.75-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107693" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.75-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107856" version="1" comment="vsftpd is &lt;3.0.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107812" version="1" comment="glibc-html is &lt;2.19-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107814" version="1" comment="glibc-info is &lt;2.19-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107817" version="1" comment="glibc-profile is &lt;2.19-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107823" version="1" comment="glibc-profile-32bit is &lt;2.19-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107834" version="1" comment="kernel-default-base is &lt;3.12.38-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107853" version="1" comment="kernel-default-man is &lt;3.12.38-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107847" version="1" comment="kernel-xen-base is &lt;3.12.38-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107892" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107893" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107895" version="1" comment="openssl-doc is &lt;1.0.1i-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108136" version="1" comment="xen-doc-html is &lt;4.4.1_10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108138" version="1" comment="xen-tools is &lt;4.4.1_10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108135" version="1" comment="xen-tools-domU is &lt;4.4.1_10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108370" version="1" comment="kernel-default-base is &lt;3.12.39-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108389" version="1" comment="kernel-default-man is &lt;3.12.39-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108383" version="1" comment="kernel-xen-base is &lt;3.12.39-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108661" version="1" comment="xen-doc-html is &lt;4.4.2_02-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108663" version="1" comment="xen-tools is &lt;4.4.2_02-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108660" version="1" comment="xen-tools-domU is &lt;4.4.2_02-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108910" version="1" comment="libgnutls-openssl27 is &lt;3.2.15-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108935" version="1" comment="mariadb-tools is &lt;10.0.16-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109138" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.79-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109139" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.79-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109681" version="1" comment="qemu-block-rbd is &lt;2.0.2-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109670" version="1" comment="qemu-guest-agent is &lt;2.0.2-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109673" version="1" comment="qemu-lang is &lt;2.0.2-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109674" version="1" comment="qemu-ppc is &lt;2.0.2-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109675" version="1" comment="qemu-s390 is &lt;2.0.2-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109720" version="1" comment="xen-doc-html is &lt;4.4.2_04-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109722" version="1" comment="xen-tools is &lt;4.4.2_04-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109719" version="1" comment="xen-tools-domU is &lt;4.4.2_04-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105318" version="1" comment="kernel-default-base is &lt;3.12.32-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105334" version="1" comment="kernel-default-man is &lt;3.12.32-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105331" version="1" comment="kernel-xen-base is &lt;3.12.32-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109985" version="1" comment="apache2-doc is &lt;2.4.10-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109987" version="1" comment="apache2-example-pages is &lt;2.4.10-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109988" version="1" comment="apache2-prefork is &lt;2.4.10-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109989" version="1" comment="apache2-utils is &lt;2.4.10-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109990" version="1" comment="apache2-worker is &lt;2.4.10-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105454" version="1" comment="libfreebl3-hmac is &lt;3.17.3-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105455" version="1" comment="libfreebl3-hmac-32bit is &lt;3.17.3-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105458" version="1" comment="libsoftokn3-hmac is &lt;3.17.3-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105459" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.17.3-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110334" version="1" comment="xen-doc-html is &lt;4.4.2_06-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110336" version="1" comment="xen-tools is &lt;4.4.2_06-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110333" version="1" comment="xen-tools-domU is &lt;4.4.2_06-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110508" version="1" comment="kernel-default-base is &lt;3.12.43-52.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110527" version="1" comment="kernel-default-man is &lt;3.12.43-52.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110521" version="1" comment="kernel-xen-base is &lt;3.12.43-52.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110532" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110537" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110539" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110568" version="1" comment="openldap2-back-meta is &lt;2.4.39-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105399" version="1" comment="docker is &lt;1.4.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110700" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110701" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110703" version="1" comment="openssl-doc is &lt;1.0.1i-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110853" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110854" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111025" version="1" comment="bind-chrootenv is &lt;9.9.6P1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111027" version="1" comment="bind-doc is &lt;9.9.6P1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111451" version="1" comment="postgresql93-contrib is &lt;9.3.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111452" version="1" comment="postgresql93-docs is &lt;9.3.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111456" version="1" comment="postgresql93-server is &lt;9.3.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111481" version="1" comment="libfreebl3-hmac is &lt;3.19.2_CKBI_1.98-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111482" version="1" comment="libfreebl3-hmac-32bit is &lt;3.19.2_CKBI_1.98-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111485" version="1" comment="libsoftokn3-hmac is &lt;3.19.2_CKBI_1.98-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111486" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.19.2_CKBI_1.98-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111471" version="1" comment="mariadb-tools is &lt;10.0.20-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111358" version="1" comment="krb5-32bit is &lt;1.12.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111359" version="1" comment="krb5-client is &lt;1.12.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111362" version="1" comment="krb5-doc is &lt;1.12.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111363" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111364" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111365" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111366" version="1" comment="krb5-server is &lt;1.12.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111433" version="1" comment="tomcat is &lt;7.0.55-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111434" version="1" comment="tomcat-admin-webapps is &lt;7.0.55-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111435" version="1" comment="tomcat-docs-webapp is &lt;7.0.55-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111436" version="1" comment="tomcat-el-2_2-api is &lt;7.0.55-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111438" version="1" comment="tomcat-javadoc is &lt;7.0.55-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111439" version="1" comment="tomcat-jsp-2_2-api is &lt;7.0.55-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111441" version="1" comment="tomcat-lib is &lt;7.0.55-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111442" version="1" comment="tomcat-servlet-3_0-api is &lt;7.0.55-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111443" version="1" comment="tomcat-webapps is &lt;7.0.55-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111505" version="1" comment="xen-doc-html is &lt;4.4.2_08-22.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111507" version="1" comment="xen-tools is &lt;4.4.2_08-22.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111504" version="1" comment="xen-tools-domU is &lt;4.4.2_08-22.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111512" version="1" comment="bind-chrootenv is &lt;9.9.6P1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111514" version="1" comment="bind-doc is &lt;9.9.6P1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111528" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.85-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111529" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.85-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111573" version="1" comment="kernel-default-base is &lt;3.12.44-52.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111592" version="1" comment="kernel-default-man is &lt;3.12.44-52.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111586" version="1" comment="kernel-xen-base is &lt;3.12.44-52.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105430" version="1" comment="bind-chrootenv is &lt;9.9.5P1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105432" version="1" comment="bind-doc is &lt;9.9.5P1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113275" version="1" comment="python-32bit is &lt;2.7.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113269" version="1" comment="python-base-32bit is &lt;2.7.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113277" version="1" comment="python-demo is &lt;2.7.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113272" version="1" comment="python-doc is &lt;2.7.9-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113273" version="1" comment="python-doc-pdf is &lt;2.7.9-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113278" version="1" comment="python-gdbm is &lt;2.7.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113279" version="1" comment="python-idle is &lt;2.7.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113782" version="1" comment="xen-doc-html is &lt;4.4.2_10-22.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113784" version="1" comment="xen-tools is &lt;4.4.2_10-22.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113781" version="1" comment="xen-tools-domU is &lt;4.4.2_10-22.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113858" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-27.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113859" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-27.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113861" version="1" comment="openssl-doc is &lt;1.0.1i-27.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114069" version="1" comment="libfreebl3-hmac is &lt;3.19.2.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114070" version="1" comment="libfreebl3-hmac-32bit is &lt;3.19.2.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114073" version="1" comment="libsoftokn3-hmac is &lt;3.19.2.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114074" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.19.2.0-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114050" version="1" comment="bind-chrootenv is &lt;9.9.6P1-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114052" version="1" comment="bind-doc is &lt;9.9.6P1-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105749" version="1" comment="kernel-default-base is &lt;3.12.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105765" version="1" comment="kernel-default-man is &lt;3.12.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105762" version="1" comment="kernel-xen-base is &lt;3.12.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114278" version="1" comment="qemu-block-rbd is &lt;2.0.2-48.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114267" version="1" comment="qemu-guest-agent is &lt;2.0.2-48.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114270" version="1" comment="qemu-lang is &lt;2.0.2-48.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114271" version="1" comment="qemu-ppc is &lt;2.0.2-48.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114272" version="1" comment="qemu-s390 is &lt;2.0.2-48.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105787" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105788" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105790" version="1" comment="openssl-doc is &lt;1.0.1i-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105927" version="1" comment="powerpc-utils is &lt;1.2.22-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114433" version="1" comment="kernel-default-base is &lt;3.12.44-52.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114452" version="1" comment="kernel-default-man is &lt;3.12.44-52.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114446" version="1" comment="kernel-xen-base is &lt;3.12.44-52.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105976" version="1" comment="libvirt-lock-sanlock is &lt;1.2.5-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114986" version="1" comment="kernel-default-base is &lt;3.12.48-52.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115005" version="1" comment="kernel-default-man is &lt;3.12.48-52.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114999" version="1" comment="kernel-xen-base is &lt;3.12.48-52.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106074" version="1" comment="strongswan is &lt;5.1.3-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106075" version="1" comment="strongswan-doc is &lt;5.1.3-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106076" version="1" comment="strongswan-hmac is &lt;5.1.3-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106077" version="1" comment="strongswan-ipsec is &lt;5.1.3-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106078" version="1" comment="strongswan-libs0 is &lt;5.1.3-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115080" version="1" comment="qemu-block-rbd is &lt;2.0.2-48.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115069" version="1" comment="qemu-guest-agent is &lt;2.0.2-48.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115072" version="1" comment="qemu-lang is &lt;2.0.2-48.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115073" version="1" comment="qemu-ppc is &lt;2.0.2-48.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115074" version="1" comment="qemu-s390 is &lt;2.0.2-48.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106089" version="1" comment="krb5-doc is &lt;1.12.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106090" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106091" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106092" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106093" version="1" comment="krb5-server is &lt;1.12.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115144" version="1" comment="postgresql93-contrib is &lt;9.3.10-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115145" version="1" comment="postgresql93-docs is &lt;9.3.10-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115149" version="1" comment="postgresql93-server is &lt;9.3.10-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115388" version="1" comment="glibc-html is &lt;2.19-22.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115390" version="1" comment="glibc-info is &lt;2.19-22.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115393" version="1" comment="glibc-profile is &lt;2.19-22.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115399" version="1" comment="glibc-profile-32bit is &lt;2.19-22.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115406" version="1" comment="apache2-doc is &lt;2.4.10-14.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115408" version="1" comment="apache2-example-pages is &lt;2.4.10-14.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115400" version="1" comment="apache2-mod_auth_kerb is &lt;5.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115402" version="1" comment="apache2-mod_jk is &lt;1.2.40-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115403" version="1" comment="apache2-mod_security2 is &lt;2.8.0-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115409" version="1" comment="apache2-prefork is &lt;2.4.10-14.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115410" version="1" comment="apache2-utils is &lt;2.4.10-14.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115411" version="1" comment="apache2-worker is &lt;2.4.10-14.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115441" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.91-21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115442" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.91-21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115936" version="1" comment="xen-doc-html is &lt;4.4.3_02-22.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115938" version="1" comment="xen-tools is &lt;4.4.3_02-22.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115935" version="1" comment="xen-tools-domU is &lt;4.4.3_02-22.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105065" version="1" comment="xen-doc-html is &lt;4.4.1_08-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105067" version="1" comment="xen-tools is &lt;4.4.1_08-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105064" version="1" comment="xen-tools-domU is &lt;4.4.1_08-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106153" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr2.10-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106158" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr2.10-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106160" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr2.10-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116169" version="1" comment="dracut-fips is &lt;037-51.17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106369" version="1" comment="qemu-guest-agent is &lt;2.0.2-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106372" version="1" comment="qemu-lang is &lt;2.0.2-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106373" version="1" comment="qemu-ppc is &lt;2.0.2-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106374" version="1" comment="qemu-s390 is &lt;2.0.2-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118696" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.20-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118697" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.20-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118698" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.20-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118177" version="1" comment="kernel-default-base is &lt;3.12.51-52.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118178" version="1" comment="kernel-default-man is &lt;3.12.51-52.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118179" version="1" comment="kernel-xen-base is &lt;3.12.51-52.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118735" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-27.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118736" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-27.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118737" version="1" comment="openssl-doc is &lt;1.0.1i-27.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118576" version="1" comment="krb5-doc is &lt;1.12.1-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118577" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.1-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118578" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.1-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118579" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.1-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118580" version="1" comment="krb5-server is &lt;1.12.1-22.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119204" version="1" comment="tdb-tools is &lt;1.3.8-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129307" version="1" comment="kernel-default-base is &lt;3.12.60-52.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129308" version="1" comment="kernel-default-man is &lt;3.12.60-52.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129309" version="1" comment="kernel-xen-base is &lt;3.12.60-52.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129310" version="1" comment="dhcp-relay is &lt;4.2.6-14.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129311" version="1" comment="dhcp-server is &lt;4.2.6-14.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129428" version="1" comment="kernel-default-base is &lt;3.12.60-52.54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129429" version="1" comment="kernel-default-man is &lt;3.12.60-52.54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129430" version="1" comment="kernel-xen-base is &lt;3.12.60-52.54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129431" version="1" comment="glibc-html is &lt;2.19-22.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129432" version="1" comment="glibc-info is &lt;2.19-22.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129433" version="1" comment="glibc-profile is &lt;2.19-22.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129434" version="1" comment="glibc-profile-32bit is &lt;2.19-22.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121158" version="1" comment="kernel-default-base is &lt;3.12.51-52.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121159" version="1" comment="kernel-default-man is &lt;3.12.51-52.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121160" version="1" comment="kernel-xen-base is &lt;3.12.51-52.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118767" version="1" comment="qemu-block-rbd is &lt;2.0.2-48.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118768" version="1" comment="qemu-guest-agent is &lt;2.0.2-48.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118769" version="1" comment="qemu-lang is &lt;2.0.2-48.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118770" version="1" comment="qemu-ppc is &lt;2.0.2-48.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118771" version="1" comment="qemu-s390 is &lt;2.0.2-48.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121341" version="1" comment="libxml2-doc is &lt;2.9.1-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121660" version="1" comment="bind-chrootenv is &lt;9.9.6P1-28.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121661" version="1" comment="bind-doc is &lt;9.9.6P1-28.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121656" version="1" comment="giflib-progs is &lt;5.0.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121657" version="1" comment="kernel-default-base is &lt;3.12.51-52.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121658" version="1" comment="kernel-default-man is &lt;3.12.51-52.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121659" version="1" comment="kernel-xen-base is &lt;3.12.51-52.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120963" version="1" comment="openldap2-back-meta is &lt;2.4.41-18.13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120993" version="1" comment="apache-commons-collections is &lt;3.2.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120994" version="1" comment="apache-commons-collections-javadoc is &lt;3.2.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131849" version="1" comment="ctdb is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131850" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131851" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131852" version="1" comment="libdcerpc0 is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131853" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131854" version="1" comment="libgensec0 is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131855" version="1" comment="libgensec0-32bit is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131856" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131857" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131858" version="1" comment="libndr-nbt0 is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131859" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131860" version="1" comment="libndr-standard0 is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131861" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131862" version="1" comment="libndr0 is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131863" version="1" comment="libndr0-32bit is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131864" version="1" comment="libnetapi0 is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131865" version="1" comment="libnetapi0-32bit is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131866" version="1" comment="libregistry0 is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131867" version="1" comment="libsamba-credentials0 is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131868" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131869" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131870" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131871" version="1" comment="libsamba-passdb0 is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131872" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131873" version="1" comment="libsamba-util0 is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131874" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131875" version="1" comment="libsamdb0 is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131876" version="1" comment="libsamdb0-32bit is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131877" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131878" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131879" version="1" comment="libsmbclient0 is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131880" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131881" version="1" comment="libsmbconf0 is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131882" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131883" version="1" comment="libsmbldap0 is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131884" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131885" version="1" comment="libtevent-util0 is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131886" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131887" version="1" comment="libwbclient0 is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131888" version="1" comment="libwbclient0-32bit is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131889" version="1" comment="samba is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131890" version="1" comment="samba-32bit is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131891" version="1" comment="samba-client is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131892" version="1" comment="samba-client-32bit is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131893" version="1" comment="samba-doc is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131894" version="1" comment="samba-libs is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131895" version="1" comment="samba-libs-32bit is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131896" version="1" comment="samba-winbind is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131897" version="1" comment="samba-winbind-32bit is &lt;4.2.4-18.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131898" version="1" comment="kernel-default-man is &lt;3.12.60-52.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135501" version="1" comment="qemu-ppc is &lt;2.0.2-48.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135502" version="1" comment="qemu-s390 is &lt;2.0.2-48.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122056" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.95-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122057" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.95-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136125" version="1" comment="qemu-ppc is &lt;2.0.2-48.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136126" version="1" comment="qemu-s390 is &lt;2.0.2-48.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141195" version="1" comment="kernel-default-man is &lt;3.12.60-52.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144670" version="1" comment="kernel-default-man is &lt;3.12.60-52.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121021" version="1" comment="libvirt-lock-sanlock is &lt;1.2.5-27.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122776" version="1" comment="libfreebl3-hmac is &lt;3.20.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122777" version="1" comment="libfreebl3-hmac-32bit is &lt;3.20.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122778" version="1" comment="libsoftokn3-hmac is &lt;3.20.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122779" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.20.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122499" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.30-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122500" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.30-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122501" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.30-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122502" version="1" comment="krb5-doc is &lt;1.12.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122503" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122504" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122505" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122506" version="1" comment="krb5-server is &lt;1.12.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122344" version="1" comment="glibc-html is &lt;2.19-22.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122345" version="1" comment="glibc-info is &lt;2.19-22.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122346" version="1" comment="glibc-profile is &lt;2.19-22.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122347" version="1" comment="glibc-profile-32bit is &lt;2.19-22.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123492" version="1" comment="postgresql93-contrib is &lt;9.3.11-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123493" version="1" comment="postgresql93-docs is &lt;9.3.11-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123494" version="1" comment="postgresql93-server is &lt;9.3.11-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122226" version="1" comment="dhcp-relay is &lt;4.2.6-14.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122227" version="1" comment="dhcp-server is &lt;4.2.6-14.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123671" version="1" comment="postgresql94-contrib is &lt;9.4.6-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123672" version="1" comment="postgresql94-docs is &lt;9.4.6-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123673" version="1" comment="postgresql94-server is &lt;9.4.6-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123876" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-27.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123877" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-27.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123878" version="1" comment="openssl-doc is &lt;1.0.1i-27.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119301" version="1" comment="libxml2-doc is &lt;2.9.1-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124613" version="1" comment="libfreebl3-hmac is &lt;3.20.2-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124614" version="1" comment="libfreebl3-hmac-32bit is &lt;3.20.2-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124615" version="1" comment="libsoftokn3-hmac is &lt;3.20.2-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124616" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.20.2-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124738" version="1" comment="bind-chrootenv is &lt;9.9.6P1-28.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124739" version="1" comment="bind-doc is &lt;9.9.6P1-28.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124828" version="1" comment="kernel-default-base is &lt;3.12.55-52.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124829" version="1" comment="kernel-default-man is &lt;3.12.55-52.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124830" version="1" comment="kernel-xen-base is &lt;3.12.55-52.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125032" version="1" comment="tomcat is &lt;7.0.68-7.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125033" version="1" comment="tomcat-admin-webapps is &lt;7.0.68-7.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125034" version="1" comment="tomcat-docs-webapp is &lt;7.0.68-7.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125035" version="1" comment="tomcat-el-2_2-api is &lt;7.0.68-7.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125036" version="1" comment="tomcat-javadoc is &lt;7.0.68-7.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125037" version="1" comment="tomcat-jsp-2_2-api is &lt;7.0.68-7.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125038" version="1" comment="tomcat-lib is &lt;7.0.68-7.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125039" version="1" comment="tomcat-servlet-3_0-api is &lt;7.0.68-7.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125040" version="1" comment="tomcat-webapps is &lt;7.0.68-7.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125675" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.99-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125676" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.99-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125942" version="1" comment="krb5-doc is &lt;1.12.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125943" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125944" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125945" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125946" version="1" comment="krb5-server is &lt;1.12.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126435" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-16.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126436" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-16.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127086" version="1" comment="libxml2-doc is &lt;2.9.1-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127141" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-27.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127142" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-27.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127143" version="1" comment="openssl-doc is &lt;1.0.1i-27.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127280" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.101-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127281" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.101-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127554" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.40-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127555" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.40-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127556" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.40-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127599" version="1" comment="xen-doc-html is &lt;4.4.4_02-22.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127600" version="1" comment="xen-tools is &lt;4.4.4_02-22.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127601" version="1" comment="xen-tools-domU is &lt;4.4.4_02-22.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128017" version="1" comment="openssh-fips is &lt;6.6p1-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121342" version="1" comment="openssh-fips is &lt;6.6p1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128323" version="1" comment="cyrus-imapd is &lt;2.3.18-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128324" version="1" comment="perl-Cyrus-IMAP is &lt;2.3.18-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128325" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.3.18-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119528" version="1" comment="mariadb-tools is &lt;10.0.22-20.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128621" version="1" comment="libxml2-doc is &lt;2.9.1-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128803" version="1" comment="qemu-block-rbd is &lt;2.0.2-48.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128804" version="1" comment="qemu-guest-agent is &lt;2.0.2-48.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128805" version="1" comment="qemu-lang is &lt;2.0.2-48.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128806" version="1" comment="qemu-ppc is &lt;2.0.2-48.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128807" version="1" comment="qemu-s390 is &lt;2.0.2-48.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128913" version="1" comment="kernel-default-base is &lt;3.12.55-52.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128914" version="1" comment="kernel-default-man is &lt;3.12.55-52.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128915" version="1" comment="kernel-xen-base is &lt;3.12.55-52.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128959" version="1" comment="mariadb-tools is &lt;10.0.25-20.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120783" version="1" comment="libfreebl3-hmac is &lt;3.19.2.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120784" version="1" comment="libfreebl3-hmac-32bit is &lt;3.19.2.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120785" version="1" comment="libsoftokn3-hmac is &lt;3.19.2.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120786" version="1" comment="libsoftokn3-hmac-32bit is &lt;3.19.2.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148461" version="1" comment="kernel-default-man is &lt;3.12.61-52.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149459" version="1" comment="qemu-ppc is &lt;2.0.2-48.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149460" version="1" comment="qemu-s390 is &lt;2.0.2-48.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119529" version="1" comment="bind-chrootenv is &lt;9.9.6P1-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119530" version="1" comment="bind-doc is &lt;9.9.6P1-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118806" version="1" comment="grub2-powerpc-ieee1275 is &lt;2.02~beta2-73.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118885" version="1" comment="grub2-s390x-emu is &lt;2.02~beta2-73.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118814" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118815" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118816" version="1" comment="openssl-doc is &lt;1.0.1i-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118804" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr2.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118805" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr2.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119000" version="1" comment="kernel-default-base is &lt;3.12.51-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119001" version="1" comment="kernel-default-man is &lt;3.12.51-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119002" version="1" comment="kernel-xen-base is &lt;3.12.51-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119205" version="1" comment="tdb-tools is &lt;1.3.8-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118808" version="1" comment="xen-doc-html is &lt;4.5.2_02-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118809" version="1" comment="xen-tools is &lt;4.5.2_02-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118810" version="1" comment="xen-tools-domU is &lt;4.5.2_02-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129361" version="1" comment="kernel-default-base is &lt;3.12.59-60.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129362" version="1" comment="kernel-default-man is &lt;3.12.59-60.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129363" version="1" comment="kernel-xen-base is &lt;3.12.59-60.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129378" version="1" comment="qemu-block-rbd is &lt;2.3.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129379" version="1" comment="qemu-guest-agent is &lt;2.3.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129380" version="1" comment="qemu-lang is &lt;2.3.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129381" version="1" comment="qemu-ppc is &lt;2.3.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129382" version="1" comment="qemu-s390 is &lt;2.3.1-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129435" version="1" comment="kernel-default-base is &lt;3.12.59-60.45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129436" version="1" comment="kernel-default-man is &lt;3.12.59-60.45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129437" version="1" comment="kernel-xen-base is &lt;3.12.59-60.45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129732" version="1" comment="glibc-html is &lt;2.19-38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129733" version="1" comment="glibc-profile is &lt;2.19-38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129734" version="1" comment="glibc-profile-32bit is &lt;2.19-38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130448" version="1" comment="apache2-doc is &lt;2.4.16-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130449" version="1" comment="apache2-example-pages is &lt;2.4.16-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130450" version="1" comment="apache2-prefork is &lt;2.4.16-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130451" version="1" comment="apache2-utils is &lt;2.4.16-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130452" version="1" comment="apache2-worker is &lt;2.4.16-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121662" version="1" comment="bind-chrootenv is &lt;9.9.6P1-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121663" version="1" comment="bind-doc is &lt;9.9.6P1-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131899" version="1" comment="squid is &lt;3.3.14-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131904" version="1" comment="libvirt-lock-sanlock is &lt;1.2.18.4-11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131906" version="1" comment="xen-doc-html is &lt;4.5.3_08-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131907" version="1" comment="xen-tools is &lt;4.5.3_08-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131908" version="1" comment="xen-tools-domU is &lt;4.5.3_08-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121557" version="1" comment="kernel-default-base is &lt;3.12.51-60.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121558" version="1" comment="kernel-default-man is &lt;3.12.51-60.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121559" version="1" comment="kernel-xen-base is &lt;3.12.51-60.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131912" version="1" comment="python-doc is &lt;2.7.9-24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131913" version="1" comment="python-doc-pdf is &lt;2.7.9-24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131916" version="1" comment="kernel-default-base is &lt;3.12.62-60.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131917" version="1" comment="kernel-default-man is &lt;3.12.62-60.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131918" version="1" comment="kernel-xen-base is &lt;3.12.62-60.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131919" version="1" comment="krb5-doc is &lt;1.12.1-36.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131920" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.1-36.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131921" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.1-36.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131922" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.1-36.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131923" version="1" comment="krb5-server is &lt;1.12.1-36.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131924" version="1" comment="tomcat is &lt;8.0.32-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131925" version="1" comment="tomcat-admin-webapps is &lt;8.0.32-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131926" version="1" comment="tomcat-docs-webapp is &lt;8.0.32-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131927" version="1" comment="tomcat-el-3_0-api is &lt;8.0.32-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131928" version="1" comment="tomcat-javadoc is &lt;8.0.32-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131929" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.32-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131930" version="1" comment="tomcat-lib is &lt;8.0.32-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131931" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.32-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131932" version="1" comment="tomcat-webapps is &lt;8.0.32-8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131933" version="1" comment="mariadb-tools is &lt;10.0.26-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131937" version="1" comment="cyrus-imapd is &lt;2.3.18-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131941" version="1" comment="perl-Cyrus-IMAP is &lt;2.3.18-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131942" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.3.18-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131943" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131944" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131945" version="1" comment="openssl-doc is &lt;1.0.1i-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131952" version="1" comment="xen-doc-html is &lt;4.5.3_10-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131953" version="1" comment="xen-tools is &lt;4.5.3_10-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131954" version="1" comment="xen-tools-domU is &lt;4.5.3_10-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131955" version="1" comment="squidGuard is &lt;1.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131956" version="1" comment="squidGuard-doc is &lt;1.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131957" version="1" comment="kernel-default-base is &lt;3.12.62-60.64.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131958" version="1" comment="kernel-default-man is &lt;3.12.62-60.64.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131959" version="1" comment="kernel-xen-base is &lt;3.12.62-60.64.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131960" version="1" comment="qemu-block-rbd is &lt;2.3.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131961" version="1" comment="qemu-guest-agent is &lt;2.3.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131962" version="1" comment="qemu-lang is &lt;2.3.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131963" version="1" comment="qemu-ppc is &lt;2.3.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131964" version="1" comment="qemu-s390 is &lt;2.3.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131965" version="1" comment="libxml2-doc is &lt;2.9.1-26.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131966" version="1" comment="openslp-server is &lt;2.0.0-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122060" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.72-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122061" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.72-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135263" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr3.10-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135264" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr3.10-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135988" version="1" comment="kernel-default-base is &lt;3.12.67-60.64.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135989" version="1" comment="kernel-default-man is &lt;3.12.67-60.64.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135990" version="1" comment="kernel-xen-base is &lt;3.12.67-60.64.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136289" version="1" comment="qemu-block-rbd is &lt;2.3.1-24.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136290" version="1" comment="qemu-guest-agent is &lt;2.3.1-24.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136291" version="1" comment="qemu-lang is &lt;2.3.1-24.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136292" version="1" comment="qemu-ppc is &lt;2.3.1-24.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136293" version="1" comment="qemu-s390 is &lt;2.3.1-24.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136680" version="1" comment="kernel-default-base is &lt;3.12.67-60.64.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136681" version="1" comment="kernel-default-man is &lt;3.12.67-60.64.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136682" version="1" comment="kernel-xen-base is &lt;3.12.67-60.64.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142210" version="1" comment="tomcat is &lt;8.0.32-10.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142211" version="1" comment="tomcat-admin-webapps is &lt;8.0.32-10.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142212" version="1" comment="tomcat-docs-webapp is &lt;8.0.32-10.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142213" version="1" comment="tomcat-el-3_0-api is &lt;8.0.32-10.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142214" version="1" comment="tomcat-javadoc is &lt;8.0.32-10.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142215" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.32-10.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142216" version="1" comment="tomcat-lib is &lt;8.0.32-10.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142217" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.32-10.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142218" version="1" comment="tomcat-webapps is &lt;8.0.32-10.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142219" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr3.21-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142220" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr3.21-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142379" version="1" comment="xen-doc-html is &lt;4.5.5_02-22.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142380" version="1" comment="xen-tools is &lt;4.5.5_02-22.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142381" version="1" comment="xen-tools-domU is &lt;4.5.5_02-22.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119653" version="1" comment="mariadb-tools is &lt;10.0.22-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143075" version="1" comment="kernel-default-base is &lt;3.12.67-60.64.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143076" version="1" comment="kernel-default-man is &lt;3.12.67-60.64.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143077" version="1" comment="kernel-xen-base is &lt;3.12.67-60.64.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144671" version="1" comment="xen-doc-html is &lt;4.5.5_04-22.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144672" version="1" comment="xen-tools is &lt;4.5.5_04-22.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144673" version="1" comment="xen-tools-domU is &lt;4.5.5_04-22.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122507" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr2.10-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122508" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr2.10-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118817" version="1" comment="qemu-block-rbd is &lt;2.3.1-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118818" version="1" comment="qemu-guest-agent is &lt;2.3.1-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118819" version="1" comment="qemu-lang is &lt;2.3.1-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118820" version="1" comment="qemu-ppc is &lt;2.3.1-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118886" version="1" comment="qemu-s390 is &lt;2.3.1-7.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122348" version="1" comment="glibc-html is &lt;2.19-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122349" version="1" comment="glibc-profile is &lt;2.19-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122350" version="1" comment="glibc-profile-32bit is &lt;2.19-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122228" version="1" comment="dhcp-relay is &lt;4.3.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122229" version="1" comment="dhcp-server is &lt;4.3.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123242" version="1" comment="kernel-default-base is &lt;3.12.53-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123255" version="1" comment="kernel-default-man is &lt;3.12.53-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123243" version="1" comment="kernel-xen-base is &lt;3.12.53-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123256" version="1" comment="lttng-modules is &lt;2.7.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123257" version="1" comment="lttng-modules-kmp-default is &lt;2.7.0_k3.12.53_60.30-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123879" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123880" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123881" version="1" comment="openssl-doc is &lt;1.0.1i-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124726" version="1" comment="bind-chrootenv is &lt;9.9.6P1-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124727" version="1" comment="bind-doc is &lt;9.9.6P1-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124740" version="1" comment="tomcat is &lt;8.0.32-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124741" version="1" comment="tomcat-admin-webapps is &lt;8.0.32-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124742" version="1" comment="tomcat-docs-webapp is &lt;8.0.32-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124743" version="1" comment="tomcat-el-3_0-api is &lt;8.0.32-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124744" version="1" comment="tomcat-javadoc is &lt;8.0.32-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124745" version="1" comment="tomcat-jsp-2_3-api is &lt;8.0.32-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124746" version="1" comment="tomcat-lib is &lt;8.0.32-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124747" version="1" comment="tomcat-servlet-3_1-api is &lt;8.0.32-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124748" version="1" comment="tomcat-webapps is &lt;8.0.32-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125329" version="1" comment="xen-doc-html is &lt;4.5.2_06-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125330" version="1" comment="xen-tools is &lt;4.5.2_06-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125331" version="1" comment="xen-tools-domU is &lt;4.5.2_06-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125628" version="1" comment="libvirt-lock-sanlock is &lt;1.2.18.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125677" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.77-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125678" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.77-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125947" version="1" comment="kernel-default-base is &lt;3.12.57-60.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125948" version="1" comment="kernel-default-man is &lt;3.12.57-60.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125949" version="1" comment="kernel-xen-base is &lt;3.12.57-60.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127144" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127145" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127146" version="1" comment="openssl-doc is &lt;1.0.1i-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127282" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.91-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127283" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.91-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128960" version="1" comment="mariadb-tools is &lt;10.0.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147972" version="1" comment="policycoreutils is &lt;2.3-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147973" version="1" comment="policycoreutils-python is &lt;2.3-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148418" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1i-54.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148419" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1i-54.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148420" version="1" comment="openssl-doc is &lt;1.0.1i-54.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148421" version="1" comment="java-1_8_0-ibm-alsa is &lt;1.8.0_sr4.0-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148422" version="1" comment="java-1_8_0-ibm-plugin is &lt;1.8.0_sr4.0-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148423" version="1" comment="kernel-default-base is &lt;3.12.69-60.64.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148424" version="1" comment="kernel-default-man is &lt;3.12.69-60.64.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148425" version="1" comment="kernel-xen-base is &lt;3.12.69-60.64.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148679" version="1" comment="kernel-default-base is &lt;3.12.69-60.64.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148680" version="1" comment="kernel-default-man is &lt;3.12.69-60.64.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148681" version="1" comment="kernel-xen-base is &lt;3.12.69-60.64.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148948" version="1" comment="xen-doc-html is &lt;4.5.5_06-22.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148949" version="1" comment="xen-tools is &lt;4.5.5_06-22.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148950" version="1" comment="xen-tools-domU is &lt;4.5.5_06-22.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149425" version="1" comment="dracut-fips is &lt;037-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146959" version="1" comment="squid is &lt;3.3.14-22.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135891" version="1" comment="qemu-ppc is &lt;2.6.2-31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135892" version="1" comment="qemu-s390 is &lt;2.6.2-31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136683" version="1" comment="kernel-default-man is &lt;4.4.21-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142157" version="1" comment="xen-doc-html is &lt;4.7.1_02-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142158" version="1" comment="xen-tools is &lt;4.7.1_02-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142159" version="1" comment="xen-tools-domU is &lt;4.7.1_02-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142761" version="1" comment="kernel-default-man is &lt;4.4.21-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144674" version="1" comment="xen-doc-html is &lt;4.7.1_04-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144675" version="1" comment="xen-tools is &lt;4.7.1_04-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144676" version="1" comment="xen-tools-domU is &lt;4.7.1_04-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148324" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.2j-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148951" version="1" comment="xen-doc-html is &lt;4.7.1_06-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148952" version="1" comment="xen-tools is &lt;4.7.1_06-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148953" version="1" comment="xen-tools-domU is &lt;4.7.1_06-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149033" version="1" comment="kernel-default-man is &lt;4.4.49-92.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149420" version="1" comment="qemu-ppc is &lt;2.6.2-41.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149421" version="1" comment="qemu-s390 is &lt;2.6.2-41.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146976" version="1" comment="qemu-ppc is &lt;2.6.2-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146977" version="1" comment="qemu-s390 is &lt;2.6.2-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147252" version="1" comment="kernel-default-man is &lt;4.4.38-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109992" version="1" comment="dnsmasq-utils is &lt;2.71-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117480" version="1" comment="python-keystoneclient is &lt;1.0.0-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117481" version="1" comment="python-keystoneclient-doc is &lt;1.0.0-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117482" version="1" comment="python-glanceclient is &lt;0.15.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117483" version="1" comment="python-keystoneclient is &lt;1.0.0-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117484" version="1" comment="python-keystoneclient-doc is &lt;1.0.0-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117485" version="1" comment="python-keystonemiddleware is &lt;1.2.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117486" version="1" comment="python-novaclient is &lt;2.20.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117487" version="1" comment="python-novaclient-doc is &lt;2.20.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117488" version="1" comment="python-swiftclient is &lt;2.3.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117489" version="1" comment="python-swiftclient-doc is &lt;2.3.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117490" version="1" comment="openstack-ceilometer is &lt;2014.2.4.dev18-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117491" version="1" comment="openstack-ceilometer-agent-compute is &lt;2014.2.4.dev18-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117492" version="1" comment="openstack-neutron is &lt;2014.2.4~a0~dev78-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117493" version="1" comment="openstack-neutron-dhcp-agent is &lt;2014.2.4~a0~dev78-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117494" version="1" comment="openstack-neutron-ha-tool is &lt;2014.2.4~a0~dev78-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117495" version="1" comment="openstack-neutron-l3-agent is &lt;2014.2.4~a0~dev78-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117496" version="1" comment="openstack-neutron-lbaas-agent is &lt;2014.2.4~a0~dev78-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117497" version="1" comment="openstack-neutron-linuxbridge-agent is &lt;2014.2.4~a0~dev78-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117498" version="1" comment="openstack-neutron-metadata-agent is &lt;2014.2.4~a0~dev78-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117499" version="1" comment="openstack-neutron-metering-agent is &lt;2014.2.4~a0~dev78-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117500" version="1" comment="openstack-neutron-openvswitch-agent is &lt;2014.2.4~a0~dev78-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117501" version="1" comment="openstack-neutron-vpn-agent is &lt;2014.2.4~a0~dev78-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117502" version="1" comment="openstack-nova is &lt;2014.2.4~a0~dev61-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117503" version="1" comment="openstack-nova-compute is &lt;2014.2.4~a0~dev61-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117504" version="1" comment="openstack-suse is &lt;2014.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117505" version="1" comment="openstack-suse-sudo is &lt;2014.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117506" version="1" comment="python-ceilometer is &lt;2014.2.4.dev18-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117507" version="1" comment="python-neutron is &lt;2014.2.4~a0~dev78-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117508" version="1" comment="python-nova is &lt;2014.2.4~a0~dev61-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117840" version="1" comment="openstack-neutron is &lt;2014.2.4~a0~dev103-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117841" version="1" comment="openstack-neutron-dhcp-agent is &lt;2014.2.4~a0~dev103-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117842" version="1" comment="openstack-neutron-ha-tool is &lt;2014.2.4~a0~dev103-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117843" version="1" comment="openstack-neutron-l3-agent is &lt;2014.2.4~a0~dev103-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117844" version="1" comment="openstack-neutron-lbaas-agent is &lt;2014.2.4~a0~dev103-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117845" version="1" comment="openstack-neutron-linuxbridge-agent is &lt;2014.2.4~a0~dev103-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117846" version="1" comment="openstack-neutron-metadata-agent is &lt;2014.2.4~a0~dev103-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117847" version="1" comment="openstack-neutron-metering-agent is &lt;2014.2.4~a0~dev103-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117848" version="1" comment="openstack-neutron-openvswitch-agent is &lt;2014.2.4~a0~dev103-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117849" version="1" comment="openstack-neutron-vpn-agent is &lt;2014.2.4~a0~dev103-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117873" version="1" comment="openstack-nova is &lt;2014.2.4~a0~dev80-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117874" version="1" comment="openstack-nova-compute is &lt;2014.2.4~a0~dev80-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117852" version="1" comment="python-neutron is &lt;2014.2.4~a0~dev103-10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117875" version="1" comment="python-nova is &lt;2014.2.4~a0~dev80-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117854" version="1" comment="python-python-memcached is &lt;1.54-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145847" version="1" comment="dnsmasq is &lt;2.71-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145848" version="1" comment="dnsmasq-utils is &lt;2.71-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143417" version="1" comment="kernel-default-base is &lt;3.12.49-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145392" version="1" comment="kernel-docs is &lt;3.12.49-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145393" version="1" comment="kernel-obs-build is &lt;3.12.49-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143418" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.65-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143419" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.65-3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143420" version="1" comment="LibVNCServer is &lt;0.9.1-154.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073673" version="1" comment="sles-release is ==11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072845" version="1" comment="MozillaFirefox is &lt;10.0-0.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072844" version="1" comment="MozillaFirefox-translations is &lt;10.0-0.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144250" version="1" comment="NetworkManager is &lt;0.7.1_git20090811-3.20.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144251" version="1" comment="NetworkManager-glib is &lt;0.7.1_git20090811-3.20.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143428" version="1" comment="NetworkManager-gnome is &lt;0.7.1-5.22.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054497" version="1" comment="OpenEXR is &lt;1.6.1-83.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054495" version="1" comment="OpenEXR-32bit is &lt;1.6.1-83.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054496" version="1" comment="OpenEXR-x86 is &lt;1.6.1-83.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144252" version="1" comment="PackageKit is &lt;0.3.14-2.23.126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144253" version="1" comment="PackageKit-lang is &lt;0.3.14-2.23.126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144254" version="1" comment="hal is &lt;0.5.12-23.58.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144255" version="1" comment="hal-32bit is &lt;0.5.12-23.58.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144256" version="1" comment="hal-doc is &lt;0.5.12-23.58.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144257" version="1" comment="hal-x86 is &lt;0.5.12-23.58.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144258" version="1" comment="libpackagekit-glib10 is &lt;0.3.14-2.23.126" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144259" version="1" comment="PolicyKit is &lt;0.9-14.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144260" version="1" comment="PolicyKit-32bit is &lt;0.9-14.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143438" version="1" comment="PolicyKit-doc is &lt;0.9-14.39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144261" version="1" comment="PolicyKit-x86 is &lt;0.9-14.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144262" version="1" comment="aaa_base is &lt;11-6.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144263" version="1" comment="acpid is &lt;1.0.6-91.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143442" version="1" comment="amavisd-new is &lt;2.7.0-18.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072163" version="1" comment="apache2 is &lt;2.2.12-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072158" version="1" comment="apache2-doc is &lt;2.2.12-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072159" version="1" comment="apache2-example-pages is &lt;2.2.12-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072160" version="1" comment="apache2-prefork is &lt;2.2.12-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072161" version="1" comment="apache2-utils is &lt;2.2.12-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072162" version="1" comment="apache2-worker is &lt;2.2.12-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076368" version="1" comment="apache2-mod_jk is &lt;1.2.26-1.30.110" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143445" version="1" comment="apache2-mod_perl is &lt;2.0.4-40.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068818" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111789" version="1" comment="php5 is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068819" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068820" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068821" version="1" comment="php5-calendar is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068822" version="1" comment="php5-ctype is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068823" version="1" comment="php5-curl is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068824" version="1" comment="php5-dba is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068825" version="1" comment="php5-dbase is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068826" version="1" comment="php5-dom is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068827" version="1" comment="php5-exif is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068828" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068829" version="1" comment="php5-ftp is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068830" version="1" comment="php5-gd is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068831" version="1" comment="php5-gettext is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068832" version="1" comment="php5-gmp is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068833" version="1" comment="php5-hash is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068834" version="1" comment="php5-iconv is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068835" version="1" comment="php5-json is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068836" version="1" comment="php5-ldap is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068837" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068838" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068839" version="1" comment="php5-mysql is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068840" version="1" comment="php5-odbc is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068841" version="1" comment="php5-openssl is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068842" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068843" version="1" comment="php5-pdo is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068844" version="1" comment="php5-pear is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068845" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068846" version="1" comment="php5-pspell is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068847" version="1" comment="php5-shmop is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068848" version="1" comment="php5-snmp is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068849" version="1" comment="php5-soap is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068850" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068851" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068852" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068853" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068854" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068855" version="1" comment="php5-wddx is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068856" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068857" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068858" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068859" version="1" comment="php5-xsl is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068860" version="1" comment="php5-zip is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068861" version="1" comment="php5-zlib is &lt;5.2.14-0.7.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144264" version="1" comment="apache2-mod_php53 is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144265" version="1" comment="php53 is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144266" version="1" comment="php53-bcmath is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144267" version="1" comment="php53-bz2 is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144268" version="1" comment="php53-calendar is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144269" version="1" comment="php53-ctype is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144270" version="1" comment="php53-curl is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144271" version="1" comment="php53-dba is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144272" version="1" comment="php53-dom is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144273" version="1" comment="php53-exif is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144274" version="1" comment="php53-fastcgi is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144275" version="1" comment="php53-fileinfo is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144276" version="1" comment="php53-ftp is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144277" version="1" comment="php53-gd is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144278" version="1" comment="php53-gettext is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144279" version="1" comment="php53-gmp is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144280" version="1" comment="php53-iconv is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144281" version="1" comment="php53-intl is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144282" version="1" comment="php53-json is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144283" version="1" comment="php53-ldap is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144284" version="1" comment="php53-mbstring is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144285" version="1" comment="php53-mcrypt is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144286" version="1" comment="php53-mysql is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144287" version="1" comment="php53-odbc is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144288" version="1" comment="php53-openssl is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144289" version="1" comment="php53-pcntl is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144290" version="1" comment="php53-pdo is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144291" version="1" comment="php53-pear is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144292" version="1" comment="php53-pgsql is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144293" version="1" comment="php53-pspell is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144294" version="1" comment="php53-shmop is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144295" version="1" comment="php53-snmp is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144296" version="1" comment="php53-soap is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144297" version="1" comment="php53-suhosin is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144298" version="1" comment="php53-sysvmsg is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144299" version="1" comment="php53-sysvsem is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144300" version="1" comment="php53-sysvshm is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144301" version="1" comment="php53-tokenizer is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144302" version="1" comment="php53-wddx is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144303" version="1" comment="php53-xmlreader is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144304" version="1" comment="php53-xmlrpc is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144305" version="1" comment="php53-xmlwriter is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144306" version="1" comment="php53-xsl is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144307" version="1" comment="php53-zip is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144308" version="1" comment="php53-zlib is &lt;5.3.8-0.19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144309" version="1" comment="avahi is &lt;0.6.23-11.19.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144310" version="1" comment="avahi-lang is &lt;0.6.23-11.19.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144311" version="1" comment="avahi-utils is &lt;0.6.23-11.19.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144312" version="1" comment="libavahi-client3 is &lt;0.6.23-11.19.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144313" version="1" comment="libavahi-client3-32bit is &lt;0.6.23-11.19.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144314" version="1" comment="libavahi-client3-x86 is &lt;0.6.23-11.19.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144315" version="1" comment="libavahi-common3 is &lt;0.6.23-11.19.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144316" version="1" comment="libavahi-common3-32bit is &lt;0.6.23-11.19.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144317" version="1" comment="libavahi-common3-x86 is &lt;0.6.23-11.19.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144318" version="1" comment="libavahi-core5 is &lt;0.6.23-11.19.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144319" version="1" comment="libdns_sd is &lt;0.6.23-11.19.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144320" version="1" comment="libdns_sd-32bit is &lt;0.6.23-11.19.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144321" version="1" comment="libdns_sd-x86 is &lt;0.6.23-11.19.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144322" version="1" comment="bind is &lt;9.6ESVR5P1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144323" version="1" comment="bind-chrootenv is &lt;9.6ESVR5P1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144324" version="1" comment="bind-doc is &lt;9.6ESVR5P1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144325" version="1" comment="bind-libs is &lt;9.6ESVR5P1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144326" version="1" comment="bind-libs-32bit is &lt;9.6ESVR5P1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144327" version="1" comment="bind-libs-x86 is &lt;9.6ESVR5P1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144328" version="1" comment="bind-utils is &lt;9.6ESVR5P1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144329" version="1" comment="boost-license is &lt;1.36.0-11.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144330" version="1" comment="libboost_program_options1_36_0 is &lt;1.36.0-11.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144331" version="1" comment="libboost_regex1_36_0 is &lt;1.36.0-11.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144332" version="1" comment="libboost_signals1_36_0 is &lt;1.36.0-11.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111700" version="1" comment="bzip2 is &lt;1.0.5-34.253.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111701" version="1" comment="bzip2-doc is &lt;1.0.5-34.253.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111702" version="1" comment="libbz2-1 is &lt;1.0.5-34.253.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111748" version="1" comment="libbz2-1-32bit is &lt;1.0.5-34.253.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111773" version="1" comment="libbz2-1-x86 is &lt;1.0.5-34.253.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144333" version="1" comment="cifs-utils is &lt;5.1-0.4.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071561" version="1" comment="clamav is &lt;0.97.3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143519" version="1" comment="coolkey is &lt;1.1.0-22.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144334" version="1" comment="cron is &lt;4.1-194.199.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070960" version="1" comment="cups is &lt;1.3.9-8.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070956" version="1" comment="cups-client is &lt;1.3.9-8.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070959" version="1" comment="cups-libs is &lt;1.3.9-8.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070957" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070958" version="1" comment="cups-libs-x86 is &lt;1.3.9-8.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072828" version="1" comment="curl is &lt;7.19.7-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072831" version="1" comment="libcurl4 is &lt;7.19.7-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072829" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072830" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071558" version="1" comment="cyrus-imapd is &lt;2.3.11-60.65.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071559" version="1" comment="perl-Cyrus-IMAP is &lt;2.3.11-60.65.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071560" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.3.11-60.65.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144335" version="1" comment="dbus-1 is &lt;1.2.10-3.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144336" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144337" version="1" comment="dbus-1-x11 is &lt;1.2.10-3.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144338" version="1" comment="dbus-1-x86 is &lt;1.2.10-3.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143534" version="1" comment="dbus-1-glib is &lt;0.76-34.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143535" version="1" comment="dbus-1-glib-32bit is &lt;0.76-34.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143536" version="1" comment="dbus-1-glib-x86 is &lt;0.76-34.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144339" version="1" comment="dhcp is &lt;4.2.3.P2-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144340" version="1" comment="dhcp-client is &lt;4.2.3.P2-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144341" version="1" comment="dhcp-relay is &lt;4.2.3.P2-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144342" version="1" comment="dhcp-server is &lt;4.2.3.P2-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144343" version="1" comment="dhcpcd is &lt;3.2.3-44.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067078" version="1" comment="dhcpv6 is &lt;1.0.22-3.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144344" version="1" comment="e2fsprogs is &lt;1.41.9-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144345" version="1" comment="libcom_err2 is &lt;1.41.9-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144346" version="1" comment="libcom_err2-32bit is &lt;1.41.9-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144347" version="1" comment="libcom_err2-x86 is &lt;1.41.9-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144348" version="1" comment="libext2fs2 is &lt;1.41.9-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069763" version="1" comment="ecryptfs-utils is &lt;61-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069761" version="1" comment="ecryptfs-utils-32bit is &lt;61-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069762" version="1" comment="ecryptfs-utils-x86 is &lt;61-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065506" version="1" comment="ed is &lt;0.2-1001.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143546" version="1" comment="emacs is &lt;22.3-4.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143547" version="1" comment="emacs-el is &lt;22.3-4.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143548" version="1" comment="emacs-info is &lt;22.3-4.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143549" version="1" comment="emacs-nox is &lt;22.3-4.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143550" version="1" comment="emacs-x11 is &lt;22.3-4.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143551" version="1" comment="enscript is &lt;1.6.4-152.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111794" version="1" comment="evince is &lt;2.28.2-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111795" version="1" comment="evince-doc is &lt;2.28.2-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111796" version="1" comment="evince-lang is &lt;2.28.2-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144349" version="1" comment="evolution-data-server is &lt;2.28.2-0.26.33.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144350" version="1" comment="evolution-data-server-32bit is &lt;2.28.2-0.26.33.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144351" version="1" comment="evolution-data-server-lang is &lt;2.28.2-0.26.33.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144352" version="1" comment="evolution-data-server-x86 is &lt;2.28.2-0.26.33.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057200" version="1" comment="expat is &lt;2.0.1-88.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057203" version="1" comment="libexpat1 is &lt;2.0.1-88.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057201" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057202" version="1" comment="libexpat1-x86 is &lt;2.0.1-88.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070961" version="1" comment="fetchmail is &lt;6.3.8.90-13.20.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070962" version="1" comment="fetchmailconf is &lt;6.3.8.90-13.20.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144353" version="1" comment="file is &lt;4.24-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144354" version="1" comment="file-32bit is &lt;4.24-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144355" version="1" comment="file-x86 is &lt;4.24-43.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143555" version="1" comment="findutils is &lt;4.4.0-38.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143556" version="1" comment="findutils-locate is &lt;4.4.0-38.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069764" version="1" comment="foomatic-filters is &lt;3.0.2-269.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144356" version="1" comment="freeradius-server is &lt;2.1.1-7.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144357" version="1" comment="freeradius-server-dialupadmin is &lt;2.1.1-7.7.19.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144358" version="1" comment="freeradius-server-doc is &lt;2.1.1-7.7.19.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144359" version="1" comment="freeradius-server-libs is &lt;2.1.1-7.7.19.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144360" version="1" comment="freeradius-server-utils is &lt;2.1.1-7.7.19.77" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072124" version="1" comment="freetype2 is &lt;2.3.7-25.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072122" version="1" comment="freetype2-32bit is &lt;2.3.7-25.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072123" version="1" comment="freetype2-x86 is &lt;2.3.7-25.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144361" version="1" comment="ft2demos is &lt;2.3.7-25.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066589" version="1" comment="fuse is &lt;2.7.2-61.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066591" version="1" comment="libfuse2 is &lt;2.7.2-61.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143559" version="1" comment="fvwm2 is &lt;2.5.26-1.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143560" version="1" comment="g3utils is &lt;1.1.36-26.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143561" version="1" comment="mgetty is &lt;1.1.36-26.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143562" version="1" comment="gd is &lt;2.0.36.RC1-52.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061853" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061854" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061855" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061856" version="1" comment="ghostscript-library is &lt;8.62-32.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061857" version="1" comment="ghostscript-omni is &lt;8.62-32.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061858" version="1" comment="ghostscript-x11 is &lt;8.62-32.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061859" version="1" comment="libgimpprint is &lt;4.2.7-32.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144362" version="1" comment="glib2 is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144363" version="1" comment="glib2-doc is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144364" version="1" comment="glib2-lang is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144365" version="1" comment="libgio-2_0-0 is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144366" version="1" comment="libgio-2_0-0-32bit is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144367" version="1" comment="libgio-2_0-0-x86 is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144368" version="1" comment="libglib-2_0-0 is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144369" version="1" comment="libglib-2_0-0-32bit is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144370" version="1" comment="libglib-2_0-0-x86 is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144371" version="1" comment="libgmodule-2_0-0 is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144372" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144373" version="1" comment="libgmodule-2_0-0-x86 is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144374" version="1" comment="libgobject-2_0-0 is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144375" version="1" comment="libgobject-2_0-0-32bit is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144376" version="1" comment="libgobject-2_0-0-x86 is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144377" version="1" comment="libgthread-2_0-0 is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144378" version="1" comment="libgthread-2_0-0-32bit is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144379" version="1" comment="libgthread-2_0-0-x86 is &lt;2.22.5-0.2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144380" version="1" comment="glibc is &lt;2.11.3-17.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144381" version="1" comment="glibc-32bit is &lt;2.11.3-17.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144382" version="1" comment="glibc-devel is &lt;2.11.3-17.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144383" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144384" version="1" comment="glibc-html is &lt;2.11.3-17.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144385" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144386" version="1" comment="glibc-info is &lt;2.11.3-17.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144387" version="1" comment="glibc-locale is &lt;2.11.3-17.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144388" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144389" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144390" version="1" comment="glibc-profile is &lt;2.11.3-17.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144391" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144392" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144393" version="1" comment="glibc-x86 is &lt;2.11.3-17.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144394" version="1" comment="nscd is &lt;2.11.3-17.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143596" version="1" comment="gmime is &lt;2.2.23-1.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143597" version="1" comment="gmime-2_4 is &lt;2.4.8-1.2.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143598" version="1" comment="gmime-doc is &lt;2.2.23-1.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143599" version="1" comment="libgmime-2_0-3 is &lt;2.2.23-1.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143600" version="1" comment="libgmime-2_4-2 is &lt;2.4.8-1.2.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144395" version="1" comment="gnome-screensaver is &lt;2.28.3-0.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144396" version="1" comment="gnome-screensaver-lang is &lt;2.28.3-0.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072750" version="1" comment="gnutls is &lt;2.4.1-24.39.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072753" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072751" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072752" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.39.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144397" version="1" comment="gpg2 is &lt;2.0.9-25.33.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144398" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143605" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.35-5.15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143606" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.35-5.15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143607" version="1" comment="gstreamer-0_10-plugins-base-doc is &lt;0.10.35-5.15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143608" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.35-5.15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143609" version="1" comment="gstreamer-0_10-plugins-base-x86 is &lt;0.10.35-5.15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143610" version="1" comment="libgstapp-0_10-0 is &lt;0.10.35-5.15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143611" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.35-5.15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143612" version="1" comment="libgstapp-0_10-0-x86 is &lt;0.10.35-5.15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143613" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.35-5.15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143614" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.35-5.15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143615" version="1" comment="libgstinterfaces-0_10-0-x86 is &lt;0.10.35-5.15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143616" version="1" comment="gstreamer-0_10-plugins-good is &lt;0.10.30-5.8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143617" version="1" comment="gstreamer-0_10-plugins-good-doc is &lt;0.10.30-5.8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143618" version="1" comment="gstreamer-0_10-plugins-good-lang is &lt;0.10.30-5.8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144399" version="1" comment="gtk2 is &lt;2.18.9-0.21.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144400" version="1" comment="gtk2-32bit is &lt;2.18.9-0.21.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144401" version="1" comment="gtk2-doc is &lt;2.18.9-0.21.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144402" version="1" comment="gtk2-lang is &lt;2.18.9-0.21.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144403" version="1" comment="gtk2-x86 is &lt;2.18.9-0.21.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143623" version="1" comment="gvim is &lt;7.2-8.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143624" version="1" comment="vim is &lt;7.2-8.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143625" version="1" comment="vim-base is &lt;7.2-8.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143626" version="1" comment="vim-data is &lt;7.2-8.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057426" version="1" comment="gzip is &lt;1.3.12-69.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071605" version="1" comment="hplip is &lt;3.11.10-0.6.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071604" version="1" comment="hplip-hpijs is &lt;3.11.10-0.6.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143631" version="1" comment="ipsec-tools is &lt;0.7.3-1.1.93" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070093" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070091" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr13.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070092" version="1" comment="java-1_4_2-ibm-plugin is &lt;1.4.2_sr13.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144404" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr9.3-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144405" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr9.3-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144406" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr9.3-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144407" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr9.3-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144408" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr9.3-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143632" version="1" comment="kbd is &lt;1.14.1-16.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144409" version="1" comment="kde4-kgreeter-plugins is &lt;4.3.5-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143634" version="1" comment="kdebase4-wallpapers is &lt;4.3.5-0.8.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144410" version="1" comment="kdebase4-workspace is &lt;4.3.5-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144411" version="1" comment="kdebase4-workspace-ksysguardd is &lt;4.3.5-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144412" version="1" comment="kdm is &lt;4.3.5-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144413" version="1" comment="kwin is &lt;4.3.5-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143639" version="1" comment="kdebase3-runtime is &lt;3.5.10-20.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143640" version="1" comment="kdebase3-runtime-32bit is &lt;3.5.10-20.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143641" version="1" comment="kdebase3-runtime-x86 is &lt;3.5.10-20.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056569" version="1" comment="kdelibs3 is &lt;3.5.10-23.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056564" version="1" comment="kdelibs3-32bit is &lt;3.5.10-23.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056567" version="1" comment="kdelibs3-default-style is &lt;3.5.10-23.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056565" version="1" comment="kdelibs3-default-style-32bit is &lt;3.5.10-23.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056566" version="1" comment="kdelibs3-default-style-x86 is &lt;3.5.10-23.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056568" version="1" comment="kdelibs3-x86 is &lt;3.5.10-23.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068608" version="1" comment="kdelibs4 is &lt;4.3.5-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068606" version="1" comment="kdelibs4-core is &lt;4.3.5-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068607" version="1" comment="kdelibs4-doc is &lt;4.3.5-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068611" version="1" comment="libkde4 is &lt;4.3.5-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068609" version="1" comment="libkde4-32bit is &lt;4.3.5-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068610" version="1" comment="libkde4-x86 is &lt;4.3.5-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068614" version="1" comment="libkdecore4 is &lt;4.3.5-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068612" version="1" comment="libkdecore4-32bit is &lt;4.3.5-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068613" version="1" comment="libkdecore4-x86 is &lt;4.3.5-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065196" version="1" comment="kdenetwork4-filesharing is &lt;4.3.5-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065197" version="1" comment="kget is &lt;4.3.5-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065198" version="1" comment="kopete is &lt;4.3.5-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065199" version="1" comment="krdc is &lt;4.3.5-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065200" version="1" comment="krfb is &lt;4.3.5-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144414" version="1" comment="kernel-default is &lt;3.0.13-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144415" version="1" comment="kernel-default-base is &lt;3.0.13-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144416" version="1" comment="kernel-default-devel is &lt;3.0.13-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144417" version="1" comment="kernel-default-man is &lt;3.0.13-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144418" version="1" comment="kernel-pae is &lt;3.0.13-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144419" version="1" comment="kernel-pae-base is &lt;3.0.13-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144420" version="1" comment="kernel-pae-devel is &lt;3.0.13-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144421" version="1" comment="kernel-ppc64 is &lt;3.0.13-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144422" version="1" comment="kernel-ppc64-base is &lt;3.0.13-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144423" version="1" comment="kernel-ppc64-devel is &lt;3.0.13-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144424" version="1" comment="kernel-source is &lt;3.0.13-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144425" version="1" comment="kernel-syms is &lt;3.0.13-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144426" version="1" comment="kernel-trace is &lt;3.0.13-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144427" version="1" comment="kernel-trace-base is &lt;3.0.13-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144428" version="1" comment="kernel-trace-devel is &lt;3.0.13-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144429" version="1" comment="kernel-xen is &lt;3.0.13-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144430" version="1" comment="kernel-xen-base is &lt;3.0.13-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144431" version="1" comment="kernel-xen-devel is &lt;3.0.13-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072351" version="1" comment="krb5 is &lt;1.6.3-133.48.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072345" version="1" comment="krb5-32bit is &lt;1.6.3-133.48.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072346" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.48.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072347" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.48.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072348" version="1" comment="krb5-client is &lt;1.6.3-133.48.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072349" version="1" comment="krb5-server is &lt;1.6.3-133.48.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072350" version="1" comment="krb5-x86 is &lt;1.6.3-133.48.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144432" version="1" comment="krb5-doc is &lt;1.6.3-133.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144433" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144434" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144435" version="1" comment="kvm is &lt;0.15.1-0.17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143670" version="1" comment="lcms is &lt;1.17-77.14.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143671" version="1" comment="liblcms1 is &lt;1.17-77.14.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143672" version="1" comment="liblcms1-32bit is &lt;1.17-77.14.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143673" version="1" comment="liblcms1-x86 is &lt;1.17-77.14.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144436" version="1" comment="ldapsmb is &lt;1.34b-12.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144437" version="1" comment="libldb1 is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144438" version="1" comment="libsmbclient0 is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144439" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144440" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144441" version="1" comment="libtalloc2 is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144442" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144443" version="1" comment="libtalloc2-x86 is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144444" version="1" comment="libtdb1 is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144445" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144446" version="1" comment="libtdb1-x86 is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144447" version="1" comment="libtevent0 is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144448" version="1" comment="libwbclient0 is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144449" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144450" version="1" comment="libwbclient0-x86 is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144451" version="1" comment="samba is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144452" version="1" comment="samba-32bit is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144453" version="1" comment="samba-client is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144454" version="1" comment="samba-client-32bit is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144455" version="1" comment="samba-client-x86 is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144456" version="1" comment="samba-krb-printing is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144457" version="1" comment="samba-winbind is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144458" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144459" version="1" comment="samba-winbind-x86 is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144460" version="1" comment="samba-x86 is &lt;3.6.3-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144461" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144462" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072598" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072596" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072597" version="1" comment="libQtWebKit4-x86 is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072611" version="1" comment="libqt4 is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072599" version="1" comment="libqt4-32bit is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072602" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072600" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072601" version="1" comment="libqt4-qt3support-x86 is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072606" version="1" comment="libqt4-sql is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072603" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072604" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072605" version="1" comment="libqt4-sql-x86 is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072609" version="1" comment="libqt4-x11 is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072607" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072608" version="1" comment="libqt4-x11-x86 is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072610" version="1" comment="libqt4-x86 is &lt;4.6.3-5.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143717" version="1" comment="libadns1 is &lt;1.4-73.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069401" version="1" comment="libapr-util1 is &lt;1.3.4-12.22.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069399" version="1" comment="libapr-util1-32bit is &lt;1.3.4-12.22.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069403" version="1" comment="libapr1 is &lt;1.3.3-11.18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069402" version="1" comment="libapr1-32bit is &lt;1.3.3-11.18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143718" version="1" comment="libarchive2 is &lt;2.5.5-5.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111803" version="1" comment="libcap-progs is &lt;2.11-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111804" version="1" comment="libcap2 is &lt;2.11-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111826" version="1" comment="libcap2-32bit is &lt;2.11-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111818" version="1" comment="libcap2-x86 is &lt;2.11-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067003" version="1" comment="libcgroup1 is &lt;0.34-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144463" version="1" comment="libdrm is &lt;2.4.27-0.6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144464" version="1" comment="libdrm-32bit is &lt;2.4.27-0.6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144465" version="1" comment="libdrm-x86 is &lt;2.4.27-0.6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144466" version="1" comment="libexif is &lt;0.6.17-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144467" version="1" comment="libexif-32bit is &lt;0.6.17-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144468" version="1" comment="libexif-x86 is &lt;0.6.17-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143723" version="1" comment="libexiv2-4 is &lt;0.17.1-31.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072304" version="1" comment="libfreebl3 is &lt;3.13.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072303" version="1" comment="libfreebl3-32bit is &lt;3.13.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107302" version="1" comment="libfreebl3-x86 is &lt;3.13.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072314" version="1" comment="mozilla-nss is &lt;3.13.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072307" version="1" comment="mozilla-nss-32bit is &lt;3.13.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072313" version="1" comment="mozilla-nss-tools is &lt;3.13.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107303" version="1" comment="mozilla-nss-x86 is &lt;3.13.1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143734" version="1" comment="libgdiplus0 is &lt;2.6.7-0.5.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069283" version="1" comment="libgnomesu is &lt;1.0.0-307.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069281" version="1" comment="libgnomesu-lang is &lt;1.0.0-307.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069282" version="1" comment="libgnomesu0 is &lt;1.0.0-307.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144469" version="1" comment="libgtop is &lt;2.28.0-1.2.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144470" version="1" comment="libgtop-2_0-7 is &lt;2.28.0-1.2.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144471" version="1" comment="libgtop-doc is &lt;2.28.0-1.2.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144472" version="1" comment="libgtop-lang is &lt;2.28.0-1.2.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072647" version="1" comment="libicu is &lt;4.0-7.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072645" version="1" comment="libicu-32bit is &lt;4.0-7.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072646" version="1" comment="libicu-doc is &lt;4.0-7.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144473" version="1" comment="libicu-x86 is &lt;4.0-7.24.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057091" version="1" comment="libltdl7 is &lt;2.2.6-2.131.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057089" version="1" comment="libltdl7-32bit is &lt;2.2.6-2.131.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057090" version="1" comment="libltdl7-x86 is &lt;2.2.6-2.131.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057094" version="1" comment="libtool is &lt;2.2.6-2.131.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057092" version="1" comment="libtool-32bit is &lt;2.2.6-2.131.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057093" version="1" comment="libtool-x86 is &lt;2.2.6-2.131.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143739" version="1" comment="libmusicbrainz4 is &lt;2.1.5-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144474" version="1" comment="libmysqlclient15 is &lt;5.0.94-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144475" version="1" comment="libmysqlclient15-32bit is &lt;5.0.94-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144476" version="1" comment="libmysqlclient15-x86 is &lt;5.0.94-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144477" version="1" comment="libmysqlclient_r15 is &lt;5.0.94-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144478" version="1" comment="mysql is &lt;5.0.94-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144479" version="1" comment="mysql-Max is &lt;5.0.94-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144480" version="1" comment="mysql-client is &lt;5.0.94-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144481" version="1" comment="mysql-tools is &lt;5.0.94-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143743" version="1" comment="libneon27 is &lt;0.29.6-6.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143744" version="1" comment="libneon27-32bit is &lt;0.29.6-6.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143745" version="1" comment="libneon27-x86 is &lt;0.29.6-6.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058587" version="1" comment="libnetpbm10 is &lt;10.26.44-101.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058585" version="1" comment="libnetpbm10-32bit is &lt;10.26.44-101.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058586" version="1" comment="libnetpbm10-x86 is &lt;10.26.44-101.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058588" version="1" comment="netpbm is &lt;10.26.44-101.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144482" version="1" comment="libnewt0_52 is &lt;0.52.10-1.35.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144483" version="1" comment="newt is &lt;0.52.10-1.35.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144484" version="1" comment="python-newt is &lt;0.52.10-1.35.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065553" version="1" comment="libopensc2 is &lt;0.11.6-5.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065551" version="1" comment="libopensc2-32bit is &lt;0.11.6-5.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065552" version="1" comment="libopensc2-x86 is &lt;0.11.6-5.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065556" version="1" comment="opensc is &lt;0.11.6-5.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065554" version="1" comment="opensc-32bit is &lt;0.11.6-5.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065555" version="1" comment="opensc-x86 is &lt;0.11.6-5.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072492" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072490" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072491" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072494" version="1" comment="openssl is &lt;0.9.8j-0.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072493" version="1" comment="openssl-doc is &lt;0.9.8j-0.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069807" version="1" comment="libpng12-0 is &lt;1.2.31-5.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069805" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069806" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064463" version="1" comment="libpoppler-glib4 is &lt;0.12.3-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064464" version="1" comment="libpoppler-qt4-3 is &lt;0.12.3-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064465" version="1" comment="libpoppler5 is &lt;0.12.3-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064466" version="1" comment="poppler-tools is &lt;0.12.3-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143749" version="1" comment="libpulse-browse0 is &lt;0.9.23-0.7.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143750" version="1" comment="libpulse-mainloop-glib0 is &lt;0.9.23-0.7.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143751" version="1" comment="libpulse0 is &lt;0.9.23-0.7.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143752" version="1" comment="libpulse0-32bit is &lt;0.9.23-0.7.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143753" version="1" comment="libpulse0-x86 is &lt;0.9.23-0.7.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143754" version="1" comment="pulseaudio is &lt;0.9.23-0.7.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143755" version="1" comment="pulseaudio-esound-compat is &lt;0.9.23-0.7.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143756" version="1" comment="pulseaudio-gdm-hooks is &lt;0.9.23-0.7.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143757" version="1" comment="pulseaudio-lang is &lt;0.9.23-0.7.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143758" version="1" comment="pulseaudio-module-x11 is &lt;0.9.23-0.7.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143759" version="1" comment="pulseaudio-module-zeroconf is &lt;0.9.23-0.7.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143760" version="1" comment="pulseaudio-utils is &lt;0.9.23-0.7.128" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068531" version="1" comment="libpython2_6-1_0 is &lt;2.6.0-8.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068529" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.0-8.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068530" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.0-8.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068535" version="1" comment="python-base is &lt;2.6.0-8.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068533" version="1" comment="python-base-32bit is &lt;2.6.0-8.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068534" version="1" comment="python-base-x86 is &lt;2.6.0-8.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068542" version="1" comment="python-xml is &lt;2.6.0-8.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070883" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070892" version="1" comment="qt4-x11-tools is &lt;4.6.3-5.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143768" version="1" comment="librpcsecgss is &lt;0.18-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143769" version="1" comment="libtirpc1 is &lt;0.2.1-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070704" version="1" comment="librsvg is &lt;2.26.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070702" version="1" comment="librsvg-32bit is &lt;2.26.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070703" version="1" comment="librsvg-x86 is &lt;2.26.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070705" version="1" comment="rsvg-view is &lt;2.26.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143770" version="1" comment="libsamplerate is &lt;0.1.4-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143771" version="1" comment="libsamplerate-32bit is &lt;0.1.4-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143772" version="1" comment="libsamplerate-x86 is &lt;0.1.4-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069633" version="1" comment="libsndfile is &lt;1.0.20-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069631" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069632" version="1" comment="libsndfile-x86 is &lt;1.0.20-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144485" version="1" comment="libsnmp15 is &lt;5.4.2.1-8.12.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144486" version="1" comment="libsnmp15-32bit is &lt;5.4.2.1-8.12.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144487" version="1" comment="libsnmp15-x86 is &lt;5.4.2.1-8.12.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144488" version="1" comment="net-snmp is &lt;5.4.2.1-8.12.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144489" version="1" comment="perl-SNMP is &lt;5.4.2.1-8.12.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144490" version="1" comment="snmp-mibs is &lt;5.4.2.1-8.12.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144491" version="1" comment="libsoup-2_4-1 is &lt;2.32.2-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144492" version="1" comment="libsoup-2_4-1-32bit is &lt;2.32.2-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144493" version="1" comment="libsoup-2_4-1-x86 is &lt;2.32.2-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067884" version="1" comment="libtiff3 is &lt;3.8.2-141.142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067882" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067883" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067885" version="1" comment="tiff is &lt;3.8.2-141.142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144494" version="1" comment="libvirt is &lt;0.9.6-0.13.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144495" version="1" comment="libvirt-client is &lt;0.9.6-0.13.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144496" version="1" comment="libvirt-client-32bit is &lt;0.9.6-0.13.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144497" version="1" comment="libvirt-doc is &lt;0.9.6-0.13.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144498" version="1" comment="libvirt-python is &lt;0.9.6-0.13.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061093" version="1" comment="libvorbis is &lt;1.2.0-79.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061090" version="1" comment="libvorbis-32bit is &lt;1.2.0-79.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061091" version="1" comment="libvorbis-doc is &lt;1.2.0-79.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061092" version="1" comment="libvorbis-x86 is &lt;1.2.0-79.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070132" version="1" comment="libxcrypt is &lt;3.0.3-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070130" version="1" comment="libxcrypt-32bit is &lt;3.0.3-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070131" version="1" comment="libxcrypt-x86 is &lt;3.0.3-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143797" version="1" comment="pam-modules is &lt;11-1.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143798" version="1" comment="pam-modules-32bit is &lt;11-1.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143799" version="1" comment="pam-modules-x86 is &lt;11-1.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143800" version="1" comment="pwdutils is &lt;3.2.15-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143801" version="1" comment="pwdutils-plugin-audit is &lt;3.2.15-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072708" version="1" comment="libxml2 is &lt;2.7.6-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072705" version="1" comment="libxml2-32bit is &lt;2.7.6-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072706" version="1" comment="libxml2-doc is &lt;2.7.6-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072707" version="1" comment="libxml2-x86 is &lt;2.7.6-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144499" version="1" comment="libxslt is &lt;1.1.24-19.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144500" version="1" comment="libxslt-32bit is &lt;1.1.24-19.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144501" version="1" comment="libxslt-x86 is &lt;1.1.24-19.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068337" version="1" comment="libzip1 is &lt;0.9-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143802" version="1" comment="log4net is &lt;1.2.10-1.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068574" version="1" comment="logrotate is &lt;3.7.7-10.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143803" version="1" comment="logwatch is &lt;7.3.6-65.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144502" version="1" comment="lvm2 is &lt;2.02.84-3.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067854" version="1" comment="mailman is &lt;2.1.14-9.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143806" version="1" comment="man is &lt;2.5.2-17.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143807" version="1" comment="mipv6d is &lt;2.0.2.umip.0.4-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143808" version="1" comment="mono-core is &lt;2.6.7-0.7.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143809" version="1" comment="mono-data is &lt;2.6.7-0.7.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143810" version="1" comment="mono-data-postgresql is &lt;2.6.7-0.7.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143811" version="1" comment="mono-data-sqlite is &lt;2.6.7-0.7.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143812" version="1" comment="mono-locale-extras is &lt;2.6.7-0.7.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143813" version="1" comment="mono-nunit is &lt;2.6.7-0.7.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143814" version="1" comment="mono-web is &lt;2.6.7-0.7.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143815" version="1" comment="mono-winforms is &lt;2.6.7-0.7.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107301" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.24-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107304" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.24-0.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107299" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.24-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107300" version="1" comment="mozilla-xulrunner192-translations is &lt;1.9.2.24-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107305" version="1" comment="mozilla-xulrunner192-x86 is &lt;1.9.2.24-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111745" version="1" comment="mutt is &lt;1.5.17-42.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144503" version="1" comment="nagios is &lt;3.0.6-1.25.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144504" version="1" comment="nagios-www is &lt;3.0.6-1.25.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144505" version="1" comment="nagios-plugins is &lt;1.4.13-1.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144506" version="1" comment="nagios-plugins-extras is &lt;1.4.13-1.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144507" version="1" comment="ntp is &lt;4.2.4p8-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144508" version="1" comment="ntp-doc is &lt;4.2.4p8-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144509" version="1" comment="ofed is &lt;1.5.2-0.22.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144510" version="1" comment="ofed-doc is &lt;1.5.2-0.22.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144511" version="1" comment="ofed-kmp-default is &lt;1.5.2_3.0.13_0.27-0.22.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144512" version="1" comment="ofed-kmp-pae is &lt;1.5.2_3.0.13_0.27-0.22.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144513" version="1" comment="ofed-kmp-ppc64 is &lt;1.5.2_3.0.13_0.27-0.22.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144514" version="1" comment="ofed-kmp-trace is &lt;1.5.2_3.0.13_0.27-0.22.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143829" version="1" comment="openslp is &lt;1.2.0-172.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143830" version="1" comment="openslp-32bit is &lt;1.2.0-172.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143831" version="1" comment="openslp-server is &lt;1.2.0-172.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143832" version="1" comment="openslp-x86 is &lt;1.2.0-172.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144515" version="1" comment="openssh is &lt;5.1p1-41.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144516" version="1" comment="openssh-askpass is &lt;5.1p1-41.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072165" version="1" comment="openswan is &lt;2.6.16-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072164" version="1" comment="openswan-doc is &lt;2.6.16-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144517" version="1" comment="openvpn is &lt;2.0.9-143.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144518" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069566" version="1" comment="opie is &lt;2.4-662.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069564" version="1" comment="opie-32bit is &lt;2.4-662.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069565" version="1" comment="opie-x86 is &lt;2.4-662.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143837" version="1" comment="pam is &lt;1.1.5-0.10.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143838" version="1" comment="pam-32bit is &lt;1.1.5-0.10.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143839" version="1" comment="pam-doc is &lt;1.1.5-0.10.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143840" version="1" comment="pam-x86 is &lt;1.1.5-0.10.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144519" version="1" comment="pam_krb5 is &lt;2.3.1-47.10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144520" version="1" comment="pam_krb5-32bit is &lt;2.3.1-47.10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144521" version="1" comment="pam_krb5-x86 is &lt;2.3.1-47.10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143844" version="1" comment="pam_ldap is &lt;184-147.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143845" version="1" comment="pam_ldap-32bit is &lt;184-147.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143846" version="1" comment="pam_ldap-x86 is &lt;184-147.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144522" version="1" comment="pam_mount is &lt;0.47-13.13.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144523" version="1" comment="pam_mount-32bit is &lt;0.47-13.13.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144524" version="1" comment="pam_mount-x86 is &lt;0.47-13.13.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066424" version="1" comment="pango is &lt;1.26.2-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066421" version="1" comment="pango-32bit is &lt;1.26.2-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066422" version="1" comment="pango-doc is &lt;1.26.2-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066423" version="1" comment="pango-x86 is &lt;1.26.2-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065684" version="1" comment="pcsc-ccid is &lt;1.3.8-3.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065687" version="1" comment="pcsc-lite is &lt;1.4.102-1.37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065685" version="1" comment="pcsc-lite-32bit is &lt;1.4.102-1.37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065686" version="1" comment="pcsc-lite-x86 is &lt;1.4.102-1.37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068387" version="1" comment="perl is &lt;5.10.0-64.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068383" version="1" comment="perl-32bit is &lt;5.10.0-64.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068384" version="1" comment="perl-base is &lt;5.10.0-64.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068385" version="1" comment="perl-doc is &lt;5.10.0-64.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068386" version="1" comment="perl-x86 is &lt;5.10.0-64.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056793" version="1" comment="perl-HTML-Parser is &lt;3.56-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143857" version="1" comment="perl-Tk is &lt;804.028-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143858" version="1" comment="perl-libwww-perl is &lt;5.816-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143859" version="1" comment="perl-spamassassin is &lt;3.3.1-10.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143860" version="1" comment="spamassassin is &lt;3.3.1-10.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066604" version="1" comment="postgresql is &lt;8.3.14-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066598" version="1" comment="postgresql-contrib is &lt;8.3.14-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066599" version="1" comment="postgresql-docs is &lt;8.3.14-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066602" version="1" comment="postgresql-libs is &lt;8.3.14-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066600" version="1" comment="postgresql-libs-32bit is &lt;8.3.14-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066601" version="1" comment="postgresql-libs-x86 is &lt;8.3.14-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066603" version="1" comment="postgresql-server is &lt;8.3.14-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144525" version="1" comment="puppet is &lt;2.6.12-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144526" version="1" comment="puppet-server is &lt;2.6.12-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144527" version="1" comment="pure-ftpd is &lt;1.0.22-3.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068543" version="1" comment="python is &lt;2.6.0-8.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068532" version="1" comment="python-32bit is &lt;2.6.0-8.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068536" version="1" comment="python-curses is &lt;2.6.0-8.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068537" version="1" comment="python-demo is &lt;2.6.0-8.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068538" version="1" comment="python-gdbm is &lt;2.6.0-8.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068539" version="1" comment="python-idle is &lt;2.6.0-8.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068540" version="1" comment="python-tk is &lt;2.6.0-8.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068541" version="1" comment="python-x86 is &lt;2.6.0-8.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144528" version="1" comment="python-sssd-config is &lt;1.5.11-0.9.96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144529" version="1" comment="sssd is &lt;1.5.11-0.9.96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144530" version="1" comment="sssd-32bit is &lt;1.5.11-0.9.96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144531" version="1" comment="sssd-tools is &lt;1.5.11-0.9.96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143870" version="1" comment="pyxml is &lt;0.8.4-194.23.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143871" version="1" comment="qt3 is &lt;3.3.8b-88.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143872" version="1" comment="qt3-32bit is &lt;3.3.8b-88.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143873" version="1" comment="qt3-x86 is &lt;3.3.8b-88.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070706" version="1" comment="quagga is &lt;0.99.15-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071831" version="1" comment="radvd is &lt;1.1-1.24.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144532" version="1" comment="rsync is &lt;3.0.4-2.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144533" version="1" comment="rsyslog is &lt;5.8.7-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144534" version="1" comment="rsyslog-diag-tools is &lt;5.8.7-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144535" version="1" comment="rsyslog-doc is &lt;5.8.7-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144536" version="1" comment="rsyslog-module-gssapi is &lt;5.8.7-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144537" version="1" comment="rsyslog-module-gtls is &lt;5.8.7-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144538" version="1" comment="rsyslog-module-mysql is &lt;5.8.7-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144539" version="1" comment="rsyslog-module-pgsql is &lt;5.8.7-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144540" version="1" comment="rsyslog-module-relp is &lt;5.8.7-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144541" version="1" comment="rsyslog-module-snmp is &lt;5.8.7-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144542" version="1" comment="rsyslog-module-udpspoof is &lt;5.8.7-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072842" version="1" comment="ruby is &lt;1.8.7.p357-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072840" version="1" comment="ruby-doc-html is &lt;1.8.7.p357-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072841" version="1" comment="ruby-tk is &lt;1.8.7.p357-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072757" version="1" comment="squid is &lt;2.7.STABLE5-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072759" version="1" comment="squid3 is &lt;3.1.12-8.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143886" version="1" comment="squidGuard is &lt;1.4-13.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143887" version="1" comment="squidGuard-doc is &lt;1.4-13.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144543" version="1" comment="star is &lt;1.5final-28.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144544" version="1" comment="sudo is &lt;1.7.6p2-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144545" version="1" comment="sysconfig is &lt;0.71.47-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144546" version="1" comment="syslog-ng is &lt;2.0.9-27.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144547" version="1" comment="sysstat is &lt;8.1.5-7.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144548" version="1" comment="sysstat-isag is &lt;8.1.5-7.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072481" version="1" comment="system-config-printer is &lt;1.0.8-9.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072480" version="1" comment="system-config-printer-lang is &lt;1.0.8-9.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144549" version="1" comment="systemtap is &lt;1.5-0.7.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144550" version="1" comment="systemtap-server is &lt;1.5-0.7.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065858" version="1" comment="t1lib is &lt;5.1.1-100.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143897" version="1" comment="tar is &lt;1.26-1.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069328" version="1" comment="tftp is &lt;0.48-101.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144551" version="1" comment="tgt is &lt;0.9.10-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072827" version="1" comment="tomcat6 is &lt;6.0.18-20.35.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072820" version="1" comment="tomcat6-admin-webapps is &lt;6.0.18-20.35.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072821" version="1" comment="tomcat6-docs-webapp is &lt;6.0.18-20.35.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072822" version="1" comment="tomcat6-javadoc is &lt;6.0.18-20.35.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072823" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.18-20.35.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072824" version="1" comment="tomcat6-lib is &lt;6.0.18-20.35.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072825" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.18-20.35.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072826" version="1" comment="tomcat6-webapps is &lt;6.0.18-20.35.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143901" version="1" comment="unrar is &lt;3.80.2-2.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143902" version="1" comment="unzip is &lt;6.00-11.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061711" version="1" comment="vte is &lt;0.22.5-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061709" version="1" comment="vte-doc is &lt;0.22.5-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061710" version="1" comment="vte-lang is &lt;0.22.5-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061666" version="1" comment="w3m is &lt;0.5.2-132.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111746" version="1" comment="wget is &lt;1.11.4-1.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071923" version="1" comment="wireshark is &lt;1.4.10-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143905" version="1" comment="xdg-utils is &lt;1.0.2-36.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144552" version="1" comment="xen is &lt;4.1.2_14-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144553" version="1" comment="xen-doc-html is &lt;4.1.2_14-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144554" version="1" comment="xen-doc-pdf is &lt;4.1.2_14-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144555" version="1" comment="xen-kmp-default is &lt;4.1.2_14_3.0.13_0.27-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144556" version="1" comment="xen-kmp-pae is &lt;4.1.2_14_3.0.13_0.27-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144557" version="1" comment="xen-libs is &lt;4.1.2_14-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144558" version="1" comment="xen-libs-32bit is &lt;4.1.2_14-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144559" version="1" comment="xen-tools is &lt;4.1.2_14-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144560" version="1" comment="xen-tools-domU is &lt;4.1.2_14-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144561" version="1" comment="xorg-x11 is &lt;7.4-9.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144562" version="1" comment="xorg-x11-xauth is &lt;7.4-9.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144563" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.60.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144564" version="1" comment="xorg-x11-server is &lt;7.4-27.60.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144565" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.60.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071551" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071549" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071550" version="1" comment="xorg-x11-libs-x86 is &lt;7.4-8.26.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143924" version="1" comment="xterm is &lt;238-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144566" version="1" comment="yast2 is &lt;2.17.119-0.5.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144567" version="1" comment="yast2-core is &lt;2.17.44-0.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143927" version="1" comment="zoo is &lt;2.10-911.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077550" version="1" comment="sles-release is ==11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143421" version="1" comment="Mesa is &lt;9.0.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143422" version="1" comment="Mesa-32bit is &lt;9.0.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143423" version="1" comment="Mesa-x86 is &lt;9.0.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143424" version="1" comment="MozillaFirefox is &lt;17.0.4esr-0.10.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143425" version="1" comment="MozillaFirefox-translations is &lt;17.0.4esr-0.10.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143426" version="1" comment="NetworkManager is &lt;0.7.1_git20090811-3.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143427" version="1" comment="NetworkManager-glib is &lt;0.7.1_git20090811-3.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143429" version="1" comment="PackageKit is &lt;0.3.14-2.28.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143430" version="1" comment="PackageKit-lang is &lt;0.3.14-2.28.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143431" version="1" comment="hal is &lt;0.5.12-23.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143432" version="1" comment="hal-32bit is &lt;0.5.12-23.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143433" version="1" comment="hal-doc is &lt;0.5.12-23.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143434" version="1" comment="hal-x86 is &lt;0.5.12-23.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143435" version="1" comment="libpackagekit-glib10 is &lt;0.3.14-2.28.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143436" version="1" comment="PolicyKit is &lt;0.9-14.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143437" version="1" comment="PolicyKit-32bit is &lt;0.9-14.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143439" version="1" comment="PolicyKit-x86 is &lt;0.9-14.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143440" version="1" comment="aaa_base is &lt;11-6.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143441" version="1" comment="acpid is &lt;1.0.6-91.25.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143443" version="1" comment="ant is &lt;1.7.1-20.9.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143444" version="1" comment="ant-trax is &lt;1.7.1-16.9.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077061" version="1" comment="apache2 is &lt;2.2.12-1.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077056" version="1" comment="apache2-doc is &lt;2.2.12-1.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077057" version="1" comment="apache2-example-pages is &lt;2.2.12-1.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077058" version="1" comment="apache2-prefork is &lt;2.2.12-1.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077059" version="1" comment="apache2-utils is &lt;2.2.12-1.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077060" version="1" comment="apache2-worker is &lt;2.2.12-1.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143446" version="1" comment="apache2-mod_php53 is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143447" version="1" comment="php53 is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143448" version="1" comment="php53-bcmath is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143449" version="1" comment="php53-bz2 is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143450" version="1" comment="php53-calendar is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143451" version="1" comment="php53-ctype is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143452" version="1" comment="php53-curl is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143453" version="1" comment="php53-dba is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143454" version="1" comment="php53-dom is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143455" version="1" comment="php53-exif is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143456" version="1" comment="php53-fastcgi is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143457" version="1" comment="php53-fileinfo is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143458" version="1" comment="php53-ftp is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143459" version="1" comment="php53-gd is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143460" version="1" comment="php53-gettext is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143461" version="1" comment="php53-gmp is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143462" version="1" comment="php53-iconv is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143463" version="1" comment="php53-intl is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143464" version="1" comment="php53-json is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143465" version="1" comment="php53-ldap is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143466" version="1" comment="php53-mbstring is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143467" version="1" comment="php53-mcrypt is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143468" version="1" comment="php53-mysql is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143469" version="1" comment="php53-odbc is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143470" version="1" comment="php53-openssl is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143471" version="1" comment="php53-pcntl is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143472" version="1" comment="php53-pdo is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143473" version="1" comment="php53-pear is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143474" version="1" comment="php53-pgsql is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143475" version="1" comment="php53-pspell is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143476" version="1" comment="php53-shmop is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143477" version="1" comment="php53-snmp is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143478" version="1" comment="php53-soap is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143479" version="1" comment="php53-suhosin is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143480" version="1" comment="php53-sysvmsg is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143481" version="1" comment="php53-sysvsem is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143482" version="1" comment="php53-sysvshm is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143483" version="1" comment="php53-tokenizer is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143484" version="1" comment="php53-wddx is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143485" version="1" comment="php53-xmlreader is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143486" version="1" comment="php53-xmlrpc is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143487" version="1" comment="php53-xmlwriter is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143488" version="1" comment="php53-xsl is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143489" version="1" comment="php53-zip is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143490" version="1" comment="php53-zlib is &lt;5.3.17-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077067" version="1" comment="apache2-mod_security2 is &lt;2.7.1-0.2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073173" version="1" comment="ark is &lt;4.3.5-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073174" version="1" comment="kcalc is &lt;4.3.5-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073175" version="1" comment="kcharselect is &lt;4.3.5-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073176" version="1" comment="kdessh is &lt;4.3.5-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073177" version="1" comment="kdf is &lt;4.3.5-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073178" version="1" comment="kfloppy is &lt;4.3.5-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073179" version="1" comment="kgpg is &lt;4.3.5-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073180" version="1" comment="ktimer is &lt;4.3.5-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073181" version="1" comment="kwalletmanager is &lt;4.3.5-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073182" version="1" comment="kwikdisk is &lt;4.3.5-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073183" version="1" comment="okteta is &lt;4.3.5-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143491" version="1" comment="avahi is &lt;0.6.23-11.30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143492" version="1" comment="avahi-lang is &lt;0.6.23-11.30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143493" version="1" comment="avahi-utils is &lt;0.6.23-11.30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143494" version="1" comment="libavahi-client3 is &lt;0.6.23-11.30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143495" version="1" comment="libavahi-client3-32bit is &lt;0.6.23-11.30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143496" version="1" comment="libavahi-client3-x86 is &lt;0.6.23-11.30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143497" version="1" comment="libavahi-common3 is &lt;0.6.23-11.30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143498" version="1" comment="libavahi-common3-32bit is &lt;0.6.23-11.30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143499" version="1" comment="libavahi-common3-x86 is &lt;0.6.23-11.30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143500" version="1" comment="libavahi-core5 is &lt;0.6.23-11.30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143501" version="1" comment="libdns_sd is &lt;0.6.23-11.30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143502" version="1" comment="libdns_sd-32bit is &lt;0.6.23-11.30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143503" version="1" comment="libdns_sd-x86 is &lt;0.6.23-11.30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143504" version="1" comment="bind is &lt;9.6ESVR7P4-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143505" version="1" comment="bind-chrootenv is &lt;9.6ESVR7P4-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143506" version="1" comment="bind-doc is &lt;9.6ESVR7P4-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143507" version="1" comment="bind-libs is &lt;9.6ESVR7P4-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143508" version="1" comment="bind-libs-32bit is &lt;9.6ESVR7P4-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143509" version="1" comment="bind-libs-x86 is &lt;9.6ESVR7P4-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143510" version="1" comment="bind-utils is &lt;9.6ESVR7P4-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074909" version="1" comment="boost-license is &lt;1.36.0-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074910" version="1" comment="libboost_program_options1_36_0 is &lt;1.36.0-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074917" version="1" comment="libboost_regex1_36_0 is &lt;1.36.0-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074911" version="1" comment="libboost_signals1_36_0 is &lt;1.36.0-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074912" version="1" comment="libboost_thread1_36_0 is &lt;1.36.0-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143511" version="1" comment="cifs-utils is &lt;5.1-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112218" version="1" comment="clamav is &lt;0.97.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143512" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.24.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143513" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.24.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143514" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.24.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143515" version="1" comment="libldap-2_4-2-x86 is &lt;2.4.26-0.24.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143516" version="1" comment="openldap2 is &lt;2.4.26-0.24.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143517" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.24.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143518" version="1" comment="openldap2-client is &lt;2.4.26-0.24.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143520" version="1" comment="cron is &lt;4.1-194.207.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143521" version="1" comment="cups is &lt;1.3.9-8.46.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143522" version="1" comment="cups-client is &lt;1.3.9-8.46.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143523" version="1" comment="cups-libs is &lt;1.3.9-8.46.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143524" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143525" version="1" comment="cups-libs-x86 is &lt;1.3.9-8.46.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143526" version="1" comment="curl is &lt;7.19.7-1.26.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143527" version="1" comment="libcurl4 is &lt;7.19.7-1.26.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143528" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.26.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143529" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.26.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073075" version="1" comment="cvs is &lt;1.12.12-144.23.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073074" version="1" comment="cvs-doc is &lt;1.12.12-144.23.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143530" version="1" comment="dbus-1 is &lt;1.2.10-3.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143531" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143532" version="1" comment="dbus-1-x11 is &lt;1.2.10-3.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143533" version="1" comment="dbus-1-x86 is &lt;1.2.10-3.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143537" version="1" comment="dhcp is &lt;4.2.4.P2-0.16.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143538" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.16.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143539" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.16.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143540" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.16.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074692" version="1" comment="dhcpcd is &lt;3.2.3-44.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143541" version="1" comment="e2fsprogs is &lt;1.41.9-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143542" version="1" comment="libcom_err2 is &lt;1.41.9-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143543" version="1" comment="libcom_err2-32bit is &lt;1.41.9-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143544" version="1" comment="libcom_err2-x86 is &lt;1.41.9-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143545" version="1" comment="libext2fs2 is &lt;1.41.9-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074331" version="1" comment="ecryptfs-utils is &lt;61-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074329" version="1" comment="ecryptfs-utils-32bit is &lt;61-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074330" version="1" comment="ecryptfs-utils-x86 is &lt;61-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075137" version="1" comment="evolution-data-server is &lt;2.28.2-0.29.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075135" version="1" comment="evolution-data-server-32bit is &lt;2.28.2-0.29.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075136" version="1" comment="evolution-data-server-lang is &lt;2.28.2-0.29.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075143" version="1" comment="evolution-data-server-x86 is &lt;2.28.2-0.29.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074688" version="1" comment="expat is &lt;2.0.1-88.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074691" version="1" comment="libexpat1 is &lt;2.0.1-88.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074689" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074690" version="1" comment="libexpat1-x86 is &lt;2.0.1-88.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143552" version="1" comment="file is &lt;4.24-43.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143553" version="1" comment="file-32bit is &lt;4.24-43.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143554" version="1" comment="file-x86 is &lt;4.24-43.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112262" version="1" comment="freeradius-server is &lt;2.1.1-7.16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112263" version="1" comment="freeradius-server-dialupadmin is &lt;2.1.1-7.16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112264" version="1" comment="freeradius-server-doc is &lt;2.1.1-7.16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112265" version="1" comment="freeradius-server-libs is &lt;2.1.1-7.16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112266" version="1" comment="freeradius-server-utils is &lt;2.1.1-7.16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076460" version="1" comment="freetype2 is &lt;2.3.7-25.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076458" version="1" comment="freetype2-32bit is &lt;2.3.7-25.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076471" version="1" comment="freetype2-x86 is &lt;2.3.7-25.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076461" version="1" comment="ft2demos is &lt;2.3.7-25.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143557" version="1" comment="fuse is &lt;2.8.7-0.9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143558" version="1" comment="libfuse2 is &lt;2.8.7-0.9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075764" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075765" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075766" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075767" version="1" comment="ghostscript-library is &lt;8.62-32.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075768" version="1" comment="ghostscript-omni is &lt;8.62-32.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075769" version="1" comment="ghostscript-x11 is &lt;8.62-32.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075770" version="1" comment="libgimpprint is &lt;4.2.7-32.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143563" version="1" comment="glib2 is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143564" version="1" comment="glib2-doc is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143565" version="1" comment="glib2-lang is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143566" version="1" comment="libgio-2_0-0 is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143567" version="1" comment="libgio-2_0-0-32bit is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143568" version="1" comment="libgio-2_0-0-x86 is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143569" version="1" comment="libglib-2_0-0 is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143570" version="1" comment="libglib-2_0-0-32bit is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143571" version="1" comment="libglib-2_0-0-x86 is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143572" version="1" comment="libgmodule-2_0-0 is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143573" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143574" version="1" comment="libgmodule-2_0-0-x86 is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143575" version="1" comment="libgobject-2_0-0 is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143576" version="1" comment="libgobject-2_0-0-32bit is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143577" version="1" comment="libgobject-2_0-0-x86 is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143578" version="1" comment="libgthread-2_0-0 is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143579" version="1" comment="libgthread-2_0-0-32bit is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143580" version="1" comment="libgthread-2_0-0-x86 is &lt;2.22.5-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143581" version="1" comment="glibc is &lt;2.11.3-17.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143582" version="1" comment="glibc-32bit is &lt;2.11.3-17.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143583" version="1" comment="glibc-devel is &lt;2.11.3-17.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143584" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143585" version="1" comment="glibc-html is &lt;2.11.3-17.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143586" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143587" version="1" comment="glibc-info is &lt;2.11.3-17.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143588" version="1" comment="glibc-locale is &lt;2.11.3-17.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143589" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143590" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143591" version="1" comment="glibc-profile is &lt;2.11.3-17.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143592" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143593" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143594" version="1" comment="glibc-x86 is &lt;2.11.3-17.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143595" version="1" comment="nscd is &lt;2.11.3-17.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143601" version="1" comment="gnome-screensaver is &lt;2.28.3-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143602" version="1" comment="gnome-screensaver-lang is &lt;2.28.3-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077121" version="1" comment="gnutls is &lt;2.4.1-24.39.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077132" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077123" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077122" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077133" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.39.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143603" version="1" comment="gpg2 is &lt;2.0.9-25.33.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143604" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074875" version="1" comment="gtk2 is &lt;2.18.9-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074872" version="1" comment="gtk2-32bit is &lt;2.18.9-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074886" version="1" comment="gtk2-doc is &lt;2.18.9-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074874" version="1" comment="gtk2-lang is &lt;2.18.9-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074887" version="1" comment="gtk2-x86 is &lt;2.18.9-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143619" version="1" comment="guestfs-data is &lt;1.20.4-0.14.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143620" version="1" comment="guestfs-tools is &lt;1.20.4-0.14.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143621" version="1" comment="guestfsd is &lt;1.20.4-0.14.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143622" version="1" comment="libguestfs0 is &lt;1.20.4-0.14.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143627" version="1" comment="gzip is &lt;1.3.12-69.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143628" version="1" comment="hyper-v is &lt;5-0.7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143629" version="1" comment="ibutils is &lt;1.5.7-0.7.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143630" version="1" comment="ibutils-32bit is &lt;1.5.7-0.7.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076985" version="1" comment="jakarta-commons-httpclient3 is &lt;3.0.1-253.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077099" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr13.1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077095" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr13.1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077096" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr13.1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077097" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr13.1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077098" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr13.1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112815" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr4.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112826" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr4.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112816" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr4.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112827" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr4.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075206" version="1" comment="jpeg is &lt;6b-879.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075208" version="1" comment="libjpeg is &lt;6.2.0-879.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075207" version="1" comment="libjpeg-32bit is &lt;6.2.0-879.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075212" version="1" comment="libjpeg-x86 is &lt;6.2.0-879.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143633" version="1" comment="kde4-kgreeter-plugins is &lt;4.3.5-0.12.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143635" version="1" comment="kdebase4-workspace is &lt;4.3.5-0.12.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143636" version="1" comment="kdebase4-workspace-ksysguardd is &lt;4.3.5-0.12.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143637" version="1" comment="kdm is &lt;4.3.5-0.12.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143638" version="1" comment="kwin is &lt;4.3.5-0.12.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143642" version="1" comment="kdelibs4 is &lt;4.3.5-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143643" version="1" comment="kdelibs4-core is &lt;4.3.5-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143644" version="1" comment="kdelibs4-doc is &lt;4.3.5-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143645" version="1" comment="libkde4 is &lt;4.3.5-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143646" version="1" comment="libkde4-32bit is &lt;4.3.5-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143647" version="1" comment="libkde4-x86 is &lt;4.3.5-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143648" version="1" comment="libkdecore4 is &lt;4.3.5-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143649" version="1" comment="libkdecore4-32bit is &lt;4.3.5-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143650" version="1" comment="libkdecore4-x86 is &lt;4.3.5-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143651" version="1" comment="kernel-default is &lt;3.0.76-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143652" version="1" comment="kernel-default-base is &lt;3.0.76-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143653" version="1" comment="kernel-default-devel is &lt;3.0.76-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143654" version="1" comment="kernel-default-man is &lt;3.0.76-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143655" version="1" comment="kernel-pae is &lt;3.0.76-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143656" version="1" comment="kernel-pae-base is &lt;3.0.76-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143657" version="1" comment="kernel-pae-devel is &lt;3.0.76-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143658" version="1" comment="kernel-ppc64 is &lt;3.0.76-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143659" version="1" comment="kernel-ppc64-base is &lt;3.0.76-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143660" version="1" comment="kernel-ppc64-devel is &lt;3.0.76-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143661" version="1" comment="kernel-source is &lt;3.0.76-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143662" version="1" comment="kernel-syms is &lt;3.0.76-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143663" version="1" comment="kernel-trace is &lt;3.0.76-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143664" version="1" comment="kernel-trace-base is &lt;3.0.76-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143665" version="1" comment="kernel-trace-devel is &lt;3.0.76-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143666" version="1" comment="kernel-xen is &lt;3.0.76-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143667" version="1" comment="kernel-xen-base is &lt;3.0.76-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143668" version="1" comment="kernel-xen-devel is &lt;3.0.76-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112587" version="1" comment="krb5 is &lt;1.6.3-133.49.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112588" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112589" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112590" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112591" version="1" comment="krb5-client is &lt;1.6.3-133.49.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112595" version="1" comment="krb5-server is &lt;1.6.3-133.49.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112812" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112592" version="1" comment="krb5-doc is &lt;1.6.3-133.49.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112593" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112594" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143669" version="1" comment="kvm is &lt;1.4.1-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143674" version="1" comment="ldapsmb is &lt;1.34b-12.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143675" version="1" comment="libldb1 is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143676" version="1" comment="libsmbclient0 is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143677" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143678" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143679" version="1" comment="libtalloc2 is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143680" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143681" version="1" comment="libtalloc2-x86 is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143682" version="1" comment="libtdb1 is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143683" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143684" version="1" comment="libtdb1-x86 is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143685" version="1" comment="libtevent0 is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143686" version="1" comment="libwbclient0 is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143687" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143688" version="1" comment="libwbclient0-x86 is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143689" version="1" comment="samba is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143690" version="1" comment="samba-32bit is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143691" version="1" comment="samba-client is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143692" version="1" comment="samba-client-32bit is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143693" version="1" comment="samba-client-x86 is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143694" version="1" comment="samba-krb-printing is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143695" version="1" comment="samba-winbind is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143696" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143697" version="1" comment="samba-winbind-x86 is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143698" version="1" comment="samba-x86 is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077182" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077181" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143699" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143700" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143701" version="1" comment="libQtWebKit4-x86 is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143702" version="1" comment="libqt4 is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143703" version="1" comment="libqt4-32bit is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143704" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143705" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143706" version="1" comment="libqt4-qt3support-x86 is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143707" version="1" comment="libqt4-sql is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143708" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143709" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.25.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143710" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143711" version="1" comment="libqt4-sql-x86 is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143712" version="1" comment="libqt4-x11 is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143713" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143714" version="1" comment="libqt4-x11-x86 is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143715" version="1" comment="libqt4-x86 is &lt;4.6.3-5.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143716" version="1" comment="qt4-x11-tools is &lt;4.6.3-5.25.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072983" version="1" comment="libapr1 is &lt;1.3.3-11.18.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072982" version="1" comment="libapr1-32bit is &lt;1.3.3-11.18.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143719" version="1" comment="libcgroup1 is &lt;0.37.1-5.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143720" version="1" comment="libdrm is &lt;2.4.41-0.8.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143721" version="1" comment="libdrm-32bit is &lt;2.4.41-0.8.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143722" version="1" comment="libdrm-x86 is &lt;2.4.41-0.8.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076988" version="1" comment="libecpg6 is &lt;9.1.9-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076990" version="1" comment="libpq5 is &lt;9.1.9-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076989" version="1" comment="libpq5-32bit is &lt;9.1.9-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076991" version="1" comment="postgresql91 is &lt;9.1.9-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076993" version="1" comment="postgresql91-contrib is &lt;9.1.9-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076994" version="1" comment="postgresql91-docs is &lt;9.1.9-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076995" version="1" comment="postgresql91-server is &lt;9.1.9-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075040" version="1" comment="libexif is &lt;0.6.17-2.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075039" version="1" comment="libexif-32bit is &lt;0.6.17-2.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075063" version="1" comment="libexif-x86 is &lt;0.6.17-2.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143724" version="1" comment="libfreebl3 is &lt;3.14.3-0.11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143725" version="1" comment="libfreebl3-32bit is &lt;3.14.3-0.11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143726" version="1" comment="libfreebl3-x86 is &lt;3.14.3-0.11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143727" version="1" comment="libsoftokn3 is &lt;3.14.3-0.11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143728" version="1" comment="libsoftokn3-32bit is &lt;3.14.3-0.11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143729" version="1" comment="libsoftokn3-x86 is &lt;3.14.3-0.11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143730" version="1" comment="mozilla-nss is &lt;3.14.3-0.11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143731" version="1" comment="mozilla-nss-32bit is &lt;3.14.3-0.11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143732" version="1" comment="mozilla-nss-tools is &lt;3.14.3-0.11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143733" version="1" comment="mozilla-nss-x86 is &lt;3.14.3-0.11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143735" version="1" comment="libgtop is &lt;2.28.0-1.9.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143736" version="1" comment="libgtop-2_0-7 is &lt;2.28.0-1.9.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143737" version="1" comment="libgtop-doc is &lt;2.28.0-1.9.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143738" version="1" comment="libgtop-lang is &lt;2.28.0-1.9.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076347" version="1" comment="libicu is &lt;4.0-7.26.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076348" version="1" comment="libicu-32bit is &lt;4.0-7.26.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076349" version="1" comment="libicu-doc is &lt;4.0-7.26.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076350" version="1" comment="libicu-x86 is &lt;4.0-7.26.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076518" version="1" comment="libmysqlclient15 is &lt;5.0.96-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076517" version="1" comment="libmysqlclient15-32bit is &lt;5.0.96-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076523" version="1" comment="libmysqlclient15-x86 is &lt;5.0.96-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076520" version="1" comment="libmysqlclient_r15 is &lt;5.0.96-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143740" version="1" comment="mysql is &lt;5.5.31-0.7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143741" version="1" comment="mysql-client is &lt;5.5.31-0.7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143742" version="1" comment="mysql-tools is &lt;5.5.31-0.7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143746" version="1" comment="libnewt0_52 is &lt;0.52.10-1.35.113" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143747" version="1" comment="newt is &lt;0.52.10-1.35.113" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143748" version="1" comment="python-newt is &lt;0.52.10-1.35.113" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076924" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076923" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076935" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076933" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076936" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076925" version="1" comment="openssl is &lt;0.9.8j-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076937" version="1" comment="openssl-doc is &lt;0.9.8j-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076091" version="1" comment="libotr2 is &lt;3.2.0-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075195" version="1" comment="libpng12-0 is &lt;1.2.31-5.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075194" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075199" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076958" version="1" comment="libpoppler-glib4 is &lt;0.12.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076959" version="1" comment="libpoppler-qt4-3 is &lt;0.12.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076960" version="1" comment="libpoppler5 is &lt;0.12.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076961" version="1" comment="poppler-tools is &lt;0.12.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076276" version="1" comment="libproxy0 is &lt;0.3.1-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076270" version="1" comment="libproxy0-32bit is &lt;0.3.1-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076272" version="1" comment="libproxy0-config-gnome is &lt;0.3.1-2.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076273" version="1" comment="libproxy0-config-kde4 is &lt;0.3.1-2.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076275" version="1" comment="libproxy0-networkmanager is &lt;0.3.1-2.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076277" version="1" comment="libproxy0-x86 is &lt;0.3.1-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143761" version="1" comment="libpython2_6-1_0 is &lt;2.6.8-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143762" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.8-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143763" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.8-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143764" version="1" comment="python-base is &lt;2.6.8-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143765" version="1" comment="python-base-32bit is &lt;2.6.8-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143766" version="1" comment="python-base-x86 is &lt;2.6.8-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143767" version="1" comment="python-xml is &lt;2.6.8-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143773" version="1" comment="libsnmp15 is &lt;5.4.2.1-8.12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143774" version="1" comment="libsnmp15-32bit is &lt;5.4.2.1-8.12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143775" version="1" comment="libsnmp15-x86 is &lt;5.4.2.1-8.12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143776" version="1" comment="net-snmp is &lt;5.4.2.1-8.12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143777" version="1" comment="perl-SNMP is &lt;5.4.2.1-8.12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143778" version="1" comment="snmp-mibs is &lt;5.4.2.1-8.12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143779" version="1" comment="libsoup-2_4-1 is &lt;2.32.2-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143780" version="1" comment="libsoup-2_4-1-32bit is &lt;2.32.2-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143781" version="1" comment="libsoup-2_4-1-x86 is &lt;2.32.2-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143782" version="1" comment="libsss_idmap0 is &lt;1.9.4-0.12.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143783" version="1" comment="python-sssd-config is &lt;1.9.4-0.12.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143784" version="1" comment="sssd is &lt;1.9.4-0.12.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143785" version="1" comment="sssd-32bit is &lt;1.9.4-0.12.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143786" version="1" comment="sssd-tools is &lt;1.9.4-0.12.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077218" version="1" comment="libtiff3 is &lt;3.8.2-141.152.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077217" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.152.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077223" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.152.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077224" version="1" comment="tiff is &lt;3.8.2-141.152.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143787" version="1" comment="libtspi1 is &lt;0.3.10-0.9.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143788" version="1" comment="libtspi1-32bit is &lt;0.3.10-0.9.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143789" version="1" comment="libtspi1-x86 is &lt;0.3.10-0.9.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143790" version="1" comment="trousers is &lt;0.3.10-0.9.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075498" version="1" comment="libupsclient1 is &lt;2.6.2-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075500" version="1" comment="nut is &lt;2.6.2-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075499" version="1" comment="nut-classic is &lt;2.6.2-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111805" version="1" comment="nut-drivers-net is &lt;2.6.2-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143791" version="1" comment="libvirt is &lt;1.0.5.1-0.7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143792" version="1" comment="libvirt-client is &lt;1.0.5.1-0.7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143793" version="1" comment="libvirt-client-32bit is &lt;1.0.5.1-0.7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143794" version="1" comment="libvirt-doc is &lt;1.0.5.1-0.7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143795" version="1" comment="libvirt-lock-sanlock is &lt;1.0.5.1-0.7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143796" version="1" comment="libvirt-python is &lt;1.0.5.1-0.7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073153" version="1" comment="libvorbis is &lt;1.2.0-79.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073150" version="1" comment="libvorbis-32bit is &lt;1.2.0-79.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073151" version="1" comment="libvorbis-doc is &lt;1.2.0-79.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073152" version="1" comment="libvorbis-x86 is &lt;1.2.0-79.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077146" version="1" comment="libxml2 is &lt;2.7.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077144" version="1" comment="libxml2-32bit is &lt;2.7.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077151" version="1" comment="libxml2-doc is &lt;2.7.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077152" version="1" comment="libxml2-x86 is &lt;2.7.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077120" version="1" comment="libxslt is &lt;1.1.24-19.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077119" version="1" comment="libxslt-32bit is &lt;1.1.24-19.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077131" version="1" comment="libxslt-x86 is &lt;1.1.24-19.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073168" version="1" comment="logrotate is &lt;3.7.7-10.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143804" version="1" comment="lvm2 is &lt;2.02.98-0.25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143805" version="1" comment="mailman is &lt;2.1.14-9.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073033" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.27-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073029" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.27-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073030" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.27-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073031" version="1" comment="mozilla-xulrunner192-translations is &lt;1.9.2.27-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073032" version="1" comment="mozilla-xulrunner192-x86 is &lt;1.9.2.27-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076709" version="1" comment="nagios is &lt;3.0.6-1.25.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076708" version="1" comment="nagios-www is &lt;3.0.6-1.25.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143816" version="1" comment="nagios-plugins is &lt;1.4.16-0.11.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143817" version="1" comment="nagios-plugins-extras is &lt;1.4.16-0.11.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077277" version="1" comment="nfs-client is &lt;1.2.3-18.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143818" version="1" comment="ntp is &lt;4.2.4p8-1.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143819" version="1" comment="ntp-doc is &lt;4.2.4p8-1.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143820" version="1" comment="ofed is &lt;1.5.4.1-0.11.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143821" version="1" comment="ofed-doc is &lt;1.5.4.1-0.11.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143822" version="1" comment="ofed-kmp-default is &lt;1.5.4.1_3.0.76_0.11-0.11.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143823" version="1" comment="ofed-kmp-pae is &lt;1.5.4.1_3.0.76_0.11-0.11.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143824" version="1" comment="ofed-kmp-ppc64 is &lt;1.5.4.1_3.0.76_0.11-0.11.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143825" version="1" comment="ofed-kmp-trace is &lt;1.5.4.1_3.0.76_0.11-0.11.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143826" version="1" comment="openCryptoki is &lt;2.4.2-0.9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143827" version="1" comment="openCryptoki-32bit is &lt;2.4.2-0.9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143828" version="1" comment="openCryptoki-64bit is &lt;2.4.2-0.9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143833" version="1" comment="openssh is &lt;6.2p2-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143834" version="1" comment="openssh-askpass is &lt;6.2p2-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143835" version="1" comment="openvpn is &lt;2.0.9-143.38.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143836" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.38.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143841" version="1" comment="pam_krb5 is &lt;2.3.1-47.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143842" version="1" comment="pam_krb5-32bit is &lt;2.3.1-47.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143843" version="1" comment="pam_krb5-x86 is &lt;2.3.1-47.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143847" version="1" comment="pam_mount is &lt;0.47-13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143848" version="1" comment="pam_mount-32bit is &lt;0.47-13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143849" version="1" comment="pam_mount-x86 is &lt;0.47-13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143850" version="1" comment="perl is &lt;5.10.0-64.67.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143851" version="1" comment="perl-32bit is &lt;5.10.0-64.67.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143852" version="1" comment="perl-Module-Build is &lt;0.2808.01-0.67.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143853" version="1" comment="perl-Test-Simple is &lt;0.72-0.67.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143854" version="1" comment="perl-base is &lt;5.10.0-64.67.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143855" version="1" comment="perl-doc is &lt;5.10.0-64.67.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143856" version="1" comment="perl-x86 is &lt;5.10.0-64.67.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076900" version="1" comment="postgresql is &lt;8.3.23-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076905" version="1" comment="postgresql-contrib is &lt;8.3.23-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076906" version="1" comment="postgresql-docs is &lt;8.3.23-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076907" version="1" comment="postgresql-server is &lt;8.3.23-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076978" version="1" comment="puppet is &lt;2.6.18-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076986" version="1" comment="puppet-server is &lt;2.6.18-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143861" version="1" comment="pure-ftpd is &lt;1.0.22-3.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143862" version="1" comment="python is &lt;2.6.8-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143863" version="1" comment="python-32bit is &lt;2.6.8-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143864" version="1" comment="python-curses is &lt;2.6.8-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143865" version="1" comment="python-demo is &lt;2.6.8-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143866" version="1" comment="python-gdbm is &lt;2.6.8-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143867" version="1" comment="python-idle is &lt;2.6.8-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143868" version="1" comment="python-tk is &lt;2.6.8-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143869" version="1" comment="python-x86 is &lt;2.6.8-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074309" version="1" comment="python-pam is &lt;0.5.0-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143874" version="1" comment="quagga is &lt;0.99.15-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143875" version="1" comment="rsync is &lt;3.0.4-2.47.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143876" version="1" comment="rsyslog is &lt;5.10.1-0.7.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143877" version="1" comment="rsyslog-diag-tools is &lt;5.10.1-0.7.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143878" version="1" comment="rsyslog-doc is &lt;5.10.1-0.7.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143879" version="1" comment="rsyslog-module-gssapi is &lt;5.10.1-0.7.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143880" version="1" comment="rsyslog-module-gtls is &lt;5.10.1-0.7.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143881" version="1" comment="rsyslog-module-mysql is &lt;5.10.1-0.7.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143882" version="1" comment="rsyslog-module-pgsql is &lt;5.10.1-0.7.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143883" version="1" comment="rsyslog-module-relp is &lt;5.10.1-0.7.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143884" version="1" comment="rsyslog-module-snmp is &lt;5.10.1-0.7.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143885" version="1" comment="rsyslog-module-udpspoof is &lt;5.10.1-0.7.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076775" version="1" comment="ruby is &lt;1.8.7.p357-0.9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076786" version="1" comment="ruby-doc-html is &lt;1.8.7.p357-0.9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076787" version="1" comment="ruby-tk is &lt;1.8.7.p357-0.9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075799" version="1" comment="sblim-sfcb is &lt;1.3.11-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074796" version="1" comment="socat is &lt;1.7.0.0-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076602" version="1" comment="squid is &lt;2.7.STABLE5-2.12.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076661" version="1" comment="squid3 is &lt;3.1.12-8.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143888" version="1" comment="star is &lt;1.5final-28.23.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143889" version="1" comment="stunnel is &lt;4.54-0.9.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143890" version="1" comment="sudo is &lt;1.7.6p2-0.17.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143891" version="1" comment="sysconfig is &lt;0.71.61-0.11.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143892" version="1" comment="syslog-ng is &lt;2.0.9-27.34.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143893" version="1" comment="sysstat is &lt;8.1.5-7.45.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143894" version="1" comment="sysstat-isag is &lt;8.1.5-7.45.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143895" version="1" comment="system-config-printer is &lt;1.0.8-9.23.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143896" version="1" comment="system-config-printer-lang is &lt;1.0.8-9.23.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077055" version="1" comment="systemtap is &lt;1.5-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077054" version="1" comment="systemtap-server is &lt;1.5-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074582" version="1" comment="t1lib is &lt;5.1.1-100.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074585" version="1" comment="taglib is &lt;1.5-19.23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074583" version="1" comment="taglib-32bit is &lt;1.5-19.23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074584" version="1" comment="taglib-x86 is &lt;1.5-19.23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143898" version="1" comment="tftp is &lt;0.48-101.31.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143899" version="1" comment="tgt is &lt;0.9.10-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076487" version="1" comment="tomcat6 is &lt;6.0.18-20.35.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076480" version="1" comment="tomcat6-admin-webapps is &lt;6.0.18-20.35.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076481" version="1" comment="tomcat6-docs-webapp is &lt;6.0.18-20.35.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076482" version="1" comment="tomcat6-javadoc is &lt;6.0.18-20.35.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076483" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.18-20.35.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076484" version="1" comment="tomcat6-lib is &lt;6.0.18-20.35.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076485" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.18-20.35.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076486" version="1" comment="tomcat6-webapps is &lt;6.0.18-20.35.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143900" version="1" comment="unixODBC_23 is &lt;2.3.1-0.9.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143903" version="1" comment="virt-utils is &lt;1.2.1-0.7.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077108" version="1" comment="wireshark is &lt;1.8.6-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143904" version="1" comment="x3270 is &lt;3.3.12-517.12.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143906" version="1" comment="xen is &lt;4.2.2_04-0.7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143907" version="1" comment="xen-doc-html is &lt;4.2.2_04-0.7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143908" version="1" comment="xen-doc-pdf is &lt;4.2.2_04-0.7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143909" version="1" comment="xen-kmp-default is &lt;4.2.2_04_3.0.76_0.11-0.7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143910" version="1" comment="xen-kmp-pae is &lt;4.2.2_04_3.0.76_0.11-0.7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143911" version="1" comment="xen-libs is &lt;4.2.2_04-0.7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143912" version="1" comment="xen-libs-32bit is &lt;4.2.2_04-0.7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143913" version="1" comment="xen-tools is &lt;4.2.2_04-0.7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143914" version="1" comment="xen-tools-domU is &lt;4.2.2_04-0.7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143915" version="1" comment="xorg-x11 is &lt;7.4-9.62.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143916" version="1" comment="xorg-x11-xauth is &lt;7.4-9.62.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143917" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.81.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143918" version="1" comment="xorg-x11-server is &lt;7.4-27.81.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143919" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.81.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143920" version="1" comment="xorg-x11-libxcb is &lt;7.4-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143921" version="1" comment="xorg-x11-libxcb-32bit is &lt;7.4-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143922" version="1" comment="xorg-x11-libxcb-x86 is &lt;7.4-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074291" version="1" comment="xorg-x11-server-dmx is &lt;7.3.99-17.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143923" version="1" comment="xorg-x11-server-rdp is &lt;7.3.99-3.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143925" version="1" comment="yast2 is &lt;2.17.129-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143926" version="1" comment="yast2-core is &lt;2.17.45-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117413" version="1" comment="sles-release is ==11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143928" version="1" comment="Mesa is &lt;9.0.3-0.28.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143929" version="1" comment="Mesa-32bit is &lt;9.0.3-0.28.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143930" version="1" comment="Mesa-x86 is &lt;9.0.3-0.28.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110027" version="1" comment="MozillaFirefox is &lt;31.7.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110026" version="1" comment="MozillaFirefox-translations is &lt;31.7.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143931" version="1" comment="PackageKit is &lt;0.3.14-2.30.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143932" version="1" comment="PackageKit-lang is &lt;0.3.14-2.30.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143933" version="1" comment="hal is &lt;0.5.12-23.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143934" version="1" comment="hal-32bit is &lt;0.5.12-23.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143935" version="1" comment="hal-doc is &lt;0.5.12-23.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143936" version="1" comment="hal-x86 is &lt;0.5.12-23.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143937" version="1" comment="libpackagekit-glib10 is &lt;0.3.14-2.30.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143938" version="1" comment="PolicyKit is &lt;0.9-14.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143939" version="1" comment="PolicyKit-32bit is &lt;0.9-14.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143940" version="1" comment="PolicyKit-doc is &lt;0.9-14.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143941" version="1" comment="PolicyKit-x86 is &lt;0.9-14.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098629" version="1" comment="a2ps is &lt;4.13-1326.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143942" version="1" comment="aaa_base is &lt;11-6.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143943" version="1" comment="ant is &lt;1.7.1-20.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143944" version="1" comment="ant-trax is &lt;1.7.1-16.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108649" version="1" comment="apache2 is &lt;2.2.12-1.51.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108644" version="1" comment="apache2-doc is &lt;2.2.12-1.51.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108645" version="1" comment="apache2-example-pages is &lt;2.2.12-1.51.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108646" version="1" comment="apache2-prefork is &lt;2.2.12-1.51.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108647" version="1" comment="apache2-utils is &lt;2.2.12-1.51.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108648" version="1" comment="apache2-worker is &lt;2.2.12-1.51.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143945" version="1" comment="apache2-mod_jk is &lt;1.2.40-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143946" version="1" comment="apache2-mod_nss is &lt;1.0.8-0.4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143947" version="1" comment="apache2-mod_perl is &lt;2.0.4-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110219" version="1" comment="apache2-mod_php53 is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112868" version="1" comment="php53 is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110220" version="1" comment="php53-bcmath is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110221" version="1" comment="php53-bz2 is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110222" version="1" comment="php53-calendar is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110223" version="1" comment="php53-ctype is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110224" version="1" comment="php53-curl is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110225" version="1" comment="php53-dba is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110226" version="1" comment="php53-dom is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110227" version="1" comment="php53-exif is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110228" version="1" comment="php53-fastcgi is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110229" version="1" comment="php53-fileinfo is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110230" version="1" comment="php53-ftp is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110231" version="1" comment="php53-gd is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110232" version="1" comment="php53-gettext is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110233" version="1" comment="php53-gmp is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110234" version="1" comment="php53-iconv is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110235" version="1" comment="php53-intl is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110236" version="1" comment="php53-json is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110237" version="1" comment="php53-ldap is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110238" version="1" comment="php53-mbstring is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110239" version="1" comment="php53-mcrypt is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110240" version="1" comment="php53-mysql is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110241" version="1" comment="php53-odbc is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110242" version="1" comment="php53-openssl is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110243" version="1" comment="php53-pcntl is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110244" version="1" comment="php53-pdo is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110245" version="1" comment="php53-pear is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110246" version="1" comment="php53-pgsql is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110247" version="1" comment="php53-pspell is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110248" version="1" comment="php53-shmop is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110249" version="1" comment="php53-snmp is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110250" version="1" comment="php53-soap is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110251" version="1" comment="php53-suhosin is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110252" version="1" comment="php53-sysvmsg is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110253" version="1" comment="php53-sysvsem is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110254" version="1" comment="php53-sysvshm is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110255" version="1" comment="php53-tokenizer is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110256" version="1" comment="php53-wddx is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110257" version="1" comment="php53-xmlreader is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110258" version="1" comment="php53-xmlrpc is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110259" version="1" comment="php53-xmlwriter is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110260" version="1" comment="php53-xsl is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110261" version="1" comment="php53-zip is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110262" version="1" comment="php53-zlib is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099258" version="1" comment="apache2-mod_security2 is &lt;2.7.1-0.2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099535" version="1" comment="augeas is &lt;0.9.0-3.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099534" version="1" comment="augeas-lenses is &lt;0.9.0-3.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099536" version="1" comment="libaugeas0 is &lt;0.9.0-3.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089841" version="1" comment="automake is &lt;1.10.1-4.131.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143948" version="1" comment="avahi is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143949" version="1" comment="avahi-lang is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143950" version="1" comment="avahi-utils is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143951" version="1" comment="libavahi-client3 is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143952" version="1" comment="libavahi-client3-32bit is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143953" version="1" comment="libavahi-client3-x86 is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143954" version="1" comment="libavahi-common3 is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143955" version="1" comment="libavahi-common3-32bit is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143956" version="1" comment="libavahi-common3-x86 is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143957" version="1" comment="libavahi-core5 is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143958" version="1" comment="libdns_sd is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143959" version="1" comment="libdns_sd-32bit is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143960" version="1" comment="libdns_sd-x86 is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143961" version="1" comment="bash is &lt;3.2-147.27.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143962" version="1" comment="bash-doc is &lt;3.2-147.27.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143963" version="1" comment="bash-x86 is &lt;3.2-147.27.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143964" version="1" comment="libreadline5 is &lt;5.2-147.27.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143965" version="1" comment="libreadline5-32bit is &lt;5.2-147.27.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143966" version="1" comment="libreadline5-x86 is &lt;5.2-147.27.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143967" version="1" comment="readline-doc is &lt;5.2-147.27.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106119" version="1" comment="bind is &lt;9.9.6P1-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106113" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106115" version="1" comment="bind-doc is &lt;9.9.6P1-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106117" version="1" comment="bind-libs is &lt;9.9.6P1-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106116" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103747" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106118" version="1" comment="bind-utils is &lt;9.9.6P1-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143968" version="1" comment="binutils is &lt;2.24-3.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143969" version="1" comment="boost-license is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143970" version="1" comment="boost-license1_49_0 is &lt;1.49.0-0.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143971" version="1" comment="libboost_program_options1_36_0 is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143972" version="1" comment="libboost_regex1_36_0 is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143973" version="1" comment="libboost_signals1_36_0 is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143974" version="1" comment="libboost_system1_49_0 is &lt;1.49.0-0.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143975" version="1" comment="libboost_thread1_36_0 is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143976" version="1" comment="libboost_thread1_49_0 is &lt;1.49.0-0.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143977" version="1" comment="cifs-utils is &lt;5.1-0.14.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109607" version="1" comment="clamav is &lt;0.98.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109626" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109624" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109623" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109627" version="1" comment="libldap-2_4-2-x86 is &lt;2.4.26-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109622" version="1" comment="openldap2 is &lt;2.4.26-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109628" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109625" version="1" comment="openldap2-client is &lt;2.4.26-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109145" version="1" comment="coreutils is &lt;8.12-6.25.32.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109144" version="1" comment="coreutils-lang is &lt;8.12-6.25.32.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109146" version="1" comment="coreutils-x86 is &lt;8.12-6.25.32.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102978" version="1" comment="cpio is &lt;2.9-75.78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102977" version="1" comment="cpio-lang is &lt;2.9-75.78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143978" version="1" comment="cron is &lt;4.1-194.211.213.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110279" version="1" comment="cups is &lt;1.3.9-8.46.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110276" version="1" comment="cups-client is &lt;1.3.9-8.46.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110278" version="1" comment="cups-libs is &lt;1.3.9-8.46.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110277" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110280" version="1" comment="cups-libs-x86 is &lt;1.3.9-8.46.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109965" version="1" comment="curl is &lt;7.19.7-1.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109967" version="1" comment="libcurl4 is &lt;7.19.7-1.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109966" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109968" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143979" version="1" comment="davfs2 is &lt;1.5.2-1.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100695" version="1" comment="dbus-1 is &lt;1.2.10-3.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100692" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100693" version="1" comment="dbus-1-x11 is &lt;1.2.10-3.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100694" version="1" comment="dbus-1-x86 is &lt;1.2.10-3.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143980" version="1" comment="dhcp is &lt;4.2.4.P2-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143981" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143982" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143983" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143984" version="1" comment="dnsmasq is &lt;2.71-0.14.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143985" version="1" comment="e2fsprogs is &lt;1.41.9-2.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143986" version="1" comment="libcom_err2 is &lt;1.41.9-2.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143987" version="1" comment="libcom_err2-32bit is &lt;1.41.9-2.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143988" version="1" comment="libcom_err2-x86 is &lt;1.41.9-2.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143989" version="1" comment="libext2fs2 is &lt;1.41.9-2.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107083" version="1" comment="elfutils is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107084" version="1" comment="libasm1 is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107090" version="1" comment="libasm1-32bit is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107086" version="1" comment="libdw1 is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107085" version="1" comment="libdw1-32bit is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107091" version="1" comment="libdw1-x86 is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107088" version="1" comment="libebl1 is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107087" version="1" comment="libebl1-32bit is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107092" version="1" comment="libebl1-x86 is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107089" version="1" comment="libelf1 is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107082" version="1" comment="libelf1-32bit is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107093" version="1" comment="libelf1-x86 is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109215" version="1" comment="emacs is &lt;22.3-4.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109216" version="1" comment="emacs-el is &lt;22.3-4.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109213" version="1" comment="emacs-info is &lt;22.3-4.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109212" version="1" comment="emacs-nox is &lt;22.3-4.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109214" version="1" comment="emacs-x11 is &lt;22.3-4.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102331" version="1" comment="evolution-data-server is &lt;2.28.2-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102329" version="1" comment="evolution-data-server-32bit is &lt;2.28.2-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102330" version="1" comment="evolution-data-server-lang is &lt;2.28.2-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102332" version="1" comment="evolution-data-server-x86 is &lt;2.28.2-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091213" version="1" comment="fastjar is &lt;0.95-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102013" version="1" comment="file is &lt;4.24-43.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102012" version="1" comment="file-32bit is &lt;4.24-43.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102016" version="1" comment="file-x86 is &lt;4.24-43.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098692" version="1" comment="freeradius-server is &lt;2.1.1-7.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098688" version="1" comment="freeradius-server-dialupadmin is &lt;2.1.1-7.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098689" version="1" comment="freeradius-server-doc is &lt;2.1.1-7.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098690" version="1" comment="freeradius-server-libs is &lt;2.1.1-7.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098691" version="1" comment="freeradius-server-utils is &lt;2.1.1-7.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110209" version="1" comment="freetype2 is &lt;2.3.7-25.35.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110208" version="1" comment="freetype2-32bit is &lt;2.3.7-25.35.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110211" version="1" comment="freetype2-x86 is &lt;2.3.7-25.35.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110210" version="1" comment="ft2demos is &lt;2.3.7-25.35.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110282" version="1" comment="fuse is &lt;2.8.7-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110283" version="1" comment="libfuse2 is &lt;2.8.7-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109218" version="1" comment="gd is &lt;2.0.36.RC1-52.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143990" version="1" comment="glib2 is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143991" version="1" comment="glib2-doc is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143992" version="1" comment="glib2-lang is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143993" version="1" comment="libgio-2_0-0 is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143994" version="1" comment="libgio-2_0-0-32bit is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143995" version="1" comment="libgio-2_0-0-x86 is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143996" version="1" comment="libglib-2_0-0 is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143997" version="1" comment="libglib-2_0-0-32bit is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143998" version="1" comment="libglib-2_0-0-x86 is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143999" version="1" comment="libgmodule-2_0-0 is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144000" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144001" version="1" comment="libgmodule-2_0-0-x86 is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144002" version="1" comment="libgobject-2_0-0 is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144003" version="1" comment="libgobject-2_0-0-32bit is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144004" version="1" comment="libgobject-2_0-0-x86 is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144005" version="1" comment="libgthread-2_0-0 is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144006" version="1" comment="libgthread-2_0-0-32bit is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144007" version="1" comment="libgthread-2_0-0-x86 is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144008" version="1" comment="glibc is &lt;2.11.3-17.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144009" version="1" comment="glibc-32bit is &lt;2.11.3-17.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144010" version="1" comment="glibc-devel is &lt;2.11.3-17.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144011" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144012" version="1" comment="glibc-html is &lt;2.11.3-17.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144013" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144014" version="1" comment="glibc-info is &lt;2.11.3-17.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144015" version="1" comment="glibc-locale is &lt;2.11.3-17.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144016" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144017" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144018" version="1" comment="glibc-profile is &lt;2.11.3-17.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144019" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144020" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144021" version="1" comment="glibc-x86 is &lt;2.11.3-17.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144022" version="1" comment="nscd is &lt;2.11.3-17.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144023" version="1" comment="gnome-screensaver is &lt;2.28.3-0.39.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144024" version="1" comment="gnome-screensaver-lang is &lt;2.28.3-0.39.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108436" version="1" comment="gnutls is &lt;2.4.1-24.39.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108435" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108438" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108437" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108439" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.39.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098771" version="1" comment="gpg2 is &lt;2.0.9-25.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098770" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099921" version="1" comment="gpgme is &lt;1.1.6-25.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099922" version="1" comment="libgpgme11 is &lt;1.1.6-25.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144025" version="1" comment="gstreamer-0_10-plugins-good is &lt;0.10.30-5.12.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144026" version="1" comment="gstreamer-0_10-plugins-good-doc is &lt;0.10.30-5.12.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144027" version="1" comment="gstreamer-0_10-plugins-good-lang is &lt;0.10.30-5.12.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144028" version="1" comment="guestfs-data is &lt;1.20.12-0.18.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144029" version="1" comment="guestfs-tools is &lt;1.20.12-0.18.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144030" version="1" comment="guestfsd is &lt;1.20.12-0.18.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144031" version="1" comment="libguestfs0 is &lt;1.20.12-0.18.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093256" version="1" comment="hplip is &lt;3.11.10-0.6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093255" version="1" comment="hplip-hpijs is &lt;3.11.10-0.6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144032" version="1" comment="hyper-v is &lt;6-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144033" version="1" comment="ibutils is &lt;1.5.7-0.15.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144034" version="1" comment="ibutils-32bit is &lt;1.5.7-0.15.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144035" version="1" comment="ipsec-tools is &lt;0.7.3-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098503" version="1" comment="jakarta-commons-fileupload is &lt;1.1.1-1.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098502" version="1" comment="jakarta-commons-fileupload-javadoc is &lt;1.1.1-1.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144036" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144037" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144038" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144039" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144040" version="1" comment="kbd is &lt;1.14.1-16.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098370" version="1" comment="kde4-kgreeter-plugins is &lt;4.3.5-0.12.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098371" version="1" comment="kdebase4-wallpapers is &lt;4.3.5-0.11.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098373" version="1" comment="kdebase4-workspace is &lt;4.3.5-0.12.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098372" version="1" comment="kdebase4-workspace-ksysguardd is &lt;4.3.5-0.12.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098374" version="1" comment="kdm is &lt;4.3.5-0.12.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098375" version="1" comment="kwin is &lt;4.3.5-0.12.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107756" version="1" comment="kdebase4-runtime is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112896" version="1" comment="kdelibs4 is &lt;4.3.5-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112897" version="1" comment="kdelibs4-core is &lt;4.3.5-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112898" version="1" comment="kdelibs4-doc is &lt;4.3.5-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112899" version="1" comment="libkde4 is &lt;4.3.5-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112900" version="1" comment="libkde4-32bit is &lt;4.3.5-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112933" version="1" comment="libkde4-x86 is &lt;4.3.5-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112901" version="1" comment="libkdecore4 is &lt;4.3.5-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112902" version="1" comment="libkdecore4-32bit is &lt;4.3.5-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112934" version="1" comment="libkdecore4-x86 is &lt;4.3.5-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098705" version="1" comment="kdirstat is &lt;2.4.4-255.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144041" version="1" comment="kernel-default is &lt;3.0.101-63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144042" version="1" comment="kernel-default-base is &lt;3.0.101-63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144043" version="1" comment="kernel-default-devel is &lt;3.0.101-63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144044" version="1" comment="kernel-default-man is &lt;3.0.101-63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144045" version="1" comment="kernel-pae is &lt;3.0.101-63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144046" version="1" comment="kernel-pae-base is &lt;3.0.101-63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144047" version="1" comment="kernel-pae-devel is &lt;3.0.101-63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144048" version="1" comment="kernel-ppc64 is &lt;3.0.101-63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144049" version="1" comment="kernel-ppc64-base is &lt;3.0.101-63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144050" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144051" version="1" comment="kernel-source is &lt;3.0.101-63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144052" version="1" comment="kernel-syms is &lt;3.0.101-63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144053" version="1" comment="kernel-trace is &lt;3.0.101-63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144054" version="1" comment="kernel-trace-base is &lt;3.0.101-63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144055" version="1" comment="kernel-trace-devel is &lt;3.0.101-63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144056" version="1" comment="kernel-xen is &lt;3.0.101-63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144057" version="1" comment="kernel-xen-base is &lt;3.0.101-63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144058" version="1" comment="kernel-xen-devel is &lt;3.0.101-63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107541" version="1" comment="krb5 is &lt;1.6.3-133.49.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107539" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107542" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107543" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107540" version="1" comment="krb5-client is &lt;1.6.3-133.49.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107538" version="1" comment="krb5-server is &lt;1.6.3-133.49.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107547" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107544" version="1" comment="krb5-doc is &lt;1.6.3-133.49.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107545" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107546" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144059" version="1" comment="kvm is &lt;1.4.2-30.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091580" version="1" comment="lcms is &lt;1.17-77.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091583" version="1" comment="liblcms1 is &lt;1.17-77.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091581" version="1" comment="liblcms1-32bit is &lt;1.17-77.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091582" version="1" comment="liblcms1-x86 is &lt;1.17-77.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144060" version="1" comment="ldapsmb is &lt;1.34b-12.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144061" version="1" comment="libldb1 is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144062" version="1" comment="libsmbclient0 is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144063" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144064" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144065" version="1" comment="libtalloc2 is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144066" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144067" version="1" comment="libtalloc2-x86 is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144068" version="1" comment="libtdb1 is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144069" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144070" version="1" comment="libtdb1-x86 is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144071" version="1" comment="libtevent0 is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144072" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144073" version="1" comment="libwbclient0 is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144074" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144075" version="1" comment="libwbclient0-x86 is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144076" version="1" comment="samba is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144077" version="1" comment="samba-32bit is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144078" version="1" comment="samba-client is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144079" version="1" comment="samba-client-32bit is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144080" version="1" comment="samba-client-x86 is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144081" version="1" comment="samba-krb-printing is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144082" version="1" comment="samba-winbind is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144083" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144084" version="1" comment="samba-winbind-x86 is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144085" version="1" comment="samba-x86 is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102504" version="1" comment="libFLAC++6 is &lt;1.2.1-68.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102506" version="1" comment="libFLAC8 is &lt;1.2.1-68.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102505" version="1" comment="libFLAC8-32bit is &lt;1.2.1-68.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102507" version="1" comment="libFLAC8-x86 is &lt;1.2.1-68.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102727" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102726" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110009" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109994" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109995" version="1" comment="libQtWebKit4-x86 is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110019" version="1" comment="libqt4 is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110010" version="1" comment="libqt4-32bit is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110012" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110011" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110020" version="1" comment="libqt4-qt3support-x86 is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110016" version="1" comment="libqt4-sql is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110013" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110014" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110015" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110021" version="1" comment="libqt4-sql-x86 is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110018" version="1" comment="libqt4-x11 is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110017" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110022" version="1" comment="libqt4-x11-x86 is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110023" version="1" comment="libqt4-x86 is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110024" version="1" comment="qt4-x11-tools is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144086" version="1" comment="libapr-util1 is &lt;1.3.4-12.22.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144087" version="1" comment="libapr-util1-32bit is &lt;1.3.4-12.22.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144088" version="1" comment="libapr-util1-dbd-sqlite3 is &lt;1.3.4-12.22.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144089" version="1" comment="libapr1 is &lt;1.3.3-11.18.19.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144090" version="1" comment="libapr1-32bit is &lt;1.3.3-11.18.19.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144091" version="1" comment="libblkid1 is &lt;2.19.1-6.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144092" version="1" comment="libblkid1-32bit is &lt;2.19.1-6.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144093" version="1" comment="libblkid1-x86 is &lt;2.19.1-6.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144094" version="1" comment="libuuid1 is &lt;2.19.1-6.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144095" version="1" comment="libuuid1-32bit is &lt;2.19.1-6.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144096" version="1" comment="libuuid1-x86 is &lt;2.19.1-6.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144097" version="1" comment="util-linux is &lt;2.19.1-6.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144098" version="1" comment="util-linux-lang is &lt;2.19.1-6.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144099" version="1" comment="uuid-runtime is &lt;2.19.1-6.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144100" version="1" comment="libcgroup1 is &lt;0.41.rc1-2.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144101" version="1" comment="libdrm is &lt;2.4.52-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144102" version="1" comment="libdrm-32bit is &lt;2.4.52-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144103" version="1" comment="libdrm-x86 is &lt;2.4.52-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144104" version="1" comment="libecpg6 is &lt;9.4.4-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144105" version="1" comment="libpq5 is &lt;9.4.4-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144106" version="1" comment="libpq5-32bit is &lt;9.4.4-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144107" version="1" comment="postgresql94 is &lt;9.4.4-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144108" version="1" comment="postgresql94-contrib is &lt;9.4.4-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144109" version="1" comment="postgresql94-docs is &lt;9.4.4-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144110" version="1" comment="postgresql94-server is &lt;9.4.4-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112617" version="1" comment="libevent-1_4-2 is &lt;1.4.5-24.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107502" version="1" comment="libfreebl3 is &lt;3.17.3-0.8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107501" version="1" comment="libfreebl3-32bit is &lt;3.17.3-0.8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107508" version="1" comment="libfreebl3-x86 is &lt;3.17.3-0.8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107504" version="1" comment="libsoftokn3 is &lt;3.17.3-0.8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107503" version="1" comment="libsoftokn3-32bit is &lt;3.17.3-0.8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107509" version="1" comment="libsoftokn3-x86 is &lt;3.17.3-0.8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107507" version="1" comment="mozilla-nss is &lt;3.17.3-0.8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107505" version="1" comment="mozilla-nss-32bit is &lt;3.17.3-0.8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107506" version="1" comment="mozilla-nss-tools is &lt;3.17.3-0.8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107510" version="1" comment="mozilla-nss-x86 is &lt;3.17.3-0.8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144111" version="1" comment="libgcc_s1 is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144112" version="1" comment="libgcc_s1-32bit is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144113" version="1" comment="libgcc_s1-x86 is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144114" version="1" comment="libgfortran3 is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144115" version="1" comment="libgomp1 is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144116" version="1" comment="libgomp1-32bit is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144117" version="1" comment="libquadmath0 is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144118" version="1" comment="libstdc++6 is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144119" version="1" comment="libstdc++6-32bit is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144120" version="1" comment="libstdc++6-x86 is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099938" version="1" comment="libgcrypt11 is &lt;1.5.0-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099936" version="1" comment="libgcrypt11-32bit is &lt;1.5.0-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099937" version="1" comment="libgcrypt11-x86 is &lt;1.5.0-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144121" version="1" comment="libgtop is &lt;2.28.0-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144122" version="1" comment="libgtop-2_0-7 is &lt;2.28.0-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144123" version="1" comment="libgtop-doc is &lt;2.28.0-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144124" version="1" comment="libgtop-lang is &lt;2.28.0-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106033" version="1" comment="libjasper is &lt;1.900.1-134.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106032" version="1" comment="libjasper-32bit is &lt;1.900.1-134.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106034" version="1" comment="libjasper-x86 is &lt;1.900.1-134.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102976" version="1" comment="libksba is &lt;1.0.4-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098769" version="1" comment="liblzo2-2 is &lt;2.03-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098767" version="1" comment="liblzo2-2-32bit is &lt;2.03-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098768" version="1" comment="liblzo2-2-x86 is &lt;2.03-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144125" version="1" comment="libmpfr1 is &lt;2.3.2-3.118.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144126" version="1" comment="libmpfr1-32bit is &lt;2.3.2-3.118.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112935" version="1" comment="libmpfr1-x86 is &lt;2.3.2-3.118.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107714" version="1" comment="libmspack0 is &lt;0.0.20060920alpha-74.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109861" version="1" comment="libmysql55client18 is &lt;5.5.43-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109860" version="1" comment="libmysql55client18-32bit is &lt;5.5.43-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109865" version="1" comment="libmysql55client18-x86 is &lt;5.5.43-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109862" version="1" comment="libmysql55client_r18 is &lt;5.5.43-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109858" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.43-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109859" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.43-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109864" version="1" comment="mysql is &lt;5.5.43-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109863" version="1" comment="mysql-client is &lt;5.5.43-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109866" version="1" comment="mysql-tools is &lt;5.5.43-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108147" version="1" comment="libmysqlclient15 is &lt;5.0.96-0.6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108146" version="1" comment="libmysqlclient15-32bit is &lt;5.0.96-0.6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108152" version="1" comment="libmysqlclient15-x86 is &lt;5.0.96-0.6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108148" version="1" comment="libmysqlclient_r15 is &lt;5.0.96-0.6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107900" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107897" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107899" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107898" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107971" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107902" version="1" comment="openssl is &lt;0.9.8j-0.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107901" version="1" comment="openssl-doc is &lt;0.9.8j-0.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092675" version="1" comment="libpixman-1-0 is &lt;0.24.4-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092673" version="1" comment="libpixman-1-0-32bit is &lt;0.24.4-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092674" version="1" comment="libpixman-1-0-x86 is &lt;0.24.4-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098501" version="1" comment="libpng12-0 is &lt;1.2.31-5.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098499" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098500" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098332" version="1" comment="libpoppler-glib4 is &lt;0.12.3-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098333" version="1" comment="libpoppler-qt4-3 is &lt;0.12.3-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098334" version="1" comment="libpoppler5 is &lt;0.12.3-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098335" version="1" comment="poppler-tools is &lt;0.12.3-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144127" version="1" comment="libpulse-browse0 is &lt;0.9.23-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144128" version="1" comment="libpulse-mainloop-glib0 is &lt;0.9.23-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144129" version="1" comment="libpulse-mainloop-glib0-32bit is &lt;0.9.23-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144130" version="1" comment="libpulse-mainloop-glib0-x86 is &lt;0.9.23-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144131" version="1" comment="libpulse0 is &lt;0.9.23-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144132" version="1" comment="libpulse0-32bit is &lt;0.9.23-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144133" version="1" comment="libpulse0-x86 is &lt;0.9.23-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144134" version="1" comment="pulseaudio is &lt;0.9.23-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144135" version="1" comment="pulseaudio-esound-compat is &lt;0.9.23-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144136" version="1" comment="pulseaudio-gdm-hooks is &lt;0.9.23-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144137" version="1" comment="pulseaudio-lang is &lt;0.9.23-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144138" version="1" comment="pulseaudio-module-x11 is &lt;0.9.23-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144139" version="1" comment="pulseaudio-module-zeroconf is &lt;0.9.23-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144140" version="1" comment="pulseaudio-utils is &lt;0.9.23-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144141" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144142" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144143" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144144" version="1" comment="python-base is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144145" version="1" comment="python-base-32bit is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144146" version="1" comment="python-base-x86 is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144147" version="1" comment="python-xml is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144148" version="1" comment="libtirpc1 is &lt;0.2.1-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105659" version="1" comment="libsndfile is &lt;1.0.20-2.6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105658" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105660" version="1" comment="libsndfile-x86 is &lt;1.0.20-2.6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100007" version="1" comment="libsnmp15 is &lt;5.4.2.1-8.12.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100005" version="1" comment="libsnmp15-32bit is &lt;5.4.2.1-8.12.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100006" version="1" comment="libsnmp15-x86 is &lt;5.4.2.1-8.12.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100008" version="1" comment="net-snmp is &lt;5.4.2.1-8.12.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100009" version="1" comment="perl-SNMP is &lt;5.4.2.1-8.12.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100010" version="1" comment="snmp-mibs is &lt;5.4.2.1-8.12.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108442" version="1" comment="libssh2-1 is &lt;1.2.9-4.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144149" version="1" comment="libsss_idmap0 is &lt;1.9.4-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144150" version="1" comment="python-sssd-config is &lt;1.9.4-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144151" version="1" comment="sssd is &lt;1.9.4-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144152" version="1" comment="sssd-32bit is &lt;1.9.4-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144153" version="1" comment="sssd-tools is &lt;1.9.4-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109685" version="1" comment="libtasn1 is &lt;1.5-1.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109684" version="1" comment="libtasn1-3 is &lt;1.5-1.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109683" version="1" comment="libtasn1-3-32bit is &lt;1.5-1.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109686" version="1" comment="libtasn1-3-x86 is &lt;1.5-1.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144154" version="1" comment="libtevent0-x86 is &lt;3.6.3-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091279" version="1" comment="libtiff3 is &lt;3.8.2-141.154.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091277" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.154.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091278" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.154.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091280" version="1" comment="tiff is &lt;3.8.2-141.154.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144155" version="1" comment="libtspi1 is &lt;0.3.10-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144156" version="1" comment="libtspi1-32bit is &lt;0.3.10-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144157" version="1" comment="libtspi1-x86 is &lt;0.3.10-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144158" version="1" comment="trousers is &lt;0.3.10-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144159" version="1" comment="libvirt is &lt;1.2.5-3.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144160" version="1" comment="libvirt-client is &lt;1.2.5-3.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144161" version="1" comment="libvirt-client-32bit is &lt;1.2.5-3.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144162" version="1" comment="libvirt-doc is &lt;1.2.5-3.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144163" version="1" comment="libvirt-lock-sanlock is &lt;1.2.5-3.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101875" version="1" comment="libwsman1 is &lt;2.2.3-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101876" version="1" comment="openwsman-client is &lt;2.2.3-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101877" version="1" comment="openwsman-server is &lt;2.2.3-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144164" version="1" comment="suseRegister is &lt;1.4-1.38.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144165" version="1" comment="pam-modules is &lt;11-1.25.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144166" version="1" comment="pam-modules-32bit is &lt;11-1.25.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144167" version="1" comment="pam-modules-x86 is &lt;11-1.25.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144168" version="1" comment="pwdutils is &lt;3.2.15-0.17.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144169" version="1" comment="pwdutils-plugin-audit is &lt;3.2.15-0.17.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101725" version="1" comment="libxml2 is &lt;2.7.6-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101723" version="1" comment="libxml2-32bit is &lt;2.7.6-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101726" version="1" comment="libxml2-doc is &lt;2.7.6-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101727" version="1" comment="libxml2-x86 is &lt;2.7.6-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091329" version="1" comment="libxslt is &lt;1.1.24-19.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091327" version="1" comment="libxslt-32bit is &lt;1.1.24-19.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091328" version="1" comment="libxslt-x86 is &lt;1.1.24-19.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144170" version="1" comment="logrotate is &lt;3.7.7-10.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144171" version="1" comment="logwatch is &lt;7.3.6-65.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144172" version="1" comment="lvm2 is &lt;2.02.98-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144173" version="1" comment="lxc is &lt;0.8.0-0.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144174" version="1" comment="mailx is &lt;12.5-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109245" version="1" comment="mono-core is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109251" version="1" comment="mono-data is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109248" version="1" comment="mono-data-postgresql is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109249" version="1" comment="mono-data-sqlite is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109255" version="1" comment="mono-locale-extras is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109256" version="1" comment="mono-nunit is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109258" version="1" comment="mono-web is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109259" version="1" comment="mono-winforms is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101265" version="1" comment="mozilla-nspr is &lt;4.10.7-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101264" version="1" comment="mozilla-nspr-32bit is &lt;4.10.7-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101271" version="1" comment="mozilla-nspr-x86 is &lt;4.10.7-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109091" version="1" comment="mutt is &lt;1.5.17-42.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098667" version="1" comment="nagios is &lt;3.0.6-1.25.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098666" version="1" comment="nagios-www is &lt;3.0.6-1.25.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098716" version="1" comment="nagios-nrpe is &lt;2.12-24.4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098715" version="1" comment="nagios-nrpe-doc is &lt;2.12-24.4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098717" version="1" comment="nagios-plugins-nrpe is &lt;2.12-24.4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101145" version="1" comment="nagios-plugins is &lt;1.4.16-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101144" version="1" comment="nagios-plugins-extras is &lt;1.4.16-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144175" version="1" comment="nfs-client is &lt;1.2.3-18.38.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144176" version="1" comment="nfs-doc is &lt;1.2.3-18.38.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144177" version="1" comment="nfs-kernel-server is &lt;1.2.3-18.38.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144178" version="1" comment="ntp is &lt;4.2.8p2-2.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144179" version="1" comment="ntp-doc is &lt;4.2.8p2-2.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144180" version="1" comment="ofed is &lt;1.5.4.1-20.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144181" version="1" comment="ofed-doc is &lt;1.5.4.1-20.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144182" version="1" comment="ofed-kmp-default is &lt;1.5.4.1_3.0.101_63-20.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144183" version="1" comment="ofed-kmp-pae is &lt;1.5.4.1_3.0.101_63-20.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144184" version="1" comment="ofed-kmp-ppc64 is &lt;1.5.4.1_3.0.101_63-20.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144185" version="1" comment="ofed-kmp-trace is &lt;1.5.4.1_3.0.101_63-20.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144186" version="1" comment="openCryptoki is &lt;3.2-0.11.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144187" version="1" comment="openCryptoki-32bit is &lt;3.2-0.11.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144188" version="1" comment="openCryptoki-64bit is &lt;3.2-0.11.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109700" version="1" comment="openslp is &lt;1.2.0-172.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109699" version="1" comment="openslp-32bit is &lt;1.2.0-172.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109698" version="1" comment="openslp-server is &lt;1.2.0-172.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109701" version="1" comment="openslp-x86 is &lt;1.2.0-172.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144189" version="1" comment="openssh is &lt;6.6p1-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144190" version="1" comment="openssh-fips is &lt;6.6p1-4.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102621" version="1" comment="openvpn is &lt;2.0.9-143.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102622" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144191" version="1" comment="pam is &lt;1.1.5-0.15.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144192" version="1" comment="pam-32bit is &lt;1.1.5-0.15.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144193" version="1" comment="pam-doc is &lt;1.1.5-0.15.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144194" version="1" comment="pam-x86 is &lt;1.1.5-0.15.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144195" version="1" comment="perl is &lt;5.10.0-64.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144196" version="1" comment="perl-32bit is &lt;5.10.0-64.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144197" version="1" comment="perl-Module-Build is &lt;0.2808.01-0.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144198" version="1" comment="perl-Test-Simple is &lt;0.72-0.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144199" version="1" comment="perl-base is &lt;5.10.0-64.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144200" version="1" comment="perl-doc is &lt;5.10.0-64.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144201" version="1" comment="perl-x86 is &lt;5.10.0-64.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144202" version="1" comment="popt is &lt;1.7-37.63.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144203" version="1" comment="popt-32bit is &lt;1.7-37.63.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144204" version="1" comment="popt-x86 is &lt;1.7-37.63.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144205" version="1" comment="rpm is &lt;4.4.2.3-37.63.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144206" version="1" comment="rpm-32bit is &lt;4.4.2.3-37.63.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144207" version="1" comment="rpm-x86 is &lt;4.4.2.3-37.63.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144208" version="1" comment="powerpc-utils is &lt;1.2.22-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144209" version="1" comment="ppc64-diag is &lt;2.6.7-1.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099941" version="1" comment="ppp is &lt;2.4.5.git-2.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100586" version="1" comment="procmail is &lt;3.22-240.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144210" version="1" comment="puppet is &lt;2.7.26-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144211" version="1" comment="puppet-server is &lt;2.7.26-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102493" version="1" comment="pure-ftpd is &lt;1.0.22-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144212" version="1" comment="python is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144213" version="1" comment="python-32bit is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144214" version="1" comment="python-curses is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144215" version="1" comment="python-demo is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144216" version="1" comment="python-gdbm is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144217" version="1" comment="python-idle is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144218" version="1" comment="python-tk is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144219" version="1" comment="python-x86 is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098685" version="1" comment="python-imaging is &lt;1.1.6-168.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100957" version="1" comment="python-lxml is &lt;2.3.6-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144220" version="1" comment="python-pywbem is &lt;0.7-6.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103900" version="1" comment="quagga is &lt;0.99.15-0.14.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144221" version="1" comment="radvd is &lt;1.1-1.24.8.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100967" version="1" comment="rsyslog is &lt;5.10.1-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100958" version="1" comment="rsyslog-diag-tools is &lt;5.10.1-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100959" version="1" comment="rsyslog-doc is &lt;5.10.1-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100960" version="1" comment="rsyslog-module-gssapi is &lt;5.10.1-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100961" version="1" comment="rsyslog-module-gtls is &lt;5.10.1-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100962" version="1" comment="rsyslog-module-mysql is &lt;5.10.1-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100963" version="1" comment="rsyslog-module-pgsql is &lt;5.10.1-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100964" version="1" comment="rsyslog-module-relp is &lt;5.10.1-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100965" version="1" comment="rsyslog-module-snmp is &lt;5.10.1-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100966" version="1" comment="rsyslog-module-udpspoof is &lt;5.10.1-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105486" version="1" comment="ruby is &lt;1.8.7.p357-0.9.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105481" version="1" comment="ruby-doc-html is &lt;1.8.7.p357-0.9.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105485" version="1" comment="ruby-tk is &lt;1.8.7.p357-0.9.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144222" version="1" comment="sblim-sfcb is &lt;1.3.11-0.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098750" version="1" comment="sendmail is &lt;8.14.3-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102690" version="1" comment="shim is &lt;0.7.318.81ee561d-0.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090553" version="1" comment="squid is &lt;2.7.STABLE5-2.12.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100639" version="1" comment="squid3 is &lt;3.1.12-8.16.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144223" version="1" comment="star is &lt;1.5final-28.23.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098714" version="1" comment="strongswan is &lt;4.4.0-6.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098713" version="1" comment="strongswan-doc is &lt;4.4.0-6.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110042" version="1" comment="sudo is &lt;1.7.6p2-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144224" version="1" comment="sysconfig is &lt;0.71.61-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144225" version="1" comment="sysstat is &lt;8.1.5-7.50.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144226" version="1" comment="sysstat-isag is &lt;8.1.5-7.50.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144227" version="1" comment="tar is &lt;1.26-1.2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108650" version="1" comment="tcpdump is &lt;3.9.8-1.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099545" version="1" comment="tomcat6 is &lt;6.0.41-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099538" version="1" comment="tomcat6-admin-webapps is &lt;6.0.41-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099539" version="1" comment="tomcat6-docs-webapp is &lt;6.0.41-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099540" version="1" comment="tomcat6-javadoc is &lt;6.0.41-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099541" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.41-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099542" version="1" comment="tomcat6-lib is &lt;6.0.41-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099543" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.41-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099544" version="1" comment="tomcat6-webapps is &lt;6.0.41-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106835" version="1" comment="unzip is &lt;6.00-11.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091215" version="1" comment="vino is &lt;2.28.1-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091214" version="1" comment="vino-lang is &lt;2.28.1-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144228" version="1" comment="virt-utils is &lt;1.2.1-10.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144229" version="1" comment="vsftpd is &lt;2.0.7-4.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101160" version="1" comment="wget is &lt;1.11.4-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112696" version="1" comment="wireshark is &lt;1.10.13-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101152" version="1" comment="wpa_supplicant is &lt;0.7.1-6.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098512" version="1" comment="xalan-j2 is &lt;2.7.0-217.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144230" version="1" comment="xen is &lt;4.4.2_08-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144231" version="1" comment="xen-doc-html is &lt;4.4.2_08-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144232" version="1" comment="xen-kmp-default is &lt;4.4.2_08_3.0.101_63-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144233" version="1" comment="xen-kmp-pae is &lt;4.4.2_08_3.0.101_63-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144234" version="1" comment="xen-libs is &lt;4.4.2_08-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144235" version="1" comment="xen-libs-32bit is &lt;4.4.2_08-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144236" version="1" comment="xen-tools is &lt;4.4.2_08-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144237" version="1" comment="xen-tools-domU is &lt;4.4.2_08-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098336" version="1" comment="xinetd is &lt;2.3.14-130.133.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144238" version="1" comment="xorg-x11 is &lt;7.4-9.65.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144239" version="1" comment="xorg-x11-xauth is &lt;7.4-9.65.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110272" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110274" version="1" comment="xorg-x11-server is &lt;7.4-27.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110273" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103948" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103947" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.11.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077515" version="1" comment="xorg-x11-libX11-x86 is &lt;7.4-5.11.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077723" version="1" comment="xorg-x11-libXext is &lt;7.4-1.18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077722" version="1" comment="xorg-x11-libXext-32bit is &lt;7.4-1.18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077740" version="1" comment="xorg-x11-libXext-x86 is &lt;7.4-1.18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103952" version="1" comment="xorg-x11-libXfixes is &lt;7.4-1.16.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103951" version="1" comment="xorg-x11-libXfixes-32bit is &lt;7.4-1.16.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077741" version="1" comment="xorg-x11-libXfixes-x86 is &lt;7.4-1.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103964" version="1" comment="xorg-x11-libXp is &lt;7.4-1.18.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103963" version="1" comment="xorg-x11-libXp-32bit is &lt;7.4-1.18.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077523" version="1" comment="xorg-x11-libXp-x86 is &lt;7.4-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103956" version="1" comment="xorg-x11-libXrender is &lt;7.4-1.16.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103955" version="1" comment="xorg-x11-libXrender-32bit is &lt;7.4-1.16.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077743" version="1" comment="xorg-x11-libXrender-x86 is &lt;7.4-1.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103962" version="1" comment="xorg-x11-libXt is &lt;7.4-1.19.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103961" version="1" comment="xorg-x11-libXt-32bit is &lt;7.4-1.19.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077745" version="1" comment="xorg-x11-libXt-x86 is &lt;7.4-1.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103958" version="1" comment="xorg-x11-libXv is &lt;7.4-1.16.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103957" version="1" comment="xorg-x11-libXv-32bit is &lt;7.4-1.16.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077744" version="1" comment="xorg-x11-libXv-x86 is &lt;7.4-1.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108447" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108446" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108448" version="1" comment="xorg-x11-libs-x86 is &lt;7.4-8.26.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144240" version="1" comment="xorg-x11-server-rdp is &lt;7.3.99-3.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144241" version="1" comment="yast2 is &lt;2.17.140-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144242" version="1" comment="yast2-core is &lt;2.17.46-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077243" version="1" comment="GraphicsMagick is &lt;1.2.5-4.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077244" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077245" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117399" version="1" comment="sle-sdk-release is ==11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102720" version="1" comment="ImageMagick is &lt;6.4.3.6-7.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102719" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102721" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102722" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102724" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102723" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102725" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145394" version="1" comment="LibVNCServer-devel is &lt;0.9.1-154.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145395" version="1" comment="Mesa-devel is &lt;9.0.3-0.28.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145396" version="1" comment="Mesa-devel-32bit is &lt;9.0.3-0.28.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110025" version="1" comment="MozillaFirefox-devel is &lt;31.7.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145397" version="1" comment="NetworkManager-devel is &lt;0.7.1_git20090811-3.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054516" version="1" comment="OpenEXR-devel is &lt;1.6.1-83.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145398" version="1" comment="PackageKit-devel is &lt;0.3.14-2.30.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145399" version="1" comment="hal-devel is &lt;0.5.12-23.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145400" version="1" comment="libpackagekit-glib10-devel is &lt;0.3.14-2.30.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145401" version="1" comment="libpackagekit-qt10 is &lt;0.3.14-2.30.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145402" version="1" comment="libpackagekit-qt10-devel is &lt;0.3.14-2.30.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145403" version="1" comment="PolicyKit-devel is &lt;0.9-14.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054067" version="1" comment="Xerces-c is &lt;2.8.0-29.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054068" version="1" comment="libXerces-c-devel is &lt;2.8.0-29.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054069" version="1" comment="libXerces-c28 is &lt;2.8.0-29.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098881" version="1" comment="a2ps-devel is &lt;4.13-1326.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145404" version="1" comment="ant-antlr is &lt;1.7.1-16.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145405" version="1" comment="ant-apache-bcel is &lt;1.7.1-16.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145406" version="1" comment="ant-apache-bsf is &lt;1.7.1-16.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145407" version="1" comment="ant-apache-log4j is &lt;1.7.1-16.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145408" version="1" comment="ant-apache-oro is &lt;1.7.1-16.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145409" version="1" comment="ant-apache-regexp is &lt;1.7.1-16.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145410" version="1" comment="ant-apache-resolver is &lt;1.7.1-16.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145411" version="1" comment="ant-commons-logging is &lt;1.7.1-16.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145412" version="1" comment="ant-javadoc is &lt;1.7.1-20.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145413" version="1" comment="ant-javamail is &lt;1.7.1-16.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145414" version="1" comment="ant-jdepend is &lt;1.7.1-16.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145415" version="1" comment="ant-jmf is &lt;1.7.1-16.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145416" version="1" comment="ant-junit is &lt;1.7.1-16.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145417" version="1" comment="ant-manual is &lt;1.7.1-20.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145418" version="1" comment="ant-nodeps is &lt;1.7.1-16.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145419" version="1" comment="ant-scripts is &lt;1.7.1-20.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145420" version="1" comment="ant-swing is &lt;1.7.1-16.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108643" version="1" comment="apache2-devel is &lt;2.2.12-1.51.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091357" version="1" comment="apache2-mod_fcgid is &lt;2.2-31.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145421" version="1" comment="apache2-mod_perl-devel is &lt;2.0.4-40.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099546" version="1" comment="augeas-devel is &lt;0.9.0-3.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145422" version="1" comment="avahi-compat-howl-devel is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145423" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145424" version="1" comment="libavahi-devel is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145425" version="1" comment="libhowl0 is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145426" version="1" comment="python-avahi is &lt;0.6.23-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106114" version="1" comment="bind-devel is &lt;9.9.6P1-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103740" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145427" version="1" comment="binutils-devel is &lt;2.24-3.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145428" version="1" comment="binutils-devel-32bit is &lt;2.24-3.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145429" version="1" comment="binutils-gold is &lt;2.24-3.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145430" version="1" comment="cross-ppc-binutils is &lt;2.24-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145431" version="1" comment="cross-spu-binutils is &lt;2.24-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145432" version="1" comment="boinc-client is &lt;6.2.18-4.31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145433" version="1" comment="boinc-client-devel is &lt;6.2.18-4.31.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145434" version="1" comment="boost-devel is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145435" version="1" comment="boost-devel-32bit is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145436" version="1" comment="boost-doc is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145437" version="1" comment="libboost_date_time1_36_0 is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145438" version="1" comment="libboost_date_time1_36_0-32bit is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145439" version="1" comment="libboost_filesystem1_36_0 is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145440" version="1" comment="libboost_filesystem1_36_0-32bit is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145441" version="1" comment="libboost_graph1_36_0 is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145442" version="1" comment="libboost_graph1_36_0-32bit is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145443" version="1" comment="libboost_iostreams1_36_0 is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145444" version="1" comment="libboost_iostreams1_36_0-32bit is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145445" version="1" comment="libboost_math1_36_0 is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145446" version="1" comment="libboost_math1_36_0-32bit is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145447" version="1" comment="libboost_mpi1_36_0 is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145448" version="1" comment="libboost_program_options1_36_0-32bit is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145449" version="1" comment="libboost_python1_36_0 is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145450" version="1" comment="libboost_python1_36_0-32bit is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145451" version="1" comment="libboost_regex1_36_0-32bit is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145452" version="1" comment="libboost_serialization1_36_0 is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145453" version="1" comment="libboost_serialization1_36_0-32bit is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145454" version="1" comment="libboost_signals1_36_0-32bit is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145455" version="1" comment="libboost_system1_36_0 is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145456" version="1" comment="libboost_system1_36_0-32bit is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145457" version="1" comment="libboost_test1_36_0 is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145458" version="1" comment="libboost_test1_36_0-32bit is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145459" version="1" comment="libboost_thread1_36_0-32bit is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145460" version="1" comment="libboost_wave1_36_0 is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145461" version="1" comment="libboost_wave1_36_0-32bit is &lt;1.36.0-12.6.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145462" version="1" comment="build is &lt;2011.10.10-0.7.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109244" version="1" comment="bytefx-data-mysql is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109246" version="1" comment="mono-data-firebird is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109247" version="1" comment="mono-data-oracle is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109250" version="1" comment="mono-data-sybase is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109252" version="1" comment="mono-devel is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109253" version="1" comment="mono-extras is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109254" version="1" comment="mono-jscript is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109257" version="1" comment="mono-wcf is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109260" version="1" comment="mono-winfxcore is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109261" version="1" comment="monodoc-core is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145463" version="1" comment="coolkey-devel is &lt;1.1.0-22.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145464" version="1" comment="cpp48 is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145465" version="1" comment="gcc48 is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145466" version="1" comment="gcc48-32bit is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145467" version="1" comment="gcc48-c++ is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145468" version="1" comment="gcc48-fortran is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145469" version="1" comment="gcc48-fortran-32bit is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145470" version="1" comment="gcc48-info is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145471" version="1" comment="gcc48-locale is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145472" version="1" comment="libasan0 is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145473" version="1" comment="libatomic1 is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145474" version="1" comment="libgfortran3-32bit is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145475" version="1" comment="libitm1 is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145476" version="1" comment="libquadmath0-32bit is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145477" version="1" comment="libstdc++48-devel is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145478" version="1" comment="libstdc++48-devel-32bit is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145479" version="1" comment="libtsan0 is &lt;4.8.3+r212056-2.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145480" version="1" comment="cscope is &lt;15.6-95.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098799" version="1" comment="ctdb-devel is &lt;1.0.114.6-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110275" version="1" comment="cups-devel is &lt;1.3.9-8.46.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071590" version="1" comment="cyrus-imapd-devel is &lt;2.3.11-60.65.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100697" version="1" comment="dbus-1-devel is &lt;1.2.10-3.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100696" version="1" comment="dbus-1-devel-doc is &lt;1.2.10-3.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145481" version="1" comment="dbus-1-glib-devel is &lt;0.76-34.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145482" version="1" comment="derby is &lt;10.3.1.4-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145483" version="1" comment="dhcp-devel is &lt;4.2.4.P2-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145484" version="1" comment="e2fsprogs-devel is &lt;1.41.9-2.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145485" version="1" comment="libcom_err-devel is &lt;1.41.9-2.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145486" version="1" comment="libcom_err-devel-32bit is &lt;1.41.9-2.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145487" version="1" comment="libext2fs-devel is &lt;1.41.9-2.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145488" version="1" comment="libext2fs-devel-32bit is &lt;1.41.9-2.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145489" version="1" comment="libext2fs2-32bit is &lt;1.41.9-2.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145490" version="1" comment="libext2fs2-x86 is &lt;1.41.9-2.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145491" version="1" comment="empathy is &lt;2.28.2-0.13.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145492" version="1" comment="empathy-devel is &lt;2.28.2-0.13.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145493" version="1" comment="empathy-lang is &lt;2.28.2-0.13.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145494" version="1" comment="evince-devel is &lt;2.28.2-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145495" version="1" comment="evolution is &lt;2.28.2-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145496" version="1" comment="evolution-devel is &lt;2.28.2-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145497" version="1" comment="evolution-lang is &lt;2.28.2-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102328" version="1" comment="evolution-data-server-devel is &lt;2.28.2-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102014" version="1" comment="file-devel is &lt;4.24-43.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145498" version="1" comment="fileshareset is &lt;2.0-20.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145499" version="1" comment="kdebase3 is &lt;3.5.10-20.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145500" version="1" comment="kdebase3-32bit is &lt;3.5.10-20.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145501" version="1" comment="kdebase3-devel is &lt;3.5.10-20.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145502" version="1" comment="misc-console-font is &lt;3.5.10-20.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102692" version="1" comment="finch is &lt;2.6.6-0.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102691" version="1" comment="finch-devel is &lt;2.6.6-0.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102695" version="1" comment="libpurple is &lt;2.6.6-0.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102693" version="1" comment="libpurple-devel is &lt;2.6.6-0.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102694" version="1" comment="libpurple-lang is &lt;2.6.6-0.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102697" version="1" comment="pidgin is &lt;2.6.6-0.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102696" version="1" comment="pidgin-devel is &lt;2.6.6-0.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102501" version="1" comment="flac-devel is &lt;1.2.1-68.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102502" version="1" comment="libFLAC++6-32bit is &lt;1.2.1-68.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102503" version="1" comment="libFLAC++6-x86 is &lt;1.2.1-68.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098917" version="1" comment="freeradius-server-devel is &lt;2.1.1-7.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110207" version="1" comment="freetype2-devel is &lt;2.3.7-25.35.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110206" version="1" comment="freetype2-devel-32bit is &lt;2.3.7-25.35.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110281" version="1" comment="fuse-devel is &lt;2.8.7-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109217" version="1" comment="gd-devel is &lt;2.0.36.RC1-52.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074871" version="1" comment="gdk-pixbuf is &lt;0.22.0-294.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074870" version="1" comment="gdk-pixbuf-32bit is &lt;0.22.0-294.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074890" version="1" comment="gdk-pixbuf-devel is &lt;0.22.0-294.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075774" version="1" comment="ghostscript-devel is &lt;8.62-32.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075775" version="1" comment="ghostscript-ijs-devel is &lt;8.62-32.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075776" version="1" comment="libgimpprint-devel is &lt;4.2.7-32.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093459" version="1" comment="gimp is &lt;2.6.2-3.34.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093456" version="1" comment="gimp-devel is &lt;2.6.2-3.34.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093457" version="1" comment="gimp-lang is &lt;2.6.2-3.34.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093458" version="1" comment="gimp-plugins-python is &lt;2.6.2-3.34.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105496" version="1" comment="git is &lt;1.7.12.4-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105488" version="1" comment="git-arch is &lt;1.7.12.4-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105489" version="1" comment="git-core is &lt;1.7.12.4-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105490" version="1" comment="git-cvs is &lt;1.7.12.4-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105491" version="1" comment="git-daemon is &lt;1.7.12.4-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105492" version="1" comment="git-email is &lt;1.7.12.4-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105493" version="1" comment="git-gui is &lt;1.7.12.4-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105494" version="1" comment="git-svn is &lt;1.7.12.4-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105495" version="1" comment="git-web is &lt;1.7.12.4-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105497" version="1" comment="gitk is &lt;1.7.12.4-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145503" version="1" comment="glib2-devel is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145504" version="1" comment="glib2-devel-32bit is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145505" version="1" comment="libgio-fam is &lt;2.22.5-0.8.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145506" version="1" comment="gmime-2_4-devel is &lt;2.4.8-1.2.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145507" version="1" comment="gmime-devel is &lt;2.2.23-1.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145508" version="1" comment="gmime-sharp is &lt;2.2.23-1.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145509" version="1" comment="gnucash is &lt;2.2.7-1.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145510" version="1" comment="gnucash-devel is &lt;2.2.7-1.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145511" version="1" comment="gnucash-lang is &lt;2.2.7-1.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145512" version="1" comment="gstreamer-0_10-plugins-base-devel is &lt;0.10.35-5.15.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074873" version="1" comment="gtk2-devel is &lt;2.18.9-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074891" version="1" comment="gtk2-devel-32bit is &lt;2.18.9-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145513" version="1" comment="ibutils-devel is &lt;1.5.7-0.15.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145514" version="1" comment="ibutils-devel-32bit is &lt;1.5.7-0.15.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076346" version="1" comment="icu is &lt;4.0-7.26.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076352" version="1" comment="libicu-devel is &lt;4.0-7.26.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076351" version="1" comment="libicu-devel-32bit is &lt;4.0-7.26.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145515" version="1" comment="imlib is &lt;1.9.14-401.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145516" version="1" comment="imlib-32bit is &lt;1.9.14-401.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145517" version="1" comment="imlib-config is &lt;1.9.14-401.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145518" version="1" comment="imlib-devel is &lt;1.9.14-401.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145519" version="1" comment="imlib-x86 is &lt;1.9.14-401.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145520" version="1" comment="imlib2 is &lt;1.4.2-2.18.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145521" version="1" comment="imlib2-devel is &lt;1.4.2-2.18.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145522" version="1" comment="imlib2-filters is &lt;1.4.2-2.18.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145523" version="1" comment="imlib2-loaders is &lt;1.4.2-2.18.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145524" version="1" comment="inkscape is &lt;0.46-62.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145525" version="1" comment="inkscape-extensions-dia is &lt;0.46-62.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145526" version="1" comment="inkscape-extensions-extra is &lt;0.46-62.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145527" version="1" comment="inkscape-extensions-fig is &lt;0.46-62.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145528" version="1" comment="inkscape-extensions-gimp is &lt;0.46-62.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145529" version="1" comment="inkscape-lang is &lt;0.46-62.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145530" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098798" version="1" comment="kdebase4-workspace-devel is &lt;4.3.5-0.12.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056620" version="1" comment="kdelibs3-arts is &lt;3.5.10-23.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056618" version="1" comment="kdelibs3-arts-32bit is &lt;3.5.10-23.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056619" version="1" comment="kdelibs3-arts-x86 is &lt;3.5.10-23.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056621" version="1" comment="kdelibs3-devel is &lt;3.5.10-23.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056622" version="1" comment="kdelibs3-doc is &lt;3.5.10-23.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116235" version="1" comment="libkde4-devel is &lt;4.3.5-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116236" version="1" comment="libkdecore4-devel is &lt;4.3.5-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145531" version="1" comment="kernel-docs is &lt;3.0.101-63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065203" version="1" comment="kopete-devel is &lt;4.3.5-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107537" version="1" comment="krb5-devel is &lt;1.6.3-133.49.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107536" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109993" version="1" comment="libQtWebKit-devel is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109998" version="1" comment="libqt4-devel is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109997" version="1" comment="libqt4-devel-doc is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109996" version="1" comment="libqt4-devel-doc-data is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109999" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110000" version="1" comment="libqt4-sql-mysql-x86 is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110003" version="1" comment="libqt4-sql-postgresql is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110001" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110002" version="1" comment="libqt4-sql-postgresql-x86 is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110004" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110005" version="1" comment="libqt4-sql-sqlite-x86 is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110008" version="1" comment="libqt4-sql-unixODBC is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110006" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110007" version="1" comment="libqt4-sql-unixODBC-x86 is &lt;4.6.3-5.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145532" version="1" comment="libadns-devel is &lt;1.4-73.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145533" version="1" comment="libapr-util1-devel is &lt;1.3.4-12.22.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145534" version="1" comment="libapr-util1-devel-32bit is &lt;1.3.4-12.22.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145535" version="1" comment="libapr1-devel is &lt;1.3.3-11.18.19.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145536" version="1" comment="libapr1-devel-32bit is &lt;1.3.3-11.18.19.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145537" version="1" comment="libarchive-devel is &lt;2.5.5-5.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107078" version="1" comment="libasm-devel is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107079" version="1" comment="libdw-devel is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107080" version="1" comment="libebl-devel is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107081" version="1" comment="libelf-devel is &lt;0.152-4.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145538" version="1" comment="libblkid-devel is &lt;2.19.1-6.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145539" version="1" comment="libblkid-devel-32bit is &lt;2.19.1-6.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145540" version="1" comment="libuuid-devel is &lt;2.19.1-6.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145541" version="1" comment="libuuid-devel-32bit is &lt;2.19.1-6.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145542" version="1" comment="libbz2-devel is &lt;1.0.5-34.253.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145543" version="1" comment="libcap-devel is &lt;2.11-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145544" version="1" comment="libcgroup-devel is &lt;0.41.rc1-2.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109964" version="1" comment="libcurl-devel is &lt;7.19.7-1.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067210" version="1" comment="libdhcp6client-1_0-2 is &lt;1.0.22-3.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067211" version="1" comment="libdhcp6client-devel is &lt;1.0.22-3.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145545" version="1" comment="libdrm-devel is &lt;2.4.52-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145546" version="1" comment="libdrm-devel-32bit is &lt;2.4.52-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116240" version="1" comment="libevent-devel is &lt;1.4.5-24.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075065" version="1" comment="libexif-devel is &lt;0.6.17-2.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145547" version="1" comment="libexiv2-4-32bit is &lt;0.17.1-31.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145548" version="1" comment="libexiv2-4-x86 is &lt;0.17.1-31.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145549" version="1" comment="libexiv2-devel is &lt;0.17.1-31.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074697" version="1" comment="libexpat-devel is &lt;2.0.1-88.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098828" version="1" comment="libgadu is &lt;1.8.2-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098827" version="1" comment="libgadu-devel is &lt;1.8.2-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099940" version="1" comment="libgcrypt-devel is &lt;1.5.0-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099939" version="1" comment="libgcrypt-devel-32bit is &lt;1.5.0-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069324" version="1" comment="libgnomesu-devel is &lt;1.0.0-307.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108433" version="1" comment="libgnutls-devel is &lt;2.4.1-24.39.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108434" version="1" comment="libgnutls-extra-devel is &lt;2.4.1-24.39.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099933" version="1" comment="libgpgme-devel is &lt;1.1.6-25.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099934" version="1" comment="libgpgme11-32bit is &lt;1.1.6-25.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099935" version="1" comment="libgpgme11-x86 is &lt;1.1.6-25.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145550" version="1" comment="libgtop-2_0-7-32bit is &lt;2.28.0-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145551" version="1" comment="libgtop-2_0-7-x86 is &lt;2.28.0-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145552" version="1" comment="libgtop-devel is &lt;2.28.0-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145553" version="1" comment="libguestfs-devel is &lt;1.20.12-0.18.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145554" version="1" comment="libid3tag is &lt;0.15.1b-130.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145555" version="1" comment="libid3tag-devel is &lt;0.15.1b-130.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106031" version="1" comment="libjasper-devel is &lt;1.900.1-134.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075214" version="1" comment="libjpeg-devel is &lt;6.2.0-879.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075213" version="1" comment="libjpeg-devel-32bit is &lt;6.2.0-879.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102975" version="1" comment="libksba-devel is &lt;1.0.4-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091592" version="1" comment="liblcms-devel is &lt;1.17-77.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091591" version="1" comment="liblcms-devel-32bit is &lt;1.17-77.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091593" version="1" comment="python-lcms is &lt;1.17-77.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145556" version="1" comment="libldb-devel is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145557" version="1" comment="libnetapi-devel is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145558" version="1" comment="libnetapi0 is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145559" version="1" comment="libsmbclient-devel is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145560" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145561" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145562" version="1" comment="libtalloc-devel is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145563" version="1" comment="libtdb-devel is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145564" version="1" comment="libtevent-devel is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145565" version="1" comment="libwbclient-devel is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145566" version="1" comment="samba-devel is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145567" version="1" comment="samba-test is &lt;3.6.3-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060145" version="1" comment="libmikmod is &lt;3.1.11a-116.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060144" version="1" comment="libmikmod-devel is &lt;3.1.11a-116.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116243" version="1" comment="mpfr-devel is &lt;2.3.2-3.118.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116244" version="1" comment="mpfr-devel-32bit is &lt;2.3.2-3.118.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107713" version="1" comment="libmspack-devel is &lt;0.0.20060920alpha-74.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145568" version="1" comment="libmusicbrainz-devel is &lt;2.1.5-5.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076526" version="1" comment="libmysqlclient-devel is &lt;5.0.96-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108141" version="1" comment="libmysqlclient_r15-32bit is &lt;5.0.96-0.6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108142" version="1" comment="libmysqlclient_r15-x86 is &lt;5.0.96-0.6.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145569" version="1" comment="libneon-devel is &lt;0.29.6-6.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058601" version="1" comment="libnetpbm-devel is &lt;10.26.44-101.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058600" version="1" comment="libnetpbm-devel-32bit is &lt;10.26.44-101.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145570" version="1" comment="newt-devel is &lt;0.52.10-1.35.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145571" version="1" comment="newt-static is &lt;0.52.10-1.35.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107896" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076093" version="1" comment="libotr-devel is &lt;3.2.0-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076437" version="1" comment="libpcp3 is &lt;3.6.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076443" version="1" comment="pcp is &lt;3.6.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076438" version="1" comment="pcp-devel is &lt;3.6.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076439" version="1" comment="pcp-import-iostat2pcp is &lt;3.6.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076440" version="1" comment="pcp-import-mrtg2pcp is &lt;3.6.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076441" version="1" comment="pcp-import-sar2pcp is &lt;3.6.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076442" version="1" comment="pcp-import-sheet2pcp is &lt;3.6.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076444" version="1" comment="perl-PCP-LogImport is &lt;3.6.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076445" version="1" comment="perl-PCP-LogSummary is &lt;3.6.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076446" version="1" comment="perl-PCP-MMV is &lt;3.6.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076447" version="1" comment="perl-PCP-PMDA is &lt;3.6.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092701" version="1" comment="libpixman-1-0-devel is &lt;0.24.4-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098836" version="1" comment="libpng-devel is &lt;1.2.31-5.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098835" version="1" comment="libpng-devel-32bit is &lt;1.2.31-5.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098773" version="1" comment="libpoppler-devel is &lt;0.12.3-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098774" version="1" comment="libpoppler-glib-devel is &lt;0.12.3-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098775" version="1" comment="libpoppler-qt2 is &lt;0.12.3-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098776" version="1" comment="libpoppler-qt3-devel is &lt;0.12.3-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098777" version="1" comment="libpoppler-qt4-devel is &lt;0.12.3-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076278" version="1" comment="libproxy-devel is &lt;0.3.1-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145572" version="1" comment="libpulse-devel is &lt;0.9.23-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145573" version="1" comment="readline-devel is &lt;5.2-147.27.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145574" version="1" comment="readline-devel-32bit is &lt;5.2-147.27.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102439" version="1" comment="libreoffice is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102366" version="1" comment="libreoffice-base is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102364" version="1" comment="libreoffice-base-drivers-postgresql is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102365" version="1" comment="libreoffice-base-extensions is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102369" version="1" comment="libreoffice-calc is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102368" version="1" comment="libreoffice-calc-extensions is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102371" version="1" comment="libreoffice-draw is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102370" version="1" comment="libreoffice-draw-extensions is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102372" version="1" comment="libreoffice-filters-optional is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102373" version="1" comment="libreoffice-gnome is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102397" version="1" comment="libreoffice-impress is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102396" version="1" comment="libreoffice-impress-extensions is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102399" version="1" comment="libreoffice-kde is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102398" version="1" comment="libreoffice-kde4 is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102421" version="1" comment="libreoffice-l10n-prebuilt is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102431" version="1" comment="libreoffice-mailmerge is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102432" version="1" comment="libreoffice-math is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102433" version="1" comment="libreoffice-mono is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102434" version="1" comment="libreoffice-officebean is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102435" version="1" comment="libreoffice-pyuno is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102436" version="1" comment="libreoffice-sdk is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102438" version="1" comment="libreoffice-writer is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102437" version="1" comment="libreoffice-writer-extensions is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102367" version="1" comment="libreoffice-branding-upstream is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102395" version="1" comment="libreoffice-icon-themes is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102400" version="1" comment="libreoffice-l10n-af is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102401" version="1" comment="libreoffice-l10n-ar is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102402" version="1" comment="libreoffice-l10n-ca is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102403" version="1" comment="libreoffice-l10n-cs is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102404" version="1" comment="libreoffice-l10n-da is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102405" version="1" comment="libreoffice-l10n-de is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102406" version="1" comment="libreoffice-l10n-el is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102407" version="1" comment="libreoffice-l10n-en-GB is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102408" version="1" comment="libreoffice-l10n-es is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102409" version="1" comment="libreoffice-l10n-fi is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102410" version="1" comment="libreoffice-l10n-fr is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102411" version="1" comment="libreoffice-l10n-gu-IN is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102412" version="1" comment="libreoffice-l10n-hi-IN is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102413" version="1" comment="libreoffice-l10n-hu is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102414" version="1" comment="libreoffice-l10n-it is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102415" version="1" comment="libreoffice-l10n-ja is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102416" version="1" comment="libreoffice-l10n-ko is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102417" version="1" comment="libreoffice-l10n-nb is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102418" version="1" comment="libreoffice-l10n-nl is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102419" version="1" comment="libreoffice-l10n-nn is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102420" version="1" comment="libreoffice-l10n-pl is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102423" version="1" comment="libreoffice-l10n-pt is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102422" version="1" comment="libreoffice-l10n-pt-BR is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102424" version="1" comment="libreoffice-l10n-ru is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102425" version="1" comment="libreoffice-l10n-sk is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102426" version="1" comment="libreoffice-l10n-sv is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102427" version="1" comment="libreoffice-l10n-xh is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102428" version="1" comment="libreoffice-l10n-zh-CN is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102429" version="1" comment="libreoffice-l10n-zh-TW is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102430" version="1" comment="libreoffice-l10n-zu is &lt;4.0.3.3.26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102374" version="1" comment="libreoffice-help-cs is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102375" version="1" comment="libreoffice-help-da is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102376" version="1" comment="libreoffice-help-de is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102377" version="1" comment="libreoffice-help-en-GB is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102378" version="1" comment="libreoffice-help-en-US is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102379" version="1" comment="libreoffice-help-es is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102380" version="1" comment="libreoffice-help-fr is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102381" version="1" comment="libreoffice-help-gu-IN is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102382" version="1" comment="libreoffice-help-hi-IN is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102383" version="1" comment="libreoffice-help-hu is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102384" version="1" comment="libreoffice-help-it is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102385" version="1" comment="libreoffice-help-ja is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102386" version="1" comment="libreoffice-help-ko is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102387" version="1" comment="libreoffice-help-nl is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102388" version="1" comment="libreoffice-help-pl is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102390" version="1" comment="libreoffice-help-pt is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102389" version="1" comment="libreoffice-help-pt-BR is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102391" version="1" comment="libreoffice-help-ru is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102392" version="1" comment="libreoffice-help-sv is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102393" version="1" comment="libreoffice-help-zh-CN is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102394" version="1" comment="libreoffice-help-zh-TW is &lt;4.0.3.3.26-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073546" version="1" comment="libreoffice-testtool is &lt;3.4.5.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070840" version="1" comment="librsvg-devel is &lt;2.26.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145575" version="1" comment="libsamplerate-devel is &lt;0.1.4-1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065586" version="1" comment="libsmi is &lt;0.4.5-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105657" version="1" comment="libsndfile-devel is &lt;1.0.20-2.6.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100015" version="1" comment="net-snmp-devel is &lt;5.4.2.1-8.12.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100014" version="1" comment="net-snmp-devel-32bit is &lt;5.4.2.1-8.12.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145576" version="1" comment="libsoup-devel is &lt;2.32.2-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145577" version="1" comment="libsoup-devel-32bit is &lt;2.32.2-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098837" version="1" comment="libssh2 is &lt;0.2-5.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108440" version="1" comment="libssh2-1-32bit is &lt;1.2.9-4.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108441" version="1" comment="libssh2-1-x86 is &lt;1.2.9-4.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108443" version="1" comment="libssh2-devel is &lt;1.2.9-4.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145578" version="1" comment="libsss_idmap-devel is &lt;1.9.4-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145579" version="1" comment="libsss_sudo-devel is &lt;1.9.4-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109682" version="1" comment="libtasn1-devel is &lt;1.5-1.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145580" version="1" comment="libthai is &lt;0.1.9-9.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145581" version="1" comment="libthai-devel is &lt;0.1.9-9.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091282" version="1" comment="libtiff-devel is &lt;3.8.2-141.154.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091281" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-141.154.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145582" version="1" comment="libtirpc-devel is &lt;0.2.1-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145583" version="1" comment="libtunepimp is &lt;0.5.3-126.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145584" version="1" comment="libtunepimp-devel is &lt;0.5.3-126.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145585" version="1" comment="libtunepimp5 is &lt;0.5.3-126.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075501" version="1" comment="nut-cgi is &lt;2.6.2-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075502" version="1" comment="nut-devel is &lt;2.6.2-0.2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145586" version="1" comment="libvirt-devel is &lt;1.2.5-3.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145587" version="1" comment="libvirt-devel-32bit is &lt;1.2.5-3.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073167" version="1" comment="libvorbis-devel is &lt;1.2.0-79.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145588" version="1" comment="libwebkit-1_0-1 is &lt;1.0.1-0.1.141" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145589" version="1" comment="libwebkit-1_0-2 is &lt;1.2.7-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145590" version="1" comment="libwebkit-devel is &lt;1.2.7-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145591" version="1" comment="libwebkit-lang is &lt;1.2.7-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052853" version="1" comment="libwmf is &lt;0.2.8.4-206.27.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052847" version="1" comment="libwmf-32bit is &lt;0.2.8.4-206.27.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052848" version="1" comment="libwmf-devel is &lt;0.2.8.4-206.27.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052851" version="1" comment="libwmf-gnome is &lt;0.2.8.4-206.27.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052849" version="1" comment="libwmf-gnome-32bit is &lt;0.2.8.4-206.27.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052850" version="1" comment="libwmf-gnome-x86 is &lt;0.2.8.4-206.27.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052852" version="1" comment="libwmf-x86 is &lt;0.2.8.4-206.27.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145592" version="1" comment="libwpd-0_8-8 is &lt;0.8.14-4.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145593" version="1" comment="libwpd-devel is &lt;0.8.14-4.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145594" version="1" comment="libwpd-devel-doc is &lt;0.8.14-4.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101878" version="1" comment="libwsman-devel is &lt;2.2.3-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101879" version="1" comment="openwsman-python is &lt;2.2.3-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070142" version="1" comment="libxcrypt-devel is &lt;3.0.3-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145595" version="1" comment="libxine-devel is &lt;1.1.15-23.3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145596" version="1" comment="libxine1 is &lt;1.1.15-23.3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145597" version="1" comment="libxine1-32bit is &lt;1.1.15-23.3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145598" version="1" comment="libxine1-gnome-vfs is &lt;1.1.15-23.3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145599" version="1" comment="libxine1-pulse is &lt;1.1.15-23.3.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145600" version="1" comment="libxml is &lt;1.8.17-481.19.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054822" version="1" comment="libxml-32bit is &lt;1.8.17-481.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145601" version="1" comment="libxml-devel is &lt;1.8.17-481.19.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101773" version="1" comment="libxml2-devel is &lt;2.7.6-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101772" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091336" version="1" comment="libxslt-devel is &lt;1.1.24-19.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091335" version="1" comment="libxslt-devel-32bit is &lt;1.1.24-19.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105487" version="1" comment="libyaml-devel is &lt;0.1.3-0.10.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098929" version="1" comment="lighttpd is &lt;1.4.20-2.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098923" version="1" comment="lighttpd-mod_cml is &lt;1.4.20-2.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098924" version="1" comment="lighttpd-mod_magnet is &lt;1.4.20-2.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098925" version="1" comment="lighttpd-mod_mysql_vhost is &lt;1.4.20-2.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098926" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.20-2.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098927" version="1" comment="lighttpd-mod_trigger_b4_dl is &lt;1.4.20-2.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098928" version="1" comment="lighttpd-mod_webdav is &lt;1.4.20-2.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145602" version="1" comment="lxc-devel is &lt;0.8.0-0.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145603" version="1" comment="lynx is &lt;2.8.6-143.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098943" version="1" comment="lzo-devel is &lt;2.03-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098942" version="1" comment="lzo-devel-32bit is &lt;2.03-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060499" version="1" comment="memcached is &lt;1.2.6-5.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109208" version="1" comment="mercurial is &lt;2.3.2-0.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101255" version="1" comment="mozilla-nspr-devel is &lt;4.10.7-0.3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107498" version="1" comment="mozilla-nss-devel is &lt;3.17.3-0.8.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073046" version="1" comment="mozilla-xulrunner192-devel is &lt;1.9.2.27-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073047" version="1" comment="mozilla-xulrunner192-gnome-32bit is &lt;1.9.2.27-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073053" version="1" comment="mozilla-xulrunner192-translations-32bit is &lt;1.9.2.27-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098907" version="1" comment="nagios-devel is &lt;3.0.6-1.25.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145604" version="1" comment="netatalk is &lt;2.0.3-249.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145605" version="1" comment="netatalk-devel is &lt;2.0.3-249.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052958" version="1" comment="novell-ipsec-tools is &lt;0.7.1-2.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052957" version="1" comment="novell-ipsec-tools-devel is &lt;0.7.1-2.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145606" version="1" comment="obex-data-server is &lt;0.4.6-2.7.90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145607" version="1" comment="ofed-devel is &lt;1.5.4.1-20.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145608" version="1" comment="openCryptoki-devel is &lt;3.2-0.11.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109619" version="1" comment="openldap2-back-perl is &lt;2.4.26-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109621" version="1" comment="openldap2-devel is &lt;2.4.26-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109620" version="1" comment="openldap2-devel-32bit is &lt;2.4.26-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065557" version="1" comment="opensc-devel is &lt;0.11.6-5.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109697" version="1" comment="openslp-devel is &lt;1.2.0-172.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145609" version="1" comment="osc is &lt;0.139.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145610" version="1" comment="pam-devel is &lt;1.1.5-0.15.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145611" version="1" comment="pam-devel-32bit is &lt;1.1.5-0.15.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066427" version="1" comment="pango-devel is &lt;1.26.2-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066426" version="1" comment="pango-devel-32bit is &lt;1.26.2-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065698" version="1" comment="pcsc-lite-devel is &lt;1.4.102-1.37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074786" version="1" comment="perl-DBD-Pg is &lt;2.10.3-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145612" version="1" comment="perl-Tk-devel is &lt;804.028-50.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145613" version="1" comment="perl-base-32bit is &lt;5.10.0-64.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110212" version="1" comment="php53-devel is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110213" version="1" comment="php53-imap is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110214" version="1" comment="php53-posix is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110215" version="1" comment="php53-readline is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110216" version="1" comment="php53-sockets is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110217" version="1" comment="php53-sqlite is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110218" version="1" comment="php53-tidy is &lt;5.3.17-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145614" version="1" comment="popt-devel is &lt;1.7-37.63.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145615" version="1" comment="popt-devel-32bit is &lt;1.7-37.63.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145616" version="1" comment="rpm-devel is &lt;4.4.2.3-37.63.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145617" version="1" comment="rpm-devel-32bit is &lt;4.4.2.3-37.63.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145618" version="1" comment="postgresql-devel is &lt;8.3.23-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145619" version="1" comment="postgresql94-devel is &lt;9.4.4-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099942" version="1" comment="ppp-devel is &lt;2.4.5.git-2.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093472" version="1" comment="pwlib is &lt;1.10.10-120.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093471" version="1" comment="pwlib-devel is &lt;1.10.10-120.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107377" version="1" comment="python-crypto is &lt;2.0.1-28.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145620" version="1" comment="python-devel is &lt;2.6.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098909" version="1" comment="python-imaging-sane is &lt;1.1.6-168.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093641" version="1" comment="python-logilab-common is &lt;0.56.2-1.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100969" version="1" comment="python-lxml-doc is &lt;2.3.6-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145621" version="1" comment="python-setuptools is &lt;0.6c11-5.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075758" version="1" comment="qemu is &lt;0.10.1-0.5.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145622" version="1" comment="qt3-devel is &lt;3.3.8b-88.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145623" version="1" comment="qt3-devel-32bit is &lt;3.3.8b-88.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145624" version="1" comment="qt3-devel-doc is &lt;3.3.8b-88.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145625" version="1" comment="qt3-devel-tools is &lt;3.3.8b-88.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145626" version="1" comment="qt3-devel-tools-32bit is &lt;3.3.8b-88.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090611" version="1" comment="quagga-devel is &lt;0.99.15-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105480" version="1" comment="ruby-devel is &lt;1.8.7.p357-0.9.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105482" version="1" comment="ruby-doc-ri is &lt;1.8.7.p357-0.9.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105483" version="1" comment="ruby-examples is &lt;1.8.7.p357-0.9.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105484" version="1" comment="ruby-test-suite is &lt;1.8.7.p357-0.9.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145627" version="1" comment="rubygem-actionmailer-3_2 is &lt;3.2.12-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145628" version="1" comment="rubygem-actionpack-3_2 is &lt;3.2.12-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145629" version="1" comment="rubygem-activemodel-3_2 is &lt;3.2.12-0.5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145630" version="1" comment="rubygem-activeresource-3_2 is &lt;3.2.12-0.5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145631" version="1" comment="rubygem-rails-3_2 is &lt;3.2.12-0.5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145632" version="1" comment="rubygem-railties-3_2 is &lt;3.2.12-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145633" version="1" comment="rubygem-activerecord-3_2 is &lt;3.2.12-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116288" version="1" comment="rubygem-activesupport-3_2 is &lt;3.2.12-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109143" version="1" comment="rubygem-bundler is &lt;1.7.0-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094589" version="1" comment="rubygem-i18n-0_6 is &lt;0.6.0-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077065" version="1" comment="rubygem-json_pure is &lt;1.2.0-0.4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077210" version="1" comment="rubygem-rack-1_4 is &lt;1.4.5-0.5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098930" version="1" comment="rubygem-rack-ssl is &lt;1.3.2-0.12.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076717" version="1" comment="rubygem-rdoc is &lt;3.9.1-0.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145634" version="1" comment="rubygem-sprockets-2_2 is &lt;2.2.1-0.7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098933" version="1" comment="rxvt-unicode is &lt;9.05-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098941" version="1" comment="sendmail-devel is &lt;8.14.3-50.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054843" version="1" comment="silc-toolkit is &lt;1.1.7-7.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054842" version="1" comment="silc-toolkit-devel is &lt;1.1.7-7.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109634" version="1" comment="struts is &lt;1.2.9-162.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109632" version="1" comment="struts-javadoc is &lt;1.2.9-162.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109633" version="1" comment="struts-manual is &lt;1.2.9-162.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108673" version="1" comment="subversion is &lt;1.6.17-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108668" version="1" comment="subversion-devel is &lt;1.6.17-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108669" version="1" comment="subversion-perl is &lt;1.6.17-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108670" version="1" comment="subversion-python is &lt;1.6.17-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108671" version="1" comment="subversion-server is &lt;1.6.17-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108672" version="1" comment="subversion-tools is &lt;1.6.17-1.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074607" version="1" comment="t1lib-devel is &lt;5.1.1-100.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074619" version="1" comment="taglib-devel is &lt;1.5-19.23.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077038" version="1" comment="telepathy-gabble is &lt;0.7.10-2.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145635" version="1" comment="texlive is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145636" version="1" comment="texlive-arab is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145637" version="1" comment="texlive-bin is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145638" version="1" comment="texlive-bin-cjk is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145639" version="1" comment="texlive-bin-devel is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145640" version="1" comment="texlive-bin-dvilj is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145641" version="1" comment="texlive-bin-jadetex is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145642" version="1" comment="texlive-bin-latex is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145643" version="1" comment="texlive-bin-metapost is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145644" version="1" comment="texlive-bin-musictex is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145645" version="1" comment="texlive-bin-omega is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145646" version="1" comment="texlive-bin-tex4ht is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145647" version="1" comment="texlive-bin-tools is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145648" version="1" comment="texlive-bin-xetex is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145649" version="1" comment="texlive-bin-xmltex is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145650" version="1" comment="texlive-cjk is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145651" version="1" comment="texlive-context is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145652" version="1" comment="texlive-devel is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145653" version="1" comment="texlive-doc is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145654" version="1" comment="texlive-dvilj is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145655" version="1" comment="texlive-jadetex is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145656" version="1" comment="texlive-latex is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145657" version="1" comment="texlive-latex-doc is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145658" version="1" comment="texlive-metapost is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145659" version="1" comment="texlive-musictex is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145660" version="1" comment="texlive-omega is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145661" version="1" comment="texlive-ppower4 is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145662" version="1" comment="texlive-tex4ht is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145663" version="1" comment="texlive-tools is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145664" version="1" comment="texlive-xetex is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145665" version="1" comment="texlive-xmltex is &lt;2007-219.34.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145666" version="1" comment="trousers-devel is &lt;0.3.10-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145667" version="1" comment="unixODBC_23-devel is &lt;2.3.1-0.9.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145668" version="1" comment="valgrind is &lt;3.8.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145669" version="1" comment="valgrind-devel is &lt;3.8.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061712" version="1" comment="vte-devel is &lt;0.22.5-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117365" version="1" comment="wireshark-devel is &lt;1.10.13-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098849" version="1" comment="xalan-j2-demo is &lt;2.7.0-217.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098850" version="1" comment="xalan-j2-javadoc is &lt;2.7.0-217.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098851" version="1" comment="xalan-j2-manual is &lt;2.7.0-217.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145670" version="1" comment="xen-devel is &lt;4.4.2_08-1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108445" version="1" comment="xorg-x11-devel is &lt;7.4-8.26.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108444" version="1" comment="xorg-x11-devel-32bit is &lt;7.4-8.26.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077487" version="1" comment="xorg-x11-libX11-devel is &lt;7.4-5.11.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077525" version="1" comment="xorg-x11-libX11-devel-32bit is &lt;7.4-5.11.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077747" version="1" comment="xorg-x11-libXext-devel is &lt;7.4-1.18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077746" version="1" comment="xorg-x11-libXext-devel-32bit is &lt;7.4-1.18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077749" version="1" comment="xorg-x11-libXfixes-devel is &lt;7.4-1.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077748" version="1" comment="xorg-x11-libXfixes-devel-32bit is &lt;7.4-1.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077510" version="1" comment="xorg-x11-libXp-devel is &lt;7.4-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077534" version="1" comment="xorg-x11-libXp-devel-32bit is &lt;7.4-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077753" version="1" comment="xorg-x11-libXrender-devel is &lt;7.4-1.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077752" version="1" comment="xorg-x11-libXrender-devel-32bit is &lt;7.4-1.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077757" version="1" comment="xorg-x11-libXt-devel is &lt;7.4-1.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077756" version="1" comment="xorg-x11-libXt-devel-32bit is &lt;7.4-1.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077755" version="1" comment="xorg-x11-libXv-devel is &lt;7.4-1.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077754" version="1" comment="xorg-x11-libXv-devel-32bit is &lt;7.4-1.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145671" version="1" comment="xorg-x11-libxcb-devel is &lt;7.4-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145672" version="1" comment="xorg-x11-libxcb-devel-32bit is &lt;7.4-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110271" version="1" comment="xorg-x11-server-sdk is &lt;7.4-27.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145673" version="1" comment="yast2-core-devel is &lt;2.17.46-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145674" version="1" comment="yast2-devel-doc is &lt;2.17.140-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073773" version="1" comment="sle-sdk-release is ==11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077179" version="1" comment="ImageMagick is &lt;6.4.3.6-7.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077192" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077193" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077180" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077183" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077194" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077195" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077532" version="1" comment="Mesa-devel is &lt;7.11.2-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077531" version="1" comment="Mesa-devel-32bit is &lt;7.11.2-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090312" version="1" comment="apache2 is &lt;2.2.12-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090313" version="1" comment="apache2-devel is &lt;2.2.12-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090307" version="1" comment="apache2-doc is &lt;2.2.12-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090308" version="1" comment="apache2-example-pages is &lt;2.2.12-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090309" version="1" comment="apache2-prefork is &lt;2.2.12-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090310" version="1" comment="apache2-utils is &lt;2.2.12-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090311" version="1" comment="apache2-worker is &lt;2.2.12-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092775" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111993" version="1" comment="php5 is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092776" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092777" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092778" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092779" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092780" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092781" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092782" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092873" version="1" comment="php5-devel is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092783" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092784" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092785" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092786" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092787" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092788" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092789" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092790" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092791" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092874" version="1" comment="php5-imap is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092792" version="1" comment="php5-json is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092793" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092794" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092795" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092796" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092875" version="1" comment="php5-ncurses is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092797" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092798" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092799" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092800" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092801" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092802" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092876" version="1" comment="php5-posix is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092803" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092877" version="1" comment="php5-readline is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092804" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092805" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092806" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092878" version="1" comment="php5-sockets is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092879" version="1" comment="php5-sqlite is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092807" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092808" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092809" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092810" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092880" version="1" comment="php5-tidy is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092811" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092812" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092813" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092814" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092815" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092816" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092817" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092818" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092881" version="1" comment="php53-devel is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092882" version="1" comment="php53-imap is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092883" version="1" comment="php53-posix is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092884" version="1" comment="php53-readline is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092885" version="1" comment="php53-sockets is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092886" version="1" comment="php53-sqlite is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092887" version="1" comment="php53-tidy is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090372" version="1" comment="apache2-mod_security2 is &lt;2.7.1-0.2.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093225" version="1" comment="bind-devel is &lt;9.9.4P2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093224" version="1" comment="bind-devel-32bit is &lt;9.9.4P2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075115" version="1" comment="bytefx-data-mysql is &lt;2.6.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075117" version="1" comment="mono-core is &lt;2.6.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075123" version="1" comment="mono-data is &lt;2.6.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075118" version="1" comment="mono-data-firebird is &lt;2.6.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075119" version="1" comment="mono-data-oracle is &lt;2.6.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075120" version="1" comment="mono-data-postgresql is &lt;2.6.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075121" version="1" comment="mono-data-sqlite is &lt;2.6.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075122" version="1" comment="mono-data-sybase is &lt;2.6.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075124" version="1" comment="mono-devel is &lt;2.6.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075125" version="1" comment="mono-extras is &lt;2.6.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075126" version="1" comment="mono-jscript is &lt;2.6.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075127" version="1" comment="mono-locale-extras is &lt;2.6.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075128" version="1" comment="mono-nunit is &lt;2.6.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075129" version="1" comment="mono-wcf is &lt;2.6.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075130" version="1" comment="mono-web is &lt;2.6.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075131" version="1" comment="mono-winforms is &lt;2.6.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075133" version="1" comment="mono-winfxcore is &lt;2.6.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075132" version="1" comment="monodoc-core is &lt;2.6.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092676" version="1" comment="libldb-devel is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092677" version="1" comment="libnetapi-devel is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092678" version="1" comment="libnetapi0 is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092679" version="1" comment="libsmbclient-devel is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092680" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092681" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092682" version="1" comment="libtalloc-devel is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092683" version="1" comment="libtdb-devel is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092684" version="1" comment="libtevent-devel is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092685" version="1" comment="libwbclient-devel is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092686" version="1" comment="samba-devel is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091338" version="1" comment="cups-devel is &lt;1.3.9-8.46.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093223" version="1" comment="libcurl-devel is &lt;7.19.7-1.20.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116192" version="1" comment="dbus-1-devel is &lt;1.2.10-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116193" version="1" comment="dbus-1-devel-doc is &lt;1.2.10-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077066" version="1" comment="dhcp-devel is &lt;4.2.4.P2-0.11.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076721" version="1" comment="finch is &lt;2.6.6-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076743" version="1" comment="finch-devel is &lt;2.6.6-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076725" version="1" comment="libpurple is &lt;2.6.6-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076744" version="1" comment="libpurple-devel is &lt;2.6.6-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076722" version="1" comment="libpurple-lang is &lt;2.6.6-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076726" version="1" comment="pidgin is &lt;2.6.6-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076745" version="1" comment="pidgin-devel is &lt;2.6.6-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116194" version="1" comment="mozilla-nspr-devel is &lt;4.9.2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116195" version="1" comment="mozilla-nss-devel is &lt;3.13.6-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076008" version="1" comment="mozilla-nspr-devel is &lt;4.9.3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076123" version="1" comment="mozilla-nss-devel is &lt;3.14-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076344" version="1" comment="mozilla-nspr-devel is &lt;4.9.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076345" version="1" comment="mozilla-nss-devel is &lt;3.14.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076753" version="1" comment="beagle is &lt;0.3.8-56.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076765" version="1" comment="beagle-devel is &lt;0.3.8-56.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076766" version="1" comment="beagle-lang is &lt;0.3.8-56.44.45.129" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076767" version="1" comment="mozilla-nspr-devel is &lt;4.9.5-0.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076768" version="1" comment="mozilla-nss-devel is &lt;3.14.2-0.4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077025" version="1" comment="mozilla-nspr-devel is &lt;4.9.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077026" version="1" comment="mozilla-nss-devel is &lt;3.14.3-0.4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076710" version="1" comment="freeradius-server-devel is &lt;2.1.1-7.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076705" version="1" comment="freeradius-server-libs is &lt;2.1.1-7.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076459" version="1" comment="freetype2-devel is &lt;2.3.7-25.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076474" version="1" comment="freetype2-devel-32bit is &lt;2.3.7-25.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076917" version="1" comment="git is &lt;1.7.12.4-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076909" version="1" comment="git-arch is &lt;1.7.12.4-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076910" version="1" comment="git-core is &lt;1.7.12.4-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076911" version="1" comment="git-cvs is &lt;1.7.12.4-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076912" version="1" comment="git-daemon is &lt;1.7.12.4-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076913" version="1" comment="git-email is &lt;1.7.12.4-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076914" version="1" comment="git-gui is &lt;1.7.12.4-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076915" version="1" comment="git-svn is &lt;1.7.12.4-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076916" version="1" comment="git-web is &lt;1.7.12.4-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076918" version="1" comment="gitk is &lt;1.7.12.4-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091867" version="1" comment="glibc-html is &lt;2.11.3-17.45.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091869" version="1" comment="glibc-info is &lt;2.11.3-17.45.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077473" version="1" comment="libgnutls-devel is &lt;2.4.1-24.39.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077474" version="1" comment="libgnutls-extra-devel is &lt;2.4.1-24.39.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077471" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077637" version="1" comment="ibutils is &lt;1.5.4-0.7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077636" version="1" comment="ibutils-32bit is &lt;1.5.4-0.7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077643" version="1" comment="ibutils-devel is &lt;1.5.4-0.7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077642" version="1" comment="ibutils-devel-32bit is &lt;1.5.4-0.7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076692" version="1" comment="inkscape is &lt;0.46-62.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076687" version="1" comment="inkscape-extensions-dia is &lt;0.46-62.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076688" version="1" comment="inkscape-extensions-extra is &lt;0.46-62.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076689" version="1" comment="inkscape-extensions-fig is &lt;0.46-62.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076690" version="1" comment="inkscape-extensions-gimp is &lt;0.46-62.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076691" version="1" comment="inkscape-lang is &lt;0.46-62.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075650" version="1" comment="inn is &lt;2.4.2-170.21.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075667" version="1" comment="inn-devel is &lt;2.4.2-170.21.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076089" version="1" comment="inst-source-utils is &lt;2012.9.13-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077718" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.18-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077719" version="1" comment="java-1_4_2-ibm-devel is &lt;1.4.2_sr13.18-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091434" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr15.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091441" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr15.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091431" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr15.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091510" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr6.0-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091041" version="1" comment="kdelibs4-doc is &lt;4.3.5-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091043" version="1" comment="libkde4-32bit is &lt;4.3.5-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091049" version="1" comment="libkde4-devel is &lt;4.3.5-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091046" version="1" comment="libkdecore4-32bit is &lt;4.3.5-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091050" version="1" comment="libkdecore4-devel is &lt;4.3.5-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091973" version="1" comment="krb5-devel is &lt;1.6.3-133.49.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091972" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091969" version="1" comment="krb5-server is &lt;1.6.3-133.49.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073966" version="1" comment="libldb-devel is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073967" version="1" comment="libnetapi-devel is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073968" version="1" comment="libnetapi0 is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073969" version="1" comment="libsmbclient-devel is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073970" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073971" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073972" version="1" comment="libtalloc-devel is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073973" version="1" comment="libtdb-devel is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073974" version="1" comment="libtevent-devel is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073975" version="1" comment="libwbclient-devel is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073976" version="1" comment="samba-devel is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076843" version="1" comment="libQtWebKit-devel is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076804" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076837" version="1" comment="libQtWebKit4-x86 is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076846" version="1" comment="libqt4-devel is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076845" version="1" comment="libqt4-devel-doc is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076844" version="1" comment="libqt4-devel-doc-data is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076810" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076847" version="1" comment="libqt4-sql-mysql-x86 is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076813" version="1" comment="libqt4-sql-postgresql is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076812" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076848" version="1" comment="libqt4-sql-postgresql-x86 is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076814" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076849" version="1" comment="libqt4-sql-sqlite-x86 is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076817" version="1" comment="libqt4-sql-unixODBC is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076816" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076850" version="1" comment="libqt4-sql-unixODBC-x86 is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076996" version="1" comment="postgresql91-devel is &lt;9.1.9-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090230" version="1" comment="libgcrypt-devel is &lt;1.5.0-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090229" version="1" comment="libgcrypt-devel-32bit is &lt;1.5.0-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076519" version="1" comment="libmysqlclient_r15-32bit is &lt;5.0.96-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076527" version="1" comment="libmysqlclient_r15-x86 is &lt;5.0.96-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076944" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092700" version="1" comment="libpixman-1-0-devel is &lt;0.16.0-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076962" version="1" comment="libpoppler-devel is &lt;0.12.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076963" version="1" comment="libpoppler-glib-devel is &lt;0.12.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076964" version="1" comment="libpoppler-qt2 is &lt;0.12.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076965" version="1" comment="libpoppler-qt3-devel is &lt;0.12.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076966" version="1" comment="libpoppler-qt4-devel is &lt;0.12.3-1.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113144" version="1" comment="libreoffice is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113145" version="1" comment="libreoffice-base is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113146" version="1" comment="libreoffice-base-drivers-postgresql is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113147" version="1" comment="libreoffice-base-extensions is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076009" version="1" comment="libreoffice-branding-upstream is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113148" version="1" comment="libreoffice-calc is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113149" version="1" comment="libreoffice-calc-extensions is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113150" version="1" comment="libreoffice-draw is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113151" version="1" comment="libreoffice-draw-extensions is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113152" version="1" comment="libreoffice-filters-optional is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113153" version="1" comment="libreoffice-gnome is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075930" version="1" comment="libreoffice-help-cs is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075931" version="1" comment="libreoffice-help-da is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075932" version="1" comment="libreoffice-help-de is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075933" version="1" comment="libreoffice-help-en-GB is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075934" version="1" comment="libreoffice-help-en-US is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075935" version="1" comment="libreoffice-help-es is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075936" version="1" comment="libreoffice-help-fr is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075937" version="1" comment="libreoffice-help-gu-IN is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075938" version="1" comment="libreoffice-help-hi-IN is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075939" version="1" comment="libreoffice-help-hu is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075940" version="1" comment="libreoffice-help-it is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075941" version="1" comment="libreoffice-help-ja is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075942" version="1" comment="libreoffice-help-ko is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075943" version="1" comment="libreoffice-help-nl is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075944" version="1" comment="libreoffice-help-pl is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075946" version="1" comment="libreoffice-help-pt is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075945" version="1" comment="libreoffice-help-pt-BR is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075947" version="1" comment="libreoffice-help-ru is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075948" version="1" comment="libreoffice-help-sv is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075949" version="1" comment="libreoffice-help-zh-CN is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075950" version="1" comment="libreoffice-help-zh-TW is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075951" version="1" comment="libreoffice-icon-themes is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113154" version="1" comment="libreoffice-impress is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113155" version="1" comment="libreoffice-impress-extensions is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113156" version="1" comment="libreoffice-kde is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113157" version="1" comment="libreoffice-kde4 is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075952" version="1" comment="libreoffice-l10n-af is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075953" version="1" comment="libreoffice-l10n-ar is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075954" version="1" comment="libreoffice-l10n-ca is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075955" version="1" comment="libreoffice-l10n-cs is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075956" version="1" comment="libreoffice-l10n-da is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075957" version="1" comment="libreoffice-l10n-de is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076010" version="1" comment="libreoffice-l10n-el is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075958" version="1" comment="libreoffice-l10n-en-GB is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075959" version="1" comment="libreoffice-l10n-es is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075960" version="1" comment="libreoffice-l10n-fi is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075961" version="1" comment="libreoffice-l10n-fr is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075962" version="1" comment="libreoffice-l10n-gu-IN is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075963" version="1" comment="libreoffice-l10n-hi-IN is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075964" version="1" comment="libreoffice-l10n-hu is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075965" version="1" comment="libreoffice-l10n-it is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075966" version="1" comment="libreoffice-l10n-ja is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075967" version="1" comment="libreoffice-l10n-ko is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075968" version="1" comment="libreoffice-l10n-nb is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075969" version="1" comment="libreoffice-l10n-nl is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075970" version="1" comment="libreoffice-l10n-nn is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075971" version="1" comment="libreoffice-l10n-pl is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116196" version="1" comment="libreoffice-l10n-prebuilt is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075973" version="1" comment="libreoffice-l10n-pt is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075972" version="1" comment="libreoffice-l10n-pt-BR is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075974" version="1" comment="libreoffice-l10n-ru is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075975" version="1" comment="libreoffice-l10n-sk is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075976" version="1" comment="libreoffice-l10n-sv is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075977" version="1" comment="libreoffice-l10n-xh is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075978" version="1" comment="libreoffice-l10n-zh-CN is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075979" version="1" comment="libreoffice-l10n-zh-TW is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075980" version="1" comment="libreoffice-l10n-zu is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113158" version="1" comment="libreoffice-mailmerge is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113159" version="1" comment="libreoffice-math is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113160" version="1" comment="libreoffice-mono is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113161" version="1" comment="libreoffice-officebean is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113162" version="1" comment="libreoffice-pyuno is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116197" version="1" comment="libreoffice-sdk is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113163" version="1" comment="libreoffice-writer is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113164" version="1" comment="libreoffice-writer-extensions is &lt;3.5.4.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074901" version="1" comment="libsoup-devel is &lt;2.32.2-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074900" version="1" comment="libsoup-devel-32bit is &lt;2.32.2-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076082" version="1" comment="libssh2 is &lt;0.2-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091303" version="1" comment="libvirt-devel is &lt;0.9.6-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091302" version="1" comment="libvirt-devel-32bit is &lt;0.9.6-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076080" version="1" comment="libvirt-devel is &lt;0.9.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076079" version="1" comment="libvirt-devel-32bit is &lt;0.9.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076137" version="1" comment="libwebkit-1_0-2 is &lt;1.2.7-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076149" version="1" comment="libwebkit-devel is &lt;1.2.7-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076138" version="1" comment="libwebkit-lang is &lt;1.2.7-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093164" version="1" comment="libxml2-devel is &lt;2.7.6-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093163" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091337" version="1" comment="libxslt-python is &lt;1.1.24-19.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092729" version="1" comment="lighttpd is &lt;1.4.20-2.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092723" version="1" comment="lighttpd-mod_cml is &lt;1.4.20-2.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092724" version="1" comment="lighttpd-mod_magnet is &lt;1.4.20-2.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092725" version="1" comment="lighttpd-mod_mysql_vhost is &lt;1.4.20-2.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092726" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.20-2.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092727" version="1" comment="lighttpd-mod_trigger_b4_dl is &lt;1.4.20-2.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092728" version="1" comment="lighttpd-mod_webdav is &lt;1.4.20-2.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091413" version="1" comment="mozilla-nspr-devel is &lt;4.10.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091414" version="1" comment="mozilla-nss-devel is &lt;3.15.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093162" version="1" comment="nagios is &lt;3.0.6-1.25.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093166" version="1" comment="nagios-devel is &lt;3.0.6-1.25.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093161" version="1" comment="nagios-www is &lt;3.0.6-1.25.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091794" version="1" comment="mozilla-nspr-devel is &lt;4.10.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091795" version="1" comment="mozilla-nss-devel is &lt;3.15.3-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116198" version="1" comment="mozilla-nss-devel is &lt;3.15.3.1-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076302" version="1" comment="openCryptoki is &lt;2.4-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076303" version="1" comment="openCryptoki-devel is &lt;2.4-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076788" version="1" comment="perl-base-32bit is &lt;5.10.0-64.61.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076789" version="1" comment="perl-base-x86 is &lt;5.10.0-64.61.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074269" version="1" comment="popt-devel is &lt;1.7-37.50.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074268" version="1" comment="popt-devel-32bit is &lt;1.7-37.50.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074242" version="1" comment="rpm-32bit is &lt;4.4.2.3-37.50.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074271" version="1" comment="rpm-devel is &lt;4.4.2.3-37.50.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074270" version="1" comment="rpm-devel-32bit is &lt;4.4.2.3-37.50.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074243" version="1" comment="rpm-x86 is &lt;4.4.2.3-37.50.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091154" version="1" comment="python-32bit is &lt;2.6.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091159" version="1" comment="python-demo is &lt;2.6.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091166" version="1" comment="python-devel is &lt;2.6.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091160" version="1" comment="python-gdbm is &lt;2.6.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091161" version="1" comment="python-idle is &lt;2.6.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091162" version="1" comment="python-tk is &lt;2.6.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089847" version="1" comment="python-httplib2 is &lt;0.7.4-0.7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090552" version="1" comment="quagga is &lt;0.99.15-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076712" version="1" comment="rubygem-rack-1_3 is &lt;1.3.10-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076895" version="1" comment="rubygem-rack is &lt;1.1.6-0.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091804" version="1" comment="ruby-devel is &lt;1.8.7.p357-0.9.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091801" version="1" comment="ruby-doc-html is &lt;1.8.7.p357-0.9.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091805" version="1" comment="ruby-doc-ri is &lt;1.8.7.p357-0.9.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091806" version="1" comment="ruby-examples is &lt;1.8.7.p357-0.9.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091807" version="1" comment="ruby-test-suite is &lt;1.8.7.p357-0.9.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091802" version="1" comment="ruby-tk is &lt;1.8.7.p357-0.9.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076888" version="1" comment="rubygem-actionmailer-2_3 is &lt;2.3.17-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076889" version="1" comment="rubygem-actionpack-2_3 is &lt;2.3.17-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076890" version="1" comment="rubygem-activerecord-2_3 is &lt;2.3.17-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076891" version="1" comment="rubygem-activeresource-2_3 is &lt;2.3.17-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076892" version="1" comment="rubygem-activesupport-2_3 is &lt;2.3.17-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116199" version="1" comment="rubygem-rails is &lt;2.3.17-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076893" version="1" comment="rubygem-rails-2_3 is &lt;2.3.17-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093165" version="1" comment="rubygem-actionpack-2_1 is &lt;2.1.2-1.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107491" version="1" comment="rubygem-actionpack-2_3 is &lt;2.3.17-0.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075256" version="1" comment="rubygem-activerecord-2_3 is &lt;2.3.14-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076476" version="1" comment="rubygem-activesupport-2_3 is &lt;2.3.14-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093146" version="1" comment="rubygem-activesupport-3_2 is &lt;3.2.12-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074893" version="1" comment="rubygem-mail-2_3 is &lt;2.3.0-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074894" version="1" comment="rubygem-rack-cache-1_1 is &lt;1.1-0.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107484" version="1" comment="rubygem-actionpack-2_3 is &lt;2.3.17-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107485" version="1" comment="rubygem-activerecord-2_3 is &lt;2.3.17-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107486" version="1" comment="rubygem-activesupport-2_3 is &lt;2.3.17-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077209" version="1" comment="rubygem-activesupport-3_2 is &lt;3.2.12-0.5.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093108" version="1" comment="subversion is &lt;1.6.17-1.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093103" version="1" comment="subversion-devel is &lt;1.6.17-1.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093104" version="1" comment="subversion-perl is &lt;1.6.17-1.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093105" version="1" comment="subversion-python is &lt;1.6.17-1.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093106" version="1" comment="subversion-server is &lt;1.6.17-1.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093107" version="1" comment="subversion-tools is &lt;1.6.17-1.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093046" version="1" comment="wireshark is &lt;1.8.12-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093047" version="1" comment="wireshark-devel is &lt;1.8.12-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076987" version="1" comment="xen-devel is &lt;4.1.4_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075476" version="1" comment="libvirt-devel is &lt;0.9.6-0.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075475" version="1" comment="libvirt-devel-32bit is &lt;0.9.6-0.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075477" version="1" comment="xen-devel is &lt;4.1.2_20-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107396" version="1" comment="xen-devel is &lt;4.1.3_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076030" version="1" comment="xen-devel is &lt;4.1.3_04-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077485" version="1" comment="xen-devel is &lt;4.1.5_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091505" version="1" comment="xen-devel is &lt;4.1.6_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091937" version="1" comment="xen-devel is &lt;4.1.6_04-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092888" version="1" comment="xorg-x11-server-sdk is &lt;7.4-27.70.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093467" version="1" comment="xorg-x11-devel is &lt;7.4-8.26.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093466" version="1" comment="xorg-x11-devel-32bit is &lt;7.4-8.26.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077490" version="1" comment="xorg-x11-libXext-devel is &lt;7.4-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077526" version="1" comment="xorg-x11-libXext-devel-32bit is &lt;7.4-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077493" version="1" comment="xorg-x11-libXfixes-devel is &lt;7.4-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077527" version="1" comment="xorg-x11-libXfixes-devel-32bit is &lt;7.4-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077499" version="1" comment="xorg-x11-libXrender-devel is &lt;7.4-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077529" version="1" comment="xorg-x11-libXrender-devel-32bit is &lt;7.4-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077507" version="1" comment="xorg-x11-libXt-devel is &lt;7.4-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077533" version="1" comment="xorg-x11-libXt-devel-32bit is &lt;7.4-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077502" version="1" comment="xorg-x11-libXv-devel is &lt;7.4-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077530" version="1" comment="xorg-x11-libXv-devel-32bit is &lt;7.4-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077513" version="1" comment="xorg-x11-libxcb-devel is &lt;7.4-1.22.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077535" version="1" comment="xorg-x11-libxcb-devel-32bit is &lt;7.4-1.22.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098904" version="1" comment="MozillaFirefox-devel is &lt;24.6.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098905" version="1" comment="mozilla-nspr-devel is &lt;4.10.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098906" version="1" comment="mozilla-nss-devel is &lt;3.16.1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077554" version="1" comment="sle-sdk-release is ==11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077582" version="1" comment="Mesa-devel is &lt;9.0.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077581" version="1" comment="Mesa-devel-32bit is &lt;9.0.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090791" version="1" comment="MozillaFirefox-devel is &lt;17.0.9esr-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113528" version="1" comment="MozillaFirefox is &lt;31.8.0esr-0.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116201" version="1" comment="MozillaFirefox-devel is &lt;31.8.0esr-0.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119531" version="1" comment="MozillaFirefox is &lt;38.5.0esr-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119532" version="1" comment="MozillaFirefox-devel is &lt;38.5.0esr-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098900" version="1" comment="MozillaFirefox-devel is &lt;24.5.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098903" version="1" comment="mozilla-nspr-devel is &lt;4.10.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098901" version="1" comment="mozilla-nss-devel is &lt;3.16-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108674" version="1" comment="MozillaFirefox-devel is &lt;31.6.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111619" version="1" comment="MozillaFirefox is &lt;31.8.0esr-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111621" version="1" comment="MozillaFirefox-devel is &lt;31.8.0esr-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111599" version="1" comment="mozilla-nspr is &lt;4.10.8-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111601" version="1" comment="mozilla-nspr-devel is &lt;4.10.8-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111630" version="1" comment="mozilla-nss is &lt;3.19.2_CKBI_1.98-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111633" version="1" comment="mozilla-nss-devel is &lt;3.19.2_CKBI_1.98-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099256" version="1" comment="apache2 is &lt;2.2.12-1.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099257" version="1" comment="apache2-devel is &lt;2.2.12-1.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099251" version="1" comment="apache2-doc is &lt;2.2.12-1.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099252" version="1" comment="apache2-example-pages is &lt;2.2.12-1.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099253" version="1" comment="apache2-prefork is &lt;2.2.12-1.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099254" version="1" comment="apache2-utils is &lt;2.2.12-1.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099255" version="1" comment="apache2-worker is &lt;2.2.12-1.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115446" version="1" comment="apache2 is &lt;2.2.12-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116202" version="1" comment="apache2-devel is &lt;2.2.12-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115447" version="1" comment="apache2-doc is &lt;2.2.12-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115448" version="1" comment="apache2-example-pages is &lt;2.2.12-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115449" version="1" comment="apache2-prefork is &lt;2.2.12-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115450" version="1" comment="apache2-utils is &lt;2.2.12-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115451" version="1" comment="apache2-worker is &lt;2.2.12-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101774" version="1" comment="php53-devel is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101775" version="1" comment="php53-imap is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101776" version="1" comment="php53-posix is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101777" version="1" comment="php53-readline is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101778" version="1" comment="php53-sockets is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101779" version="1" comment="php53-sqlite is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101780" version="1" comment="php53-tidy is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115107" version="1" comment="augeas is &lt;0.9.0-3.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116203" version="1" comment="augeas-devel is &lt;0.9.0-3.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100820" version="1" comment="libreadline5 is &lt;5.2-147.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100823" version="1" comment="readline-devel is &lt;5.2-147.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100822" version="1" comment="readline-devel-32bit is &lt;5.2-147.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111608" version="1" comment="bind is &lt;9.9.6P1-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111610" version="1" comment="bind-devel is &lt;9.9.6P1-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111617" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114084" version="1" comment="bind is &lt;9.9.6P1-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114086" version="1" comment="bind-devel is &lt;9.9.6P1-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116204" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119338" version="1" comment="bind is &lt;9.9.6P1-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119339" version="1" comment="bind-devel is &lt;9.9.6P1-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119340" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121664" version="1" comment="bind is &lt;9.9.6P1-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121665" version="1" comment="bind-devel is &lt;9.9.6P1-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121666" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107549" version="1" comment="binutils-devel is &lt;2.23.1-0.23.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107548" version="1" comment="binutils-devel-32bit is &lt;2.23.1-0.23.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107550" version="1" comment="binutils-gold is &lt;2.23.1-0.23.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107551" version="1" comment="cross-ppc-binutils is &lt;2.23.1-0.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107552" version="1" comment="cross-spu-binutils is &lt;2.23.1-0.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098856" version="1" comment="libldb-devel is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098857" version="1" comment="libnetapi-devel is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098858" version="1" comment="libnetapi0 is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098859" version="1" comment="libsmbclient-devel is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098860" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098861" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098862" version="1" comment="libtalloc-devel is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098863" version="1" comment="libtdb-devel is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098864" version="1" comment="libtevent-devel is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098865" version="1" comment="libwbclient-devel is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098866" version="1" comment="samba-devel is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099552" version="1" comment="cups-devel is &lt;1.3.9-8.46.52.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098964" version="1" comment="libcurl-devel is &lt;7.19.7-1.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122351" version="1" comment="curl is &lt;7.19.7-1.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122352" version="1" comment="libcurl-devel is &lt;7.19.7-1.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107511" version="1" comment="libcurl-devel is &lt;7.19.7-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122230" version="1" comment="dhcp is &lt;4.2.4.P2-0.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122231" version="1" comment="dhcp-devel is &lt;4.2.4.P2-0.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113475" version="1" comment="e2fsprogs-devel is &lt;1.41.9-2.10.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113477" version="1" comment="libblkid-devel is &lt;2.19.1-6.62.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113476" version="1" comment="libblkid-devel-32bit is &lt;2.19.1-6.62.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113479" version="1" comment="libcom_err-devel is &lt;1.41.9-2.10.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113478" version="1" comment="libcom_err-devel-32bit is &lt;1.41.9-2.10.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113481" version="1" comment="libext2fs-devel is &lt;1.41.9-2.10.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113480" version="1" comment="libext2fs-devel-32bit is &lt;1.41.9-2.10.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113482" version="1" comment="libext2fs2-32bit is &lt;1.41.9-2.10.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113483" version="1" comment="libext2fs2-x86 is &lt;1.41.9-2.10.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113474" version="1" comment="libuuid-devel is &lt;2.19.1-6.62.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113484" version="1" comment="libuuid-devel-32bit is &lt;2.19.1-6.62.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102015" version="1" comment="python-magic is &lt;4.24-43.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098782" version="1" comment="finch is &lt;2.6.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098781" version="1" comment="finch-devel is &lt;2.6.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098785" version="1" comment="libpurple is &lt;2.6.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098783" version="1" comment="libpurple-devel is &lt;2.6.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098784" version="1" comment="libpurple-lang is &lt;2.6.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098787" version="1" comment="pidgin is &lt;2.6.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098786" version="1" comment="pidgin-devel is &lt;2.6.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077555" version="1" comment="MozillaFirefox-devel is &lt;17.0.7esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091412" version="1" comment="MozillaFirefox-devel is &lt;17.0.10esr-0.7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093494" version="1" comment="MozillaFirefox-devel is &lt;24.3.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093495" version="1" comment="mozilla-nss-devel is &lt;3.15.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098902" version="1" comment="MozillaFirefox-devel is &lt;24.4.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099246" version="1" comment="MozillaFirefox-devel is &lt;24.7.0esr-0.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099247" version="1" comment="mozilla-nss-devel is &lt;3.16.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100011" version="1" comment="MozillaFirefox-devel is &lt;24.8.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100012" version="1" comment="mozilla-nspr-devel is &lt;4.10.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100013" version="1" comment="mozilla-nss-devel is &lt;3.16.4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102686" version="1" comment="MozillaFirefox-devel is &lt;31.3.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107497" version="1" comment="MozillaFirefox-devel is &lt;31.4.0esr-0.8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108085" version="1" comment="MozillaFirefox-devel is &lt;31.5.3esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114791" version="1" comment="mozilla-nspr is &lt;4.10.9-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114792" version="1" comment="mozilla-nspr-devel is &lt;4.10.9-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114960" version="1" comment="MozillaFirefox is &lt;38.3.0esr-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116205" version="1" comment="MozillaFirefox-devel is &lt;38.3.0esr-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116206" version="1" comment="MozillaFirefox is &lt;38.4.0esr-25.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116207" version="1" comment="MozillaFirefox-devel is &lt;38.4.0esr-25.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116208" version="1" comment="mozilla-nspr is &lt;4.10.10-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116209" version="1" comment="mozilla-nspr-devel is &lt;4.10.10-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116210" version="1" comment="mozilla-nss is &lt;3.19.2.1-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116211" version="1" comment="mozilla-nss-devel is &lt;3.19.2.1-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092113" version="1" comment="MozillaFirefox-devel is &lt;24.2.0esr-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092114" version="1" comment="mozilla-nss-devel is &lt;3.15.3.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101909" version="1" comment="MozillaFirefox-devel is &lt;31.2.0esr-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101256" version="1" comment="mozilla-nss-devel is &lt;3.17.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114288" version="1" comment="MozillaFirefox is &lt;38.2.1esr-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116212" version="1" comment="MozillaFirefox-devel is &lt;38.2.1esr-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114295" version="1" comment="mozilla-nss is &lt;3.19.2.0-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116213" version="1" comment="mozilla-nss-devel is &lt;3.19.2.0-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107581" version="1" comment="freetype2-devel is &lt;2.3.7-25.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107580" version="1" comment="freetype2-devel-32bit is &lt;2.3.7-25.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121667" version="1" comment="giflib is &lt;4.1.6-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121668" version="1" comment="giflib-devel is &lt;4.1.6-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121669" version="1" comment="giflib-devel-32bit is &lt;4.1.6-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116221" version="1" comment="git is &lt;1.7.12.4-0.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116222" version="1" comment="git-arch is &lt;1.7.12.4-0.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116223" version="1" comment="git-core is &lt;1.7.12.4-0.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116224" version="1" comment="git-cvs is &lt;1.7.12.4-0.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116225" version="1" comment="git-daemon is &lt;1.7.12.4-0.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116226" version="1" comment="git-email is &lt;1.7.12.4-0.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116227" version="1" comment="git-gui is &lt;1.7.12.4-0.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116228" version="1" comment="git-svn is &lt;1.7.12.4-0.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116229" version="1" comment="git-web is &lt;1.7.12.4-0.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116230" version="1" comment="gitk is &lt;1.7.12.4-0.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100150" version="1" comment="glibc-html is &lt;2.11.3-17.72.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100152" version="1" comment="glibc-info is &lt;2.11.3-17.72.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113934" version="1" comment="glibc is &lt;2.11.3-17.87.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113938" version="1" comment="glibc-html is &lt;2.11.3-17.87.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113940" version="1" comment="glibc-info is &lt;2.11.3-17.87.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122353" version="1" comment="glibc is &lt;2.11.3-17.95.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122354" version="1" comment="glibc-html is &lt;2.11.3-17.95.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122355" version="1" comment="glibc-info is &lt;2.11.3-17.95.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098937" version="1" comment="libgnutls-devel is &lt;2.4.1-24.39.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098938" version="1" comment="libgnutls-extra-devel is &lt;2.4.1-24.39.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098742" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114285" version="1" comment="gnutls is &lt;2.4.1-24.39.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116231" version="1" comment="libgnutls-devel is &lt;2.4.1-24.39.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116232" version="1" comment="libgnutls-extra-devel is &lt;2.4.1-24.39.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114298" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119804" version="1" comment="gnutls is &lt;2.4.1-24.39.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119805" version="1" comment="libgnutls-devel is &lt;2.4.1-24.39.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119806" version="1" comment="libgnutls-extra-devel is &lt;2.4.1-24.39.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119807" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115092" version="1" comment="gtk2 is &lt;2.18.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116233" version="1" comment="gtk2-devel is &lt;2.18.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116234" version="1" comment="gtk2-devel-32bit is &lt;2.18.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121161" version="1" comment="gtk2 is &lt;2.18.9-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121162" version="1" comment="gtk2-devel is &lt;2.18.9-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121163" version="1" comment="gtk2-devel-32bit is &lt;2.18.9-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091200" version="1" comment="libguestfs-devel is &lt;1.20.4-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077639" version="1" comment="ibutils is &lt;1.5.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077638" version="1" comment="ibutils-32bit is &lt;1.5.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077645" version="1" comment="ibutils-devel is &lt;1.5.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077644" version="1" comment="ibutils-devel-32bit is &lt;1.5.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110704" version="1" comment="icu is &lt;4.0-7.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110705" version="1" comment="libicu-32bit is &lt;4.0-7.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110707" version="1" comment="libicu-devel is &lt;4.0-7.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110706" version="1" comment="libicu-devel-32bit is &lt;4.0-7.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102355" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102353" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102354" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114247" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.7-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114252" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.7-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114249" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.7-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118096" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.15-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118097" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.15-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118098" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.15-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102359" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr8.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113507" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr9.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113509" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr9.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118311" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr9.20-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118312" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr9.20-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107715" version="1" comment="kde4-l10n-de-data is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107716" version="1" comment="kde4-l10n-de-doc is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121509" version="1" comment="kdebase4-workspace is &lt;4.3.5-0.12.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121510" version="1" comment="kdebase4-workspace-devel is &lt;4.3.5-0.12.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117938" version="1" comment="kernel-docs is &lt;3.0.101-0.47.71.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099579" version="1" comment="krb5-devel is &lt;1.6.3-133.49.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099578" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099575" version="1" comment="krb5-server is &lt;1.6.3-133.49.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115951" version="1" comment="krb5 is &lt;1.6.3-133.49.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116237" version="1" comment="krb5-devel is &lt;1.6.3-133.49.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116238" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115960" version="1" comment="krb5-server is &lt;1.6.3-133.49.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117939" version="1" comment="krb5 is &lt;1.6.3-133.49.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117940" version="1" comment="krb5-devel is &lt;1.6.3-133.49.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117941" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117942" version="1" comment="krb5-server is &lt;1.6.3-133.49.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101406" version="1" comment="krb5-devel is &lt;1.6.3-133.49.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101405" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101407" version="1" comment="krb5-server is &lt;1.6.3-133.49.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111660" version="1" comment="krb5 is &lt;1.6.3-133.49.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111666" version="1" comment="krb5-devel is &lt;1.6.3-133.49.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111667" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111668" version="1" comment="krb5-server is &lt;1.6.3-133.49.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107520" version="1" comment="libvirt-devel is &lt;1.0.5.9-0.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107519" version="1" comment="libvirt-devel-32bit is &lt;1.0.5.9-0.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116239" version="1" comment="liblcms2-devel is &lt;2.5-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093527" version="1" comment="libQtWebKit-devel is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093509" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093510" version="1" comment="libQtWebKit4-x86 is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093530" version="1" comment="libqt4-devel is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093529" version="1" comment="libqt4-devel-doc is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093528" version="1" comment="libqt4-devel-doc-data is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093531" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093532" version="1" comment="libqt4-sql-mysql-x86 is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093535" version="1" comment="libqt4-sql-postgresql is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093533" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093534" version="1" comment="libqt4-sql-postgresql-x86 is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093536" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093537" version="1" comment="libqt4-sql-sqlite-x86 is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093540" version="1" comment="libqt4-sql-unixODBC is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093538" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093539" version="1" comment="libqt4-sql-unixODBC-x86 is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108067" version="1" comment="libblkid-devel is &lt;2.19.1-6.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108066" version="1" comment="libblkid-devel-32bit is &lt;2.19.1-6.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108069" version="1" comment="libuuid-devel is &lt;2.19.1-6.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108068" version="1" comment="libuuid-devel-32bit is &lt;2.19.1-6.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094597" version="1" comment="postgresql91-devel is &lt;9.1.12-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100813" version="1" comment="mozilla-nss-devel is &lt;3.16.5-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114501" version="1" comment="libgcrypt is &lt;1.5.0-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116241" version="1" comment="libgcrypt-devel is &lt;1.5.0-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116242" version="1" comment="libgcrypt-devel-32bit is &lt;1.5.0-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117509" version="1" comment="libksba is &lt;1.0.4-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117510" version="1" comment="libksba-devel is &lt;1.0.4-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112623" version="1" comment="libmpfr1-32bit is &lt;2.3.2-3.118.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116245" version="1" comment="libmspack is &lt;0.0.20060920alpha-74.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116246" version="1" comment="libmspack-devel is &lt;0.0.20060920alpha-74.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099923" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.39-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099924" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.39-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099925" version="1" comment="libmysqlclient_r15-32bit is &lt;5.0.96-0.6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099926" version="1" comment="libmysqlclient_r15-x86 is &lt;5.0.96-0.6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101165" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117943" version="1" comment="libpng-devel is &lt;1.2.31-5.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117944" version="1" comment="libpng-devel-32bit is &lt;1.2.31-5.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117945" version="1" comment="libpng12-0 is &lt;1.2.31-5.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119808" version="1" comment="libpng-devel is &lt;1.2.31-5.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119809" version="1" comment="libpng-devel-32bit is &lt;1.2.31-5.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119810" version="1" comment="libpng12-0 is &lt;1.2.31-5.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099528" version="1" comment="libpulse-devel is &lt;0.9.23-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116247" version="1" comment="libQtWebKit-devel is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112908" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112936" version="1" comment="libQtWebKit4-x86 is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116248" version="1" comment="libqt4-devel is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116249" version="1" comment="libqt4-devel-doc is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116250" version="1" comment="libqt4-devel-doc-data is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113170" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116251" version="1" comment="libqt4-sql-mysql-x86 is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113171" version="1" comment="libqt4-sql-postgresql is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113172" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116252" version="1" comment="libqt4-sql-postgresql-x86 is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113173" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116253" version="1" comment="libqt4-sql-sqlite-x86 is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113174" version="1" comment="libqt4-sql-unixODBC is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113175" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116254" version="1" comment="libqt4-sql-unixODBC-x86 is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100146" version="1" comment="libreoffice is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100073" version="1" comment="libreoffice-base is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100071" version="1" comment="libreoffice-base-drivers-postgresql is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100072" version="1" comment="libreoffice-base-extensions is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100074" version="1" comment="libreoffice-branding-upstream is &lt;4.0.3.3.26-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100076" version="1" comment="libreoffice-calc is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100075" version="1" comment="libreoffice-calc-extensions is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100078" version="1" comment="libreoffice-draw is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100077" version="1" comment="libreoffice-draw-extensions is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100079" version="1" comment="libreoffice-filters-optional is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100080" version="1" comment="libreoffice-gnome is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100081" version="1" comment="libreoffice-help-cs is &lt;4.0.3.3.26-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100082" version="1" comment="libreoffice-help-da is &lt;4.0.3.3.26-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100083" version="1" comment="libreoffice-help-de is &lt;4.0.3.3.26-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100084" version="1" comment="libreoffice-help-en-GB is &lt;4.0.3.3.26-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100085" version="1" comment="libreoffice-help-en-US is &lt;4.0.3.3.26-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100086" version="1" comment="libreoffice-help-es is &lt;4.0.3.3.26-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100087" version="1" comment="libreoffice-help-fr is &lt;4.0.3.3.26-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100088" version="1" comment="libreoffice-help-gu-IN is &lt;4.0.3.3.26-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100089" version="1" comment="libreoffice-help-hi-IN is &lt;4.0.3.3.26-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100090" version="1" comment="libreoffice-help-hu is &lt;4.0.3.3.26-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100091" version="1" comment="libreoffice-help-it is &lt;4.0.3.3.26-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100092" version="1" comment="libreoffice-help-ja is &lt;4.0.3.3.26-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100093" version="1" comment="libreoffice-help-ko is &lt;4.0.3.3.26-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100094" version="1" comment="libreoffice-help-nl is &lt;4.0.3.3.26-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100095" version="1" comment="libreoffice-help-pl is &lt;4.0.3.3.26-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100097" version="1" comment="libreoffice-help-pt is &lt;4.0.3.3.26-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100096" version="1" comment="libreoffice-help-pt-BR is &lt;4.0.3.3.26-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100098" version="1" comment="libreoffice-help-ru is &lt;4.0.3.3.26-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100099" version="1" comment="libreoffice-help-sv is &lt;4.0.3.3.26-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100100" version="1" comment="libreoffice-help-zh-CN is &lt;4.0.3.3.26-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100101" version="1" comment="libreoffice-help-zh-TW is &lt;4.0.3.3.26-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100102" version="1" comment="libreoffice-icon-themes is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100104" version="1" comment="libreoffice-impress is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100103" version="1" comment="libreoffice-impress-extensions is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100106" version="1" comment="libreoffice-kde is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100105" version="1" comment="libreoffice-kde4 is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100107" version="1" comment="libreoffice-l10n-af is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100108" version="1" comment="libreoffice-l10n-ar is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100109" version="1" comment="libreoffice-l10n-ca is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100110" version="1" comment="libreoffice-l10n-cs is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100111" version="1" comment="libreoffice-l10n-da is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100112" version="1" comment="libreoffice-l10n-de is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100113" version="1" comment="libreoffice-l10n-el is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100114" version="1" comment="libreoffice-l10n-en-GB is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100115" version="1" comment="libreoffice-l10n-es is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100116" version="1" comment="libreoffice-l10n-fi is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100117" version="1" comment="libreoffice-l10n-fr is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100118" version="1" comment="libreoffice-l10n-gu-IN is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100119" version="1" comment="libreoffice-l10n-hi-IN is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100120" version="1" comment="libreoffice-l10n-hu is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100121" version="1" comment="libreoffice-l10n-it is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100122" version="1" comment="libreoffice-l10n-ja is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100123" version="1" comment="libreoffice-l10n-ko is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100124" version="1" comment="libreoffice-l10n-nb is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100125" version="1" comment="libreoffice-l10n-nl is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100126" version="1" comment="libreoffice-l10n-nn is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100127" version="1" comment="libreoffice-l10n-pl is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100128" version="1" comment="libreoffice-l10n-prebuilt is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100130" version="1" comment="libreoffice-l10n-pt is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100129" version="1" comment="libreoffice-l10n-pt-BR is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100131" version="1" comment="libreoffice-l10n-ru is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100132" version="1" comment="libreoffice-l10n-sk is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100133" version="1" comment="libreoffice-l10n-sv is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100134" version="1" comment="libreoffice-l10n-xh is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100135" version="1" comment="libreoffice-l10n-zh-CN is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100136" version="1" comment="libreoffice-l10n-zh-TW is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100137" version="1" comment="libreoffice-l10n-zu is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100138" version="1" comment="libreoffice-mailmerge is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100139" version="1" comment="libreoffice-math is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100140" version="1" comment="libreoffice-mono is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100141" version="1" comment="libreoffice-officebean is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100142" version="1" comment="libreoffice-pyuno is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100143" version="1" comment="libreoffice-sdk is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100145" version="1" comment="libreoffice-writer is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100144" version="1" comment="libreoffice-writer-extensions is &lt;4.0.3.3.26-0.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115081" version="1" comment="librsvg is &lt;2.26.0-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116255" version="1" comment="librsvg-devel is &lt;2.26.0-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116256" version="1" comment="libsndfile is &lt;1.0.20-2.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116257" version="1" comment="libsndfile-devel is &lt;1.0.20-2.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098965" version="1" comment="libtasn1-devel is &lt;1.5-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098826" version="1" comment="libvirt-devel is &lt;1.0.5.9-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098825" version="1" comment="libvirt-devel-32bit is &lt;1.0.5.9-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117511" version="1" comment="LibVNCServer is &lt;0.9.1-156.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117512" version="1" comment="LibVNCServer-devel is &lt;0.9.1-156.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113530" version="1" comment="libwmf is &lt;0.2.8.4-206.29.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116258" version="1" comment="libwmf-32bit is &lt;0.2.8.4-206.29.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116259" version="1" comment="libwmf-devel is &lt;0.2.8.4-206.29.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116260" version="1" comment="libwmf-gnome is &lt;0.2.8.4-206.29.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116261" version="1" comment="libwmf-gnome-32bit is &lt;0.2.8.4-206.29.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116262" version="1" comment="libwmf-gnome-x86 is &lt;0.2.8.4-206.29.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116263" version="1" comment="libwmf-x86 is &lt;0.2.8.4-206.29.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119811" version="1" comment="libxml2 is &lt;2.7.6-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119812" version="1" comment="libxml2-devel is &lt;2.7.6-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119813" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121343" version="1" comment="libxml2 is &lt;2.7.6-0.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121344" version="1" comment="libxml2-devel is &lt;2.7.6-0.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121345" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098482" version="1" comment="lxc is &lt;0.8.0-0.21.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098824" version="1" comment="lxc-devel is &lt;0.8.0-0.21.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115277" version="1" comment="lxc is &lt;0.8.0-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116264" version="1" comment="lxc-devel is &lt;0.8.0-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121803" version="1" comment="bytefx-data-mysql is &lt;2.6.7-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121804" version="1" comment="mono-core is &lt;2.6.7-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121805" version="1" comment="mono-data is &lt;2.6.7-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121806" version="1" comment="mono-data-firebird is &lt;2.6.7-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121807" version="1" comment="mono-data-oracle is &lt;2.6.7-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121808" version="1" comment="mono-data-postgresql is &lt;2.6.7-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121809" version="1" comment="mono-data-sqlite is &lt;2.6.7-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121810" version="1" comment="mono-data-sybase is &lt;2.6.7-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121811" version="1" comment="mono-devel is &lt;2.6.7-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121812" version="1" comment="mono-extras is &lt;2.6.7-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121813" version="1" comment="mono-jscript is &lt;2.6.7-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121814" version="1" comment="mono-locale-extras is &lt;2.6.7-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121815" version="1" comment="mono-nunit is &lt;2.6.7-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121816" version="1" comment="mono-wcf is &lt;2.6.7-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121817" version="1" comment="mono-web is &lt;2.6.7-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121818" version="1" comment="mono-winforms is &lt;2.6.7-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121819" version="1" comment="mono-winfxcore is &lt;2.6.7-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121820" version="1" comment="monodoc-core is &lt;2.6.7-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122509" version="1" comment="MozillaFirefox is &lt;38.6.0esr-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122510" version="1" comment="MozillaFirefox-devel is &lt;38.6.0esr-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122511" version="1" comment="mozilla-nss is &lt;3.20.2-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122512" version="1" comment="mozilla-nss-devel is &lt;3.20.2-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113986" version="1" comment="mozilla-nspr is &lt;4.10.8-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113987" version="1" comment="mozilla-nspr-devel is &lt;4.10.8-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120787" version="1" comment="mozilla-nss is &lt;3.19.2.2-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120788" version="1" comment="mozilla-nss-devel is &lt;3.19.2.2-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091415" version="1" comment="mozilla-nss-devel is &lt;3.15.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115106" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.45-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115105" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.45-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115099" version="1" comment="mysql is &lt;5.5.45-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118180" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.46-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118181" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.46-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118182" version="1" comment="mysql is &lt;5.5.46-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122356" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.47-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122357" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.47-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122358" version="1" comment="mysql is &lt;5.5.47-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114279" version="1" comment="libsnmp15-32bit is &lt;5.4.2.1-8.12.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114281" version="1" comment="net-snmp is &lt;5.4.2.1-8.12.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116265" version="1" comment="net-snmp-devel is &lt;5.4.2.1-8.12.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116266" version="1" comment="net-snmp-devel-32bit is &lt;5.4.2.1-8.12.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091796" version="1" comment="mozilla-nss-devel is &lt;3.15.3-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114132" version="1" comment="openldap2 is &lt;2.4.26-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116267" version="1" comment="openldap2-back-perl is &lt;2.4.26-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114134" version="1" comment="openldap2-client is &lt;2.4.26-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116268" version="1" comment="openldap2-devel is &lt;2.4.26-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116269" version="1" comment="openldap2-devel-32bit is &lt;2.4.26-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119827" version="1" comment="openldap2 is &lt;2.4.26-0.62.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119828" version="1" comment="openldap2-back-perl is &lt;2.4.26-0.62.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119829" version="1" comment="openldap2-client is &lt;2.4.26-0.62.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119830" version="1" comment="openldap2-devel is &lt;2.4.26-0.62.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119831" version="1" comment="openldap2-devel-32bit is &lt;2.4.26-0.62.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118738" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118739" version="1" comment="openssl is &lt;0.9.8j-0.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116270" version="1" comment="osc is &lt;0.152.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098932" version="1" comment="pam-devel is &lt;1.1.5-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098931" version="1" comment="pam-devel-32bit is &lt;1.1.5-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116271" version="1" comment="perl-base-32bit is &lt;5.10.0-64.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114005" version="1" comment="php53 is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116272" version="1" comment="php53-devel is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116273" version="1" comment="php53-imap is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116274" version="1" comment="php53-posix is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116275" version="1" comment="php53-readline is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116276" version="1" comment="php53-sockets is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116277" version="1" comment="php53-sqlite is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116278" version="1" comment="php53-tidy is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115152" version="1" comment="php53 is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116279" version="1" comment="php53-devel is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116280" version="1" comment="php53-imap is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116281" version="1" comment="php53-posix is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116282" version="1" comment="php53-readline is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116283" version="1" comment="php53-sockets is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116284" version="1" comment="php53-sqlite is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116285" version="1" comment="php53-tidy is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103181" version="1" comment="popt-devel is &lt;1.7-37.60.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103180" version="1" comment="popt-devel-32bit is &lt;1.7-37.60.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103182" version="1" comment="rpm-32bit is &lt;4.4.2.3-37.60.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103184" version="1" comment="rpm-devel is &lt;4.4.2.3-37.60.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103183" version="1" comment="rpm-devel-32bit is &lt;4.4.2.3-37.60.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103185" version="1" comment="rpm-x86 is &lt;4.4.2.3-37.60.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123270" version="1" comment="postgresql94-devel is &lt;9.4.5-0.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123271" version="1" comment="postgresql94-libs is &lt;9.4.5-0.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108213" version="1" comment="postgresql91-devel is &lt;9.1.15-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110597" version="1" comment="postgresql91-devel is &lt;9.1.18-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121690" version="1" comment="postgresql91-devel is &lt;9.1.19-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121691" version="1" comment="postgresql91-libs is &lt;9.1.19-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102333" version="1" comment="python-32bit is &lt;2.6.9-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102334" version="1" comment="python-demo is &lt;2.6.9-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102335" version="1" comment="python-devel is &lt;2.6.9-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102337" version="1" comment="python-doc is &lt;2.6-8.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102336" version="1" comment="python-doc-pdf is &lt;2.6-8.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102338" version="1" comment="python-gdbm is &lt;2.6.9-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102339" version="1" comment="python-idle is &lt;2.6.9-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102340" version="1" comment="python-tk is &lt;2.6.9-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112676" version="1" comment="python-32bit is &lt;2.6.9-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112680" version="1" comment="python-demo is &lt;2.6.9-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113176" version="1" comment="python-devel is &lt;2.6.9-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112681" version="1" comment="python-doc is &lt;2.6-8.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112682" version="1" comment="python-doc-pdf is &lt;2.6-8.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112683" version="1" comment="python-gdbm is &lt;2.6.9-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112684" version="1" comment="python-idle is &lt;2.6.9-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112685" version="1" comment="python-tk is &lt;2.6.9-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098671" version="1" comment="python-32bit is &lt;2.6.9-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098676" version="1" comment="python-demo is &lt;2.6.9-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098908" version="1" comment="python-devel is &lt;2.6.9-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098678" version="1" comment="python-doc is &lt;2.6-8.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098677" version="1" comment="python-doc-pdf is &lt;2.6-8.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098679" version="1" comment="python-gdbm is &lt;2.6.9-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098680" version="1" comment="python-idle is &lt;2.6.9-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098681" version="1" comment="python-tk is &lt;2.6.9-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099514" version="1" comment="python-32bit is &lt;2.6.9-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099519" version="1" comment="python-demo is &lt;2.6.9-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099533" version="1" comment="python-devel is &lt;2.6.9-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099521" version="1" comment="python-doc is &lt;2.6-8.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099520" version="1" comment="python-doc-pdf is &lt;2.6-8.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099522" version="1" comment="python-gdbm is &lt;2.6.9-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099523" version="1" comment="python-idle is &lt;2.6.9-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099524" version="1" comment="python-tk is &lt;2.6.9-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098793" version="1" comment="python-setuptools is &lt;0.6c8-10.19.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114730" version="1" comment="python-setuptools is &lt;0.6c11-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116286" version="1" comment="rubygem-activerecord-2_3 is &lt;2.3.17-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116287" version="1" comment="rubygem-activesupport-2_3 is &lt;2.3.17-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098794" version="1" comment="ruby-devel is &lt;1.8.7.p357-0.9.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098366" version="1" comment="ruby-doc-html is &lt;1.8.7.p357-0.9.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098795" version="1" comment="ruby-doc-ri is &lt;1.8.7.p357-0.9.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098796" version="1" comment="ruby-examples is &lt;1.8.7.p357-0.9.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098797" version="1" comment="ruby-test-suite is &lt;1.8.7.p357-0.9.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098367" version="1" comment="ruby-tk is &lt;1.8.7.p357-0.9.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098845" version="1" comment="rubygem-actionpack-2_3 is &lt;2.3.17-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118070" version="1" comment="rubygem-activesupport-3_2 is &lt;3.2.12-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122427" version="1" comment="rubygem-activesupport-3_2 is &lt;3.2.12-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116290" version="1" comment="rubygem-mail-2_3 is &lt;2.3.0-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116291" version="1" comment="rubygem-rack is &lt;1.1.6-0.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116292" version="1" comment="rubygem-rack-1_4 is &lt;1.4.5-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125950" version="1" comment="libldb-devel is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125951" version="1" comment="libnetapi-devel is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125952" version="1" comment="libnetapi0 is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125953" version="1" comment="libsmbclient-devel is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125954" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125955" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125956" version="1" comment="libtalloc-devel is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125957" version="1" comment="libtdb-devel is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125958" version="1" comment="libtevent-devel is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125959" version="1" comment="libwbclient-devel is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125960" version="1" comment="samba is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125961" version="1" comment="samba-devel is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125962" version="1" comment="samba-test is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106581" version="1" comment="libldb-devel is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106582" version="1" comment="libnetapi-devel is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106583" version="1" comment="libnetapi0 is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106584" version="1" comment="libsmbclient-devel is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106585" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106586" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106587" version="1" comment="libtalloc-devel is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106588" version="1" comment="libtdb-devel is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106589" version="1" comment="libtevent-devel is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106590" version="1" comment="libwbclient-devel is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106591" version="1" comment="samba-devel is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121346" version="1" comment="libldb-devel is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121347" version="1" comment="libnetapi-devel is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121348" version="1" comment="libnetapi0 is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121349" version="1" comment="libsmbclient-devel is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121350" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121351" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121352" version="1" comment="libtalloc-devel is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121353" version="1" comment="libtdb-devel is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121354" version="1" comment="libtevent-devel is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121355" version="1" comment="libwbclient-devel is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121356" version="1" comment="samba is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121357" version="1" comment="samba-devel is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121358" version="1" comment="samba-test is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102689" version="1" comment="gnu-efi is &lt;3.0u-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098848" version="1" comment="struts is &lt;1.2.9-162.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098846" version="1" comment="struts-javadoc is &lt;1.2.9-162.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098847" version="1" comment="struts-manual is &lt;1.2.9-162.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099932" version="1" comment="subversion is &lt;1.6.17-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099927" version="1" comment="subversion-devel is &lt;1.6.17-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099928" version="1" comment="subversion-perl is &lt;1.6.17-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099929" version="1" comment="subversion-python is &lt;1.6.17-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099930" version="1" comment="subversion-server is &lt;1.6.17-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099931" version="1" comment="subversion-tools is &lt;1.6.17-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114303" version="1" comment="libtidy is &lt;1.0-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116293" version="1" comment="libtidy-devel is &lt;1.0-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114304" version="1" comment="tidy is &lt;1.0-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116294" version="1" comment="libtiff-devel is &lt;3.8.2-141.160.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116295" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-141.160.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113932" version="1" comment="tiff is &lt;3.8.2-141.160.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102352" version="1" comment="wireshark is &lt;1.10.11-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102351" version="1" comment="wireshark-devel is &lt;1.10.11-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114787" version="1" comment="wireshark is &lt;1.12.7-0.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116296" version="1" comment="wireshark-devel is &lt;1.12.7-0.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120995" version="1" comment="wireshark is &lt;1.12.9-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120996" version="1" comment="wireshark-devel is &lt;1.12.9-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109724" version="1" comment="xen-devel is &lt;4.2.5_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103190" version="1" comment="xen-devel is &lt;4.2.5_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114109" version="1" comment="xen is &lt;4.2.5_12-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116299" version="1" comment="xen-devel is &lt;4.2.5_12-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115412" version="1" comment="xen is &lt;4.2.5_14-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116300" version="1" comment="xen-devel is &lt;4.2.5_14-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089833" version="1" comment="xen-devel is &lt;4.2.2_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091793" version="1" comment="xen-devel is &lt;4.2.3_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092112" version="1" comment="xen-devel is &lt;4.2.3_08-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094171" version="1" comment="xen-devel is &lt;4.2.4_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101038" version="1" comment="xen-devel is &lt;4.2.4_04-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108974" version="1" comment="xen-devel is &lt;4.2.5_04-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110340" version="1" comment="xen-devel is &lt;4.2.5_08-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118666" version="1" comment="xen is &lt;4.2.5_18-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118667" version="1" comment="xen-devel is &lt;4.2.5_18-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116301" version="1" comment="xfsprogs is &lt;3.1.8-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116302" version="1" comment="xfsprogs-devel is &lt;3.1.8-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092730" version="1" comment="xorg-x11-server-sdk is &lt;7.4-27.85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098872" version="1" comment="xorg-x11-devel is &lt;7.4-8.26.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098871" version="1" comment="xorg-x11-devel-32bit is &lt;7.4-8.26.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113218" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116303" version="1" comment="xorg-x11-libX11-devel is &lt;7.4-5.11.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116304" version="1" comment="xorg-x11-libX11-devel-32bit is &lt;7.4-5.11.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127454" version="1" comment="GraphicsMagick is &lt;1.2.5-4.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127455" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127456" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128961" version="1" comment="GraphicsMagick is &lt;1.2.5-4.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128962" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128963" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129912" version="1" comment="GraphicsMagick is &lt;1.2.5-4.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129913" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129914" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135265" version="1" comment="GraphicsMagick is &lt;1.2.5-4.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135266" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135267" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135947" version="1" comment="GraphicsMagick is &lt;1.2.5-4.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135948" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135949" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147847" version="1" comment="GraphicsMagick is &lt;1.2.5-4.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147848" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147849" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148682" version="1" comment="GraphicsMagick is &lt;1.2.5-4.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148683" version="1" comment="libGraphicsMagick2 is &lt;1.2.5-4.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148684" version="1" comment="perl-GraphicsMagick is &lt;1.2.5-4.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127457" version="1" comment="ImageMagick is &lt;6.4.3.6-7.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127458" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127459" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127460" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127461" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127462" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127463" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127557" version="1" comment="ImageMagick is &lt;6.4.3.6-7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127558" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127559" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127560" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127561" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127562" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127563" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128964" version="1" comment="ImageMagick is &lt;6.4.3.6-7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128965" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128966" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128967" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128968" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128969" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128970" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129915" version="1" comment="ImageMagick is &lt;6.4.3.6-7.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129916" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129917" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129918" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129919" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129920" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129921" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131967" version="1" comment="ImageMagick is &lt;6.4.3.6-7.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131968" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131969" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131970" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131971" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131972" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131973" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136160" version="1" comment="ImageMagick is &lt;6.4.3.6-7.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136161" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136162" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136163" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136164" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136165" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136166" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145849" version="1" comment="ImageMagick is &lt;6.4.3.6-7.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145850" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145851" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145852" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145853" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145854" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145855" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149081" version="1" comment="ImageMagick is &lt;6.4.3.6-7.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149082" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149083" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149084" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149085" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149086" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149087" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146891" version="1" comment="LibVNCServer is &lt;0.9.1-159.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146892" version="1" comment="LibVNCServer-devel is &lt;0.9.1-159.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123674" version="1" comment="MozillaFirefox is &lt;38.6.1esr-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123675" version="1" comment="MozillaFirefox-devel is &lt;38.6.1esr-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127922" version="1" comment="MozillaFirefox is &lt;38.8.0esr-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127923" version="1" comment="MozillaFirefox-devel is &lt;38.8.0esr-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127924" version="1" comment="mozilla-nspr is &lt;4.12-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127925" version="1" comment="mozilla-nspr-devel is &lt;4.12-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127926" version="1" comment="mozilla-nss is &lt;3.20.2-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127927" version="1" comment="mozilla-nss-devel is &lt;3.20.2-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130047" version="1" comment="MozillaFirefox is &lt;45.2.0esr-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130048" version="1" comment="MozillaFirefox-devel is &lt;45.2.0esr-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130049" version="1" comment="firefox-fontconfig is &lt;2.11.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130050" version="1" comment="firefox-fontconfig-devel is &lt;2.11.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130051" version="1" comment="mozilla-nspr is &lt;4.12-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130052" version="1" comment="mozilla-nspr-devel is &lt;4.12-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130053" version="1" comment="mozilla-nss is &lt;3.21.1-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130054" version="1" comment="mozilla-nss-devel is &lt;3.21.1-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131974" version="1" comment="MozillaFirefox is &lt;45.3.0esr-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131975" version="1" comment="MozillaFirefox-devel is &lt;45.3.0esr-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131976" version="1" comment="MozillaFirefox is &lt;45.4.0esr-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131977" version="1" comment="MozillaFirefox-devel is &lt;45.4.0esr-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144677" version="1" comment="MozillaFirefox is &lt;45.6.0esr-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144678" version="1" comment="MozillaFirefox-devel is &lt;45.6.0esr-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148250" version="1" comment="MozillaFirefox is &lt;45.7.0esr-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148251" version="1" comment="MozillaFirefox-devel is &lt;45.7.0esr-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149642" version="1" comment="MozillaFirefox is &lt;45.8.0esr-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149643" version="1" comment="MozillaFirefox-devel is &lt;45.8.0esr-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124749" version="1" comment="MozillaFirefox is &lt;38.7.0esr-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124750" version="1" comment="MozillaFirefox-devel is &lt;38.7.0esr-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124751" version="1" comment="mozilla-nspr is &lt;4.12-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124752" version="1" comment="mozilla-nspr-devel is &lt;4.12-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124753" version="1" comment="mozilla-nss is &lt;3.20.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124754" version="1" comment="mozilla-nss-devel is &lt;3.20.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113835" version="1" comment="xen is &lt;4.4.2_12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116306" version="1" comment="xen-devel is &lt;4.4.2_12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130453" version="1" comment="apache2 is &lt;2.2.12-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130454" version="1" comment="apache2-devel is &lt;2.2.12-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130455" version="1" comment="apache2-doc is &lt;2.2.12-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130456" version="1" comment="apache2-example-pages is &lt;2.2.12-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130457" version="1" comment="apache2-prefork is &lt;2.2.12-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130458" version="1" comment="apache2-utils is &lt;2.2.12-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130459" version="1" comment="apache2-worker is &lt;2.2.12-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149644" version="1" comment="apache2 is &lt;2.2.12-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149645" version="1" comment="apache2-devel is &lt;2.2.12-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149646" version="1" comment="apache2-doc is &lt;2.2.12-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149647" version="1" comment="apache2-example-pages is &lt;2.2.12-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149648" version="1" comment="apache2-prefork is &lt;2.2.12-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149649" version="1" comment="apache2-utils is &lt;2.2.12-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149650" version="1" comment="apache2-worker is &lt;2.2.12-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130460" version="1" comment="apache2-mod_fcgid is &lt;2.2-31.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147850" version="1" comment="bash is &lt;3.2-147.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147851" version="1" comment="libreadline5 is &lt;5.2-147.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147852" version="1" comment="readline-devel is &lt;5.2-147.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147853" version="1" comment="readline-devel-32bit is &lt;5.2-147.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125041" version="1" comment="bind is &lt;9.9.6P1-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125042" version="1" comment="bind-devel is &lt;9.9.6P1-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125043" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131978" version="1" comment="bind is &lt;9.9.6P1-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131979" version="1" comment="bind-devel is &lt;9.9.6P1-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131980" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135225" version="1" comment="bind is &lt;9.9.6P1-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135226" version="1" comment="bind-devel is &lt;9.9.6P1-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135227" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146893" version="1" comment="bind is &lt;9.9.6P1-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146894" version="1" comment="bind-devel is &lt;9.9.6P1-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146895" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149112" version="1" comment="bind is &lt;9.9.6P1-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149113" version="1" comment="bind-devel is &lt;9.9.6P1-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149114" version="1" comment="bind-devel-32bit is &lt;9.9.6P1-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130771" version="1" comment="bsdtar is &lt;2.5.5-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130772" version="1" comment="libarchive-devel is &lt;2.5.5-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124483" version="1" comment="bsh2 is &lt;2.0-318.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124484" version="1" comment="bsh2-classgen is &lt;2.0-318.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124485" version="1" comment="bsh2-javadoc is &lt;2.0-318.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131981" version="1" comment="cracklib is &lt;2.8.12-56.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131982" version="1" comment="cracklib-devel is &lt;2.8.12-56.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129096" version="1" comment="ctdb is &lt;1.0.114.6-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129097" version="1" comment="ctdb-devel is &lt;1.0.114.6-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131983" version="1" comment="curl is &lt;7.19.7-1.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131984" version="1" comment="libcurl-devel is &lt;7.19.7-1.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135234" version="1" comment="curl is &lt;7.19.7-1.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135235" version="1" comment="libcurl-devel is &lt;7.19.7-1.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128344" version="1" comment="cyrus-imapd is &lt;2.3.11-60.65.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128345" version="1" comment="cyrus-imapd-devel is &lt;2.3.11-60.65.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128346" version="1" comment="perl-Cyrus-IMAP is &lt;2.3.11-60.65.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128347" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.3.11-60.65.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131985" version="1" comment="dhcp is &lt;4.2.4.P2-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131986" version="1" comment="dhcp-devel is &lt;4.2.4.P2-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128471" version="1" comment="expat is &lt;2.0.1-88.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128472" version="1" comment="libexpat-devel is &lt;2.0.1-88.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148218" version="1" comment="expat is &lt;2.0.1-88.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148219" version="1" comment="libexpat-devel is &lt;2.0.1-88.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131987" version="1" comment="fontconfig is &lt;2.6.0-10.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131988" version="1" comment="fontconfig-devel is &lt;2.6.0-10.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131989" version="1" comment="fontconfig-devel-32bit is &lt;2.6.0-10.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126716" version="1" comment="freetype2 is &lt;2.3.7-25.41.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126717" version="1" comment="freetype2-devel is &lt;2.3.7-25.41.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126718" version="1" comment="freetype2-devel-32bit is &lt;2.3.7-25.41.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148054" version="1" comment="cpp48 is &lt;4.8.5-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148055" version="1" comment="gcc48 is &lt;4.8.5-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148056" version="1" comment="gcc48-32bit is &lt;4.8.5-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148057" version="1" comment="gcc48-c++ is &lt;4.8.5-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148058" version="1" comment="gcc48-fortran is &lt;4.8.5-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148059" version="1" comment="gcc48-fortran-32bit is &lt;4.8.5-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148060" version="1" comment="gcc48-info is &lt;4.8.5-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148061" version="1" comment="gcc48-locale is &lt;4.8.5-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148062" version="1" comment="libasan0 is &lt;4.8.5-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148063" version="1" comment="libasan0-32bit is &lt;4.8.5-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148064" version="1" comment="libstdc++48-devel is &lt;4.8.5-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148065" version="1" comment="libstdc++48-devel-32bit is &lt;4.8.5-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125493" version="1" comment="cpp5 is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125494" version="1" comment="gcc5 is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125495" version="1" comment="gcc5-32bit is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125496" version="1" comment="gcc5-c++ is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125497" version="1" comment="gcc5-c++-32bit is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125498" version="1" comment="gcc5-fortran is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125499" version="1" comment="gcc5-fortran-32bit is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125500" version="1" comment="gcc5-info is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125501" version="1" comment="gcc5-locale is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125502" version="1" comment="libasan2 is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125503" version="1" comment="libasan2-32bit is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125504" version="1" comment="libatomic1 is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125505" version="1" comment="libcilkrts5 is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125506" version="1" comment="libcilkrts5-32bit is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125507" version="1" comment="libffi-devel-gcc5 is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125508" version="1" comment="libffi-devel-gcc5-32bit is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125509" version="1" comment="libffi-gcc5 is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125510" version="1" comment="libgfortran3 is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125511" version="1" comment="libitm1 is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125512" version="1" comment="libitm1-32bit is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125513" version="1" comment="liblsan0 is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125514" version="1" comment="libquadmath0 is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125515" version="1" comment="libstdc++6-devel-gcc5 is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125516" version="1" comment="libstdc++6-devel-gcc5-32bit is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125517" version="1" comment="libtsan0 is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125518" version="1" comment="libubsan0 is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125519" version="1" comment="libubsan0-32bit is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131990" version="1" comment="gd is &lt;2.0.36.RC1-52.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131991" version="1" comment="gd-devel is &lt;2.0.36.RC1-52.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131992" version="1" comment="gd is &lt;2.0.36.RC1-52.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131993" version="1" comment="gd-devel is &lt;2.0.36.RC1-52.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145675" version="1" comment="gd is &lt;2.0.36.RC1-52.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145676" version="1" comment="gd-devel is &lt;2.0.36.RC1-52.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148426" version="1" comment="gd is &lt;2.0.36.RC1-52.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148427" version="1" comment="gd-devel is &lt;2.0.36.RC1-52.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135268" version="1" comment="ghostscript-devel is &lt;8.62-32.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135269" version="1" comment="ghostscript-ijs-devel is &lt;8.62-32.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135270" version="1" comment="ghostscript-library is &lt;8.62-32.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135271" version="1" comment="libgimpprint-devel is &lt;4.2.7-32.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131994" version="1" comment="ghostscript-devel is &lt;8.62-32.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131995" version="1" comment="ghostscript-ijs-devel is &lt;8.62-32.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131996" version="1" comment="ghostscript-library is &lt;8.62-32.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131997" version="1" comment="libgimpprint-devel is &lt;4.2.7-32.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126719" version="1" comment="giflib is &lt;4.1.6-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126720" version="1" comment="giflib-devel is &lt;4.1.6-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126721" version="1" comment="giflib-devel-32bit is &lt;4.1.6-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130463" version="1" comment="gimp is &lt;2.6.2-3.34.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130464" version="1" comment="gimp-devel is &lt;2.6.2-3.34.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130465" version="1" comment="gimp-lang is &lt;2.6.2-3.34.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130466" version="1" comment="gimp-plugins-python is &lt;2.6.2-3.34.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124831" version="1" comment="git is &lt;1.7.12.4-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124832" version="1" comment="git-arch is &lt;1.7.12.4-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124833" version="1" comment="git-core is &lt;1.7.12.4-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124834" version="1" comment="git-cvs is &lt;1.7.12.4-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124835" version="1" comment="git-daemon is &lt;1.7.12.4-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124836" version="1" comment="git-email is &lt;1.7.12.4-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124837" version="1" comment="git-gui is &lt;1.7.12.4-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124838" version="1" comment="git-svn is &lt;1.7.12.4-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124839" version="1" comment="git-web is &lt;1.7.12.4-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124840" version="1" comment="gitk is &lt;1.7.12.4-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131998" version="1" comment="glibc is &lt;2.11.3-17.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131999" version="1" comment="glibc-html is &lt;2.11.3-17.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132000" version="1" comment="glibc-info is &lt;2.11.3-17.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147854" version="1" comment="gnutls is &lt;2.4.1-24.39.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147855" version="1" comment="libgnutls-devel is &lt;2.4.1-24.39.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147856" version="1" comment="libgnutls-extra-devel is &lt;2.4.1-24.39.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147857" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147775" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.35-5.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147776" version="1" comment="gstreamer-0_10-plugins-base-devel is &lt;0.10.35-5.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132001" version="1" comment="gtk2 is &lt;2.18.9-0.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132002" version="1" comment="gtk2-devel is &lt;2.18.9-0.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132003" version="1" comment="gtk2-devel-32bit is &lt;2.18.9-0.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148163" version="1" comment="guile is &lt;1.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148164" version="1" comment="guile-devel is &lt;1.8.5-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115112" version="1" comment="icu is &lt;4.0-7.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115116" version="1" comment="libicu-32bit is &lt;4.0-7.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116307" version="1" comment="libicu-devel is &lt;4.0-7.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116308" version="1" comment="libicu-devel-32bit is &lt;4.0-7.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126437" version="1" comment="icu is &lt;4.0-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126438" version="1" comment="libicu-32bit is &lt;4.0-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126439" version="1" comment="libicu-devel is &lt;4.0-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126440" version="1" comment="libicu-devel-32bit is &lt;4.0-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147458" version="1" comment="icu is &lt;4.0-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147459" version="1" comment="libicu-32bit is &lt;4.0-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147460" version="1" comment="libicu-devel is &lt;4.0-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147461" version="1" comment="libicu-devel-32bit is &lt;4.0-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148462" version="1" comment="icu is &lt;4.0-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148463" version="1" comment="libicu-32bit is &lt;4.0-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148464" version="1" comment="libicu-devel is &lt;4.0-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148465" version="1" comment="libicu-devel-32bit is &lt;4.0-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128394" version="1" comment="imlib2 is &lt;1.4.2-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128395" version="1" comment="imlib2-devel is &lt;1.4.2-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128396" version="1" comment="imlib2-filters is &lt;1.4.2-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128397" version="1" comment="imlib2-loaders is &lt;1.4.2-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135430" version="1" comment="jasper is &lt;1.900.14-134.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135431" version="1" comment="libjasper-devel is &lt;1.900.14-134.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113214" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116309" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118313" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.20-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118314" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.20-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122513" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.30-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122514" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.30-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127564" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.40-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127565" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.40-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136684" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.60-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136685" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.60-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149651" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr4.1-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149652" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr4.1-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132004" version="1" comment="java-1_7_1-ibm is &lt;1.7.1_sr3.50-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132005" version="1" comment="java-1_7_1-ibm-devel is &lt;1.7.1_sr3.50-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132006" version="1" comment="kernel-docs is &lt;3.0.101-80.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136294" version="1" comment="kernel-docs is &lt;3.0.101-88.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148271" version="1" comment="kernel-docs is &lt;3.0.101-94.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116310" version="1" comment="kernel-docs is &lt;3.0.101-65.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125520" version="1" comment="kernel-docs is &lt;3.0.101-71.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118621" version="1" comment="kernel-docs is &lt;3.0.101-68.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129234" version="1" comment="kernel-docs is &lt;3.0.101-77.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132007" version="1" comment="kernel-docs is &lt;3.0.101-84.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122515" version="1" comment="krb5 is &lt;1.6.3-133.49.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122516" version="1" comment="krb5-devel is &lt;1.6.3-133.49.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122517" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122518" version="1" comment="krb5-server is &lt;1.6.3-133.49.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126441" version="1" comment="krb5 is &lt;1.6.3-133.49.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126442" version="1" comment="krb5-devel is &lt;1.6.3-133.49.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126443" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126444" version="1" comment="krb5-server is &lt;1.6.3-133.49.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148066" version="1" comment="libcap-ng is &lt;0.6.3-1.9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148067" version="1" comment="libcap-ng-devel is &lt;0.6.3-1.9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148068" version="1" comment="python-capng is &lt;0.6.3-1.9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146083" version="1" comment="libcares-devel is &lt;1.7.4-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146084" version="1" comment="libcares2 is &lt;1.7.4-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132008" version="1" comment="libgcrypt is &lt;1.5.0-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132009" version="1" comment="libgcrypt-devel is &lt;1.5.0-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132010" version="1" comment="libgcrypt-devel-32bit is &lt;1.5.0-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132011" version="1" comment="libidn is &lt;1.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132012" version="1" comment="libidn-devel is &lt;1.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128473" version="1" comment="libksba is &lt;1.0.4-1.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128474" version="1" comment="libksba-devel is &lt;1.0.4-1.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124486" version="1" comment="libotr is &lt;3.2.0-10.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124487" version="1" comment="libotr-devel is &lt;3.2.0-10.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149422" version="1" comment="libquicktime is &lt;1.0.3-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149423" version="1" comment="libquicktime-devel is &lt;1.0.3-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118388" version="1" comment="google-carlito-fonts is &lt;1.1.03.beta1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121850" version="1" comment="hyphen is &lt;2.8.8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121851" version="1" comment="hyphen-devel is &lt;2.8.8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121852" version="1" comment="libhyphen0 is &lt;2.8.8-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118389" version="1" comment="libmythes-1_2-0 is &lt;1.2.4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121853" version="1" comment="libreoffice is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121854" version="1" comment="libreoffice-base is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121855" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121856" version="1" comment="libreoffice-branding-upstream is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121857" version="1" comment="libreoffice-calc is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121858" version="1" comment="libreoffice-calc-extensions is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121859" version="1" comment="libreoffice-draw is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121860" version="1" comment="libreoffice-filters-optional is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121861" version="1" comment="libreoffice-gnome is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122063" version="1" comment="libreoffice-icon-theme-galaxy is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121862" version="1" comment="libreoffice-icon-theme-tango is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121863" version="1" comment="libreoffice-impress is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121864" version="1" comment="libreoffice-kde4 is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121865" version="1" comment="libreoffice-l10n-af is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121866" version="1" comment="libreoffice-l10n-ar is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121867" version="1" comment="libreoffice-l10n-ca is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121868" version="1" comment="libreoffice-l10n-cs is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121869" version="1" comment="libreoffice-l10n-da is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121870" version="1" comment="libreoffice-l10n-de is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121871" version="1" comment="libreoffice-l10n-en is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121872" version="1" comment="libreoffice-l10n-es is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121873" version="1" comment="libreoffice-l10n-fi is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121874" version="1" comment="libreoffice-l10n-fr is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121875" version="1" comment="libreoffice-l10n-gu is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121876" version="1" comment="libreoffice-l10n-hi is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121877" version="1" comment="libreoffice-l10n-hu is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121878" version="1" comment="libreoffice-l10n-it is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121879" version="1" comment="libreoffice-l10n-ja is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121880" version="1" comment="libreoffice-l10n-ko is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121881" version="1" comment="libreoffice-l10n-nb is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121882" version="1" comment="libreoffice-l10n-nl is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121883" version="1" comment="libreoffice-l10n-nn is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121884" version="1" comment="libreoffice-l10n-pl is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121885" version="1" comment="libreoffice-l10n-pt-BR is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121886" version="1" comment="libreoffice-l10n-pt-PT is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121887" version="1" comment="libreoffice-l10n-ru is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121888" version="1" comment="libreoffice-l10n-sk is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121889" version="1" comment="libreoffice-l10n-sv is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121890" version="1" comment="libreoffice-l10n-xh is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121891" version="1" comment="libreoffice-l10n-zh-Hans is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121892" version="1" comment="libreoffice-l10n-zh-Hant is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121893" version="1" comment="libreoffice-l10n-zu is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121894" version="1" comment="libreoffice-mailmerge is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121895" version="1" comment="libreoffice-math is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121896" version="1" comment="libreoffice-officebean is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121897" version="1" comment="libreoffice-pyuno is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121898" version="1" comment="libreoffice-sdk is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121899" version="1" comment="libreoffice-voikko is &lt;4.1-2.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121900" version="1" comment="libreoffice-writer is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121901" version="1" comment="libreoffice-writer-extensions is &lt;5.0.4.2-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119448" version="1" comment="libvoikko is &lt;3.7.1-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119449" version="1" comment="libvoikko-devel is &lt;3.7.1-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119450" version="1" comment="libvoikko1 is &lt;3.7.1-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118391" version="1" comment="myspell-af_NA is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118392" version="1" comment="myspell-af_ZA is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118395" version="1" comment="myspell-ar is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118396" version="1" comment="myspell-ar_AE is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118397" version="1" comment="myspell-ar_BH is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118398" version="1" comment="myspell-ar_DZ is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118399" version="1" comment="myspell-ar_EG is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118400" version="1" comment="myspell-ar_IQ is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118401" version="1" comment="myspell-ar_JO is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118402" version="1" comment="myspell-ar_KW is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118403" version="1" comment="myspell-ar_LB is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118404" version="1" comment="myspell-ar_LY is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118405" version="1" comment="myspell-ar_MA is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118406" version="1" comment="myspell-ar_OM is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118407" version="1" comment="myspell-ar_QA is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118408" version="1" comment="myspell-ar_SA is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118409" version="1" comment="myspell-ar_SD is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118410" version="1" comment="myspell-ar_SY is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118411" version="1" comment="myspell-ar_TN is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118412" version="1" comment="myspell-ar_YE is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118413" version="1" comment="myspell-be_BY is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118414" version="1" comment="myspell-bg_BG is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118415" version="1" comment="myspell-bn_BD is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118416" version="1" comment="myspell-bn_IN is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118418" version="1" comment="myspell-bs is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118419" version="1" comment="myspell-bs_BA is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118420" version="1" comment="myspell-ca is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118421" version="1" comment="myspell-ca_AD is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118422" version="1" comment="myspell-ca_ES is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118423" version="1" comment="myspell-ca_ES_valencia is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118424" version="1" comment="myspell-ca_FR is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118425" version="1" comment="myspell-ca_IT is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118426" version="1" comment="myspell-cs_CZ is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118427" version="1" comment="myspell-da_DK is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118428" version="1" comment="myspell-de is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118429" version="1" comment="myspell-de_AT is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118430" version="1" comment="myspell-de_CH is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118431" version="1" comment="myspell-de_DE is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118432" version="1" comment="myspell-dictionaries is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118433" version="1" comment="myspell-el_GR is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118434" version="1" comment="myspell-en is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118435" version="1" comment="myspell-en_AU is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118436" version="1" comment="myspell-en_BS is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118437" version="1" comment="myspell-en_BZ is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118438" version="1" comment="myspell-en_CA is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118439" version="1" comment="myspell-en_GB is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118440" version="1" comment="myspell-en_GH is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118441" version="1" comment="myspell-en_IE is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118442" version="1" comment="myspell-en_IN is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118443" version="1" comment="myspell-en_JM is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118444" version="1" comment="myspell-en_MW is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118445" version="1" comment="myspell-en_NA is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118446" version="1" comment="myspell-en_NZ is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118447" version="1" comment="myspell-en_PH is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118448" version="1" comment="myspell-en_TT is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118449" version="1" comment="myspell-en_US is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118450" version="1" comment="myspell-en_ZA is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118451" version="1" comment="myspell-en_ZW is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118452" version="1" comment="myspell-es is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118453" version="1" comment="myspell-es_AR is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118454" version="1" comment="myspell-es_BO is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118455" version="1" comment="myspell-es_CL is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118456" version="1" comment="myspell-es_CO is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118457" version="1" comment="myspell-es_CR is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118458" version="1" comment="myspell-es_CU is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118459" version="1" comment="myspell-es_DO is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118460" version="1" comment="myspell-es_EC is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118461" version="1" comment="myspell-es_ES is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118462" version="1" comment="myspell-es_GT is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118463" version="1" comment="myspell-es_HN is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118464" version="1" comment="myspell-es_MX is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118465" version="1" comment="myspell-es_NI is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118466" version="1" comment="myspell-es_PA is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118467" version="1" comment="myspell-es_PE is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118468" version="1" comment="myspell-es_PR is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118469" version="1" comment="myspell-es_PY is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118470" version="1" comment="myspell-es_SV is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118471" version="1" comment="myspell-es_UY is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118472" version="1" comment="myspell-es_VE is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118473" version="1" comment="myspell-et_EE is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118474" version="1" comment="myspell-fr_BE is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118475" version="1" comment="myspell-fr_CA is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118476" version="1" comment="myspell-fr_CH is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118477" version="1" comment="myspell-fr_FR is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118478" version="1" comment="myspell-fr_LU is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118479" version="1" comment="myspell-fr_MC is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118483" version="1" comment="myspell-gu_IN is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118484" version="1" comment="myspell-he_IL is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118485" version="1" comment="myspell-hi_IN is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118486" version="1" comment="myspell-hr_HR is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118487" version="1" comment="myspell-hu_HU is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118490" version="1" comment="myspell-it_IT is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118494" version="1" comment="myspell-lightproof-en is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118495" version="1" comment="myspell-lightproof-hu_HU is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118496" version="1" comment="myspell-lightproof-pt_BR is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118497" version="1" comment="myspell-lightproof-ru_RU is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118498" version="1" comment="myspell-lo_LA is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118499" version="1" comment="myspell-lt_LT is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118500" version="1" comment="myspell-lv_LV is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118501" version="1" comment="myspell-nb_NO is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118503" version="1" comment="myspell-nl_BE is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118504" version="1" comment="myspell-nl_NL is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118505" version="1" comment="myspell-nn_NO is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118506" version="1" comment="myspell-no is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118508" version="1" comment="myspell-pl_PL is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118509" version="1" comment="myspell-pt_AO is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118510" version="1" comment="myspell-pt_BR is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118511" version="1" comment="myspell-pt_PT is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118512" version="1" comment="myspell-ro is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118513" version="1" comment="myspell-ro_RO is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118514" version="1" comment="myspell-ru_RU is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118516" version="1" comment="myspell-sk_SK is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118517" version="1" comment="myspell-sl_SI is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118518" version="1" comment="myspell-sr is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118519" version="1" comment="myspell-sr_CS is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118520" version="1" comment="myspell-sr_Latn_CS is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118521" version="1" comment="myspell-sr_Latn_RS is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118522" version="1" comment="myspell-sr_RS is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118523" version="1" comment="myspell-sv_FI is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118524" version="1" comment="myspell-sv_SE is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118526" version="1" comment="myspell-te is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118527" version="1" comment="myspell-te_IN is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118528" version="1" comment="myspell-th_TH is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118530" version="1" comment="myspell-vi is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118531" version="1" comment="myspell-vi_VN is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118532" version="1" comment="myspell-zu_ZA is &lt;20150827-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118533" version="1" comment="mythes is &lt;1.2.4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121902" version="1" comment="mythes-devel is &lt;1.2.4-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118534" version="1" comment="python-importlib is &lt;1.0.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123882" version="1" comment="libssh is &lt;0.2-5.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123883" version="1" comment="libssh-devel is &lt;0.2-5.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123884" version="1" comment="libssh-devel-doc is &lt;0.2-5.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123885" version="1" comment="libssh2 is &lt;0.2-5.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124617" version="1" comment="libssh2-1 is &lt;1.2.9-4.2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124618" version="1" comment="libssh2-1-32bit is &lt;1.2.9-4.2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124619" version="1" comment="libssh2-1-x86 is &lt;1.2.9-4.2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124620" version="1" comment="libssh2-devel is &lt;1.2.9-4.2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124621" version="1" comment="libssh2_org is &lt;1.2.9-4.2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125645" version="1" comment="libvirt is &lt;1.2.5-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125646" version="1" comment="libvirt-devel is &lt;1.2.5-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125647" version="1" comment="libvirt-devel-32bit is &lt;1.2.5-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130779" version="1" comment="libvirt is &lt;1.2.5-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130780" version="1" comment="libvirt-devel is &lt;1.2.5-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130781" version="1" comment="libvirt-devel-32bit is &lt;1.2.5-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127087" version="1" comment="libxml2 is &lt;2.7.6-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127088" version="1" comment="libxml2-devel is &lt;2.7.6-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127089" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128971" version="1" comment="libxml2 is &lt;2.7.6-0.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128972" version="1" comment="libxml2-devel is &lt;2.7.6-0.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128973" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132013" version="1" comment="libxml2 is &lt;2.7.6-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132014" version="1" comment="libxml2-devel is &lt;2.7.6-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132015" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146979" version="1" comment="libxml2 is &lt;2.7.6-0.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146980" version="1" comment="libxml2-devel is &lt;2.7.6-0.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146981" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149653" version="1" comment="lighttpd is &lt;1.4.20-2.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149654" version="1" comment="lighttpd-mod_cml is &lt;1.4.20-2.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149655" version="1" comment="lighttpd-mod_magnet is &lt;1.4.20-2.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149656" version="1" comment="lighttpd-mod_mysql_vhost is &lt;1.4.20-2.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149657" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.20-2.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149658" version="1" comment="lighttpd-mod_trigger_b4_dl is &lt;1.4.20-2.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149659" version="1" comment="lighttpd-mod_webdav is &lt;1.4.20-2.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144568" version="1" comment="kernel-docs is &lt;3.0.101-91.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149126" version="1" comment="lynx is &lt;2.8.6-145.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125963" version="1" comment="mercurial is &lt;2.3.2-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128192" version="1" comment="mercurial is &lt;2.3.2-0.14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142221" version="1" comment="MozillaFirefox is &lt;45.5.1esr-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142222" version="1" comment="MozillaFirefox-devel is &lt;45.5.1esr-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142223" version="1" comment="mozilla-nss is &lt;3.21.3-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142224" version="1" comment="mozilla-nss-devel is &lt;3.21.3-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136167" version="1" comment="bytefx-data-mysql is &lt;2.6.7-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136168" version="1" comment="mono-core is &lt;2.6.7-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136169" version="1" comment="mono-data is &lt;2.6.7-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136170" version="1" comment="mono-data-firebird is &lt;2.6.7-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136171" version="1" comment="mono-data-oracle is &lt;2.6.7-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136172" version="1" comment="mono-data-postgresql is &lt;2.6.7-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136173" version="1" comment="mono-data-sqlite is &lt;2.6.7-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136174" version="1" comment="mono-data-sybase is &lt;2.6.7-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136175" version="1" comment="mono-devel is &lt;2.6.7-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136176" version="1" comment="mono-extras is &lt;2.6.7-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136177" version="1" comment="mono-jscript is &lt;2.6.7-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136178" version="1" comment="mono-locale-extras is &lt;2.6.7-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136179" version="1" comment="mono-nunit is &lt;2.6.7-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136180" version="1" comment="mono-wcf is &lt;2.6.7-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136181" version="1" comment="mono-web is &lt;2.6.7-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136182" version="1" comment="mono-winforms is &lt;2.6.7-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136183" version="1" comment="mono-winfxcore is &lt;2.6.7-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136184" version="1" comment="monodoc-core is &lt;2.6.7-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127464" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.49-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127465" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.49-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127466" version="1" comment="mysql is &lt;5.5.49-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128974" version="1" comment="libmysqlclient-devel is &lt;5.0.96-0.8.10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128975" version="1" comment="libmysqlclient_r15-32bit is &lt;5.0.96-0.8.10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128976" version="1" comment="libmysqlclient_r15-x86 is &lt;5.0.96-0.8.10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128977" version="1" comment="mysql is &lt;5.0.96-0.8.10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132016" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.52-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132017" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.52-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132018" version="1" comment="mysql is &lt;5.5.52-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135503" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.53-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135504" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.53-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135505" version="1" comment="mysql is &lt;5.5.53-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148165" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.54-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148166" version="1" comment="libmysql55client_r18-x86 is &lt;5.5.54-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148167" version="1" comment="mysql is &lt;5.5.54-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128916" version="1" comment="libtasn1 is &lt;1.5-1.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128917" version="1" comment="libtasn1-devel is &lt;1.5-1.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132019" version="1" comment="ocaml is &lt;4.02.1-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132020" version="1" comment="ocaml-compiler-libs is &lt;4.02.1-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132021" version="1" comment="ocaml-runtime is &lt;4.02.1-3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123886" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123887" version="1" comment="openssl is &lt;0.9.8j-0.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127535" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127536" version="1" comment="libopenssl-devel-32bit is &lt;0.9.8j-0.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127537" version="1" comment="openssl is &lt;0.9.8j-0.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132022" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.102.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132023" version="1" comment="libopenssl-devel-32bit is &lt;0.9.8j-0.102.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132024" version="1" comment="openssl is &lt;0.9.8j-0.102.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149088" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149089" version="1" comment="libopenssl-devel-32bit is &lt;0.9.8j-0.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149090" version="1" comment="openssl is &lt;0.9.8j-0.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129098" version="1" comment="pam is &lt;1.1.5-0.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129099" version="1" comment="pam-devel is &lt;1.1.5-0.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129100" version="1" comment="pam-devel-32bit is &lt;1.1.5-0.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132025" version="1" comment="perl is &lt;5.10.0-64.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132026" version="1" comment="perl-base-32bit is &lt;5.10.0-64.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146314" version="1" comment="perl-DBD-mysql is &lt;4.008-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146978" version="1" comment="perl-DBD-mysql is &lt;4.008-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136686" version="1" comment="perl-SOAP-Lite is &lt;0.710.08-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126722" version="1" comment="php53 is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126723" version="1" comment="php53-devel is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126724" version="1" comment="php53-imap is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126725" version="1" comment="php53-posix is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126726" version="1" comment="php53-readline is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126727" version="1" comment="php53-sockets is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126728" version="1" comment="php53-sqlite is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126729" version="1" comment="php53-tidy is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127602" version="1" comment="php53 is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127603" version="1" comment="php53-devel is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127604" version="1" comment="php53-imap is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127605" version="1" comment="php53-posix is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127606" version="1" comment="php53-readline is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127607" version="1" comment="php53-sockets is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127608" version="1" comment="php53-sqlite is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127609" version="1" comment="php53-tidy is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128818" version="1" comment="php53 is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128819" version="1" comment="php53-devel is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128820" version="1" comment="php53-imap is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128821" version="1" comment="php53-posix is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128822" version="1" comment="php53-readline is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128823" version="1" comment="php53-sockets is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128824" version="1" comment="php53-sqlite is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128825" version="1" comment="php53-tidy is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132027" version="1" comment="php53 is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132028" version="1" comment="php53-devel is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132029" version="1" comment="php53-imap is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132030" version="1" comment="php53-posix is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132031" version="1" comment="php53-readline is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132032" version="1" comment="php53-sockets is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132033" version="1" comment="php53-sqlite is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132034" version="1" comment="php53-tidy is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132035" version="1" comment="php53 is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132036" version="1" comment="php53-devel is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132037" version="1" comment="php53-imap is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132038" version="1" comment="php53-posix is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132039" version="1" comment="php53-readline is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132040" version="1" comment="php53-sockets is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132041" version="1" comment="php53-sqlite is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132042" version="1" comment="php53-tidy is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132043" version="1" comment="php53 is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132044" version="1" comment="php53-devel is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132045" version="1" comment="php53-imap is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132046" version="1" comment="php53-posix is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132047" version="1" comment="php53-readline is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132048" version="1" comment="php53-sockets is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132049" version="1" comment="php53-sqlite is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132050" version="1" comment="php53-tidy is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132051" version="1" comment="php53 is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132052" version="1" comment="php53-devel is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132053" version="1" comment="php53-imap is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132054" version="1" comment="php53-posix is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132055" version="1" comment="php53-readline is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132056" version="1" comment="php53-sockets is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132057" version="1" comment="php53-sqlite is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132058" version="1" comment="php53-tidy is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146896" version="1" comment="php53 is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146897" version="1" comment="php53-devel is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146898" version="1" comment="php53-imap is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146899" version="1" comment="php53-posix is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146900" version="1" comment="php53-readline is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146901" version="1" comment="php53-sockets is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146902" version="1" comment="php53-sqlite is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146903" version="1" comment="php53-tidy is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148954" version="1" comment="php53 is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148955" version="1" comment="php53-devel is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148956" version="1" comment="php53-imap is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148957" version="1" comment="php53-posix is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148958" version="1" comment="php53-readline is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148959" version="1" comment="php53-sockets is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148960" version="1" comment="php53-sqlite is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148961" version="1" comment="php53-tidy is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132059" version="1" comment="finch is &lt;2.6.6-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132060" version="1" comment="finch-devel is &lt;2.6.6-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132061" version="1" comment="libpurple is &lt;2.6.6-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132062" version="1" comment="libpurple-devel is &lt;2.6.6-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132063" version="1" comment="libpurple-lang is &lt;2.6.6-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132064" version="1" comment="pidgin is &lt;2.6.6-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132065" version="1" comment="pidgin-devel is &lt;2.6.6-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128647" version="1" comment="libpoppler-devel is &lt;0.12.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128648" version="1" comment="libpoppler-glib-devel is &lt;0.12.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128649" version="1" comment="libpoppler-qt2 is &lt;0.12.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128650" version="1" comment="libpoppler-qt3-devel is &lt;0.12.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128651" version="1" comment="libpoppler-qt4-devel is &lt;0.12.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128652" version="1" comment="poppler is &lt;0.12.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128653" version="1" comment="poppler-tools is &lt;0.12.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124463" version="1" comment="postgresql94-devel is &lt;9.4.6-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124464" version="1" comment="postgresql94-libs is &lt;9.4.6-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132066" version="1" comment="postgresql94-devel is &lt;9.4.9-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132067" version="1" comment="postgresql94-libs is &lt;9.4.9-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148466" version="1" comment="ppp is &lt;2.4.5.git-2.31.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148467" version="1" comment="ppp-devel is &lt;2.4.5.git-2.31.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132068" version="1" comment="python is &lt;2.6.9-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132069" version="1" comment="python-32bit is &lt;2.6.9-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132070" version="1" comment="python-base is &lt;2.6.9-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132071" version="1" comment="python-demo is &lt;2.6.9-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132072" version="1" comment="python-devel is &lt;2.6.9-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132073" version="1" comment="python-doc is &lt;2.6-8.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132074" version="1" comment="python-doc-pdf is &lt;2.6-8.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132075" version="1" comment="python-gdbm is &lt;2.6.9-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132076" version="1" comment="python-idle is &lt;2.6.9-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132077" version="1" comment="python-tk is &lt;2.6.9-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125653" version="1" comment="quagga is &lt;0.99.15-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125654" version="1" comment="quagga-devel is &lt;0.99.15-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125679" version="1" comment="quagga is &lt;0.99.15-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125680" version="1" comment="quagga-devel is &lt;0.99.15-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128398" version="1" comment="quagga is &lt;0.99.15-0.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128399" version="1" comment="quagga-devel is &lt;0.99.15-0.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132078" version="1" comment="quagga is &lt;0.99.15-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132079" version="1" comment="quagga-devel is &lt;0.99.15-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122428" version="1" comment="rubygem-actionpack-3_2 is &lt;3.2.12-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125964" version="1" comment="rubygem-actionpack-3_2 is &lt;3.2.12-0.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122429" version="1" comment="rubygem-activerecord-3_2 is &lt;3.2.12-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125965" version="1" comment="rubygem-activesupport-3_2 is &lt;3.2.12-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121122" version="1" comment="rubygem-mail-2_4 is &lt;2.4.4-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125215" version="1" comment="libldb-devel is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125216" version="1" comment="libnetapi-devel is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125217" version="1" comment="libnetapi0 is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125218" version="1" comment="libsmbclient-devel is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125219" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125220" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125221" version="1" comment="libtalloc-devel is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125222" version="1" comment="libtdb-devel is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125223" version="1" comment="libtevent-devel is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125224" version="1" comment="libwbclient-devel is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125225" version="1" comment="samba is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125226" version="1" comment="samba-devel is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125227" version="1" comment="samba-test is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146085" version="1" comment="libldb-devel is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146086" version="1" comment="libnetapi-devel is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146087" version="1" comment="libnetapi0 is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146088" version="1" comment="libsmbclient-devel is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146089" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146090" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146091" version="1" comment="libtalloc-devel is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146092" version="1" comment="libtdb-devel is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146093" version="1" comment="libtevent-devel is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146094" version="1" comment="libwbclient-devel is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146095" version="1" comment="samba is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146096" version="1" comment="samba-devel is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146097" version="1" comment="samba-test is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149660" version="1" comment="sane-backends is &lt;1.0.20-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149661" version="1" comment="sane-backends-32bit is &lt;1.0.20-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149662" version="1" comment="sane-backends-autoconfig is &lt;1.0.20-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149663" version="1" comment="sane-backends-x86 is &lt;1.0.20-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127292" version="1" comment="libspice-server-devel is &lt;0.12.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127293" version="1" comment="spice is &lt;0.12.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148168" version="1" comment="libspice-server-devel is &lt;0.12.4-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148169" version="1" comment="spice is &lt;0.12.4-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132080" version="1" comment="sqlite3 is &lt;3.7.6.3-1.4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132081" version="1" comment="sqlite3-devel is &lt;3.7.6.3-1.4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128475" version="1" comment="subversion is &lt;1.6.17-1.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128476" version="1" comment="subversion-devel is &lt;1.6.17-1.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128477" version="1" comment="subversion-perl is &lt;1.6.17-1.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128478" version="1" comment="subversion-python is &lt;1.6.17-1.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128479" version="1" comment="subversion-server is &lt;1.6.17-1.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128480" version="1" comment="subversion-tools is &lt;1.6.17-1.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122519" version="1" comment="libtiff-devel is &lt;3.8.2-141.163.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122520" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-141.163.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122521" version="1" comment="tiff is &lt;3.8.2-141.163.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132082" version="1" comment="libtiff-devel is &lt;3.8.2-141.168.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132083" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-141.168.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132084" version="1" comment="tiff is &lt;3.8.2-141.168.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127743" version="1" comment="wireshark is &lt;1.12.11-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127744" version="1" comment="wireshark-devel is &lt;1.12.11-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132085" version="1" comment="wireshark is &lt;1.12.13-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132086" version="1" comment="wireshark-devel is &lt;1.12.13-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111645" version="1" comment="xen is &lt;4.4.2_10-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111646" version="1" comment="xen-devel is &lt;4.4.2_10-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115962" version="1" comment="xen is &lt;4.4.3_02-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116557" version="1" comment="xen-devel is &lt;4.4.3_02-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125681" version="1" comment="xen is &lt;4.4.4_02-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125682" version="1" comment="xen-devel is &lt;4.4.4_02-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132087" version="1" comment="xen is &lt;4.4.4_07-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132088" version="1" comment="xen-devel is &lt;4.4.4_07-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132089" version="1" comment="xen is &lt;4.4.4_08-40.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132090" version="1" comment="xen-devel is &lt;4.4.4_08-40.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143078" version="1" comment="xen is &lt;4.4.4_10-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143079" version="1" comment="xen-devel is &lt;4.4.4_10-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144679" version="1" comment="xen is &lt;4.4.4_12-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144680" version="1" comment="xen-devel is &lt;4.4.4_12-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149426" version="1" comment="xen is &lt;4.4.4_14-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149427" version="1" comment="xen-devel is &lt;4.4.4_14-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118668" version="1" comment="xen is &lt;4.4.3_06-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118669" version="1" comment="xen-devel is &lt;4.4.3_06-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136687" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136688" version="1" comment="xorg-x11-libX11-devel is &lt;7.4-5.11.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136689" version="1" comment="xorg-x11-libX11-devel-32bit is &lt;7.4-5.11.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149428" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149429" version="1" comment="xorg-x11-libX11-devel is &lt;7.4-5.11.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149430" version="1" comment="xorg-x11-libX11-devel-32bit is &lt;7.4-5.11.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143080" version="1" comment="xorg-x11-libXfixes is &lt;7.4-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143081" version="1" comment="xorg-x11-libXfixes-devel is &lt;7.4-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143082" version="1" comment="xorg-x11-libXfixes-devel-32bit is &lt;7.4-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148468" version="1" comment="xorg-x11-libXpm is &lt;7.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148469" version="1" comment="xorg-x11-libXpm-devel is &lt;7.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148470" version="1" comment="xorg-x11-libXpm-devel-32bit is &lt;7.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142762" version="1" comment="xorg-x11-libXrender is &lt;7.4-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142763" version="1" comment="xorg-x11-libXrender-devel is &lt;7.4-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142764" version="1" comment="xorg-x11-libXrender-devel-32bit is &lt;7.4-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142765" version="1" comment="xorg-x11-libXv is &lt;7.4-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142766" version="1" comment="xorg-x11-libXv-devel is &lt;7.4-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142767" version="1" comment="xorg-x11-libXv-devel-32bit is &lt;7.4-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143083" version="1" comment="xorg-x11-devel is &lt;7.4-8.26.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143084" version="1" comment="xorg-x11-devel-32bit is &lt;7.4-8.26.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143085" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132091" version="1" comment="yast2-storage is &lt;2.17.161-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132092" version="1" comment="yast2-storage-devel is &lt;2.17.161-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144681" version="1" comment="zlib is &lt;1.2.7-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144682" version="1" comment="zlib-devel is &lt;1.2.7-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144683" version="1" comment="zlib-devel-32bit is &lt;1.2.7-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132093" version="1" comment="curl-openssl1 is &lt;7.19.7-1.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132094" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-1.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132095" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-1.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132096" version="1" comment="libcurl4-openssl1-x86 is &lt;7.19.7-1.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117400" version="1" comment="sles-release is &gt;=11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135236" version="1" comment="curl-openssl1 is &lt;7.19.7-1.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135237" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-1.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135238" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-1.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135239" version="1" comment="libcurl4-openssl1-x86 is &lt;7.19.7-1.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107518" version="1" comment="libcurl4-openssl1 is &lt;7.19.7-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107516" version="1" comment="libcurl4-openssl1-32bit is &lt;7.19.7-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107517" version="1" comment="libcurl4-openssl1-x86 is &lt;7.19.7-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101146" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101149" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101147" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101148" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101151" version="1" comment="openssl1 is &lt;1.0.1g-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101150" version="1" comment="openssl1-doc is &lt;1.0.1g-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114126" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114128" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114129" version="1" comment="libldap-openssl1-2_4-2-x86 is &lt;2.4.26-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114127" version="1" comment="openldap2-client-openssl1 is &lt;2.4.26-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109631" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109629" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109630" version="1" comment="libldap-openssl1-2_4-2-x86 is &lt;2.4.26-0.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119832" version="1" comment="libldap-openssl1-2_4-2 is &lt;2.4.26-0.62.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119833" version="1" comment="libldap-openssl1-2_4-2-32bit is &lt;2.4.26-0.62.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119834" version="1" comment="libldap-openssl1-2_4-2-x86 is &lt;2.4.26-0.62.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119835" version="1" comment="openldap2-client-openssl1 is &lt;2.4.26-0.62.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121359" version="1" comment="openssh-openssl1 is &lt;6.6p1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121360" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132097" version="1" comment="openssh-openssl1 is &lt;6.6p1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132098" version="1" comment="openssh-openssl1-helpers is &lt;6.6p1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118740" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118741" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118742" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118743" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118744" version="1" comment="openssl1 is &lt;1.0.1g-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118745" version="1" comment="openssl1-doc is &lt;1.0.1g-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123888" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123889" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123890" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123891" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123892" version="1" comment="openssl1 is &lt;1.0.1g-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123893" version="1" comment="openssl1-doc is &lt;1.0.1g-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127090" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127091" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127092" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127093" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127094" version="1" comment="openssl1 is &lt;1.0.1g-0.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127095" version="1" comment="openssl1-doc is &lt;1.0.1g-0.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132099" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132100" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132101" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132102" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132103" version="1" comment="openssl1 is &lt;1.0.1g-0.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132104" version="1" comment="openssl1-doc is &lt;1.0.1g-0.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148543" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148544" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148545" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148546" version="1" comment="libopenssl1_0_0-x86 is &lt;1.0.1g-0.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148547" version="1" comment="openssl1 is &lt;1.0.1g-0.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148548" version="1" comment="openssl1-doc is &lt;1.0.1g-0.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132105" version="1" comment="wget-openssl1 is &lt;1.11.4-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073771" version="1" comment="sled-release is ==11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077505" version="1" comment="Mesa is &lt;7.11.2-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077504" version="1" comment="Mesa-32bit is &lt;7.11.2-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107483" version="1" comment="MozillaFirefox is &lt;17.0.9esr-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107482" version="1" comment="MozillaFirefox-translations is &lt;17.0.9esr-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113125" version="1" comment="acroread is &lt;9.5.5-0.5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113126" version="1" comment="acroread-cmaps is &lt;9.4.6-0.4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113127" version="1" comment="acroread-fonts-ja is &lt;9.4.6-0.4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113128" version="1" comment="acroread-fonts-ko is &lt;9.4.6-0.4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113129" version="1" comment="acroread-fonts-zh_CN is &lt;9.4.6-0.4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113130" version="1" comment="acroread-fonts-zh_TW is &lt;9.4.6-0.4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113131" version="1" comment="acroread_ja is &lt;9.4.2-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093219" version="1" comment="bind-libs is &lt;9.9.4P2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093217" version="1" comment="bind-libs-32bit is &lt;9.9.4P2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093220" version="1" comment="bind-utils is &lt;9.9.4P2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076206" version="1" comment="bogofilter is &lt;1.1.1-174.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075116" version="1" comment="ibm-data-db2 is &lt;2.6.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092614" version="1" comment="libldb1 is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092687" version="1" comment="libldb1-32bit is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092617" version="1" comment="libsmbclient0 is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092615" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092620" version="1" comment="libtalloc1 is &lt;3.4.3-1.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092618" version="1" comment="libtalloc1-32bit is &lt;3.4.3-1.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092623" version="1" comment="libtalloc2 is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092621" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092626" version="1" comment="libtdb1 is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092624" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092628" version="1" comment="libtevent0 is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092627" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092631" version="1" comment="libwbclient0 is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092629" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092642" version="1" comment="samba is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092632" version="1" comment="samba-32bit is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092635" version="1" comment="samba-client is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092633" version="1" comment="samba-client-32bit is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092636" version="1" comment="samba-doc is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092637" version="1" comment="samba-krb-printing is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092640" version="1" comment="samba-winbind is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092638" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073901" version="1" comment="cifs-utils is &lt;5.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077464" version="1" comment="clamav is &lt;0.97.8-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075544" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075543" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090718" version="1" comment="coreutils is &lt;8.12-6.25.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090716" version="1" comment="coreutils-lang is &lt;8.12-6.25.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091334" version="1" comment="cups is &lt;1.3.9-8.46.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091330" version="1" comment="cups-client is &lt;1.3.9-8.46.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091333" version="1" comment="cups-libs is &lt;1.3.9-8.46.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091331" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093211" version="1" comment="curl is &lt;7.19.7-1.20.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093214" version="1" comment="libcurl4 is &lt;7.19.7-1.20.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093212" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.20.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075547" version="1" comment="dbus-1 is &lt;1.2.10-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075545" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075546" version="1" comment="dbus-1-x11 is &lt;1.2.10-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077040" version="1" comment="dhcp is &lt;4.2.4.P2-0.11.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077039" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.11.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076723" version="1" comment="libpurple-meanwhile is &lt;2.6.6-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076724" version="1" comment="libpurple-tcl is &lt;2.6.6-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075538" version="1" comment="MozillaFirefox is &lt;10.0.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075537" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.7.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112242" version="1" comment="MozillaFirefox-translations is &lt;10.0.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112243" version="1" comment="libfreebl3 is &lt;3.13.6-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112244" version="1" comment="libfreebl3-32bit is &lt;3.13.6-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075540" version="1" comment="mozilla-nspr is &lt;4.9.2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075539" version="1" comment="mozilla-nspr-32bit is &lt;4.9.2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075542" version="1" comment="mozilla-nss is &lt;3.13.6-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075541" version="1" comment="mozilla-nss-32bit is &lt;3.13.6-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112245" version="1" comment="mozilla-nss-tools is &lt;3.13.6-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075847" version="1" comment="MozillaFirefox is &lt;10.0.9-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075845" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.7.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075846" version="1" comment="MozillaFirefox-translations is &lt;10.0.9-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075927" version="1" comment="MozillaFirefox is &lt;10.0.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075926" version="1" comment="MozillaFirefox-translations is &lt;10.0.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075929" version="1" comment="mozilla-nspr is &lt;4.9.3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075928" version="1" comment="mozilla-nspr-32bit is &lt;4.9.3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076101" version="1" comment="MozillaFirefox is &lt;10.0.11-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076100" version="1" comment="MozillaFirefox-translations is &lt;10.0.11-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076103" version="1" comment="libfreebl3 is &lt;3.14-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076102" version="1" comment="libfreebl3-32bit is &lt;3.14-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076106" version="1" comment="mozilla-nss is &lt;3.14-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076104" version="1" comment="mozilla-nss-32bit is &lt;3.14-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076105" version="1" comment="mozilla-nss-tools is &lt;3.14-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076328" version="1" comment="MozillaFirefox is &lt;10.0.12-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076327" version="1" comment="MozillaFirefox-translations is &lt;10.0.12-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076330" version="1" comment="libfreebl3 is &lt;3.14.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076329" version="1" comment="libfreebl3-32bit is &lt;3.14.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076332" version="1" comment="mozilla-nspr is &lt;4.9.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076331" version="1" comment="mozilla-nspr-32bit is &lt;4.9.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076335" version="1" comment="mozilla-nss is &lt;3.14.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076333" version="1" comment="mozilla-nss-32bit is &lt;3.14.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076334" version="1" comment="mozilla-nss-tools is &lt;3.14.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076874" version="1" comment="MozillaFirefox is &lt;17.0.4esr-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076746" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076873" version="1" comment="MozillaFirefox-translations is &lt;17.0.4esr-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076749" version="1" comment="beagle-evolution is &lt;0.3.8-56.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076750" version="1" comment="beagle-firefox is &lt;0.3.8-56.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076751" version="1" comment="beagle-gui is &lt;0.3.8-56.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076752" version="1" comment="beagle-lang is &lt;0.3.8-56.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076755" version="1" comment="libfreebl3 is &lt;3.14.2-0.4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076754" version="1" comment="libfreebl3-32bit is &lt;3.14.2-0.4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076756" version="1" comment="mhtml-firefox is &lt;0.5-1.47.51.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076758" version="1" comment="mozilla-nspr is &lt;4.9.5-0.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076757" version="1" comment="mozilla-nspr-32bit is &lt;4.9.5-0.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076761" version="1" comment="mozilla-nss is &lt;3.14.2-0.4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076759" version="1" comment="mozilla-nss-32bit is &lt;3.14.2-0.4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076760" version="1" comment="mozilla-nss-tools is &lt;3.14.2-0.4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077009" version="1" comment="MozillaFirefox is &lt;17.0.5esr-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077007" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077008" version="1" comment="MozillaFirefox-translations is &lt;17.0.5esr-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077011" version="1" comment="libfreebl3 is &lt;3.14.3-0.4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077010" version="1" comment="libfreebl3-32bit is &lt;3.14.3-0.4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077013" version="1" comment="mozilla-nspr is &lt;4.9.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077012" version="1" comment="mozilla-nspr-32bit is &lt;4.9.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077016" version="1" comment="mozilla-nss is &lt;3.14.3-0.4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077014" version="1" comment="mozilla-nss-32bit is &lt;3.14.3-0.4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077015" version="1" comment="mozilla-nss-tools is &lt;3.14.3-0.4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077311" version="1" comment="MozillaFirefox is &lt;17.0.6esr-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077310" version="1" comment="MozillaFirefox-translations is &lt;17.0.6esr-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077545" version="1" comment="MozillaFirefox is &lt;17.0.7esr-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077543" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.9.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077544" version="1" comment="MozillaFirefox-translations is &lt;17.0.7esr-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091391" version="1" comment="MozillaFirefox is &lt;17.0.10esr-0.4.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091389" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.9.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091390" version="1" comment="MozillaFirefox-translations is &lt;17.0.10esr-0.4.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093470" version="1" comment="flash-player is &lt;11.2.202.336-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093468" version="1" comment="flash-player-gnome is &lt;11.2.202.336-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093469" version="1" comment="flash-player-kde4 is &lt;11.2.202.336-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091877" version="1" comment="glibc is &lt;2.11.3-17.45.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091864" version="1" comment="glibc-32bit is &lt;2.11.3-17.45.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091866" version="1" comment="glibc-devel is &lt;2.11.3-17.45.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091865" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.45.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091868" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.45.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091872" version="1" comment="glibc-locale is &lt;2.11.3-17.45.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091870" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.45.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091878" version="1" comment="nscd is &lt;2.11.3-17.45.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077465" version="1" comment="gnutls is &lt;2.4.1-24.39.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077467" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077466" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091118" version="1" comment="gpg2 is &lt;2.0.9-25.33.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091117" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090836" version="1" comment="icedtea-web is &lt;1.4.1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091799" version="1" comment="java-1_6_0-openjdk is &lt;1.6.0.0_b27.1.12.7-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091797" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.6.0.0_b27.1.12.7-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091798" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.6.0.0_b27.1.12.7-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091042" version="1" comment="kdelibs4 is &lt;4.3.5-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091040" version="1" comment="kdelibs4-core is &lt;4.3.5-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091045" version="1" comment="libkde4 is &lt;4.3.5-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091048" version="1" comment="libkdecore4 is &lt;4.3.5-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112804" version="1" comment="kernel-default is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112805" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112806" version="1" comment="kernel-default-devel is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113140" version="1" comment="kernel-default-extra is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112857" version="1" comment="kernel-pae is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112858" version="1" comment="kernel-pae-base is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112859" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113141" version="1" comment="kernel-pae-extra is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112807" version="1" comment="kernel-source is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112808" version="1" comment="kernel-syms is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112809" version="1" comment="kernel-trace is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112810" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112811" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113142" version="1" comment="kernel-trace-extra is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112845" version="1" comment="kernel-xen is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112846" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112847" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113143" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112848" version="1" comment="xen-kmp-default is &lt;4.1.6_04_3.0.101_0.7.17-0.5.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112860" version="1" comment="xen-kmp-pae is &lt;4.1.6_04_3.0.101_0.7.17-0.5.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112849" version="1" comment="xen-kmp-trace is &lt;4.1.6_04_3.0.101_0.7.17-0.5.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091971" version="1" comment="krb5 is &lt;1.6.3-133.49.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091962" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091965" version="1" comment="krb5-client is &lt;1.6.3-133.49.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077663" version="1" comment="kvm is &lt;0.15.1-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073929" version="1" comment="libldb1 is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073977" version="1" comment="libldb1-32bit is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073932" version="1" comment="libsmbclient0 is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073930" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073935" version="1" comment="libtalloc2 is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073933" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073938" version="1" comment="libtdb1 is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073936" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073939" version="1" comment="libtevent0 is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073978" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073942" version="1" comment="libwbclient0 is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073940" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073953" version="1" comment="samba is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073943" version="1" comment="samba-32bit is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073946" version="1" comment="samba-client is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073944" version="1" comment="samba-client-32bit is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073947" version="1" comment="samba-doc is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073948" version="1" comment="samba-krb-printing is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073951" version="1" comment="samba-winbind is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073949" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076805" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076821" version="1" comment="libqt4 is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076806" version="1" comment="libqt4-32bit is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076808" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076807" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076818" version="1" comment="libqt4-sql is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076809" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076811" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076815" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076820" version="1" comment="libqt4-x11 is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076819" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090228" version="1" comment="libgcrypt11 is &lt;1.5.0-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090226" version="1" comment="libgcrypt11-32bit is &lt;1.5.0-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076522" version="1" comment="mysql is &lt;5.0.96-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076521" version="1" comment="mysql-client is &lt;5.0.96-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076356" version="1" comment="permissions is &lt;2013.1.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092672" version="1" comment="libpixman-1-0 is &lt;0.16.0-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092670" version="1" comment="libpixman-1-0-32bit is &lt;0.16.0-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076271" version="1" comment="libproxy0-config-gnome-32bit is &lt;0.3.1-2.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076274" version="1" comment="libproxy0-networkmanager-32bit is &lt;0.3.1-2.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074898" version="1" comment="libsoup-2_4-1 is &lt;2.32.2-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074897" version="1" comment="libsoup-2_4-1-32bit is &lt;2.32.2-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091293" version="1" comment="libvirt is &lt;0.9.6-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091290" version="1" comment="libvirt-client is &lt;0.9.6-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091289" version="1" comment="libvirt-client-32bit is &lt;0.9.6-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091291" version="1" comment="libvirt-doc is &lt;0.9.6-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091292" version="1" comment="libvirt-python is &lt;0.9.6-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076056" version="1" comment="libvirt is &lt;0.9.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076053" version="1" comment="libvirt-client is &lt;0.9.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076052" version="1" comment="libvirt-client-32bit is &lt;0.9.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076054" version="1" comment="libvirt-doc is &lt;0.9.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076055" version="1" comment="libvirt-python is &lt;0.9.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093158" version="1" comment="libxml2 is &lt;2.7.6-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093154" version="1" comment="libxml2-32bit is &lt;2.7.6-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093156" version="1" comment="libxml2-python is &lt;2.7.6-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091394" version="1" comment="libfreebl3 is &lt;3.15.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091392" version="1" comment="libfreebl3-32bit is &lt;3.15.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091397" version="1" comment="mozilla-nspr is &lt;4.10.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091395" version="1" comment="mozilla-nspr-32bit is &lt;4.10.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091401" version="1" comment="mozilla-nss is &lt;3.15.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091398" version="1" comment="mozilla-nss-32bit is &lt;3.15.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091399" version="1" comment="mozilla-nss-tools is &lt;3.15.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091770" version="1" comment="libfreebl3 is &lt;3.15.3-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091768" version="1" comment="libfreebl3-32bit is &lt;3.15.3-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091773" version="1" comment="mozilla-nspr is &lt;4.10.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091771" version="1" comment="mozilla-nspr-32bit is &lt;4.10.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091777" version="1" comment="mozilla-nss is &lt;3.15.3-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091774" version="1" comment="mozilla-nss-32bit is &lt;3.15.3-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091775" version="1" comment="mozilla-nss-tools is &lt;3.15.3-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112642" version="1" comment="libfreebl3 is &lt;3.15.3.1-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112643" version="1" comment="libfreebl3-32bit is &lt;3.15.3.1-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112644" version="1" comment="mozilla-nss is &lt;3.15.3.1-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112645" version="1" comment="mozilla-nss-32bit is &lt;3.15.3.1-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112646" version="1" comment="mozilla-nss-tools is &lt;3.15.3.1-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090048" version="1" comment="openssh is &lt;5.1p1-41.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090047" version="1" comment="openssh-askpass is &lt;5.1p1-41.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112656" version="1" comment="openssl-certs is &lt;1.95-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091791" version="1" comment="openvpn is &lt;2.0.9-143.33.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076774" version="1" comment="perl is &lt;5.10.0-64.61.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076771" version="1" comment="perl-32bit is &lt;5.10.0-64.61.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076772" version="1" comment="perl-base is &lt;5.10.0-64.61.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076773" version="1" comment="perl-doc is &lt;5.10.0-64.61.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074241" version="1" comment="popt is &lt;1.7-37.50.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074239" version="1" comment="popt-32bit is &lt;1.7-37.50.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074244" version="1" comment="rpm is &lt;4.4.2.3-37.50.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093160" version="1" comment="puppet is &lt;2.6.18-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091153" version="1" comment="libpython2_6-1_0 is &lt;2.6.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091151" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091165" version="1" comment="python is &lt;2.6.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091157" version="1" comment="python-base is &lt;2.6.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091155" version="1" comment="python-base-32bit is &lt;2.6.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091158" version="1" comment="python-curses is &lt;2.6.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091164" version="1" comment="python-xml is &lt;2.6.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075493" version="1" comment="quota is &lt;3.16-50.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091803" version="1" comment="ruby is &lt;1.8.7.p357-0.9.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091936" version="1" comment="strongswan is &lt;4.4.0-6.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091935" version="1" comment="strongswan-doc is &lt;4.4.0-6.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077216" version="1" comment="sudo is &lt;1.7.6p2-0.2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090262" version="1" comment="telepathy-idle is &lt;0.1.5-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073772" version="1" comment="usbmuxd is &lt;1.0.7-5.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076977" version="1" comment="xen is &lt;4.1.4_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076968" version="1" comment="xen-doc-html is &lt;4.1.4_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076969" version="1" comment="xen-doc-pdf is &lt;4.1.4_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076970" version="1" comment="xen-kmp-default is &lt;4.1.4_02_3.0.58_0.6.6-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076971" version="1" comment="xen-kmp-pae is &lt;4.1.4_02_3.0.58_0.6.6-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076972" version="1" comment="xen-kmp-trace is &lt;4.1.4_02_3.0.58_0.6.6-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076974" version="1" comment="xen-libs is &lt;4.1.4_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076973" version="1" comment="xen-libs-32bit is &lt;4.1.4_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076976" version="1" comment="xen-tools is &lt;4.1.4_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076975" version="1" comment="xen-tools-domU is &lt;4.1.4_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075439" version="1" comment="libvirt is &lt;0.9.6-0.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075436" version="1" comment="libvirt-client is &lt;0.9.6-0.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075435" version="1" comment="libvirt-client-32bit is &lt;0.9.6-0.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075437" version="1" comment="libvirt-doc is &lt;0.9.6-0.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075438" version="1" comment="libvirt-python is &lt;0.9.6-0.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075440" version="1" comment="virt-manager is &lt;0.9.0-3.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075441" version="1" comment="vm-install is &lt;0.5.10-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075450" version="1" comment="xen is &lt;4.1.2_20-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075442" version="1" comment="xen-doc-html is &lt;4.1.2_20-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075443" version="1" comment="xen-doc-pdf is &lt;4.1.2_20-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075444" version="1" comment="xen-kmp-default is &lt;4.1.2_20_3.0.38_0.5-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075445" version="1" comment="xen-kmp-trace is &lt;4.1.2_20_3.0.38_0.5-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075447" version="1" comment="xen-libs is &lt;4.1.2_20-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075446" version="1" comment="xen-libs-32bit is &lt;4.1.2_20-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075449" version="1" comment="xen-tools is &lt;4.1.2_20-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075448" version="1" comment="xen-tools-domU is &lt;4.1.2_20-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107397" version="1" comment="vm-install is &lt;0.5.12-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107407" version="1" comment="xen is &lt;4.1.3_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107399" version="1" comment="xen-doc-html is &lt;4.1.3_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107400" version="1" comment="xen-doc-pdf is &lt;4.1.3_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107401" version="1" comment="xen-kmp-default is &lt;4.1.3_02_3.0.38_0.5-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107402" version="1" comment="xen-kmp-trace is &lt;4.1.3_02_3.0.38_0.5-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107404" version="1" comment="xen-libs is &lt;4.1.3_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107403" version="1" comment="xen-libs-32bit is &lt;4.1.3_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107406" version="1" comment="xen-tools is &lt;4.1.3_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107405" version="1" comment="xen-tools-domU is &lt;4.1.3_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076028" version="1" comment="xen is &lt;4.1.3_04-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076019" version="1" comment="xen-doc-html is &lt;4.1.3_04-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076020" version="1" comment="xen-doc-pdf is &lt;4.1.3_04-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076021" version="1" comment="xen-kmp-default is &lt;4.1.3_04_3.0.42_0.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076022" version="1" comment="xen-kmp-pae is &lt;4.1.3_04_3.0.42_0.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076023" version="1" comment="xen-kmp-trace is &lt;4.1.3_04_3.0.42_0.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076025" version="1" comment="xen-libs is &lt;4.1.3_04-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076024" version="1" comment="xen-libs-32bit is &lt;4.1.3_04-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076027" version="1" comment="xen-tools is &lt;4.1.3_04-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076026" version="1" comment="xen-tools-domU is &lt;4.1.3_04-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077484" version="1" comment="xen is &lt;4.1.5_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077475" version="1" comment="xen-doc-html is &lt;4.1.5_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077476" version="1" comment="xen-doc-pdf is &lt;4.1.5_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077477" version="1" comment="xen-kmp-default is &lt;4.1.5_02_3.0.74_0.6.10-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077478" version="1" comment="xen-kmp-pae is &lt;4.1.5_02_3.0.74_0.6.10-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077479" version="1" comment="xen-kmp-trace is &lt;4.1.5_02_3.0.74_0.6.10-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077481" version="1" comment="xen-libs is &lt;4.1.5_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077480" version="1" comment="xen-libs-32bit is &lt;4.1.5_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077483" version="1" comment="xen-tools is &lt;4.1.5_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077482" version="1" comment="xen-tools-domU is &lt;4.1.5_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091504" version="1" comment="xen is &lt;4.1.6_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091495" version="1" comment="xen-doc-html is &lt;4.1.6_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091496" version="1" comment="xen-doc-pdf is &lt;4.1.6_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091497" version="1" comment="xen-kmp-default is &lt;4.1.6_02_3.0.93_0.5-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091498" version="1" comment="xen-kmp-pae is &lt;4.1.6_02_3.0.93_0.5-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091499" version="1" comment="xen-kmp-trace is &lt;4.1.6_02_3.0.93_0.5-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091501" version="1" comment="xen-libs is &lt;4.1.6_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091500" version="1" comment="xen-libs-32bit is &lt;4.1.6_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091503" version="1" comment="xen-tools is &lt;4.1.6_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091502" version="1" comment="xen-tools-domU is &lt;4.1.6_02-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091934" version="1" comment="xen is &lt;4.1.6_04-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091925" version="1" comment="xen-doc-html is &lt;4.1.6_04-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091926" version="1" comment="xen-doc-pdf is &lt;4.1.6_04-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091927" version="1" comment="xen-kmp-default is &lt;4.1.6_04_3.0.101_0.5-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091928" version="1" comment="xen-kmp-pae is &lt;4.1.6_04_3.0.101_0.5-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091929" version="1" comment="xen-kmp-trace is &lt;4.1.6_04_3.0.101_0.5-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091931" version="1" comment="xen-libs is &lt;4.1.6_04-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091930" version="1" comment="xen-libs-32bit is &lt;4.1.6_04-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091933" version="1" comment="xen-tools is &lt;4.1.6_04-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091932" version="1" comment="xen-tools-domU is &lt;4.1.6_04-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092863" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.70.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092865" version="1" comment="xorg-x11-server is &lt;7.4-27.70.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092864" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.70.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093465" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093463" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077488" version="1" comment="xorg-x11-libX11 is &lt;7.4-5.11.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077486" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077491" version="1" comment="xorg-x11-libXext is &lt;7.4-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077489" version="1" comment="xorg-x11-libXext-32bit is &lt;7.4-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077494" version="1" comment="xorg-x11-libXfixes is &lt;7.4-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077492" version="1" comment="xorg-x11-libXfixes-32bit is &lt;7.4-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077511" version="1" comment="xorg-x11-libXp is &lt;7.4-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077509" version="1" comment="xorg-x11-libXp-32bit is &lt;7.4-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077500" version="1" comment="xorg-x11-libXrender is &lt;7.4-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077498" version="1" comment="xorg-x11-libXrender-32bit is &lt;7.4-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077508" version="1" comment="xorg-x11-libXt is &lt;7.4-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077506" version="1" comment="xorg-x11-libXt-32bit is &lt;7.4-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077503" version="1" comment="xorg-x11-libXv is &lt;7.4-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077501" version="1" comment="xorg-x11-libXv-32bit is &lt;7.4-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077514" version="1" comment="xorg-x11-libxcb is &lt;7.4-1.22.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077512" version="1" comment="xorg-x11-libxcb-32bit is &lt;7.4-1.22.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074290" version="1" comment="xorg-x11-server-rdp is &lt;7.3.99-3.18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112850" version="1" comment="xrdp is &lt;0.4.1-28.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074963" version="1" comment="zypper is &lt;1.6.166-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074962" version="1" comment="zypper-log is &lt;1.6.166-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098652" version="1" comment="MozillaFirefox is &lt;24.6.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098650" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.7.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098651" version="1" comment="MozillaFirefox-translations is &lt;24.6.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098655" version="1" comment="libfreebl3 is &lt;3.16.1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098653" version="1" comment="libfreebl3-32bit is &lt;3.16.1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098658" version="1" comment="libsoftokn3 is &lt;3.16.1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098656" version="1" comment="libsoftokn3-32bit is &lt;3.16.1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098661" version="1" comment="mozilla-nspr is &lt;4.10.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098659" version="1" comment="mozilla-nspr-32bit is &lt;4.10.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098665" version="1" comment="mozilla-nss is &lt;3.16.1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098662" version="1" comment="mozilla-nss-32bit is &lt;3.16.1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098663" version="1" comment="mozilla-nss-tools is &lt;3.16.1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077540" version="1" comment="sled-release is ==11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077577" version="1" comment="Mesa is &lt;9.0.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077576" version="1" comment="Mesa-32bit is &lt;9.0.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090790" version="1" comment="MozillaFirefox is &lt;17.0.9esr-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090789" version="1" comment="MozillaFirefox-translations is &lt;17.0.9esr-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113529" version="1" comment="MozillaFirefox-translations is &lt;31.8.0esr-0.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119546" version="1" comment="MozillaFirefox-translations is &lt;38.5.0esr-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098633" version="1" comment="MozillaFirefox is &lt;24.5.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098631" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.7.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098632" version="1" comment="MozillaFirefox-translations is &lt;24.5.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098636" version="1" comment="libfreebl3 is &lt;3.16-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098634" version="1" comment="libfreebl3-32bit is &lt;3.16-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098639" version="1" comment="libsoftokn3 is &lt;3.16-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098637" version="1" comment="libsoftokn3-32bit is &lt;3.16-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098649" version="1" comment="mozilla-nspr is &lt;4.10.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098647" version="1" comment="mozilla-nspr-32bit is &lt;4.10.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098643" version="1" comment="mozilla-nss is &lt;3.16-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098640" version="1" comment="mozilla-nss-32bit is &lt;3.16-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098641" version="1" comment="mozilla-nss-tools is &lt;3.16-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108676" version="1" comment="MozillaFirefox is &lt;31.6.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108675" version="1" comment="MozillaFirefox-translations is &lt;31.6.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111622" version="1" comment="MozillaFirefox-translations is &lt;31.8.0esr-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111624" version="1" comment="libfreebl3 is &lt;3.19.2_CKBI_1.98-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111625" version="1" comment="libfreebl3-32bit is &lt;3.19.2_CKBI_1.98-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111627" version="1" comment="libsoftokn3 is &lt;3.19.2_CKBI_1.98-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111628" version="1" comment="libsoftokn3-32bit is &lt;3.19.2_CKBI_1.98-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111598" version="1" comment="mozilla-nspr-32bit is &lt;4.10.8-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111631" version="1" comment="mozilla-nss-32bit is &lt;3.19.2_CKBI_1.98-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111634" version="1" comment="mozilla-nss-tools is &lt;3.19.2_CKBI_1.98-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115109" version="1" comment="libaugeas0 is &lt;0.9.0-3.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100817" version="1" comment="bash is &lt;3.2-147.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100815" version="1" comment="bash-doc is &lt;3.2-147.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100818" version="1" comment="libreadline5-32bit is &lt;5.2-147.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100821" version="1" comment="readline-doc is &lt;5.2-147.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111613" version="1" comment="bind-libs is &lt;9.9.6P1-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111612" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111616" version="1" comment="bind-utils is &lt;9.9.6P1-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114089" version="1" comment="bind-libs is &lt;9.9.6P1-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114088" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114090" version="1" comment="bind-utils is &lt;9.9.6P1-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119451" version="1" comment="bind-libs is &lt;9.9.6P1-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119452" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119453" version="1" comment="bind-utils is &lt;9.9.6P1-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121670" version="1" comment="bind-libs is &lt;9.9.6P1-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121671" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121672" version="1" comment="bind-utils is &lt;9.9.6P1-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107553" version="1" comment="binutils is &lt;2.23.1-0.23.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109262" version="1" comment="ibm-data-db2 is &lt;2.6.7-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098772" version="1" comment="cabextract is &lt;1.2-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116561" version="1" comment="cabextract is &lt;1.2-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098526" version="1" comment="libldb1 is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098867" version="1" comment="libldb1-32bit is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098529" version="1" comment="libsmbclient0 is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098527" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098532" version="1" comment="libtalloc2 is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098530" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098535" version="1" comment="libtdb1 is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098533" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098537" version="1" comment="libtevent0 is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098536" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098540" version="1" comment="libwbclient0 is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098538" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098551" version="1" comment="samba is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098541" version="1" comment="samba-32bit is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098544" version="1" comment="samba-client is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098542" version="1" comment="samba-client-32bit is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098545" version="1" comment="samba-doc is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098546" version="1" comment="samba-krb-printing is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098549" version="1" comment="samba-winbind is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098547" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112219" version="1" comment="clamav is &lt;0.98.1-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110877" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110876" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118746" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118747" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098821" version="1" comment="compat-wireless-kmp-default is &lt;3.13_3.0.101_0.31-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098822" version="1" comment="compat-wireless-kmp-pae is &lt;3.13_3.0.101_0.31-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098823" version="1" comment="compat-wireless-kmp-xen is &lt;3.13_3.0.101_0.31-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099551" version="1" comment="cups is &lt;1.3.9-8.46.52.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099547" version="1" comment="cups-client is &lt;1.3.9-8.46.52.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099550" version="1" comment="cups-libs is &lt;1.3.9-8.46.52.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099548" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.52.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098955" version="1" comment="curl is &lt;7.19.7-1.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098958" version="1" comment="libcurl4 is &lt;7.19.7-1.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098956" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122359" version="1" comment="libcurl4 is &lt;7.19.7-1.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122360" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107512" version="1" comment="curl is &lt;7.19.7-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107514" version="1" comment="libcurl4 is &lt;7.19.7-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107513" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122235" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118699" version="1" comment="dhcpcd is &lt;3.2.3-45.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110199" version="1" comment="dnsmasq is &lt;2.71-0.12.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113462" version="1" comment="e2fsprogs is &lt;1.41.9-2.10.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113463" version="1" comment="libblkid1 is &lt;2.19.1-6.62.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113464" version="1" comment="libblkid1-32bit is &lt;2.19.1-6.62.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113465" version="1" comment="libcom_err2 is &lt;1.41.9-2.10.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113466" version="1" comment="libcom_err2-32bit is &lt;1.41.9-2.10.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113467" version="1" comment="libext2fs2 is &lt;1.41.9-2.10.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113468" version="1" comment="libuuid1 is &lt;2.19.1-6.62.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113469" version="1" comment="libuuid1-32bit is &lt;2.19.1-6.62.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113470" version="1" comment="uuid-runtime is &lt;2.19.1-6.62.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122236" version="1" comment="ecryptfs-utils is &lt;61-1.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122237" version="1" comment="ecryptfs-utils-32bit is &lt;61-1.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098788" version="1" comment="libpurple-meanwhile is &lt;2.6.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098789" version="1" comment="libpurple-tcl is &lt;2.6.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077548" version="1" comment="MozillaFirefox is &lt;17.0.7esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077546" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077547" version="1" comment="MozillaFirefox-translations is &lt;17.0.7esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091388" version="1" comment="MozillaFirefox is &lt;17.0.10esr-0.7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091386" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.12.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091387" version="1" comment="MozillaFirefox-translations is &lt;17.0.10esr-0.7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093482" version="1" comment="MozillaFirefox is &lt;24.3.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093480" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.7.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093481" version="1" comment="MozillaFirefox-translations is &lt;24.3.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093485" version="1" comment="libfreebl3 is &lt;3.15.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093483" version="1" comment="libfreebl3-32bit is &lt;3.15.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093488" version="1" comment="libsoftokn3 is &lt;3.15.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093486" version="1" comment="libsoftokn3-32bit is &lt;3.15.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093492" version="1" comment="mozilla-nss is &lt;3.15.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093489" version="1" comment="mozilla-nss-32bit is &lt;3.15.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093490" version="1" comment="mozilla-nss-tools is &lt;3.15.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098646" version="1" comment="MozillaFirefox is &lt;24.4.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098644" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.7.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098645" version="1" comment="MozillaFirefox-translations is &lt;24.4.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099235" version="1" comment="MozillaFirefox is &lt;24.7.0esr-0.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099234" version="1" comment="MozillaFirefox-translations is &lt;24.7.0esr-0.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099238" version="1" comment="libfreebl3 is &lt;3.16.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099236" version="1" comment="libfreebl3-32bit is &lt;3.16.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099241" version="1" comment="libsoftokn3 is &lt;3.16.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099239" version="1" comment="libsoftokn3-32bit is &lt;3.16.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099245" version="1" comment="mozilla-nss is &lt;3.16.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099242" version="1" comment="mozilla-nss-32bit is &lt;3.16.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099243" version="1" comment="mozilla-nss-tools is &lt;3.16.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099991" version="1" comment="MozillaFirefox is &lt;24.8.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099990" version="1" comment="MozillaFirefox-translations is &lt;24.8.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099994" version="1" comment="libfreebl3 is &lt;3.16.4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099992" version="1" comment="libfreebl3-32bit is &lt;3.16.4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099997" version="1" comment="libsoftokn3 is &lt;3.16.4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099995" version="1" comment="libsoftokn3-32bit is &lt;3.16.4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100000" version="1" comment="mozilla-nspr is &lt;4.10.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099998" version="1" comment="mozilla-nspr-32bit is &lt;4.10.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100004" version="1" comment="mozilla-nss is &lt;3.16.4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100001" version="1" comment="mozilla-nss-32bit is &lt;3.16.4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100002" version="1" comment="mozilla-nss-tools is &lt;3.16.4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102688" version="1" comment="MozillaFirefox is &lt;31.3.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102687" version="1" comment="MozillaFirefox-translations is &lt;31.3.0esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107500" version="1" comment="MozillaFirefox is &lt;31.4.0esr-0.8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107499" version="1" comment="MozillaFirefox-translations is &lt;31.4.0esr-0.8.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108087" version="1" comment="MozillaFirefox is &lt;31.5.3esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108086" version="1" comment="MozillaFirefox-translations is &lt;31.5.3esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114790" version="1" comment="mozilla-nspr-32bit is &lt;4.10.9-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114961" version="1" comment="MozillaFirefox-translations is &lt;38.3.0esr-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116562" version="1" comment="MozillaFirefox-branding-SLED is &lt;38-15.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116563" version="1" comment="MozillaFirefox-translations is &lt;38.4.0esr-25.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116564" version="1" comment="libfreebl3 is &lt;3.19.2.1-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116565" version="1" comment="libfreebl3-32bit is &lt;3.19.2.1-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116566" version="1" comment="libsoftokn3 is &lt;3.19.2.1-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116567" version="1" comment="libsoftokn3-32bit is &lt;3.19.2.1-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116568" version="1" comment="mozilla-nspr-32bit is &lt;4.10.10-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116569" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.1-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116570" version="1" comment="mozilla-nss-tools is &lt;3.19.2.1-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092101" version="1" comment="MozillaFirefox is &lt;24.2.0esr-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092099" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092100" version="1" comment="MozillaFirefox-translations is &lt;24.2.0esr-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092104" version="1" comment="libfreebl3 is &lt;3.15.3.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092102" version="1" comment="libfreebl3-32bit is &lt;3.15.3.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092107" version="1" comment="libsoftokn3 is &lt;3.15.3.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092105" version="1" comment="libsoftokn3-32bit is &lt;3.15.3.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092111" version="1" comment="mozilla-nss is &lt;3.15.3.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092108" version="1" comment="mozilla-nss-32bit is &lt;3.15.3.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092109" version="1" comment="mozilla-nss-tools is &lt;3.15.3.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101908" version="1" comment="MozillaFirefox is &lt;31.2.0esr-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101906" version="1" comment="MozillaFirefox-branding-SLED is &lt;31.0-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101907" version="1" comment="MozillaFirefox-translations is &lt;31.2.0esr-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101261" version="1" comment="libfreebl3 is &lt;3.17.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101260" version="1" comment="libfreebl3-32bit is &lt;3.17.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101263" version="1" comment="libsoftokn3 is &lt;3.17.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101262" version="1" comment="libsoftokn3-32bit is &lt;3.17.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101268" version="1" comment="mozilla-nss is &lt;3.17.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101266" version="1" comment="mozilla-nss-32bit is &lt;3.17.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101267" version="1" comment="mozilla-nss-tools is &lt;3.17.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114289" version="1" comment="MozillaFirefox-branding-SLED is &lt;31.0-0.12.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114290" version="1" comment="MozillaFirefox-translations is &lt;38.2.1esr-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114291" version="1" comment="libfreebl3 is &lt;3.19.2.0-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114292" version="1" comment="libfreebl3-32bit is &lt;3.19.2.0-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114293" version="1" comment="libsoftokn3 is &lt;3.19.2.0-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114294" version="1" comment="libsoftokn3-32bit is &lt;3.19.2.0-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114296" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.0-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114297" version="1" comment="mozilla-nss-tools is &lt;3.19.2.0-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101722" version="1" comment="flash-player is &lt;11.2.202.418-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101720" version="1" comment="flash-player-gnome is &lt;11.2.202.418-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101721" version="1" comment="flash-player-kde4 is &lt;11.2.202.418-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111595" version="1" comment="flash-player is &lt;11.2.202.481-0.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111596" version="1" comment="flash-player-gnome is &lt;11.2.202.481-0.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111597" version="1" comment="flash-player-kde4 is &lt;11.2.202.481-0.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111605" version="1" comment="flash-player is &lt;11.2.202.491-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111606" version="1" comment="flash-player-gnome is &lt;11.2.202.491-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111607" version="1" comment="flash-player-kde4 is &lt;11.2.202.491-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113512" version="1" comment="flash-player is &lt;11.2.202.508-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113513" version="1" comment="flash-player-gnome is &lt;11.2.202.508-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113514" version="1" comment="flash-player-kde4 is &lt;11.2.202.508-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114486" version="1" comment="flash-player is &lt;11.2.202.521-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114487" version="1" comment="flash-player-gnome is &lt;11.2.202.521-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114488" version="1" comment="flash-player-kde4 is &lt;11.2.202.521-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115026" version="1" comment="flash-player is &lt;11.2.202.535-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115027" version="1" comment="flash-player-gnome is &lt;11.2.202.535-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115028" version="1" comment="flash-player-kde4 is &lt;11.2.202.535-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115056" version="1" comment="flash-player is &lt;11.2.202.540-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115057" version="1" comment="flash-player-gnome is &lt;11.2.202.540-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115058" version="1" comment="flash-player-kde4 is &lt;11.2.202.540-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116123" version="1" comment="flash-player is &lt;11.2.202.548-0.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116124" version="1" comment="flash-player-gnome is &lt;11.2.202.548-0.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116125" version="1" comment="flash-player-kde4 is &lt;11.2.202.548-0.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118887" version="1" comment="flash-player is &lt;11.2.202.554-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118888" version="1" comment="flash-player-gnome is &lt;11.2.202.554-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118889" version="1" comment="flash-player-kde4 is &lt;11.2.202.554-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120898" version="1" comment="flash-player is &lt;11.2.202.559-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120899" version="1" comment="flash-player-gnome is &lt;11.2.202.559-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120900" version="1" comment="flash-player-kde4 is &lt;11.2.202.559-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119814" version="1" comment="foomatic-filters is &lt;3.0.2-269.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107583" version="1" comment="freetype2 is &lt;2.3.7-25.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107582" version="1" comment="freetype2-32bit is &lt;2.3.7-25.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107584" version="1" comment="ft2demos is &lt;2.3.7-25.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121673" version="1" comment="giflib-32bit is &lt;4.1.6-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100160" version="1" comment="glibc is &lt;2.11.3-17.72.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100147" version="1" comment="glibc-32bit is &lt;2.11.3-17.72.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100149" version="1" comment="glibc-devel is &lt;2.11.3-17.72.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100148" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.72.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100151" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.72.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100155" version="1" comment="glibc-locale is &lt;2.11.3-17.72.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100153" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.72.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100161" version="1" comment="nscd is &lt;2.11.3-17.72.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113935" version="1" comment="glibc-32bit is &lt;2.11.3-17.87.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113936" version="1" comment="glibc-devel is &lt;2.11.3-17.87.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113937" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.87.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113939" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.87.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113941" version="1" comment="glibc-locale is &lt;2.11.3-17.87.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113942" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.87.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113945" version="1" comment="nscd is &lt;2.11.3-17.87.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122361" version="1" comment="glibc-32bit is &lt;2.11.3-17.95.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122362" version="1" comment="glibc-devel is &lt;2.11.3-17.95.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122363" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.95.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122364" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.95.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122365" version="1" comment="glibc-locale is &lt;2.11.3-17.95.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122366" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.95.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122367" version="1" comment="nscd is &lt;2.11.3-17.95.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098741" version="1" comment="gnutls is &lt;2.4.1-24.39.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098745" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098743" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114286" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114287" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119815" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119816" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118071" version="1" comment="gpg2 is &lt;2.0.9-25.33.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118072" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119302" version="1" comment="grub2 is &lt;2.00-0.49.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119303" version="1" comment="grub2-x86_64-efi is &lt;2.00-0.49.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119304" version="1" comment="grub2-x86_64-xen is &lt;2.00-0.49.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109703" version="1" comment="gstreamer-0_10-plugins-bad is &lt;0.10.22-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109702" version="1" comment="gstreamer-0_10-plugins-bad-lang is &lt;0.10.22-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109705" version="1" comment="libgstbasecamerabinsrc-0_10-0 is &lt;0.10.22-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109704" version="1" comment="libgstbasecamerabinsrc-0_10-0-32bit is &lt;0.10.22-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109707" version="1" comment="libgstbasevideo-0_10-0 is &lt;0.10.22-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109706" version="1" comment="libgstbasevideo-0_10-0-32bit is &lt;0.10.22-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109709" version="1" comment="libgstphotography-0_10-0 is &lt;0.10.22-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109708" version="1" comment="libgstphotography-0_10-0-32bit is &lt;0.10.22-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109711" version="1" comment="libgstsignalprocessor-0_10-0 is &lt;0.10.22-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109710" version="1" comment="libgstsignalprocessor-0_10-0-32bit is &lt;0.10.22-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109713" version="1" comment="libgstvdp-0_10-0 is &lt;0.10.22-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109712" version="1" comment="libgstvdp-0_10-0-32bit is &lt;0.10.22-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115093" version="1" comment="gtk2-32bit is &lt;2.18.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115095" version="1" comment="gtk2-lang is &lt;2.18.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121164" version="1" comment="gtk2-32bit is &lt;2.18.9-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121165" version="1" comment="gtk2-lang is &lt;2.18.9-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094250" version="1" comment="icedtea-web is &lt;1.4.2-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110708" version="1" comment="libicu is &lt;4.0-7.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101333" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.71-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101331" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.71-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101332" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.71-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111640" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.85-0.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111641" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.85-0.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111642" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.85-0.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115452" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.91-0.14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115453" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.91-0.14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115454" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.91-0.14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122064" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.95-0.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122065" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.95-0.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122066" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.95-0.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107717" version="1" comment="kde4-l10n-ar is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107718" version="1" comment="kde4-l10n-cs is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107721" version="1" comment="kde4-l10n-da is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107719" version="1" comment="kde4-l10n-da-data is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107720" version="1" comment="kde4-l10n-da-doc is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107722" version="1" comment="kde4-l10n-de is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107723" version="1" comment="kde4-l10n-en_GB is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107726" version="1" comment="kde4-l10n-es is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107724" version="1" comment="kde4-l10n-es-data is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107725" version="1" comment="kde4-l10n-es-doc is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107729" version="1" comment="kde4-l10n-fr is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107727" version="1" comment="kde4-l10n-fr-data is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107728" version="1" comment="kde4-l10n-fr-doc is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107730" version="1" comment="kde4-l10n-hu is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107733" version="1" comment="kde4-l10n-it is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107731" version="1" comment="kde4-l10n-it-data is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107732" version="1" comment="kde4-l10n-it-doc is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107734" version="1" comment="kde4-l10n-ja is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107735" version="1" comment="kde4-l10n-ko is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107736" version="1" comment="kde4-l10n-nb is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107739" version="1" comment="kde4-l10n-nl is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107737" version="1" comment="kde4-l10n-nl-data is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107738" version="1" comment="kde4-l10n-nl-doc is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107742" version="1" comment="kde4-l10n-pl is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107740" version="1" comment="kde4-l10n-pl-data is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107741" version="1" comment="kde4-l10n-pl-doc is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107743" version="1" comment="kde4-l10n-pt is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107746" version="1" comment="kde4-l10n-pt_BR is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107744" version="1" comment="kde4-l10n-pt_BR-data is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107745" version="1" comment="kde4-l10n-pt_BR-doc is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107749" version="1" comment="kde4-l10n-ru is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107747" version="1" comment="kde4-l10n-ru-data is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107748" version="1" comment="kde4-l10n-ru-doc is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107752" version="1" comment="kde4-l10n-sv is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107750" version="1" comment="kde4-l10n-sv-data is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107751" version="1" comment="kde4-l10n-sv-doc is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107753" version="1" comment="kde4-l10n-zh_CN is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107754" version="1" comment="kde4-l10n-zh_TW is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107755" version="1" comment="kdebase4-runtime-xine is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121511" version="1" comment="kde4-kgreeter-plugins is &lt;4.3.5-0.12.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121512" version="1" comment="kdebase4-wallpapers is &lt;4.3.5-0.11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121513" version="1" comment="kdebase4-workspace-ksysguardd is &lt;4.3.5-0.12.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121514" version="1" comment="kdm is &lt;4.3.5-0.12.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121515" version="1" comment="kwin is &lt;4.3.5-0.12.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112905" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101000" version="1" comment="kernel-default is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100997" version="1" comment="kernel-default-base is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100998" version="1" comment="kernel-default-devel is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101035" version="1" comment="kernel-default-extra is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101024" version="1" comment="kernel-pae is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101022" version="1" comment="kernel-pae-base is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101023" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101037" version="1" comment="kernel-pae-extra is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101001" version="1" comment="kernel-source is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101002" version="1" comment="kernel-syms is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101004" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101014" version="1" comment="kernel-xen is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101012" version="1" comment="kernel-xen-base is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101013" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101036" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101015" version="1" comment="xen-kmp-default is &lt;4.2.4_04_3.0.101_0.40-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101025" version="1" comment="xen-kmp-pae is &lt;4.2.4_04_3.0.101_0.40-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114457" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114468" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114459" version="1" comment="kernel-default is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114469" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114470" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114460" version="1" comment="kernel-default-extra is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114465" version="1" comment="kernel-pae is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114483" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114484" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114466" version="1" comment="kernel-pae-extra is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114474" version="1" comment="kernel-source is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114475" version="1" comment="kernel-syms is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114476" version="1" comment="kernel-trace is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114478" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114461" version="1" comment="kernel-xen is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114479" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114480" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114462" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101018" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117925" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117926" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117902" version="1" comment="kernel-default is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117903" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117904" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117913" version="1" comment="kernel-default-extra is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117914" version="1" comment="kernel-pae is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117915" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117916" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117917" version="1" comment="kernel-pae-extra is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117908" version="1" comment="kernel-source is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117909" version="1" comment="kernel-syms is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117910" version="1" comment="kernel-trace is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117912" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117918" version="1" comment="kernel-xen is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117919" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117920" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117921" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099577" version="1" comment="krb5 is &lt;1.6.3-133.49.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099568" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099571" version="1" comment="krb5-client is &lt;1.6.3-133.49.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115952" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115955" version="1" comment="krb5-client is &lt;1.6.3-133.49.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117946" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117947" version="1" comment="krb5-client is &lt;1.6.3-133.49.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101410" version="1" comment="krb5 is &lt;1.6.3-133.49.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101408" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101409" version="1" comment="krb5-client is &lt;1.6.3-133.49.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111661" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111664" version="1" comment="krb5-client is &lt;1.6.3-133.49.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100956" version="1" comment="kvm is &lt;1.4.2-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114003" version="1" comment="kvm is &lt;1.4.2-0.22.34.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119547" version="1" comment="kvm is &lt;1.4.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107522" version="1" comment="kvm is &lt;1.4.2-0.21.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107527" version="1" comment="libvirt is &lt;1.0.5.9-0.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107524" version="1" comment="libvirt-client is &lt;1.0.5.9-0.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107523" version="1" comment="libvirt-client-32bit is &lt;1.0.5.9-0.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107525" version="1" comment="libvirt-doc is &lt;1.0.5.9-0.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107526" version="1" comment="libvirt-python is &lt;1.0.5.9-0.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113168" version="1" comment="lcms2 is &lt;2.5-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113169" version="1" comment="liblcms2-2 is &lt;2.5-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093511" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093525" version="1" comment="libqt4 is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093512" version="1" comment="libqt4-32bit is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093515" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093513" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093520" version="1" comment="libqt4-sql is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093516" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093517" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093518" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093523" version="1" comment="libqt4-x11 is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093521" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108071" version="1" comment="libblkid1 is &lt;2.19.1-6.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108070" version="1" comment="libblkid1-32bit is &lt;2.19.1-6.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108073" version="1" comment="libuuid1 is &lt;2.19.1-6.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108072" version="1" comment="libuuid1-32bit is &lt;2.19.1-6.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108075" version="1" comment="util-linux is &lt;2.19.1-6.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108074" version="1" comment="util-linux-lang is &lt;2.19.1-6.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108076" version="1" comment="uuid-runtime is &lt;2.19.1-6.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094590" version="1" comment="libecpg6 is &lt;9.1.12-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094592" version="1" comment="libpq5 is &lt;9.1.12-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094591" version="1" comment="libpq5-32bit is &lt;9.1.12-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094596" version="1" comment="postgresql91 is &lt;9.1.12-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094594" version="1" comment="postgresql91-docs is &lt;9.1.12-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100804" version="1" comment="libfreebl3 is &lt;3.16.5-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100802" version="1" comment="libfreebl3-32bit is &lt;3.16.5-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100807" version="1" comment="libsoftokn3 is &lt;3.16.5-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100805" version="1" comment="libsoftokn3-32bit is &lt;3.16.5-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100811" version="1" comment="mozilla-nss is &lt;3.16.5-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100808" version="1" comment="mozilla-nss-32bit is &lt;3.16.5-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100809" version="1" comment="mozilla-nss-tools is &lt;3.16.5-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114502" version="1" comment="libgcrypt11 is &lt;1.5.0-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114503" version="1" comment="libgcrypt11-32bit is &lt;1.5.0-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105797" version="1" comment="libjasper is &lt;1.900.1-134.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105796" version="1" comment="libjasper-32bit is &lt;1.900.1-134.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112622" version="1" comment="libmpfr1 is &lt;2.3.2-3.118.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116579" version="1" comment="libmspack0 is &lt;0.0.20060920alpha-74.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099912" version="1" comment="libmysql55client18 is &lt;5.5.39-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099910" version="1" comment="libmysql55client18-32bit is &lt;5.5.39-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099913" version="1" comment="libmysql55client_r18 is &lt;5.5.39-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099916" version="1" comment="libmysqlclient15 is &lt;5.0.96-0.6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099914" version="1" comment="libmysqlclient15-32bit is &lt;5.0.96-0.6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099917" version="1" comment="libmysqlclient_r15 is &lt;5.0.96-0.6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099920" version="1" comment="mysql is &lt;5.5.39-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099918" version="1" comment="mysql-client is &lt;5.5.39-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101158" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101157" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101159" version="1" comment="openssl is &lt;0.9.8j-0.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117948" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119817" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099499" version="1" comment="libpulse-browse0 is &lt;0.9.23-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099500" version="1" comment="libpulse-mainloop-glib0 is &lt;0.9.23-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099503" version="1" comment="libpulse0 is &lt;0.9.23-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099501" version="1" comment="libpulse0-32bit is &lt;0.9.23-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099510" version="1" comment="pulseaudio is &lt;0.9.23-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099504" version="1" comment="pulseaudio-esound-compat is &lt;0.9.23-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099505" version="1" comment="pulseaudio-gdm-hooks is &lt;0.9.23-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099506" version="1" comment="pulseaudio-lang is &lt;0.9.23-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099529" version="1" comment="pulseaudio-module-bluetooth is &lt;0.9.23-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099530" version="1" comment="pulseaudio-module-gconf is &lt;0.9.23-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099531" version="1" comment="pulseaudio-module-jack is &lt;0.9.23-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099532" version="1" comment="pulseaudio-module-lirc is &lt;0.9.23-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099507" version="1" comment="pulseaudio-module-x11 is &lt;0.9.23-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099508" version="1" comment="pulseaudio-module-zeroconf is &lt;0.9.23-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099509" version="1" comment="pulseaudio-utils is &lt;0.9.23-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112907" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112909" version="1" comment="libqt4 is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112910" version="1" comment="libqt4-32bit is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112911" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112912" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112913" version="1" comment="libqt4-sql is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112914" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112915" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112916" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112917" version="1" comment="libqt4-x11 is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112918" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115082" version="1" comment="librsvg-32bit is &lt;2.26.0-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115083" version="1" comment="rsvg-view is &lt;2.26.0-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116580" version="1" comment="libsndfile-32bit is &lt;1.0.20-2.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098962" version="1" comment="libtasn1 is &lt;1.5-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098961" version="1" comment="libtasn1-3 is &lt;1.5-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098959" version="1" comment="libtasn1-3-32bit is &lt;1.5-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116057" version="1" comment="libvdpau is &lt;0.4.1-16.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116058" version="1" comment="libvdpau1 is &lt;0.4.1-16.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116059" version="1" comment="libvdpau1-32bit is &lt;0.4.1-16.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098488" version="1" comment="libvirt is &lt;1.0.5.9-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098484" version="1" comment="libvirt-client is &lt;1.0.5.9-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098483" version="1" comment="libvirt-client-32bit is &lt;1.0.5.9-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098485" version="1" comment="libvirt-doc is &lt;1.0.5.9-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098487" version="1" comment="libvirt-python is &lt;1.0.5.9-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101724" version="1" comment="libxml2-python is &lt;2.7.6-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119818" version="1" comment="libxml2-32bit is &lt;2.7.6-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119819" version="1" comment="libxml2-python is &lt;2.7.6-0.34.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121361" version="1" comment="libxml2-32bit is &lt;2.7.6-0.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121362" version="1" comment="libxml2-python is &lt;2.7.6-0.37.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103133" version="1" comment="mailx is &lt;12.5-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122522" version="1" comment="MozillaFirefox-branding-SLED is &lt;38-18.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122523" version="1" comment="MozillaFirefox-translations is &lt;38.6.0esr-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122524" version="1" comment="libfreebl3 is &lt;3.20.2-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122525" version="1" comment="libfreebl3-32bit is &lt;3.20.2-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122526" version="1" comment="libsoftokn3 is &lt;3.20.2-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122527" version="1" comment="libsoftokn3-32bit is &lt;3.20.2-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122528" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122529" version="1" comment="mozilla-nss-tools is &lt;3.20.2-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113990" version="1" comment="mozilla-nspr-32bit is &lt;4.10.8-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120789" version="1" comment="libfreebl3 is &lt;3.19.2.2-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120790" version="1" comment="libfreebl3-32bit is &lt;3.19.2.2-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120791" version="1" comment="libsoftokn3 is &lt;3.19.2.2-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120792" version="1" comment="libsoftokn3-32bit is &lt;3.19.2.2-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120793" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.2-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120794" version="1" comment="mozilla-nss-tools is &lt;3.19.2.2-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091404" version="1" comment="libfreebl3 is &lt;3.15.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091402" version="1" comment="libfreebl3-32bit is &lt;3.15.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091407" version="1" comment="libsoftokn3 is &lt;3.15.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091405" version="1" comment="libsoftokn3-32bit is &lt;3.15.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091411" version="1" comment="mozilla-nss is &lt;3.15.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091408" version="1" comment="mozilla-nss-32bit is &lt;3.15.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091409" version="1" comment="mozilla-nss-tools is &lt;3.15.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098630" version="1" comment="mutt is &lt;1.5.17-42.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115097" version="1" comment="libmysql55client18 is &lt;5.5.45-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115096" version="1" comment="libmysql55client18-32bit is &lt;5.5.45-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115098" version="1" comment="libmysql55client_r18 is &lt;5.5.45-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115100" version="1" comment="mysql-client is &lt;5.5.45-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118183" version="1" comment="libmysql55client18 is &lt;5.5.46-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118184" version="1" comment="libmysql55client18-32bit is &lt;5.5.46-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118185" version="1" comment="libmysql55client_r18 is &lt;5.5.46-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118186" version="1" comment="mysql-client is &lt;5.5.46-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122368" version="1" comment="libmysql55client18 is &lt;5.5.47-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122369" version="1" comment="libmysql55client18-32bit is &lt;5.5.47-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122370" version="1" comment="libmysql55client_r18 is &lt;5.5.47-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122371" version="1" comment="mysql-client is &lt;5.5.47-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114280" version="1" comment="libsnmp15 is &lt;5.4.2.1-8.12.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114282" version="1" comment="perl-SNMP is &lt;5.4.2.1-8.12.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114283" version="1" comment="snmp-mibs is &lt;5.4.2.1-8.12.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098898" version="1" comment="novell-qtgui is &lt;3.0.0-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098897" version="1" comment="novell-qtgui-cli is &lt;3.0.0-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098899" version="1" comment="novell-ui-base is &lt;3.0.0-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091780" version="1" comment="libfreebl3 is &lt;3.15.3-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091778" version="1" comment="libfreebl3-32bit is &lt;3.15.3-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091783" version="1" comment="libsoftokn3 is &lt;3.15.3-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091781" version="1" comment="libsoftokn3-32bit is &lt;3.15.3-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091787" version="1" comment="mozilla-nss is &lt;3.15.3-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091784" version="1" comment="mozilla-nss-32bit is &lt;3.15.3-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091785" version="1" comment="mozilla-nss-tools is &lt;3.15.3-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099004" version="1" comment="ntp is &lt;4.2.4p8-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099003" version="1" comment="ntp-doc is &lt;4.2.4p8-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114131" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114135" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119836" version="1" comment="libldap-2_4-2 is &lt;2.4.26-0.62.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119837" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.26-0.62.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098708" version="1" comment="openssh is &lt;6.2p2-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098707" version="1" comment="openssh-askpass is &lt;6.2p2-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098706" version="1" comment="openssh-askpass-gnome is &lt;6.2p2-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114381" version="1" comment="openssh is &lt;6.2p2-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114382" version="1" comment="openssh-askpass is &lt;6.2p2-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114383" version="1" comment="openssh-askpass-gnome is &lt;6.2p2-0.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121363" version="1" comment="openssh is &lt;6.2p2-0.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121364" version="1" comment="openssh-askpass is &lt;6.2p2-0.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121365" version="1" comment="openssh-askpass-gnome is &lt;6.2p2-0.24.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118748" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118749" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112657" version="1" comment="openssl-certs is &lt;1.97-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091789" version="1" comment="openvpn is &lt;2.0.9-143.40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117986" version="1" comment="orca is &lt;2.28.3-0.5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117987" version="1" comment="orca-lang is &lt;2.28.3-0.5.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098712" version="1" comment="pam is &lt;1.1.5-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098709" version="1" comment="pam-32bit is &lt;1.1.5-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098710" version="1" comment="pam-doc is &lt;1.1.5-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112920" version="1" comment="perl is &lt;5.10.0-64.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112921" version="1" comment="perl-32bit is &lt;5.10.0-64.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112922" version="1" comment="perl-Module-Build is &lt;0.2808.01-0.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112923" version="1" comment="perl-Test-Simple is &lt;0.72-0.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112924" version="1" comment="perl-base is &lt;5.10.0-64.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112925" version="1" comment="perl-doc is &lt;5.10.0-64.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103187" version="1" comment="popt is &lt;1.7-37.60.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103186" version="1" comment="popt-32bit is &lt;1.7-37.60.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103188" version="1" comment="rpm is &lt;4.4.2.3-37.60.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123272" version="1" comment="libecpg6 is &lt;9.4.5-0.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123273" version="1" comment="libpq5 is &lt;9.4.5-0.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123274" version="1" comment="libpq5-32bit is &lt;9.4.5-0.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123275" version="1" comment="postgresql94 is &lt;9.4.5-0.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123276" version="1" comment="postgresql94-docs is &lt;9.4.5-0.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108214" version="1" comment="libecpg6 is &lt;9.1.15-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108216" version="1" comment="libpq5 is &lt;9.1.15-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108215" version="1" comment="libpq5-32bit is &lt;9.1.15-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108218" version="1" comment="postgresql91 is &lt;9.1.15-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108217" version="1" comment="postgresql91-docs is &lt;9.1.15-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110599" version="1" comment="postgresql91 is &lt;9.1.18-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110598" version="1" comment="postgresql91-docs is &lt;9.1.18-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121792" version="1" comment="postgresql91 is &lt;9.1.19-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121793" version="1" comment="postgresql91-docs is &lt;9.1.19-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098480" version="1" comment="puppet is &lt;2.6.18-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093473" version="1" comment="pwlib-plugins-avc is &lt;1.10.10-120.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093474" version="1" comment="pwlib-plugins-dc is &lt;1.10.10-120.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093475" version="1" comment="pwlib-plugins-v4l2 is &lt;1.10.10-120.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102342" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102341" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102347" version="1" comment="python is &lt;2.6.9-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102344" version="1" comment="python-base is &lt;2.6.9-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102343" version="1" comment="python-base-32bit is &lt;2.6.9-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102345" version="1" comment="python-curses is &lt;2.6.9-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102346" version="1" comment="python-xml is &lt;2.6.9-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112673" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112674" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112675" version="1" comment="python is &lt;2.6.9-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112677" version="1" comment="python-base is &lt;2.6.9-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112678" version="1" comment="python-base-32bit is &lt;2.6.9-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112679" version="1" comment="python-curses is &lt;2.6.9-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112686" version="1" comment="python-xml is &lt;2.6.9-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098670" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098668" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098684" version="1" comment="python is &lt;2.6.9-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098674" version="1" comment="python-base is &lt;2.6.9-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098672" version="1" comment="python-base-32bit is &lt;2.6.9-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098675" version="1" comment="python-curses is &lt;2.6.9-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098683" version="1" comment="python-xml is &lt;2.6.9-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099513" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099511" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099527" version="1" comment="python is &lt;2.6.9-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099517" version="1" comment="python-base is &lt;2.6.9-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099515" version="1" comment="python-base-32bit is &lt;2.6.9-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099518" version="1" comment="python-curses is &lt;2.6.9-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099526" version="1" comment="python-xml is &lt;2.6.9-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098481" version="1" comment="python-pywbem is &lt;0.7-6.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114959" version="1" comment="rpcbind is &lt;0.1.6+git20080930-6.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121170" version="1" comment="rsync is &lt;3.0.4-2.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098368" version="1" comment="ruby is &lt;1.8.7.p357-0.9.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106593" version="1" comment="libldb1 is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106592" version="1" comment="libldb1-32bit is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106595" version="1" comment="libsmbclient0 is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106594" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106597" version="1" comment="libtalloc2 is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106596" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106599" version="1" comment="libtdb1 is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106598" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106601" version="1" comment="libtevent0 is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106600" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106603" version="1" comment="libwbclient0 is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106602" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106611" version="1" comment="samba is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106604" version="1" comment="samba-32bit is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106606" version="1" comment="samba-client is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106605" version="1" comment="samba-client-32bit is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106607" version="1" comment="samba-doc is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106608" version="1" comment="samba-krb-printing is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106610" version="1" comment="samba-winbind is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106609" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121366" version="1" comment="libldb1 is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121367" version="1" comment="libldb1-32bit is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121368" version="1" comment="libsmbclient0 is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121369" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121370" version="1" comment="libtalloc2 is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121371" version="1" comment="libtalloc2-32bit is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121372" version="1" comment="libtdb1 is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121373" version="1" comment="libtdb1-32bit is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121374" version="1" comment="libtevent0 is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121375" version="1" comment="libtevent0-32bit is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121376" version="1" comment="libwbclient0 is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121377" version="1" comment="libwbclient0-32bit is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121378" version="1" comment="samba-32bit is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121379" version="1" comment="samba-client is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121380" version="1" comment="samba-client-32bit is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121381" version="1" comment="samba-doc is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121382" version="1" comment="samba-krb-printing is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121383" version="1" comment="samba-winbind is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121384" version="1" comment="samba-winbind-32bit is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117857" version="1" comment="sblim-sfcb is &lt;1.3.11-0.25.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117954" version="1" comment="strongswan is &lt;4.4.0-6.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117955" version="1" comment="strongswan-doc is &lt;4.4.0-6.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098511" version="1" comment="sudo is &lt;1.7.6p2-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103739" version="1" comment="suseRegister is &lt;1.4-1.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113930" version="1" comment="libtiff3 is &lt;3.8.2-141.160.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113931" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.160.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115063" version="1" comment="vorbis-tools is &lt;1.1.1-174.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101153" version="1" comment="wpa_supplicant-gui is &lt;0.7.1-6.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117988" version="1" comment="wpa_supplicant is &lt;0.7.1-6.17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117989" version="1" comment="wpa_supplicant-gui is &lt;0.7.1-6.17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109733" version="1" comment="xen is &lt;4.2.5_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109725" version="1" comment="xen-doc-html is &lt;4.2.5_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109726" version="1" comment="xen-doc-pdf is &lt;4.2.5_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109727" version="1" comment="xen-kmp-default is &lt;4.2.5_06_3.0.101_0.47.52-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109728" version="1" comment="xen-kmp-pae is &lt;4.2.5_06_3.0.101_0.47.52-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109730" version="1" comment="xen-libs is &lt;4.2.5_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109729" version="1" comment="xen-libs-32bit is &lt;4.2.5_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109732" version="1" comment="xen-tools is &lt;4.2.5_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109731" version="1" comment="xen-tools-domU is &lt;4.2.5_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103198" version="1" comment="xen is &lt;4.2.5_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103191" version="1" comment="xen-doc-html is &lt;4.2.5_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103192" version="1" comment="xen-doc-pdf is &lt;4.2.5_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103193" version="1" comment="xen-kmp-default is &lt;4.2.5_02_3.0.101_0.40-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103195" version="1" comment="xen-libs is &lt;4.2.5_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103194" version="1" comment="xen-libs-32bit is &lt;4.2.5_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103197" version="1" comment="xen-tools is &lt;4.2.5_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103196" version="1" comment="xen-tools-domU is &lt;4.2.5_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114110" version="1" comment="xen-doc-html is &lt;4.2.5_12-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114111" version="1" comment="xen-doc-pdf is &lt;4.2.5_12-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114112" version="1" comment="xen-kmp-default is &lt;4.2.5_12_3.0.101_0.47.55-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114118" version="1" comment="xen-kmp-pae is &lt;4.2.5_12_3.0.101_0.47.55-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114114" version="1" comment="xen-libs is &lt;4.2.5_12-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114113" version="1" comment="xen-libs-32bit is &lt;4.2.5_12-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114115" version="1" comment="xen-tools is &lt;4.2.5_12-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114116" version="1" comment="xen-tools-domU is &lt;4.2.5_12-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115413" version="1" comment="xen-doc-html is &lt;4.2.5_14-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115414" version="1" comment="xen-doc-pdf is &lt;4.2.5_14-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115415" version="1" comment="xen-kmp-default is &lt;4.2.5_14_3.0.101_0.47.67-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115420" version="1" comment="xen-kmp-pae is &lt;4.2.5_14_3.0.101_0.47.67-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115417" version="1" comment="xen-libs is &lt;4.2.5_14-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115416" version="1" comment="xen-libs-32bit is &lt;4.2.5_14-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115418" version="1" comment="xen-tools is &lt;4.2.5_14-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115419" version="1" comment="xen-tools-domU is &lt;4.2.5_14-18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089685" version="1" comment="xen is &lt;4.2.2_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089677" version="1" comment="xen-doc-html is &lt;4.2.2_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089678" version="1" comment="xen-doc-pdf is &lt;4.2.2_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089679" version="1" comment="xen-kmp-default is &lt;4.2.2_06_3.0.82_0.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089680" version="1" comment="xen-kmp-pae is &lt;4.2.2_06_3.0.82_0.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089682" version="1" comment="xen-libs is &lt;4.2.2_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089681" version="1" comment="xen-libs-32bit is &lt;4.2.2_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089684" version="1" comment="xen-tools is &lt;4.2.2_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089683" version="1" comment="xen-tools-domU is &lt;4.2.2_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091767" version="1" comment="xen is &lt;4.2.3_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091759" version="1" comment="xen-doc-html is &lt;4.2.3_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091760" version="1" comment="xen-doc-pdf is &lt;4.2.3_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091761" version="1" comment="xen-kmp-default is &lt;4.2.3_02_3.0.93_0.8-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091762" version="1" comment="xen-kmp-pae is &lt;4.2.3_02_3.0.93_0.8-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091764" version="1" comment="xen-libs is &lt;4.2.3_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091763" version="1" comment="xen-libs-32bit is &lt;4.2.3_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091766" version="1" comment="xen-tools is &lt;4.2.3_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091765" version="1" comment="xen-tools-domU is &lt;4.2.3_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092098" version="1" comment="xen is &lt;4.2.3_08-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092090" version="1" comment="xen-doc-html is &lt;4.2.3_08-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092091" version="1" comment="xen-doc-pdf is &lt;4.2.3_08-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092092" version="1" comment="xen-kmp-default is &lt;4.2.3_08_3.0.101_0.8-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092093" version="1" comment="xen-kmp-pae is &lt;4.2.3_08_3.0.101_0.8-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092095" version="1" comment="xen-libs is &lt;4.2.3_08-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092094" version="1" comment="xen-libs-32bit is &lt;4.2.3_08-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092097" version="1" comment="xen-tools is &lt;4.2.3_08-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092096" version="1" comment="xen-tools-domU is &lt;4.2.3_08-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094170" version="1" comment="xen is &lt;4.2.4_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094162" version="1" comment="xen-doc-html is &lt;4.2.4_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094163" version="1" comment="xen-doc-pdf is &lt;4.2.4_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094164" version="1" comment="xen-kmp-default is &lt;4.2.4_02_3.0.101_0.15-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094165" version="1" comment="xen-kmp-pae is &lt;4.2.4_02_3.0.101_0.15-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094167" version="1" comment="xen-libs is &lt;4.2.4_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094166" version="1" comment="xen-libs-32bit is &lt;4.2.4_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094169" version="1" comment="xen-tools is &lt;4.2.4_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094168" version="1" comment="xen-tools-domU is &lt;4.2.4_02-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101034" version="1" comment="xen is &lt;4.2.4_04-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101026" version="1" comment="xen-doc-html is &lt;4.2.4_04-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101027" version="1" comment="xen-doc-pdf is &lt;4.2.4_04-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101028" version="1" comment="xen-kmp-default is &lt;4.2.4_04_3.0.101_0.40-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101029" version="1" comment="xen-kmp-pae is &lt;4.2.4_04_3.0.101_0.40-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101031" version="1" comment="xen-libs is &lt;4.2.4_04-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101030" version="1" comment="xen-libs-32bit is &lt;4.2.4_04-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101033" version="1" comment="xen-tools is &lt;4.2.4_04-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101032" version="1" comment="xen-tools-domU is &lt;4.2.4_04-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108983" version="1" comment="xen is &lt;4.2.5_04-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108975" version="1" comment="xen-doc-html is &lt;4.2.5_04-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108976" version="1" comment="xen-doc-pdf is &lt;4.2.5_04-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108977" version="1" comment="xen-kmp-default is &lt;4.2.5_04_3.0.101_0.47.52-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108978" version="1" comment="xen-kmp-pae is &lt;4.2.5_04_3.0.101_0.47.52-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108980" version="1" comment="xen-libs is &lt;4.2.5_04-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108979" version="1" comment="xen-libs-32bit is &lt;4.2.5_04-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108982" version="1" comment="xen-tools is &lt;4.2.5_04-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108981" version="1" comment="xen-tools-domU is &lt;4.2.5_04-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110349" version="1" comment="xen is &lt;4.2.5_08-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110341" version="1" comment="xen-doc-html is &lt;4.2.5_08-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110342" version="1" comment="xen-doc-pdf is &lt;4.2.5_08-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110343" version="1" comment="xen-kmp-default is &lt;4.2.5_08_3.0.101_0.47.55-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110344" version="1" comment="xen-kmp-pae is &lt;4.2.5_08_3.0.101_0.47.55-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110346" version="1" comment="xen-libs is &lt;4.2.5_08-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110345" version="1" comment="xen-libs-32bit is &lt;4.2.5_08-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110348" version="1" comment="xen-tools is &lt;4.2.5_08-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110347" version="1" comment="xen-tools-domU is &lt;4.2.5_08-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118671" version="1" comment="xen-doc-html is &lt;4.2.5_18-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118672" version="1" comment="xen-doc-pdf is &lt;4.2.5_18-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118673" version="1" comment="xen-kmp-default is &lt;4.2.5_18_3.0.101_0.47.71-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118674" version="1" comment="xen-kmp-pae is &lt;4.2.5_18_3.0.101_0.47.71-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118675" version="1" comment="xen-libs is &lt;4.2.5_18-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118676" version="1" comment="xen-libs-32bit is &lt;4.2.5_18-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118677" version="1" comment="xen-tools is &lt;4.2.5_18-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118678" version="1" comment="xen-tools-domU is &lt;4.2.5_18-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092720" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092722" version="1" comment="xorg-x11-server is &lt;7.4-27.85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092721" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098577" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098575" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113219" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077725" version="1" comment="xorg-x11-libXfixes is &lt;7.4-1.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077724" version="1" comment="xorg-x11-libXfixes-32bit is &lt;7.4-1.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077729" version="1" comment="xorg-x11-libXrender is &lt;7.4-1.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077728" version="1" comment="xorg-x11-libXrender-32bit is &lt;7.4-1.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077733" version="1" comment="xorg-x11-libXt is &lt;7.4-1.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077732" version="1" comment="xorg-x11-libXt-32bit is &lt;7.4-1.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077731" version="1" comment="xorg-x11-libXv is &lt;7.4-1.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077730" version="1" comment="xorg-x11-libXv-32bit is &lt;7.4-1.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116586" version="1" comment="xscreensaver is &lt;5.07-6.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117401" version="1" comment="sled-release is ==11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123676" version="1" comment="MozillaFirefox-translations is &lt;38.6.1esr-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124755" version="1" comment="MozillaFirefox-translations is &lt;38.7.0esr-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124756" version="1" comment="libfreebl3 is &lt;3.20.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124757" version="1" comment="libfreebl3-32bit is &lt;3.20.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124758" version="1" comment="libsoftokn3 is &lt;3.20.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124759" version="1" comment="libsoftokn3-32bit is &lt;3.20.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124760" version="1" comment="mozilla-nspr-32bit is &lt;4.12-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124761" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124762" version="1" comment="mozilla-nss-tools is &lt;3.20.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113836" version="1" comment="xen-doc-html is &lt;4.4.2_12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113837" version="1" comment="xen-kmp-default is &lt;4.4.2_12_3.0.101_63-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113842" version="1" comment="xen-kmp-pae is &lt;4.4.2_12_3.0.101_63-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113838" version="1" comment="xen-libs is &lt;4.4.2_12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113841" version="1" comment="xen-libs-32bit is &lt;4.4.2_12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113839" version="1" comment="xen-tools is &lt;4.4.2_12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113840" version="1" comment="xen-tools-domU is &lt;4.4.2_12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125044" version="1" comment="bind-libs is &lt;9.9.6P1-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125045" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125046" version="1" comment="bind-utils is &lt;9.9.6P1-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124377" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124378" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125332" version="1" comment="fetchmail is &lt;6.3.8.90-13.20.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123022" version="1" comment="flash-player is &lt;11.2.202.569-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123023" version="1" comment="flash-player-gnome is &lt;11.2.202.569-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123024" version="1" comment="flash-player-kde4 is &lt;11.2.202.569-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124622" version="1" comment="flash-player is &lt;11.2.202.577-0.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124623" version="1" comment="flash-player-gnome is &lt;11.2.202.577-0.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124624" version="1" comment="flash-player-kde4 is &lt;11.2.202.577-0.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125521" version="1" comment="libgcc_s1 is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125522" version="1" comment="libgcc_s1-32bit is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125523" version="1" comment="libgfortran3-32bit is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125524" version="1" comment="libgomp1 is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125525" version="1" comment="libgomp1-32bit is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125526" version="1" comment="libquadmath0-32bit is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125527" version="1" comment="libstdc++6 is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125528" version="1" comment="libstdc++6-32bit is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125529" version="1" comment="libstdc++6-locale is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119305" version="1" comment="grub2 is &lt;2.00-0.54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119306" version="1" comment="grub2-x86_64-efi is &lt;2.00-0.54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119307" version="1" comment="grub2-x86_64-xen is &lt;2.00-0.54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114889" version="1" comment="icedtea-web is &lt;1.5.3-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115113" version="1" comment="libicu is &lt;4.0-7.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125683" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.99-0.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125684" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.99-0.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125685" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.99-0.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114777" version="1" comment="kernel-default is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114794" version="1" comment="kernel-default-base is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114795" version="1" comment="kernel-default-devel is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114778" version="1" comment="kernel-default-extra is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114785" version="1" comment="kernel-pae is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114808" version="1" comment="kernel-pae-base is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114809" version="1" comment="kernel-pae-devel is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114786" version="1" comment="kernel-pae-extra is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114796" version="1" comment="kernel-source is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114797" version="1" comment="kernel-syms is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114779" version="1" comment="kernel-trace is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114799" version="1" comment="kernel-trace-devel is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114781" version="1" comment="kernel-xen is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114806" version="1" comment="kernel-xen-base is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114807" version="1" comment="kernel-xen-devel is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114782" version="1" comment="kernel-xen-extra is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125530" version="1" comment="kernel-default is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125531" version="1" comment="kernel-default-base is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125532" version="1" comment="kernel-default-devel is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125533" version="1" comment="kernel-default-extra is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125534" version="1" comment="kernel-pae is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125535" version="1" comment="kernel-pae-base is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125536" version="1" comment="kernel-pae-devel is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125537" version="1" comment="kernel-pae-extra is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125538" version="1" comment="kernel-source is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125539" version="1" comment="kernel-syms is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125540" version="1" comment="kernel-trace is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125541" version="1" comment="kernel-trace-devel is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125542" version="1" comment="kernel-xen is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125543" version="1" comment="kernel-xen-base is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125544" version="1" comment="kernel-xen-devel is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125545" version="1" comment="kernel-xen-extra is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118622" version="1" comment="kernel-default is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118623" version="1" comment="kernel-default-base is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118624" version="1" comment="kernel-default-devel is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118625" version="1" comment="kernel-default-extra is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118626" version="1" comment="kernel-pae is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118627" version="1" comment="kernel-pae-base is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118628" version="1" comment="kernel-pae-devel is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118629" version="1" comment="kernel-pae-extra is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118630" version="1" comment="kernel-source is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118631" version="1" comment="kernel-syms is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118632" version="1" comment="kernel-trace is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118633" version="1" comment="kernel-trace-devel is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118634" version="1" comment="kernel-xen is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118635" version="1" comment="kernel-xen-base is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118636" version="1" comment="kernel-xen-devel is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118637" version="1" comment="kernel-xen-extra is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122530" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122531" version="1" comment="krb5-client is &lt;1.6.3-133.49.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113992" version="1" comment="kvm is &lt;1.4.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119575" version="1" comment="kvm is &lt;1.4.2-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124488" version="1" comment="libotr2 is &lt;3.2.0-10.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125648" version="1" comment="libvirt-client is &lt;1.2.5-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125649" version="1" comment="libvirt-client-32bit is &lt;1.2.5-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125650" version="1" comment="libvirt-doc is &lt;1.2.5-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121908" version="1" comment="ibm-data-db2 is &lt;2.6.7-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116589" version="1" comment="ntp is &lt;4.2.8p4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116590" version="1" comment="ntp-doc is &lt;4.2.8p4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114890" version="1" comment="openssh is &lt;6.6p1-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114891" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114893" version="1" comment="openssh-helpers is &lt;6.6p1-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121385" version="1" comment="openssh is &lt;6.6p1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121386" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-16.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121387" version="1" comment="openssh-helpers is &lt;6.6p1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123894" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123895" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124465" version="1" comment="libecpg6 is &lt;9.4.6-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124466" version="1" comment="libpq5 is &lt;9.4.6-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124467" version="1" comment="libpq5-32bit is &lt;9.4.6-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124468" version="1" comment="postgresql94 is &lt;9.4.6-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124469" version="1" comment="postgresql94-docs is &lt;9.4.6-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125228" version="1" comment="libldb1 is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125229" version="1" comment="libldb1-32bit is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125230" version="1" comment="libsmbclient0 is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125231" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125232" version="1" comment="libtalloc2 is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125233" version="1" comment="libtalloc2-32bit is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125234" version="1" comment="libtdb1 is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125235" version="1" comment="libtdb1-32bit is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125236" version="1" comment="libtevent0 is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125237" version="1" comment="libtevent0-32bit is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125238" version="1" comment="libwbclient0 is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125239" version="1" comment="libwbclient0-32bit is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125240" version="1" comment="samba-32bit is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125241" version="1" comment="samba-client is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125242" version="1" comment="samba-client-32bit is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125243" version="1" comment="samba-doc is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125244" version="1" comment="samba-krb-printing is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125245" version="1" comment="samba-winbind is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125246" version="1" comment="samba-winbind-32bit is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122780" version="1" comment="socat is &lt;1.7.0.0-1.18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122532" version="1" comment="libtiff3 is &lt;3.8.2-141.163.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122533" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.163.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111654" version="1" comment="xen-doc-html is &lt;4.4.2_10-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111647" version="1" comment="xen-kmp-default is &lt;4.4.2_10_3.0.101_63-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111648" version="1" comment="xen-kmp-pae is &lt;4.4.2_10_3.0.101_63-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111651" version="1" comment="xen-libs is &lt;4.4.2_10-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111650" version="1" comment="xen-libs-32bit is &lt;4.4.2_10-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111655" version="1" comment="xen-tools is &lt;4.4.2_10-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111653" version="1" comment="xen-tools-domU is &lt;4.4.2_10-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115963" version="1" comment="xen-doc-html is &lt;4.4.3_02-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115964" version="1" comment="xen-kmp-default is &lt;4.4.3_02_3.0.101_65-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115969" version="1" comment="xen-kmp-pae is &lt;4.4.3_02_3.0.101_65-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115965" version="1" comment="xen-libs is &lt;4.4.3_02-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115968" version="1" comment="xen-libs-32bit is &lt;4.4.3_02-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115966" version="1" comment="xen-tools is &lt;4.4.3_02-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115967" version="1" comment="xen-tools-domU is &lt;4.4.3_02-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125686" version="1" comment="xen-doc-html is &lt;4.4.4_02-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125687" version="1" comment="xen-kmp-default is &lt;4.4.4_02_3.0.101_68-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125688" version="1" comment="xen-kmp-pae is &lt;4.4.4_02_3.0.101_68-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125689" version="1" comment="xen-libs is &lt;4.4.4_02-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125690" version="1" comment="xen-libs-32bit is &lt;4.4.4_02-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125691" version="1" comment="xen-tools is &lt;4.4.4_02-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125692" version="1" comment="xen-tools-domU is &lt;4.4.4_02-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118679" version="1" comment="xen-doc-html is &lt;4.4.3_06-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118680" version="1" comment="xen-kmp-default is &lt;4.4.3_06_3.0.101_65-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118681" version="1" comment="xen-kmp-pae is &lt;4.4.3_06_3.0.101_65-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118682" version="1" comment="xen-libs is &lt;4.4.3_06-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118683" version="1" comment="xen-libs-32bit is &lt;4.4.3_06-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118684" version="1" comment="xen-tools is &lt;4.4.3_06-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118685" version="1" comment="xen-tools-domU is &lt;4.4.3_06-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116591" version="1" comment="conntrack-tools is &lt;1.0.0-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117402" version="1" comment="sle-hae-release is ==11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116593" version="1" comment="ctdb is &lt;1.0.114.6-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116594" version="1" comment="hawk is &lt;0.6.1-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116595" version="1" comment="hawk-templates is &lt;0.6.1-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116596" version="1" comment="cluster-network-kmp-bigsmp is &lt;1.4_3.0.101_0.47.55-2.28.1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116597" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.101_0.40-2.27.98" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116598" version="1" comment="cluster-network-kmp-pae is &lt;1.4_3.0.101_0.40-2.27.98" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116599" version="1" comment="cluster-network-kmp-ppc64 is &lt;1.4_3.0.101_0.40-2.27.98" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116600" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.101_0.40-2.27.98" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116601" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.101_0.40-2.27.98" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116602" version="1" comment="gfs2-kmp-bigsmp is &lt;2_3.0.101_0.47.55-0.17.1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116603" version="1" comment="gfs2-kmp-default is &lt;2_3.0.101_0.40-0.16.104" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116604" version="1" comment="gfs2-kmp-pae is &lt;2_3.0.101_0.40-0.16.104" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116605" version="1" comment="gfs2-kmp-ppc64 is &lt;2_3.0.101_0.40-0.16.104" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116606" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.101_0.40-0.16.104" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116607" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.101_0.40-0.16.104" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116608" version="1" comment="ocfs2-kmp-bigsmp is &lt;1.6_3.0.101_0.47.55-0.21.1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116609" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_0.40-0.20.98" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116610" version="1" comment="ocfs2-kmp-pae is &lt;1.6_3.0.101_0.40-0.20.98" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116611" version="1" comment="ocfs2-kmp-ppc64 is &lt;1.6_3.0.101_0.40-0.20.98" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116612" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_0.40-0.20.98" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116613" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.101_0.40-0.20.98" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116614" version="1" comment="cluster-network-kmp-bigsmp is &lt;1.4_3.0.101_0.40-2.27.98" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116615" version="1" comment="drbd-kmp-bigsmp is &lt;8.4.4_3.0.101_0.40-0.22.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116616" version="1" comment="gfs2-kmp-bigsmp is &lt;2_3.0.101_0.40-0.16.104" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116617" version="1" comment="ocfs2-kmp-bigsmp is &lt;1.6_3.0.101_0.40-0.20.98" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117403" version="1" comment="sle-hae-release is ==11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132106" version="1" comment="hawk is &lt;0.7.0+git.1430140184.8e872c5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132107" version="1" comment="hawk-templates is &lt;0.7.0+git.1430140184.8e872c5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143046" version="1" comment="libpacemaker-devel is &lt;1.1.12-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143047" version="1" comment="libpacemaker3 is &lt;1.1.12-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143048" version="1" comment="pacemaker is &lt;1.1.12-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143049" version="1" comment="pacemaker-cli is &lt;1.1.12-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143050" version="1" comment="pacemaker-remote is &lt;1.1.12-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117404" version="1" comment="sle-pos-release is ==11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130055" version="1" comment="MozillaFirefox-branding-SLED is &lt;45.0-23.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130056" version="1" comment="MozillaFirefox-translations is &lt;45.2.0esr-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130057" version="1" comment="libfreebl3 is &lt;3.21.1-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130058" version="1" comment="libsoftokn3 is &lt;3.21.1-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130059" version="1" comment="mozilla-nss-tools is &lt;3.21.1-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117405" version="1" comment="sle-pos-release is ==11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132108" version="1" comment="MozillaFirefox-translations is &lt;45.3.0esr-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132109" version="1" comment="MozillaFirefox-translations is &lt;45.4.0esr-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144684" version="1" comment="MozillaFirefox-translations is &lt;45.6.0esr-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148252" version="1" comment="MozillaFirefox-translations is &lt;45.7.0esr-65.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149664" version="1" comment="MozillaFirefox-translations is &lt;45.8.0esr-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132110" version="1" comment="POS_Image-Minimal3 is &lt;3.4.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132111" version="1" comment="POS_Image-Netboot-hooks is &lt;3.4.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132112" version="1" comment="POS_Image-Tools is &lt;3.4.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132113" version="1" comment="POS_Image3 is &lt;3.5.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132114" version="1" comment="POS_Migration is &lt;3.5.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132115" version="1" comment="POS_Server-Admin3 is &lt;3.5.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132116" version="1" comment="POS_Server-AdminGUI is &lt;3.5.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132117" version="1" comment="POS_Server-AdminTools3 is &lt;3.5.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132118" version="1" comment="POS_Server-BranchTools3 is &lt;3.5.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132119" version="1" comment="POS_Server-Modules3 is &lt;3.5.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132120" version="1" comment="POS_Server3 is &lt;3.5.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132121" version="1" comment="admind is &lt;1.9-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132122" version="1" comment="admind-client is &lt;1.9-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132123" version="1" comment="posbios is &lt;1.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132124" version="1" comment="apache2-mod_nss is &lt;1.0.14-0.4.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132125" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132126" version="1" comment="bind-doc is &lt;9.9.6P1-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132127" version="1" comment="bind-libs is &lt;9.9.6P1-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132128" version="1" comment="bind-utils is &lt;9.9.6P1-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135228" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135229" version="1" comment="bind-doc is &lt;9.9.6P1-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135230" version="1" comment="bind-libs is &lt;9.9.6P1-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135231" version="1" comment="bind-utils is &lt;9.9.6P1-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146904" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146905" version="1" comment="bind-doc is &lt;9.9.6P1-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146906" version="1" comment="bind-libs is &lt;9.9.6P1-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146907" version="1" comment="bind-utils is &lt;9.9.6P1-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149115" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149116" version="1" comment="bind-doc is &lt;9.9.6P1-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149117" version="1" comment="bind-libs is &lt;9.9.6P1-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149118" version="1" comment="bind-utils is &lt;9.9.6P1-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130773" version="1" comment="libarchive2 is &lt;2.5.5-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132129" version="1" comment="libcurl4 is &lt;7.19.7-1.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132130" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132131" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132132" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132133" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132134" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132135" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132136" version="1" comment="ghostscript-omni is &lt;8.62-32.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132137" version="1" comment="ghostscript-x11 is &lt;8.62-32.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132138" version="1" comment="libgimpprint is &lt;4.2.7-32.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132139" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.30-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132140" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.30-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132141" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.30-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132142" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.30-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132143" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.30-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132144" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.30-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136690" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.35-78.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136691" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.35-78.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136692" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.35-78.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136693" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.35-78.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136694" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.35-78.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136695" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.35-78.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132145" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr9.50-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132146" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr9.50-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132147" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr9.50-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132148" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr9.50-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132149" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr9.50-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142160" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr9.60-58.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142161" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr9.60-58.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142162" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr9.60-58.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142163" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr9.60-58.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142164" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr9.60-58.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149665" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr10.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149666" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr10.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149667" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr10.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149668" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr10.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149669" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr10.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132150" version="1" comment="kernel-default is &lt;3.0.101-0.47.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132151" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132152" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132153" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132154" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132155" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132156" version="1" comment="kernel-pae is &lt;3.0.101-0.47.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132157" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132158" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132159" version="1" comment="kernel-source is &lt;3.0.101-0.47.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132160" version="1" comment="kernel-syms is &lt;3.0.101-0.47.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132161" version="1" comment="kernel-trace is &lt;3.0.101-0.47.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132162" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132163" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132164" version="1" comment="kernel-xen is &lt;3.0.101-0.47.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132165" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132166" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145677" version="1" comment="kernel-default is &lt;3.0.101-0.47.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145678" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145679" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145680" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145681" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145682" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145683" version="1" comment="kernel-pae is &lt;3.0.101-0.47.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145684" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145685" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145686" version="1" comment="kernel-source is &lt;3.0.101-0.47.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145687" version="1" comment="kernel-syms is &lt;3.0.101-0.47.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145688" version="1" comment="kernel-trace is &lt;3.0.101-0.47.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145689" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145690" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145691" version="1" comment="kernel-xen is &lt;3.0.101-0.47.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145692" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145693" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132167" version="1" comment="kernel-default is &lt;3.0.101-0.47.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132168" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132169" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132170" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132171" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132172" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132173" version="1" comment="kernel-pae is &lt;3.0.101-0.47.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132174" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132175" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132176" version="1" comment="kernel-source is &lt;3.0.101-0.47.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132177" version="1" comment="kernel-syms is &lt;3.0.101-0.47.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132178" version="1" comment="kernel-trace is &lt;3.0.101-0.47.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132179" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132180" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132181" version="1" comment="kernel-xen is &lt;3.0.101-0.47.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132182" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132183" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148549" version="1" comment="kernel-default is &lt;3.0.101-0.47.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148550" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148551" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148552" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148553" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148554" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148555" version="1" comment="kernel-pae is &lt;3.0.101-0.47.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148556" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148557" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148558" version="1" comment="kernel-source is &lt;3.0.101-0.47.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148559" version="1" comment="kernel-syms is &lt;3.0.101-0.47.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148560" version="1" comment="kernel-trace is &lt;3.0.101-0.47.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148561" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148562" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148563" version="1" comment="kernel-xen is &lt;3.0.101-0.47.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148564" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148565" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142225" version="1" comment="MozillaFirefox-translations is &lt;45.5.1esr-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142226" version="1" comment="libfreebl3 is &lt;3.21.3-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142227" version="1" comment="libsoftokn3 is &lt;3.21.3-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142228" version="1" comment="mozilla-nss-tools is &lt;3.21.3-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132184" version="1" comment="libmysql55client18 is &lt;5.5.52-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132185" version="1" comment="libmysql55client_r18 is &lt;5.5.52-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132186" version="1" comment="mysql-client is &lt;5.5.52-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132187" version="1" comment="mysql-tools is &lt;5.5.52-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148170" version="1" comment="libmysql55client18 is &lt;5.5.54-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148171" version="1" comment="libmysql55client_r18 is &lt;5.5.54-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148172" version="1" comment="mysql-client is &lt;5.5.54-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148173" version="1" comment="mysql-tools is &lt;5.5.54-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147462" version="1" comment="ntp is &lt;4.2.8p9-48.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147463" version="1" comment="ntp-doc is &lt;4.2.8p9-48.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132188" version="1" comment="openssh is &lt;6.2p2-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132189" version="1" comment="openssh-askpass is &lt;6.2p2-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132190" version="1" comment="openssh-askpass-gnome is &lt;6.2p2-0.33.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149140" version="1" comment="openssh is &lt;6.2p2-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149141" version="1" comment="openssh-askpass is &lt;6.2p2-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149142" version="1" comment="openssh-askpass-gnome is &lt;6.2p2-0.40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132191" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.102.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132192" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.102.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132193" version="1" comment="openssl-doc is &lt;0.9.8j-0.102.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149091" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149092" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149093" version="1" comment="openssl-doc is &lt;0.9.8j-0.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132194" version="1" comment="apache2-mod_php53 is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132195" version="1" comment="php53-bcmath is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132196" version="1" comment="php53-bz2 is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132197" version="1" comment="php53-calendar is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132198" version="1" comment="php53-ctype is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132199" version="1" comment="php53-curl is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132200" version="1" comment="php53-dba is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132201" version="1" comment="php53-dom is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132202" version="1" comment="php53-exif is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132203" version="1" comment="php53-fastcgi is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132204" version="1" comment="php53-fileinfo is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132205" version="1" comment="php53-ftp is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132206" version="1" comment="php53-gd is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132207" version="1" comment="php53-gettext is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132208" version="1" comment="php53-gmp is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132209" version="1" comment="php53-iconv is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132210" version="1" comment="php53-intl is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132211" version="1" comment="php53-json is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132212" version="1" comment="php53-ldap is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132213" version="1" comment="php53-mbstring is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132214" version="1" comment="php53-mcrypt is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132215" version="1" comment="php53-mysql is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132216" version="1" comment="php53-odbc is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132217" version="1" comment="php53-openssl is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132218" version="1" comment="php53-pcntl is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132219" version="1" comment="php53-pdo is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132220" version="1" comment="php53-pear is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132221" version="1" comment="php53-pgsql is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132222" version="1" comment="php53-pspell is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132223" version="1" comment="php53-shmop is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132224" version="1" comment="php53-snmp is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132225" version="1" comment="php53-soap is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132226" version="1" comment="php53-suhosin is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132227" version="1" comment="php53-sysvmsg is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132228" version="1" comment="php53-sysvsem is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132229" version="1" comment="php53-sysvshm is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132230" version="1" comment="php53-tokenizer is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132231" version="1" comment="php53-wddx is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132232" version="1" comment="php53-xmlreader is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132233" version="1" comment="php53-xmlrpc is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132234" version="1" comment="php53-xmlwriter is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132235" version="1" comment="php53-xsl is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132236" version="1" comment="php53-zip is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132237" version="1" comment="php53-zlib is &lt;5.3.17-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148962" version="1" comment="apache2-mod_php53 is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148963" version="1" comment="php53-bcmath is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148964" version="1" comment="php53-bz2 is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148965" version="1" comment="php53-calendar is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148966" version="1" comment="php53-ctype is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148967" version="1" comment="php53-curl is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148968" version="1" comment="php53-dba is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148969" version="1" comment="php53-dom is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148970" version="1" comment="php53-exif is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148971" version="1" comment="php53-fastcgi is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148972" version="1" comment="php53-fileinfo is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148973" version="1" comment="php53-ftp is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148974" version="1" comment="php53-gd is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148975" version="1" comment="php53-gettext is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148976" version="1" comment="php53-gmp is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148977" version="1" comment="php53-iconv is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148978" version="1" comment="php53-intl is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148979" version="1" comment="php53-json is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148980" version="1" comment="php53-ldap is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148981" version="1" comment="php53-mbstring is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148982" version="1" comment="php53-mcrypt is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148983" version="1" comment="php53-mysql is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148984" version="1" comment="php53-odbc is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148985" version="1" comment="php53-openssl is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148986" version="1" comment="php53-pcntl is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148987" version="1" comment="php53-pdo is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148988" version="1" comment="php53-pear is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148989" version="1" comment="php53-pgsql is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148990" version="1" comment="php53-pspell is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148991" version="1" comment="php53-shmop is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148992" version="1" comment="php53-snmp is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148993" version="1" comment="php53-soap is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148994" version="1" comment="php53-suhosin is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148995" version="1" comment="php53-sysvmsg is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148996" version="1" comment="php53-sysvsem is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148997" version="1" comment="php53-sysvshm is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148998" version="1" comment="php53-tokenizer is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148999" version="1" comment="php53-wddx is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149000" version="1" comment="php53-xmlreader is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149001" version="1" comment="php53-xmlrpc is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149002" version="1" comment="php53-xmlwriter is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149003" version="1" comment="php53-xsl is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149004" version="1" comment="php53-zip is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149005" version="1" comment="php53-zlib is &lt;5.3.17-101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146098" version="1" comment="ldapsmb is &lt;1.34b-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146099" version="1" comment="libldb1 is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146100" version="1" comment="libsmbclient0 is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146101" version="1" comment="libtalloc2 is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146102" version="1" comment="libtdb1 is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146103" version="1" comment="libtevent0 is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146104" version="1" comment="libwbclient0 is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146105" version="1" comment="samba-client is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146106" version="1" comment="samba-doc is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146107" version="1" comment="samba-krb-printing is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146108" version="1" comment="samba-winbind is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132238" version="1" comment="wget is &lt;1.11.4-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135272" version="1" comment="xen is &lt;4.2.5_21-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135273" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.86-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135274" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.86-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135275" version="1" comment="xen-libs is &lt;4.2.5_21-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135276" version="1" comment="xen-tools-domU is &lt;4.2.5_21-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145985" version="1" comment="xen is &lt;4.2.5_21-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145986" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.90-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145987" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.90-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145988" version="1" comment="xen-libs is &lt;4.2.5_21-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145989" version="1" comment="xen-tools-domU is &lt;4.2.5_21-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149670" version="1" comment="xen is &lt;4.2.5_21-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149671" version="1" comment="xen-kmp-default is &lt;4.2.5_21_3.0.101_0.47.96-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149672" version="1" comment="xen-kmp-pae is &lt;4.2.5_21_3.0.101_0.47.96-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149673" version="1" comment="xen-libs is &lt;4.2.5_21-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149674" version="1" comment="xen-tools-domU is &lt;4.2.5_21-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116621" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.19_2.6.33.5_rt23_0.4-0.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117406" version="1" comment="SUSE-Linux-Enterprise-RT-release is ==11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116623" version="1" comment="brocade-bna-kmp-rt is &lt;2.1.0.0_2.6.33.20_rt31_0.5-0.2.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116624" version="1" comment="cluster-network-kmp-rt is &lt;1.4_2.6.33.20_rt31_0.5-2.5.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116625" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_2.6.33.20_rt31_0.5-2.5.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116626" version="1" comment="drbd-kmp-rt is &lt;8.3.11_2.6.33.20_rt31_0.5-0.3.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116627" version="1" comment="drbd-kmp-rt_trace is &lt;8.3.11_2.6.33.20_rt31_0.5-0.3.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116628" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.19_2.6.33.20_rt31_0.5-0.9.11.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116629" version="1" comment="kernel-rt is &lt;2.6.33.20-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116630" version="1" comment="kernel-rt-base is &lt;2.6.33.20-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116631" version="1" comment="kernel-rt-devel is &lt;2.6.33.20-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116632" version="1" comment="kernel-rt_trace is &lt;2.6.33.20-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116633" version="1" comment="kernel-rt_trace-base is &lt;2.6.33.20-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116634" version="1" comment="kernel-rt_trace-devel is &lt;2.6.33.20-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116635" version="1" comment="kernel-source-rt is &lt;2.6.33.20-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116636" version="1" comment="kernel-syms-rt is &lt;2.6.33.20-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116637" version="1" comment="ocfs2-kmp-rt is &lt;1.6_2.6.33.20_rt31_0.5-0.4.2.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116638" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_2.6.33.20_rt31_0.5-0.4.2.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116639" version="1" comment="ofed-kmp-rt is &lt;1.5.2_2.6.33.20_rt31_0.5-0.9.13.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116640" version="1" comment="ofed-kmp-rt is &lt;1.5.2_2.6.33.18_rt31_0.3-0.9.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116641" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.101_rt130_0.7.9-2.18.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116642" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.101_rt130_0.7.9-2.18.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116643" version="1" comment="drbd-kmp-rt is &lt;8.4.2_3.0.101_rt130_0.7.9-0.6.6.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116644" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.2_3.0.101_rt130_0.7.9-0.6.6.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116645" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.101_rt130_0.7.9-0.25.25.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116646" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.101_rt130_0.7.9-0.25.25.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116647" version="1" comment="kernel-rt is &lt;3.0.101.rt130-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116648" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116649" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116650" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116651" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116652" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116653" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116654" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116655" version="1" comment="lttng-modules-kmp-rt is &lt;2.0.4_3.0.101_rt130_0.7.9-0.9.9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116656" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.0.4_3.0.101_rt130_0.7.9-0.9.9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116657" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.101_rt130_0.7.9-0.11.78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116658" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.101_rt130_0.7.9-0.11.78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116659" version="1" comment="ofed-kmp-rt is &lt;1.5.2_3.0.101_rt130_0.7.9-0.28.28.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116660" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.2_3.0.101_rt130_0.7.9-0.28.28.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117407" version="1" comment="SUSE-Linux-Enterprise-RT-release is ==11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116662" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.101_rt130_0.28-2.27.99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116663" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.101_rt130_0.28-2.27.99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116664" version="1" comment="drbd-kmp-rt is &lt;8.4.4_3.0.101_rt130_0.28-0.22.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116665" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.4_3.0.101_rt130_0.28-0.22.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116666" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.101_rt130_0.28-0.38.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116667" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.101_rt130_0.28-0.38.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116668" version="1" comment="kernel-rt is &lt;3.0.101.rt130-0.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116669" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-0.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116670" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-0.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116671" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-0.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116672" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-0.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116673" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-0.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116674" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-0.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116675" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-0.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116676" version="1" comment="lttng-modules-kmp-rt is &lt;2.1.1_3.0.101_rt130_0.28-0.11.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116677" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.1.1_3.0.101_rt130_0.28-0.11.75" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116678" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.101_rt130_0.28-0.20.99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116679" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.101_rt130_0.28-0.20.99" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116680" version="1" comment="ofed-kmp-rt is &lt;1.5.4.1_3.0.101_rt130_0.28-0.13.90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116681" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.4.1_3.0.101_rt130_0.28-0.13.90" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117408" version="1" comment="SUSE-Linux-Enterprise-RT-release is ==11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116683" version="1" comment="kernel-rt is &lt;3.0.101.rt130-0.33.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116684" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-0.33.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116685" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-0.33.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116686" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-0.33.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116687" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-0.33.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116688" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-0.33.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116689" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-0.33.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116690" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-0.33.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121311" version="1" comment="kernel-rt is &lt;3.0.101.rt130-0.33.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121312" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-0.33.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121313" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-0.33.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121314" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-0.33.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121315" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-0.33.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121316" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-0.33.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119755" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-0.33.44.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119756" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-0.33.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126460" version="1" comment="kernel-rt is &lt;3.0.101.rt130-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126461" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126462" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126463" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126464" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126465" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126466" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126467" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118646" version="1" comment="SUSE-Linux-Enterprise-RT-release is ==11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129438" version="1" comment="kernel-rt is &lt;3.0.101.rt130-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129439" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129440" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129441" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129442" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129443" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129444" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129445" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118638" version="1" comment="kernel-rt is &lt;3.0.101.rt130-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118639" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118640" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118641" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118642" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118643" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118644" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118645" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118708" version="1" comment="kernel-rt is &lt;3.0.101.rt130-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118709" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118710" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118711" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118712" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118713" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118714" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118715" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142165" version="1" comment="kernel-rt is &lt;3.0.101.rt130-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142166" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142167" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142168" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142169" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142170" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142171" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142172" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130920" version="1" comment="kernel-rt is &lt;3.0.101.rt130-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130921" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130922" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130923" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130924" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130925" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130926" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130927" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117409" version="1" comment="SUSE_SLES_SAP-release is ==11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116692" version="1" comment="java-1_4_2-ibm-sap is &lt;1.4.2_sr13.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116693" version="1" comment="java-1_4_2-ibm-sap-devel is &lt;1.4.2_sr13.13-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117410" version="1" comment="SUSE_SLES_SAP-release is ==11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116695" version="1" comment="sap_suse_cluster_connector is &lt;1.0.0-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117411" version="1" comment="SUSE_SLES_SAP-release is ==11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127147" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127148" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132239" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132240" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120998" version="1" comment="clamsap is &lt;0.98.9-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118750" version="1" comment="SUSE_SLES_SAP-release is ==11.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149127" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149128" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111832" version="1" comment="rhn-virtualization-common is &lt;5.4.15-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111833" version="1" comment="rhn-virtualization-host is &lt;5.4.15-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111834" version="1" comment="rhncfg is &lt;5.9.33-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111835" version="1" comment="rhncfg-actions is &lt;5.9.33-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111836" version="1" comment="rhncfg-client is &lt;5.9.33-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111837" version="1" comment="rhncfg-management is &lt;5.9.33-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060800" version="1" comment="sles-release is ==11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111842" version="1" comment="koan is &lt;2.0.10-0.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111838" version="1" comment="rhnmd is &lt;5.3.7-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111839" version="1" comment="spacewalk-backend-libs is &lt;1.2.74-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111840" version="1" comment="spacewalk-certs-tools is &lt;1.2.2-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111843" version="1" comment="spacewalk-backend-libs is &lt;1.2.74-0.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116698" version="1" comment="hawk is &lt;0.5.2-0.38.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116699" version="1" comment="hawk-templates is &lt;0.5.2-0.38.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117412" version="1" comment="sle-hae-release is ==11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116701" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.101_0.7.17-2.18.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116702" version="1" comment="cluster-network-kmp-pae is &lt;1.4_3.0.101_0.7.17-2.18.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116703" version="1" comment="cluster-network-kmp-ppc64 is &lt;1.4_3.0.101_0.7.17-2.18.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116704" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.101_0.7.17-2.18.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116705" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.101_0.7.17-2.18.81" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116706" version="1" comment="gfs2-kmp-default is &lt;2_3.0.101_0.7.17-0.7.109" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116707" version="1" comment="gfs2-kmp-pae is &lt;2_3.0.101_0.7.17-0.7.109" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116708" version="1" comment="gfs2-kmp-ppc64 is &lt;2_3.0.101_0.7.17-0.7.109" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116709" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.101_0.7.17-0.7.109" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116710" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.101_0.7.17-0.7.109" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116711" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_0.7.17-0.11.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116712" version="1" comment="ocfs2-kmp-pae is &lt;1.6_3.0.101_0.7.17-0.11.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116713" version="1" comment="ocfs2-kmp-ppc64 is &lt;1.6_3.0.101_0.7.17-0.11.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116714" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_0.7.17-0.11.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116715" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.101_0.7.17-0.11.80" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032400" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032399" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032105" version="1" comment="sles-release is ==11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032368" version="1" comment="MozillaFirefox is &lt;3.0.10-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055070" version="1" comment="MozillaFirefox-branding-SLED is &lt;3.5-1.1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032367" version="1" comment="MozillaFirefox-translations is &lt;3.0.10-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053948" version="1" comment="gconf2 is &lt;2.24.0-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053946" version="1" comment="gconf2-32bit is &lt;2.24.0-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053947" version="1" comment="gconf2-x86 is &lt;2.24.0-7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055075" version="1" comment="libfreebl3 is &lt;3.12.3.1-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055073" version="1" comment="libfreebl3-32bit is &lt;3.12.3.1-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055074" version="1" comment="libfreebl3-x86 is &lt;3.12.3.1-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053951" version="1" comment="libidl is &lt;0.8.11-2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053949" version="1" comment="libidl-32bit is &lt;0.8.11-2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053950" version="1" comment="libidl-x86 is &lt;0.8.11-2.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055078" version="1" comment="mozilla-nspr is &lt;4.8-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055076" version="1" comment="mozilla-nspr-32bit is &lt;4.8-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055077" version="1" comment="mozilla-nspr-x86 is &lt;4.8-1.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055082" version="1" comment="mozilla-nss is &lt;3.12.3.1-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055079" version="1" comment="mozilla-nss-32bit is &lt;3.12.3.1-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055080" version="1" comment="mozilla-nss-tools is &lt;3.12.3.1-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055081" version="1" comment="mozilla-nss-x86 is &lt;3.12.3.1-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032373" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.10-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032369" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.10-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032370" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.10-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032371" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.10-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032372" version="1" comment="mozilla-xulrunner190-x86 is &lt;1.9.0.10-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061814" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061810" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061811" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061812" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061813" version="1" comment="mozilla-xulrunner191-x86 is &lt;1.9.1.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064221" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.12-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064217" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.12-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064218" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.12-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064219" version="1" comment="mozilla-xulrunner192-translations is &lt;1.9.2.12-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064220" version="1" comment="mozilla-xulrunner192-x86 is &lt;1.9.2.12-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053959" version="1" comment="orbit2 is &lt;2.14.16-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053957" version="1" comment="orbit2-32bit is &lt;2.14.16-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053958" version="1" comment="orbit2-x86 is &lt;2.14.16-2.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032229" version="1" comment="NetworkManager is &lt;0.7.0.r4359-15.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032228" version="1" comment="NetworkManager-glib is &lt;0.7.0.r4359-15.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057532" version="1" comment="NetworkManager-gnome is &lt;0.7.0.r1053-11.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111685" version="1" comment="procps is &lt;3.2.7-151.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057533" version="1" comment="acl is &lt;2.2.47-30.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057536" version="1" comment="libacl is &lt;2.2.47-30.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057534" version="1" comment="libacl-32bit is &lt;2.2.47-30.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057535" version="1" comment="libacl-x86 is &lt;2.2.47-30.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059869" version="1" comment="apache2 is &lt;2.2.10-2.23.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059864" version="1" comment="apache2-doc is &lt;2.2.10-2.23.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059865" version="1" comment="apache2-example-pages is &lt;2.2.10-2.23.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059866" version="1" comment="apache2-prefork is &lt;2.2.10-2.23.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059867" version="1" comment="apache2-utils is &lt;2.2.10-2.23.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059868" version="1" comment="apache2-worker is &lt;2.2.10-2.23.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032146" version="1" comment="apache2-mod_php5 is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111691" version="1" comment="php5 is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032147" version="1" comment="php5-bcmath is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032148" version="1" comment="php5-bz2 is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032149" version="1" comment="php5-calendar is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032150" version="1" comment="php5-ctype is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032151" version="1" comment="php5-curl is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032152" version="1" comment="php5-dba is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032153" version="1" comment="php5-dbase is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032154" version="1" comment="php5-dom is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032155" version="1" comment="php5-exif is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032156" version="1" comment="php5-fastcgi is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032157" version="1" comment="php5-ftp is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032158" version="1" comment="php5-gd is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032159" version="1" comment="php5-gettext is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032160" version="1" comment="php5-gmp is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032161" version="1" comment="php5-hash is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032162" version="1" comment="php5-iconv is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032163" version="1" comment="php5-json is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032164" version="1" comment="php5-ldap is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032165" version="1" comment="php5-mbstring is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032166" version="1" comment="php5-mcrypt is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032167" version="1" comment="php5-mysql is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032168" version="1" comment="php5-odbc is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032169" version="1" comment="php5-openssl is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032170" version="1" comment="php5-pcntl is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032171" version="1" comment="php5-pdo is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032172" version="1" comment="php5-pear is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032173" version="1" comment="php5-pgsql is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032174" version="1" comment="php5-pspell is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032175" version="1" comment="php5-shmop is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032176" version="1" comment="php5-snmp is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032177" version="1" comment="php5-soap is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032178" version="1" comment="php5-suhosin is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032179" version="1" comment="php5-sysvmsg is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032180" version="1" comment="php5-sysvsem is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032181" version="1" comment="php5-sysvshm is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032182" version="1" comment="php5-tokenizer is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032183" version="1" comment="php5-wddx is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032184" version="1" comment="php5-xmlreader is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032185" version="1" comment="php5-xmlrpc is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032186" version="1" comment="php5-xmlwriter is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032187" version="1" comment="php5-xsl is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032188" version="1" comment="php5-zip is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032189" version="1" comment="php5-zlib is &lt;5.2.6-50.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057521" version="1" comment="avahi is &lt;0.6.23-11.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057520" version="1" comment="avahi-lang is &lt;0.6.23-11.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057524" version="1" comment="libavahi-client3 is &lt;0.6.23-11.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057522" version="1" comment="libavahi-client3-32bit is &lt;0.6.23-11.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057523" version="1" comment="libavahi-client3-x86 is &lt;0.6.23-11.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057527" version="1" comment="libavahi-common3 is &lt;0.6.23-11.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057525" version="1" comment="libavahi-common3-32bit is &lt;0.6.23-11.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057526" version="1" comment="libavahi-common3-x86 is &lt;0.6.23-11.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057528" version="1" comment="libavahi-core5 is &lt;0.6.23-11.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057531" version="1" comment="libdns_sd is &lt;0.6.23-11.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057529" version="1" comment="libdns_sd-32bit is &lt;0.6.23-11.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057530" version="1" comment="libdns_sd-x86 is &lt;0.6.23-11.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057433" version="1" comment="bind is &lt;9.5.0P2-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057427" version="1" comment="bind-chrootenv is &lt;9.5.0P2-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057428" version="1" comment="bind-doc is &lt;9.5.0P2-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057431" version="1" comment="bind-libs is &lt;9.5.0P2-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057429" version="1" comment="bind-libs-32bit is &lt;9.5.0P2-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057430" version="1" comment="bind-libs-x86 is &lt;9.5.0P2-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057432" version="1" comment="bind-utils is &lt;9.5.0P2-20.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060801" version="1" comment="mono-core is &lt;2.0.1-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060804" version="1" comment="mono-data is &lt;2.0.1-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060802" version="1" comment="mono-data-postgresql is &lt;2.0.1-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060803" version="1" comment="mono-data-sqlite is &lt;2.0.1-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060805" version="1" comment="mono-locale-extras is &lt;2.0.1-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060806" version="1" comment="mono-nunit is &lt;2.0.1-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060807" version="1" comment="mono-web is &lt;2.0.1-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060808" version="1" comment="mono-winforms is &lt;2.0.1-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062890" version="1" comment="cifs-mount is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062891" version="1" comment="ldapsmb is &lt;1.34b-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062894" version="1" comment="libsmbclient0 is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062892" version="1" comment="libsmbclient0-32bit is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062893" version="1" comment="libsmbclient0-x86 is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062897" version="1" comment="libtalloc1 is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062895" version="1" comment="libtalloc1-32bit is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062896" version="1" comment="libtalloc1-x86 is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062900" version="1" comment="libtdb1 is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062898" version="1" comment="libtdb1-32bit is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062899" version="1" comment="libtdb1-x86 is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062903" version="1" comment="libwbclient0 is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062901" version="1" comment="libwbclient0-32bit is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062902" version="1" comment="libwbclient0-x86 is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062913" version="1" comment="samba is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062904" version="1" comment="samba-32bit is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062907" version="1" comment="samba-client is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062905" version="1" comment="samba-client-32bit is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062906" version="1" comment="samba-client-x86 is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062908" version="1" comment="samba-krb-printing is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062911" version="1" comment="samba-winbind is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062909" version="1" comment="samba-winbind-32bit is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062910" version="1" comment="samba-winbind-x86 is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062912" version="1" comment="samba-x86 is &lt;3.2.7-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052857" version="1" comment="clamav is &lt;0.95.1-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107270" version="1" comment="libgcc43 is &lt;4.3.3_20081022-11.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107269" version="1" comment="libgcc43-32bit is &lt;4.3.3_20081022-11.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107271" version="1" comment="libgcc43-x86 is &lt;4.3.3_20081022-11.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111704" version="1" comment="libstdc++43 is &lt;4.3.3_20081022-11.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111749" version="1" comment="libstdc++43-32bit is &lt;4.3.3_20081022-11.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111774" version="1" comment="libstdc++43-x86 is &lt;4.3.3_20081022-11.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060051" version="1" comment="cpio is &lt;2.9-75.27.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060050" version="1" comment="cpio-lang is &lt;2.9-75.27.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058917" version="1" comment="cron is &lt;4.1-194.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032215" version="1" comment="cups is &lt;1.3.9-8.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032211" version="1" comment="cups-client is &lt;1.3.9-8.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032214" version="1" comment="cups-libs is &lt;1.3.9-8.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032212" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032213" version="1" comment="cups-libs-x86 is &lt;1.3.9-8.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032191" version="1" comment="curl is &lt;7.19.0-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053899" version="1" comment="keyutils-libs is &lt;1.2-107.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053897" version="1" comment="keyutils-libs-32bit is &lt;1.2-107.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053898" version="1" comment="keyutils-libs-x86 is &lt;1.2-107.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032194" version="1" comment="libcurl4 is &lt;7.19.0-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032192" version="1" comment="libcurl4-32bit is &lt;7.19.0-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032193" version="1" comment="libcurl4-x86 is &lt;7.19.0-11.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053905" version="1" comment="libidn is &lt;1.10-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053903" version="1" comment="libidn-32bit is &lt;1.10-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053904" version="1" comment="libidn-x86 is &lt;1.10-3.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055776" version="1" comment="cyrus-imapd is &lt;2.3.11-60.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055777" version="1" comment="perl-Cyrus-IMAP is &lt;2.3.11-60.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055778" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.3.11-60.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032308" version="1" comment="cyrus-sasl is &lt;2.1.22-182.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032293" version="1" comment="cyrus-sasl-32bit is &lt;2.1.22-182.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032296" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.22-182.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032294" version="1" comment="cyrus-sasl-crammd5-32bit is &lt;2.1.22-182.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032295" version="1" comment="cyrus-sasl-crammd5-x86 is &lt;2.1.22-182.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032297" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.22-182.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032300" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.22-182.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032298" version="1" comment="cyrus-sasl-gssapi-32bit is &lt;2.1.22-182.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032299" version="1" comment="cyrus-sasl-gssapi-x86 is &lt;2.1.22-182.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032303" version="1" comment="cyrus-sasl-otp is &lt;2.1.22-182.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032301" version="1" comment="cyrus-sasl-otp-32bit is &lt;2.1.22-182.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032302" version="1" comment="cyrus-sasl-otp-x86 is &lt;2.1.22-182.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032306" version="1" comment="cyrus-sasl-plain is &lt;2.1.22-182.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032304" version="1" comment="cyrus-sasl-plain-32bit is &lt;2.1.22-182.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032305" version="1" comment="cyrus-sasl-plain-x86 is &lt;2.1.22-182.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032307" version="1" comment="cyrus-sasl-x86 is &lt;2.1.22-182.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032118" version="1" comment="dbus-1 is &lt;1.2.10-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032116" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032117" version="1" comment="dbus-1-x86 is &lt;1.2.10-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111705" version="1" comment="dbus-1-glib is &lt;0.76-34.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111750" version="1" comment="dbus-1-glib-32bit is &lt;0.76-34.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111775" version="1" comment="dbus-1-glib-x86 is &lt;0.76-34.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053395" version="1" comment="dhcp-client is &lt;3.1.1-7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054813" version="1" comment="dnsmasq is &lt;2.45-12.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054498" version="1" comment="wireshark is &lt;1.0.5-1.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032244" version="1" comment="evolution-data-server is &lt;2.24.1.1-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032241" version="1" comment="evolution-data-server-32bit is &lt;2.24.1.1-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032242" version="1" comment="evolution-data-server-lang is &lt;2.24.1.1-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032243" version="1" comment="evolution-data-server-x86 is &lt;2.24.1.1-11.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032246" version="1" comment="gtkhtml2 is &lt;3.24.1.1-3.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032245" version="1" comment="gtkhtml2-lang is &lt;3.24.1.1-3.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058660" version="1" comment="evolution-data-server is &lt;2.24.1.1-11.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058657" version="1" comment="evolution-data-server-32bit is &lt;2.24.1.1-11.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058658" version="1" comment="evolution-data-server-lang is &lt;2.24.1.1-11.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058659" version="1" comment="evolution-data-server-x86 is &lt;2.24.1.1-11.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053783" version="1" comment="fetchmail is &lt;6.3.8.90-13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053784" version="1" comment="fetchmailconf is &lt;6.3.8.90-13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056526" version="1" comment="cdparanoia is &lt;IIIalpha9.8-691.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056524" version="1" comment="cdparanoia-32bit is &lt;IIIalpha9.8-691.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056525" version="1" comment="cdparanoia-x86 is &lt;IIIalpha9.8-691.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056527" version="1" comment="desktop-file-utils is &lt;0.15-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056530" version="1" comment="fam is &lt;2.7.0-130.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056528" version="1" comment="fam-32bit is &lt;2.7.0-130.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056529" version="1" comment="fam-x86 is &lt;2.7.0-130.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056533" version="1" comment="gnome-vfs2 is &lt;2.24.0-7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056531" version="1" comment="gnome-vfs2-32bit is &lt;2.24.0-7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056532" version="1" comment="gnome-vfs2-x86 is &lt;2.24.0-7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056534" version="1" comment="gstreamer-0_10 is &lt;0.10.21-3.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056537" version="1" comment="libogg0 is &lt;1.1.3-87.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056535" version="1" comment="libogg0-32bit is &lt;1.1.3-87.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056536" version="1" comment="libogg0-x86 is &lt;1.1.3-87.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056540" version="1" comment="liboil is &lt;0.3.15-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056538" version="1" comment="liboil-32bit is &lt;0.3.15-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056539" version="1" comment="liboil-x86 is &lt;0.3.15-3.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032329" version="1" comment="freetype2 is &lt;2.3.7-25.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032327" version="1" comment="freetype2-32bit is &lt;2.3.7-25.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032328" version="1" comment="freetype2-x86 is &lt;2.3.7-25.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060019" version="1" comment="fuse is &lt;2.7.2-61.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060020" version="1" comment="libfuse2 is &lt;2.7.2-61.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064418" version="1" comment="gdm is &lt;2.24.0-24.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064416" version="1" comment="gdm-branding-upstream is &lt;2.24.0-24.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064417" version="1" comment="gdm-lang is &lt;2.24.0-24.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032106" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032107" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032108" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032109" version="1" comment="ghostscript-library is &lt;8.62-32.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032110" version="1" comment="ghostscript-omni is &lt;8.62-32.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032111" version="1" comment="ghostscript-x11 is &lt;8.62-32.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032112" version="1" comment="libgimpprint is &lt;4.2.7-32.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032121" version="1" comment="glib2 is &lt;2.18.2-7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032119" version="1" comment="glib2-doc is &lt;2.18.2-7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032120" version="1" comment="glib2-lang is &lt;2.18.2-7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032124" version="1" comment="libgio-2_0-0 is &lt;2.18.2-7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032122" version="1" comment="libgio-2_0-0-32bit is &lt;2.18.2-7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032123" version="1" comment="libgio-2_0-0-x86 is &lt;2.18.2-7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032127" version="1" comment="libglib-2_0-0 is &lt;2.18.2-7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032125" version="1" comment="libglib-2_0-0-32bit is &lt;2.18.2-7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032126" version="1" comment="libglib-2_0-0-x86 is &lt;2.18.2-7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032130" version="1" comment="libgmodule-2_0-0 is &lt;2.18.2-7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032128" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.18.2-7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032129" version="1" comment="libgmodule-2_0-0-x86 is &lt;2.18.2-7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032133" version="1" comment="libgobject-2_0-0 is &lt;2.18.2-7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032131" version="1" comment="libgobject-2_0-0-32bit is &lt;2.18.2-7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032132" version="1" comment="libgobject-2_0-0-x86 is &lt;2.18.2-7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032136" version="1" comment="libgthread-2_0-0 is &lt;2.18.2-7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032134" version="1" comment="libgthread-2_0-0-32bit is &lt;2.18.2-7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032135" version="1" comment="libgthread-2_0-0-x86 is &lt;2.18.2-7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064043" version="1" comment="glibc is &lt;2.9-13.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064033" version="1" comment="glibc-32bit is &lt;2.9-13.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064035" version="1" comment="glibc-devel is &lt;2.9-13.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064034" version="1" comment="glibc-devel-32bit is &lt;2.9-13.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064036" version="1" comment="glibc-html is &lt;2.9-13.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064037" version="1" comment="glibc-i18ndata is &lt;2.9-13.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064038" version="1" comment="glibc-info is &lt;2.9-13.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064040" version="1" comment="glibc-locale is &lt;2.9-13.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064039" version="1" comment="glibc-locale-32bit is &lt;2.9-13.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107250" version="1" comment="glibc-locale-x86 is &lt;2.9-13.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064042" version="1" comment="glibc-profile is &lt;2.9-13.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064041" version="1" comment="glibc-profile-32bit is &lt;2.9-13.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107251" version="1" comment="glibc-profile-x86 is &lt;2.9-13.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107252" version="1" comment="glibc-x86 is &lt;2.9-13.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064044" version="1" comment="nscd is &lt;2.9-13.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058364" version="1" comment="gmime is &lt;2.2.23-1.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058363" version="1" comment="gmime-doc is &lt;2.2.23-1.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058365" version="1" comment="libgmime-2_0-3 is &lt;2.2.23-1.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059226" version="1" comment="gnome-screensaver is &lt;2.24.0-14.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059225" version="1" comment="gnome-screensaver-lang is &lt;2.24.0-14.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032137" version="1" comment="gnutls is &lt;2.4.1-24.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032140" version="1" comment="libgnutls26 is &lt;2.4.1-24.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032138" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032139" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061952" version="1" comment="gpg2 is &lt;2.0.9-25.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061951" version="1" comment="gpg2-lang is &lt;2.0.9-25.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061955" version="1" comment="libgcrypt11 is &lt;1.4.1-6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061953" version="1" comment="libgcrypt11-32bit is &lt;1.4.1-6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061954" version="1" comment="libgcrypt11-x86 is &lt;1.4.1-6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111706" version="1" comment="libgpg-error0 is &lt;1.6-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111751" version="1" comment="libgpg-error0-32bit is &lt;1.6-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111776" version="1" comment="libgpg-error0-x86 is &lt;1.6-8.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111707" version="1" comment="libksba is &lt;1.0.4-1.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032258" version="1" comment="gstreamer-0_10-plugins-base is &lt;0.10.21-2.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032254" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.21-2.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032255" version="1" comment="gstreamer-0_10-plugins-base-doc is &lt;0.10.21-2.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032256" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.21-2.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032257" version="1" comment="gstreamer-0_10-plugins-base-x86 is &lt;0.10.21-2.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032261" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.21-2.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032259" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.21-2.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032260" version="1" comment="libgstinterfaces-0_10-0-x86 is &lt;0.10.21-2.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053081" version="1" comment="gstreamer-0_10-plugins-good is &lt;0.10.10-4.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053079" version="1" comment="gstreamer-0_10-plugins-good-doc is &lt;0.10.10-4.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053080" version="1" comment="gstreamer-0_10-plugins-good-lang is &lt;0.10.10-4.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053693" version="1" comment="libicu is &lt;4.0-7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053691" version="1" comment="libicu-32bit is &lt;4.0-7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053692" version="1" comment="libicu-doc is &lt;4.0-7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032397" version="1" comment="ipsec-tools is &lt;0.7.1-10.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062382" version="1" comment="iscsitarget is &lt;0.4.15-94.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062377" version="1" comment="iscsitarget-kmp-default is &lt;0.4.15_2.6.27.48_0.6-94.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062378" version="1" comment="iscsitarget-kmp-pae is &lt;0.4.15_2.6.27.48_0.6-94.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062379" version="1" comment="iscsitarget-kmp-ppc64 is &lt;0.4.15_2.6.27.48_0.6-94.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062380" version="1" comment="iscsitarget-kmp-vmi is &lt;0.4.15_2.6.27.48_0.6-94.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062381" version="1" comment="iscsitarget-kmp-xen is &lt;0.4.15_2.6.27.48_0.6-94.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032115" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032113" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032114" version="1" comment="java-1_4_2-ibm-plugin is &lt;1.4.2_sr13-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111777" version="1" comment="java-1_5_0-bea is &lt;1.5.0.13.1.2-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111778" version="1" comment="java-1_5_0-bea-console is &lt;1.5.0.13.1.2-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111779" version="1" comment="java-1_5_0-bea-fonts is &lt;1.5.0.13.1.2-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111780" version="1" comment="java-1_5_0-bea-jdbc is &lt;1.5.0.13.1.2-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032145" version="1" comment="java-1_6_0-ibm is &lt;1.6.0-124.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032141" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0-124.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053022" version="1" comment="java-1_6_0-ibm-alsa-x86 is &lt;1.6.0-124.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032142" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0-124.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032143" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0-124.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032144" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0-124.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053027" version="1" comment="java-1_6_0-ibm-x86 is &lt;1.6.0-124.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111708" version="1" comment="kde4-akonadi is &lt;4.1.3-9.14.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111709" version="1" comment="kde4-akregator is &lt;4.1.3-9.14.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111710" version="1" comment="kde4-kaddressbook is &lt;4.1.3-9.14.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111711" version="1" comment="kde4-kalarm is &lt;4.1.3-9.14.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111712" version="1" comment="kde4-kjots is &lt;4.1.3-9.14.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111713" version="1" comment="kde4-kmail is &lt;4.1.3-9.14.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111714" version="1" comment="kde4-knode is &lt;4.1.3-9.14.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111715" version="1" comment="kde4-knotes is &lt;4.1.3-9.14.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111716" version="1" comment="kde4-kontact is &lt;4.1.3-9.14.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111717" version="1" comment="kde4-korganizer is &lt;4.1.3-9.14.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111718" version="1" comment="kde4-ktimetracker is &lt;4.1.3-9.14.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111719" version="1" comment="kde4-ktnef is &lt;4.1.3-9.14.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111720" version="1" comment="kdepim4 is &lt;4.1.3-9.14.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111721" version="1" comment="kdepim4-wizards is &lt;4.1.3-9.14.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111722" version="1" comment="kdepimlibs4 is &lt;4.1.3-9.28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111723" version="1" comment="libakonadi4 is &lt;4.1.3-9.28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111724" version="1" comment="libkdepim4 is &lt;4.1.3-9.14.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111725" version="1" comment="libkdepimlibs4 is &lt;4.1.3-9.28.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063238" version="1" comment="kde4-gwenview is &lt;4.1.3-7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063239" version="1" comment="kde4-kcolorchooser is &lt;4.1.3-7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063240" version="1" comment="kde4-kruler is &lt;4.1.3-7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063241" version="1" comment="kde4-ksnapshot is &lt;4.1.3-7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063242" version="1" comment="kde4-okular is &lt;4.1.3-7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063243" version="1" comment="libkipi5 is &lt;4.1.3-7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059657" version="1" comment="kde4-kdm is &lt;4.1.3-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059658" version="1" comment="kde4-kgreeter-plugins is &lt;4.1.3-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059659" version="1" comment="kde4-kwin is &lt;4.1.3-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059661" version="1" comment="kdebase4-workspace is &lt;4.1.3-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059660" version="1" comment="kdebase4-workspace-ksysguardd is &lt;4.1.3-18.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065165" version="1" comment="kde4-kget is &lt;4.1.3-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065166" version="1" comment="kde4-knewsticker is &lt;4.1.3-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065167" version="1" comment="kde4-kopete is &lt;4.1.3-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065168" version="1" comment="kde4-krdc is &lt;4.1.3-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065169" version="1" comment="kde4-krfb is &lt;4.1.3-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065170" version="1" comment="kdenetwork4-filesharing is &lt;4.1.3-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064868" version="1" comment="kdelibs3 is &lt;3.5.10-23.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064863" version="1" comment="kdelibs3-32bit is &lt;3.5.10-23.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064866" version="1" comment="kdelibs3-default-style is &lt;3.5.10-23.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064864" version="1" comment="kdelibs3-default-style-32bit is &lt;3.5.10-23.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064865" version="1" comment="kdelibs3-default-style-x86 is &lt;3.5.10-23.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064867" version="1" comment="kdelibs3-x86 is &lt;3.5.10-23.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064870" version="1" comment="kdelibs4 is &lt;4.1.3-8.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064869" version="1" comment="kdelibs4-core is &lt;4.1.3-8.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064873" version="1" comment="libkde4 is &lt;4.1.3-8.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064871" version="1" comment="libkde4-32bit is &lt;4.1.3-8.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064872" version="1" comment="libkde4-x86 is &lt;4.1.3-8.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064876" version="1" comment="libkdecore4 is &lt;4.1.3-8.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064874" version="1" comment="libkdecore4-32bit is &lt;4.1.3-8.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064875" version="1" comment="libkdecore4-x86 is &lt;4.1.3-8.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057159" version="1" comment="kdelibs4 is &lt;4.1.3-8.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057158" version="1" comment="kdelibs4-core is &lt;4.1.3-8.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057162" version="1" comment="libkde4 is &lt;4.1.3-8.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057160" version="1" comment="libkde4-32bit is &lt;4.1.3-8.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057161" version="1" comment="libkde4-x86 is &lt;4.1.3-8.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057165" version="1" comment="libkdecore4 is &lt;4.1.3-8.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057163" version="1" comment="libkdecore4-32bit is &lt;4.1.3-8.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057164" version="1" comment="libkdecore4-x86 is &lt;4.1.3-8.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057168" version="1" comment="utempter is &lt;0.5.5-106.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057166" version="1" comment="utempter-32bit is &lt;0.5.5-106.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057167" version="1" comment="utempter-x86 is &lt;0.5.5-106.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032343" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.27.23_0.1-7.1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032353" version="1" comment="ext4dev-kmp-pae is &lt;0_2.6.27.23_0.1-7.1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032344" version="1" comment="ext4dev-kmp-ppc64 is &lt;0_2.6.27.23_0.1-7.1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032354" version="1" comment="ext4dev-kmp-vmi is &lt;0_2.6.27.23_0.1-7.1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032355" version="1" comment="ext4dev-kmp-xen is &lt;0_2.6.27.23_0.1-7.1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063861" version="1" comment="iscsitarget-kmp-default is &lt;0.4.15_2.6.27.54_0.2-94.14.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032346" version="1" comment="kernel-default is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032345" version="1" comment="kernel-default-base is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032352" version="1" comment="kernel-default-man is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032347" version="1" comment="kernel-kdump is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032357" version="1" comment="kernel-pae is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032356" version="1" comment="kernel-pae-base is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032349" version="1" comment="kernel-ppc64 is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032348" version="1" comment="kernel-ppc64-base is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032350" version="1" comment="kernel-source is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032351" version="1" comment="kernel-syms is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032359" version="1" comment="kernel-vmi is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032358" version="1" comment="kernel-vmi-base is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032361" version="1" comment="kernel-xen is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032360" version="1" comment="kernel-xen-base is &lt;2.6.27.23-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063863" version="1" comment="oracleasm-kmp-default is &lt;2.0.5_2.6.27.54_0.2-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032319" version="1" comment="krb5 is &lt;1.6.3-133.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032313" version="1" comment="krb5-32bit is &lt;1.6.3-133.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032314" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032315" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032316" version="1" comment="krb5-client is &lt;1.6.3-133.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032317" version="1" comment="krb5-server is &lt;1.6.3-133.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032318" version="1" comment="krb5-x86 is &lt;1.6.3-133.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056326" version="1" comment="kvm is &lt;78.0.10.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056324" version="1" comment="kvm-kmp-default is &lt;78.2.6.30.1_2.6.27.37_0.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056325" version="1" comment="kvm-kmp-pae is &lt;78.2.6.30.1_2.6.27.37_0.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032237" version="1" comment="lcms is &lt;1.17-77.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032240" version="1" comment="liblcms1 is &lt;1.17-77.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032238" version="1" comment="liblcms1-32bit is &lt;1.17-77.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032239" version="1" comment="liblcms1-x86 is &lt;1.17-77.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063457" version="1" comment="libHX13 is &lt;1.23-4.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063455" version="1" comment="libHX13-32bit is &lt;1.23-4.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063456" version="1" comment="libHX13-x86 is &lt;1.23-4.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053394" version="1" comment="libapr-util1 is &lt;1.3.4-12.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053393" version="1" comment="libapr-util1-32bit is &lt;1.3.4-12.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055476" version="1" comment="libapr1 is &lt;1.3.3-11.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055475" version="1" comment="libapr1-32bit is &lt;1.3.3-11.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060265" version="1" comment="libesmtp is &lt;1.0.4-157.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064224" version="1" comment="libfreebl3 is &lt;3.12.8-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064222" version="1" comment="libfreebl3-32bit is &lt;3.12.8-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064223" version="1" comment="libfreebl3-x86 is &lt;3.12.8-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064227" version="1" comment="mozilla-nspr is &lt;4.8.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064225" version="1" comment="mozilla-nspr-32bit is &lt;4.8.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064226" version="1" comment="mozilla-nspr-x86 is &lt;4.8.6-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064231" version="1" comment="mozilla-nss is &lt;3.12.8-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064228" version="1" comment="mozilla-nss-32bit is &lt;3.12.8-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064229" version="1" comment="mozilla-nss-tools is &lt;3.12.8-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064230" version="1" comment="mozilla-nss-x86 is &lt;3.12.8-1.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059424" version="1" comment="zlib is &lt;1.2.3-106.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059422" version="1" comment="zlib-32bit is &lt;1.2.3-106.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059423" version="1" comment="zlib-x86 is &lt;1.2.3-106.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063122" version="1" comment="libgdiplus0 is &lt;2.0-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062039" version="1" comment="libldap-2_4-2 is &lt;2.4.12-7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062037" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.12-7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062038" version="1" comment="libldap-2_4-2-x86 is &lt;2.4.12-7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062042" version="1" comment="openldap2 is &lt;2.4.12-7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062040" version="1" comment="openldap2-back-meta is &lt;2.4.12-7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062041" version="1" comment="openldap2-client is &lt;2.4.12-7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063485" version="1" comment="libmysqlclient15 is &lt;5.0.67-13.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063483" version="1" comment="libmysqlclient15-32bit is &lt;5.0.67-13.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063484" version="1" comment="libmysqlclient15-x86 is &lt;5.0.67-13.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063486" version="1" comment="libmysqlclient_r15 is &lt;5.0.67-13.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063489" version="1" comment="mysql is &lt;5.0.67-13.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063487" version="1" comment="mysql-Max is &lt;5.0.67-13.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063488" version="1" comment="mysql-client is &lt;5.0.67-13.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055774" version="1" comment="libneon27 is &lt;0.28.3-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055772" version="1" comment="libneon27-32bit is &lt;0.28.3-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055773" version="1" comment="libneon27-x86 is &lt;0.28.3-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055775" version="1" comment="neon is &lt;0.28.3-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032233" version="1" comment="libopensc2 is &lt;0.11.6-5.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032231" version="1" comment="libopensc2-32bit is &lt;0.11.6-5.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032232" version="1" comment="libopensc2-x86 is &lt;0.11.6-5.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032236" version="1" comment="opensc is &lt;0.11.6-5.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032234" version="1" comment="opensc-32bit is &lt;0.11.6-5.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032235" version="1" comment="opensc-x86 is &lt;0.11.6-5.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032376" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-30.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032374" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-30.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032375" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8h-30.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032378" version="1" comment="openssl is &lt;0.9.8h-30.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032377" version="1" comment="openssl-doc is &lt;0.9.8h-30.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032197" version="1" comment="libpng12-0 is &lt;1.2.31-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032195" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032196" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062260" version="1" comment="libpng12-0 is &lt;1.2.31-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062258" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062259" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064459" version="1" comment="libpoppler-glib4 is &lt;0.10.1-1.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064460" version="1" comment="libpoppler-qt4-3 is &lt;0.10.1-1.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064461" version="1" comment="libpoppler4 is &lt;0.10.1-1.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064462" version="1" comment="poppler-tools is &lt;0.10.1-1.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032208" version="1" comment="libpoppler4 is &lt;0.10.1-1.30.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064999" version="1" comment="libpython2_6-1_0 is &lt;2.6.0-8.8.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064997" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.0-8.8.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064998" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.0-8.8.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065011" version="1" comment="python is &lt;2.6.0-8.9.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065000" version="1" comment="python-32bit is &lt;2.6.0-8.9.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065003" version="1" comment="python-base is &lt;2.6.0-8.8.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065001" version="1" comment="python-base-32bit is &lt;2.6.0-8.8.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065002" version="1" comment="python-base-x86 is &lt;2.6.0-8.8.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065004" version="1" comment="python-curses is &lt;2.6.0-8.9.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065005" version="1" comment="python-demo is &lt;2.6.0-8.9.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065006" version="1" comment="python-gdbm is &lt;2.6.0-8.9.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065007" version="1" comment="python-idle is &lt;2.6.0-8.9.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065008" version="1" comment="python-tk is &lt;2.6.0-8.9.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065009" version="1" comment="python-x86 is &lt;2.6.0-8.9.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065010" version="1" comment="python-xml is &lt;2.6.0-8.8.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056149" version="1" comment="libqt4 is &lt;4.4.3-12.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056137" version="1" comment="libqt4-32bit is &lt;4.4.3-12.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056140" version="1" comment="libqt4-qt3support is &lt;4.4.3-12.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056138" version="1" comment="libqt4-qt3support-32bit is &lt;4.4.3-12.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056139" version="1" comment="libqt4-qt3support-x86 is &lt;4.4.3-12.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056144" version="1" comment="libqt4-sql is &lt;4.4.3-12.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056141" version="1" comment="libqt4-sql-32bit is &lt;4.4.3-12.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056142" version="1" comment="libqt4-sql-sqlite is &lt;4.4.3-12.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056143" version="1" comment="libqt4-sql-x86 is &lt;4.4.3-12.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056147" version="1" comment="libqt4-x11 is &lt;4.4.3-12.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056145" version="1" comment="libqt4-x11-32bit is &lt;4.4.3-12.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056146" version="1" comment="libqt4-x11-x86 is &lt;4.4.3-12.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056148" version="1" comment="libqt4-x86 is &lt;4.4.3-12.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053460" version="1" comment="libsndfile is &lt;1.0.17-172.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053458" version="1" comment="libsndfile-32bit is &lt;1.0.17-172.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053459" version="1" comment="libsndfile-x86 is &lt;1.0.17-172.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059266" version="1" comment="libtheora0 is &lt;1.0.beta2-6.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059264" version="1" comment="libtheora0-32bit is &lt;1.0.beta2-6.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059265" version="1" comment="libtheora0-x86 is &lt;1.0.beta2-6.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054051" version="1" comment="libtiff3 is &lt;3.8.2-141.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054049" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054050" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054052" version="1" comment="tiff is &lt;3.8.2-141.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053721" version="1" comment="libtiff3 is &lt;3.8.2-141.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053719" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053720" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032337" version="1" comment="libvolume_id1 is &lt;128-13.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032338" version="1" comment="udev is &lt;128-13.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062641" version="1" comment="libvirt is &lt;0.4.6-14.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062639" version="1" comment="libvirt-doc is &lt;0.4.6-14.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062640" version="1" comment="libvirt-python is &lt;0.4.6-14.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064572" version="1" comment="libxml2 is &lt;2.7.1-10.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064569" version="1" comment="libxml2-32bit is &lt;2.7.1-10.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064570" version="1" comment="libxml2-doc is &lt;2.7.1-10.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064571" version="1" comment="libxml2-x86 is &lt;2.7.1-10.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062642" version="1" comment="lvm2 is &lt;2.02.39-18.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063774" version="1" comment="mipv6d is &lt;2.0.2-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056067" version="1" comment="mozilla-nspr is &lt;4.8.2-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056065" version="1" comment="mozilla-nspr-32bit is &lt;4.8.2-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056066" version="1" comment="mozilla-nspr-x86 is &lt;4.8.2-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032273" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032269" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032270" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032271" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032272" version="1" comment="mozilla-xulrunner190-x86 is &lt;1.9.0.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064195" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.15-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064190" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.15-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064192" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.15-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064194" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.15-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070693" version="1" comment="mozilla-xulrunner191-x86 is &lt;1.9.1.15-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053628" version="1" comment="nagios is &lt;3.0.6-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053627" version="1" comment="nagios-www is &lt;3.0.6-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032210" version="1" comment="ntp is &lt;4.2.4p6-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032209" version="1" comment="ntp-doc is &lt;4.2.4p6-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054839" version="1" comment="open-iscsi is &lt;2.0.870-26.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064525" version="1" comment="openslp is &lt;1.2.0-172.10.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064522" version="1" comment="openslp-32bit is &lt;1.2.0-172.10.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064523" version="1" comment="openslp-server is &lt;1.2.0-172.10.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064524" version="1" comment="openslp-x86 is &lt;1.2.0-172.10.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032381" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-30.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032379" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-30.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032380" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8h-30.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032383" version="1" comment="openssl is &lt;0.9.8h-30.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032382" version="1" comment="openssl-doc is &lt;0.9.8h-30.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057436" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-30.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057434" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-30.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057435" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8h-30.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057438" version="1" comment="openssl is &lt;0.9.8h-30.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057437" version="1" comment="openssl-doc is &lt;0.9.8h-30.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032310" version="1" comment="openswan is &lt;2.6.16-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032309" version="1" comment="openswan-doc is &lt;2.6.16-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032365" version="1" comment="pango is &lt;1.22.1-3.17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032362" version="1" comment="pango-32bit is &lt;1.22.1-3.17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032363" version="1" comment="pango-doc is &lt;1.22.1-3.17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032364" version="1" comment="pango-x86 is &lt;1.22.1-3.17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062629" version="1" comment="pcsc-lite is &lt;1.4.102-1.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062627" version="1" comment="pcsc-lite-32bit is &lt;1.4.102-1.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062628" version="1" comment="pcsc-lite-x86 is &lt;1.4.102-1.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032388" version="1" comment="perl is &lt;5.10.0-64.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032384" version="1" comment="perl-32bit is &lt;5.10.0-64.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032385" version="1" comment="perl-base is &lt;5.10.0-64.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032386" version="1" comment="perl-doc is &lt;5.10.0-64.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032387" version="1" comment="perl-x86 is &lt;5.10.0-64.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054781" version="1" comment="perl-IO-Socket-SSL is &lt;1.16-3.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062632" version="1" comment="popt is &lt;1.7-37.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062630" version="1" comment="popt-32bit is &lt;1.7-37.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062631" version="1" comment="popt-x86 is &lt;1.7-37.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062635" version="1" comment="rpm is &lt;4.4.2.3-37.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062633" version="1" comment="rpm-32bit is &lt;4.4.2.3-37.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062634" version="1" comment="rpm-x86 is &lt;4.4.2.3-37.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032326" version="1" comment="postgresql is &lt;8.3.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032320" version="1" comment="postgresql-contrib is &lt;8.3.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032321" version="1" comment="postgresql-docs is &lt;8.3.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032324" version="1" comment="postgresql-libs is &lt;8.3.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032322" version="1" comment="postgresql-libs-32bit is &lt;8.3.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032323" version="1" comment="postgresql-libs-x86 is &lt;8.3.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032325" version="1" comment="postgresql-server is &lt;8.3.7-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060820" version="1" comment="puppet is &lt;0.24.5-5.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060819" version="1" comment="puppet-server is &lt;0.24.5-5.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056872" version="1" comment="pyxml is &lt;0.8.4-194.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032396" version="1" comment="quagga is &lt;0.99.10-17.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058473" version="1" comment="sendmail is &lt;8.14.3-50.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053194" version="1" comment="ruby is &lt;1.8.7.p72-5.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053192" version="1" comment="ruby-doc-html is &lt;1.8.7.p72-5.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053193" version="1" comment="ruby-tk is &lt;1.8.7.p72-5.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059011" version="1" comment="squid is &lt;2.7.STABLE5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032402" version="1" comment="strongswan is &lt;4.2.8-1.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032401" version="1" comment="strongswan-doc is &lt;4.2.8-1.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058612" version="1" comment="sudo is &lt;1.6.9p17-21.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061867" version="1" comment="systemtap is &lt;0.7.1-42.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060021" version="1" comment="tar is &lt;1.20-23.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062375" version="1" comment="tgt is &lt;0.9.0-1.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061665" version="1" comment="w3m is &lt;0.5.2-128.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053170" version="1" comment="websphere-as_ce is &lt;2.1.1.2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032366" version="1" comment="wireshark is &lt;1.0.5-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060673" version="1" comment="libcmpiutil is &lt;0.5-15.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060677" version="1" comment="libvirt is &lt;0.4.6-14.60.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060674" version="1" comment="libvirt-cim is &lt;0.5.2-8.47.85" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060675" version="1" comment="libvirt-doc is &lt;0.4.6-14.60.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060676" version="1" comment="libvirt-python is &lt;0.4.6-14.60.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060678" version="1" comment="virt-manager is &lt;0.5.3-66.42.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060679" version="1" comment="virt-viewer is &lt;0.0.3-3.57.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060680" version="1" comment="vm-install is &lt;0.3.27-0.1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060688" version="1" comment="xen is &lt;3.3.1_18546_24-0.3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060681" version="1" comment="xen-doc-html is &lt;3.3.1_18546_24-0.3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060682" version="1" comment="xen-doc-pdf is &lt;3.3.1_18546_24-0.3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060683" version="1" comment="xen-kmp-default is &lt;3.3.1_18546_24_2.6.27.45_0.3-0.3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060684" version="1" comment="xen-kmp-pae is &lt;3.3.1_18546_24_2.6.27.45_0.3-0.3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060685" version="1" comment="xen-libs is &lt;3.3.1_18546_24-0.3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060687" version="1" comment="xen-tools is &lt;3.3.1_18546_24-0.3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060686" version="1" comment="xen-tools-domU is &lt;3.3.1_18546_24-0.3.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054298" version="1" comment="xerces-j2 is &lt;2.8.1-238.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054296" version="1" comment="xerces-j2-xml-apis is &lt;2.8.1-238.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054297" version="1" comment="xerces-j2-xml-resolver is &lt;2.8.1-238.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054103" version="1" comment="xpdf-tools is &lt;3.02-138.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009032398" version="1" comment="yast2-ldap-server is &lt;2.17.21-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104180" version="1" comment="MozillaFirefox is &lt;24.6.0esr-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104178" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.4.10.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104179" version="1" comment="MozillaFirefox-translations is &lt;24.6.0esr-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104182" version="1" comment="libfreebl3 is &lt;3.16.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104181" version="1" comment="libfreebl3-32bit is &lt;3.16.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104185" version="1" comment="mozilla-nss is &lt;3.16.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104183" version="1" comment="mozilla-nss-32bit is &lt;3.16.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104184" version="1" comment="mozilla-nss-tools is &lt;3.16.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132241" version="1" comment="sles-release is ==1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103960" version="1" comment="Mesa is &lt;7.7-5.12.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103959" version="1" comment="Mesa-32bit is &lt;7.7-5.12.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089845" version="1" comment="MozillaFirefox is &lt;17.0.8esr-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089844" version="1" comment="MozillaFirefox-translations is &lt;17.0.8esr-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104171" version="1" comment="MozillaFirefox is &lt;24.5.0esr-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104169" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.4.10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104170" version="1" comment="MozillaFirefox-translations is &lt;24.5.0esr-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104173" version="1" comment="libfreebl3 is &lt;3.16-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104172" version="1" comment="libfreebl3-32bit is &lt;3.16-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104176" version="1" comment="mozilla-nss is &lt;3.16-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104174" version="1" comment="mozilla-nss-32bit is &lt;3.16-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104175" version="1" comment="mozilla-nss-tools is &lt;3.16-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104124" version="1" comment="apache2 is &lt;2.2.12-1.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104119" version="1" comment="apache2-doc is &lt;2.2.12-1.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104120" version="1" comment="apache2-example-pages is &lt;2.2.12-1.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104121" version="1" comment="apache2-prefork is &lt;2.2.12-1.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104122" version="1" comment="apache2-utils is &lt;2.2.12-1.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104123" version="1" comment="apache2-worker is &lt;2.2.12-1.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103999" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111845" version="1" comment="php5 is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104000" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104001" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104002" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104003" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104004" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104005" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104006" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104007" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104008" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104009" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104010" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104011" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104012" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104013" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104014" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104015" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104016" version="1" comment="php5-json is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104017" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104018" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104019" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104020" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104021" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104022" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104023" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104024" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104025" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104026" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104027" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104028" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104029" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104030" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104031" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104032" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104033" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104034" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104035" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104036" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104037" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104038" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104039" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104040" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104041" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104042" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104260" version="1" comment="bash is &lt;3.2-147.14.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104259" version="1" comment="bash-doc is &lt;3.2-147.14.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104262" version="1" comment="libreadline5 is &lt;5.2-147.14.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104261" version="1" comment="libreadline5-32bit is &lt;5.2-147.14.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104263" version="1" comment="readline-doc is &lt;5.2-147.14.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103821" version="1" comment="bind is &lt;9.6ESVR7P4-0.2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103816" version="1" comment="bind-chrootenv is &lt;9.6ESVR7P4-0.2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103817" version="1" comment="bind-doc is &lt;9.6ESVR7P4-0.2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103819" version="1" comment="bind-libs is &lt;9.6ESVR7P4-0.2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103818" version="1" comment="bind-libs-32bit is &lt;9.6ESVR7P4-0.2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103820" version="1" comment="bind-utils is &lt;9.6ESVR7P4-0.2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111673" version="1" comment="bind is &lt;9.6ESVR11W1-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111674" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111675" version="1" comment="bind-devel is &lt;9.6ESVR11W1-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111676" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111678" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111677" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11W1-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111681" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114164" version="1" comment="bind is &lt;9.6ESVR11W1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114165" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114166" version="1" comment="bind-devel is &lt;9.6ESVR11W1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114167" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114168" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114170" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11W1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114169" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104079" version="1" comment="cifs-mount is &lt;3.4.3-1.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104080" version="1" comment="ldapsmb is &lt;1.34b-11.28.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104082" version="1" comment="libsmbclient0 is &lt;3.4.3-1.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104081" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-1.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104084" version="1" comment="libtalloc1 is &lt;3.4.3-1.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104083" version="1" comment="libtalloc1-32bit is &lt;3.4.3-1.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104086" version="1" comment="libtdb1 is &lt;3.4.3-1.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104085" version="1" comment="libtdb1-32bit is &lt;3.4.3-1.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104088" version="1" comment="libwbclient0 is &lt;3.4.3-1.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104087" version="1" comment="libwbclient0-32bit is &lt;3.4.3-1.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104096" version="1" comment="samba is &lt;3.4.3-1.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104089" version="1" comment="samba-32bit is &lt;3.4.3-1.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104091" version="1" comment="samba-client is &lt;3.4.3-1.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104090" version="1" comment="samba-client-32bit is &lt;3.4.3-1.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104092" version="1" comment="samba-doc is &lt;3.4.3-1.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104093" version="1" comment="samba-krb-printing is &lt;3.4.3-1.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104095" version="1" comment="samba-winbind is &lt;3.4.3-1.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104094" version="1" comment="samba-winbind-32bit is &lt;3.4.3-1.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107554" version="1" comment="clamav is &lt;0.98.6-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107488" version="1" comment="curl is &lt;7.19.7-1.20.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107490" version="1" comment="libcurl4 is &lt;7.19.7-1.20.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107489" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.20.27.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103809" version="1" comment="dbus-1 is &lt;1.2.10-3.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103807" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103808" version="1" comment="dbus-1-x11 is &lt;1.2.10-3.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103839" version="1" comment="MozillaFirefox is &lt;10.0.12-0.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103837" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.7.103" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103838" version="1" comment="MozillaFirefox-translations is &lt;10.0.12-0.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103901" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.9.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103916" version="1" comment="MozillaFirefox is &lt;17.0.10esr-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103914" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.6.9.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103915" version="1" comment="MozillaFirefox-translations is &lt;17.0.10esr-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103904" version="1" comment="MozillaFirefox is &lt;24.3.0esr-0.4.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103902" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.4.10.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103903" version="1" comment="MozillaFirefox-translations is &lt;24.3.0esr-0.4.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103905" version="1" comment="firefox-libgcc_s1 is &lt;4.7.2_20130108-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103906" version="1" comment="firefox-libstdc++6 is &lt;4.7.2_20130108-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103908" version="1" comment="libfreebl3 is &lt;3.15.4-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103907" version="1" comment="libfreebl3-32bit is &lt;3.15.4-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103910" version="1" comment="mozilla-nspr is &lt;4.10.2-0.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103909" version="1" comment="mozilla-nspr-32bit is &lt;4.10.2-0.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103913" version="1" comment="mozilla-nss is &lt;3.15.4-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103911" version="1" comment="mozilla-nss-32bit is &lt;3.15.4-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103912" version="1" comment="mozilla-nss-tools is &lt;3.15.4-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104188" version="1" comment="MozillaFirefox is &lt;24.7.0esr-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104187" version="1" comment="MozillaFirefox-translations is &lt;24.7.0esr-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104190" version="1" comment="libfreebl3 is &lt;3.16.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104189" version="1" comment="libfreebl3-32bit is &lt;3.16.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104194" version="1" comment="mozilla-nss is &lt;3.16.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104191" version="1" comment="mozilla-nss-32bit is &lt;3.16.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104193" version="1" comment="mozilla-nss-tools is &lt;3.16.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104196" version="1" comment="MozillaFirefox is &lt;24.8.0esr-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104195" version="1" comment="MozillaFirefox-translations is &lt;24.8.0esr-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104198" version="1" comment="libfreebl3 is &lt;3.16.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104197" version="1" comment="libfreebl3-32bit is &lt;3.16.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104201" version="1" comment="mozilla-nss is &lt;3.16.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104199" version="1" comment="mozilla-nss-32bit is &lt;3.16.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104200" version="1" comment="mozilla-nss-tools is &lt;3.16.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104222" version="1" comment="MozillaFirefox is &lt;31.3.0esr-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104221" version="1" comment="MozillaFirefox-translations is &lt;31.3.0esr-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105639" version="1" comment="MozillaFirefox is &lt;31.4.0esr-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105638" version="1" comment="MozillaFirefox-translations is &lt;31.4.0esr-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105641" version="1" comment="libfreebl3 is &lt;3.17.3-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105640" version="1" comment="libfreebl3-32bit is &lt;3.17.3-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105645" version="1" comment="mozilla-nss is &lt;3.17.3-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105642" version="1" comment="mozilla-nss-32bit is &lt;3.17.3-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105644" version="1" comment="mozilla-nss-tools is &lt;3.17.3-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108157" version="1" comment="MozillaFirefox is &lt;31.5.3esr-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108156" version="1" comment="MozillaFirefox-translations is &lt;31.5.3esr-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114230" version="1" comment="MozillaFirefox is &lt;38.2.1esr-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114231" version="1" comment="MozillaFirefox-translations is &lt;38.2.1esr-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104211" version="1" comment="MozillaFirefox is &lt;31.2.0esr-0.11.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104209" version="1" comment="MozillaFirefox-branding-SLED is &lt;31.0-0.5.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104210" version="1" comment="MozillaFirefox-translations is &lt;31.2.0esr-0.11.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104213" version="1" comment="libfreebl3 is &lt;3.17.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104212" version="1" comment="libfreebl3-32bit is &lt;3.17.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104216" version="1" comment="mozilla-nss is &lt;3.17.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104214" version="1" comment="mozilla-nss-32bit is &lt;3.17.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104215" version="1" comment="mozilla-nss-tools is &lt;3.17.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103832" version="1" comment="glibc is &lt;2.11.1-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103822" version="1" comment="glibc-32bit is &lt;2.11.1-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103824" version="1" comment="glibc-devel is &lt;2.11.1-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103823" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103825" version="1" comment="glibc-html is &lt;2.11.1-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103826" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103827" version="1" comment="glibc-info is &lt;2.11.1-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103829" version="1" comment="glibc-locale is &lt;2.11.1-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103828" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103831" version="1" comment="glibc-profile is &lt;2.11.1-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103830" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103833" version="1" comment="nscd is &lt;2.11.1-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104244" version="1" comment="gnutls is &lt;2.4.1-24.39.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104245" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104247" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104246" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103841" version="1" comment="gpg2 is &lt;2.0.9-25.33.37.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103840" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.37.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077716" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr13.18-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077717" version="1" comment="java-1_4_2-ibm-plugin is &lt;1.4.2_sr13.18-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098493" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.0-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098489" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.0-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098490" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.0-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098491" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.0-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098492" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.0-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114248" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.7-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114250" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.7-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114251" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.7-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103860" version="1" comment="btrfs-kmp-default is &lt;0_2.6.32.59_0.13-0.3.163" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103861" version="1" comment="btrfs-kmp-pae is &lt;0_2.6.32.59_0.13-0.3.163" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103862" version="1" comment="btrfs-kmp-xen is &lt;0_2.6.32.59_0.13-0.3.163" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103863" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.32.59_0.13-7.9.130" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103864" version="1" comment="ext4dev-kmp-pae is &lt;0_2.6.32.59_0.13-7.9.130" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103865" version="1" comment="ext4dev-kmp-trace is &lt;0_2.6.32.59_0.13-7.9.130" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103866" version="1" comment="ext4dev-kmp-xen is &lt;0_2.6.32.59_0.13-7.9.130" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103867" version="1" comment="hyper-v-kmp-default is &lt;0_2.6.32.59_0.13-0.18.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103868" version="1" comment="hyper-v-kmp-pae is &lt;0_2.6.32.59_0.13-0.18.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103869" version="1" comment="hyper-v-kmp-trace is &lt;0_2.6.32.59_0.13-0.18.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103920" version="1" comment="kernel-default is &lt;2.6.32.59-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103918" version="1" comment="kernel-default-base is &lt;2.6.32.59-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103919" version="1" comment="kernel-default-devel is &lt;2.6.32.59-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107487" version="1" comment="kernel-default-man is &lt;2.6.32.59-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103923" version="1" comment="kernel-ec2 is &lt;2.6.32.59-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103921" version="1" comment="kernel-ec2-base is &lt;2.6.32.59-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103922" version="1" comment="kernel-ec2-devel is &lt;2.6.32.59-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103936" version="1" comment="kernel-pae is &lt;2.6.32.59-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103934" version="1" comment="kernel-pae-base is &lt;2.6.32.59-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103935" version="1" comment="kernel-pae-devel is &lt;2.6.32.59-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103924" version="1" comment="kernel-source is &lt;2.6.32.59-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103925" version="1" comment="kernel-syms is &lt;2.6.32.59-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103928" version="1" comment="kernel-trace is &lt;2.6.32.59-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103926" version="1" comment="kernel-trace-base is &lt;2.6.32.59-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103927" version="1" comment="kernel-trace-devel is &lt;2.6.32.59-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103931" version="1" comment="kernel-xen is &lt;2.6.32.59-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103929" version="1" comment="kernel-xen-base is &lt;2.6.32.59-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103930" version="1" comment="kernel-xen-devel is &lt;2.6.32.59-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103932" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_16_2.6.32.59_0.15-0.5.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103937" version="1" comment="xen-kmp-pae is &lt;4.0.3_21548_16_2.6.32.59_0.15-0.5.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103933" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_16_2.6.32.59_0.15-0.5.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109723" version="1" comment="kvm is &lt;0.12.5-1.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113862" version="1" comment="kvm is &lt;0.12.5-1.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104204" version="1" comment="libfreebl3 is &lt;3.16.5-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104203" version="1" comment="libfreebl3-32bit is &lt;3.16.5-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104207" version="1" comment="mozilla-nss is &lt;3.16.5-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104205" version="1" comment="mozilla-nss-32bit is &lt;3.16.5-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104206" version="1" comment="mozilla-nss-tools is &lt;3.16.5-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103998" version="1" comment="libgcrypt11 is &lt;1.4.1-6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103997" version="1" comment="libgcrypt11-32bit is &lt;1.4.1-6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111119" version="1" comment="libmysqlclient15 is &lt;5.0.96-0.8.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111118" version="1" comment="libmysqlclient15-32bit is &lt;5.0.96-0.8.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111120" version="1" comment="libmysqlclient_r15 is &lt;5.0.96-0.8.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111124" version="1" comment="mysql is &lt;5.0.96-0.8.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111121" version="1" comment="mysql-Max is &lt;5.0.96-0.8.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111122" version="1" comment="mysql-client is &lt;5.0.96-0.8.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111123" version="1" comment="mysql-tools is &lt;5.0.96-0.8.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101162" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101161" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101164" version="1" comment="openssl-doc is &lt;0.9.8j-0.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093155" version="1" comment="libxml2-doc is &lt;2.7.6-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113976" version="1" comment="MozillaFirefox is &lt;38.2.0esr-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113977" version="1" comment="MozillaFirefox-branding-SLED is &lt;31.0-0.5.7.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113978" version="1" comment="MozillaFirefox-translations is &lt;38.2.0esr-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113979" version="1" comment="firefox-gcc47 is &lt;4.7.2_20130108-0.37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113980" version="1" comment="firefox-libgcc_s1 is &lt;4.7.2_20130108-0.37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113981" version="1" comment="firefox-libstdc++6 is &lt;4.7.2_20130108-0.37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113982" version="1" comment="libfreebl3 is &lt;3.19.2.0-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113988" version="1" comment="libfreebl3-32bit is &lt;3.19.2.0-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113983" version="1" comment="mozilla-nss is &lt;3.19.2.0-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113989" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.0-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113984" version="1" comment="mozilla-nss-devel is &lt;3.19.2.0-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113985" version="1" comment="mozilla-nss-tools is &lt;3.19.2.0-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106036" version="1" comment="ntp is &lt;4.2.4p8-1.29.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106035" version="1" comment="ntp-doc is &lt;4.2.4p8-1.29.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111846" version="1" comment="openssl-certs is &lt;1.96-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103836" version="1" comment="ruby is &lt;1.8.7.p357-0.9.15.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103834" version="1" comment="ruby-doc-html is &lt;1.8.7.p357-0.9.15.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103835" version="1" comment="ruby-tk is &lt;1.8.7.p357-0.9.15.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098704" version="1" comment="strongswan is &lt;4.4.0-6.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098703" version="1" comment="strongswan-doc is &lt;4.4.0-6.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103917" version="1" comment="sudo is &lt;1.7.6p2-0.2.12.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109886" version="1" comment="xen is &lt;4.0.3_21548_18-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109878" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109879" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109880" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.59_0.19-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109881" version="1" comment="xen-kmp-pae is &lt;4.0.3_21548_18_2.6.32.59_0.19-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109882" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.59_0.19-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109883" version="1" comment="xen-libs is &lt;4.0.3_21548_18-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109885" version="1" comment="xen-tools is &lt;4.0.3_21548_18-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109884" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113921" version="1" comment="xen is &lt;4.0.3_21548_18-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113922" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113923" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113924" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.59_0.19-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113925" version="1" comment="xen-kmp-pae is &lt;4.0.3_21548_18_2.6.32.59_0.19-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113926" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.59_0.19-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113927" version="1" comment="xen-libs is &lt;4.0.3_21548_18-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113928" version="1" comment="xen-tools is &lt;4.0.3_21548_18-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113929" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103806" version="1" comment="xen is &lt;4.0.3_21548_10-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103798" version="1" comment="xen-doc-html is &lt;4.0.3_21548_10-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103799" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_10-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103800" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_10_2.6.32.59_0.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103801" version="1" comment="xen-kmp-pae is &lt;4.0.3_21548_10_2.6.32.59_0.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103802" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_10_2.6.32.59_0.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103803" version="1" comment="xen-libs is &lt;4.0.3_21548_10-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103805" version="1" comment="xen-tools is &lt;4.0.3_21548_10-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103804" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_10-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103757" version="1" comment="xen is &lt;4.0.3_21548_16-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103749" version="1" comment="xen-doc-html is &lt;4.0.3_21548_16-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103750" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_16-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103751" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_16_2.6.32.59_0.9-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103752" version="1" comment="xen-kmp-pae is &lt;4.0.3_21548_16_2.6.32.59_0.9-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103753" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_16_2.6.32.59_0.9-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103754" version="1" comment="xen-libs is &lt;4.0.3_21548_16-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103756" version="1" comment="xen-tools is &lt;4.0.3_21548_16-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103755" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_16-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108973" version="1" comment="xen is &lt;4.0.3_21548_18-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108965" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108966" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108967" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.59_0.19-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108968" version="1" comment="xen-kmp-pae is &lt;4.0.3_21548_18_2.6.32.59_0.19-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108969" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.59_0.19-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108970" version="1" comment="xen-libs is &lt;4.0.3_21548_18-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108972" version="1" comment="xen-tools is &lt;4.0.3_21548_18-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108971" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110771" version="1" comment="xen is &lt;4.0.3_21548_18-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110763" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110764" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110765" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.59_0.19-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110766" version="1" comment="xen-kmp-pae is &lt;4.0.3_21548_18_2.6.32.59_0.19-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110767" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.59_0.19-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110768" version="1" comment="xen-libs is &lt;4.0.3_21548_18-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110770" version="1" comment="xen-tools is &lt;4.0.3_21548_18-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110769" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103944" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.40.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103946" version="1" comment="xorg-x11-server is &lt;7.4-27.40.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103945" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.40.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103954" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.42.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103953" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.42.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103950" version="1" comment="xorg-x11-libXext is &lt;7.4-1.18.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103949" version="1" comment="xorg-x11-libXext-32bit is &lt;7.4-1.18.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103966" version="1" comment="xorg-x11-libxcb is &lt;7.4-1.22.5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103965" version="1" comment="xorg-x11-libxcb-32bit is &lt;7.4-1.22.5.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104186" version="1" comment="mozilla-nss-devel is &lt;3.16.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132242" version="1" comment="sles-release is ==2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127467" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127468" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127566" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127567" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128978" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128979" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077521" version="1" comment="Mesa-x86 is &lt;7.11.2-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127745" version="1" comment="MozillaFirefox is &lt;38.8.0esr-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127746" version="1" comment="MozillaFirefox-translations is &lt;38.8.0esr-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132243" version="1" comment="MozillaFirefox is &lt;45.3.0esr-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132244" version="1" comment="MozillaFirefox-branding-SLED is &lt;45.0-20.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132245" version="1" comment="MozillaFirefox-translations is &lt;45.3.0esr-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132246" version="1" comment="firefox-fontconfig is &lt;2.11.0-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132247" version="1" comment="libfreebl3 is &lt;3.21.1-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132248" version="1" comment="libfreebl3-32bit is &lt;3.21.1-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132249" version="1" comment="mozilla-nspr is &lt;4.12-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132250" version="1" comment="mozilla-nspr-32bit is &lt;4.12-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132251" version="1" comment="mozilla-nspr-devel is &lt;4.12-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132252" version="1" comment="mozilla-nss is &lt;3.21.1-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132253" version="1" comment="mozilla-nss-32bit is &lt;3.21.1-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132254" version="1" comment="mozilla-nss-devel is &lt;3.21.1-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132255" version="1" comment="mozilla-nss-tools is &lt;3.21.1-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132256" version="1" comment="MozillaFirefox is &lt;45.4.0esr-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132257" version="1" comment="MozillaFirefox-translations is &lt;45.4.0esr-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144685" version="1" comment="MozillaFirefox is &lt;45.6.0esr-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144686" version="1" comment="MozillaFirefox-translations is &lt;45.6.0esr-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104177" version="1" comment="mozilla-nss-devel is &lt;3.16-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113843" version="1" comment="xen is &lt;4.1.6_08-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113844" version="1" comment="xen-devel is &lt;4.1.6_08-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113845" version="1" comment="xen-doc-html is &lt;4.1.6_08-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113846" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113847" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.29-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113853" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.29-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113848" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.29-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113850" version="1" comment="xen-libs is &lt;4.1.6_08-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113849" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113851" version="1" comment="xen-tools is &lt;4.1.6_08-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113852" version="1" comment="xen-tools-domU is &lt;4.1.6_08-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092207" version="1" comment="apache2-mod_nss is &lt;1.0.8-0.4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092819" version="1" comment="apache2-mod_php53 is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112794" version="1" comment="php53 is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092820" version="1" comment="php53-bcmath is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092821" version="1" comment="php53-bz2 is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092822" version="1" comment="php53-calendar is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092823" version="1" comment="php53-ctype is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092824" version="1" comment="php53-curl is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092825" version="1" comment="php53-dba is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092826" version="1" comment="php53-dom is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092827" version="1" comment="php53-exif is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092828" version="1" comment="php53-fastcgi is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092829" version="1" comment="php53-fileinfo is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092830" version="1" comment="php53-ftp is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092831" version="1" comment="php53-gd is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092832" version="1" comment="php53-gettext is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092833" version="1" comment="php53-gmp is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092834" version="1" comment="php53-iconv is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092835" version="1" comment="php53-intl is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092836" version="1" comment="php53-json is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092837" version="1" comment="php53-ldap is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092838" version="1" comment="php53-mbstring is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092839" version="1" comment="php53-mcrypt is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092840" version="1" comment="php53-mysql is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092841" version="1" comment="php53-odbc is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092842" version="1" comment="php53-openssl is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092843" version="1" comment="php53-pcntl is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092844" version="1" comment="php53-pdo is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092845" version="1" comment="php53-pear is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092846" version="1" comment="php53-pgsql is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092847" version="1" comment="php53-pspell is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092848" version="1" comment="php53-shmop is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092849" version="1" comment="php53-snmp is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092850" version="1" comment="php53-soap is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092851" version="1" comment="php53-suhosin is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092852" version="1" comment="php53-sysvmsg is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092853" version="1" comment="php53-sysvsem is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092854" version="1" comment="php53-sysvshm is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092855" version="1" comment="php53-tokenizer is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092856" version="1" comment="php53-wddx is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092857" version="1" comment="php53-xmlreader is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092858" version="1" comment="php53-xmlrpc is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092859" version="1" comment="php53-xmlwriter is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092860" version="1" comment="php53-xsl is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092861" version="1" comment="php53-zip is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092862" version="1" comment="php53-zlib is &lt;5.3.8-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093221" version="1" comment="bind is &lt;9.9.4P2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093215" version="1" comment="bind-chrootenv is &lt;9.9.4P2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093216" version="1" comment="bind-doc is &lt;9.9.4P2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093218" version="1" comment="bind-libs-x86 is &lt;9.9.4P2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111609" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111611" version="1" comment="bind-doc is &lt;9.9.6P1-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114085" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114087" version="1" comment="bind-doc is &lt;9.9.6P1-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119474" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119475" version="1" comment="bind-doc is &lt;9.9.6P1-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121674" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121675" version="1" comment="bind-doc is &lt;9.9.6P1-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125047" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125048" version="1" comment="bind-doc is &lt;9.9.6P1-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132258" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135232" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146908" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092613" version="1" comment="ldapsmb is &lt;1.34b-12.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092616" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092619" version="1" comment="libtalloc1-x86 is &lt;3.4.3-1.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092622" version="1" comment="libtalloc2-x86 is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092625" version="1" comment="libtdb1-x86 is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092630" version="1" comment="libwbclient0-x86 is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092634" version="1" comment="samba-client-x86 is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092639" version="1" comment="samba-winbind-x86 is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092641" version="1" comment="samba-x86 is &lt;3.6.3-0.33.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090717" version="1" comment="coreutils-x86 is &lt;8.12-6.25.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091332" version="1" comment="cups-libs-x86 is &lt;1.3.9-8.46.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093213" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.20.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075651" version="1" comment="dbus-1-x86 is &lt;1.2.10-3.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077062" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.11.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077063" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.11.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129735" version="1" comment="dhcp is &lt;4.2.4.P2-0.11.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129736" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.11.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129737" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.11.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129738" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.11.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112795" version="1" comment="libfreebl3-x86 is &lt;3.13.6-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075648" version="1" comment="mozilla-nspr-x86 is &lt;4.9.2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075649" version="1" comment="mozilla-nss-x86 is &lt;3.13.6-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076002" version="1" comment="mozilla-nspr-x86 is &lt;4.9.3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076121" version="1" comment="libfreebl3-x86 is &lt;3.14-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076122" version="1" comment="mozilla-nss-x86 is &lt;3.14-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076341" version="1" comment="libfreebl3-x86 is &lt;3.14.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076342" version="1" comment="mozilla-nspr-x86 is &lt;4.9.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076343" version="1" comment="mozilla-nss-x86 is &lt;3.14.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076762" version="1" comment="libfreebl3-x86 is &lt;3.14.2-0.4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076763" version="1" comment="mozilla-nspr-x86 is &lt;4.9.5-0.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076764" version="1" comment="mozilla-nss-x86 is &lt;3.14.2-0.4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077022" version="1" comment="libfreebl3-x86 is &lt;3.14.3-0.4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077023" version="1" comment="mozilla-nspr-x86 is &lt;4.9.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077024" version="1" comment="mozilla-nss-x86 is &lt;3.14.3-0.4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104192" version="1" comment="mozilla-nss-devel is &lt;3.16.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104202" version="1" comment="mozilla-nss-devel is &lt;3.16.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105643" version="1" comment="mozilla-nss-devel is &lt;3.17.3-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114788" version="1" comment="MozillaFirefox is &lt;38.3.0esr-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114789" version="1" comment="MozillaFirefox-translations is &lt;38.3.0esr-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116718" version="1" comment="MozillaFirefox is &lt;38.4.0esr-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116719" version="1" comment="MozillaFirefox-branding-SLED is &lt;38-12.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116720" version="1" comment="MozillaFirefox-translations is &lt;38.4.0esr-25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116721" version="1" comment="libfreebl3 is &lt;3.19.2.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116722" version="1" comment="libfreebl3-32bit is &lt;3.19.2.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116723" version="1" comment="mozilla-nss is &lt;3.19.2.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116724" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116725" version="1" comment="mozilla-nss-devel is &lt;3.19.2.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116726" version="1" comment="mozilla-nss-tools is &lt;3.19.2.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125476" version="1" comment="MozillaFirefox is &lt;38.7.0esr-36.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125477" version="1" comment="MozillaFirefox-translations is &lt;38.7.0esr-36.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125478" version="1" comment="libfreebl3 is &lt;3.20.2-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125546" version="1" comment="libfreebl3-32bit is &lt;3.20.2-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125479" version="1" comment="mozilla-nspr is &lt;4.12-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125547" version="1" comment="mozilla-nspr-32bit is &lt;4.12-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125480" version="1" comment="mozilla-nspr-devel is &lt;4.12-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125481" version="1" comment="mozilla-nss is &lt;3.20.2-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125548" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125482" version="1" comment="mozilla-nss-devel is &lt;3.20.2-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125483" version="1" comment="mozilla-nss-tools is &lt;3.20.2-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104217" version="1" comment="mozilla-nss-devel is &lt;3.17.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076707" version="1" comment="freeradius-server is &lt;2.1.1-7.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076703" version="1" comment="freeradius-server-dialupadmin is &lt;2.1.1-7.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076704" version="1" comment="freeradius-server-doc is &lt;2.1.1-7.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076706" version="1" comment="freeradius-server-utils is &lt;2.1.1-7.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091871" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.45.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091875" version="1" comment="glibc-profile is &lt;2.11.3-17.45.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091873" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.45.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091874" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.45.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091876" version="1" comment="glibc-x86 is &lt;2.11.3-17.45.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122372" version="1" comment="glibc is &lt;2.11.3-17.45.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122373" version="1" comment="glibc-32bit is &lt;2.11.3-17.45.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122374" version="1" comment="glibc-devel is &lt;2.11.3-17.45.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122375" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.45.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122376" version="1" comment="glibc-html is &lt;2.11.3-17.45.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122377" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.45.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122378" version="1" comment="glibc-info is &lt;2.11.3-17.45.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122379" version="1" comment="glibc-locale is &lt;2.11.3-17.45.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122380" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.45.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122381" version="1" comment="glibc-profile is &lt;2.11.3-17.45.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122382" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.45.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122383" version="1" comment="nscd is &lt;2.11.3-17.45.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077472" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.39.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074810" version="1" comment="hyper-v is &lt;3-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091341" version="1" comment="jakarta-commons-fileupload is &lt;1.1.1-1.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091340" version="1" comment="jakarta-commons-fileupload-javadoc is &lt;1.1.1-1.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091430" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr15.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098829" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.0-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091432" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr15.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091433" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr15.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122534" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.20-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122535" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.20-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122536" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.20-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122537" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.20-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122538" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.20-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122539" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.20-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127928" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.25-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127929" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.25-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127930" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.25-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127931" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.25-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127932" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.25-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127933" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.25-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118099" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.15-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118100" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.15-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118101" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.15-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091509" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr6.0-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091506" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr6.0-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098830" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr7.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091507" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr6.0-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091508" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr6.0-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113508" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr9.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113510" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr9.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113511" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr9.10-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118315" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr9.20-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118316" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr9.20-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118317" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr9.20-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122540" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr9.30-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122541" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr9.30-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122542" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr9.30-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122543" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr9.30-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122544" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr9.30-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127934" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr9.40-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127935" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr9.40-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127936" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr9.40-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127937" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr9.40-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127938" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr9.40-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091044" version="1" comment="libkde4-x86 is &lt;4.3.5-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091047" version="1" comment="libkdecore4-x86 is &lt;4.3.5-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112819" version="1" comment="kernel-default-man is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112842" version="1" comment="kernel-ec2 is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112843" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112844" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112823" version="1" comment="kernel-ppc64 is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112824" version="1" comment="kernel-ppc64-base is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112825" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-0.7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145694" version="1" comment="kernel-default is &lt;3.0.101-0.7.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145695" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145696" version="1" comment="kernel-default-devel is &lt;3.0.101-0.7.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145697" version="1" comment="kernel-default-man is &lt;3.0.101-0.7.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145698" version="1" comment="kernel-ec2 is &lt;3.0.101-0.7.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145699" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.7.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145700" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.7.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145701" version="1" comment="kernel-pae is &lt;3.0.101-0.7.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145702" version="1" comment="kernel-pae-base is &lt;3.0.101-0.7.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145703" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.7.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145704" version="1" comment="kernel-source is &lt;3.0.101-0.7.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145705" version="1" comment="kernel-syms is &lt;3.0.101-0.7.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145706" version="1" comment="kernel-trace is &lt;3.0.101-0.7.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145707" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145708" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.7.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145709" version="1" comment="kernel-xen is &lt;3.0.101-0.7.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145710" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145711" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.7.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147937" version="1" comment="kernel-default is &lt;3.0.101-0.7.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147938" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147939" version="1" comment="kernel-default-devel is &lt;3.0.101-0.7.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147940" version="1" comment="kernel-default-man is &lt;3.0.101-0.7.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147941" version="1" comment="kernel-ec2 is &lt;3.0.101-0.7.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147942" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.7.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147943" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.7.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147944" version="1" comment="kernel-pae is &lt;3.0.101-0.7.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147945" version="1" comment="kernel-pae-base is &lt;3.0.101-0.7.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147946" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.7.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147947" version="1" comment="kernel-source is &lt;3.0.101-0.7.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147948" version="1" comment="kernel-syms is &lt;3.0.101-0.7.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147949" version="1" comment="kernel-trace is &lt;3.0.101-0.7.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147950" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147951" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.7.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147952" version="1" comment="kernel-xen is &lt;3.0.101-0.7.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147953" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147954" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.7.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114091" version="1" comment="kernel-default is &lt;3.0.101-0.7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114092" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114093" version="1" comment="kernel-default-devel is &lt;3.0.101-0.7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114108" version="1" comment="kernel-default-man is &lt;3.0.101-0.7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114094" version="1" comment="kernel-ec2 is &lt;3.0.101-0.7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114095" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114096" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114105" version="1" comment="kernel-pae is &lt;3.0.101-0.7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114106" version="1" comment="kernel-pae-base is &lt;3.0.101-0.7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114107" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114097" version="1" comment="kernel-source is &lt;3.0.101-0.7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114098" version="1" comment="kernel-syms is &lt;3.0.101-0.7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114099" version="1" comment="kernel-trace is &lt;3.0.101-0.7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114100" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114101" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114102" version="1" comment="kernel-xen is &lt;3.0.101-0.7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114103" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114104" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.7.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132259" version="1" comment="kernel-default is &lt;3.0.101-0.7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132260" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132261" version="1" comment="kernel-default-devel is &lt;3.0.101-0.7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132262" version="1" comment="kernel-default-man is &lt;3.0.101-0.7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132263" version="1" comment="kernel-ec2 is &lt;3.0.101-0.7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132264" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132265" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132266" version="1" comment="kernel-pae is &lt;3.0.101-0.7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132267" version="1" comment="kernel-pae-base is &lt;3.0.101-0.7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132268" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132269" version="1" comment="kernel-source is &lt;3.0.101-0.7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132270" version="1" comment="kernel-syms is &lt;3.0.101-0.7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132271" version="1" comment="kernel-trace is &lt;3.0.101-0.7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132272" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132273" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132274" version="1" comment="kernel-xen is &lt;3.0.101-0.7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132275" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132276" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.7.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132277" version="1" comment="kernel-default is &lt;3.0.101-0.7.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132278" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132279" version="1" comment="kernel-default-devel is &lt;3.0.101-0.7.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132280" version="1" comment="kernel-default-man is &lt;3.0.101-0.7.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132281" version="1" comment="kernel-ec2 is &lt;3.0.101-0.7.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132282" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.7.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132283" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.7.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132284" version="1" comment="kernel-pae is &lt;3.0.101-0.7.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132285" version="1" comment="kernel-pae-base is &lt;3.0.101-0.7.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132286" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.7.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132287" version="1" comment="kernel-source is &lt;3.0.101-0.7.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132288" version="1" comment="kernel-syms is &lt;3.0.101-0.7.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132289" version="1" comment="kernel-trace is &lt;3.0.101-0.7.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132290" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132291" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.7.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132292" version="1" comment="kernel-xen is &lt;3.0.101-0.7.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132293" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132294" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.7.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091963" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091964" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091966" version="1" comment="krb5-doc is &lt;1.6.3-133.49.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091967" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091968" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091970" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113933" version="1" comment="kvm is &lt;0.15.1-0.32.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073928" version="1" comment="ldapsmb is &lt;1.34b-12.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073931" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073934" version="1" comment="libtalloc2-x86 is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073937" version="1" comment="libtdb1-x86 is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073941" version="1" comment="libwbclient0-x86 is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073945" version="1" comment="samba-client-x86 is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073950" version="1" comment="samba-winbind-x86 is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073952" version="1" comment="samba-x86 is &lt;3.6.3-0.24.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076838" version="1" comment="libqt4-qt3support-x86 is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076839" version="1" comment="libqt4-sql-x86 is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076840" version="1" comment="libqt4-x11-x86 is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076841" version="1" comment="libqt4-x86 is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076842" version="1" comment="qt4-x11-tools is &lt;4.6.3-5.20.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076992" version="1" comment="libpq5-x86 is &lt;9.1.9-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104208" version="1" comment="mozilla-nss-devel is &lt;3.16.5-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090227" version="1" comment="libgcrypt11-x86 is &lt;1.5.0-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076524" version="1" comment="mysql-Max is &lt;5.0.96-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076525" version="1" comment="mysql-tools is &lt;5.0.96-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076934" version="1" comment="libopenssl0_9_8-hmac-x86 is &lt;0.9.8j-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092671" version="1" comment="libpixman-1-0-x86 is &lt;0.16.0-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074899" version="1" comment="libsoup-2_4-1-x86 is &lt;2.32.2-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093157" version="1" comment="libxml2-x86 is &lt;2.7.6-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128980" version="1" comment="libxml2-32bit is &lt;2.7.6-0.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128981" version="1" comment="libxml2-doc is &lt;2.7.6-0.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128982" version="1" comment="libxml2-python is &lt;2.7.6-0.44.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142768" version="1" comment="MozillaFirefox is &lt;45.5.1esr-63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142769" version="1" comment="MozillaFirefox-translations is &lt;45.5.1esr-63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142770" version="1" comment="libfreebl3 is &lt;3.21.3-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142771" version="1" comment="libfreebl3-32bit is &lt;3.21.3-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142772" version="1" comment="mozilla-nss is &lt;3.21.3-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142773" version="1" comment="mozilla-nss-32bit is &lt;3.21.3-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142774" version="1" comment="mozilla-nss-devel is &lt;3.21.3-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142775" version="1" comment="mozilla-nss-tools is &lt;3.21.3-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123686" version="1" comment="MozillaFirefox is &lt;38.6.1esr-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123687" version="1" comment="MozillaFirefox-branding-SLED is &lt;38-15.58" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123688" version="1" comment="MozillaFirefox-translations is &lt;38.6.1esr-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123689" version="1" comment="libfreebl3 is &lt;3.20.2-17.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123690" version="1" comment="libfreebl3-32bit is &lt;3.20.2-17.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123691" version="1" comment="mozilla-nss is &lt;3.20.2-17.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123692" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-17.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123693" version="1" comment="mozilla-nss-devel is &lt;3.20.2-17.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123694" version="1" comment="mozilla-nss-tools is &lt;3.20.2-17.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091393" version="1" comment="libfreebl3-x86 is &lt;3.15.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091396" version="1" comment="mozilla-nspr-x86 is &lt;4.10.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091400" version="1" comment="mozilla-nss-x86 is &lt;3.15.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077665" version="1" comment="nagios-nrpe is &lt;2.12-24.4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077664" version="1" comment="nagios-nrpe-doc is &lt;2.12-24.4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077666" version="1" comment="nagios-plugins-nrpe is &lt;2.12-24.4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091769" version="1" comment="libfreebl3-x86 is &lt;3.15.3-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091772" version="1" comment="mozilla-nspr-x86 is &lt;4.10.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091776" version="1" comment="mozilla-nss-x86 is &lt;3.15.3-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112813" version="1" comment="libfreebl3-x86 is &lt;3.15.3.1-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112814" version="1" comment="mozilla-nss-x86 is &lt;3.15.3.1-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127610" version="1" comment="ntp is &lt;4.2.8p6-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127611" version="1" comment="ntp-doc is &lt;4.2.8p6-41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127612" version="1" comment="yast2-ntp-client is &lt;2.17.14.1-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128348" version="1" comment="ntp is &lt;4.2.8p7-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128349" version="1" comment="ntp-doc is &lt;4.2.8p7-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128983" version="1" comment="ntp is &lt;4.2.8p8-47.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128984" version="1" comment="ntp-doc is &lt;4.2.8p8-47.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076300" version="1" comment="openCryptoki-32bit is &lt;2.4-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076301" version="1" comment="openCryptoki-64bit is &lt;2.4-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115378" version="1" comment="openssh is &lt;5.1p1-41.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115379" version="1" comment="openssh-askpass is &lt;5.1p1-41.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115380" version="1" comment="openssh-askpass-gnome is &lt;5.1p1-41.69.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118751" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118752" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118753" version="1" comment="openssl-doc is &lt;0.9.8j-0.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123896" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123897" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123898" version="1" comment="openssl-doc is &lt;0.9.8j-0.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127538" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127539" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127540" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127541" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127542" version="1" comment="openssl-doc is &lt;0.9.8j-0.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132295" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.102.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132296" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.102.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093210" version="1" comment="openswan is &lt;2.6.16-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093209" version="1" comment="openswan-doc is &lt;2.6.16-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091790" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.33.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076781" version="1" comment="perl-x86 is &lt;5.10.0-64.61.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114900" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114901" version="1" comment="php5 is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114902" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114903" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114904" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114905" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114906" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114907" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114908" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114909" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114910" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114911" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114912" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114913" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114914" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114915" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114916" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114917" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114918" version="1" comment="php5-json is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114919" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114920" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114921" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114922" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114923" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114924" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114925" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114926" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114927" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114928" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114929" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114930" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114931" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114932" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114933" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114934" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114935" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114936" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114937" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114938" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114939" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114940" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114941" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114942" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114943" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114944" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132297" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132298" version="1" comment="php5 is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132299" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132300" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132301" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132302" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132303" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132304" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132305" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132306" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132307" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132308" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132309" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132310" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132311" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132312" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132313" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132314" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132315" version="1" comment="php5-json is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132316" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132317" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132318" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132319" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132320" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132321" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132322" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132323" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132324" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132325" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132326" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132327" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132328" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132329" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132330" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132331" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132332" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132333" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132334" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132335" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132336" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132337" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132338" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132339" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132340" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132341" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129101" version="1" comment="apache2-mod_php53 is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129102" version="1" comment="php53 is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129103" version="1" comment="php53-bcmath is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129104" version="1" comment="php53-bz2 is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129105" version="1" comment="php53-calendar is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129106" version="1" comment="php53-ctype is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129107" version="1" comment="php53-curl is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129108" version="1" comment="php53-dba is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129109" version="1" comment="php53-dom is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129110" version="1" comment="php53-exif is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129111" version="1" comment="php53-fastcgi is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129112" version="1" comment="php53-fileinfo is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129113" version="1" comment="php53-ftp is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129114" version="1" comment="php53-gd is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129115" version="1" comment="php53-gettext is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129116" version="1" comment="php53-gmp is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129117" version="1" comment="php53-iconv is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129118" version="1" comment="php53-intl is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129119" version="1" comment="php53-json is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129120" version="1" comment="php53-ldap is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129121" version="1" comment="php53-mbstring is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129122" version="1" comment="php53-mcrypt is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129123" version="1" comment="php53-mysql is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129124" version="1" comment="php53-odbc is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129125" version="1" comment="php53-openssl is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129126" version="1" comment="php53-pcntl is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129127" version="1" comment="php53-pdo is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129128" version="1" comment="php53-pear is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129129" version="1" comment="php53-pgsql is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129130" version="1" comment="php53-pspell is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129131" version="1" comment="php53-shmop is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129132" version="1" comment="php53-snmp is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129133" version="1" comment="php53-soap is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129134" version="1" comment="php53-suhosin is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129135" version="1" comment="php53-sysvmsg is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129136" version="1" comment="php53-sysvsem is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129137" version="1" comment="php53-sysvshm is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129138" version="1" comment="php53-tokenizer is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129139" version="1" comment="php53-wddx is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129140" version="1" comment="php53-xmlreader is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129141" version="1" comment="php53-xmlrpc is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129142" version="1" comment="php53-xmlwriter is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129143" version="1" comment="php53-xsl is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129144" version="1" comment="php53-zip is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129145" version="1" comment="php53-zlib is &lt;5.3.17-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132342" version="1" comment="apache2-mod_php53 is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132343" version="1" comment="php53 is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132344" version="1" comment="php53-bcmath is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132345" version="1" comment="php53-bz2 is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132346" version="1" comment="php53-calendar is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132347" version="1" comment="php53-ctype is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132348" version="1" comment="php53-curl is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132349" version="1" comment="php53-dba is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132350" version="1" comment="php53-dom is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132351" version="1" comment="php53-exif is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132352" version="1" comment="php53-fastcgi is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132353" version="1" comment="php53-fileinfo is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132354" version="1" comment="php53-ftp is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132355" version="1" comment="php53-gd is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132356" version="1" comment="php53-gettext is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132357" version="1" comment="php53-gmp is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132358" version="1" comment="php53-iconv is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132359" version="1" comment="php53-intl is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132360" version="1" comment="php53-json is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132361" version="1" comment="php53-ldap is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132362" version="1" comment="php53-mbstring is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132363" version="1" comment="php53-mcrypt is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132364" version="1" comment="php53-mysql is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132365" version="1" comment="php53-odbc is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132366" version="1" comment="php53-openssl is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132367" version="1" comment="php53-pcntl is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132368" version="1" comment="php53-pdo is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132369" version="1" comment="php53-pear is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132370" version="1" comment="php53-pgsql is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132371" version="1" comment="php53-pspell is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132372" version="1" comment="php53-shmop is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132373" version="1" comment="php53-snmp is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132374" version="1" comment="php53-soap is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132375" version="1" comment="php53-suhosin is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132376" version="1" comment="php53-sysvmsg is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132377" version="1" comment="php53-sysvsem is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132378" version="1" comment="php53-sysvshm is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132379" version="1" comment="php53-tokenizer is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132380" version="1" comment="php53-wddx is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132381" version="1" comment="php53-xmlreader is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132382" version="1" comment="php53-xmlrpc is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132383" version="1" comment="php53-xmlwriter is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132384" version="1" comment="php53-xsl is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132385" version="1" comment="php53-zip is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132386" version="1" comment="php53-zlib is &lt;5.3.17-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132387" version="1" comment="apache2-mod_php53 is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132388" version="1" comment="php53 is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132389" version="1" comment="php53-bcmath is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132390" version="1" comment="php53-bz2 is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132391" version="1" comment="php53-calendar is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132392" version="1" comment="php53-ctype is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132393" version="1" comment="php53-curl is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132394" version="1" comment="php53-dba is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132395" version="1" comment="php53-dom is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132396" version="1" comment="php53-exif is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132397" version="1" comment="php53-fastcgi is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132398" version="1" comment="php53-fileinfo is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132399" version="1" comment="php53-ftp is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132400" version="1" comment="php53-gd is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132401" version="1" comment="php53-gettext is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132402" version="1" comment="php53-gmp is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132403" version="1" comment="php53-iconv is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132404" version="1" comment="php53-intl is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132405" version="1" comment="php53-json is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132406" version="1" comment="php53-ldap is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132407" version="1" comment="php53-mbstring is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132408" version="1" comment="php53-mcrypt is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132409" version="1" comment="php53-mysql is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132410" version="1" comment="php53-odbc is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132411" version="1" comment="php53-openssl is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132412" version="1" comment="php53-pcntl is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132413" version="1" comment="php53-pdo is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132414" version="1" comment="php53-pear is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132415" version="1" comment="php53-pgsql is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132416" version="1" comment="php53-pspell is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132417" version="1" comment="php53-shmop is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132418" version="1" comment="php53-snmp is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132419" version="1" comment="php53-soap is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132420" version="1" comment="php53-suhosin is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132421" version="1" comment="php53-sysvmsg is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132422" version="1" comment="php53-sysvsem is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132423" version="1" comment="php53-sysvshm is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132424" version="1" comment="php53-tokenizer is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132425" version="1" comment="php53-wddx is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132426" version="1" comment="php53-xmlreader is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132427" version="1" comment="php53-xmlrpc is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132428" version="1" comment="php53-xmlwriter is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132429" version="1" comment="php53-xsl is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132430" version="1" comment="php53-zip is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132431" version="1" comment="php53-zlib is &lt;5.3.17-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074240" version="1" comment="popt-x86 is &lt;1.7-37.50.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093159" version="1" comment="puppet-server is &lt;2.6.18-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091152" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091156" version="1" comment="python-base-x86 is &lt;2.6.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091163" version="1" comment="python-x86 is &lt;2.6.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075495" version="1" comment="quota-nfs is &lt;3.16-50.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119838" version="1" comment="ldapsmb is &lt;1.34b-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119839" version="1" comment="libldb1 is &lt;3.6.3-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119840" version="1" comment="libsmbclient0 is &lt;3.6.3-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119841" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119842" version="1" comment="libtalloc2 is &lt;3.6.3-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119843" version="1" comment="libtalloc2-32bit is &lt;3.6.3-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119844" version="1" comment="libtdb1 is &lt;3.6.3-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119845" version="1" comment="libtdb1-32bit is &lt;3.6.3-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119846" version="1" comment="libtevent0 is &lt;3.6.3-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119847" version="1" comment="libtevent0-32bit is &lt;3.6.3-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119848" version="1" comment="libwbclient0 is &lt;3.6.3-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119849" version="1" comment="libwbclient0-32bit is &lt;3.6.3-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119850" version="1" comment="samba is &lt;3.6.3-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119851" version="1" comment="samba-32bit is &lt;3.6.3-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119852" version="1" comment="samba-client is &lt;3.6.3-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119853" version="1" comment="samba-client-32bit is &lt;3.6.3-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119854" version="1" comment="samba-doc is &lt;3.6.3-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119855" version="1" comment="samba-krb-printing is &lt;3.6.3-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119856" version="1" comment="samba-winbind is &lt;3.6.3-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119857" version="1" comment="samba-winbind-32bit is &lt;3.6.3-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125333" version="1" comment="ldapsmb is &lt;1.34b-48.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125334" version="1" comment="libldb1 is &lt;3.6.3-48.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125335" version="1" comment="libsmbclient0 is &lt;3.6.3-48.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125484" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-48.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125336" version="1" comment="libtalloc2 is &lt;3.6.3-48.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125485" version="1" comment="libtalloc2-32bit is &lt;3.6.3-48.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125337" version="1" comment="libtdb1 is &lt;3.6.3-48.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125486" version="1" comment="libtdb1-32bit is &lt;3.6.3-48.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125338" version="1" comment="libtevent0 is &lt;3.6.3-48.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125487" version="1" comment="libtevent0-32bit is &lt;3.6.3-48.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125339" version="1" comment="libwbclient0 is &lt;3.6.3-48.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125488" version="1" comment="libwbclient0-32bit is &lt;3.6.3-48.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125340" version="1" comment="samba is &lt;3.6.3-48.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125489" version="1" comment="samba-32bit is &lt;3.6.3-48.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125341" version="1" comment="samba-client is &lt;3.6.3-48.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125490" version="1" comment="samba-client-32bit is &lt;3.6.3-48.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125342" version="1" comment="samba-doc is &lt;3.6.3-48.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125343" version="1" comment="samba-krb-printing is &lt;3.6.3-48.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125344" version="1" comment="samba-winbind is &lt;3.6.3-48.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125491" version="1" comment="samba-winbind-32bit is &lt;3.6.3-48.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126095" version="1" comment="ldapsmb is &lt;1.34b-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126096" version="1" comment="libldb1 is &lt;3.6.3-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126097" version="1" comment="libsmbclient0 is &lt;3.6.3-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126098" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126099" version="1" comment="libtalloc2 is &lt;3.6.3-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126100" version="1" comment="libtalloc2-32bit is &lt;3.6.3-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126101" version="1" comment="libtdb1 is &lt;3.6.3-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126102" version="1" comment="libtdb1-32bit is &lt;3.6.3-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126103" version="1" comment="libtevent0 is &lt;3.6.3-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126104" version="1" comment="libtevent0-32bit is &lt;3.6.3-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126105" version="1" comment="libwbclient0 is &lt;3.6.3-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126106" version="1" comment="libwbclient0-32bit is &lt;3.6.3-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126107" version="1" comment="samba is &lt;3.6.3-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126108" version="1" comment="samba-32bit is &lt;3.6.3-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126109" version="1" comment="samba-client is &lt;3.6.3-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126110" version="1" comment="samba-client-32bit is &lt;3.6.3-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126111" version="1" comment="samba-doc is &lt;3.6.3-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126112" version="1" comment="samba-krb-printing is &lt;3.6.3-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126113" version="1" comment="samba-winbind is &lt;3.6.3-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126114" version="1" comment="samba-winbind-32bit is &lt;3.6.3-52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146109" version="1" comment="ldapsmb is &lt;1.34b-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146110" version="1" comment="libldb1 is &lt;3.6.3-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146111" version="1" comment="libsmbclient0 is &lt;3.6.3-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146112" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146113" version="1" comment="libtalloc2 is &lt;3.6.3-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146114" version="1" comment="libtalloc2-32bit is &lt;3.6.3-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146115" version="1" comment="libtdb1 is &lt;3.6.3-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146116" version="1" comment="libtdb1-32bit is &lt;3.6.3-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146117" version="1" comment="libtevent0 is &lt;3.6.3-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146118" version="1" comment="libtevent0-32bit is &lt;3.6.3-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146119" version="1" comment="libwbclient0 is &lt;3.6.3-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146120" version="1" comment="libwbclient0-32bit is &lt;3.6.3-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146121" version="1" comment="samba is &lt;3.6.3-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146122" version="1" comment="samba-32bit is &lt;3.6.3-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146123" version="1" comment="samba-client is &lt;3.6.3-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146124" version="1" comment="samba-client-32bit is &lt;3.6.3-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146125" version="1" comment="samba-doc is &lt;3.6.3-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146126" version="1" comment="samba-krb-printing is &lt;3.6.3-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146127" version="1" comment="samba-winbind is &lt;3.6.3-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146128" version="1" comment="samba-winbind-32bit is &lt;3.6.3-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077103" version="1" comment="stunnel is &lt;4.36-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090300" version="1" comment="tomcat6 is &lt;6.0.18-20.35.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090293" version="1" comment="tomcat6-admin-webapps is &lt;6.0.18-20.35.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090294" version="1" comment="tomcat6-docs-webapp is &lt;6.0.18-20.35.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090295" version="1" comment="tomcat6-javadoc is &lt;6.0.18-20.35.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090296" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.18-20.35.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090297" version="1" comment="tomcat6-lib is &lt;6.0.18-20.35.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090298" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.18-20.35.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090299" version="1" comment="tomcat6-webapps is &lt;6.0.18-20.35.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109867" version="1" comment="xen-devel is &lt;4.1.6_08-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103996" version="1" comment="xen is &lt;4.1.6_08-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103986" version="1" comment="xen-devel is &lt;4.1.6_08-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103987" version="1" comment="xen-doc-html is &lt;4.1.6_08-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103988" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103989" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.23-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103990" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.23-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103991" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.23-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103993" version="1" comment="xen-libs is &lt;4.1.6_08-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103992" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103995" version="1" comment="xen-tools is &lt;4.1.6_08-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103994" version="1" comment="xen-tools-domU is &lt;4.1.6_08-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116109" version="1" comment="xen is &lt;4.1.6_08-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116110" version="1" comment="xen-devel is &lt;4.1.6_08-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116111" version="1" comment="xen-doc-html is &lt;4.1.6_08-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116112" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116113" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.37-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116119" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.37-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116114" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.37-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116116" version="1" comment="xen-libs is &lt;4.1.6_08-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116115" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116117" version="1" comment="xen-tools is &lt;4.1.6_08-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116118" version="1" comment="xen-tools-domU is &lt;4.1.6_08-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126781" version="1" comment="xen is &lt;4.1.6_08-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126782" version="1" comment="xen-devel is &lt;4.1.6_08-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126783" version="1" comment="xen-doc-html is &lt;4.1.6_08-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126784" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126785" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.37-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126786" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.37-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126787" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.37-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126788" version="1" comment="xen-libs is &lt;4.1.6_08-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126789" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126790" version="1" comment="xen-tools is &lt;4.1.6_08-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126791" version="1" comment="xen-tools-domU is &lt;4.1.6_08-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132432" version="1" comment="xen is &lt;4.1.6_08-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132433" version="1" comment="xen-devel is &lt;4.1.6_08-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132434" version="1" comment="xen-doc-html is &lt;4.1.6_08-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132435" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132436" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.40-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132437" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.40-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132438" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.40-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132439" version="1" comment="xen-libs is &lt;4.1.6_08-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132440" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132441" version="1" comment="xen-tools is &lt;4.1.6_08-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132442" version="1" comment="xen-tools-domU is &lt;4.1.6_08-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136696" version="1" comment="xen is &lt;4.1.6_08-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136697" version="1" comment="xen-devel is &lt;4.1.6_08-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136698" version="1" comment="xen-doc-html is &lt;4.1.6_08-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136699" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136700" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.44-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136701" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.44-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136702" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.44-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136703" version="1" comment="xen-libs is &lt;4.1.6_08-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136704" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136705" version="1" comment="xen-tools is &lt;4.1.6_08-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136706" version="1" comment="xen-tools-domU is &lt;4.1.6_08-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103976" version="1" comment="xen is &lt;4.1.6_06-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112864" version="1" comment="xen-devel is &lt;4.1.6_06-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103967" version="1" comment="xen-doc-html is &lt;4.1.6_06-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103968" version="1" comment="xen-doc-pdf is &lt;4.1.6_06-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103969" version="1" comment="xen-kmp-default is &lt;4.1.6_06_3.0.101_0.7.17-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103970" version="1" comment="xen-kmp-pae is &lt;4.1.6_06_3.0.101_0.7.17-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103971" version="1" comment="xen-kmp-trace is &lt;4.1.6_06_3.0.101_0.7.17-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103973" version="1" comment="xen-libs is &lt;4.1.6_06-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103972" version="1" comment="xen-libs-32bit is &lt;4.1.6_06-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103975" version="1" comment="xen-tools is &lt;4.1.6_06-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103974" version="1" comment="xen-tools-domU is &lt;4.1.6_06-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108964" version="1" comment="xen is &lt;4.1.6_08-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108954" version="1" comment="xen-devel is &lt;4.1.6_08-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108955" version="1" comment="xen-doc-html is &lt;4.1.6_08-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108956" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108957" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.29-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108958" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.29-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108959" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.29-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108961" version="1" comment="xen-libs is &lt;4.1.6_08-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108960" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108963" version="1" comment="xen-tools is &lt;4.1.6_08-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108962" version="1" comment="xen-tools-domU is &lt;4.1.6_08-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110782" version="1" comment="xen is &lt;4.1.6_08-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110772" version="1" comment="xen-devel is &lt;4.1.6_08-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110773" version="1" comment="xen-doc-html is &lt;4.1.6_08-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110774" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110775" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.29-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110776" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.29-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110777" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.29-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110779" version="1" comment="xen-libs is &lt;4.1.6_08-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110778" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110781" version="1" comment="xen-tools is &lt;4.1.6_08-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110780" version="1" comment="xen-tools-domU is &lt;4.1.6_08-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118590" version="1" comment="xen is &lt;4.1.6_08-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118591" version="1" comment="xen-devel is &lt;4.1.6_08-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118592" version="1" comment="xen-doc-html is &lt;4.1.6_08-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118593" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118594" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.37-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118595" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.37-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118596" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.37-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118597" version="1" comment="xen-libs is &lt;4.1.6_08-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118598" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118599" version="1" comment="xen-tools is &lt;4.1.6_08-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118600" version="1" comment="xen-tools-domU is &lt;4.1.6_08-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093464" version="1" comment="xorg-x11-libs-x86 is &lt;7.4-8.26.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077516" version="1" comment="xorg-x11-libXext-x86 is &lt;7.4-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077517" version="1" comment="xorg-x11-libXfixes-x86 is &lt;7.4-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077519" version="1" comment="xorg-x11-libXrender-x86 is &lt;7.4-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077522" version="1" comment="xorg-x11-libXt-x86 is &lt;7.4-1.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077520" version="1" comment="xorg-x11-libXv-x86 is &lt;7.4-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077524" version="1" comment="xorg-x11-libxcb-x86 is &lt;7.4-1.22.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098654" version="1" comment="libfreebl3-x86 is &lt;3.16.1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098657" version="1" comment="libsoftokn3-x86 is &lt;3.16.1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098660" version="1" comment="mozilla-nspr-x86 is &lt;4.10.6-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098664" version="1" comment="mozilla-nss-x86 is &lt;3.16.1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132443" version="1" comment="sles-release is ==3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077580" version="1" comment="Mesa-x86 is &lt;9.0.3-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127939" version="1" comment="MozillaFirefox-translations is &lt;38.8.0esr-40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127940" version="1" comment="libfreebl3 is &lt;3.20.2-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127941" version="1" comment="libfreebl3-32bit is &lt;3.20.2-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127942" version="1" comment="libsoftokn3 is &lt;3.20.2-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127943" version="1" comment="libsoftokn3-32bit is &lt;3.20.2-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127944" version="1" comment="mozilla-nspr-32bit is &lt;4.12-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127945" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127946" version="1" comment="mozilla-nss-tools is &lt;3.20.2-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130060" version="1" comment="libfreebl3-32bit is &lt;3.21.1-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130061" version="1" comment="libsoftokn3-32bit is &lt;3.21.1-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130062" version="1" comment="mozilla-nspr-32bit is &lt;4.12-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130063" version="1" comment="mozilla-nss-32bit is &lt;3.21.1-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098635" version="1" comment="libfreebl3-x86 is &lt;3.16-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098638" version="1" comment="libsoftokn3-x86 is &lt;3.16-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098648" version="1" comment="mozilla-nspr-x86 is &lt;4.10.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098642" version="1" comment="mozilla-nss-x86 is &lt;3.16-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111626" version="1" comment="libfreebl3-x86 is &lt;3.19.2_CKBI_1.98-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111629" version="1" comment="libsoftokn3-x86 is &lt;3.19.2_CKBI_1.98-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111602" version="1" comment="mozilla-nspr-x86 is &lt;4.10.8-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111635" version="1" comment="mozilla-nss-x86 is &lt;3.19.2_CKBI_1.98-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101728" version="1" comment="apache2-mod_php53 is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112875" version="1" comment="php53 is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101729" version="1" comment="php53-bcmath is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101730" version="1" comment="php53-bz2 is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101731" version="1" comment="php53-calendar is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101732" version="1" comment="php53-ctype is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101733" version="1" comment="php53-curl is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101734" version="1" comment="php53-dba is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101735" version="1" comment="php53-dom is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101736" version="1" comment="php53-exif is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101737" version="1" comment="php53-fastcgi is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101738" version="1" comment="php53-fileinfo is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101739" version="1" comment="php53-ftp is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101740" version="1" comment="php53-gd is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101741" version="1" comment="php53-gettext is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101742" version="1" comment="php53-gmp is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101743" version="1" comment="php53-iconv is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101744" version="1" comment="php53-intl is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101745" version="1" comment="php53-json is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101746" version="1" comment="php53-ldap is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101747" version="1" comment="php53-mbstring is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101748" version="1" comment="php53-mcrypt is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101749" version="1" comment="php53-mysql is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101750" version="1" comment="php53-odbc is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101751" version="1" comment="php53-openssl is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101752" version="1" comment="php53-pcntl is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101753" version="1" comment="php53-pdo is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101754" version="1" comment="php53-pear is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101755" version="1" comment="php53-pgsql is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101756" version="1" comment="php53-pspell is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101757" version="1" comment="php53-shmop is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101758" version="1" comment="php53-snmp is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101759" version="1" comment="php53-soap is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101760" version="1" comment="php53-suhosin is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101761" version="1" comment="php53-sysvmsg is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101762" version="1" comment="php53-sysvsem is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101763" version="1" comment="php53-sysvshm is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101764" version="1" comment="php53-tokenizer is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101765" version="1" comment="php53-wddx is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101766" version="1" comment="php53-xmlreader is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101767" version="1" comment="php53-xmlrpc is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101768" version="1" comment="php53-xmlwriter is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101769" version="1" comment="php53-xsl is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101770" version="1" comment="php53-zip is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101771" version="1" comment="php53-zlib is &lt;5.3.17-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115108" version="1" comment="augeas-lenses is &lt;0.9.0-3.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100816" version="1" comment="bash-x86 is &lt;3.2-147.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100819" version="1" comment="libreadline5-x86 is &lt;5.2-147.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111614" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114117" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119496" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121676" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149119" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098525" version="1" comment="ldapsmb is &lt;1.34b-12.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098528" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098531" version="1" comment="libtalloc2-x86 is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098534" version="1" comment="libtdb1-x86 is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098539" version="1" comment="libwbclient0-x86 is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098543" version="1" comment="samba-client-x86 is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098548" version="1" comment="samba-winbind-x86 is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098550" version="1" comment="samba-x86 is &lt;3.6.3-0.52.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099549" version="1" comment="cups-libs-x86 is &lt;1.3.9-8.46.52.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098957" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122384" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132444" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107515" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122257" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122258" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113471" version="1" comment="libblkid1-x86 is &lt;2.19.1-6.62.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113472" version="1" comment="libcom_err2-x86 is &lt;1.41.9-2.10.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113473" version="1" comment="libuuid1-x86 is &lt;2.19.1-6.62.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122259" version="1" comment="ecryptfs-utils-x86 is &lt;61-1.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093484" version="1" comment="libfreebl3-x86 is &lt;3.15.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093487" version="1" comment="libsoftokn3-x86 is &lt;3.15.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093491" version="1" comment="mozilla-nss-x86 is &lt;3.15.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099237" version="1" comment="libfreebl3-x86 is &lt;3.16.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099240" version="1" comment="libsoftokn3-x86 is &lt;3.16.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099244" version="1" comment="mozilla-nss-x86 is &lt;3.16.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099993" version="1" comment="libfreebl3-x86 is &lt;3.16.4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099996" version="1" comment="libsoftokn3-x86 is &lt;3.16.4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099999" version="1" comment="mozilla-nspr-x86 is &lt;4.10.7-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100003" version="1" comment="mozilla-nss-x86 is &lt;3.16.4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114793" version="1" comment="mozilla-nspr-x86 is &lt;4.10.9-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116728" version="1" comment="MozillaFirefox-branding-SLES-for-VMware is &lt;38-10.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116729" version="1" comment="libfreebl3-x86 is &lt;3.19.2.1-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116730" version="1" comment="libsoftokn3-x86 is &lt;3.19.2.1-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116731" version="1" comment="mozilla-nspr-x86 is &lt;4.10.10-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116732" version="1" comment="mozilla-nss-x86 is &lt;3.19.2.1-19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092103" version="1" comment="libfreebl3-x86 is &lt;3.15.3.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092106" version="1" comment="libsoftokn3-x86 is &lt;3.15.3.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092110" version="1" comment="mozilla-nss-x86 is &lt;3.15.3.1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116733" version="1" comment="MozillaFirefox-branding-SLES-for-VMware is &lt;31.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101269" version="1" comment="libfreebl3-x86 is &lt;3.17.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101270" version="1" comment="libsoftokn3-x86 is &lt;3.17.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101272" version="1" comment="mozilla-nss-x86 is &lt;3.17.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116734" version="1" comment="MozillaFirefox-branding-SLES-for-VMware is &lt;31.0-0.7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114299" version="1" comment="libfreebl3-x86 is &lt;3.19.2.0-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114300" version="1" comment="libsoftokn3-x86 is &lt;3.19.2.0-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114301" version="1" comment="mozilla-nss-x86 is &lt;3.19.2.0-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107585" version="1" comment="freetype2-x86 is &lt;2.3.7-25.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121677" version="1" comment="giflib-progs is &lt;4.1.6-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121678" version="1" comment="giflib-x86 is &lt;4.1.6-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100154" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.72.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100158" version="1" comment="glibc-profile is &lt;2.11.3-17.72.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100156" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.72.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100157" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.72.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100159" version="1" comment="glibc-x86 is &lt;2.11.3-17.72.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113947" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.87.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113943" version="1" comment="glibc-profile is &lt;2.11.3-17.87.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113944" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.87.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113948" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.87.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113949" version="1" comment="glibc-x86 is &lt;2.11.3-17.87.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122385" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.95.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122386" version="1" comment="glibc-profile is &lt;2.11.3-17.95.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122387" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.95.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122388" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.95.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122389" version="1" comment="glibc-x86 is &lt;2.11.3-17.95.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098744" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.39.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114302" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.39.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119820" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.39.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115094" version="1" comment="gtk2-doc is &lt;2.18.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115102" version="1" comment="gtk2-x86 is &lt;2.18.9-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121166" version="1" comment="gtk2-doc is &lt;2.18.9-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121167" version="1" comment="gtk2-x86 is &lt;2.18.9-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091196" version="1" comment="guestfs-data is &lt;1.20.4-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091197" version="1" comment="guestfs-tools is &lt;1.20.4-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091198" version="1" comment="guestfsd is &lt;1.20.4-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091199" version="1" comment="libguestfs0 is &lt;1.20.4-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110709" version="1" comment="libicu-doc is &lt;4.0-7.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110710" version="1" comment="libicu-x86 is &lt;4.0-7.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113485" version="1" comment="ipsec-tools is &lt;0.7.3-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121118" version="1" comment="jakarta-commons-collections is &lt;3.2.2-88.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121119" version="1" comment="jakarta-commons-collections-javadoc is &lt;3.2.2-88.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121120" version="1" comment="jakarta-commons-collections-tomcat5 is &lt;3.2.2-88.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102356" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102357" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102358" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124763" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.20-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124764" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.20-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124765" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.20-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124766" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.20-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124767" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.20-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124768" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.20-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102363" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr8.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102360" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr8.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102361" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr8.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102362" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr8.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124379" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr9.30-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124380" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr9.30-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124381" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr9.30-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124382" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr9.30-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107757" version="1" comment="kde4-l10n-bg is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107758" version="1" comment="kde4-l10n-ca is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107759" version="1" comment="kde4-l10n-csb is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107760" version="1" comment="kde4-l10n-el is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107761" version="1" comment="kde4-l10n-et is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107762" version="1" comment="kde4-l10n-eu is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107763" version="1" comment="kde4-l10n-fi is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107764" version="1" comment="kde4-l10n-ga is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107765" version="1" comment="kde4-l10n-gl is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107766" version="1" comment="kde4-l10n-hi is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107767" version="1" comment="kde4-l10n-is is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107768" version="1" comment="kde4-l10n-kk is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107769" version="1" comment="kde4-l10n-km is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107770" version="1" comment="kde4-l10n-ku is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107771" version="1" comment="kde4-l10n-lt is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107772" version="1" comment="kde4-l10n-lv is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107773" version="1" comment="kde4-l10n-mk is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107774" version="1" comment="kde4-l10n-ml is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107775" version="1" comment="kde4-l10n-nds is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107776" version="1" comment="kde4-l10n-nn is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107777" version="1" comment="kde4-l10n-pa is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107778" version="1" comment="kde4-l10n-ro is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107779" version="1" comment="kde4-l10n-sl is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107780" version="1" comment="kde4-l10n-th is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107781" version="1" comment="kde4-l10n-tr is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107782" version="1" comment="kde4-l10n-uk is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107783" version="1" comment="kde4-l10n-wa is &lt;4.3.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112903" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112904" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100999" version="1" comment="kernel-default-man is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101011" version="1" comment="kernel-ec2 is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101009" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101010" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101008" version="1" comment="kernel-ppc64 is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101006" version="1" comment="kernel-ppc64-base is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101007" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101005" version="1" comment="kernel-trace is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101003" version="1" comment="kernel-trace-base is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132445" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132446" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132447" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132448" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145712" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145713" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145714" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145715" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114467" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114485" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114471" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114472" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114473" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114463" version="1" comment="kernel-ppc64 is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114481" version="1" comment="kernel-ppc64-base is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114482" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114477" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127096" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127097" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127098" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127099" version="1" comment="kernel-default is &lt;3.0.101-0.47.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127100" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127101" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127102" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127103" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127104" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127105" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127106" version="1" comment="kernel-pae is &lt;3.0.101-0.47.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127107" version="1" comment="kernel-pae-base is &lt;3.0.101-0.47.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127108" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.47.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127109" version="1" comment="kernel-source is &lt;3.0.101-0.47.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127110" version="1" comment="kernel-syms is &lt;3.0.101-0.47.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127111" version="1" comment="kernel-trace is &lt;3.0.101-0.47.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127112" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127113" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127114" version="1" comment="kernel-xen is &lt;3.0.101-0.47.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127115" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127116" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101016" version="1" comment="iscsitarget-kmp-bigsmp is &lt;1.4.20_3.0.101_0.40-0.38.83" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101019" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101017" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101020" version="1" comment="ofed-kmp-bigsmp is &lt;1.5.4.1_3.0.101_0.40-0.13.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101021" version="1" comment="oracleasm-kmp-bigsmp is &lt;2.0.5_3.0.101_0.40-7.39.89" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117927" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117949" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117922" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117923" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117924" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117905" version="1" comment="kernel-ppc64 is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117906" version="1" comment="kernel-ppc64-base is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117907" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117911" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132449" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132450" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132451" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132452" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099569" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099570" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099572" version="1" comment="krb5-doc is &lt;1.6.3-133.49.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099573" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099574" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099576" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115953" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115954" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115956" version="1" comment="krb5-doc is &lt;1.6.3-133.49.97.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115957" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.97.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115958" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.97.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115959" version="1" comment="krb5-plugins is &lt;1.6.3-133.49.97.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115961" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117950" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117951" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117952" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101411" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101412" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101413" version="1" comment="krb5-doc is &lt;1.6.3-133.49.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101414" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101415" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101416" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111662" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111663" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111656" version="1" comment="krb5-doc is &lt;1.6.3-133.49.68.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111657" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111658" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111659" version="1" comment="krb5-plugins is &lt;1.6.3-133.49.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111669" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129364" version="1" comment="kvm is &lt;1.4.2-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107532" version="1" comment="libvirt-lock-sanlock is &lt;1.0.5.9-0.19.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093514" version="1" comment="libqt4-qt3support-x86 is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093519" version="1" comment="libqt4-sql-x86 is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093522" version="1" comment="libqt4-x11-x86 is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093524" version="1" comment="libqt4-x86 is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093526" version="1" comment="qt4-x11-tools is &lt;4.6.3-5.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108077" version="1" comment="libblkid1-x86 is &lt;2.19.1-6.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108078" version="1" comment="libuuid1-x86 is &lt;2.19.1-6.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094593" version="1" comment="postgresql91-contrib is &lt;9.1.12-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009094595" version="1" comment="postgresql91-server is &lt;9.1.12-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100803" version="1" comment="libfreebl3-x86 is &lt;3.16.5-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100806" version="1" comment="libsoftokn3-x86 is &lt;3.16.5-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100810" version="1" comment="mozilla-nss-x86 is &lt;3.16.5-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114504" version="1" comment="libgcrypt11-x86 is &lt;1.5.0-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105798" version="1" comment="libjasper-x86 is &lt;1.900.1-134.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099911" version="1" comment="libmysql55client18-x86 is &lt;5.5.39-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099915" version="1" comment="libmysqlclient15-x86 is &lt;5.0.96-0.6.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099919" version="1" comment="mysql-tools is &lt;5.5.39-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101163" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117953" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119821" version="1" comment="libpng12-0-x86 is &lt;1.2.31-5.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099502" version="1" comment="libpulse0-x86 is &lt;0.9.23-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112937" version="1" comment="libqt4-qt3support-x86 is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112938" version="1" comment="libqt4-sql-x86 is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112939" version="1" comment="libqt4-x11-x86 is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112940" version="1" comment="libqt4-x86 is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112919" version="1" comment="qt4-x11-tools is &lt;4.6.3-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115104" version="1" comment="librsvg-x86 is &lt;2.26.0-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116736" version="1" comment="libsndfile-x86 is &lt;1.0.20-2.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098960" version="1" comment="libtasn1-3-x86 is &lt;1.5-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098486" version="1" comment="libvirt-lock-sanlock is &lt;1.0.5.9-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119822" version="1" comment="libxml2-doc is &lt;2.7.6-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119823" version="1" comment="libxml2-x86 is &lt;2.7.6-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121388" version="1" comment="libxml2-doc is &lt;2.7.6-0.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121389" version="1" comment="libxml2-x86 is &lt;2.7.6-0.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148566" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148567" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148568" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148569" version="1" comment="kernel-default-man is &lt;3.0.101-0.47.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142229" version="1" comment="libfreebl3-32bit is &lt;3.21.3-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142230" version="1" comment="libsoftokn3-32bit is &lt;3.21.3-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142231" version="1" comment="mozilla-nss-32bit is &lt;3.21.3-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122554" version="1" comment="libfreebl3-x86 is &lt;3.20.2-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122555" version="1" comment="libsoftokn3-x86 is &lt;3.20.2-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122556" version="1" comment="mozilla-nss-x86 is &lt;3.20.2-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113991" version="1" comment="mozilla-nspr-x86 is &lt;4.10.8-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120795" version="1" comment="libfreebl3-x86 is &lt;3.19.2.2-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120796" version="1" comment="libsoftokn3-x86 is &lt;3.19.2.2-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120797" version="1" comment="mozilla-nss-x86 is &lt;3.19.2.2-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091403" version="1" comment="libfreebl3-x86 is &lt;3.15.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091406" version="1" comment="libsoftokn3-x86 is &lt;3.15.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091410" version="1" comment="mozilla-nss-x86 is &lt;3.15.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115103" version="1" comment="libmysql55client18-x86 is &lt;5.5.45-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115101" version="1" comment="mysql-tools is &lt;5.5.45-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118187" version="1" comment="libmysql55client18-x86 is &lt;5.5.46-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118188" version="1" comment="mysql-tools is &lt;5.5.46-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122390" version="1" comment="libmysql55client18-x86 is &lt;5.5.47-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122391" version="1" comment="mysql-tools is &lt;5.5.47-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132453" version="1" comment="libmysql55client18-32bit is &lt;5.5.52-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148174" version="1" comment="libmysql55client18-32bit is &lt;5.5.54-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114284" version="1" comment="libsnmp15-x86 is &lt;5.4.2.1-8.12.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091779" version="1" comment="libfreebl3-x86 is &lt;3.15.3-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091782" version="1" comment="libsoftokn3-x86 is &lt;3.15.3-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091786" version="1" comment="mozilla-nss-x86 is &lt;3.15.3-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114130" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114136" version="1" comment="libldap-2_4-2-x86 is &lt;2.4.26-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114133" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119858" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-2.62.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119859" version="1" comment="libldap-2_4-2-x86 is &lt;2.4.26-0.62.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119860" version="1" comment="openldap2-back-meta is &lt;2.4.26-0.62.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118754" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149094" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149095" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091788" version="1" comment="openvpn-auth-pam-plugin is &lt;2.0.9-143.40.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098711" version="1" comment="pam-x86 is &lt;1.1.5-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112941" version="1" comment="perl-x86 is &lt;5.10.0-64.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114004" version="1" comment="apache2-mod_php53 is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114006" version="1" comment="php53-bcmath is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114007" version="1" comment="php53-bz2 is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114008" version="1" comment="php53-calendar is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114009" version="1" comment="php53-ctype is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114010" version="1" comment="php53-curl is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114011" version="1" comment="php53-dba is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114012" version="1" comment="php53-dom is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114013" version="1" comment="php53-exif is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114014" version="1" comment="php53-fastcgi is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114015" version="1" comment="php53-fileinfo is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114016" version="1" comment="php53-ftp is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114017" version="1" comment="php53-gd is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114018" version="1" comment="php53-gettext is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114019" version="1" comment="php53-gmp is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114020" version="1" comment="php53-iconv is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114021" version="1" comment="php53-intl is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114022" version="1" comment="php53-json is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114023" version="1" comment="php53-ldap is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114024" version="1" comment="php53-mbstring is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114025" version="1" comment="php53-mcrypt is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114026" version="1" comment="php53-mysql is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114027" version="1" comment="php53-odbc is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114028" version="1" comment="php53-openssl is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114029" version="1" comment="php53-pcntl is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114030" version="1" comment="php53-pdo is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114031" version="1" comment="php53-pear is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114032" version="1" comment="php53-pgsql is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114033" version="1" comment="php53-pspell is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114034" version="1" comment="php53-shmop is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114035" version="1" comment="php53-snmp is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114036" version="1" comment="php53-soap is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114037" version="1" comment="php53-suhosin is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114038" version="1" comment="php53-sysvmsg is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114039" version="1" comment="php53-sysvsem is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114040" version="1" comment="php53-sysvshm is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114041" version="1" comment="php53-tokenizer is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114042" version="1" comment="php53-wddx is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114043" version="1" comment="php53-xmlreader is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114044" version="1" comment="php53-xmlrpc is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114045" version="1" comment="php53-xmlwriter is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114046" version="1" comment="php53-xsl is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114047" version="1" comment="php53-zip is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114048" version="1" comment="php53-zlib is &lt;5.3.17-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115151" version="1" comment="apache2-mod_php53 is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115153" version="1" comment="php53-bcmath is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115154" version="1" comment="php53-bz2 is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115155" version="1" comment="php53-calendar is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115156" version="1" comment="php53-ctype is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115157" version="1" comment="php53-curl is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115158" version="1" comment="php53-dba is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115159" version="1" comment="php53-dom is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115160" version="1" comment="php53-exif is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115161" version="1" comment="php53-fastcgi is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115162" version="1" comment="php53-fileinfo is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115163" version="1" comment="php53-ftp is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115164" version="1" comment="php53-gd is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115165" version="1" comment="php53-gettext is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115166" version="1" comment="php53-gmp is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115167" version="1" comment="php53-iconv is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115168" version="1" comment="php53-intl is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115169" version="1" comment="php53-json is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115170" version="1" comment="php53-ldap is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115171" version="1" comment="php53-mbstring is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115172" version="1" comment="php53-mcrypt is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115173" version="1" comment="php53-mysql is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115174" version="1" comment="php53-odbc is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115175" version="1" comment="php53-openssl is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115176" version="1" comment="php53-pcntl is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115177" version="1" comment="php53-pdo is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115178" version="1" comment="php53-pear is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115179" version="1" comment="php53-pgsql is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115180" version="1" comment="php53-pspell is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115181" version="1" comment="php53-shmop is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115182" version="1" comment="php53-snmp is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115183" version="1" comment="php53-soap is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115184" version="1" comment="php53-suhosin is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115185" version="1" comment="php53-sysvmsg is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115186" version="1" comment="php53-sysvsem is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115187" version="1" comment="php53-sysvshm is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115188" version="1" comment="php53-tokenizer is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115189" version="1" comment="php53-wddx is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115190" version="1" comment="php53-xmlreader is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115191" version="1" comment="php53-xmlrpc is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115192" version="1" comment="php53-xmlwriter is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115193" version="1" comment="php53-xsl is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115194" version="1" comment="php53-zip is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115195" version="1" comment="php53-zlib is &lt;5.3.17-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128826" version="1" comment="apache2-mod_php53 is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128827" version="1" comment="php53-bcmath is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128828" version="1" comment="php53-bz2 is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128829" version="1" comment="php53-calendar is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128830" version="1" comment="php53-ctype is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128831" version="1" comment="php53-curl is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128832" version="1" comment="php53-dba is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128833" version="1" comment="php53-dom is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128834" version="1" comment="php53-exif is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128835" version="1" comment="php53-fastcgi is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128836" version="1" comment="php53-fileinfo is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128837" version="1" comment="php53-ftp is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128838" version="1" comment="php53-gd is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128839" version="1" comment="php53-gettext is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128840" version="1" comment="php53-gmp is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128841" version="1" comment="php53-iconv is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128842" version="1" comment="php53-intl is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128843" version="1" comment="php53-json is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128844" version="1" comment="php53-ldap is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128845" version="1" comment="php53-mbstring is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128846" version="1" comment="php53-mcrypt is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128847" version="1" comment="php53-mysql is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128848" version="1" comment="php53-odbc is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128849" version="1" comment="php53-openssl is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128850" version="1" comment="php53-pcntl is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128851" version="1" comment="php53-pdo is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128852" version="1" comment="php53-pear is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128853" version="1" comment="php53-pgsql is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128854" version="1" comment="php53-pspell is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128855" version="1" comment="php53-shmop is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128856" version="1" comment="php53-snmp is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128857" version="1" comment="php53-soap is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128858" version="1" comment="php53-suhosin is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128859" version="1" comment="php53-sysvmsg is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128860" version="1" comment="php53-sysvsem is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128861" version="1" comment="php53-sysvshm is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128862" version="1" comment="php53-tokenizer is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128863" version="1" comment="php53-wddx is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128864" version="1" comment="php53-xmlreader is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128865" version="1" comment="php53-xmlrpc is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128866" version="1" comment="php53-xmlwriter is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128867" version="1" comment="php53-xsl is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128868" version="1" comment="php53-zip is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128869" version="1" comment="php53-zlib is &lt;5.3.17-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103189" version="1" comment="popt-x86 is &lt;1.7-37.60.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123277" version="1" comment="postgresql94-contrib is &lt;9.4.5-0.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123278" version="1" comment="postgresql94-server is &lt;9.4.5-0.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108219" version="1" comment="postgresql91-contrib is &lt;9.1.15-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108220" version="1" comment="postgresql91-server is &lt;9.1.15-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110600" version="1" comment="postgresql91-contrib is &lt;9.1.18-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110601" version="1" comment="postgresql91-server is &lt;9.1.18-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121796" version="1" comment="postgresql91-contrib is &lt;9.1.19-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121797" version="1" comment="postgresql91-server is &lt;9.1.19-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100731" version="1" comment="powerpc-utils is &lt;1.2.16-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098751" version="1" comment="ppc64-diag is &lt;2.6.1-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098479" version="1" comment="puppet-server is &lt;2.6.18-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102348" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.9-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102349" version="1" comment="python-base-x86 is &lt;2.6.9-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102350" version="1" comment="python-x86 is &lt;2.6.9-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112942" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.9-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112943" version="1" comment="python-base-x86 is &lt;2.6.9-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112944" version="1" comment="python-x86 is &lt;2.6.9-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098669" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.9-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098673" version="1" comment="python-base-x86 is &lt;2.6.9-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098682" version="1" comment="python-x86 is &lt;2.6.9-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099512" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.9-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099516" version="1" comment="python-base-x86 is &lt;2.6.9-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099525" version="1" comment="python-x86 is &lt;2.6.9-0.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125966" version="1" comment="ldapsmb is &lt;1.34b-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125967" version="1" comment="libldb1 is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125968" version="1" comment="libsmbclient0 is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125969" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125970" version="1" comment="libtalloc2 is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125971" version="1" comment="libtalloc2-32bit is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125972" version="1" comment="libtdb1 is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125973" version="1" comment="libtdb1-32bit is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125974" version="1" comment="libtevent0 is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125975" version="1" comment="libtevent0-32bit is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125976" version="1" comment="libwbclient0 is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125977" version="1" comment="libwbclient0-32bit is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125978" version="1" comment="samba-32bit is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125979" version="1" comment="samba-client is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125980" version="1" comment="samba-client-32bit is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125981" version="1" comment="samba-doc is &lt;3.6.3-76.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125982" version="1" comment="samba-krb-printing is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125983" version="1" comment="samba-winbind is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125984" version="1" comment="samba-winbind-32bit is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146129" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146130" version="1" comment="libtalloc2-32bit is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146131" version="1" comment="libtdb1-32bit is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146132" version="1" comment="libtevent0-32bit is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146133" version="1" comment="libwbclient0-32bit is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146134" version="1" comment="samba-32bit is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146135" version="1" comment="samba-client-32bit is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146136" version="1" comment="samba-winbind-32bit is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106612" version="1" comment="ldapsmb is &lt;1.34b-12.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106613" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106614" version="1" comment="libtalloc2-x86 is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106615" version="1" comment="libtdb1-x86 is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106616" version="1" comment="libwbclient0-x86 is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106617" version="1" comment="samba-client-x86 is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106618" version="1" comment="samba-winbind-x86 is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106619" version="1" comment="samba-x86 is &lt;3.6.3-0.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121390" version="1" comment="ldapsmb is &lt;1.34b-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121391" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121392" version="1" comment="libtalloc2-x86 is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121393" version="1" comment="libtdb1-x86 is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121394" version="1" comment="libwbclient0-x86 is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121395" version="1" comment="samba-client-x86 is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121396" version="1" comment="samba-winbind-x86 is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121397" version="1" comment="samba-x86 is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116737" version="1" comment="squid is &lt;2.7.STABLE5-2.12.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113946" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.160.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099537" version="1" comment="libtcnative-1-0 is &lt;1.3.3-12.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106937" version="1" comment="vsftpd is &lt;2.0.7-4.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129753" version="1" comment="xen is &lt;4.2.5_20-24.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129754" version="1" comment="xen-doc-html is &lt;4.2.5_20-24.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129755" version="1" comment="xen-doc-pdf is &lt;4.2.5_20-24.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129756" version="1" comment="xen-kmp-default is &lt;4.2.5_20_3.0.101_0.47.79-24.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129757" version="1" comment="xen-kmp-pae is &lt;4.2.5_20_3.0.101_0.47.79-24.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129758" version="1" comment="xen-libs is &lt;4.2.5_20-24.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129759" version="1" comment="xen-libs-32bit is &lt;4.2.5_20-24.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129760" version="1" comment="xen-tools is &lt;4.2.5_20-24.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129761" version="1" comment="xen-tools-domU is &lt;4.2.5_20-24.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135277" version="1" comment="xen-doc-html is &lt;4.2.5_21-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135278" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135279" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135280" version="1" comment="xen-tools is &lt;4.2.5_21-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145990" version="1" comment="xen-doc-html is &lt;4.2.5_21-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145991" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145992" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145993" version="1" comment="xen-tools is &lt;4.2.5_21-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149675" version="1" comment="xen-doc-html is &lt;4.2.5_21-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149676" version="1" comment="xen-doc-pdf is &lt;4.2.5_21-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149677" version="1" comment="xen-libs-32bit is &lt;4.2.5_21-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149678" version="1" comment="xen-tools is &lt;4.2.5_21-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098576" version="1" comment="xorg-x11-libs-x86 is &lt;7.4-8.26.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113241" version="1" comment="xorg-x11-libX11-x86 is &lt;7.4-5.11.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129922" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129923" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132454" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132455" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136185" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136186" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145856" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145857" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149096" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149097" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127947" version="1" comment="libfreebl3-x86 is &lt;3.20.2-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127948" version="1" comment="libsoftokn3-x86 is &lt;3.20.2-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127949" version="1" comment="mozilla-nspr-x86 is &lt;4.12-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127950" version="1" comment="mozilla-nss-x86 is &lt;3.20.2-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130064" version="1" comment="libfreebl3-x86 is &lt;3.21.1-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130065" version="1" comment="libsoftokn3-x86 is &lt;3.21.1-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130066" version="1" comment="mozilla-nspr-x86 is &lt;4.12-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130067" version="1" comment="mozilla-nss-x86 is &lt;3.21.1-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124769" version="1" comment="libfreebl3-x86 is &lt;3.20.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124770" version="1" comment="libsoftokn3-x86 is &lt;3.20.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124771" version="1" comment="mozilla-nspr-x86 is &lt;4.12-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124772" version="1" comment="mozilla-nss-x86 is &lt;3.20.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128350" version="1" comment="NetworkManager-kde4 is &lt;0.9.svn1043876-1.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128351" version="1" comment="NetworkManager-kde4-lang is &lt;0.9.svn1043876-1.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128352" version="1" comment="NetworkManager-kde4-libs is &lt;0.9.svn1043876-1.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128353" version="1" comment="NetworkManager-openvpn-kde4 is &lt;0.9.svn1043876-1.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128354" version="1" comment="NetworkManager-pptp-kde4 is &lt;0.9.svn1043876-1.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128355" version="1" comment="plasmoid-networkmanagement is &lt;0.9.svn1043876-1.3.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147858" version="1" comment="bash-doc is &lt;3.2-147.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147859" version="1" comment="bash-x86 is &lt;3.2-147.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147860" version="1" comment="libreadline5-32bit is &lt;5.2-147.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147861" version="1" comment="libreadline5-x86 is &lt;5.2-147.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147862" version="1" comment="readline-doc is &lt;5.2-147.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125049" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132456" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135233" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146909" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149120" version="1" comment="bind-libs-x86 is &lt;9.9.6P1-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127857" version="1" comment="rhnlib is &lt;2.5.69.8-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127858" version="1" comment="suseRegisterInfo is &lt;2.1.12-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132457" version="1" comment="cracklib-32bit is &lt;2.8.12-56.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132458" version="1" comment="cracklib-x86 is &lt;2.8.12-56.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132459" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135240" version="1" comment="libcurl4 is &lt;7.19.7-1.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135241" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135242" version="1" comment="libcurl4-x86 is &lt;7.19.7-1.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144569" version="1" comment="dnsmasq is &lt;2.71-0.16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132460" version="1" comment="dosfstools is &lt;3.0.26-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128481" version="1" comment="libexpat1 is &lt;2.0.1-88.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128482" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128483" version="1" comment="libexpat1-x86 is &lt;2.0.1-88.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148220" version="1" comment="libexpat1 is &lt;2.0.1-88.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148221" version="1" comment="libexpat1-32bit is &lt;2.0.1-88.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148222" version="1" comment="libexpat1-x86 is &lt;2.0.1-88.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125345" version="1" comment="fetchmailconf is &lt;6.3.8.90-13.20.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132461" version="1" comment="fontconfig-32bit is &lt;2.6.0-10.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132462" version="1" comment="fontconfig-x86 is &lt;2.6.0-10.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126730" version="1" comment="freetype2-32bit is &lt;2.3.7-25.41.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126731" version="1" comment="freetype2-x86 is &lt;2.3.7-25.41.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126732" version="1" comment="ft2demos is &lt;2.3.7-25.41.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125549" version="1" comment="libatomic1-32bit is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125550" version="1" comment="libffi4 is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125551" version="1" comment="libffi4-32bit is &lt;5.3.1+r233831-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135281" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135282" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135283" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135284" version="1" comment="ghostscript-omni is &lt;8.62-32.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135285" version="1" comment="ghostscript-x11 is &lt;8.62-32.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135286" version="1" comment="libgimpprint is &lt;4.2.7-32.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126733" version="1" comment="giflib-32bit is &lt;4.1.6-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126734" version="1" comment="giflib-progs is &lt;4.1.6-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126735" version="1" comment="giflib-x86 is &lt;4.1.6-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132463" version="1" comment="glibc-32bit is &lt;2.11.3-17.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132464" version="1" comment="glibc-devel is &lt;2.11.3-17.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132465" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132466" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132467" version="1" comment="glibc-locale is &lt;2.11.3-17.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132468" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132469" version="1" comment="glibc-locale-x86 is &lt;2.11.3-17.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132470" version="1" comment="glibc-profile is &lt;2.11.3-17.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132471" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132472" version="1" comment="glibc-profile-x86 is &lt;2.11.3-17.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132473" version="1" comment="glibc-x86 is &lt;2.11.3-17.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132474" version="1" comment="nscd is &lt;2.11.3-17.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147863" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147864" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147865" version="1" comment="libgnutls26-x86 is &lt;2.4.1-24.39.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147777" version="1" comment="gstreamer-0_10-plugins-base-32bit is &lt;0.10.35-5.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147778" version="1" comment="gstreamer-0_10-plugins-base-doc is &lt;0.10.35-5.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147779" version="1" comment="gstreamer-0_10-plugins-base-lang is &lt;0.10.35-5.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147780" version="1" comment="gstreamer-0_10-plugins-base-x86 is &lt;0.10.35-5.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147781" version="1" comment="libgstapp-0_10-0 is &lt;0.10.35-5.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147782" version="1" comment="libgstapp-0_10-0-32bit is &lt;0.10.35-5.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147783" version="1" comment="libgstapp-0_10-0-x86 is &lt;0.10.35-5.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147784" version="1" comment="libgstinterfaces-0_10-0 is &lt;0.10.35-5.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147785" version="1" comment="libgstinterfaces-0_10-0-32bit is &lt;0.10.35-5.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147786" version="1" comment="libgstinterfaces-0_10-0-x86 is &lt;0.10.35-5.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147437" version="1" comment="gstreamer-0_10-plugins-good is &lt;0.10.30-5.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147438" version="1" comment="gstreamer-0_10-plugins-good-doc is &lt;0.10.30-5.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147439" version="1" comment="gstreamer-0_10-plugins-good-lang is &lt;0.10.30-5.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132475" version="1" comment="gtk2-32bit is &lt;2.18.9-0.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132476" version="1" comment="gtk2-doc is &lt;2.18.9-0.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132477" version="1" comment="gtk2-lang is &lt;2.18.9-0.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132478" version="1" comment="gtk2-x86 is &lt;2.18.9-0.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115114" version="1" comment="libicu-doc is &lt;4.0-7.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115115" version="1" comment="libicu-x86 is &lt;4.0-7.30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126445" version="1" comment="libicu is &lt;4.0-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126446" version="1" comment="libicu-doc is &lt;4.0-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126447" version="1" comment="libicu-x86 is &lt;4.0-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147464" version="1" comment="libicu is &lt;4.0-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147465" version="1" comment="libicu-doc is &lt;4.0-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147466" version="1" comment="libicu-x86 is &lt;4.0-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148471" version="1" comment="libicu is &lt;4.0-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148472" version="1" comment="libicu-doc is &lt;4.0-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148473" version="1" comment="libicu-x86 is &lt;4.0-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135432" version="1" comment="libjasper is &lt;1.900.14-134.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135433" version="1" comment="libjasper-32bit is &lt;1.900.14-134.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135434" version="1" comment="libjasper-x86 is &lt;1.900.14-134.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113216" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113215" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113217" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.10-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118318" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.20-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118319" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.20-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118320" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.20-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122557" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.30-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122558" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.30-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122559" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.30-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127568" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.40-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127569" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.40-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127570" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.40-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136707" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.60-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136708" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.60-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136709" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.60-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149679" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr4.1-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149680" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr4.1-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149681" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr4.1-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132479" version="1" comment="java-1_7_1-ibm-alsa is &lt;1.7.1_sr3.50-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132480" version="1" comment="java-1_7_1-ibm-jdbc is &lt;1.7.1_sr3.50-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132481" version="1" comment="java-1_7_1-ibm-plugin is &lt;1.7.1_sr3.50-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132482" version="1" comment="kernel-default is &lt;3.0.101-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132483" version="1" comment="kernel-default-base is &lt;3.0.101-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132484" version="1" comment="kernel-default-devel is &lt;3.0.101-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132485" version="1" comment="kernel-default-man is &lt;3.0.101-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132486" version="1" comment="kernel-ec2 is &lt;3.0.101-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132487" version="1" comment="kernel-ec2-base is &lt;3.0.101-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132488" version="1" comment="kernel-ec2-devel is &lt;3.0.101-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132489" version="1" comment="kernel-pae is &lt;3.0.101-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132490" version="1" comment="kernel-pae-base is &lt;3.0.101-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132491" version="1" comment="kernel-pae-devel is &lt;3.0.101-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132492" version="1" comment="kernel-ppc64 is &lt;3.0.101-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132493" version="1" comment="kernel-ppc64-base is &lt;3.0.101-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132494" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132495" version="1" comment="kernel-source is &lt;3.0.101-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132496" version="1" comment="kernel-syms is &lt;3.0.101-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132497" version="1" comment="kernel-trace is &lt;3.0.101-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132498" version="1" comment="kernel-trace-base is &lt;3.0.101-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132499" version="1" comment="kernel-trace-devel is &lt;3.0.101-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132500" version="1" comment="kernel-xen is &lt;3.0.101-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132501" version="1" comment="kernel-xen-base is &lt;3.0.101-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132502" version="1" comment="kernel-xen-devel is &lt;3.0.101-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136295" version="1" comment="kernel-bigmem is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136296" version="1" comment="kernel-bigmem-base is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136297" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136298" version="1" comment="kernel-default is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136299" version="1" comment="kernel-default-base is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136300" version="1" comment="kernel-default-devel is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136301" version="1" comment="kernel-default-man is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136302" version="1" comment="kernel-ec2 is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136303" version="1" comment="kernel-ec2-base is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136304" version="1" comment="kernel-ec2-devel is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136305" version="1" comment="kernel-pae is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136306" version="1" comment="kernel-pae-base is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136307" version="1" comment="kernel-pae-devel is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136308" version="1" comment="kernel-ppc64 is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136309" version="1" comment="kernel-ppc64-base is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136310" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136311" version="1" comment="kernel-source is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136312" version="1" comment="kernel-syms is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136313" version="1" comment="kernel-trace is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136314" version="1" comment="kernel-trace-base is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136315" version="1" comment="kernel-trace-devel is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136316" version="1" comment="kernel-xen is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136317" version="1" comment="kernel-xen-base is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136318" version="1" comment="kernel-xen-devel is &lt;3.0.101-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148272" version="1" comment="kernel-bigmem is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148273" version="1" comment="kernel-bigmem-base is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148274" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148275" version="1" comment="kernel-default is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148276" version="1" comment="kernel-default-base is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148277" version="1" comment="kernel-default-devel is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148278" version="1" comment="kernel-default-man is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148279" version="1" comment="kernel-ec2 is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148280" version="1" comment="kernel-ec2-base is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148281" version="1" comment="kernel-ec2-devel is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148282" version="1" comment="kernel-pae is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148283" version="1" comment="kernel-pae-base is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148284" version="1" comment="kernel-pae-devel is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148285" version="1" comment="kernel-ppc64 is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148286" version="1" comment="kernel-ppc64-base is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148287" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148288" version="1" comment="kernel-source is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148289" version="1" comment="kernel-syms is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148290" version="1" comment="kernel-trace is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148291" version="1" comment="kernel-trace-base is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148292" version="1" comment="kernel-trace-devel is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148293" version="1" comment="kernel-xen is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148294" version="1" comment="kernel-xen-base is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148295" version="1" comment="kernel-xen-devel is &lt;3.0.101-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114802" version="1" comment="kernel-default-man is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114803" version="1" comment="kernel-ec2 is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114804" version="1" comment="kernel-ec2-base is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114805" version="1" comment="kernel-ec2-devel is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114783" version="1" comment="kernel-ppc64 is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114800" version="1" comment="kernel-ppc64-base is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114801" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114798" version="1" comment="kernel-trace-base is &lt;3.0.101-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125552" version="1" comment="kernel-default-man is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125553" version="1" comment="kernel-ec2 is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125554" version="1" comment="kernel-ec2-base is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125555" version="1" comment="kernel-ec2-devel is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125556" version="1" comment="kernel-ppc64 is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125557" version="1" comment="kernel-ppc64-base is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125558" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125559" version="1" comment="kernel-trace-base is &lt;3.0.101-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118647" version="1" comment="kernel-default-man is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118648" version="1" comment="kernel-ec2 is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118649" version="1" comment="kernel-ec2-base is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118650" version="1" comment="kernel-ec2-devel is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118651" version="1" comment="kernel-ppc64 is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118652" version="1" comment="kernel-ppc64-base is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118653" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118654" version="1" comment="kernel-trace-base is &lt;3.0.101-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129235" version="1" comment="kernel-default is &lt;3.0.101-77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129236" version="1" comment="kernel-default-base is &lt;3.0.101-77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129237" version="1" comment="kernel-default-devel is &lt;3.0.101-77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129238" version="1" comment="kernel-default-man is &lt;3.0.101-77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129239" version="1" comment="kernel-ec2 is &lt;3.0.101-77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129240" version="1" comment="kernel-ec2-base is &lt;3.0.101-77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129241" version="1" comment="kernel-ec2-devel is &lt;3.0.101-77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129242" version="1" comment="kernel-pae is &lt;3.0.101-77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129243" version="1" comment="kernel-pae-base is &lt;3.0.101-77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129244" version="1" comment="kernel-pae-devel is &lt;3.0.101-77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129245" version="1" comment="kernel-ppc64 is &lt;3.0.101-77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129246" version="1" comment="kernel-ppc64-base is &lt;3.0.101-77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129247" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129248" version="1" comment="kernel-source is &lt;3.0.101-77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129249" version="1" comment="kernel-syms is &lt;3.0.101-77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129250" version="1" comment="kernel-trace is &lt;3.0.101-77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129251" version="1" comment="kernel-trace-base is &lt;3.0.101-77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129252" version="1" comment="kernel-trace-devel is &lt;3.0.101-77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129253" version="1" comment="kernel-xen is &lt;3.0.101-77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129254" version="1" comment="kernel-xen-base is &lt;3.0.101-77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129255" version="1" comment="kernel-xen-devel is &lt;3.0.101-77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132503" version="1" comment="kernel-default is &lt;3.0.101-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132504" version="1" comment="kernel-default-base is &lt;3.0.101-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132505" version="1" comment="kernel-default-devel is &lt;3.0.101-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132506" version="1" comment="kernel-default-man is &lt;3.0.101-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132507" version="1" comment="kernel-ec2 is &lt;3.0.101-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132508" version="1" comment="kernel-ec2-base is &lt;3.0.101-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132509" version="1" comment="kernel-ec2-devel is &lt;3.0.101-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132510" version="1" comment="kernel-pae is &lt;3.0.101-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132511" version="1" comment="kernel-pae-base is &lt;3.0.101-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132512" version="1" comment="kernel-pae-devel is &lt;3.0.101-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132513" version="1" comment="kernel-ppc64 is &lt;3.0.101-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132514" version="1" comment="kernel-ppc64-base is &lt;3.0.101-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132515" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132516" version="1" comment="kernel-source is &lt;3.0.101-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132517" version="1" comment="kernel-syms is &lt;3.0.101-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132518" version="1" comment="kernel-trace is &lt;3.0.101-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132519" version="1" comment="kernel-trace-base is &lt;3.0.101-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132520" version="1" comment="kernel-trace-devel is &lt;3.0.101-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132521" version="1" comment="kernel-xen is &lt;3.0.101-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132522" version="1" comment="kernel-xen-base is &lt;3.0.101-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132523" version="1" comment="kernel-xen-devel is &lt;3.0.101-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122560" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122561" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122562" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126448" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126449" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126450" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126451" version="1" comment="krb5-client is &lt;1.6.3-133.49.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126452" version="1" comment="krb5-x86 is &lt;1.6.3-133.49.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129924" version="1" comment="kvm is &lt;1.4.2-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132524" version="1" comment="kvm is &lt;1.4.2-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135950" version="1" comment="kvm is &lt;1.4.2-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130722" version="1" comment="lha is &lt;1.14.0.894-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148069" version="1" comment="libcap-ng-utils is &lt;0.6.3-1.9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148070" version="1" comment="libcap-ng0 is &lt;0.6.3-1.9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148071" version="1" comment="libcap-ng0-32bit is &lt;0.6.3-1.9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132525" version="1" comment="libgcrypt11 is &lt;1.5.0-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132526" version="1" comment="libgcrypt11-32bit is &lt;1.5.0-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132527" version="1" comment="libgcrypt11-x86 is &lt;1.5.0-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132528" version="1" comment="libidn-32bit is &lt;1.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132529" version="1" comment="libidn-x86 is &lt;1.10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132530" version="1" comment="libtcnative-1-0 is &lt;1.3.3-12.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125651" version="1" comment="libvirt-lock-sanlock is &lt;1.2.5-12.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130782" version="1" comment="libvirt-client is &lt;1.2.5-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130783" version="1" comment="libvirt-client-32bit is &lt;1.2.5-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130784" version="1" comment="libvirt-doc is &lt;1.2.5-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130785" version="1" comment="libvirt-lock-sanlock is &lt;1.2.5-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130786" version="1" comment="perl-Sys-Virt is &lt;1.2.5-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127117" version="1" comment="libxml2-32bit is &lt;2.7.6-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127118" version="1" comment="libxml2-doc is &lt;2.7.6-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127119" version="1" comment="libxml2-python is &lt;2.7.6-0.40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127120" version="1" comment="libxml2-x86 is &lt;2.7.6-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128985" version="1" comment="libxml2-x86 is &lt;2.7.6-0.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132531" version="1" comment="libxml2-32bit is &lt;2.7.6-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132532" version="1" comment="libxml2-doc is &lt;2.7.6-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132533" version="1" comment="libxml2-python is &lt;2.7.6-0.50.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132534" version="1" comment="libxml2-x86 is &lt;2.7.6-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146982" version="1" comment="libxml2-32bit is &lt;2.7.6-0.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146983" version="1" comment="libxml2-doc is &lt;2.7.6-0.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146984" version="1" comment="libxml2-python is &lt;2.7.6-0.64.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146985" version="1" comment="libxml2-x86 is &lt;2.7.6-0.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144570" version="1" comment="kernel-bigmem is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144571" version="1" comment="kernel-bigmem-base is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144572" version="1" comment="kernel-bigmem-devel is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144573" version="1" comment="kernel-default is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144574" version="1" comment="kernel-default-base is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144575" version="1" comment="kernel-default-devel is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144576" version="1" comment="kernel-default-man is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144577" version="1" comment="kernel-ec2 is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144578" version="1" comment="kernel-ec2-base is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144579" version="1" comment="kernel-ec2-devel is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144580" version="1" comment="kernel-pae is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144581" version="1" comment="kernel-pae-base is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144582" version="1" comment="kernel-pae-devel is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144583" version="1" comment="kernel-ppc64 is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144584" version="1" comment="kernel-ppc64-base is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144585" version="1" comment="kernel-ppc64-devel is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144586" version="1" comment="kernel-source is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144587" version="1" comment="kernel-syms is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144588" version="1" comment="kernel-trace is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144589" version="1" comment="kernel-trace-base is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144590" version="1" comment="kernel-trace-devel is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144591" version="1" comment="kernel-xen is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144592" version="1" comment="kernel-xen-base is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144593" version="1" comment="kernel-xen-devel is &lt;3.0.101-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142232" version="1" comment="libfreebl3-x86 is &lt;3.21.3-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142233" version="1" comment="libsoftokn3-x86 is &lt;3.21.3-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142234" version="1" comment="mozilla-nss-x86 is &lt;3.21.3-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127469" version="1" comment="libmysql55client18 is &lt;5.5.49-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127470" version="1" comment="libmysql55client18-32bit is &lt;5.5.49-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127471" version="1" comment="libmysql55client18-x86 is &lt;5.5.49-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127472" version="1" comment="libmysql55client_r18 is &lt;5.5.49-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127473" version="1" comment="mysql-client is &lt;5.5.49-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127474" version="1" comment="mysql-tools is &lt;5.5.49-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128986" version="1" comment="libmysqlclient15 is &lt;5.0.96-0.8.10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128987" version="1" comment="libmysqlclient15-32bit is &lt;5.0.96-0.8.10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128988" version="1" comment="libmysqlclient15-x86 is &lt;5.0.96-0.8.10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128989" version="1" comment="libmysqlclient_r15 is &lt;5.0.96-0.8.10.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132535" version="1" comment="libmysql55client18-x86 is &lt;5.5.52-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135506" version="1" comment="libmysql55client18 is &lt;5.5.53-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135507" version="1" comment="libmysql55client18-32bit is &lt;5.5.53-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135508" version="1" comment="libmysql55client18-x86 is &lt;5.5.53-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135509" version="1" comment="libmysql55client_r18 is &lt;5.5.53-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135510" version="1" comment="mysql-client is &lt;5.5.53-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135511" version="1" comment="mysql-tools is &lt;5.5.53-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148175" version="1" comment="libmysql55client18-x86 is &lt;5.5.54-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128918" version="1" comment="libtasn1-3 is &lt;1.5-1.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128919" version="1" comment="libtasn1-3-32bit is &lt;1.5-1.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128920" version="1" comment="libtasn1-3-x86 is &lt;1.5-1.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144243" version="1" comment="ntp is &lt;4.2.8p9-57.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144244" version="1" comment="ntp-doc is &lt;4.2.8p9-57.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149586" version="1" comment="libvmtools0 is &lt;10.1.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149587" version="1" comment="open-vm-tools is &lt;10.1.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149588" version="1" comment="open-vm-tools-desktop is &lt;10.1.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114892" version="1" comment="openssh-fips is &lt;6.6p1-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128490" version="1" comment="openssh is &lt;6.6p1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128491" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128492" version="1" comment="openssh-fips is &lt;6.6p1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128493" version="1" comment="openssh-helpers is &lt;6.6p1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132536" version="1" comment="openssh is &lt;6.6p1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132537" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132538" version="1" comment="openssh-fips is &lt;6.6p1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132539" version="1" comment="openssh-helpers is &lt;6.6p1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149129" version="1" comment="openssh is &lt;6.6p1-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149130" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-35.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149131" version="1" comment="openssh-fips is &lt;6.6p1-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149132" version="1" comment="openssh-helpers is &lt;6.6p1-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121398" version="1" comment="openssh-fips is &lt;6.6p1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123899" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127543" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132540" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.102.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149098" version="1" comment="libopenssl0_9_8-x86 is &lt;0.9.8j-0.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129146" version="1" comment="pam-32bit is &lt;1.1.5-0.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129147" version="1" comment="pam-doc is &lt;1.1.5-0.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129148" version="1" comment="pam-x86 is &lt;1.1.5-0.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132541" version="1" comment="perl-32bit is &lt;5.10.0-64.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132542" version="1" comment="perl-Module-Build is &lt;0.2808.01-0.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132543" version="1" comment="perl-Test-Simple is &lt;0.72-0.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132544" version="1" comment="perl-base is &lt;5.10.0-64.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132545" version="1" comment="perl-doc is &lt;5.10.0-64.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132546" version="1" comment="perl-x86 is &lt;5.10.0-64.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126736" version="1" comment="apache2-mod_php53 is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126737" version="1" comment="php53-bcmath is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126738" version="1" comment="php53-bz2 is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126739" version="1" comment="php53-calendar is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126740" version="1" comment="php53-ctype is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126741" version="1" comment="php53-curl is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126742" version="1" comment="php53-dba is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126743" version="1" comment="php53-dom is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126744" version="1" comment="php53-exif is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126745" version="1" comment="php53-fastcgi is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126746" version="1" comment="php53-fileinfo is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126747" version="1" comment="php53-ftp is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126748" version="1" comment="php53-gd is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126749" version="1" comment="php53-gettext is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126750" version="1" comment="php53-gmp is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126751" version="1" comment="php53-iconv is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126752" version="1" comment="php53-intl is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126753" version="1" comment="php53-json is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126754" version="1" comment="php53-ldap is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126755" version="1" comment="php53-mbstring is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126756" version="1" comment="php53-mcrypt is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126757" version="1" comment="php53-mysql is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126758" version="1" comment="php53-odbc is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126759" version="1" comment="php53-openssl is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126760" version="1" comment="php53-pcntl is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126761" version="1" comment="php53-pdo is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126762" version="1" comment="php53-pear is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126763" version="1" comment="php53-pgsql is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126764" version="1" comment="php53-pspell is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126765" version="1" comment="php53-shmop is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126766" version="1" comment="php53-snmp is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126767" version="1" comment="php53-soap is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126768" version="1" comment="php53-suhosin is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126769" version="1" comment="php53-sysvmsg is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126770" version="1" comment="php53-sysvsem is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126771" version="1" comment="php53-sysvshm is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126772" version="1" comment="php53-tokenizer is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126773" version="1" comment="php53-wddx is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126774" version="1" comment="php53-xmlreader is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126775" version="1" comment="php53-xmlrpc is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126776" version="1" comment="php53-xmlwriter is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126777" version="1" comment="php53-xsl is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126778" version="1" comment="php53-zip is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126779" version="1" comment="php53-zlib is &lt;5.3.17-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127613" version="1" comment="apache2-mod_php53 is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127614" version="1" comment="php53-bcmath is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127615" version="1" comment="php53-bz2 is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127616" version="1" comment="php53-calendar is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127617" version="1" comment="php53-ctype is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127618" version="1" comment="php53-curl is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127619" version="1" comment="php53-dba is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127620" version="1" comment="php53-dom is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127621" version="1" comment="php53-exif is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127622" version="1" comment="php53-fastcgi is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127623" version="1" comment="php53-fileinfo is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127624" version="1" comment="php53-ftp is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127625" version="1" comment="php53-gd is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127626" version="1" comment="php53-gettext is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127627" version="1" comment="php53-gmp is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127628" version="1" comment="php53-iconv is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127629" version="1" comment="php53-intl is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127630" version="1" comment="php53-json is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127631" version="1" comment="php53-ldap is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127632" version="1" comment="php53-mbstring is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127633" version="1" comment="php53-mcrypt is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127634" version="1" comment="php53-mysql is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127635" version="1" comment="php53-odbc is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127636" version="1" comment="php53-openssl is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127637" version="1" comment="php53-pcntl is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127638" version="1" comment="php53-pdo is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127639" version="1" comment="php53-pear is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127640" version="1" comment="php53-pgsql is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127641" version="1" comment="php53-pspell is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127642" version="1" comment="php53-shmop is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127643" version="1" comment="php53-snmp is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127644" version="1" comment="php53-soap is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127645" version="1" comment="php53-suhosin is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127646" version="1" comment="php53-sysvmsg is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127647" version="1" comment="php53-sysvsem is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127648" version="1" comment="php53-sysvshm is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127649" version="1" comment="php53-tokenizer is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127650" version="1" comment="php53-wddx is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127651" version="1" comment="php53-xmlreader is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127652" version="1" comment="php53-xmlrpc is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127653" version="1" comment="php53-xmlwriter is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127654" version="1" comment="php53-xsl is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127655" version="1" comment="php53-zip is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127656" version="1" comment="php53-zlib is &lt;5.3.17-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132547" version="1" comment="apache2-mod_php53 is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132548" version="1" comment="php53-bcmath is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132549" version="1" comment="php53-bz2 is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132550" version="1" comment="php53-calendar is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132551" version="1" comment="php53-ctype is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132552" version="1" comment="php53-curl is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132553" version="1" comment="php53-dba is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132554" version="1" comment="php53-dom is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132555" version="1" comment="php53-exif is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132556" version="1" comment="php53-fastcgi is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132557" version="1" comment="php53-fileinfo is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132558" version="1" comment="php53-ftp is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132559" version="1" comment="php53-gd is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132560" version="1" comment="php53-gettext is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132561" version="1" comment="php53-gmp is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132562" version="1" comment="php53-iconv is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132563" version="1" comment="php53-intl is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132564" version="1" comment="php53-json is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132565" version="1" comment="php53-ldap is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132566" version="1" comment="php53-mbstring is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132567" version="1" comment="php53-mcrypt is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132568" version="1" comment="php53-mysql is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132569" version="1" comment="php53-odbc is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132570" version="1" comment="php53-openssl is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132571" version="1" comment="php53-pcntl is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132572" version="1" comment="php53-pdo is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132573" version="1" comment="php53-pear is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132574" version="1" comment="php53-pgsql is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132575" version="1" comment="php53-pspell is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132576" version="1" comment="php53-shmop is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132577" version="1" comment="php53-snmp is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132578" version="1" comment="php53-soap is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132579" version="1" comment="php53-suhosin is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132580" version="1" comment="php53-sysvmsg is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132581" version="1" comment="php53-sysvsem is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132582" version="1" comment="php53-sysvshm is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132583" version="1" comment="php53-tokenizer is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132584" version="1" comment="php53-wddx is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132585" version="1" comment="php53-xmlreader is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132586" version="1" comment="php53-xmlrpc is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132587" version="1" comment="php53-xmlwriter is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132588" version="1" comment="php53-xsl is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132589" version="1" comment="php53-zip is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132590" version="1" comment="php53-zlib is &lt;5.3.17-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132591" version="1" comment="apache2-mod_php53 is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132592" version="1" comment="php53-bcmath is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132593" version="1" comment="php53-bz2 is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132594" version="1" comment="php53-calendar is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132595" version="1" comment="php53-ctype is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132596" version="1" comment="php53-curl is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132597" version="1" comment="php53-dba is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132598" version="1" comment="php53-dom is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132599" version="1" comment="php53-exif is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132600" version="1" comment="php53-fastcgi is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132601" version="1" comment="php53-fileinfo is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132602" version="1" comment="php53-ftp is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132603" version="1" comment="php53-gd is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132604" version="1" comment="php53-gettext is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132605" version="1" comment="php53-gmp is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132606" version="1" comment="php53-iconv is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132607" version="1" comment="php53-intl is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132608" version="1" comment="php53-json is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132609" version="1" comment="php53-ldap is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132610" version="1" comment="php53-mbstring is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132611" version="1" comment="php53-mcrypt is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132612" version="1" comment="php53-mysql is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132613" version="1" comment="php53-odbc is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132614" version="1" comment="php53-openssl is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132615" version="1" comment="php53-pcntl is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132616" version="1" comment="php53-pdo is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132617" version="1" comment="php53-pear is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132618" version="1" comment="php53-pgsql is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132619" version="1" comment="php53-pspell is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132620" version="1" comment="php53-shmop is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132621" version="1" comment="php53-snmp is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132622" version="1" comment="php53-soap is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132623" version="1" comment="php53-suhosin is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132624" version="1" comment="php53-sysvmsg is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132625" version="1" comment="php53-sysvsem is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132626" version="1" comment="php53-sysvshm is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132627" version="1" comment="php53-tokenizer is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132628" version="1" comment="php53-wddx is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132629" version="1" comment="php53-xmlreader is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132630" version="1" comment="php53-xmlrpc is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132631" version="1" comment="php53-xmlwriter is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132632" version="1" comment="php53-xsl is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132633" version="1" comment="php53-zip is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132634" version="1" comment="php53-zlib is &lt;5.3.17-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132635" version="1" comment="apache2-mod_php53 is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132636" version="1" comment="php53-bcmath is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132637" version="1" comment="php53-bz2 is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132638" version="1" comment="php53-calendar is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132639" version="1" comment="php53-ctype is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132640" version="1" comment="php53-curl is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132641" version="1" comment="php53-dba is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132642" version="1" comment="php53-dom is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132643" version="1" comment="php53-exif is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132644" version="1" comment="php53-fastcgi is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132645" version="1" comment="php53-fileinfo is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132646" version="1" comment="php53-ftp is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132647" version="1" comment="php53-gd is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132648" version="1" comment="php53-gettext is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132649" version="1" comment="php53-gmp is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132650" version="1" comment="php53-iconv is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132651" version="1" comment="php53-intl is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132652" version="1" comment="php53-json is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132653" version="1" comment="php53-ldap is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132654" version="1" comment="php53-mbstring is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132655" version="1" comment="php53-mcrypt is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132656" version="1" comment="php53-mysql is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132657" version="1" comment="php53-odbc is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132658" version="1" comment="php53-openssl is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132659" version="1" comment="php53-pcntl is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132660" version="1" comment="php53-pdo is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132661" version="1" comment="php53-pear is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132662" version="1" comment="php53-pgsql is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132663" version="1" comment="php53-pspell is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132664" version="1" comment="php53-shmop is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132665" version="1" comment="php53-snmp is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132666" version="1" comment="php53-soap is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132667" version="1" comment="php53-suhosin is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132668" version="1" comment="php53-sysvmsg is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132669" version="1" comment="php53-sysvsem is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132670" version="1" comment="php53-sysvshm is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132671" version="1" comment="php53-tokenizer is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132672" version="1" comment="php53-wddx is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132673" version="1" comment="php53-xmlreader is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132674" version="1" comment="php53-xmlrpc is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132675" version="1" comment="php53-xmlwriter is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132676" version="1" comment="php53-xsl is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132677" version="1" comment="php53-zip is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132678" version="1" comment="php53-zlib is &lt;5.3.17-87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146910" version="1" comment="apache2-mod_php53 is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146911" version="1" comment="php53-bcmath is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146912" version="1" comment="php53-bz2 is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146913" version="1" comment="php53-calendar is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146914" version="1" comment="php53-ctype is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146915" version="1" comment="php53-curl is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146916" version="1" comment="php53-dba is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146917" version="1" comment="php53-dom is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146918" version="1" comment="php53-exif is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146919" version="1" comment="php53-fastcgi is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146920" version="1" comment="php53-fileinfo is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146921" version="1" comment="php53-ftp is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146922" version="1" comment="php53-gd is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146923" version="1" comment="php53-gettext is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146924" version="1" comment="php53-gmp is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146925" version="1" comment="php53-iconv is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146926" version="1" comment="php53-intl is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146927" version="1" comment="php53-json is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146928" version="1" comment="php53-ldap is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146929" version="1" comment="php53-mbstring is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146930" version="1" comment="php53-mcrypt is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146931" version="1" comment="php53-mysql is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146932" version="1" comment="php53-odbc is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146933" version="1" comment="php53-openssl is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146934" version="1" comment="php53-pcntl is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146935" version="1" comment="php53-pdo is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146936" version="1" comment="php53-pear is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146937" version="1" comment="php53-pgsql is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146938" version="1" comment="php53-pspell is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146939" version="1" comment="php53-shmop is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146940" version="1" comment="php53-snmp is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146941" version="1" comment="php53-soap is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146942" version="1" comment="php53-suhosin is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146943" version="1" comment="php53-sysvmsg is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146944" version="1" comment="php53-sysvsem is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146945" version="1" comment="php53-sysvshm is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146946" version="1" comment="php53-tokenizer is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146947" version="1" comment="php53-wddx is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146948" version="1" comment="php53-xmlreader is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146949" version="1" comment="php53-xmlrpc is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146950" version="1" comment="php53-xmlwriter is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146951" version="1" comment="php53-xsl is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146952" version="1" comment="php53-zip is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146953" version="1" comment="php53-zlib is &lt;5.3.17-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147974" version="1" comment="policycoreutils is &lt;2.0.79-4.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128654" version="1" comment="libpoppler-glib4 is &lt;0.12.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128655" version="1" comment="libpoppler-qt4-3 is &lt;0.12.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128656" version="1" comment="libpoppler5 is &lt;0.12.3-1.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124470" version="1" comment="postgresql94-contrib is &lt;9.4.6-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124471" version="1" comment="postgresql94-server is &lt;9.4.6-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132679" version="1" comment="libecpg6 is &lt;9.4.9-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132680" version="1" comment="libpq5 is &lt;9.4.9-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132681" version="1" comment="libpq5-32bit is &lt;9.4.9-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132682" version="1" comment="postgresql94 is &lt;9.4.9-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132683" version="1" comment="postgresql94-contrib is &lt;9.4.9-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132684" version="1" comment="postgresql94-docs is &lt;9.4.9-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132685" version="1" comment="postgresql94-server is &lt;9.4.9-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132686" version="1" comment="libpython2_6-1_0 is &lt;2.6.9-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132687" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.9-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132688" version="1" comment="libpython2_6-1_0-x86 is &lt;2.6.9-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132689" version="1" comment="python-base-32bit is &lt;2.6.9-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132690" version="1" comment="python-base-x86 is &lt;2.6.9-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132691" version="1" comment="python-curses is &lt;2.6.9-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132692" version="1" comment="python-x86 is &lt;2.6.9-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132693" version="1" comment="python-xml is &lt;2.6.9-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130659" version="1" comment="rsync is &lt;3.0.4-2.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125247" version="1" comment="ldapsmb is &lt;1.34b-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125248" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125249" version="1" comment="libtalloc2-x86 is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125250" version="1" comment="libtdb1-x86 is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125251" version="1" comment="libtevent0-x86 is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125252" version="1" comment="libwbclient0-x86 is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125253" version="1" comment="samba-client-x86 is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125254" version="1" comment="samba-winbind-x86 is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125255" version="1" comment="samba-x86 is &lt;3.6.3-67.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125985" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125986" version="1" comment="libtalloc2-x86 is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125987" version="1" comment="libtdb1-x86 is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125988" version="1" comment="libtevent0-x86 is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125989" version="1" comment="libwbclient0-x86 is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125990" version="1" comment="samba-client-x86 is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125991" version="1" comment="samba-winbind-x86 is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125992" version="1" comment="samba-x86 is &lt;3.6.3-76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146137" version="1" comment="libsmbclient0-x86 is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146138" version="1" comment="libtalloc2-x86 is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146139" version="1" comment="libtdb1-x86 is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146140" version="1" comment="libtevent0-x86 is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146141" version="1" comment="libwbclient0-x86 is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146142" version="1" comment="samba-client-x86 is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146143" version="1" comment="samba-winbind-x86 is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146144" version="1" comment="samba-x86 is &lt;3.6.3-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121399" version="1" comment="libtevent0-x86 is &lt;3.6.3-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127294" version="1" comment="libspice-server1 is &lt;0.12.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148176" version="1" comment="libspice-server1 is &lt;0.12.4-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132694" version="1" comment="libsqlite3-0 is &lt;3.7.6.3-1.4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132695" version="1" comment="libsqlite3-0-32bit is &lt;3.7.6.3-1.4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132696" version="1" comment="libsqlite3-0-x86 is &lt;3.7.6.3-1.4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132697" version="1" comment="squid is &lt;2.7.STABLE5-2.12.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132698" version="1" comment="squid3 is &lt;3.1.23-8.16.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146954" version="1" comment="squid3 is &lt;3.1.23-8.16.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132699" version="1" comment="squidGuard is &lt;1.4-13.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132700" version="1" comment="squidGuard-doc is &lt;1.4-13.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115110" version="1" comment="strongswan is &lt;4.4.0-6.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115111" version="1" comment="strongswan-doc is &lt;4.4.0-6.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135935" version="1" comment="sudo is &lt;1.7.6p2-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128484" version="1" comment="supportutils is &lt;1.20-121.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135951" version="1" comment="tar is &lt;1.26-1.2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149461" version="1" comment="tcpdump is &lt;3.9.8-1.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122563" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.163.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132701" version="1" comment="libtiff3 is &lt;3.8.2-141.168.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132702" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.168.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132703" version="1" comment="libtiff3-x86 is &lt;3.8.2-141.168.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132704" version="1" comment="tomcat6 is &lt;6.0.45-0.53.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132705" version="1" comment="tomcat6-admin-webapps is &lt;6.0.45-0.53.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132706" version="1" comment="tomcat6-docs-webapp is &lt;6.0.45-0.53.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132707" version="1" comment="tomcat6-javadoc is &lt;6.0.45-0.53.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132708" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.45-0.53.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132709" version="1" comment="tomcat6-lib is &lt;6.0.45-0.53.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132710" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.45-0.53.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132711" version="1" comment="tomcat6-webapps is &lt;6.0.45-0.53.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114343" version="1" comment="tomcat6 is &lt;6.0.41-0.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114344" version="1" comment="tomcat6-admin-webapps is &lt;6.0.41-0.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114345" version="1" comment="tomcat6-docs-webapp is &lt;6.0.41-0.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114346" version="1" comment="tomcat6-javadoc is &lt;6.0.41-0.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114347" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.41-0.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114348" version="1" comment="tomcat6-lib is &lt;6.0.41-0.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114349" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.41-0.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114350" version="1" comment="tomcat6-webapps is &lt;6.0.41-0.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125256" version="1" comment="tomcat6 is &lt;6.0.45-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125257" version="1" comment="tomcat6-admin-webapps is &lt;6.0.45-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125258" version="1" comment="tomcat6-docs-webapp is &lt;6.0.45-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125259" version="1" comment="tomcat6-javadoc is &lt;6.0.45-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125260" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.45-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125261" version="1" comment="tomcat6-lib is &lt;6.0.45-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125262" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.45-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125263" version="1" comment="tomcat6-webapps is &lt;6.0.45-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149143" version="1" comment="unzip is &lt;6.00-11.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136127" version="1" comment="gvim is &lt;7.2-8.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136128" version="1" comment="vim is &lt;7.2-8.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136129" version="1" comment="vim-base is &lt;7.2-8.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136130" version="1" comment="vim-data is &lt;7.2-8.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136710" version="1" comment="w3m is &lt;0.5.3.git20161120-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132712" version="1" comment="xen-doc-html is &lt;4.4.4_07-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132713" version="1" comment="xen-kmp-default is &lt;4.4.4_07_3.0.101_77-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132714" version="1" comment="xen-kmp-pae is &lt;4.4.4_07_3.0.101_77-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132715" version="1" comment="xen-libs is &lt;4.4.4_07-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132716" version="1" comment="xen-libs-32bit is &lt;4.4.4_07-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132717" version="1" comment="xen-tools is &lt;4.4.4_07-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132718" version="1" comment="xen-tools-domU is &lt;4.4.4_07-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132719" version="1" comment="xen-doc-html is &lt;4.4.4_08-40.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132720" version="1" comment="xen-kmp-default is &lt;4.4.4_08_3.0.101_80-40.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132721" version="1" comment="xen-kmp-pae is &lt;4.4.4_08_3.0.101_80-40.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132722" version="1" comment="xen-libs is &lt;4.4.4_08-40.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132723" version="1" comment="xen-libs-32bit is &lt;4.4.4_08-40.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132724" version="1" comment="xen-tools is &lt;4.4.4_08-40.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132725" version="1" comment="xen-tools-domU is &lt;4.4.4_08-40.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143086" version="1" comment="xen-doc-html is &lt;4.4.4_10-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143087" version="1" comment="xen-kmp-default is &lt;4.4.4_10_3.0.101_88-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143088" version="1" comment="xen-kmp-pae is &lt;4.4.4_10_3.0.101_88-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143089" version="1" comment="xen-libs is &lt;4.4.4_10-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143090" version="1" comment="xen-libs-32bit is &lt;4.4.4_10-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143091" version="1" comment="xen-tools is &lt;4.4.4_10-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143092" version="1" comment="xen-tools-domU is &lt;4.4.4_10-43.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144687" version="1" comment="xen-doc-html is &lt;4.4.4_12-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144688" version="1" comment="xen-kmp-default is &lt;4.4.4_12_3.0.101_91-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144689" version="1" comment="xen-kmp-pae is &lt;4.4.4_12_3.0.101_91-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144690" version="1" comment="xen-libs is &lt;4.4.4_12-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144691" version="1" comment="xen-libs-32bit is &lt;4.4.4_12-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144692" version="1" comment="xen-tools is &lt;4.4.4_12-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144693" version="1" comment="xen-tools-domU is &lt;4.4.4_12-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149431" version="1" comment="xen-doc-html is &lt;4.4.4_14-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149432" version="1" comment="xen-kmp-default is &lt;4.4.4_14_3.0.101_94-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149433" version="1" comment="xen-kmp-pae is &lt;4.4.4_14_3.0.101_94-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149434" version="1" comment="xen-libs is &lt;4.4.4_14-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149435" version="1" comment="xen-libs-32bit is &lt;4.4.4_14-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149436" version="1" comment="xen-tools is &lt;4.4.4_14-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149437" version="1" comment="xen-tools-domU is &lt;4.4.4_14-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136711" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136712" version="1" comment="xorg-x11-libX11-x86 is &lt;7.4-5.11.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149438" version="1" comment="xorg-x11-libX11-32bit is &lt;7.4-5.11.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149439" version="1" comment="xorg-x11-libX11-x86 is &lt;7.4-5.11.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143093" version="1" comment="xorg-x11-libXfixes-32bit is &lt;7.4-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143094" version="1" comment="xorg-x11-libXfixes-x86 is &lt;7.4-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148474" version="1" comment="xorg-x11-libXpm-32bit is &lt;7.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009148475" version="1" comment="xorg-x11-libXpm-x86 is &lt;7.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142776" version="1" comment="xorg-x11-libXrender-32bit is &lt;7.4-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142777" version="1" comment="xorg-x11-libXrender-x86 is &lt;7.4-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142778" version="1" comment="xorg-x11-libXv-32bit is &lt;7.4-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142779" version="1" comment="xorg-x11-libXv-x86 is &lt;7.4-1.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143095" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143096" version="1" comment="xorg-x11-libs-x86 is &lt;7.4-8.26.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132726" version="1" comment="yast2-storage-lib is &lt;2.17.161-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144694" version="1" comment="zlib-32bit is &lt;1.2.7-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144695" version="1" comment="zlib-x86 is &lt;1.2.7-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077618" version="1" comment="krb5 is &lt;1.6.3-133.49.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077616" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077617" version="1" comment="krb5-client is &lt;1.6.3-133.49.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077632" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077633" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077634" version="1" comment="krb5-server is &lt;1.6.3-133.49.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077641" version="1" comment="krb5-devel is &lt;1.6.3-133.49.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077640" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111740" version="1" comment="libmysqlclient15 is &lt;5.0.67-13.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111752" version="1" comment="libmysqlclient15-32bit is &lt;5.0.67-13.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111741" version="1" comment="libmysqlclient_r15 is &lt;5.0.67-13.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111742" version="1" comment="mysql is &lt;5.0.67-13.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111743" version="1" comment="mysql-Max is &lt;5.0.67-13.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111744" version="1" comment="mysql-client is &lt;5.0.67-13.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057188" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr7.0-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057185" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr7.0-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057186" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr7.0-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057042" version="1" comment="libpoppler-glib4 is &lt;0.10.1-1.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057043" version="1" comment="libpoppler-qt4-3 is &lt;0.10.1-1.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057044" version="1" comment="libpoppler4 is &lt;0.10.1-1.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057045" version="1" comment="poppler-tools is &lt;0.10.1-1.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057913" version="1" comment="pango is &lt;1.22.1-3.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057910" version="1" comment="pango-32bit is &lt;1.22.1-3.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057911" version="1" comment="pango-doc is &lt;1.22.1-3.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058352" version="1" comment="MozillaFirefox is &lt;3.5.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058351" version="1" comment="MozillaFirefox-translations is &lt;3.5.8-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058362" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.18-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058358" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.18-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058359" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.18-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058360" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.18-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058357" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058353" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058354" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058355" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.8-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058844" version="1" comment="wireshark is &lt;1.0.5-1.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060327" version="1" comment="libpython2_6-1_0 is &lt;2.6.0-8.8.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060325" version="1" comment="libpython2_6-1_0-32bit is &lt;2.6.0-8.8.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060339" version="1" comment="python is &lt;2.6.0-8.9.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060328" version="1" comment="python-32bit is &lt;2.6.0-8.9.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060331" version="1" comment="python-base is &lt;2.6.0-8.8.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060329" version="1" comment="python-base-32bit is &lt;2.6.0-8.8.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060332" version="1" comment="python-curses is &lt;2.6.0-8.9.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060333" version="1" comment="python-demo is &lt;2.6.0-8.9.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060334" version="1" comment="python-gdbm is &lt;2.6.0-8.9.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060335" version="1" comment="python-idle is &lt;2.6.0-8.9.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060336" version="1" comment="python-tk is &lt;2.6.0-8.9.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060338" version="1" comment="python-xml is &lt;2.6.0-8.8.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059250" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-30.22.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059248" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-30.22.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059252" version="1" comment="openssl is &lt;0.9.8h-30.22.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059251" version="1" comment="openssl-doc is &lt;0.9.8h-30.22.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059848" version="1" comment="glib2 is &lt;2.18.2-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059846" version="1" comment="glib2-doc is &lt;2.18.2-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059847" version="1" comment="glib2-lang is &lt;2.18.2-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059851" version="1" comment="libgio-2_0-0 is &lt;2.18.2-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059849" version="1" comment="libgio-2_0-0-32bit is &lt;2.18.2-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059854" version="1" comment="libglib-2_0-0 is &lt;2.18.2-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059852" version="1" comment="libglib-2_0-0-32bit is &lt;2.18.2-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059857" version="1" comment="libgmodule-2_0-0 is &lt;2.18.2-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059855" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.18.2-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059860" version="1" comment="libgobject-2_0-0 is &lt;2.18.2-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059858" version="1" comment="libgobject-2_0-0-32bit is &lt;2.18.2-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059863" version="1" comment="libgthread-2_0-0 is &lt;2.18.2-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059861" version="1" comment="libgthread-2_0-0-32bit is &lt;2.18.2-7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057344" version="1" comment="krb5 is &lt;1.6.3-133.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057338" version="1" comment="krb5-32bit is &lt;1.6.3-133.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057339" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057340" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057341" version="1" comment="krb5-client is &lt;1.6.3-133.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057342" version="1" comment="krb5-server is &lt;1.6.3-133.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057690" version="1" comment="fuse is &lt;2.7.2-61.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057691" version="1" comment="libfuse2 is &lt;2.7.2-61.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056887" version="1" comment="MozillaFirefox is &lt;3.5.6-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056886" version="1" comment="MozillaFirefox-translations is &lt;3.5.6-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053956" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.13-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053952" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.13-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053953" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.13-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053954" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.13-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056892" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.6-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056888" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.6-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056889" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.6-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056890" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.6-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059483" version="1" comment="MozillaFirefox is &lt;3.5.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059482" version="1" comment="MozillaFirefox-translations is &lt;3.5.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065171" version="1" comment="gnutls is &lt;2.4.1-24.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060827" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.4-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059417" version="1" comment="libfreebl3 is &lt;3.12.6-3.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059415" version="1" comment="libfreebl3-32bit is &lt;3.12.6-3.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065174" version="1" comment="libgnutls26 is &lt;2.4.1-24.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065172" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059421" version="1" comment="mozilla-nss is &lt;3.12.6-3.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059418" version="1" comment="mozilla-nss-32bit is &lt;3.12.6-3.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059419" version="1" comment="mozilla-nss-tools is &lt;3.12.6-3.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059481" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.19-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059477" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.19-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059478" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.19-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059479" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.19-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059488" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.9-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059484" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.9-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059485" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.9-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059486" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.9-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057171" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.3-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056897" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.16-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056893" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.16-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056894" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.16-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056895" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.16-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057282" version="1" comment="postgresql is &lt;8.3.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057276" version="1" comment="postgresql-contrib is &lt;8.3.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057277" version="1" comment="postgresql-docs is &lt;8.3.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057280" version="1" comment="postgresql-libs is &lt;8.3.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057278" version="1" comment="postgresql-libs-32bit is &lt;8.3.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057281" version="1" comment="postgresql-server is &lt;8.3.9-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061860" version="1" comment="ghostscript-fonts-other is &lt;8.62-32.27.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061861" version="1" comment="ghostscript-fonts-rus is &lt;8.62-32.27.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061862" version="1" comment="ghostscript-fonts-std is &lt;8.62-32.27.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061863" version="1" comment="ghostscript-library is &lt;8.62-32.27.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061864" version="1" comment="ghostscript-omni is &lt;8.62-32.27.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061865" version="1" comment="ghostscript-x11 is &lt;8.62-32.27.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061866" version="1" comment="libgimpprint is &lt;4.2.7-32.27.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093925" version="1" comment="gnutls is &lt;2.4.1-24.39.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093929" version="1" comment="libgnutls26 is &lt;2.4.1-24.39.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093927" version="1" comment="libgnutls26-32bit is &lt;2.4.1-24.39.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093926" version="1" comment="libgnutls-extra26 is &lt;2.4.1-24.39.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093936" version="1" comment="libgnutls-devel is &lt;2.4.1-24.39.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093937" version="1" comment="libgnutls-extra-devel is &lt;2.4.1-24.39.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061087" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr8.0-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061084" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr8.0-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061085" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr8.0-0.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107268" version="1" comment="clamav is &lt;0.96-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060502" version="1" comment="libpng12-0 is &lt;1.2.31-5.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060500" version="1" comment="libpng12-0-32bit is &lt;1.2.31-5.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057543" version="1" comment="MozillaFirefox is &lt;3.5.7-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057542" version="1" comment="MozillaFirefox-translations is &lt;3.5.7-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057548" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.7-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057544" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.7-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057545" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.7-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057546" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.7-1.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058945" version="1" comment="cups is &lt;1.3.9-8.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058941" version="1" comment="cups-client is &lt;1.3.9-8.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058944" version="1" comment="cups-libs is &lt;1.3.9-8.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058942" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062323" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111689" version="1" comment="php5 is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062324" version="1" comment="php5-bcmath is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062325" version="1" comment="php5-bz2 is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062326" version="1" comment="php5-calendar is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062327" version="1" comment="php5-ctype is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062328" version="1" comment="php5-curl is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062329" version="1" comment="php5-dba is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062330" version="1" comment="php5-dbase is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062331" version="1" comment="php5-dom is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062332" version="1" comment="php5-exif is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062333" version="1" comment="php5-fastcgi is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062334" version="1" comment="php5-ftp is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062335" version="1" comment="php5-gd is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062336" version="1" comment="php5-gettext is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062337" version="1" comment="php5-gmp is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062338" version="1" comment="php5-hash is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062339" version="1" comment="php5-iconv is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062340" version="1" comment="php5-json is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062341" version="1" comment="php5-ldap is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062342" version="1" comment="php5-mbstring is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062343" version="1" comment="php5-mcrypt is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062344" version="1" comment="php5-mysql is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062345" version="1" comment="php5-odbc is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062346" version="1" comment="php5-openssl is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062347" version="1" comment="php5-pcntl is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062348" version="1" comment="php5-pdo is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062349" version="1" comment="php5-pear is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062350" version="1" comment="php5-pgsql is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062351" version="1" comment="php5-pspell is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062352" version="1" comment="php5-shmop is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062353" version="1" comment="php5-snmp is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062354" version="1" comment="php5-soap is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062355" version="1" comment="php5-suhosin is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062356" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062357" version="1" comment="php5-sysvsem is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062358" version="1" comment="php5-sysvshm is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062359" version="1" comment="php5-tokenizer is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062360" version="1" comment="php5-wddx is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062361" version="1" comment="php5-xmlreader is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062362" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062363" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062364" version="1" comment="php5-xsl is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062365" version="1" comment="php5-zip is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062366" version="1" comment="php5-zlib is &lt;5.2.14-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064780" version="1" comment="cups is &lt;1.3.9-8.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064776" version="1" comment="cups-client is &lt;1.3.9-8.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064779" version="1" comment="cups-libs is &lt;1.3.9-8.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064777" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059012" version="1" comment="cifs-mount is &lt;3.2.7-11.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059013" version="1" comment="ldapsmb is &lt;1.34b-11.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059016" version="1" comment="libsmbclient0 is &lt;3.2.7-11.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059014" version="1" comment="libsmbclient0-32bit is &lt;3.2.7-11.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059019" version="1" comment="libtalloc1 is &lt;3.2.7-11.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059017" version="1" comment="libtalloc1-32bit is &lt;3.2.7-11.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059022" version="1" comment="libtdb1 is &lt;3.2.7-11.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059020" version="1" comment="libtdb1-32bit is &lt;3.2.7-11.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059025" version="1" comment="libwbclient0 is &lt;3.2.7-11.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059023" version="1" comment="libwbclient0-32bit is &lt;3.2.7-11.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059035" version="1" comment="samba is &lt;3.2.7-11.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059026" version="1" comment="samba-32bit is &lt;3.2.7-11.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059029" version="1" comment="samba-client is &lt;3.2.7-11.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059027" version="1" comment="samba-client-32bit is &lt;3.2.7-11.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059030" version="1" comment="samba-krb-printing is &lt;3.2.7-11.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059033" version="1" comment="samba-winbind is &lt;3.2.7-11.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059031" version="1" comment="samba-winbind-32bit is &lt;3.2.7-11.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059529" version="1" comment="krb5 is &lt;1.6.3-133.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059523" version="1" comment="krb5-32bit is &lt;1.6.3-133.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059524" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059525" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059526" version="1" comment="krb5-client is &lt;1.6.3-133.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059527" version="1" comment="krb5-server is &lt;1.6.3-133.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061277" version="1" comment="postgresql is &lt;8.3.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061271" version="1" comment="postgresql-contrib is &lt;8.3.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061272" version="1" comment="postgresql-docs is &lt;8.3.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061275" version="1" comment="postgresql-libs is &lt;8.3.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061273" version="1" comment="postgresql-libs-32bit is &lt;8.3.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061276" version="1" comment="postgresql-server is &lt;8.3.11-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064046" version="1" comment="NetworkManager is &lt;0.7.0.r4359-15.20.10.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064045" version="1" comment="NetworkManager-glib is &lt;0.7.0.r4359-15.20.10.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060716" version="1" comment="krb5 is &lt;1.6.3-133.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060710" version="1" comment="krb5-32bit is &lt;1.6.3-133.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060711" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060712" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060713" version="1" comment="krb5-client is &lt;1.6.3-133.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060714" version="1" comment="krb5-server is &lt;1.6.3-133.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116742" version="1" comment="java-1_4_2-ibm-sap is &lt;1.4.2_sr13.8-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116743" version="1" comment="java-1_4_2-ibm-sap-devel is &lt;1.4.2_sr13.8-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064613" version="1" comment="krb5 is &lt;1.6.3-133.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064607" version="1" comment="krb5-32bit is &lt;1.6.3-133.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064608" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064609" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064610" version="1" comment="krb5-client is &lt;1.6.3-133.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064611" version="1" comment="krb5-server is &lt;1.6.3-133.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061754" version="1" comment="clamav is &lt;0.96.1-0.1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062065" version="1" comment="freetype2 is &lt;2.3.7-25.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062063" version="1" comment="freetype2-32bit is &lt;2.3.7-25.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060901" version="1" comment="cifs-mount is &lt;3.2.7-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060902" version="1" comment="ldapsmb is &lt;1.34b-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060905" version="1" comment="libsmbclient0 is &lt;3.2.7-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060903" version="1" comment="libsmbclient0-32bit is &lt;3.2.7-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060908" version="1" comment="libtalloc1 is &lt;3.2.7-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060906" version="1" comment="libtalloc1-32bit is &lt;3.2.7-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060911" version="1" comment="libtdb1 is &lt;3.2.7-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060909" version="1" comment="libtdb1-32bit is &lt;3.2.7-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060914" version="1" comment="libwbclient0 is &lt;3.2.7-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060912" version="1" comment="libwbclient0-32bit is &lt;3.2.7-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060924" version="1" comment="samba is &lt;3.2.7-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060915" version="1" comment="samba-32bit is &lt;3.2.7-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060918" version="1" comment="samba-client is &lt;3.2.7-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060916" version="1" comment="samba-client-32bit is &lt;3.2.7-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060919" version="1" comment="samba-krb-printing is &lt;3.2.7-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060922" version="1" comment="samba-winbind is &lt;3.2.7-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060920" version="1" comment="samba-winbind-32bit is &lt;3.2.7-11.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116744" version="1" comment="brocade-bna-kmp-rt is &lt;2.1.0.0_2.6.33.7.2_rt30_0.3-0.2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116745" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.19_2.6.33.7.2_rt30_0.3-0.7.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116746" version="1" comment="kernel-rt is &lt;2.6.33.7.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116747" version="1" comment="kernel-rt-base is &lt;2.6.33.7.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116748" version="1" comment="kernel-rt-devel is &lt;2.6.33.7.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116749" version="1" comment="kernel-rt_trace is &lt;2.6.33.7.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116750" version="1" comment="kernel-rt_trace-base is &lt;2.6.33.7.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116751" version="1" comment="kernel-rt_trace-devel is &lt;2.6.33.7.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116752" version="1" comment="kernel-source-rt is &lt;2.6.33.7.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116753" version="1" comment="kernel-syms-rt is &lt;2.6.33.7.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116754" version="1" comment="ofed-kmp-rt is &lt;1.4.2_2.6.33.7.2_rt30_0.3-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063839" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.27.54_0.2-7.1.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063842" version="1" comment="ext4dev-kmp-xen is &lt;0_2.6.27.54_0.2-7.1.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063844" version="1" comment="kernel-default is &lt;2.6.27.54-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063843" version="1" comment="kernel-default-base is &lt;2.6.27.54-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063847" version="1" comment="kernel-source is &lt;2.6.27.54-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063848" version="1" comment="kernel-syms is &lt;2.6.27.54-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063852" version="1" comment="kernel-xen is &lt;2.6.27.54-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063851" version="1" comment="kernel-xen-base is &lt;2.6.27.54-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064300" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-30.22.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064298" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-30.22.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064302" version="1" comment="openssl is &lt;0.9.8h-30.22.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064301" version="1" comment="openssl-doc is &lt;0.9.8h-30.22.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064508" version="1" comment="quagga is &lt;0.99.10-17.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063353" version="1" comment="freetype2 is &lt;2.3.7-25.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063351" version="1" comment="freetype2-32bit is &lt;2.3.7-25.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064216" version="1" comment="MozillaFirefox is &lt;3.6.12-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064215" version="1" comment="MozillaFirefox-translations is &lt;3.6.12-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064214" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.11-0.1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064210" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.11-0.1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064211" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.11-0.1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064212" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.11-0.1.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064614" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111690" version="1" comment="php5 is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064615" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064616" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064617" version="1" comment="php5-calendar is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064618" version="1" comment="php5-ctype is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064619" version="1" comment="php5-curl is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064620" version="1" comment="php5-dba is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064621" version="1" comment="php5-dbase is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064622" version="1" comment="php5-dom is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064623" version="1" comment="php5-exif is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064624" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064625" version="1" comment="php5-ftp is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064626" version="1" comment="php5-gd is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064627" version="1" comment="php5-gettext is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064628" version="1" comment="php5-gmp is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064629" version="1" comment="php5-hash is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064630" version="1" comment="php5-iconv is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064631" version="1" comment="php5-json is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064632" version="1" comment="php5-ldap is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064633" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064634" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064635" version="1" comment="php5-mysql is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064636" version="1" comment="php5-odbc is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064637" version="1" comment="php5-openssl is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064638" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064639" version="1" comment="php5-pdo is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064640" version="1" comment="php5-pear is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064641" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064642" version="1" comment="php5-pspell is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064643" version="1" comment="php5-shmop is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064644" version="1" comment="php5-snmp is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064645" version="1" comment="php5-soap is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064646" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064647" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064648" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064649" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064650" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064651" version="1" comment="php5-wddx is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064652" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064653" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064654" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064655" version="1" comment="php5-xsl is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064656" version="1" comment="php5-zip is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064657" version="1" comment="php5-zlib is &lt;5.2.14-0.7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064395" version="1" comment="libopenssl0_9_8 is &lt;0.9.8h-30.22.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064393" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8h-30.22.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064397" version="1" comment="openssl is &lt;0.9.8h-30.22.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064396" version="1" comment="openssl-doc is &lt;0.9.8h-30.22.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116755" version="1" comment="brocade-bna-kmp-rt is &lt;2.1.0.0_2.6.33.20_rt31_0.3-0.2.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116756" version="1" comment="cluster-network-kmp-rt is &lt;1.4_2.6.33.20_rt31_0.3-2.5.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116757" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_2.6.33.20_rt31_0.3-2.5.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116758" version="1" comment="drbd-kmp-rt is &lt;8.3.11_2.6.33.20_rt31_0.3-0.3.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116759" version="1" comment="drbd-kmp-rt_trace is &lt;8.3.11_2.6.33.20_rt31_0.3-0.3.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116760" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.19_2.6.33.20_rt31_0.3-0.9.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116761" version="1" comment="kernel-rt is &lt;2.6.33.20-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116762" version="1" comment="kernel-rt-base is &lt;2.6.33.20-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116763" version="1" comment="kernel-rt-devel is &lt;2.6.33.20-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116764" version="1" comment="kernel-rt_trace is &lt;2.6.33.20-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116765" version="1" comment="kernel-rt_trace-base is &lt;2.6.33.20-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116766" version="1" comment="kernel-rt_trace-devel is &lt;2.6.33.20-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116767" version="1" comment="kernel-source-rt is &lt;2.6.33.20-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116768" version="1" comment="kernel-syms-rt is &lt;2.6.33.20-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116769" version="1" comment="ocfs2-kmp-rt is &lt;1.6_2.6.33.20_rt31_0.3-0.4.2.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116770" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_2.6.33.20_rt31_0.3-0.4.2.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116771" version="1" comment="ofed-kmp-rt is &lt;1.5.2_2.6.33.20_rt31_0.3-0.9.13.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116772" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.74_rt98_0.6.2-2.18.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116773" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.74_rt98_0.6.2-2.18.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116774" version="1" comment="drbd-kmp-rt is &lt;8.4.2_3.0.74_rt98_0.6.2-0.6.6.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116775" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.2_3.0.74_rt98_0.6.2-0.6.6.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116776" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.74_rt98_0.6.2-0.23.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116777" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.74_rt98_0.6.2-0.23.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116778" version="1" comment="kernel-rt is &lt;3.0.74.rt98-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116779" version="1" comment="kernel-rt-base is &lt;3.0.74.rt98-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116780" version="1" comment="kernel-rt-devel is &lt;3.0.74.rt98-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116781" version="1" comment="kernel-rt_trace is &lt;3.0.74.rt98-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116782" version="1" comment="kernel-rt_trace-base is &lt;3.0.74.rt98-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116783" version="1" comment="kernel-rt_trace-devel is &lt;3.0.74.rt98-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116784" version="1" comment="kernel-source-rt is &lt;3.0.74.rt98-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116785" version="1" comment="kernel-syms-rt is &lt;3.0.74.rt98-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116786" version="1" comment="lttng-modules-kmp-rt is &lt;2.0.4_3.0.74_rt98_0.6.2-0.7.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116787" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.0.4_3.0.74_rt98_0.6.2-0.7.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116788" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.74_rt98_0.6.2-0.11.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116789" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.74_rt98_0.6.2-0.11.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116790" version="1" comment="ofed-kmp-rt is &lt;1.5.2_3.0.74_rt98_0.6.2-0.28.28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116791" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.2_3.0.74_rt98_0.6.2-0.28.28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116792" version="1" comment="brocade-bna-kmp-rt is &lt;2.1.0.0_2.6.33.18_rt31_0.3-0.2.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116793" version="1" comment="cluster-network-kmp-rt is &lt;1.4_2.6.33.18_rt31_0.3-2.5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116794" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_2.6.33.18_rt31_0.3-2.5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116795" version="1" comment="drbd-kmp-rt is &lt;8.3.11_2.6.33.18_rt31_0.3-0.3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116796" version="1" comment="drbd-kmp-rt_trace is &lt;8.3.11_2.6.33.18_rt31_0.3-0.3.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116797" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.19_2.6.33.18_rt31_0.3-0.7.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116798" version="1" comment="kernel-rt is &lt;2.6.33.18-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116799" version="1" comment="kernel-rt-base is &lt;2.6.33.18-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116800" version="1" comment="kernel-rt-devel is &lt;2.6.33.18-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116801" version="1" comment="kernel-rt_trace is &lt;2.6.33.18-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116802" version="1" comment="kernel-rt_trace-base is &lt;2.6.33.18-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116803" version="1" comment="kernel-rt_trace-devel is &lt;2.6.33.18-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116804" version="1" comment="kernel-source-rt is &lt;2.6.33.18-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116805" version="1" comment="kernel-syms-rt is &lt;2.6.33.18-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116806" version="1" comment="ocfs2-kmp-rt is &lt;1.6_2.6.33.18_rt31_0.3-0.4.2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116807" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_2.6.33.18_rt31_0.3-0.4.2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116808" version="1" comment="java-1_4_2-ibm-sap is &lt;1.4.2_sr13.9-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116809" version="1" comment="java-1_4_2-ibm-sap-devel is &lt;1.4.2_sr13.9-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103768" version="1" comment="glibc is &lt;2.11.1-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103758" version="1" comment="glibc-32bit is &lt;2.11.1-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103760" version="1" comment="glibc-devel is &lt;2.11.1-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103759" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103761" version="1" comment="glibc-html is &lt;2.11.1-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103762" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103763" version="1" comment="glibc-info is &lt;2.11.1-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103765" version="1" comment="glibc-locale is &lt;2.11.1-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103764" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103767" version="1" comment="glibc-profile is &lt;2.11.1-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103766" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103769" version="1" comment="nscd is &lt;2.11.1-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108339" version="1" comment="kernel-default is &lt;2.6.32.59-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108337" version="1" comment="kernel-default-base is &lt;2.6.32.59-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108338" version="1" comment="kernel-default-devel is &lt;2.6.32.59-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108342" version="1" comment="kernel-ec2 is &lt;2.6.32.59-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108340" version="1" comment="kernel-ec2-base is &lt;2.6.32.59-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108341" version="1" comment="kernel-ec2-devel is &lt;2.6.32.59-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108346" version="1" comment="kernel-source is &lt;2.6.32.59-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108347" version="1" comment="kernel-syms is &lt;2.6.32.59-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108350" version="1" comment="kernel-trace is &lt;2.6.32.59-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108348" version="1" comment="kernel-trace-base is &lt;2.6.32.59-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108349" version="1" comment="kernel-trace-devel is &lt;2.6.32.59-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108353" version="1" comment="kernel-xen is &lt;2.6.32.59-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108351" version="1" comment="kernel-xen-base is &lt;2.6.32.59-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108352" version="1" comment="kernel-xen-devel is &lt;2.6.32.59-0.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108354" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.59_0.19-0.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108356" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.59_0.19-0.9.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116810" version="1" comment="java-1_4_2-ibm-sap is &lt;1.4.2_sr13.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116811" version="1" comment="java-1_4_2-ibm-sap-devel is &lt;1.4.2_sr13.10-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073836" version="1" comment="kernel-default is &lt;3.0.26-0.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073833" version="1" comment="kernel-default-base is &lt;3.0.26-0.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073834" version="1" comment="kernel-default-devel is &lt;3.0.26-0.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073854" version="1" comment="kernel-default-extra is &lt;3.0.26-0.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073837" version="1" comment="kernel-source is &lt;3.0.26-0.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073838" version="1" comment="kernel-syms is &lt;3.0.26-0.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073841" version="1" comment="kernel-trace is &lt;3.0.26-0.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073839" version="1" comment="kernel-trace-base is &lt;3.0.26-0.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073840" version="1" comment="kernel-trace-devel is &lt;3.0.26-0.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073855" version="1" comment="kernel-trace-extra is &lt;3.0.26-0.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073850" version="1" comment="kernel-xen is &lt;3.0.26-0.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073848" version="1" comment="kernel-xen-base is &lt;3.0.26-0.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073849" version="1" comment="kernel-xen-devel is &lt;3.0.26-0.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073856" version="1" comment="kernel-xen-extra is &lt;3.0.26-0.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116812" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.26_0.7-2.10.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116813" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.26_0.7-2.10.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116814" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.26_0.7-2.10.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116815" version="1" comment="gfs2-kmp-default is &lt;2_3.0.26_0.7-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116816" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.26_0.7-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116817" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.26_0.7-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116818" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.26_0.7-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116819" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.26_0.7-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116820" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.26_0.7-0.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103770" version="1" comment="btrfs-kmp-default is &lt;0_2.6.32.59_0.9-0.3.151" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103771" version="1" comment="btrfs-kmp-xen is &lt;0_2.6.32.59_0.9-0.3.151" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103772" version="1" comment="ext4dev-kmp-default is &lt;0_2.6.32.59_0.9-7.9.118" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103773" version="1" comment="ext4dev-kmp-trace is &lt;0_2.6.32.59_0.9-7.9.118" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103774" version="1" comment="ext4dev-kmp-xen is &lt;0_2.6.32.59_0.9-7.9.118" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103775" version="1" comment="hyper-v-kmp-default is &lt;0_2.6.32.59_0.9-0.18.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103776" version="1" comment="hyper-v-kmp-trace is &lt;0_2.6.32.59_0.9-0.18.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103779" version="1" comment="kernel-default is &lt;2.6.32.59-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103777" version="1" comment="kernel-default-base is &lt;2.6.32.59-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103778" version="1" comment="kernel-default-devel is &lt;2.6.32.59-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103782" version="1" comment="kernel-ec2 is &lt;2.6.32.59-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103780" version="1" comment="kernel-ec2-base is &lt;2.6.32.59-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103781" version="1" comment="kernel-ec2-devel is &lt;2.6.32.59-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103783" version="1" comment="kernel-source is &lt;2.6.32.59-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103784" version="1" comment="kernel-syms is &lt;2.6.32.59-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103787" version="1" comment="kernel-trace is &lt;2.6.32.59-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103785" version="1" comment="kernel-trace-base is &lt;2.6.32.59-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103786" version="1" comment="kernel-trace-devel is &lt;2.6.32.59-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103790" version="1" comment="kernel-xen is &lt;2.6.32.59-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103788" version="1" comment="kernel-xen-base is &lt;2.6.32.59-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103789" version="1" comment="kernel-xen-devel is &lt;2.6.32.59-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073847" version="1" comment="kernel-ec2 is &lt;3.0.26-0.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073845" version="1" comment="kernel-ec2-base is &lt;3.0.26-0.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073846" version="1" comment="kernel-ec2-devel is &lt;3.0.26-0.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075560" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075604" version="1" comment="apache2-mod_php53 is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111992" version="1" comment="php5 is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075561" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075562" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075563" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075564" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075565" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075566" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075567" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075568" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075569" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075570" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075571" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075572" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075573" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075574" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075575" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075576" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075577" version="1" comment="php5-json is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075578" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075579" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075580" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075581" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075582" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075583" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075584" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075585" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075586" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075587" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075588" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075589" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075590" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075591" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075592" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075593" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075594" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075595" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075596" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075597" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075598" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075599" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075600" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075601" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075602" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075603" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112792" version="1" comment="php53 is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075605" version="1" comment="php53-bcmath is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075606" version="1" comment="php53-bz2 is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075607" version="1" comment="php53-calendar is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075608" version="1" comment="php53-ctype is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075609" version="1" comment="php53-curl is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075610" version="1" comment="php53-dba is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075611" version="1" comment="php53-dom is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075612" version="1" comment="php53-exif is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075613" version="1" comment="php53-fastcgi is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075614" version="1" comment="php53-fileinfo is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075615" version="1" comment="php53-ftp is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075616" version="1" comment="php53-gd is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075617" version="1" comment="php53-gettext is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075618" version="1" comment="php53-gmp is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075619" version="1" comment="php53-iconv is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075620" version="1" comment="php53-intl is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075621" version="1" comment="php53-json is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075622" version="1" comment="php53-ldap is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075623" version="1" comment="php53-mbstring is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075624" version="1" comment="php53-mcrypt is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075625" version="1" comment="php53-mysql is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075626" version="1" comment="php53-odbc is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075627" version="1" comment="php53-openssl is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075628" version="1" comment="php53-pcntl is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075629" version="1" comment="php53-pdo is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075630" version="1" comment="php53-pear is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075631" version="1" comment="php53-pgsql is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075632" version="1" comment="php53-pspell is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075633" version="1" comment="php53-shmop is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075634" version="1" comment="php53-snmp is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075635" version="1" comment="php53-soap is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075636" version="1" comment="php53-suhosin is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075637" version="1" comment="php53-sysvmsg is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075638" version="1" comment="php53-sysvsem is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075639" version="1" comment="php53-sysvshm is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075640" version="1" comment="php53-tokenizer is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075641" version="1" comment="php53-wddx is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075642" version="1" comment="php53-xmlreader is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075643" version="1" comment="php53-xmlrpc is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075644" version="1" comment="php53-xmlwriter is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075645" version="1" comment="php53-xsl is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075646" version="1" comment="php53-zip is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075647" version="1" comment="php53-zlib is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075652" version="1" comment="php5-devel is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075653" version="1" comment="php5-imap is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075654" version="1" comment="php5-ncurses is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075655" version="1" comment="php5-posix is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075656" version="1" comment="php5-readline is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075657" version="1" comment="php5-sockets is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075658" version="1" comment="php5-sqlite is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075659" version="1" comment="php5-tidy is &lt;5.2.14-0.7.30.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075660" version="1" comment="php53-devel is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075661" version="1" comment="php53-imap is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075662" version="1" comment="php53-posix is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075663" version="1" comment="php53-readline is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075664" version="1" comment="php53-sockets is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075665" version="1" comment="php53-sqlite is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075666" version="1" comment="php53-tidy is &lt;5.3.8-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116821" version="1" comment="java-1_4_2-ibm-sap is &lt;1.4.2_sr13.11-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116822" version="1" comment="java-1_4_2-ibm-sap-devel is &lt;1.4.2_sr13.11-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073675" version="1" comment="apache2-mod_php53 is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112788" version="1" comment="php53 is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073676" version="1" comment="php53-bcmath is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073677" version="1" comment="php53-bz2 is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073678" version="1" comment="php53-calendar is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073679" version="1" comment="php53-ctype is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073680" version="1" comment="php53-curl is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073681" version="1" comment="php53-dba is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073682" version="1" comment="php53-dom is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073683" version="1" comment="php53-exif is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073684" version="1" comment="php53-fastcgi is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073685" version="1" comment="php53-fileinfo is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073686" version="1" comment="php53-ftp is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073687" version="1" comment="php53-gd is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073688" version="1" comment="php53-gettext is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073689" version="1" comment="php53-gmp is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073690" version="1" comment="php53-iconv is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073691" version="1" comment="php53-intl is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073692" version="1" comment="php53-json is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073693" version="1" comment="php53-ldap is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073694" version="1" comment="php53-mbstring is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073695" version="1" comment="php53-mcrypt is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073696" version="1" comment="php53-mysql is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073697" version="1" comment="php53-odbc is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073698" version="1" comment="php53-openssl is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073699" version="1" comment="php53-pcntl is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073700" version="1" comment="php53-pdo is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073701" version="1" comment="php53-pear is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073702" version="1" comment="php53-pgsql is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073703" version="1" comment="php53-pspell is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073704" version="1" comment="php53-shmop is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073705" version="1" comment="php53-snmp is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073706" version="1" comment="php53-soap is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073707" version="1" comment="php53-suhosin is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073708" version="1" comment="php53-sysvmsg is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073709" version="1" comment="php53-sysvsem is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073710" version="1" comment="php53-sysvshm is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073711" version="1" comment="php53-tokenizer is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073712" version="1" comment="php53-wddx is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073713" version="1" comment="php53-xmlreader is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073714" version="1" comment="php53-xmlrpc is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073715" version="1" comment="php53-xmlwriter is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073716" version="1" comment="php53-xsl is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073717" version="1" comment="php53-zip is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073718" version="1" comment="php53-zlib is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116823" version="1" comment="php53-devel is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116824" version="1" comment="php53-imap is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116825" version="1" comment="php53-posix is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116826" version="1" comment="php53-readline is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116827" version="1" comment="php53-sockets is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116828" version="1" comment="php53-sqlite is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116829" version="1" comment="php53-tidy is &lt;5.3.8-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116830" version="1" comment="lighttpd is &lt;1.4.20-2.46.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111841" version="1" comment="koan is &lt;2.0.10-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076741" version="1" comment="apache2 is &lt;2.2.12-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076736" version="1" comment="apache2-doc is &lt;2.2.12-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076737" version="1" comment="apache2-example-pages is &lt;2.2.12-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076738" version="1" comment="apache2-prefork is &lt;2.2.12-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076739" version="1" comment="apache2-utils is &lt;2.2.12-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076740" version="1" comment="apache2-worker is &lt;2.2.12-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076742" version="1" comment="apache2-devel is &lt;2.2.12-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075536" version="1" comment="java-1_6_0-openjdk is &lt;1.6.0.0_b24.1.11.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075534" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.6.0.0_b24.1.11.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075535" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.6.0.0_b24.1.11.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075780" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr2.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075778" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr2.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075779" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr2.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075781" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr2.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075797" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr11.0-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075794" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr11.0-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075795" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr11.0-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075796" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr11.0-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075798" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr11.0-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076493" version="1" comment="kernel-default is &lt;3.0.58-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076490" version="1" comment="kernel-default-base is &lt;3.0.58-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076491" version="1" comment="kernel-default-devel is &lt;3.0.58-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076492" version="1" comment="kernel-default-extra is &lt;3.0.58-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076494" version="1" comment="kernel-source is &lt;3.0.58-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076495" version="1" comment="kernel-syms is &lt;3.0.58-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076499" version="1" comment="kernel-trace is &lt;3.0.58-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076496" version="1" comment="kernel-trace-base is &lt;3.0.58-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076497" version="1" comment="kernel-trace-devel is &lt;3.0.58-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076498" version="1" comment="kernel-trace-extra is &lt;3.0.58-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076503" version="1" comment="kernel-xen is &lt;3.0.58-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076500" version="1" comment="kernel-xen-base is &lt;3.0.58-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076501" version="1" comment="kernel-xen-devel is &lt;3.0.58-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076502" version="1" comment="kernel-xen-extra is &lt;3.0.58-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076504" version="1" comment="xen-kmp-default is &lt;4.1.3_06_3.0.58_0.6.2-0.7.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076505" version="1" comment="xen-kmp-trace is &lt;4.1.3_06_3.0.58_0.6.2-0.7.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116831" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.58_0.6.2-2.18.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116832" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.58_0.6.2-2.18.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116833" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.58_0.6.2-2.18.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116834" version="1" comment="gfs2-kmp-default is &lt;2_3.0.58_0.6.2-0.7.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116835" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.58_0.6.2-0.7.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116836" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.58_0.6.2-0.7.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116837" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.58_0.6.2-0.11.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116838" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.58_0.6.2-0.11.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116839" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.58_0.6.2-0.11.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076513" version="1" comment="kernel-ec2 is &lt;3.0.58-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076511" version="1" comment="kernel-ec2-base is &lt;3.0.58-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076512" version="1" comment="kernel-ec2-devel is &lt;3.0.58-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074122" version="1" comment="apache2-mod_php53 is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112789" version="1" comment="php53 is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074123" version="1" comment="php53-bcmath is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074124" version="1" comment="php53-bz2 is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074125" version="1" comment="php53-calendar is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074126" version="1" comment="php53-ctype is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074127" version="1" comment="php53-curl is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074128" version="1" comment="php53-dba is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074129" version="1" comment="php53-dom is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074130" version="1" comment="php53-exif is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074131" version="1" comment="php53-fastcgi is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074132" version="1" comment="php53-fileinfo is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074133" version="1" comment="php53-ftp is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074134" version="1" comment="php53-gd is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074135" version="1" comment="php53-gettext is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074136" version="1" comment="php53-gmp is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074137" version="1" comment="php53-iconv is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074138" version="1" comment="php53-intl is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074139" version="1" comment="php53-json is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074140" version="1" comment="php53-ldap is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074141" version="1" comment="php53-mbstring is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074142" version="1" comment="php53-mcrypt is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074143" version="1" comment="php53-mysql is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074144" version="1" comment="php53-odbc is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074145" version="1" comment="php53-openssl is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074146" version="1" comment="php53-pcntl is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074147" version="1" comment="php53-pdo is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074148" version="1" comment="php53-pear is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074149" version="1" comment="php53-pgsql is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074150" version="1" comment="php53-pspell is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074151" version="1" comment="php53-shmop is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074152" version="1" comment="php53-snmp is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074153" version="1" comment="php53-soap is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074154" version="1" comment="php53-suhosin is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074155" version="1" comment="php53-sysvmsg is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074156" version="1" comment="php53-sysvsem is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074157" version="1" comment="php53-sysvshm is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074158" version="1" comment="php53-tokenizer is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074159" version="1" comment="php53-wddx is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074160" version="1" comment="php53-xmlreader is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074161" version="1" comment="php53-xmlrpc is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074162" version="1" comment="php53-xmlwriter is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074163" version="1" comment="php53-xsl is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074164" version="1" comment="php53-zip is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074165" version="1" comment="php53-zlib is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074190" version="1" comment="php53-devel is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074191" version="1" comment="php53-imap is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074192" version="1" comment="php53-posix is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074193" version="1" comment="php53-readline is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074194" version="1" comment="php53-sockets is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074195" version="1" comment="php53-sqlite is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074196" version="1" comment="php53-tidy is &lt;5.3.8-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076317" version="1" comment="acroread is &lt;9.5.3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076312" version="1" comment="acroread-cmaps is &lt;9.4.6-0.4.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076313" version="1" comment="acroread-fonts-ja is &lt;9.4.6-0.4.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076314" version="1" comment="acroread-fonts-ko is &lt;9.4.6-0.4.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076315" version="1" comment="acroread-fonts-zh_CN is &lt;9.4.6-0.4.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076316" version="1" comment="acroread-fonts-zh_TW is &lt;9.4.6-0.4.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075862" version="1" comment="java-1_6_0-openjdk is &lt;1.6.0.0_b24.1.11.5-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075860" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.6.0.0_b24.1.11.5-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075861" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.6.0.0_b24.1.11.5-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076249" version="1" comment="kernel-default is &lt;3.0.51-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076246" version="1" comment="kernel-default-base is &lt;3.0.51-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076247" version="1" comment="kernel-default-devel is &lt;3.0.51-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076248" version="1" comment="kernel-default-extra is &lt;3.0.51-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076254" version="1" comment="kernel-source is &lt;3.0.51-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076255" version="1" comment="kernel-syms is &lt;3.0.51-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076259" version="1" comment="kernel-trace is &lt;3.0.51-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076256" version="1" comment="kernel-trace-base is &lt;3.0.51-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076257" version="1" comment="kernel-trace-devel is &lt;3.0.51-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076258" version="1" comment="kernel-trace-extra is &lt;3.0.51-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076263" version="1" comment="kernel-xen is &lt;3.0.51-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076260" version="1" comment="kernel-xen-base is &lt;3.0.51-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076261" version="1" comment="kernel-xen-devel is &lt;3.0.51-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076262" version="1" comment="kernel-xen-extra is &lt;3.0.51-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116840" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.51_0.7.9-2.18.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116841" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.51_0.7.9-2.18.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116842" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.51_0.7.9-2.18.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116843" version="1" comment="gfs2-kmp-default is &lt;2_3.0.51_0.7.9-0.7.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116844" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.51_0.7.9-0.7.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116845" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.51_0.7.9-0.7.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116846" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.51_0.7.9-0.11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116847" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.51_0.7.9-0.11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116848" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.51_0.7.9-0.11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076269" version="1" comment="kernel-ec2 is &lt;3.0.51-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076267" version="1" comment="kernel-ec2-base is &lt;3.0.51-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076268" version="1" comment="kernel-ec2-devel is &lt;3.0.51-0.7.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074604" version="1" comment="bind-libs is &lt;9.6ESVR7P1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074602" version="1" comment="bind-libs-32bit is &lt;9.6ESVR7P1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074605" version="1" comment="bind-utils is &lt;9.6ESVR7P1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074606" version="1" comment="bind is &lt;9.6ESVR7P1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074600" version="1" comment="bind-chrootenv is &lt;9.6ESVR7P1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074601" version="1" comment="bind-doc is &lt;9.6ESVR7P1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074630" version="1" comment="bind-devel is &lt;9.6ESVR7P1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075674" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.13-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075675" version="1" comment="java-1_4_2-ibm-devel is &lt;1.4.2_sr13.13-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074755" version="1" comment="kernel-default is &lt;3.0.34-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074753" version="1" comment="kernel-default-base is &lt;3.0.34-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074754" version="1" comment="kernel-default-devel is &lt;3.0.34-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113132" version="1" comment="kernel-default-extra is &lt;3.0.34-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074759" version="1" comment="kernel-source is &lt;3.0.34-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074760" version="1" comment="kernel-syms is &lt;3.0.34-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074763" version="1" comment="kernel-trace is &lt;3.0.34-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074761" version="1" comment="kernel-trace-base is &lt;3.0.34-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074762" version="1" comment="kernel-trace-devel is &lt;3.0.34-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113134" version="1" comment="kernel-trace-extra is &lt;3.0.34-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112831" version="1" comment="kernel-xen is &lt;3.0.34-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112832" version="1" comment="kernel-xen-base is &lt;3.0.34-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112833" version="1" comment="kernel-xen-devel is &lt;3.0.34-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113135" version="1" comment="kernel-xen-extra is &lt;3.0.34-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116849" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.34_0.7-2.10.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116850" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.34_0.7-2.10.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116851" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.34_0.7-2.10.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116852" version="1" comment="gfs2-kmp-default is &lt;2_3.0.34_0.7-0.7.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116853" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.34_0.7-0.7.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116854" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.34_0.7-0.7.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116855" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.34_0.7-0.7.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116856" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.34_0.7-0.7.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116857" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.34_0.7-0.7.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112828" version="1" comment="kernel-ec2 is &lt;3.0.34-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112829" version="1" comment="kernel-ec2-base is &lt;3.0.34-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112830" version="1" comment="kernel-ec2-devel is &lt;3.0.34-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074334" version="1" comment="kernel-default is &lt;3.0.31-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074332" version="1" comment="kernel-default-base is &lt;3.0.31-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074333" version="1" comment="kernel-default-devel is &lt;3.0.31-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074380" version="1" comment="kernel-default-extra is &lt;3.0.31-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074341" version="1" comment="kernel-source is &lt;3.0.31-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074342" version="1" comment="kernel-syms is &lt;3.0.31-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074345" version="1" comment="kernel-trace is &lt;3.0.31-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074343" version="1" comment="kernel-trace-base is &lt;3.0.31-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074344" version="1" comment="kernel-trace-devel is &lt;3.0.31-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074382" version="1" comment="kernel-trace-extra is &lt;3.0.31-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074348" version="1" comment="kernel-xen is &lt;3.0.31-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074346" version="1" comment="kernel-xen-base is &lt;3.0.31-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074347" version="1" comment="kernel-xen-devel is &lt;3.0.31-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074383" version="1" comment="kernel-xen-extra is &lt;3.0.31-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116858" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.31_0.9-2.10.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116859" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.31_0.9-2.10.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116860" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.31_0.9-2.10.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116861" version="1" comment="gfs2-kmp-default is &lt;2_3.0.31_0.9-0.7.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116862" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.31_0.9-0.7.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116863" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.31_0.9-0.7.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116864" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.31_0.9-0.7.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116865" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.31_0.9-0.7.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116866" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.31_0.9-0.7.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074337" version="1" comment="kernel-ec2 is &lt;3.0.31-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074335" version="1" comment="kernel-ec2-base is &lt;3.0.31-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074336" version="1" comment="kernel-ec2-devel is &lt;3.0.31-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077162" version="1" comment="kernel-default is &lt;3.0.74-0.6.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077159" version="1" comment="kernel-default-base is &lt;3.0.74-0.6.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077160" version="1" comment="kernel-default-devel is &lt;3.0.74-0.6.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077161" version="1" comment="kernel-default-extra is &lt;3.0.74-0.6.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077163" version="1" comment="kernel-source is &lt;3.0.74-0.6.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077164" version="1" comment="kernel-syms is &lt;3.0.74-0.6.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077168" version="1" comment="kernel-trace is &lt;3.0.74-0.6.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077165" version="1" comment="kernel-trace-base is &lt;3.0.74-0.6.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077166" version="1" comment="kernel-trace-devel is &lt;3.0.74-0.6.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077167" version="1" comment="kernel-trace-extra is &lt;3.0.74-0.6.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077172" version="1" comment="kernel-xen is &lt;3.0.74-0.6.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077169" version="1" comment="kernel-xen-base is &lt;3.0.74-0.6.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077170" version="1" comment="kernel-xen-devel is &lt;3.0.74-0.6.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077171" version="1" comment="kernel-xen-extra is &lt;3.0.74-0.6.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077173" version="1" comment="xen-kmp-default is &lt;4.1.4_02_3.0.74_0.6.6-0.5.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077174" version="1" comment="xen-kmp-trace is &lt;4.1.4_02_3.0.74_0.6.6-0.5.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116867" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.74_0.6.6-2.18.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116868" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.74_0.6.6-2.18.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116869" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.74_0.6.6-2.18.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116870" version="1" comment="gfs2-kmp-default is &lt;2_3.0.74_0.6.6-0.7.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116871" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.74_0.6.6-0.7.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116872" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.74_0.6.6-0.7.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116873" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.74_0.6.6-0.11.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116874" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.74_0.6.6-0.11.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116875" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.74_0.6.6-0.11.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077187" version="1" comment="kernel-ec2 is &lt;3.0.74-0.6.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077185" version="1" comment="kernel-ec2-base is &lt;3.0.74-0.6.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077186" version="1" comment="kernel-ec2-devel is &lt;3.0.74-0.6.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074813" version="1" comment="apache2-mod_php53 is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112790" version="1" comment="php53 is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074814" version="1" comment="php53-bcmath is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074815" version="1" comment="php53-bz2 is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074816" version="1" comment="php53-calendar is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074817" version="1" comment="php53-ctype is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074818" version="1" comment="php53-curl is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074819" version="1" comment="php53-dba is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074820" version="1" comment="php53-dom is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074821" version="1" comment="php53-exif is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074822" version="1" comment="php53-fastcgi is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074823" version="1" comment="php53-fileinfo is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074824" version="1" comment="php53-ftp is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074825" version="1" comment="php53-gd is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074826" version="1" comment="php53-gettext is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074827" version="1" comment="php53-gmp is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074828" version="1" comment="php53-iconv is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074829" version="1" comment="php53-intl is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074830" version="1" comment="php53-json is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074831" version="1" comment="php53-ldap is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074832" version="1" comment="php53-mbstring is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074833" version="1" comment="php53-mcrypt is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074834" version="1" comment="php53-mysql is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074835" version="1" comment="php53-odbc is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074836" version="1" comment="php53-openssl is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074837" version="1" comment="php53-pcntl is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074838" version="1" comment="php53-pdo is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074839" version="1" comment="php53-pear is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074840" version="1" comment="php53-pgsql is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074841" version="1" comment="php53-pspell is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074842" version="1" comment="php53-shmop is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074843" version="1" comment="php53-snmp is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074844" version="1" comment="php53-soap is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074845" version="1" comment="php53-suhosin is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074846" version="1" comment="php53-sysvmsg is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074847" version="1" comment="php53-sysvsem is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074848" version="1" comment="php53-sysvshm is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074849" version="1" comment="php53-tokenizer is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074850" version="1" comment="php53-wddx is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074851" version="1" comment="php53-xmlreader is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074852" version="1" comment="php53-xmlrpc is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074853" version="1" comment="php53-xmlwriter is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074854" version="1" comment="php53-xsl is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074855" version="1" comment="php53-zip is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074856" version="1" comment="php53-zlib is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074857" version="1" comment="php53-devel is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074858" version="1" comment="php53-imap is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074859" version="1" comment="php53-posix is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074860" version="1" comment="php53-readline is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074861" version="1" comment="php53-sockets is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074862" version="1" comment="php53-sqlite is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074863" version="1" comment="php53-tidy is &lt;5.3.8-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098339" version="1" comment="kernel-default is &lt;3.0.101-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098337" version="1" comment="kernel-default-base is &lt;3.0.101-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098338" version="1" comment="kernel-default-devel is &lt;3.0.101-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098778" version="1" comment="kernel-default-extra is &lt;3.0.101-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098346" version="1" comment="kernel-source is &lt;3.0.101-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098347" version="1" comment="kernel-syms is &lt;3.0.101-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098349" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098353" version="1" comment="kernel-xen is &lt;3.0.101-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098351" version="1" comment="kernel-xen-base is &lt;3.0.101-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098352" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098780" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098354" version="1" comment="xen-kmp-default is &lt;4.2.4_02_3.0.101_0.35-0.7.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116876" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.101_0.35-2.27.78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132745" version="1" comment="cluster-network-kmp-ppc64 is &lt;1.4_3.0.101_0.35-2.27.78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116877" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.101_0.35-2.27.78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116879" version="1" comment="gfs2-kmp-default is &lt;2_3.0.101_0.35-0.16.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132746" version="1" comment="gfs2-kmp-ppc64 is &lt;2_3.0.101_0.35-0.16.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116880" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.101_0.35-0.16.84" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116882" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_0.35-0.20.78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132747" version="1" comment="ocfs2-kmp-ppc64 is &lt;1.6_3.0.101_0.35-0.20.78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116883" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_0.35-0.20.78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116885" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.61_rt85_0.7-2.18.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116886" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.61_rt85_0.7-2.18.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116887" version="1" comment="drbd-kmp-rt is &lt;8.4.2_3.0.61_rt85_0.7-0.6.6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116888" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.2_3.0.61_rt85_0.7-0.6.6.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116889" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.61_rt85_0.7-0.23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116890" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.61_rt85_0.7-0.23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116891" version="1" comment="kernel-rt is &lt;3.0.61.rt85-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116892" version="1" comment="kernel-rt-base is &lt;3.0.61.rt85-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116893" version="1" comment="kernel-rt-devel is &lt;3.0.61.rt85-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116894" version="1" comment="kernel-rt_trace is &lt;3.0.61.rt85-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116895" version="1" comment="kernel-rt_trace-base is &lt;3.0.61.rt85-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116896" version="1" comment="kernel-rt_trace-devel is &lt;3.0.61.rt85-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116897" version="1" comment="kernel-source-rt is &lt;3.0.61.rt85-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116898" version="1" comment="kernel-syms-rt is &lt;3.0.61.rt85-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116899" version="1" comment="lttng-modules-kmp-rt is &lt;2.0.4_3.0.61_rt85_0.7-0.7.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116900" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.0.4_3.0.61_rt85_0.7-0.7.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116901" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.61_rt85_0.7-0.11.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116902" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.61_rt85_0.7-0.11.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116903" version="1" comment="ofed-kmp-rt is &lt;1.5.2_3.0.61_rt85_0.7-0.26.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116904" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.2_3.0.61_rt85_0.7-0.26.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116905" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.101_rt130_0.24-2.27.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116906" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.101_rt130_0.24-2.27.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116907" version="1" comment="drbd-kmp-rt is &lt;8.4.4_3.0.101_rt130_0.24-0.22.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116908" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.4_3.0.101_rt130_0.24-0.22.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116909" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.101_rt130_0.24-0.38.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116910" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.101_rt130_0.24-0.38.64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116911" version="1" comment="kernel-rt is &lt;3.0.101.rt130-0.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116912" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-0.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116913" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-0.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116914" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-0.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116915" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-0.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116916" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-0.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116917" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-0.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116918" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-0.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116919" version="1" comment="lttng-modules-kmp-rt is &lt;2.1.1_3.0.101_rt130_0.24-0.11.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116920" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.1.1_3.0.101_rt130_0.24-0.11.57" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116921" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.101_rt130_0.24-0.20.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116922" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.101_rt130_0.24-0.20.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116923" version="1" comment="ofed-kmp-rt is &lt;1.5.4.1_3.0.101_rt130_0.24-0.13.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116924" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.4.1_3.0.101_rt130_0.24-0.13.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098342" version="1" comment="kernel-ec2 is &lt;3.0.101-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098340" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098341" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098350" version="1" comment="kernel-trace is &lt;3.0.101-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098348" version="1" comment="kernel-trace-base is &lt;3.0.101-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075255" version="1" comment="rubygem-actionpack-2_3 is &lt;2.3.14-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075321" version="1" comment="apache2-mod_php53 is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112791" version="1" comment="php53 is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075322" version="1" comment="php53-bcmath is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075323" version="1" comment="php53-bz2 is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075324" version="1" comment="php53-calendar is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075325" version="1" comment="php53-ctype is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075326" version="1" comment="php53-curl is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075327" version="1" comment="php53-dba is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075328" version="1" comment="php53-dom is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075329" version="1" comment="php53-exif is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075330" version="1" comment="php53-fastcgi is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075331" version="1" comment="php53-fileinfo is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075332" version="1" comment="php53-ftp is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075333" version="1" comment="php53-gd is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075334" version="1" comment="php53-gettext is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075335" version="1" comment="php53-gmp is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075336" version="1" comment="php53-iconv is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075337" version="1" comment="php53-intl is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075338" version="1" comment="php53-json is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075339" version="1" comment="php53-ldap is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075340" version="1" comment="php53-mbstring is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075341" version="1" comment="php53-mcrypt is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075342" version="1" comment="php53-mysql is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075343" version="1" comment="php53-odbc is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075344" version="1" comment="php53-openssl is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075345" version="1" comment="php53-pcntl is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075346" version="1" comment="php53-pdo is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075347" version="1" comment="php53-pear is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075348" version="1" comment="php53-pgsql is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075349" version="1" comment="php53-pspell is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075350" version="1" comment="php53-shmop is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075351" version="1" comment="php53-snmp is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075352" version="1" comment="php53-soap is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075353" version="1" comment="php53-suhosin is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075354" version="1" comment="php53-sysvmsg is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075355" version="1" comment="php53-sysvsem is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075356" version="1" comment="php53-sysvshm is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075357" version="1" comment="php53-tokenizer is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075358" version="1" comment="php53-wddx is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075359" version="1" comment="php53-xmlreader is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075360" version="1" comment="php53-xmlrpc is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075361" version="1" comment="php53-xmlwriter is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075362" version="1" comment="php53-xsl is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075363" version="1" comment="php53-zip is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075364" version="1" comment="php53-zlib is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075409" version="1" comment="php53-devel is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075410" version="1" comment="php53-imap is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075411" version="1" comment="php53-posix is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075412" version="1" comment="php53-readline is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075413" version="1" comment="php53-sockets is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075414" version="1" comment="php53-sqlite is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075415" version="1" comment="php53-tidy is &lt;5.3.8-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075820" version="1" comment="kernel-default is &lt;3.0.42-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075817" version="1" comment="kernel-default-base is &lt;3.0.42-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075818" version="1" comment="kernel-default-devel is &lt;3.0.42-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075819" version="1" comment="kernel-default-extra is &lt;3.0.42-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075825" version="1" comment="kernel-source is &lt;3.0.42-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075826" version="1" comment="kernel-syms is &lt;3.0.42-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075830" version="1" comment="kernel-trace is &lt;3.0.42-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075827" version="1" comment="kernel-trace-base is &lt;3.0.42-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075828" version="1" comment="kernel-trace-devel is &lt;3.0.42-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075829" version="1" comment="kernel-trace-extra is &lt;3.0.42-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075834" version="1" comment="kernel-xen is &lt;3.0.42-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075831" version="1" comment="kernel-xen-base is &lt;3.0.42-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075832" version="1" comment="kernel-xen-devel is &lt;3.0.42-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075833" version="1" comment="kernel-xen-extra is &lt;3.0.42-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116925" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.42_0.7-2.18.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116926" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.42_0.7-2.18.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116927" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.42_0.7-2.18.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116928" version="1" comment="gfs2-kmp-default is &lt;2_3.0.42_0.7-0.7.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116929" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.42_0.7-0.7.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116930" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.42_0.7-0.7.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116931" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.42_0.7-0.11.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116932" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.42_0.7-0.11.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116933" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.42_0.7-0.11.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075837" version="1" comment="kernel-ec2 is &lt;3.0.42-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075835" version="1" comment="kernel-ec2-base is &lt;3.0.42-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075836" version="1" comment="kernel-ec2-devel is &lt;3.0.42-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075222" version="1" comment="kernel-default is &lt;3.0.38-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075219" version="1" comment="kernel-default-base is &lt;3.0.38-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075220" version="1" comment="kernel-default-devel is &lt;3.0.38-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075221" version="1" comment="kernel-default-extra is &lt;3.0.38-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075223" version="1" comment="kernel-source is &lt;3.0.38-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075224" version="1" comment="kernel-syms is &lt;3.0.38-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075228" version="1" comment="kernel-trace is &lt;3.0.38-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075225" version="1" comment="kernel-trace-base is &lt;3.0.38-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075226" version="1" comment="kernel-trace-devel is &lt;3.0.38-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075227" version="1" comment="kernel-trace-extra is &lt;3.0.38-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075232" version="1" comment="kernel-xen is &lt;3.0.38-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075229" version="1" comment="kernel-xen-base is &lt;3.0.38-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075230" version="1" comment="kernel-xen-devel is &lt;3.0.38-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075231" version="1" comment="kernel-xen-extra is &lt;3.0.38-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116934" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.38_0.5-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116935" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.38_0.5-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116936" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.38_0.5-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116937" version="1" comment="gfs2-kmp-default is &lt;2_3.0.38_0.5-0.7.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116938" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.38_0.5-0.7.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116939" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.38_0.5-0.7.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116940" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.38_0.5-0.7.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116941" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.38_0.5-0.7.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116942" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.38_0.5-0.7.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075250" version="1" comment="kernel-ec2 is &lt;3.0.38-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075248" version="1" comment="kernel-ec2-base is &lt;3.0.38-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075249" version="1" comment="kernel-ec2-devel is &lt;3.0.38-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076223" version="1" comment="glibc is &lt;2.11.3-17.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076217" version="1" comment="glibc-32bit is &lt;2.11.3-17.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076219" version="1" comment="glibc-devel is &lt;2.11.3-17.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076218" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076220" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076222" version="1" comment="glibc-locale is &lt;2.11.3-17.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076221" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076224" version="1" comment="nscd is &lt;2.11.3-17.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076239" version="1" comment="glibc-html is &lt;2.11.3-17.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076240" version="1" comment="glibc-info is &lt;2.11.3-17.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076244" version="1" comment="glibc-profile is &lt;2.11.3-17.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076242" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077328" version="1" comment="icedtea-web is &lt;1.4-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077575" version="1" comment="icedtea-web is &lt;1.4-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076475" version="1" comment="rubygem-actionpack-2_3 is &lt;2.3.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077064" version="1" comment="apache2-devel is &lt;2.2.12-1.38.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075706" version="1" comment="kvm is &lt;0.15.1-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075238" version="1" comment="dhcp is &lt;4.2.4.P1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075237" version="1" comment="dhcp-client is &lt;4.2.4.P1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075251" version="1" comment="dhcp-relay is &lt;4.2.4.P1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075252" version="1" comment="dhcp-server is &lt;4.2.4.P1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075259" version="1" comment="dhcp-devel is &lt;4.2.4.P1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075462" version="1" comment="bind-libs is &lt;9.6ESVR7P2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075461" version="1" comment="bind-libs-32bit is &lt;9.6ESVR7P2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075463" version="1" comment="bind-utils is &lt;9.6ESVR7P2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075474" version="1" comment="bind is &lt;9.6ESVR7P2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075471" version="1" comment="bind-chrootenv is &lt;9.6ESVR7P2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075472" version="1" comment="bind-doc is &lt;9.6ESVR7P2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075482" version="1" comment="bind-devel is &lt;9.6ESVR7P2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075802" version="1" comment="dhcp is &lt;4.2.4.P2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075801" version="1" comment="dhcp-client is &lt;4.2.4.P2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075803" version="1" comment="dhcp-relay is &lt;4.2.4.P2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075804" version="1" comment="dhcp-server is &lt;4.2.4.P2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075805" version="1" comment="dhcp-devel is &lt;4.2.4.P2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075548" version="1" comment="wireshark is &lt;1.4.15-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116943" version="1" comment="wireshark-devel is &lt;1.4.15-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075680" version="1" comment="bind-libs is &lt;9.6ESVR7P3-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075679" version="1" comment="bind-libs-32bit is &lt;9.6ESVR7P3-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075681" version="1" comment="bind-utils is &lt;9.6ESVR7P3-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103815" version="1" comment="bind is &lt;9.6ESVR7P3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103810" version="1" comment="bind-chrootenv is &lt;9.6ESVR7P3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103811" version="1" comment="bind-doc is &lt;9.6ESVR7P3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103813" version="1" comment="bind-libs is &lt;9.6ESVR7P3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103812" version="1" comment="bind-libs-32bit is &lt;9.6ESVR7P3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103814" version="1" comment="bind-utils is &lt;9.6ESVR7P3-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075692" version="1" comment="bind is &lt;9.6ESVR7P3-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075689" version="1" comment="bind-chrootenv is &lt;9.6ESVR7P3-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075690" version="1" comment="bind-doc is &lt;9.6ESVR7P3-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075694" version="1" comment="bind-devel is &lt;9.6ESVR7P3-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103160" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103164" version="1" comment="kernel-default is &lt;3.0.101-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103161" version="1" comment="kernel-default-base is &lt;3.0.101-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103162" version="1" comment="kernel-default-devel is &lt;3.0.101-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103163" version="1" comment="kernel-default-extra is &lt;3.0.101-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103165" version="1" comment="kernel-source is &lt;3.0.101-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103166" version="1" comment="kernel-syms is &lt;3.0.101-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103167" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103171" version="1" comment="kernel-xen is &lt;3.0.101-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103168" version="1" comment="kernel-xen-base is &lt;3.0.101-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103169" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103170" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103172" version="1" comment="xen-kmp-default is &lt;4.2.5_02_3.0.101_0.46-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132754" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.101_0.42-2.27.115" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132755" version="1" comment="cluster-network-kmp-ppc64 is &lt;1.4_3.0.101_0.42-2.27.115" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132756" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.101_0.42-2.27.115" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132757" version="1" comment="gfs2-kmp-default is &lt;2_3.0.101_0.42-0.16.121" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132758" version="1" comment="gfs2-kmp-ppc64 is &lt;2_3.0.101_0.42-0.16.121" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132759" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.101_0.42-0.16.121" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132760" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_0.42-0.20.115" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132761" version="1" comment="ocfs2-kmp-ppc64 is &lt;1.6_3.0.101_0.42-0.20.115" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132762" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_0.42-0.20.115" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116956" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.101_rt130_0.32-2.27.121" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116957" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.101_rt130_0.32-2.27.121" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116958" version="1" comment="drbd-kmp-rt is &lt;8.4.4_3.0.101_rt130_0.32-0.22.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116959" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.4_3.0.101_rt130_0.32-0.22.87" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116960" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.101_rt130_0.32-0.38.106" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116961" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.101_rt130_0.32-0.38.106" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116962" version="1" comment="kernel-rt is &lt;3.0.101.rt130-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116963" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116964" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116965" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116966" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116967" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116968" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116969" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116970" version="1" comment="lttng-modules-kmp-rt is &lt;2.1.1_3.0.101_rt130_0.32-0.11.96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116971" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.1.1_3.0.101_rt130_0.32-0.11.96" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116972" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.101_rt130_0.32-0.20.121" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116973" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.101_rt130_0.32-0.20.121" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116974" version="1" comment="ofed-kmp-rt is &lt;1.5.4.1_3.0.101_rt130_0.32-0.13.112" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116975" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.4.1_3.0.101_rt130_0.32-0.13.112" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107632" version="1" comment="kernel-default is &lt;3.0.101-0.7.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107629" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107630" version="1" comment="kernel-default-devel is &lt;3.0.101-0.7.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104060" version="1" comment="kernel-default-man is &lt;3.0.101-0.7.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107640" version="1" comment="kernel-ec2 is &lt;3.0.101-0.7.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107638" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.7.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107639" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.7.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104059" version="1" comment="kernel-pae is &lt;3.0.101-0.7.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104057" version="1" comment="kernel-pae-base is &lt;3.0.101-0.7.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104058" version="1" comment="kernel-pae-devel is &lt;3.0.101-0.7.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107633" version="1" comment="kernel-source is &lt;3.0.101-0.7.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107634" version="1" comment="kernel-syms is &lt;3.0.101-0.7.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107637" version="1" comment="kernel-trace is &lt;3.0.101-0.7.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107635" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107636" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.7.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107643" version="1" comment="kernel-xen is &lt;3.0.101-0.7.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107641" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107642" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.7.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107644" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.29-0.5.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112865" version="1" comment="xen-kmp-pae is &lt;4.1.6_06_3.0.101_0.7.23-0.5.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107645" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.29-0.5.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103174" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103173" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103177" version="1" comment="kernel-ec2 is &lt;3.0.101-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103175" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103176" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103179" version="1" comment="kernel-trace is &lt;3.0.101-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103178" version="1" comment="kernel-trace-base is &lt;3.0.101-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091862" version="1" comment="glibc is &lt;2.11.3-17.56.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091849" version="1" comment="glibc-32bit is &lt;2.11.3-17.56.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091851" version="1" comment="glibc-devel is &lt;2.11.3-17.56.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091850" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.56.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091853" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.56.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091857" version="1" comment="glibc-locale is &lt;2.11.3-17.56.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091855" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.56.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091863" version="1" comment="nscd is &lt;2.11.3-17.56.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091852" version="1" comment="glibc-html is &lt;2.11.3-17.56.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091854" version="1" comment="glibc-info is &lt;2.11.3-17.56.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091860" version="1" comment="glibc-profile is &lt;2.11.3-17.56.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091858" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.56.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076457" version="1" comment="libtiff3 is &lt;3.8.2-141.150.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076456" version="1" comment="libtiff3-32bit is &lt;3.8.2-141.150.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076470" version="1" comment="tiff is &lt;3.8.2-141.150.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076473" version="1" comment="libtiff-devel is &lt;3.8.2-141.150.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076472" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-141.150.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076791" version="1" comment="ruby-devel is &lt;1.8.7.p357-0.9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076792" version="1" comment="ruby-doc-ri is &lt;1.8.7.p357-0.9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076793" version="1" comment="ruby-examples is &lt;1.8.7.p357-0.9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076794" version="1" comment="ruby-test-suite is &lt;1.8.7.p357-0.9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090837" version="1" comment="icedtea-web is &lt;1.4.1-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075982" version="1" comment="libQtWebKit4 is &lt;4.6.3-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075981" version="1" comment="libQtWebKit4-32bit is &lt;4.6.3-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075998" version="1" comment="libqt4 is &lt;4.6.3-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075983" version="1" comment="libqt4-32bit is &lt;4.6.3-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075985" version="1" comment="libqt4-qt3support is &lt;4.6.3-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075984" version="1" comment="libqt4-qt3support-32bit is &lt;4.6.3-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075995" version="1" comment="libqt4-sql is &lt;4.6.3-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075986" version="1" comment="libqt4-sql-32bit is &lt;4.6.3-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075988" version="1" comment="libqt4-sql-mysql is &lt;4.6.3-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075987" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.6.3-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075990" version="1" comment="libqt4-sql-postgresql is &lt;4.6.3-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075989" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.6.3-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075992" version="1" comment="libqt4-sql-sqlite is &lt;4.6.3-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075991" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.6.3-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075994" version="1" comment="libqt4-sql-unixODBC is &lt;4.6.3-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075993" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.6.3-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075997" version="1" comment="libqt4-x11 is &lt;4.6.3-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075996" version="1" comment="libqt4-x11-32bit is &lt;4.6.3-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076011" version="1" comment="libQtWebKit-devel is &lt;4.6.3-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076013" version="1" comment="libqt4-devel is &lt;4.6.3-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076012" version="1" comment="libqt4-devel-doc-data is &lt;4.6.3-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076169" version="1" comment="libxml2 is &lt;2.7.6-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076167" version="1" comment="libxml2-32bit is &lt;2.7.6-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076168" version="1" comment="libxml2-python is &lt;2.7.6-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076183" version="1" comment="libxml2-doc is &lt;2.7.6-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076203" version="1" comment="libxml2-devel is &lt;2.7.6-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076202" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075864" version="1" comment="bind-libs is &lt;9.6ESVR7P4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075863" version="1" comment="bind-libs-32bit is &lt;9.6ESVR7P4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075865" version="1" comment="bind-utils is &lt;9.6ESVR7P4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075884" version="1" comment="bind is &lt;9.6ESVR7P4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075881" version="1" comment="bind-chrootenv is &lt;9.6ESVR7P4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075882" version="1" comment="bind-doc is &lt;9.6ESVR7P4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075886" version="1" comment="bind-devel is &lt;9.6ESVR7P4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075809" version="1" comment="flash-player is &lt;11.2.202.243-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076029" version="1" comment="flash-player is &lt;11.2.202.251-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076160" version="1" comment="xen is &lt;4.1.3_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076152" version="1" comment="xen-doc-html is &lt;4.1.3_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076153" version="1" comment="xen-doc-pdf is &lt;4.1.3_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076154" version="1" comment="xen-kmp-default is &lt;4.1.3_06_3.0.51_0.7.9-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076155" version="1" comment="xen-kmp-trace is &lt;4.1.3_06_3.0.51_0.7.9-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076157" version="1" comment="xen-libs is &lt;4.1.3_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076156" version="1" comment="xen-libs-32bit is &lt;4.1.3_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076159" version="1" comment="xen-tools is &lt;4.1.3_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076158" version="1" comment="xen-tools-domU is &lt;4.1.3_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076161" version="1" comment="xen-devel is &lt;4.1.3_06-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076488" version="1" comment="wireshark is &lt;1.8.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076489" version="1" comment="wireshark-devel is &lt;1.8.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108144" version="1" comment="libmysql55client18 is &lt;5.5.42-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108143" version="1" comment="libmysql55client18-32bit is &lt;5.5.42-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108145" version="1" comment="libmysql55client_r18 is &lt;5.5.42-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108139" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.42-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108150" version="1" comment="mysql is &lt;5.5.42-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108149" version="1" comment="mysql-client is &lt;5.5.42-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108153" version="1" comment="mysql-tools is &lt;5.5.42-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076205" version="1" comment="flash-player is &lt;11.2.202.258-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077463" version="1" comment="gpg2 is &lt;2.0.9-25.33.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077462" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077542" version="1" comment="gpg2 is &lt;2.0.9-25.33.33.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077541" version="1" comment="gpg2-lang is &lt;2.0.9-25.33.33.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076711" version="1" comment="nagios-devel is &lt;3.0.6-1.25.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092644" version="1" comment="libldb1 is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092699" version="1" comment="libldb1-32bit is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092647" version="1" comment="libsmbclient0 is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092645" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092650" version="1" comment="libtalloc2 is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092648" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092653" version="1" comment="libtdb1 is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092651" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092655" version="1" comment="libtevent0 is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092654" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092658" version="1" comment="libwbclient0 is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092656" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092669" version="1" comment="samba is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092659" version="1" comment="samba-32bit is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092662" version="1" comment="samba-client is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092660" version="1" comment="samba-client-32bit is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092663" version="1" comment="samba-doc is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092664" version="1" comment="samba-krb-printing is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092667" version="1" comment="samba-winbind is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092665" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103842" version="1" comment="cifs-mount is &lt;3.4.3-1.52.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103843" version="1" comment="ldapsmb is &lt;1.34b-11.28.52.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103845" version="1" comment="libsmbclient0 is &lt;3.4.3-1.52.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103844" version="1" comment="libsmbclient0-32bit is &lt;3.4.3-1.52.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103847" version="1" comment="libtalloc1 is &lt;3.4.3-1.52.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103846" version="1" comment="libtalloc1-32bit is &lt;3.4.3-1.52.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103849" version="1" comment="libtdb1 is &lt;3.4.3-1.52.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103848" version="1" comment="libtdb1-32bit is &lt;3.4.3-1.52.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103851" version="1" comment="libwbclient0 is &lt;3.4.3-1.52.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103850" version="1" comment="libwbclient0-32bit is &lt;3.4.3-1.52.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103859" version="1" comment="samba is &lt;3.4.3-1.52.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103852" version="1" comment="samba-32bit is &lt;3.4.3-1.52.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103854" version="1" comment="samba-client is &lt;3.4.3-1.52.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103853" version="1" comment="samba-client-32bit is &lt;3.4.3-1.52.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103855" version="1" comment="samba-doc is &lt;3.4.3-1.52.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103856" version="1" comment="samba-krb-printing is &lt;3.4.3-1.52.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103858" version="1" comment="samba-winbind is &lt;3.4.3-1.52.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103857" version="1" comment="samba-winbind-32bit is &lt;3.4.3-1.52.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092643" version="1" comment="ldapsmb is &lt;1.34b-12.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092688" version="1" comment="libldb-devel is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092689" version="1" comment="libnetapi-devel is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092690" version="1" comment="libnetapi0 is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092691" version="1" comment="libsmbclient-devel is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092692" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092693" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092694" version="1" comment="libtalloc-devel is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092695" version="1" comment="libtdb-devel is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092696" version="1" comment="libtevent-devel is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092697" version="1" comment="libwbclient-devel is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092698" version="1" comment="samba-devel is &lt;3.6.3-0.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103872" version="1" comment="kernel-default is &lt;2.6.32.59-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103870" version="1" comment="kernel-default-base is &lt;2.6.32.59-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103871" version="1" comment="kernel-default-devel is &lt;2.6.32.59-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103875" version="1" comment="kernel-ec2 is &lt;2.6.32.59-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103873" version="1" comment="kernel-ec2-base is &lt;2.6.32.59-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103874" version="1" comment="kernel-ec2-devel is &lt;2.6.32.59-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103879" version="1" comment="kernel-source is &lt;2.6.32.59-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103880" version="1" comment="kernel-syms is &lt;2.6.32.59-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103883" version="1" comment="kernel-trace is &lt;2.6.32.59-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103881" version="1" comment="kernel-trace-base is &lt;2.6.32.59-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103882" version="1" comment="kernel-trace-devel is &lt;2.6.32.59-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103886" version="1" comment="kernel-xen is &lt;2.6.32.59-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103884" version="1" comment="kernel-xen-base is &lt;2.6.32.59-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103885" version="1" comment="kernel-xen-devel is &lt;2.6.32.59-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106024" version="1" comment="glibc is &lt;2.11.3-17.80.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106018" version="1" comment="glibc-32bit is &lt;2.11.3-17.80.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106020" version="1" comment="glibc-devel is &lt;2.11.3-17.80.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106019" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.80.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106021" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.80.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106023" version="1" comment="glibc-locale is &lt;2.11.3-17.80.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106022" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.80.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106025" version="1" comment="nscd is &lt;2.11.3-17.80.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105612" version="1" comment="glibc is &lt;2.11.1-0.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105602" version="1" comment="glibc-32bit is &lt;2.11.1-0.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105604" version="1" comment="glibc-devel is &lt;2.11.1-0.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105603" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105605" version="1" comment="glibc-html is &lt;2.11.1-0.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105606" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105607" version="1" comment="glibc-info is &lt;2.11.1-0.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105609" version="1" comment="glibc-locale is &lt;2.11.1-0.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105608" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105611" version="1" comment="glibc-profile is &lt;2.11.1-0.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105610" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105613" version="1" comment="nscd is &lt;2.11.1-0.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103898" version="1" comment="glibc is &lt;2.11.3-17.45.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103888" version="1" comment="glibc-32bit is &lt;2.11.3-17.45.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103890" version="1" comment="glibc-devel is &lt;2.11.3-17.45.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103889" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.45.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103891" version="1" comment="glibc-html is &lt;2.11.3-17.45.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103892" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.45.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103893" version="1" comment="glibc-info is &lt;2.11.3-17.45.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103895" version="1" comment="glibc-locale is &lt;2.11.3-17.45.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103894" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.45.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103897" version="1" comment="glibc-profile is &lt;2.11.3-17.45.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103896" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.45.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103899" version="1" comment="nscd is &lt;2.11.3-17.45.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106016" version="1" comment="glibc-html is &lt;2.11.3-17.80.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106017" version="1" comment="glibc-info is &lt;2.11.3-17.80.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106029" version="1" comment="glibc-profile is &lt;2.11.3-17.80.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106027" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.80.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077426" version="1" comment="kernel-default is &lt;3.0.80-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077423" version="1" comment="kernel-default-base is &lt;3.0.80-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077424" version="1" comment="kernel-default-devel is &lt;3.0.80-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077425" version="1" comment="kernel-default-extra is &lt;3.0.80-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077427" version="1" comment="kernel-source is &lt;3.0.80-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077428" version="1" comment="kernel-syms is &lt;3.0.80-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077432" version="1" comment="kernel-trace is &lt;3.0.80-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077429" version="1" comment="kernel-trace-base is &lt;3.0.80-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077430" version="1" comment="kernel-trace-devel is &lt;3.0.80-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077431" version="1" comment="kernel-trace-extra is &lt;3.0.80-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077436" version="1" comment="kernel-xen is &lt;3.0.80-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077433" version="1" comment="kernel-xen-base is &lt;3.0.80-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077434" version="1" comment="kernel-xen-devel is &lt;3.0.80-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077435" version="1" comment="kernel-xen-extra is &lt;3.0.80-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077437" version="1" comment="xen-kmp-default is &lt;4.1.5_02_3.0.80_0.5-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077438" version="1" comment="xen-kmp-trace is &lt;4.1.5_02_3.0.80_0.5-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107459" version="1" comment="kernel-default is &lt;3.0.82-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107457" version="1" comment="kernel-default-base is &lt;3.0.82-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107458" version="1" comment="kernel-default-devel is &lt;3.0.82-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107469" version="1" comment="kernel-default-extra is &lt;3.0.82-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107463" version="1" comment="kernel-source is &lt;3.0.82-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107464" version="1" comment="kernel-syms is &lt;3.0.82-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107466" version="1" comment="kernel-trace-devel is &lt;3.0.82-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107473" version="1" comment="kernel-xen is &lt;3.0.82-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107470" version="1" comment="kernel-xen-base is &lt;3.0.82-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107471" version="1" comment="kernel-xen-devel is &lt;3.0.82-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107472" version="1" comment="kernel-xen-extra is &lt;3.0.82-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107474" version="1" comment="xen-kmp-default is &lt;4.2.2_04_3.0.82_0.7-0.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116976" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.80_0.5-2.18.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116977" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.80_0.5-2.18.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116978" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.80_0.5-2.18.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116979" version="1" comment="gfs2-kmp-default is &lt;2_3.0.80_0.5-0.7.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116980" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.80_0.5-0.7.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116981" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.80_0.5-0.7.76" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116982" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.80_0.5-0.11.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116983" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.80_0.5-0.11.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116984" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.80_0.5-0.11.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116985" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.82_0.7-2.25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132766" version="1" comment="cluster-network-kmp-ppc64 is &lt;1.4_3.0.82_0.7-2.25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116986" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.82_0.7-2.25.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116988" version="1" comment="gfs2-kmp-default is &lt;2_3.0.82_0.7-0.16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132767" version="1" comment="gfs2-kmp-ppc64 is &lt;2_3.0.82_0.7-0.16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116989" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.82_0.7-0.16.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116991" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.82_0.7-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132768" version="1" comment="ocfs2-kmp-ppc64 is &lt;1.6_3.0.82_0.7-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116992" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.82_0.7-0.18.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116994" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.80_rt108_0.5-2.18.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116995" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.80_rt108_0.5-2.18.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116996" version="1" comment="drbd-kmp-rt is &lt;8.4.2_3.0.80_rt108_0.5-0.6.6.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116997" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.2_3.0.80_rt108_0.5-0.6.6.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116998" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.80_rt108_0.5-0.23.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116999" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.80_rt108_0.5-0.23.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117000" version="1" comment="kernel-rt is &lt;3.0.80.rt108-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117001" version="1" comment="kernel-rt-base is &lt;3.0.80.rt108-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117002" version="1" comment="kernel-rt-devel is &lt;3.0.80.rt108-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117003" version="1" comment="kernel-rt_trace is &lt;3.0.80.rt108-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117004" version="1" comment="kernel-rt_trace-base is &lt;3.0.80.rt108-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117005" version="1" comment="kernel-rt_trace-devel is &lt;3.0.80.rt108-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117006" version="1" comment="kernel-source-rt is &lt;3.0.80.rt108-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117007" version="1" comment="kernel-syms-rt is &lt;3.0.80.rt108-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117008" version="1" comment="lttng-modules-kmp-rt is &lt;2.0.4_3.0.80_rt108_0.5-0.7.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117009" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.0.4_3.0.80_rt108_0.5-0.7.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117010" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.80_rt108_0.5-0.11.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117011" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.80_rt108_0.5-0.11.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117012" version="1" comment="ofed-kmp-rt is &lt;1.5.2_3.0.80_rt108_0.5-0.28.28.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117013" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.2_3.0.80_rt108_0.5-0.28.28.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077446" version="1" comment="kernel-ec2 is &lt;3.0.80-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077444" version="1" comment="kernel-ec2-base is &lt;3.0.80-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077445" version="1" comment="kernel-ec2-devel is &lt;3.0.80-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107477" version="1" comment="kernel-ec2 is &lt;3.0.82-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107475" version="1" comment="kernel-ec2-base is &lt;3.0.82-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107476" version="1" comment="kernel-ec2-devel is &lt;3.0.82-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107467" version="1" comment="kernel-trace is &lt;3.0.82-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107465" version="1" comment="kernel-trace-base is &lt;3.0.82-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113166" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113167" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110861" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076544" version="1" comment="libvirt is &lt;0.9.6-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076541" version="1" comment="libvirt-client is &lt;0.9.6-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076540" version="1" comment="libvirt-client-32bit is &lt;0.9.6-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076542" version="1" comment="libvirt-doc is &lt;0.9.6-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076543" version="1" comment="libvirt-python is &lt;0.9.6-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076548" version="1" comment="libvirt-devel is &lt;0.9.6-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076547" version="1" comment="libvirt-devel-32bit is &lt;0.9.6-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076569" version="1" comment="libldb1 is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076568" version="1" comment="libldb1-32bit is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076571" version="1" comment="libsmbclient0 is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076570" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076573" version="1" comment="libtalloc1 is &lt;3.4.3-1.42.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076572" version="1" comment="libtalloc1-32bit is &lt;3.4.3-1.42.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076575" version="1" comment="libtalloc2 is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076574" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076577" version="1" comment="libtdb1 is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076576" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076579" version="1" comment="libtevent0 is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076578" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076581" version="1" comment="libwbclient0 is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076580" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076588" version="1" comment="samba is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076582" version="1" comment="samba-32bit is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076584" version="1" comment="samba-client is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076583" version="1" comment="samba-client-32bit is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076585" version="1" comment="samba-krb-printing is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076587" version="1" comment="samba-winbind is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076586" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076603" version="1" comment="ldapsmb is &lt;1.34b-12.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076612" version="1" comment="libldb-devel is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076613" version="1" comment="libnetapi-devel is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076614" version="1" comment="libnetapi0 is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076615" version="1" comment="libsmbclient-devel is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076616" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076617" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076618" version="1" comment="libtalloc-devel is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076619" version="1" comment="libtdb-devel is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076620" version="1" comment="libtevent-devel is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076621" version="1" comment="libwbclient-devel is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076622" version="1" comment="samba-devel is &lt;3.6.3-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076896" version="1" comment="libecpg6 is &lt;9.1.8-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076898" version="1" comment="libpq5 is &lt;9.1.8-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076897" version="1" comment="libpq5-32bit is &lt;9.1.8-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076899" version="1" comment="postgresql91 is &lt;9.1.8-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076902" version="1" comment="postgresql91-contrib is &lt;9.1.8-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076903" version="1" comment="postgresql91-docs is &lt;9.1.8-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076904" version="1" comment="postgresql91-server is &lt;9.1.8-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076908" version="1" comment="postgresql91-devel is &lt;9.1.8-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077145" version="1" comment="libxml2-python is &lt;2.7.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077154" version="1" comment="libxml2-devel is &lt;2.7.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077153" version="1" comment="libxml2-devel-32bit is &lt;2.7.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077248" version="1" comment="java-1_6_0-openjdk is &lt;1.6.0.0_b27.1.12.5-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077246" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.6.0.0_b27.1.12.5-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077247" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.6.0.0_b27.1.12.5-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077300" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr13.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077297" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr13.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077298" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr13.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077299" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr13.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077417" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr4.2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077414" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr4.2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077415" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr4.2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077416" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr4.2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077301" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr13.2-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077421" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr4.2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076716" version="1" comment="flash-player is &lt;11.2.202.273-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076714" version="1" comment="flash-player-gnome is &lt;11.2.202.273-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076715" version="1" comment="flash-player-kde4 is &lt;11.2.202.273-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076305" version="1" comment="flash-player is &lt;11.2.202.261-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076531" version="1" comment="flash-player is &lt;11.2.202.262-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076529" version="1" comment="flash-player-gnome is &lt;11.2.202.262-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076530" version="1" comment="flash-player-kde4 is &lt;11.2.202.262-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076535" version="1" comment="flash-player is &lt;11.2.202.270-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076533" version="1" comment="flash-player-gnome is &lt;11.2.202.270-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076534" version="1" comment="flash-player-kde4 is &lt;11.2.202.270-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076698" version="1" comment="acroread is &lt;9.5.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076693" version="1" comment="acroread-cmaps is &lt;9.4.6-0.4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076694" version="1" comment="acroread-fonts-ja is &lt;9.4.6-0.4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076695" version="1" comment="acroread-fonts-ko is &lt;9.4.6-0.4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076696" version="1" comment="acroread-fonts-zh_CN is &lt;9.4.6-0.4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076697" version="1" comment="acroread-fonts-zh_TW is &lt;9.4.6-0.4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076825" version="1" comment="flash-player is &lt;11.2.202.275-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076823" version="1" comment="flash-player-gnome is &lt;11.2.202.275-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076824" version="1" comment="flash-player-kde4 is &lt;11.2.202.275-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076748" version="1" comment="MozillaFirefox is &lt;17.0.3esr-0.4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076747" version="1" comment="MozillaFirefox-translations is &lt;17.0.3esr-0.4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076778" version="1" comment="java-1_6_0-openjdk is &lt;1.6.0.0_b27.1.12.4-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076776" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.6.0.0_b27.1.12.4-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076777" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.6.0.0_b27.1.12.4-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076644" version="1" comment="kernel-default is &lt;3.0.58-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076641" version="1" comment="kernel-default-base is &lt;3.0.58-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076642" version="1" comment="kernel-default-devel is &lt;3.0.58-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076643" version="1" comment="kernel-default-extra is &lt;3.0.58-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076649" version="1" comment="kernel-source is &lt;3.0.58-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076650" version="1" comment="kernel-syms is &lt;3.0.58-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076654" version="1" comment="kernel-trace is &lt;3.0.58-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076651" version="1" comment="kernel-trace-base is &lt;3.0.58-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076652" version="1" comment="kernel-trace-devel is &lt;3.0.58-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076653" version="1" comment="kernel-trace-extra is &lt;3.0.58-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076658" version="1" comment="kernel-xen is &lt;3.0.58-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076655" version="1" comment="kernel-xen-base is &lt;3.0.58-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076656" version="1" comment="kernel-xen-devel is &lt;3.0.58-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076657" version="1" comment="kernel-xen-extra is &lt;3.0.58-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076659" version="1" comment="xen-kmp-default is &lt;4.1.3_06_3.0.58_0.6.6-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076660" version="1" comment="xen-kmp-trace is &lt;4.1.3_06_3.0.58_0.6.6-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117014" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.58_0.6.6-2.18.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117015" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.58_0.6.6-2.18.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117016" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.58_0.6.6-2.18.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117017" version="1" comment="gfs2-kmp-default is &lt;2_3.0.58_0.6.6-0.7.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117018" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.58_0.6.6-0.7.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117019" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.58_0.6.6-0.7.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117020" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.58_0.6.6-0.11.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117021" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.58_0.6.6-0.11.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117022" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.58_0.6.6-0.11.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076672" version="1" comment="kernel-ec2 is &lt;3.0.58-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076670" version="1" comment="kernel-ec2-base is &lt;3.0.58-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076671" version="1" comment="kernel-ec2-devel is &lt;3.0.58-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090646" version="1" comment="kernel-default is &lt;3.0.93-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090644" version="1" comment="kernel-default-base is &lt;3.0.93-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090645" version="1" comment="kernel-default-devel is &lt;3.0.93-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090683" version="1" comment="kernel-default-extra is &lt;3.0.93-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090650" version="1" comment="kernel-source is &lt;3.0.93-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090651" version="1" comment="kernel-syms is &lt;3.0.93-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090654" version="1" comment="kernel-trace is &lt;3.0.93-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090652" version="1" comment="kernel-trace-base is &lt;3.0.93-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090653" version="1" comment="kernel-trace-devel is &lt;3.0.93-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090684" version="1" comment="kernel-trace-extra is &lt;3.0.93-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090657" version="1" comment="kernel-xen is &lt;3.0.93-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090655" version="1" comment="kernel-xen-base is &lt;3.0.93-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090656" version="1" comment="kernel-xen-devel is &lt;3.0.93-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090685" version="1" comment="kernel-xen-extra is &lt;3.0.93-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090658" version="1" comment="xen-kmp-default is &lt;4.1.5_02_3.0.93_0.5-0.5.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090659" version="1" comment="xen-kmp-trace is &lt;4.1.5_02_3.0.93_0.5-0.5.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090638" version="1" comment="kernel-default is &lt;3.0.93-0.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090636" version="1" comment="kernel-default-base is &lt;3.0.93-0.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090637" version="1" comment="kernel-default-devel is &lt;3.0.93-0.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090686" version="1" comment="kernel-default-extra is &lt;3.0.93-0.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090639" version="1" comment="kernel-source is &lt;3.0.93-0.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090640" version="1" comment="kernel-syms is &lt;3.0.93-0.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090642" version="1" comment="kernel-trace-devel is &lt;3.0.93-0.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090670" version="1" comment="kernel-xen is &lt;3.0.93-0.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090668" version="1" comment="kernel-xen-base is &lt;3.0.93-0.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090669" version="1" comment="kernel-xen-devel is &lt;3.0.93-0.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090687" version="1" comment="kernel-xen-extra is &lt;3.0.93-0.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090671" version="1" comment="xen-kmp-default is &lt;4.2.2_06_3.0.93_0.8-0.7.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117023" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.93_0.5-2.18.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117024" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.93_0.5-2.18.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117025" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.93_0.5-2.18.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117026" version="1" comment="gfs2-kmp-default is &lt;2_3.0.93_0.5-0.7.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117027" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.93_0.5-0.7.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117028" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.93_0.5-0.7.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117029" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.93_0.5-0.11.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117030" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.93_0.5-0.11.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117031" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.93_0.5-0.11.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117032" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.93_0.8-2.27.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132775" version="1" comment="cluster-network-kmp-ppc64 is &lt;1.4_3.0.93_0.8-2.27.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117033" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.93_0.8-2.27.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117035" version="1" comment="gfs2-kmp-default is &lt;2_3.0.93_0.8-0.16.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132776" version="1" comment="gfs2-kmp-ppc64 is &lt;2_3.0.93_0.8-0.16.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117036" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.93_0.8-0.16.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117038" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.93_0.8-0.20.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132777" version="1" comment="ocfs2-kmp-ppc64 is &lt;1.6_3.0.93_0.8-0.20.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117039" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.93_0.8-0.20.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117041" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.93_rt117_0.5-2.18.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117042" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.93_rt117_0.5-2.18.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117043" version="1" comment="drbd-kmp-rt is &lt;8.4.2_3.0.93_rt117_0.5-0.6.6.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117044" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.2_3.0.93_rt117_0.5-0.6.6.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117045" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.93_rt117_0.5-0.25.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117046" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.93_rt117_0.5-0.25.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117047" version="1" comment="kernel-rt is &lt;3.0.93.rt117-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117048" version="1" comment="kernel-rt-base is &lt;3.0.93.rt117-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117049" version="1" comment="kernel-rt-devel is &lt;3.0.93.rt117-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117050" version="1" comment="kernel-rt_trace is &lt;3.0.93.rt117-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117051" version="1" comment="kernel-rt_trace-base is &lt;3.0.93.rt117-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117052" version="1" comment="kernel-rt_trace-devel is &lt;3.0.93.rt117-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117053" version="1" comment="kernel-source-rt is &lt;3.0.93.rt117-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117054" version="1" comment="kernel-syms-rt is &lt;3.0.93.rt117-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117055" version="1" comment="lttng-modules-kmp-rt is &lt;2.0.4_3.0.93_rt117_0.5-0.7.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117056" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.0.4_3.0.93_rt117_0.5-0.7.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117057" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.93_rt117_0.5-0.11.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117058" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.93_rt117_0.5-0.11.61" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117059" version="1" comment="ofed-kmp-rt is &lt;1.5.2_3.0.93_rt117_0.5-0.28.28.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117060" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.2_3.0.93_rt117_0.5-0.28.28.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117061" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.93_rt117_0.9-2.27.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117062" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.93_rt117_0.9-2.27.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117063" version="1" comment="drbd-kmp-rt is &lt;8.4.3_3.0.93_rt117_0.9-0.19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117064" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.3_3.0.93_rt117_0.9-0.19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117065" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.93_rt117_0.9-0.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117066" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.93_rt117_0.9-0.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117067" version="1" comment="kernel-rt is &lt;3.0.93.rt117-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117068" version="1" comment="kernel-rt-base is &lt;3.0.93.rt117-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117069" version="1" comment="kernel-rt-devel is &lt;3.0.93.rt117-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117070" version="1" comment="kernel-rt_trace is &lt;3.0.93.rt117-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117071" version="1" comment="kernel-rt_trace-base is &lt;3.0.93.rt117-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117072" version="1" comment="kernel-rt_trace-devel is &lt;3.0.93.rt117-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117073" version="1" comment="kernel-source-rt is &lt;3.0.93.rt117-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117074" version="1" comment="kernel-syms-rt is &lt;3.0.93.rt117-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117075" version="1" comment="lttng-modules-kmp-rt is &lt;2.1.1_3.0.93_rt117_0.9-0.11.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117076" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.1.1_3.0.93_rt117_0.9-0.11.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117077" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.93_rt117_0.9-0.20.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117078" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.93_rt117_0.9-0.20.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117079" version="1" comment="ofed-kmp-rt is &lt;1.5.4.1_3.0.93_rt117_0.9-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117080" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.4.1_3.0.93_rt117_0.9-0.13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090649" version="1" comment="kernel-ec2 is &lt;3.0.93-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090647" version="1" comment="kernel-ec2-base is &lt;3.0.93-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090648" version="1" comment="kernel-ec2-devel is &lt;3.0.93-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090667" version="1" comment="kernel-ec2 is &lt;3.0.93-0.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090665" version="1" comment="kernel-ec2-base is &lt;3.0.93-0.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090666" version="1" comment="kernel-ec2-devel is &lt;3.0.93-0.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090643" version="1" comment="kernel-trace is &lt;3.0.93-0.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090641" version="1" comment="kernel-trace-base is &lt;3.0.93-0.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077037" version="1" comment="flash-player is &lt;11.2.202.280-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077035" version="1" comment="flash-player-gnome is &lt;11.2.202.280-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077036" version="1" comment="flash-player-kde4 is &lt;11.2.202.280-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077420" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.17-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077422" version="1" comment="java-1_4_2-ibm-devel is &lt;1.4.2_sr13.17-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077669" version="1" comment="java-1_6_0-openjdk is &lt;1.6.0.0_b27.1.12.6-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077667" version="1" comment="java-1_6_0-openjdk-demo is &lt;1.6.0.0_b27.1.12.6-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077668" version="1" comment="java-1_6_0-openjdk-devel is &lt;1.6.0.0_b27.1.12.6-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077676" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.6-0.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077674" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.6-0.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077675" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.6-0.19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077692" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr14.0-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077689" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr14.0-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077690" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr14.0-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077691" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr14.0-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077696" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr5.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077693" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr5.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077694" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr5.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077695" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr5.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077697" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr14.0-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077698" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr5.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090303" version="1" comment="libpixman-1-0 is &lt;0.24.4-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090301" version="1" comment="libpixman-1-0-32bit is &lt;0.24.4-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090304" version="1" comment="libpixman-1-0-devel is &lt;0.24.4-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077137" version="1" comment="libgnutls-devel is &lt;2.4.1-24.39.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077138" version="1" comment="libgnutls-extra-devel is &lt;2.4.1-24.39.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089686" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089730" version="1" comment="apache2-mod_php53 is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111844" version="1" comment="php5 is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089687" version="1" comment="php5-bcmath is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089688" version="1" comment="php5-bz2 is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089689" version="1" comment="php5-calendar is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089690" version="1" comment="php5-ctype is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089691" version="1" comment="php5-curl is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089692" version="1" comment="php5-dba is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089693" version="1" comment="php5-dbase is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089694" version="1" comment="php5-dom is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089695" version="1" comment="php5-exif is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089696" version="1" comment="php5-fastcgi is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089697" version="1" comment="php5-ftp is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089698" version="1" comment="php5-gd is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089699" version="1" comment="php5-gettext is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089700" version="1" comment="php5-gmp is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089701" version="1" comment="php5-hash is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089702" version="1" comment="php5-iconv is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089703" version="1" comment="php5-json is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089704" version="1" comment="php5-ldap is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089705" version="1" comment="php5-mbstring is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089706" version="1" comment="php5-mcrypt is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089707" version="1" comment="php5-mysql is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089708" version="1" comment="php5-odbc is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089709" version="1" comment="php5-openssl is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089710" version="1" comment="php5-pcntl is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089711" version="1" comment="php5-pdo is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089712" version="1" comment="php5-pear is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089713" version="1" comment="php5-pgsql is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089714" version="1" comment="php5-pspell is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089715" version="1" comment="php5-shmop is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089716" version="1" comment="php5-snmp is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089717" version="1" comment="php5-soap is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089718" version="1" comment="php5-suhosin is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089719" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089720" version="1" comment="php5-sysvsem is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089721" version="1" comment="php5-sysvshm is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089722" version="1" comment="php5-tokenizer is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089723" version="1" comment="php5-wddx is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089724" version="1" comment="php5-xmlreader is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089725" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089726" version="1" comment="php5-xmlwriter is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089727" version="1" comment="php5-xsl is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089728" version="1" comment="php5-zip is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089729" version="1" comment="php5-zlib is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112793" version="1" comment="php53 is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089731" version="1" comment="php53-bcmath is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089732" version="1" comment="php53-bz2 is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089733" version="1" comment="php53-calendar is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089734" version="1" comment="php53-ctype is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089735" version="1" comment="php53-curl is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089736" version="1" comment="php53-dba is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089737" version="1" comment="php53-dom is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089738" version="1" comment="php53-exif is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089739" version="1" comment="php53-fastcgi is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089740" version="1" comment="php53-fileinfo is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089741" version="1" comment="php53-ftp is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089742" version="1" comment="php53-gd is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089743" version="1" comment="php53-gettext is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089744" version="1" comment="php53-gmp is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089745" version="1" comment="php53-iconv is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089746" version="1" comment="php53-intl is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089747" version="1" comment="php53-json is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089748" version="1" comment="php53-ldap is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089749" version="1" comment="php53-mbstring is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089750" version="1" comment="php53-mcrypt is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089751" version="1" comment="php53-mysql is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089752" version="1" comment="php53-odbc is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089753" version="1" comment="php53-openssl is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089754" version="1" comment="php53-pcntl is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089755" version="1" comment="php53-pdo is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089756" version="1" comment="php53-pear is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089757" version="1" comment="php53-pgsql is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089758" version="1" comment="php53-pspell is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089759" version="1" comment="php53-shmop is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089760" version="1" comment="php53-snmp is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089761" version="1" comment="php53-soap is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089762" version="1" comment="php53-suhosin is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089763" version="1" comment="php53-sysvmsg is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089764" version="1" comment="php53-sysvsem is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089765" version="1" comment="php53-sysvshm is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089766" version="1" comment="php53-tokenizer is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089767" version="1" comment="php53-wddx is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089768" version="1" comment="php53-xmlreader is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089769" version="1" comment="php53-xmlrpc is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089770" version="1" comment="php53-xmlwriter is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089771" version="1" comment="php53-xsl is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089772" version="1" comment="php53-zip is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089773" version="1" comment="php53-zlib is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089818" version="1" comment="php5-devel is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089819" version="1" comment="php5-imap is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089820" version="1" comment="php5-ncurses is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089821" version="1" comment="php5-posix is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089822" version="1" comment="php5-readline is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089823" version="1" comment="php5-sockets is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089824" version="1" comment="php5-sqlite is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089825" version="1" comment="php5-tidy is &lt;5.2.14-0.7.30.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089826" version="1" comment="php53-devel is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089827" version="1" comment="php53-imap is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089828" version="1" comment="php53-posix is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089829" version="1" comment="php53-readline is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089830" version="1" comment="php53-sockets is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089831" version="1" comment="php53-sqlite is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089832" version="1" comment="php53-tidy is &lt;5.3.8-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077307" version="1" comment="subversion is &lt;1.6.17-1.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077302" version="1" comment="subversion-devel is &lt;1.6.17-1.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077303" version="1" comment="subversion-perl is &lt;1.6.17-1.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077304" version="1" comment="subversion-python is &lt;1.6.17-1.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077305" version="1" comment="subversion-server is &lt;1.6.17-1.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077306" version="1" comment="subversion-tools is &lt;1.6.17-1.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103943" version="1" comment="apache2 is &lt;2.2.12-1.40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103938" version="1" comment="apache2-doc is &lt;2.2.12-1.40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103939" version="1" comment="apache2-example-pages is &lt;2.2.12-1.40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103940" version="1" comment="apache2-prefork is &lt;2.2.12-1.40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103941" version="1" comment="apache2-utils is &lt;2.2.12-1.40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103942" version="1" comment="apache2-worker is &lt;2.2.12-1.40.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077381" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.70.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077383" version="1" comment="xorg-x11-server is &lt;7.4-27.70.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077382" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.70.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077397" version="1" comment="xorg-x11-server-sdk is &lt;7.4-27.70.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077201" version="1" comment="curl is &lt;7.19.7-1.20.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077203" version="1" comment="libcurl4 is &lt;7.19.7-1.20.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077202" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.20.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077211" version="1" comment="libcurl-devel is &lt;7.19.7-1.20.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077226" version="1" comment="libtiff-devel is &lt;3.8.2-141.152.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077225" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-141.152.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077662" version="1" comment="subversion is &lt;1.6.17-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077657" version="1" comment="subversion-devel is &lt;1.6.17-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077658" version="1" comment="subversion-perl is &lt;1.6.17-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077659" version="1" comment="subversion-python is &lt;1.6.17-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077660" version="1" comment="subversion-server is &lt;1.6.17-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077661" version="1" comment="subversion-tools is &lt;1.6.17-1.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077495" version="1" comment="xorg-x11-devel is &lt;7.4-8.26.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077497" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077496" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077727" version="1" comment="xorg-x11-libs is &lt;7.4-8.26.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077726" version="1" comment="xorg-x11-libs-32bit is &lt;7.4-8.26.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077528" version="1" comment="xorg-x11-devel-32bit is &lt;7.4-8.26.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077751" version="1" comment="xorg-x11-devel is &lt;7.4-8.26.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077750" version="1" comment="xorg-x11-devel-32bit is &lt;7.4-8.26.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098369" version="1" comment="kvm is &lt;1.4.2-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077553" version="1" comment="openswan is &lt;2.6.16-1.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077552" version="1" comment="openswan-doc is &lt;2.6.16-1.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077252" version="1" comment="kernel-default is &lt;3.0.74-0.6.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077249" version="1" comment="kernel-default-base is &lt;3.0.74-0.6.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077250" version="1" comment="kernel-default-devel is &lt;3.0.74-0.6.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077251" version="1" comment="kernel-default-extra is &lt;3.0.74-0.6.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077253" version="1" comment="kernel-source is &lt;3.0.74-0.6.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077254" version="1" comment="kernel-syms is &lt;3.0.74-0.6.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077258" version="1" comment="kernel-trace is &lt;3.0.74-0.6.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077255" version="1" comment="kernel-trace-base is &lt;3.0.74-0.6.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077256" version="1" comment="kernel-trace-devel is &lt;3.0.74-0.6.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077257" version="1" comment="kernel-trace-extra is &lt;3.0.74-0.6.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077262" version="1" comment="kernel-xen is &lt;3.0.74-0.6.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077259" version="1" comment="kernel-xen-base is &lt;3.0.74-0.6.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077260" version="1" comment="kernel-xen-devel is &lt;3.0.74-0.6.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077261" version="1" comment="kernel-xen-extra is &lt;3.0.74-0.6.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077263" version="1" comment="xen-kmp-default is &lt;4.1.4_02_3.0.74_0.6.8-0.5.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077264" version="1" comment="xen-kmp-trace is &lt;4.1.4_02_3.0.74_0.6.8-0.5.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117081" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.74_0.6.8-2.18.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117082" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.74_0.6.8-2.18.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117083" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.74_0.6.8-2.18.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117084" version="1" comment="gfs2-kmp-default is &lt;2_3.0.74_0.6.8-0.7.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117085" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.74_0.6.8-0.7.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117086" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.74_0.6.8-0.7.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117087" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.74_0.6.8-0.11.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117088" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.74_0.6.8-0.11.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117089" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.74_0.6.8-0.11.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117090" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.74_rt98_0.6.4-2.18.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117091" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.74_rt98_0.6.4-2.18.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117092" version="1" comment="drbd-kmp-rt is &lt;8.4.2_3.0.74_rt98_0.6.4-0.6.6.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117093" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.2_3.0.74_rt98_0.6.4-0.6.6.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117094" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.74_rt98_0.6.4-0.23.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117095" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.74_rt98_0.6.4-0.23.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117096" version="1" comment="kernel-rt is &lt;3.0.74.rt98-0.6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117097" version="1" comment="kernel-rt-base is &lt;3.0.74.rt98-0.6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117098" version="1" comment="kernel-rt-devel is &lt;3.0.74.rt98-0.6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117099" version="1" comment="kernel-rt_trace is &lt;3.0.74.rt98-0.6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117100" version="1" comment="kernel-rt_trace-base is &lt;3.0.74.rt98-0.6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117101" version="1" comment="kernel-rt_trace-devel is &lt;3.0.74.rt98-0.6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117102" version="1" comment="kernel-source-rt is &lt;3.0.74.rt98-0.6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117103" version="1" comment="kernel-syms-rt is &lt;3.0.74.rt98-0.6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117104" version="1" comment="lttng-modules-kmp-rt is &lt;2.0.4_3.0.74_rt98_0.6.4-0.7.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117105" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.0.4_3.0.74_rt98_0.6.4-0.7.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117106" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.74_rt98_0.6.4-0.11.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117107" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.74_rt98_0.6.4-0.11.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117108" version="1" comment="ofed-kmp-rt is &lt;1.5.2_3.0.74_rt98_0.6.4-0.28.28.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117109" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.2_3.0.74_rt98_0.6.4-0.28.28.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077271" version="1" comment="kernel-ec2 is &lt;3.0.74-0.6.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077269" version="1" comment="kernel-ec2-base is &lt;3.0.74-0.6.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077270" version="1" comment="kernel-ec2-devel is &lt;3.0.74-0.6.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093260" version="1" comment="kernel-default is &lt;3.0.101-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093257" version="1" comment="kernel-default-base is &lt;3.0.101-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093258" version="1" comment="kernel-default-devel is &lt;3.0.101-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093280" version="1" comment="kernel-default-extra is &lt;3.0.101-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093261" version="1" comment="kernel-source is &lt;3.0.101-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093262" version="1" comment="kernel-syms is &lt;3.0.101-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093264" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093271" version="1" comment="kernel-xen is &lt;3.0.101-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093269" version="1" comment="kernel-xen-base is &lt;3.0.101-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093270" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093281" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093272" version="1" comment="xen-kmp-default is &lt;4.2.3_08_3.0.101_0.15-0.7.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117110" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.101_0.15-2.27.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132781" version="1" comment="cluster-network-kmp-ppc64 is &lt;1.4_3.0.101_0.15-2.27.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117111" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.101_0.15-2.27.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117113" version="1" comment="gfs2-kmp-default is &lt;2_3.0.101_0.15-0.16.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132782" version="1" comment="gfs2-kmp-ppc64 is &lt;2_3.0.101_0.15-0.16.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117114" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.101_0.15-0.16.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117116" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_0.15-0.20.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132783" version="1" comment="ocfs2-kmp-ppc64 is &lt;1.6_3.0.101_0.15-0.20.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117117" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_0.15-0.20.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117119" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.101_rt130_0.10-2.27.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117120" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.101_rt130_0.10-2.27.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117121" version="1" comment="drbd-kmp-rt is &lt;8.4.4_3.0.101_rt130_0.10-0.22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117122" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.4_3.0.101_rt130_0.10-0.22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117123" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.101_rt130_0.10-0.38.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117124" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.101_rt130_0.10-0.38.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117125" version="1" comment="kernel-rt is &lt;3.0.101.rt130-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117126" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117127" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117128" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117129" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117130" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117131" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117132" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117133" version="1" comment="lttng-modules-kmp-rt is &lt;2.1.1_3.0.101_rt130_0.10-0.11.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117134" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.1.1_3.0.101_rt130_0.10-0.11.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117135" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.101_rt130_0.10-0.20.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117136" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.101_rt130_0.10-0.20.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117137" version="1" comment="ofed-kmp-rt is &lt;1.5.4.1_3.0.101_rt130_0.10-0.13.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117138" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.4.1_3.0.101_rt130_0.10-0.13.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093268" version="1" comment="kernel-ec2 is &lt;3.0.101-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093266" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093267" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093265" version="1" comment="kernel-trace is &lt;3.0.101-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093263" version="1" comment="kernel-trace-base is &lt;3.0.101-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077560" version="1" comment="curl is &lt;7.19.7-1.20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077562" version="1" comment="libcurl4 is &lt;7.19.7-1.20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077561" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077563" version="1" comment="curl is &lt;7.19.7-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077565" version="1" comment="libcurl4 is &lt;7.19.7-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077564" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077570" version="1" comment="libcurl-devel is &lt;7.19.7-1.20.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077571" version="1" comment="libcurl-devel is &lt;7.19.7-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091555" version="1" comment="kernel-default is &lt;3.0.101-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091552" version="1" comment="kernel-default-base is &lt;3.0.101-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091553" version="1" comment="kernel-default-devel is &lt;3.0.101-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091587" version="1" comment="kernel-default-extra is &lt;3.0.101-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091556" version="1" comment="kernel-source is &lt;3.0.101-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091557" version="1" comment="kernel-syms is &lt;3.0.101-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091560" version="1" comment="kernel-trace is &lt;3.0.101-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091558" version="1" comment="kernel-trace-base is &lt;3.0.101-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091559" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091588" version="1" comment="kernel-trace-extra is &lt;3.0.101-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091569" version="1" comment="kernel-xen is &lt;3.0.101-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091567" version="1" comment="kernel-xen-base is &lt;3.0.101-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091568" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091589" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091570" version="1" comment="xen-kmp-default is &lt;4.1.6_02_3.0.101_0.5-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091571" version="1" comment="xen-kmp-trace is &lt;4.1.6_02_3.0.101_0.5-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091535" version="1" comment="kernel-default is &lt;3.0.101-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091533" version="1" comment="kernel-default-base is &lt;3.0.101-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091534" version="1" comment="kernel-default-devel is &lt;3.0.101-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091584" version="1" comment="kernel-default-extra is &lt;3.0.101-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091542" version="1" comment="kernel-source is &lt;3.0.101-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091543" version="1" comment="kernel-syms is &lt;3.0.101-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091545" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091549" version="1" comment="kernel-xen is &lt;3.0.101-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091547" version="1" comment="kernel-xen-base is &lt;3.0.101-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091548" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091586" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091550" version="1" comment="xen-kmp-default is &lt;4.2.3_02_3.0.101_0.8-0.7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117139" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.101_0.5-2.18.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117140" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.101_0.5-2.18.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117141" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.101_0.5-2.18.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117142" version="1" comment="gfs2-kmp-default is &lt;2_3.0.101_0.5-0.7.98" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117143" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.101_0.5-0.7.98" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117144" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.101_0.5-0.7.98" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117145" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_0.5-0.11.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117146" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_0.5-0.11.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117147" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.101_0.5-0.11.68" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117148" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.101_0.8-2.27.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132787" version="1" comment="cluster-network-kmp-ppc64 is &lt;1.4_3.0.101_0.8-2.27.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117149" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.101_0.8-2.27.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117151" version="1" comment="gfs2-kmp-default is &lt;2_3.0.101_0.8-0.16.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132788" version="1" comment="gfs2-kmp-ppc64 is &lt;2_3.0.101_0.8-0.16.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117152" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.101_0.8-0.16.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117154" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_0.8-0.20.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132789" version="1" comment="ocfs2-kmp-ppc64 is &lt;1.6_3.0.101_0.8-0.20.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117155" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_0.8-0.20.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117157" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.101_rt130_0.5-2.18.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117158" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.101_rt130_0.5-2.18.71" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117159" version="1" comment="drbd-kmp-rt is &lt;8.4.2_3.0.101_rt130_0.5-0.6.6.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117160" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.2_3.0.101_rt130_0.5-0.6.6.62" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117161" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.101_rt130_0.5-0.25.25.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117162" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.101_rt130_0.5-0.25.25.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117163" version="1" comment="kernel-rt is &lt;3.0.101.rt130-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117164" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117165" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117166" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117167" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117168" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117169" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117170" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117171" version="1" comment="lttng-modules-kmp-rt is &lt;2.0.4_3.0.101_rt130_0.5-0.9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117172" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.0.4_3.0.101_rt130_0.5-0.9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117173" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.101_rt130_0.5-0.11.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117174" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.101_rt130_0.5-0.11.70" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117175" version="1" comment="ofed-kmp-rt is &lt;1.5.2_3.0.101_rt130_0.5-0.28.28.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117176" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.2_3.0.101_rt130_0.5-0.28.28.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117177" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.101_rt130_0.8-2.27.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117178" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.101_rt130_0.8-2.27.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117179" version="1" comment="drbd-kmp-rt is &lt;8.4.4_3.0.101_rt130_0.8-0.18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117180" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.4_3.0.101_rt130_0.8-0.18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117181" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.101_rt130_0.8-0.38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117182" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.101_rt130_0.8-0.38.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117183" version="1" comment="kernel-rt is &lt;3.0.101.rt130-0.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117184" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-0.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117185" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-0.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117186" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-0.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117187" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-0.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117188" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-0.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117189" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117190" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117191" version="1" comment="lttng-modules-kmp-rt is &lt;2.1.1_3.0.101_rt130_0.8-0.11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117192" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.1.1_3.0.101_rt130_0.8-0.11.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117193" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.101_rt130_0.8-0.20.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117194" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.101_rt130_0.8-0.20.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117195" version="1" comment="ofed-kmp-rt is &lt;1.5.4.1_3.0.101_rt130_0.8-0.13.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117196" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.4.1_3.0.101_rt130_0.8-0.13.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091566" version="1" comment="kernel-ec2 is &lt;3.0.101-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091564" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091565" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091538" version="1" comment="kernel-ec2 is &lt;3.0.101-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091536" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091537" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091546" version="1" comment="kernel-trace is &lt;3.0.101-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091544" version="1" comment="kernel-trace-base is &lt;3.0.101-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077110" version="1" comment="wireshark-devel is &lt;1.8.6-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077710" version="1" comment="wireshark is &lt;1.8.8-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077720" version="1" comment="wireshark-devel is &lt;1.8.8-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077242" version="1" comment="acroread is &lt;9.5.5-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077237" version="1" comment="acroread-cmaps is &lt;9.4.6-0.4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077238" version="1" comment="acroread-fonts-ja is &lt;9.4.6-0.4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077239" version="1" comment="acroread-fonts-ko is &lt;9.4.6-0.4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077240" version="1" comment="acroread-fonts-zh_CN is &lt;9.4.6-0.4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077241" version="1" comment="acroread-fonts-zh_TW is &lt;9.4.6-0.4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077230" version="1" comment="flash-player is &lt;11.2.202.285-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077228" version="1" comment="flash-player-gnome is &lt;11.2.202.285-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077229" version="1" comment="flash-player-kde4 is &lt;11.2.202.285-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077332" version="1" comment="kernel-default is &lt;3.0.74-0.6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077329" version="1" comment="kernel-default-base is &lt;3.0.74-0.6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077330" version="1" comment="kernel-default-devel is &lt;3.0.74-0.6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077331" version="1" comment="kernel-default-extra is &lt;3.0.74-0.6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077333" version="1" comment="kernel-source is &lt;3.0.74-0.6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077334" version="1" comment="kernel-syms is &lt;3.0.74-0.6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077338" version="1" comment="kernel-trace is &lt;3.0.74-0.6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077335" version="1" comment="kernel-trace-base is &lt;3.0.74-0.6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077336" version="1" comment="kernel-trace-devel is &lt;3.0.74-0.6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077337" version="1" comment="kernel-trace-extra is &lt;3.0.74-0.6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077342" version="1" comment="kernel-xen is &lt;3.0.74-0.6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077339" version="1" comment="kernel-xen-base is &lt;3.0.74-0.6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077340" version="1" comment="kernel-xen-devel is &lt;3.0.74-0.6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077341" version="1" comment="kernel-xen-extra is &lt;3.0.74-0.6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077343" version="1" comment="xen-kmp-default is &lt;4.1.4_02_3.0.74_0.6.10-0.5.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077344" version="1" comment="xen-kmp-trace is &lt;4.1.4_02_3.0.74_0.6.10-0.5.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117197" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.74_0.6.10-2.18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117198" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.74_0.6.10-2.18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117199" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.74_0.6.10-2.18.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117200" version="1" comment="gfs2-kmp-default is &lt;2_3.0.74_0.6.10-0.7.73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117201" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.74_0.6.10-0.7.73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117202" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.74_0.6.10-0.7.73" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117203" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.74_0.6.10-0.11.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117204" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.74_0.6.10-0.11.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117205" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.74_0.6.10-0.11.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117206" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.74_rt98_0.6.6-2.18.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117207" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.74_rt98_0.6.6-2.18.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117208" version="1" comment="drbd-kmp-rt is &lt;8.4.2_3.0.74_rt98_0.6.6-0.6.6.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117209" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.2_3.0.74_rt98_0.6.6-0.6.6.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117210" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.74_rt98_0.6.6-0.23.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117211" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.74_rt98_0.6.6-0.23.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117212" version="1" comment="kernel-rt is &lt;3.0.74.rt98-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117213" version="1" comment="kernel-rt-base is &lt;3.0.74.rt98-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117214" version="1" comment="kernel-rt-devel is &lt;3.0.74.rt98-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117215" version="1" comment="kernel-rt_trace is &lt;3.0.74.rt98-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117216" version="1" comment="kernel-rt_trace-base is &lt;3.0.74.rt98-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117217" version="1" comment="kernel-rt_trace-devel is &lt;3.0.74.rt98-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117218" version="1" comment="kernel-source-rt is &lt;3.0.74.rt98-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117219" version="1" comment="kernel-syms-rt is &lt;3.0.74.rt98-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117220" version="1" comment="lttng-modules-kmp-rt is &lt;2.0.4_3.0.74_rt98_0.6.6-0.7.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117221" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.0.4_3.0.74_rt98_0.6.6-0.7.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117222" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.74_rt98_0.6.6-0.11.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117223" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.74_rt98_0.6.6-0.11.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117224" version="1" comment="ofed-kmp-rt is &lt;1.5.2_3.0.74_rt98_0.6.6-0.28.28.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117225" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.2_3.0.74_rt98_0.6.6-0.28.28.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077355" version="1" comment="kernel-ec2 is &lt;3.0.74-0.6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077353" version="1" comment="kernel-ec2-base is &lt;3.0.74-0.6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077354" version="1" comment="kernel-ec2-devel is &lt;3.0.74-0.6.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077671" version="1" comment="strongswan is &lt;4.4.0-6.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077670" version="1" comment="strongswan-doc is &lt;4.4.0-6.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077818" version="1" comment="strongswan is &lt;4.4.0-6.17.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077817" version="1" comment="strongswan-doc is &lt;4.4.0-6.17.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077454" version="1" comment="flash-player is &lt;11.2.202.291-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077452" version="1" comment="flash-player-gnome is &lt;11.2.202.291-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077453" version="1" comment="flash-player-kde4 is &lt;11.2.202.291-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077651" version="1" comment="flash-player is &lt;11.2.202.297-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077649" version="1" comment="flash-player-gnome is &lt;11.2.202.297-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077650" version="1" comment="flash-player-kde4 is &lt;11.2.202.297-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090551" version="1" comment="flash-player is &lt;11.2.202.310-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090549" version="1" comment="flash-player-gnome is &lt;11.2.202.310-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090550" version="1" comment="flash-player-kde4 is &lt;11.2.202.310-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103985" version="1" comment="xen is &lt;4.0.3_21548_18-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103977" version="1" comment="xen-doc-html is &lt;4.0.3_21548_18-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103978" version="1" comment="xen-doc-pdf is &lt;4.0.3_21548_18-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103979" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.59_0.15-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103981" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.59_0.15-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103982" version="1" comment="xen-libs is &lt;4.0.3_21548_18-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103984" version="1" comment="xen-tools is &lt;4.0.3_21548_18-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103983" version="1" comment="xen-tools-domU is &lt;4.0.3_21548_18-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044171"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077819" version="1" comment="puppet is &lt;2.6.18-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077820" version="1" comment="puppet-server is &lt;2.6.18-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091356" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.6-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091354" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.6-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091355" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.6-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077759" version="1" comment="ruby is &lt;1.8.7.p357-0.9.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077761" version="1" comment="ruby-doc-html is &lt;1.8.7.p357-0.9.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077762" version="1" comment="ruby-tk is &lt;1.8.7.p357-0.9.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077763" version="1" comment="ruby-devel is &lt;1.8.7.p357-0.9.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077764" version="1" comment="ruby-doc-ri is &lt;1.8.7.p357-0.9.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077765" version="1" comment="ruby-examples is &lt;1.8.7.p357-0.9.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077766" version="1" comment="ruby-test-suite is &lt;1.8.7.p357-0.9.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089774" version="1" comment="apache2-mod_php53 is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112870" version="1" comment="php53 is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089775" version="1" comment="php53-bcmath is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089776" version="1" comment="php53-bz2 is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089777" version="1" comment="php53-calendar is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089778" version="1" comment="php53-ctype is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089779" version="1" comment="php53-curl is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089780" version="1" comment="php53-dba is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089781" version="1" comment="php53-dom is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089782" version="1" comment="php53-exif is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089783" version="1" comment="php53-fastcgi is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089784" version="1" comment="php53-fileinfo is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089785" version="1" comment="php53-ftp is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089786" version="1" comment="php53-gd is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089787" version="1" comment="php53-gettext is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089788" version="1" comment="php53-gmp is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089789" version="1" comment="php53-iconv is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089790" version="1" comment="php53-intl is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089791" version="1" comment="php53-json is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089792" version="1" comment="php53-ldap is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089793" version="1" comment="php53-mbstring is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089794" version="1" comment="php53-mcrypt is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089795" version="1" comment="php53-mysql is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089796" version="1" comment="php53-odbc is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089797" version="1" comment="php53-openssl is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089798" version="1" comment="php53-pcntl is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089799" version="1" comment="php53-pdo is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089800" version="1" comment="php53-pear is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089801" version="1" comment="php53-pgsql is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089802" version="1" comment="php53-pspell is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089803" version="1" comment="php53-shmop is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089804" version="1" comment="php53-snmp is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089805" version="1" comment="php53-soap is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089806" version="1" comment="php53-suhosin is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089807" version="1" comment="php53-sysvmsg is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089808" version="1" comment="php53-sysvsem is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089809" version="1" comment="php53-sysvshm is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089810" version="1" comment="php53-tokenizer is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089811" version="1" comment="php53-wddx is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089812" version="1" comment="php53-xmlreader is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089813" version="1" comment="php53-xmlrpc is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089814" version="1" comment="php53-xmlwriter is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089815" version="1" comment="php53-xsl is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089816" version="1" comment="php53-zip is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089817" version="1" comment="php53-zlib is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089834" version="1" comment="php53-devel is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089835" version="1" comment="php53-imap is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089836" version="1" comment="php53-posix is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089837" version="1" comment="php53-readline is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089838" version="1" comment="php53-sockets is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089839" version="1" comment="php53-sqlite is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009089840" version="1" comment="php53-tidy is &lt;5.3.17-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090582" version="1" comment="libldb1 is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090635" version="1" comment="libldb1-32bit is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090585" version="1" comment="libsmbclient0 is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090583" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090588" version="1" comment="libtalloc1 is &lt;3.4.3-1.46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090586" version="1" comment="libtalloc1-32bit is &lt;3.4.3-1.46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090591" version="1" comment="libtalloc2 is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090589" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090594" version="1" comment="libtdb1 is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090592" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090596" version="1" comment="libtevent0 is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090595" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090599" version="1" comment="libwbclient0 is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090597" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090610" version="1" comment="samba is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090600" version="1" comment="samba-32bit is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090603" version="1" comment="samba-client is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090601" version="1" comment="samba-client-32bit is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090604" version="1" comment="samba-doc is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090605" version="1" comment="samba-krb-printing is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090608" version="1" comment="samba-winbind is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090606" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112877" version="1" comment="libldb1 is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113165" version="1" comment="libldb1-32bit is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112878" version="1" comment="libsmbclient0 is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112879" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112880" version="1" comment="libtalloc2 is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112881" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112882" version="1" comment="libtdb1 is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112883" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112884" version="1" comment="libtevent0 is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112885" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112886" version="1" comment="libwbclient0 is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112887" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112888" version="1" comment="samba is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112889" version="1" comment="samba-32bit is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112890" version="1" comment="samba-client is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112891" version="1" comment="samba-client-32bit is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112892" version="1" comment="samba-doc is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112893" version="1" comment="samba-krb-printing is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112894" version="1" comment="samba-winbind is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112895" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090581" version="1" comment="ldapsmb is &lt;1.34b-12.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112876" version="1" comment="ldapsmb is &lt;1.34b-12.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090624" version="1" comment="libldb-devel is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090625" version="1" comment="libnetapi-devel is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090626" version="1" comment="libnetapi0 is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090627" version="1" comment="libsmbclient-devel is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090628" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090629" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090630" version="1" comment="libtalloc-devel is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090631" version="1" comment="libtdb-devel is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090632" version="1" comment="libtevent-devel is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090633" version="1" comment="libwbclient-devel is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090634" version="1" comment="samba-devel is &lt;3.6.3-0.33.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117226" version="1" comment="libldb-devel is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117227" version="1" comment="libnetapi-devel is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117228" version="1" comment="libnetapi0 is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117229" version="1" comment="libsmbclient-devel is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117230" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117231" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117232" version="1" comment="libtalloc-devel is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117233" version="1" comment="libtdb-devel is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117234" version="1" comment="libtevent-devel is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117235" version="1" comment="libwbclient-devel is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117236" version="1" comment="samba-devel is &lt;3.6.3-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092731" version="1" comment="apache2-mod_php53 is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112871" version="1" comment="php53 is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092732" version="1" comment="php53-bcmath is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092733" version="1" comment="php53-bz2 is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092734" version="1" comment="php53-calendar is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092735" version="1" comment="php53-ctype is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092736" version="1" comment="php53-curl is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092737" version="1" comment="php53-dba is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092738" version="1" comment="php53-dom is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092739" version="1" comment="php53-exif is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092740" version="1" comment="php53-fastcgi is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092741" version="1" comment="php53-fileinfo is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092742" version="1" comment="php53-ftp is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092743" version="1" comment="php53-gd is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092744" version="1" comment="php53-gettext is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092745" version="1" comment="php53-gmp is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092746" version="1" comment="php53-iconv is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092747" version="1" comment="php53-intl is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092748" version="1" comment="php53-json is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092749" version="1" comment="php53-ldap is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092750" version="1" comment="php53-mbstring is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092751" version="1" comment="php53-mcrypt is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092752" version="1" comment="php53-mysql is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092753" version="1" comment="php53-odbc is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092754" version="1" comment="php53-openssl is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092755" version="1" comment="php53-pcntl is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092756" version="1" comment="php53-pdo is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092757" version="1" comment="php53-pear is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092758" version="1" comment="php53-pgsql is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092759" version="1" comment="php53-pspell is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092760" version="1" comment="php53-shmop is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092761" version="1" comment="php53-snmp is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092762" version="1" comment="php53-soap is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092763" version="1" comment="php53-suhosin is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092764" version="1" comment="php53-sysvmsg is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092765" version="1" comment="php53-sysvsem is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092766" version="1" comment="php53-sysvshm is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092767" version="1" comment="php53-tokenizer is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092768" version="1" comment="php53-wddx is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092769" version="1" comment="php53-xmlreader is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092770" version="1" comment="php53-xmlrpc is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092771" version="1" comment="php53-xmlwriter is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092772" version="1" comment="php53-xsl is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092773" version="1" comment="php53-zip is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092774" version="1" comment="php53-zlib is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092866" version="1" comment="php53-devel is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092867" version="1" comment="php53-imap is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092868" version="1" comment="php53-posix is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092869" version="1" comment="php53-readline is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092870" version="1" comment="php53-sockets is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092871" version="1" comment="php53-sqlite is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092872" version="1" comment="php53-tidy is &lt;5.3.17-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091299" version="1" comment="subversion is &lt;1.6.17-1.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091294" version="1" comment="subversion-devel is &lt;1.6.17-1.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091295" version="1" comment="subversion-perl is &lt;1.6.17-1.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091296" version="1" comment="subversion-python is &lt;1.6.17-1.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091297" version="1" comment="subversion-server is &lt;1.6.17-1.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091298" version="1" comment="subversion-tools is &lt;1.6.17-1.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091288" version="1" comment="libvirt is &lt;1.0.5.6-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091284" version="1" comment="libvirt-client is &lt;1.0.5.6-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091283" version="1" comment="libvirt-client-32bit is &lt;1.0.5.6-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091285" version="1" comment="libvirt-doc is &lt;1.0.5.6-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091287" version="1" comment="libvirt-python is &lt;1.0.5.6-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091286" version="1" comment="libvirt-lock-sanlock is &lt;1.0.5.6-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091301" version="1" comment="libvirt-devel is &lt;1.0.5.6-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091300" version="1" comment="libvirt-devel-32bit is &lt;1.0.5.6-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104045" version="1" comment="kernel-default is &lt;3.0.101-0.7.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104043" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104044" version="1" comment="kernel-default-devel is &lt;3.0.101-0.7.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104048" version="1" comment="kernel-ec2 is &lt;3.0.101-0.7.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104046" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.7.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104047" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.7.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104049" version="1" comment="kernel-source is &lt;3.0.101-0.7.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104050" version="1" comment="kernel-syms is &lt;3.0.101-0.7.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104053" version="1" comment="kernel-trace is &lt;3.0.101-0.7.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104051" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104052" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.7.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104056" version="1" comment="kernel-xen is &lt;3.0.101-0.7.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104054" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104055" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.7.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112862" version="1" comment="xen-kmp-default is &lt;4.1.6_06_3.0.101_0.7.23-0.5.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112863" version="1" comment="xen-kmp-trace is &lt;4.1.6_06_3.0.101_0.7.23-0.5.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098379" version="1" comment="libmysql55client18 is &lt;5.5.37-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098377" version="1" comment="libmysql55client18-32bit is &lt;5.5.37-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098380" version="1" comment="libmysql55client_r18 is &lt;5.5.37-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098800" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.37-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098383" version="1" comment="libmysqlclient15 is &lt;5.0.96-0.6.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098381" version="1" comment="libmysqlclient15-32bit is &lt;5.0.96-0.6.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098384" version="1" comment="libmysqlclient_r15 is &lt;5.0.96-0.6.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098802" version="1" comment="libmysqlclient_r15-32bit is &lt;5.0.96-0.6.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098387" version="1" comment="mysql is &lt;5.5.37-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098385" version="1" comment="mysql-client is &lt;5.5.37-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098386" version="1" comment="mysql-tools is &lt;5.5.37-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093120" version="1" comment="kernel-default is &lt;3.0.101-0.7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093118" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093119" version="1" comment="kernel-default-devel is &lt;3.0.101-0.7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093142" version="1" comment="kernel-default-extra is &lt;3.0.101-0.7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093124" version="1" comment="kernel-source is &lt;3.0.101-0.7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093125" version="1" comment="kernel-syms is &lt;3.0.101-0.7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093128" version="1" comment="kernel-trace is &lt;3.0.101-0.7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093126" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093127" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093144" version="1" comment="kernel-trace-extra is &lt;3.0.101-0.7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093137" version="1" comment="kernel-xen is &lt;3.0.101-0.7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093135" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093136" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093145" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093138" version="1" comment="xen-kmp-default is &lt;4.1.6_04_3.0.101_0.7.15-0.5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093140" version="1" comment="xen-kmp-trace is &lt;4.1.6_04_3.0.101_0.7.15-0.5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117237" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.101_0.7.15-2.18.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117238" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.101_0.7.15-2.18.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117239" version="1" comment="cluster-network-kmp-xen is &lt;1.4_3.0.101_0.7.15-2.18.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117240" version="1" comment="gfs2-kmp-default is &lt;2_3.0.101_0.7.15-0.7.107" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117241" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.101_0.7.15-0.7.107" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117242" version="1" comment="gfs2-kmp-xen is &lt;2_3.0.101_0.7.15-0.7.107" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117243" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_0.7.15-0.11.78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117244" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_0.7.15-0.11.78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117245" version="1" comment="ocfs2-kmp-xen is &lt;1.6_3.0.101_0.7.15-0.11.78" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093131" version="1" comment="kernel-ec2 is &lt;3.0.101-0.7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093129" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093130" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098401" version="1" comment="glibc is &lt;2.11.3-17.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098388" version="1" comment="glibc-32bit is &lt;2.11.3-17.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098390" version="1" comment="glibc-devel is &lt;2.11.3-17.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098389" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098392" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098396" version="1" comment="glibc-locale is &lt;2.11.3-17.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098394" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098402" version="1" comment="nscd is &lt;2.11.3-17.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098391" version="1" comment="glibc-html is &lt;2.11.3-17.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098393" version="1" comment="glibc-info is &lt;2.11.3-17.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098399" version="1" comment="glibc-profile is &lt;2.11.3-17.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098397" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091438" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.70.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091440" version="1" comment="xorg-x11-server is &lt;7.4-27.70.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091439" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.70.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091435" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091437" version="1" comment="xorg-x11-server is &lt;7.4-27.83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091436" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091443" version="1" comment="xorg-x11-server-sdk is &lt;7.4-27.70.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091442" version="1" comment="xorg-x11-server-sdk is &lt;7.4-27.83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098405" version="1" comment="kernel-default is &lt;3.0.101-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098403" version="1" comment="kernel-default-base is &lt;3.0.101-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098404" version="1" comment="kernel-default-devel is &lt;3.0.101-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098804" version="1" comment="kernel-default-extra is &lt;3.0.101-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098412" version="1" comment="kernel-source is &lt;3.0.101-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098413" version="1" comment="kernel-syms is &lt;3.0.101-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098415" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098419" version="1" comment="kernel-xen is &lt;3.0.101-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098417" version="1" comment="kernel-xen-base is &lt;3.0.101-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098418" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098806" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098420" version="1" comment="xen-kmp-default is &lt;4.2.4_02_3.0.101_0.21-0.7.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043468"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117246" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.101_0.21-2.27.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132796" version="1" comment="cluster-network-kmp-ppc64 is &lt;1.4_3.0.101_0.21-2.27.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117247" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.101_0.21-2.27.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117249" version="1" comment="gfs2-kmp-default is &lt;2_3.0.101_0.21-0.16.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132797" version="1" comment="gfs2-kmp-ppc64 is &lt;2_3.0.101_0.21-0.16.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117250" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.101_0.21-0.16.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117252" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_0.21-0.20.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132798" version="1" comment="ocfs2-kmp-ppc64 is &lt;1.6_3.0.101_0.21-0.20.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117253" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_0.21-0.20.54" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117255" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.101_rt130_0.14-2.27.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117256" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.101_rt130_0.14-2.27.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117257" version="1" comment="drbd-kmp-rt is &lt;8.4.4_3.0.101_rt130_0.14-0.22.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117258" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.4_3.0.101_rt130_0.14-0.22.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117259" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.101_rt130_0.14-0.38.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117260" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.101_rt130_0.14-0.38.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117261" version="1" comment="kernel-rt is &lt;3.0.101.rt130-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117262" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117263" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117264" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117265" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117266" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117267" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117268" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117269" version="1" comment="lttng-modules-kmp-rt is &lt;2.1.1_3.0.101_rt130_0.14-0.11.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117270" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.1.1_3.0.101_rt130_0.14-0.11.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117271" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.101_rt130_0.14-0.20.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117272" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.101_rt130_0.14-0.20.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117273" version="1" comment="ofed-kmp-rt is &lt;1.5.4.1_3.0.101_rt130_0.14-0.13.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117274" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.4.1_3.0.101_rt130_0.14-0.13.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104063" version="1" comment="kernel-default is &lt;3.0.101-0.7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104061" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104062" version="1" comment="kernel-default-devel is &lt;3.0.101-0.7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104066" version="1" comment="kernel-ec2 is &lt;3.0.101-0.7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104064" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104065" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104070" version="1" comment="kernel-source is &lt;3.0.101-0.7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104071" version="1" comment="kernel-syms is &lt;3.0.101-0.7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104074" version="1" comment="kernel-trace is &lt;3.0.101-0.7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104072" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104073" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104077" version="1" comment="kernel-xen is &lt;3.0.101-0.7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104075" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104076" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098408" version="1" comment="kernel-ec2 is &lt;3.0.101-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098406" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098407" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098416" version="1" comment="kernel-trace is &lt;3.0.101-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098414" version="1" comment="kernel-trace-base is &lt;3.0.101-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098451" version="1" comment="libldb1 is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098820" version="1" comment="libldb1-32bit is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098454" version="1" comment="libsmbclient0 is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098452" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098457" version="1" comment="libtalloc2 is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098455" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098460" version="1" comment="libtdb1 is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098458" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098462" version="1" comment="libtevent0 is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098461" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098465" version="1" comment="libwbclient0 is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098463" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098476" version="1" comment="samba is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098466" version="1" comment="samba-32bit is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098469" version="1" comment="samba-client is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098467" version="1" comment="samba-client-32bit is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098470" version="1" comment="samba-doc is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098471" version="1" comment="samba-krb-printing is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098474" version="1" comment="samba-winbind is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098472" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104097" version="1" comment="ldapsmb is &lt;1.34b-12.33.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104098" version="1" comment="libldb1 is &lt;3.6.3-0.33.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104100" version="1" comment="libsmbclient0 is &lt;3.6.3-0.33.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104099" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.33.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104102" version="1" comment="libtalloc1 is &lt;3.4.3-1.54.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104101" version="1" comment="libtalloc1-32bit is &lt;3.4.3-1.54.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104104" version="1" comment="libtalloc2 is &lt;3.6.3-0.33.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104103" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.33.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104106" version="1" comment="libtdb1 is &lt;3.6.3-0.33.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104105" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.33.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104108" version="1" comment="libtevent0 is &lt;3.6.3-0.33.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104107" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.33.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104110" version="1" comment="libwbclient0 is &lt;3.6.3-0.33.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104109" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.33.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104118" version="1" comment="samba is &lt;3.6.3-0.33.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104111" version="1" comment="samba-32bit is &lt;3.6.3-0.33.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104113" version="1" comment="samba-client is &lt;3.6.3-0.33.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104112" version="1" comment="samba-client-32bit is &lt;3.6.3-0.33.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104114" version="1" comment="samba-doc is &lt;3.6.3-0.33.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104115" version="1" comment="samba-krb-printing is &lt;3.6.3-0.33.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104117" version="1" comment="samba-winbind is &lt;3.6.3-0.33.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104116" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.33.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098450" version="1" comment="ldapsmb is &lt;1.34b-12.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098809" version="1" comment="libldb-devel is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098810" version="1" comment="libnetapi-devel is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098811" version="1" comment="libnetapi0 is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098812" version="1" comment="libsmbclient-devel is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098813" version="1" comment="libsmbsharemodes-devel is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098814" version="1" comment="libsmbsharemodes0 is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098815" version="1" comment="libtalloc-devel is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098816" version="1" comment="libtdb-devel is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098817" version="1" comment="libtevent-devel is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098818" version="1" comment="libwbclient-devel is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098819" version="1" comment="samba-devel is &lt;3.6.3-0.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107493" version="1" comment="curl is &lt;7.19.7-1.20.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107495" version="1" comment="libcurl4 is &lt;7.19.7-1.20.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107494" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.20.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092508" version="1" comment="curl is &lt;7.19.7-1.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092511" version="1" comment="libcurl4 is &lt;7.19.7-1.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092509" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107492" version="1" comment="libcurl-devel is &lt;7.19.7-1.20.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092512" version="1" comment="libcurl-devel is &lt;7.19.7-1.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098478" version="1" comment="puppet is &lt;2.6.18-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098477" version="1" comment="puppet-server is &lt;2.6.18-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083224" version="1" comment="bind-libs is &lt;9.9.3P2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083223" version="1" comment="bind-libs-32bit is &lt;9.9.3P2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083225" version="1" comment="bind-utils is &lt;9.9.3P2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083229" version="1" comment="bind is &lt;9.9.3P2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083226" version="1" comment="bind-chrootenv is &lt;9.9.3P2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083227" version="1" comment="bind-doc is &lt;9.9.3P2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009083231" version="1" comment="bind-devel is &lt;9.9.3P2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090547" version="1" comment="wireshark is &lt;1.8.9-0.2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009090548" version="1" comment="wireshark-devel is &lt;1.8.9-0.2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091427" version="1" comment="flash-player is &lt;11.2.202.327-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091425" version="1" comment="flash-player-gnome is &lt;11.2.202.327-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091426" version="1" comment="flash-player-kde4 is &lt;11.2.202.327-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092001" version="1" comment="flash-player is &lt;11.2.202.332-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091999" version="1" comment="flash-player-gnome is &lt;11.2.202.332-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009092000" version="1" comment="flash-player-kde4 is &lt;11.2.202.332-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093462" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093460" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093461" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.6-0.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093632" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr15.1-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093629" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr15.1-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093630" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr15.1-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093631" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr15.1-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093633" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr15.1-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093479" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr6.1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093476" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr6.1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110665" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr9.0-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093477" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr6.1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093478" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr6.1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093493" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr6.1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091792" version="1" comment="wireshark is &lt;1.8.11-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009091800" version="1" comment="wireshark-devel is &lt;1.8.11-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093167" version="1" comment="rubygem-actionpack-2_3 is &lt;2.3.17-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093173" version="1" comment="libvirt is &lt;1.0.5.8-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093169" version="1" comment="libvirt-client is &lt;1.0.5.8-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093168" version="1" comment="libvirt-client-32bit is &lt;1.0.5.8-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093170" version="1" comment="libvirt-doc is &lt;1.0.5.8-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093172" version="1" comment="libvirt-python is &lt;1.0.5.8-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093171" version="1" comment="libvirt-lock-sanlock is &lt;1.0.5.8-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093175" version="1" comment="libvirt-devel is &lt;1.0.5.8-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093174" version="1" comment="libvirt-devel-32bit is &lt;1.0.5.8-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093935" version="1" comment="libvirt is &lt;1.0.5.9-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093931" version="1" comment="libvirt-client is &lt;1.0.5.9-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093930" version="1" comment="libvirt-client-32bit is &lt;1.0.5.9-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093932" version="1" comment="libvirt-doc is &lt;1.0.5.9-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093934" version="1" comment="libvirt-python is &lt;1.0.5.9-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093933" version="1" comment="libvirt-lock-sanlock is &lt;1.0.5.9-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093939" version="1" comment="libvirt-devel is &lt;1.0.5.9-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093938" version="1" comment="libvirt-devel-32bit is &lt;1.0.5.9-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102500" version="1" comment="clamav is &lt;0.98.5-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107019" version="1" comment="apache2-mod_php53 is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112867" version="1" comment="php53 is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107020" version="1" comment="php53-bcmath is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107021" version="1" comment="php53-bz2 is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107022" version="1" comment="php53-calendar is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107023" version="1" comment="php53-ctype is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107024" version="1" comment="php53-curl is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107025" version="1" comment="php53-dba is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107026" version="1" comment="php53-dom is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107027" version="1" comment="php53-exif is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107028" version="1" comment="php53-fastcgi is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107029" version="1" comment="php53-fileinfo is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107030" version="1" comment="php53-ftp is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107031" version="1" comment="php53-gd is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107032" version="1" comment="php53-gettext is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107033" version="1" comment="php53-gmp is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107034" version="1" comment="php53-iconv is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107035" version="1" comment="php53-intl is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107036" version="1" comment="php53-json is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107037" version="1" comment="php53-ldap is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107038" version="1" comment="php53-mbstring is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107039" version="1" comment="php53-mcrypt is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107040" version="1" comment="php53-mysql is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107041" version="1" comment="php53-odbc is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107042" version="1" comment="php53-openssl is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107043" version="1" comment="php53-pcntl is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107044" version="1" comment="php53-pdo is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107045" version="1" comment="php53-pear is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107046" version="1" comment="php53-pgsql is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107047" version="1" comment="php53-pspell is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107048" version="1" comment="php53-shmop is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107049" version="1" comment="php53-snmp is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107050" version="1" comment="php53-soap is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107051" version="1" comment="php53-suhosin is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107052" version="1" comment="php53-sysvmsg is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107053" version="1" comment="php53-sysvsem is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107054" version="1" comment="php53-sysvshm is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107055" version="1" comment="php53-tokenizer is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107056" version="1" comment="php53-wddx is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107057" version="1" comment="php53-xmlreader is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107058" version="1" comment="php53-xmlrpc is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107059" version="1" comment="php53-xmlwriter is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107060" version="1" comment="php53-xsl is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107061" version="1" comment="php53-zip is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107062" version="1" comment="php53-zlib is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107012" version="1" comment="php53-devel is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107013" version="1" comment="php53-imap is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107014" version="1" comment="php53-posix is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107015" version="1" comment="php53-readline is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107016" version="1" comment="php53-sockets is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107017" version="1" comment="php53-sqlite is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107018" version="1" comment="php53-tidy is &lt;5.3.17-0.35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098833" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.6-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098831" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.6-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098832" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.6-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098497" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr7.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098494" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr7.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098495" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr7.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098496" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr7.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043480"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098498" version="1" comment="wireshark is &lt;1.8.12-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098834" version="1" comment="wireshark-devel is &lt;1.8.12-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107071" version="1" comment="glibc is &lt;2.11.3-17.82.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107065" version="1" comment="glibc-32bit is &lt;2.11.3-17.82.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107067" version="1" comment="glibc-devel is &lt;2.11.3-17.82.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107066" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.82.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107068" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.82.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107070" version="1" comment="glibc-locale is &lt;2.11.3-17.82.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107069" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.82.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107072" version="1" comment="nscd is &lt;2.11.3-17.82.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107925" version="1" comment="glibc is &lt;2.11.1-0.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107915" version="1" comment="glibc-32bit is &lt;2.11.1-0.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107917" version="1" comment="glibc-devel is &lt;2.11.1-0.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107916" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107918" version="1" comment="glibc-html is &lt;2.11.1-0.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107919" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107920" version="1" comment="glibc-info is &lt;2.11.1-0.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107922" version="1" comment="glibc-locale is &lt;2.11.1-0.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107921" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107924" version="1" comment="glibc-profile is &lt;2.11.1-0.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107923" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107926" version="1" comment="nscd is &lt;2.11.1-0.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107913" version="1" comment="glibc is &lt;2.11.3-17.45.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107903" version="1" comment="glibc-32bit is &lt;2.11.3-17.45.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107905" version="1" comment="glibc-devel is &lt;2.11.3-17.45.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107904" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.45.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107906" version="1" comment="glibc-html is &lt;2.11.3-17.45.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107907" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.45.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107908" version="1" comment="glibc-info is &lt;2.11.3-17.45.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107910" version="1" comment="glibc-locale is &lt;2.11.3-17.45.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107909" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.45.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107912" version="1" comment="glibc-profile is &lt;2.11.3-17.45.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107911" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.45.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107914" version="1" comment="nscd is &lt;2.11.3-17.45.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107063" version="1" comment="glibc-html is &lt;2.11.3-17.82.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107064" version="1" comment="glibc-info is &lt;2.11.3-17.82.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107076" version="1" comment="glibc-profile is &lt;2.11.3-17.82.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107074" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.82.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093369" version="1" comment="curl is &lt;7.19.7-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093372" version="1" comment="libcurl4 is &lt;7.19.7-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093370" version="1" comment="libcurl4-32bit is &lt;7.19.7-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093373" version="1" comment="libcurl-devel is &lt;7.19.7-1.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098843" version="1" comment="subversion is &lt;1.6.17-1.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098838" version="1" comment="subversion-devel is &lt;1.6.17-1.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098839" version="1" comment="subversion-perl is &lt;1.6.17-1.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098840" version="1" comment="subversion-python is &lt;1.6.17-1.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098841" version="1" comment="subversion-server is &lt;1.6.17-1.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098842" version="1" comment="subversion-tools is &lt;1.6.17-1.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098508" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098504" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098510" version="1" comment="openssl is &lt;0.9.8j-0.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098582" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098578" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098580" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098579" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098584" version="1" comment="openssl is &lt;0.9.8j-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098583" version="1" comment="openssl-doc is &lt;0.9.8j-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098506" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098505" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098509" version="1" comment="openssl-doc is &lt;0.9.8j-0.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098844" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098513" version="1" comment="squid3 is &lt;3.1.12-8.16.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098376" version="1" comment="kvm is &lt;1.4.2-0.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108063" version="1" comment="kernel-bigsmp-devel is &lt;3.0.101-0.47.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108040" version="1" comment="kernel-default is &lt;3.0.101-0.47.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108037" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108038" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108039" version="1" comment="kernel-default-extra is &lt;3.0.101-0.47.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108045" version="1" comment="kernel-source is &lt;3.0.101-0.47.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108046" version="1" comment="kernel-syms is &lt;3.0.101-0.47.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108047" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108051" version="1" comment="kernel-xen is &lt;3.0.101-0.47.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108048" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108049" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108050" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.47.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108052" version="1" comment="xen-kmp-default is &lt;4.2.5_04_3.0.101_0.47.50-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117276" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.101_0.47.50-2.28.1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132799" version="1" comment="cluster-network-kmp-ppc64 is &lt;1.4_3.0.101_0.47.50-2.28.1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117277" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.101_0.47.50-2.28.1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117280" version="1" comment="gfs2-kmp-default is &lt;2_3.0.101_0.47.50-0.17.1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132800" version="1" comment="gfs2-kmp-ppc64 is &lt;2_3.0.101_0.47.50-0.17.1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117281" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.101_0.47.50-0.17.1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117284" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_0.47.50-0.21.1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132801" version="1" comment="ocfs2-kmp-ppc64 is &lt;1.6_3.0.101_0.47.50-0.21.1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117285" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_0.47.50-0.21.1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117287" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.101_rt130_0.33.36-2.28.1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117288" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.101_rt130_0.33.36-2.28.1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117289" version="1" comment="drbd-kmp-rt is &lt;8.4.4_3.0.101_rt130_0.33.36-0.23.1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117290" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.4_3.0.101_rt130_0.33.36-0.23.1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117291" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.101_rt130_0.33.36-0.39.1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117292" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.101_rt130_0.33.36-0.39.1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117293" version="1" comment="kernel-rt is &lt;3.0.101.rt130-0.33.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117294" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-0.33.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117295" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-0.33.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117296" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-0.33.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117297" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-0.33.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117298" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-0.33.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117299" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-0.33.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117300" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-0.33.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117301" version="1" comment="lttng-modules-kmp-rt is &lt;2.1.1_3.0.101_rt130_0.33.36-0.12.1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117302" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.1.1_3.0.101_rt130_0.33.36-0.12.1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117303" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.101_rt130_0.33.36-0.21.1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117304" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.101_rt130_0.33.36-0.21.1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117305" version="1" comment="ofed-kmp-rt is &lt;1.5.4.1_3.0.101_rt130_0.33.36-0.14.1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117306" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.4.1_3.0.101_rt130_0.33.36-0.14.1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108065" version="1" comment="kernel-bigsmp is &lt;3.0.101-0.47.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108064" version="1" comment="kernel-bigsmp-base is &lt;3.0.101-0.47.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108056" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108054" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108055" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108058" version="1" comment="kernel-trace is &lt;3.0.101-0.47.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108057" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100668" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100671" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100669" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100673" version="1" comment="openssl1 is &lt;1.0.1g-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100672" version="1" comment="openssl1-doc is &lt;1.0.1g-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098555" version="1" comment="kernel-default is &lt;3.0.101-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098552" version="1" comment="kernel-default-base is &lt;3.0.101-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098553" version="1" comment="kernel-default-devel is &lt;3.0.101-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098868" version="1" comment="kernel-default-extra is &lt;3.0.101-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098556" version="1" comment="kernel-source is &lt;3.0.101-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098557" version="1" comment="kernel-syms is &lt;3.0.101-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098559" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098572" version="1" comment="kernel-xen is &lt;3.0.101-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098570" version="1" comment="kernel-xen-base is &lt;3.0.101-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098571" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098870" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098573" version="1" comment="xen-kmp-default is &lt;4.2.4_02_3.0.101_0.29-0.7.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117307" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.101_0.29-2.27.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132802" version="1" comment="cluster-network-kmp-ppc64 is &lt;1.4_3.0.101_0.29-2.27.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117308" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.101_0.29-2.27.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117310" version="1" comment="gfs2-kmp-default is &lt;2_3.0.101_0.29-0.16.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132803" version="1" comment="gfs2-kmp-ppc64 is &lt;2_3.0.101_0.29-0.16.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117311" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.101_0.29-0.16.69" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117313" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_0.29-0.20.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132804" version="1" comment="ocfs2-kmp-ppc64 is &lt;1.6_3.0.101_0.29-0.20.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117314" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_0.29-0.20.63" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117316" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.101_rt130_0.16-2.27.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117317" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.101_rt130_0.16-2.27.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117318" version="1" comment="drbd-kmp-rt is &lt;8.4.4_3.0.101_rt130_0.16-0.22.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117319" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.4_3.0.101_rt130_0.16-0.22.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117320" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.101_rt130_0.16-0.38.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117321" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.101_rt130_0.16-0.38.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117322" version="1" comment="kernel-rt is &lt;3.0.101.rt130-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117323" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117324" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117325" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117326" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117327" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117328" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117329" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117330" version="1" comment="lttng-modules-kmp-rt is &lt;2.1.1_3.0.101_rt130_0.16-0.11.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117331" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.1.1_3.0.101_rt130_0.16-0.11.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117332" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.101_rt130_0.16-0.20.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117333" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.101_rt130_0.16-0.20.65" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117334" version="1" comment="ofed-kmp-rt is &lt;1.5.4.1_3.0.101_rt130_0.16-0.13.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117335" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.4.1_3.0.101_rt130_0.16-0.13.56" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098566" version="1" comment="kernel-ec2 is &lt;3.0.101-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098564" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098565" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098560" version="1" comment="kernel-trace is &lt;3.0.101-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098558" version="1" comment="kernel-trace-base is &lt;3.0.101-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099005" version="1" comment="apache2-mod_php53 is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112873" version="1" comment="php53 is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099006" version="1" comment="php53-bcmath is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099007" version="1" comment="php53-bz2 is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099008" version="1" comment="php53-calendar is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099009" version="1" comment="php53-ctype is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099010" version="1" comment="php53-curl is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099011" version="1" comment="php53-dba is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099012" version="1" comment="php53-dom is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099013" version="1" comment="php53-exif is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099014" version="1" comment="php53-fastcgi is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099015" version="1" comment="php53-fileinfo is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099016" version="1" comment="php53-ftp is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099017" version="1" comment="php53-gd is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099018" version="1" comment="php53-gettext is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099019" version="1" comment="php53-gmp is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099020" version="1" comment="php53-iconv is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099021" version="1" comment="php53-intl is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099022" version="1" comment="php53-json is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099023" version="1" comment="php53-ldap is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099024" version="1" comment="php53-mbstring is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099025" version="1" comment="php53-mcrypt is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099026" version="1" comment="php53-mysql is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099027" version="1" comment="php53-odbc is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099028" version="1" comment="php53-openssl is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099029" version="1" comment="php53-pcntl is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099030" version="1" comment="php53-pdo is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099031" version="1" comment="php53-pear is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099032" version="1" comment="php53-pgsql is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099033" version="1" comment="php53-pspell is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099034" version="1" comment="php53-shmop is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099035" version="1" comment="php53-snmp is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099036" version="1" comment="php53-soap is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099037" version="1" comment="php53-suhosin is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099038" version="1" comment="php53-sysvmsg is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099039" version="1" comment="php53-sysvsem is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099040" version="1" comment="php53-sysvshm is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099041" version="1" comment="php53-tokenizer is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099042" version="1" comment="php53-wddx is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099043" version="1" comment="php53-xmlreader is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099044" version="1" comment="php53-xmlrpc is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099045" version="1" comment="php53-xmlwriter is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099046" version="1" comment="php53-xsl is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099047" version="1" comment="php53-zip is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099048" version="1" comment="php53-zlib is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099049" version="1" comment="php53-devel is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099050" version="1" comment="php53-imap is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099051" version="1" comment="php53-posix is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099052" version="1" comment="php53-readline is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099053" version="1" comment="php53-sockets is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099054" version="1" comment="php53-sqlite is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099055" version="1" comment="php53-tidy is &lt;5.3.17-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098873" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113249" version="1" comment="tomcat6 is &lt;6.0.41-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113242" version="1" comment="tomcat6-admin-webapps is &lt;6.0.41-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113243" version="1" comment="tomcat6-docs-webapp is &lt;6.0.41-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113244" version="1" comment="tomcat6-javadoc is &lt;6.0.41-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113245" version="1" comment="tomcat6-jsp-2_1-api is &lt;6.0.41-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113246" version="1" comment="tomcat6-lib is &lt;6.0.41-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113247" version="1" comment="tomcat6-servlet-2_5-api is &lt;6.0.41-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113248" version="1" comment="tomcat6-webapps is &lt;6.0.41-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104125" version="1" comment="apache2-mod_php53 is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112861" version="1" comment="php53 is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104126" version="1" comment="php53-bcmath is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104127" version="1" comment="php53-bz2 is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104128" version="1" comment="php53-calendar is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104129" version="1" comment="php53-ctype is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104130" version="1" comment="php53-curl is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104131" version="1" comment="php53-dba is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104132" version="1" comment="php53-dom is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104133" version="1" comment="php53-exif is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104134" version="1" comment="php53-fastcgi is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104135" version="1" comment="php53-fileinfo is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104136" version="1" comment="php53-ftp is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104137" version="1" comment="php53-gd is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104138" version="1" comment="php53-gettext is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104139" version="1" comment="php53-gmp is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104140" version="1" comment="php53-iconv is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104141" version="1" comment="php53-intl is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104142" version="1" comment="php53-json is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104143" version="1" comment="php53-ldap is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104144" version="1" comment="php53-mbstring is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104145" version="1" comment="php53-mcrypt is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104146" version="1" comment="php53-mysql is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104147" version="1" comment="php53-odbc is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104148" version="1" comment="php53-openssl is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104149" version="1" comment="php53-pcntl is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104150" version="1" comment="php53-pdo is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104151" version="1" comment="php53-pear is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104152" version="1" comment="php53-pgsql is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104153" version="1" comment="php53-pspell is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104154" version="1" comment="php53-shmop is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104155" version="1" comment="php53-snmp is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104156" version="1" comment="php53-soap is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104157" version="1" comment="php53-suhosin is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104158" version="1" comment="php53-sysvmsg is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104159" version="1" comment="php53-sysvsem is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104160" version="1" comment="php53-sysvshm is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104161" version="1" comment="php53-tokenizer is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104162" version="1" comment="php53-wddx is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104163" version="1" comment="php53-xmlreader is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104164" version="1" comment="php53-xmlrpc is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104165" version="1" comment="php53-xmlwriter is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104166" version="1" comment="php53-xsl is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104167" version="1" comment="php53-zip is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104168" version="1" comment="php53-zlib is &lt;5.3.8-0.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098585" version="1" comment="apache2-mod_php53 is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112872" version="1" comment="php53 is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098586" version="1" comment="php53-bcmath is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098587" version="1" comment="php53-bz2 is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098588" version="1" comment="php53-calendar is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098589" version="1" comment="php53-ctype is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098590" version="1" comment="php53-curl is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098591" version="1" comment="php53-dba is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098592" version="1" comment="php53-dom is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098593" version="1" comment="php53-exif is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098594" version="1" comment="php53-fastcgi is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098595" version="1" comment="php53-fileinfo is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098596" version="1" comment="php53-ftp is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098597" version="1" comment="php53-gd is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098598" version="1" comment="php53-gettext is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098599" version="1" comment="php53-gmp is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098600" version="1" comment="php53-iconv is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098601" version="1" comment="php53-intl is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098602" version="1" comment="php53-json is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098603" version="1" comment="php53-ldap is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098604" version="1" comment="php53-mbstring is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098605" version="1" comment="php53-mcrypt is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098606" version="1" comment="php53-mysql is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098607" version="1" comment="php53-odbc is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098608" version="1" comment="php53-openssl is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098609" version="1" comment="php53-pcntl is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098610" version="1" comment="php53-pdo is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098611" version="1" comment="php53-pear is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098612" version="1" comment="php53-pgsql is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098613" version="1" comment="php53-pspell is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098614" version="1" comment="php53-shmop is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098615" version="1" comment="php53-snmp is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098616" version="1" comment="php53-soap is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098617" version="1" comment="php53-suhosin is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098618" version="1" comment="php53-sysvmsg is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098619" version="1" comment="php53-sysvsem is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098620" version="1" comment="php53-sysvshm is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098621" version="1" comment="php53-tokenizer is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098622" version="1" comment="php53-wddx is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098623" version="1" comment="php53-xmlreader is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098624" version="1" comment="php53-xmlrpc is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098625" version="1" comment="php53-xmlwriter is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098626" version="1" comment="php53-xsl is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098627" version="1" comment="php53-zip is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098628" version="1" comment="php53-zlib is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098874" version="1" comment="php53-devel is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098875" version="1" comment="php53-imap is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098876" version="1" comment="php53-posix is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098877" version="1" comment="php53-readline is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098878" version="1" comment="php53-sockets is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098879" version="1" comment="php53-sqlite is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098880" version="1" comment="php53-tidy is &lt;5.3.17-0.23.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099566" version="1" comment="glibc is &lt;2.11.3-17.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099553" version="1" comment="glibc-32bit is &lt;2.11.3-17.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099555" version="1" comment="glibc-devel is &lt;2.11.3-17.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099554" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099557" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099561" version="1" comment="glibc-locale is &lt;2.11.3-17.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099559" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099567" version="1" comment="nscd is &lt;2.11.3-17.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099556" version="1" comment="glibc-html is &lt;2.11.3-17.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099558" version="1" comment="glibc-info is &lt;2.11.3-17.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099564" version="1" comment="glibc-profile is &lt;2.11.3-17.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099562" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093050" version="1" comment="flash-player is &lt;11.2.202.335-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093048" version="1" comment="flash-player-gnome is &lt;11.2.202.335-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093049" version="1" comment="flash-player-kde4 is &lt;11.2.202.335-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093636" version="1" comment="flash-player is &lt;11.2.202.341-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093634" version="1" comment="flash-player-gnome is &lt;11.2.202.341-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009093635" version="1" comment="flash-player-kde4 is &lt;11.2.202.341-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098792" version="1" comment="flash-player is &lt;11.2.202.346-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098790" version="1" comment="flash-player-gnome is &lt;11.2.202.346-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098791" version="1" comment="flash-player-kde4 is &lt;11.2.202.346-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098884" version="1" comment="flash-player is &lt;11.2.202.350-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098882" version="1" comment="flash-player-gnome is &lt;11.2.202.350-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098883" version="1" comment="flash-player-kde4 is &lt;11.2.202.350-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098887" version="1" comment="flash-player is &lt;11.2.202.359-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098885" version="1" comment="flash-player-gnome is &lt;11.2.202.359-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098886" version="1" comment="flash-player-kde4 is &lt;11.2.202.359-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098890" version="1" comment="flash-player is &lt;11.2.202.356-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098888" version="1" comment="flash-player-gnome is &lt;11.2.202.356-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098889" version="1" comment="flash-player-kde4 is &lt;11.2.202.356-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098893" version="1" comment="flash-player is &lt;11.2.202.378-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098891" version="1" comment="flash-player-gnome is &lt;11.2.202.378-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098892" version="1" comment="flash-player-kde4 is &lt;11.2.202.378-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098896" version="1" comment="flash-player is &lt;11.2.202.394-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098894" version="1" comment="flash-player-gnome is &lt;11.2.202.394-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098895" version="1" comment="flash-player-kde4 is &lt;11.2.202.394-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099582" version="1" comment="flash-player is &lt;11.2.202.400-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099580" version="1" comment="flash-player-gnome is &lt;11.2.202.400-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099581" version="1" comment="flash-player-kde4 is &lt;11.2.202.400-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100164" version="1" comment="flash-player is &lt;11.2.202.406-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100162" version="1" comment="flash-player-gnome is &lt;11.2.202.406-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100163" version="1" comment="flash-player-kde4 is &lt;11.2.202.406-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101156" version="1" comment="flash-player is &lt;11.2.202.411-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101154" version="1" comment="flash-player-gnome is &lt;11.2.202.411-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101155" version="1" comment="flash-player-kde4 is &lt;11.2.202.411-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102900" version="1" comment="flash-player is &lt;11.2.202.425-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102898" version="1" comment="flash-player-gnome is &lt;11.2.202.425-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102899" version="1" comment="flash-player-kde4 is &lt;11.2.202.425-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107655" version="1" comment="bind is &lt;9.6ESVR11W1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107650" version="1" comment="bind-chrootenv is &lt;9.6ESVR11W1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107651" version="1" comment="bind-doc is &lt;9.6ESVR11W1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107653" version="1" comment="bind-libs is &lt;9.6ESVR11W1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107652" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11W1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107654" version="1" comment="bind-utils is &lt;9.6ESVR11W1-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098911" version="1" comment="ImageMagick is &lt;6.4.3.6-7.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098913" version="1" comment="libMagick++1 is &lt;6.4.3.6-7.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098687" version="1" comment="libMagickCore1 is &lt;6.4.3.6-7.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098686" version="1" comment="libMagickCore1-32bit is &lt;6.4.3.6-7.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098915" version="1" comment="libMagickWand1 is &lt;6.4.3.6-7.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098910" version="1" comment="ImageMagick-devel is &lt;6.4.3.6-7.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098912" version="1" comment="libMagick++-devel is &lt;6.4.3.6-7.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098914" version="1" comment="libMagickWand1-32bit is &lt;6.4.3.6-7.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098916" version="1" comment="perl-PerlMagick is &lt;6.4.3.6-7.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098695" version="1" comment="file is &lt;4.24-43.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098693" version="1" comment="file-32bit is &lt;4.24-43.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098918" version="1" comment="file-devel is &lt;4.24-43.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098919" version="1" comment="python-magic is &lt;4.24-43.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098696" version="1" comment="wireshark is &lt;1.8.13-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098920" version="1" comment="wireshark-devel is &lt;1.8.13-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098699" version="1" comment="libsnmp15 is &lt;5.4.2.1-8.12.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098697" version="1" comment="libsnmp15-32bit is &lt;5.4.2.1-8.12.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098700" version="1" comment="net-snmp is &lt;5.4.2.1-8.12.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098701" version="1" comment="perl-SNMP is &lt;5.4.2.1-8.12.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098702" version="1" comment="snmp-mibs is &lt;5.4.2.1-8.12.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098922" version="1" comment="net-snmp-devel is &lt;5.4.2.1-8.12.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099250" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.65-0.7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099248" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.65-0.7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099249" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.65-0.7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104225" version="1" comment="kernel-default is &lt;3.0.101-0.7.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104223" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104224" version="1" comment="kernel-default-devel is &lt;3.0.101-0.7.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104228" version="1" comment="kernel-ec2 is &lt;3.0.101-0.7.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104226" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.7.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104227" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.7.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104229" version="1" comment="kernel-source is &lt;3.0.101-0.7.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104230" version="1" comment="kernel-syms is &lt;3.0.101-0.7.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104233" version="1" comment="kernel-trace is &lt;3.0.101-0.7.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104231" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104232" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.7.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104236" version="1" comment="kernel-xen is &lt;3.0.101-0.7.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104234" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104235" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.7.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104237" version="1" comment="xen-kmp-default is &lt;4.1.6_06_3.0.101_0.7.21-0.5.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104238" version="1" comment="xen-kmp-trace is &lt;4.1.6_06_3.0.101_0.7.21-0.5.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098749" version="1" comment="dbus-1 is &lt;1.2.10-3.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098746" version="1" comment="dbus-1-32bit is &lt;1.2.10-3.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098747" version="1" comment="dbus-1-x11 is &lt;1.2.10-3.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098940" version="1" comment="dbus-1-devel is &lt;1.2.10-3.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098939" version="1" comment="dbus-1-devel-doc is &lt;1.2.10-3.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099800" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099796" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099802" version="1" comment="openssl is &lt;0.9.8j-0.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104251" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.62.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104248" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.62.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104250" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.62.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104249" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.62.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104253" version="1" comment="openssl is &lt;0.9.8j-0.62.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104252" version="1" comment="openssl-doc is &lt;0.9.8j-0.62.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099798" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099797" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099801" version="1" comment="openssl-doc is &lt;0.9.8j-0.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100674" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100677" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100675" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100679" version="1" comment="openssl1 is &lt;1.0.1g-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100678" version="1" comment="openssl1-doc is &lt;1.0.1g-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099803" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106319" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.75-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106317" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.75-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106318" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.75-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105676" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105675" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105667" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105666" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105668" version="1" comment="openssl is &lt;0.9.8j-0.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105665" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105670" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105669" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105672" version="1" comment="openssl-doc is &lt;0.9.8j-0.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105677" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105680" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105678" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105682" version="1" comment="openssl1 is &lt;1.0.1g-0.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105681" version="1" comment="openssl1-doc is &lt;1.0.1g-0.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105479" version="1" comment="subversion is &lt;1.6.17-1.31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105474" version="1" comment="subversion-devel is &lt;1.6.17-1.31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105475" version="1" comment="subversion-perl is &lt;1.6.17-1.31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105476" version="1" comment="subversion-python is &lt;1.6.17-1.31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105477" version="1" comment="subversion-server is &lt;1.6.17-1.31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105478" version="1" comment="subversion-tools is &lt;1.6.17-1.31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102698" version="1" comment="libpurple-meanwhile is &lt;2.6.6-0.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102699" version="1" comment="libpurple-tcl is &lt;2.6.6-0.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098765" version="1" comment="glibc is &lt;2.11.3-17.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098752" version="1" comment="glibc-32bit is &lt;2.11.3-17.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098754" version="1" comment="glibc-devel is &lt;2.11.3-17.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098753" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098756" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098760" version="1" comment="glibc-locale is &lt;2.11.3-17.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098758" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098766" version="1" comment="nscd is &lt;2.11.3-17.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098755" version="1" comment="glibc-html is &lt;2.11.3-17.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098757" version="1" comment="glibc-info is &lt;2.11.3-17.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098763" version="1" comment="glibc-profile is &lt;2.11.3-17.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009098761" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100595" version="1" comment="apache2-mod_php53 is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112874" version="1" comment="php53 is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100596" version="1" comment="php53-bcmath is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100597" version="1" comment="php53-bz2 is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100598" version="1" comment="php53-calendar is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100599" version="1" comment="php53-ctype is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100600" version="1" comment="php53-curl is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100601" version="1" comment="php53-dba is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100602" version="1" comment="php53-dom is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100603" version="1" comment="php53-exif is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100604" version="1" comment="php53-fastcgi is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100605" version="1" comment="php53-fileinfo is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100606" version="1" comment="php53-ftp is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100607" version="1" comment="php53-gd is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100608" version="1" comment="php53-gettext is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100609" version="1" comment="php53-gmp is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100610" version="1" comment="php53-iconv is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100611" version="1" comment="php53-intl is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100612" version="1" comment="php53-json is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100613" version="1" comment="php53-ldap is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100614" version="1" comment="php53-mbstring is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100615" version="1" comment="php53-mcrypt is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100616" version="1" comment="php53-mysql is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100617" version="1" comment="php53-odbc is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100618" version="1" comment="php53-openssl is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100619" version="1" comment="php53-pcntl is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100620" version="1" comment="php53-pdo is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100621" version="1" comment="php53-pear is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100622" version="1" comment="php53-pgsql is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100623" version="1" comment="php53-pspell is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100624" version="1" comment="php53-shmop is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100625" version="1" comment="php53-snmp is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100626" version="1" comment="php53-soap is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100627" version="1" comment="php53-suhosin is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100628" version="1" comment="php53-sysvmsg is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100629" version="1" comment="php53-sysvsem is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100630" version="1" comment="php53-sysvshm is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100631" version="1" comment="php53-tokenizer is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100632" version="1" comment="php53-wddx is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100633" version="1" comment="php53-xmlreader is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100634" version="1" comment="php53-xmlrpc is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100635" version="1" comment="php53-xmlwriter is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100636" version="1" comment="php53-xsl is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100637" version="1" comment="php53-zip is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100638" version="1" comment="php53-zlib is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100640" version="1" comment="php53-devel is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100641" version="1" comment="php53-imap is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100642" version="1" comment="php53-posix is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100643" version="1" comment="php53-readline is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100644" version="1" comment="php53-sockets is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100645" version="1" comment="php53-sqlite is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100646" version="1" comment="php53-tidy is &lt;5.3.17-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099586" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr7.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099583" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr7.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099584" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr7.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099585" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr7.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099587" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr7.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099849" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099846" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099847" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099848" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099850" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.1-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099395" version="1" comment="krb5 is &lt;1.6.3-133.49.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099386" version="1" comment="krb5-32bit is &lt;1.6.3-133.49.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099389" version="1" comment="krb5-client is &lt;1.6.3-133.49.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099387" version="1" comment="krb5-apps-clients is &lt;1.6.3-133.49.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099388" version="1" comment="krb5-apps-servers is &lt;1.6.3-133.49.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099390" version="1" comment="krb5-doc is &lt;1.6.3-133.49.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099391" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.6.3-133.49.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099392" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.6.3-133.49.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099393" version="1" comment="krb5-server is &lt;1.6.3-133.49.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099397" version="1" comment="krb5-devel is &lt;1.6.3-133.49.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009099396" version="1" comment="krb5-devel-32bit is &lt;1.6.3-133.49.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100726" version="1" comment="bash is &lt;3.2-147.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100724" version="1" comment="bash-doc is &lt;3.2-147.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100729" version="1" comment="libreadline5 is &lt;5.2-147.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100727" version="1" comment="libreadline5-32bit is &lt;5.2-147.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100730" version="1" comment="readline-doc is &lt;5.2-147.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104255" version="1" comment="bash is &lt;3.2-147.14.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104254" version="1" comment="bash-doc is &lt;3.2-147.14.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104257" version="1" comment="libreadline5 is &lt;5.2-147.14.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104256" version="1" comment="libreadline5-32bit is &lt;5.2-147.14.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104258" version="1" comment="readline-doc is &lt;5.2-147.14.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100733" version="1" comment="readline-devel is &lt;5.2-147.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100732" version="1" comment="readline-devel-32bit is &lt;5.2-147.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100812" version="1" comment="wireshark is &lt;1.10.10-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009100814" version="1" comment="wireshark-devel is &lt;1.10.10-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110806" version="1" comment="kernel-default is &lt;3.0.101-0.47.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110804" version="1" comment="kernel-default-base is &lt;3.0.101-0.47.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110805" version="1" comment="kernel-default-devel is &lt;3.0.101-0.47.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110816" version="1" comment="kernel-default-extra is &lt;3.0.101-0.47.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110807" version="1" comment="kernel-source is &lt;3.0.101-0.47.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110808" version="1" comment="kernel-syms is &lt;3.0.101-0.47.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110810" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.47.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110824" version="1" comment="kernel-xen is &lt;3.0.101-0.47.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110821" version="1" comment="kernel-xen-base is &lt;3.0.101-0.47.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110822" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.47.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110823" version="1" comment="kernel-xen-extra is &lt;3.0.101-0.47.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110825" version="1" comment="xen-kmp-default is &lt;4.2.5_08_3.0.101_0.47.55-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117336" version="1" comment="cluster-network-kmp-default is &lt;1.4_3.0.101_0.47.55-2.28.1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132805" version="1" comment="cluster-network-kmp-ppc64 is &lt;1.4_3.0.101_0.47.55-2.28.1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117337" version="1" comment="cluster-network-kmp-trace is &lt;1.4_3.0.101_0.47.55-2.28.1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117339" version="1" comment="gfs2-kmp-default is &lt;2_3.0.101_0.47.55-0.17.1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132806" version="1" comment="gfs2-kmp-ppc64 is &lt;2_3.0.101_0.47.55-0.17.1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117340" version="1" comment="gfs2-kmp-trace is &lt;2_3.0.101_0.47.55-0.17.1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117342" version="1" comment="ocfs2-kmp-default is &lt;1.6_3.0.101_0.47.55-0.21.1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132807" version="1" comment="ocfs2-kmp-ppc64 is &lt;1.6_3.0.101_0.47.55-0.21.1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117343" version="1" comment="ocfs2-kmp-trace is &lt;1.6_3.0.101_0.47.55-0.21.1.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117345" version="1" comment="cluster-network-kmp-rt is &lt;1.4_3.0.101_rt130_0.33.38-2.28.1.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117346" version="1" comment="cluster-network-kmp-rt_trace is &lt;1.4_3.0.101_rt130_0.33.38-2.28.1.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117347" version="1" comment="drbd-kmp-rt is &lt;8.4.4_3.0.101_rt130_0.33.38-0.23.1.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117348" version="1" comment="drbd-kmp-rt_trace is &lt;8.4.4_3.0.101_rt130_0.33.38-0.23.1.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117349" version="1" comment="iscsitarget-kmp-rt is &lt;1.4.20_3.0.101_rt130_0.33.38-0.39.1.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117350" version="1" comment="iscsitarget-kmp-rt_trace is &lt;1.4.20_3.0.101_rt130_0.33.38-0.39.1.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117351" version="1" comment="kernel-rt is &lt;3.0.101.rt130-0.33.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117352" version="1" comment="kernel-rt-base is &lt;3.0.101.rt130-0.33.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117353" version="1" comment="kernel-rt-devel is &lt;3.0.101.rt130-0.33.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117354" version="1" comment="kernel-rt_trace is &lt;3.0.101.rt130-0.33.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117355" version="1" comment="kernel-rt_trace-base is &lt;3.0.101.rt130-0.33.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117356" version="1" comment="kernel-rt_trace-devel is &lt;3.0.101.rt130-0.33.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117357" version="1" comment="kernel-source-rt is &lt;3.0.101.rt130-0.33.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117358" version="1" comment="kernel-syms-rt is &lt;3.0.101.rt130-0.33.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117359" version="1" comment="lttng-modules-kmp-rt is &lt;2.1.1_3.0.101_rt130_0.33.38-0.12.1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117360" version="1" comment="lttng-modules-kmp-rt_trace is &lt;2.1.1_3.0.101_rt130_0.33.38-0.12.1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117361" version="1" comment="ocfs2-kmp-rt is &lt;1.6_3.0.101_rt130_0.33.38-0.21.1.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117362" version="1" comment="ocfs2-kmp-rt_trace is &lt;1.6_3.0.101_rt130_0.33.38-0.21.1.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117363" version="1" comment="ofed-kmp-rt is &lt;1.5.4.1_3.0.101_rt130_0.33.38-0.14.1.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117364" version="1" comment="ofed-kmp-rt_trace is &lt;1.5.4.1_3.0.101_rt130_0.33.38-0.14.1.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110829" version="1" comment="kernel-ec2 is &lt;3.0.101-0.47.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110827" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.47.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110828" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.47.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110811" version="1" comment="kernel-trace is &lt;3.0.101-0.47.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110809" version="1" comment="kernel-trace-base is &lt;3.0.101-0.47.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105126" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105128" version="1" comment="xorg-x11-server is &lt;7.4-27.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105127" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105125" version="1" comment="xorg-x11-server-sdk is &lt;7.4-27.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104266" version="1" comment="kernel-default is &lt;2.6.32.59-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104264" version="1" comment="kernel-default-base is &lt;2.6.32.59-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104265" version="1" comment="kernel-default-devel is &lt;2.6.32.59-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104269" version="1" comment="kernel-ec2 is &lt;2.6.32.59-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104267" version="1" comment="kernel-ec2-base is &lt;2.6.32.59-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104268" version="1" comment="kernel-ec2-devel is &lt;2.6.32.59-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104270" version="1" comment="kernel-source is &lt;2.6.32.59-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104271" version="1" comment="kernel-syms is &lt;2.6.32.59-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104274" version="1" comment="kernel-trace is &lt;2.6.32.59-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104272" version="1" comment="kernel-trace-base is &lt;2.6.32.59-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104273" version="1" comment="kernel-trace-devel is &lt;2.6.32.59-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104277" version="1" comment="kernel-xen is &lt;2.6.32.59-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104275" version="1" comment="kernel-xen-base is &lt;2.6.32.59-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104276" version="1" comment="kernel-xen-devel is &lt;2.6.32.59-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104278" version="1" comment="xen-kmp-default is &lt;4.0.3_21548_18_2.6.32.59_0.17-0.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104279" version="1" comment="xen-kmp-trace is &lt;4.0.3_21548_18_2.6.32.59_0.17-0.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104282" version="1" comment="kernel-default is &lt;3.0.101-0.7.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104280" version="1" comment="kernel-default-base is &lt;3.0.101-0.7.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104281" version="1" comment="kernel-default-devel is &lt;3.0.101-0.7.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104285" version="1" comment="kernel-ec2 is &lt;3.0.101-0.7.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104283" version="1" comment="kernel-ec2-base is &lt;3.0.101-0.7.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104284" version="1" comment="kernel-ec2-devel is &lt;3.0.101-0.7.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104286" version="1" comment="kernel-source is &lt;3.0.101-0.7.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104287" version="1" comment="kernel-syms is &lt;3.0.101-0.7.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104290" version="1" comment="kernel-trace is &lt;3.0.101-0.7.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104288" version="1" comment="kernel-trace-base is &lt;3.0.101-0.7.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104289" version="1" comment="kernel-trace-devel is &lt;3.0.101-0.7.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104293" version="1" comment="kernel-xen is &lt;3.0.101-0.7.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104291" version="1" comment="kernel-xen-base is &lt;3.0.101-0.7.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104292" version="1" comment="kernel-xen-devel is &lt;3.0.101-0.7.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104294" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.27-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104295" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.27-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105170" version="1" comment="unzip is &lt;6.00-11.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106537" version="1" comment="apache2-mod_php53 is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112866" version="1" comment="php53 is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106538" version="1" comment="php53-bcmath is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106539" version="1" comment="php53-bz2 is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106540" version="1" comment="php53-calendar is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106541" version="1" comment="php53-ctype is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106542" version="1" comment="php53-curl is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106543" version="1" comment="php53-dba is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106544" version="1" comment="php53-dom is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106545" version="1" comment="php53-exif is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106546" version="1" comment="php53-fastcgi is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106547" version="1" comment="php53-fileinfo is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106548" version="1" comment="php53-ftp is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106549" version="1" comment="php53-gd is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106550" version="1" comment="php53-gettext is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106551" version="1" comment="php53-gmp is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106552" version="1" comment="php53-iconv is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106553" version="1" comment="php53-intl is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106554" version="1" comment="php53-json is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106555" version="1" comment="php53-ldap is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106556" version="1" comment="php53-mbstring is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106557" version="1" comment="php53-mcrypt is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106558" version="1" comment="php53-mysql is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106559" version="1" comment="php53-odbc is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106560" version="1" comment="php53-openssl is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106561" version="1" comment="php53-pcntl is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106562" version="1" comment="php53-pdo is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106563" version="1" comment="php53-pear is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106564" version="1" comment="php53-pgsql is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106565" version="1" comment="php53-pspell is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106566" version="1" comment="php53-shmop is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106567" version="1" comment="php53-snmp is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106568" version="1" comment="php53-soap is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106569" version="1" comment="php53-suhosin is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106570" version="1" comment="php53-sysvmsg is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106571" version="1" comment="php53-sysvsem is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106572" version="1" comment="php53-sysvshm is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106573" version="1" comment="php53-tokenizer is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106574" version="1" comment="php53-wddx is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106575" version="1" comment="php53-xmlreader is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106576" version="1" comment="php53-xmlrpc is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106577" version="1" comment="php53-xmlwriter is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106578" version="1" comment="php53-xsl is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106579" version="1" comment="php53-zip is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106580" version="1" comment="php53-zlib is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106530" version="1" comment="php53-devel is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106531" version="1" comment="php53-imap is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106532" version="1" comment="php53-posix is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106533" version="1" comment="php53-readline is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106534" version="1" comment="php53-sockets is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106535" version="1" comment="php53-sqlite is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106536" version="1" comment="php53-tidy is &lt;5.3.17-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110855" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110858" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110856" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110860" version="1" comment="openssl1 is &lt;1.0.1g-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110859" version="1" comment="openssl1-doc is &lt;1.0.1g-0.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102442" version="1" comment="flash-player is &lt;11.2.202.424-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102440" version="1" comment="flash-player-gnome is &lt;11.2.202.424-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102441" version="1" comment="flash-player-kde4 is &lt;11.2.202.424-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103743" version="1" comment="bind-libs is &lt;9.9.6P1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103742" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103744" version="1" comment="bind-utils is &lt;9.9.6P1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103748" version="1" comment="bind is &lt;9.9.6P1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103745" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103746" version="1" comment="bind-doc is &lt;9.9.6P1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103741" version="1" comment="bind-devel is &lt;9.9.6P1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103199" version="1" comment="tcpdump is &lt;3.9.8-1.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106877" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.3-0.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106874" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.3-0.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106875" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.3-0.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106876" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.3-0.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106873" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.3-0.4.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106305" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr8.10-0.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106299" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr8.10-0.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106300" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr8.10-0.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106302" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr8.10-0.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106304" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr8.10-0.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106327" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.3-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106326" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.3-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106329" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.3-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106330" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.3-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106324" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr8.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106321" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr8.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106322" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr8.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106323" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr8.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106325" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.3-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106320" version="1" comment="java-1_7_0-ibm-devel is &lt;1.7.0_sr8.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103121" version="1" comment="ntp is &lt;4.2.4p8-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103120" version="1" comment="ntp-doc is &lt;4.2.4p8-1.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108083" version="1" comment="cups is &lt;1.3.9-8.46.54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108080" version="1" comment="cups-client is &lt;1.3.9-8.46.54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108082" version="1" comment="cups-libs is &lt;1.3.9-8.46.54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108081" version="1" comment="cups-libs-32bit is &lt;1.3.9-8.46.54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108079" version="1" comment="cups-devel is &lt;1.3.9-8.46.54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110595" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110592" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110593" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110594" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110596" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.4-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110668" version="1" comment="java-1_7_0-ibm is &lt;1.7.0_sr9.0-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110664" version="1" comment="java-1_7_0-ibm-alsa is &lt;1.7.0_sr9.0-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110666" version="1" comment="java-1_7_0-ibm-jdbc is &lt;1.7.0_sr9.0-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110667" version="1" comment="java-1_7_0-ibm-plugin is &lt;1.7.0_sr9.0-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107939" version="1" comment="libopenssl1-devel is &lt;1.0.1g-0.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107942" version="1" comment="libopenssl1_0_0 is &lt;1.0.1g-0.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107940" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1g-0.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107944" version="1" comment="openssl1 is &lt;1.0.1g-0.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107943" version="1" comment="openssl1-doc is &lt;1.0.1g-0.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105518" version="1" comment="glibc is &lt;2.11.3-17.74.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105512" version="1" comment="glibc-32bit is &lt;2.11.3-17.74.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105514" version="1" comment="glibc-devel is &lt;2.11.3-17.74.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105513" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.74.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105515" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.74.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105517" version="1" comment="glibc-locale is &lt;2.11.3-17.74.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105516" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.74.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105519" version="1" comment="nscd is &lt;2.11.3-17.74.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105547" version="1" comment="glibc is &lt;2.11.1-0.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105537" version="1" comment="glibc-32bit is &lt;2.11.1-0.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105539" version="1" comment="glibc-devel is &lt;2.11.1-0.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105538" version="1" comment="glibc-devel-32bit is &lt;2.11.1-0.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105540" version="1" comment="glibc-html is &lt;2.11.1-0.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105541" version="1" comment="glibc-i18ndata is &lt;2.11.1-0.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105542" version="1" comment="glibc-info is &lt;2.11.1-0.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105544" version="1" comment="glibc-locale is &lt;2.11.1-0.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105543" version="1" comment="glibc-locale-32bit is &lt;2.11.1-0.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105546" version="1" comment="glibc-profile is &lt;2.11.1-0.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105545" version="1" comment="glibc-profile-32bit is &lt;2.11.1-0.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105548" version="1" comment="nscd is &lt;2.11.1-0.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105508" version="1" comment="glibc is &lt;2.11.3-17.45.55.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105498" version="1" comment="glibc-32bit is &lt;2.11.3-17.45.55.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105500" version="1" comment="glibc-devel is &lt;2.11.3-17.45.55.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105499" version="1" comment="glibc-devel-32bit is &lt;2.11.3-17.45.55.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105501" version="1" comment="glibc-html is &lt;2.11.3-17.45.55.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105502" version="1" comment="glibc-i18ndata is &lt;2.11.3-17.45.55.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105503" version="1" comment="glibc-info is &lt;2.11.3-17.45.55.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105505" version="1" comment="glibc-locale is &lt;2.11.3-17.45.55.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105504" version="1" comment="glibc-locale-32bit is &lt;2.11.3-17.45.55.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105507" version="1" comment="glibc-profile is &lt;2.11.3-17.45.55.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105506" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.45.55.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105509" version="1" comment="nscd is &lt;2.11.3-17.45.55.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105510" version="1" comment="glibc-html is &lt;2.11.3-17.74.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105511" version="1" comment="glibc-info is &lt;2.11.3-17.74.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105523" version="1" comment="glibc-profile is &lt;2.11.3-17.74.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105521" version="1" comment="glibc-profile-32bit is &lt;2.11.3-17.74.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106850" version="1" comment="ldapsmb is &lt;1.34b-12.33.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106851" version="1" comment="libldb1 is &lt;3.6.3-0.33.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106853" version="1" comment="libsmbclient0 is &lt;3.6.3-0.33.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106852" version="1" comment="libsmbclient0-32bit is &lt;3.6.3-0.33.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106855" version="1" comment="libtalloc1 is &lt;3.4.3-1.54.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106854" version="1" comment="libtalloc1-32bit is &lt;3.4.3-1.54.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106857" version="1" comment="libtalloc2 is &lt;3.6.3-0.33.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106856" version="1" comment="libtalloc2-32bit is &lt;3.6.3-0.33.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106859" version="1" comment="libtdb1 is &lt;3.6.3-0.33.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106858" version="1" comment="libtdb1-32bit is &lt;3.6.3-0.33.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106861" version="1" comment="libtevent0 is &lt;3.6.3-0.33.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106860" version="1" comment="libtevent0-32bit is &lt;3.6.3-0.33.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106863" version="1" comment="libwbclient0 is &lt;3.6.3-0.33.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106862" version="1" comment="libwbclient0-32bit is &lt;3.6.3-0.33.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106871" version="1" comment="samba is &lt;3.6.3-0.33.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106864" version="1" comment="samba-32bit is &lt;3.6.3-0.33.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106866" version="1" comment="samba-client is &lt;3.6.3-0.33.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106865" version="1" comment="samba-client-32bit is &lt;3.6.3-0.33.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106867" version="1" comment="samba-doc is &lt;3.6.3-0.33.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106868" version="1" comment="samba-krb-printing is &lt;3.6.3-0.33.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106870" version="1" comment="samba-winbind is &lt;3.6.3-0.33.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106869" version="1" comment="samba-winbind-32bit is &lt;3.6.3-0.33.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107005" version="1" comment="xorg-x11-Xvnc is &lt;7.4-27.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107007" version="1" comment="xorg-x11-server is &lt;7.4-27.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107006" version="1" comment="xorg-x11-server-extra is &lt;7.4-27.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107004" version="1" comment="xorg-x11-server-sdk is &lt;7.4-27.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107953" version="1" comment="compat-openssl097g is &lt;0.9.7g-146.22.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107952" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-146.22.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105131" version="1" comment="flash-player is &lt;11.2.202.429-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105129" version="1" comment="flash-player-gnome is &lt;11.2.202.429-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105130" version="1" comment="flash-player-kde4 is &lt;11.2.202.429-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105307" version="1" comment="flash-player is &lt;11.2.202.438-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105305" version="1" comment="flash-player-gnome is &lt;11.2.202.438-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105306" version="1" comment="flash-player-kde4 is &lt;11.2.202.438-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105663" version="1" comment="flash-player is &lt;11.2.202.440-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105661" version="1" comment="flash-player-gnome is &lt;11.2.202.440-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105662" version="1" comment="flash-player-kde4 is &lt;11.2.202.440-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105930" version="1" comment="flash-player is &lt;11.2.202.442-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105928" version="1" comment="flash-player-gnome is &lt;11.2.202.442-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105929" version="1" comment="flash-player-kde4 is &lt;11.2.202.442-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107676" version="1" comment="flash-player is &lt;11.2.202.451-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107674" version="1" comment="flash-player-gnome is &lt;11.2.202.451-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107675" version="1" comment="flash-player-kde4 is &lt;11.2.202.451-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108882" version="1" comment="flash-player is &lt;11.2.202.457-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108880" version="1" comment="flash-player-gnome is &lt;11.2.202.457-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108881" version="1" comment="flash-player-kde4 is &lt;11.2.202.457-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109221" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.75-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109219" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.75-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109220" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.75-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107009" version="1" comment="wireshark is &lt;1.10.12-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107008" version="1" comment="wireshark-devel is &lt;1.10.12-0.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107558" version="1" comment="MozillaFirefox is &lt;31.5.0esr-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107557" version="1" comment="MozillaFirefox-translations is &lt;31.5.0esr-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107220" version="1" comment="MozillaFirefox is &lt;31.5.0esr-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107219" version="1" comment="MozillaFirefox-translations is &lt;31.5.0esr-0.4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107556" version="1" comment="MozillaFirefox-devel is &lt;31.5.0esr-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111035" version="1" comment="bind-libs is &lt;9.9.6P1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111034" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111036" version="1" comment="bind-utils is &lt;9.9.6P1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111040" version="1" comment="bind is &lt;9.9.6P1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111037" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111038" version="1" comment="bind-doc is &lt;9.9.6P1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111033" version="1" comment="bind-devel is &lt;9.9.6P1-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109606" version="1" comment="kvm is &lt;1.4.2-0.22.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110865" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110862" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110867" version="1" comment="openssl is &lt;0.9.8j-0.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110864" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110863" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110866" version="1" comment="openssl-doc is &lt;0.9.8j-0.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110831" version="1" comment="ntp is &lt;4.2.4p8-1.29.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110830" version="1" comment="ntp-doc is &lt;4.2.4p8-1.29.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109613" version="1" comment="flash-player is &lt;11.2.202.460-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109611" version="1" comment="flash-player-gnome is &lt;11.2.202.460-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109612" version="1" comment="flash-player-kde4 is &lt;11.2.202.460-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110497" version="1" comment="flash-player is &lt;11.2.202.466-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110495" version="1" comment="flash-player-gnome is &lt;11.2.202.466-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110496" version="1" comment="flash-player-kde4 is &lt;11.2.202.466-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110681" version="1" comment="flash-player is &lt;11.2.202.468-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110679" version="1" comment="flash-player-gnome is &lt;11.2.202.468-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110680" version="1" comment="flash-player-kde4 is &lt;11.2.202.468-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112906" version="1" comment="kvm is &lt;1.4.2-0.22.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045470"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109877" version="1" comment="xen is &lt;4.1.6_08-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109868" version="1" comment="xen-doc-html is &lt;4.1.6_08-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109869" version="1" comment="xen-doc-pdf is &lt;4.1.6_08-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109870" version="1" comment="xen-kmp-default is &lt;4.1.6_08_3.0.101_0.7.29-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109871" version="1" comment="xen-kmp-pae is &lt;4.1.6_08_3.0.101_0.7.29-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109872" version="1" comment="xen-kmp-trace is &lt;4.1.6_08_3.0.101_0.7.29-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109874" version="1" comment="xen-libs is &lt;4.1.6_08-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109873" version="1" comment="xen-libs-32bit is &lt;4.1.6_08-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109876" version="1" comment="xen-tools is &lt;4.1.6_08-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109875" version="1" comment="xen-tools-domU is &lt;4.1.6_08-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111232" version="1" comment="apache2-mod_php53 is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009112869" version="1" comment="php53 is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111233" version="1" comment="php53-bcmath is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111234" version="1" comment="php53-bz2 is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111235" version="1" comment="php53-calendar is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111236" version="1" comment="php53-ctype is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111237" version="1" comment="php53-curl is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111238" version="1" comment="php53-dba is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111239" version="1" comment="php53-dom is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111240" version="1" comment="php53-exif is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111241" version="1" comment="php53-fastcgi is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111242" version="1" comment="php53-fileinfo is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111243" version="1" comment="php53-ftp is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111244" version="1" comment="php53-gd is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111245" version="1" comment="php53-gettext is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111246" version="1" comment="php53-gmp is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111247" version="1" comment="php53-iconv is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111248" version="1" comment="php53-intl is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111249" version="1" comment="php53-json is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111250" version="1" comment="php53-ldap is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111251" version="1" comment="php53-mbstring is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111252" version="1" comment="php53-mcrypt is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111253" version="1" comment="php53-mysql is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111254" version="1" comment="php53-odbc is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111255" version="1" comment="php53-openssl is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111256" version="1" comment="php53-pcntl is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111257" version="1" comment="php53-pdo is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111258" version="1" comment="php53-pear is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111259" version="1" comment="php53-pgsql is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111260" version="1" comment="php53-pspell is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111261" version="1" comment="php53-shmop is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111262" version="1" comment="php53-snmp is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111263" version="1" comment="php53-soap is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111264" version="1" comment="php53-suhosin is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111265" version="1" comment="php53-sysvmsg is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111266" version="1" comment="php53-sysvsem is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111267" version="1" comment="php53-sysvshm is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111268" version="1" comment="php53-tokenizer is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111269" version="1" comment="php53-wddx is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111270" version="1" comment="php53-xmlreader is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111271" version="1" comment="php53-xmlrpc is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111272" version="1" comment="php53-xmlwriter is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111273" version="1" comment="php53-xsl is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111274" version="1" comment="php53-zip is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111275" version="1" comment="php53-zlib is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111225" version="1" comment="php53-devel is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111226" version="1" comment="php53-imap is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111227" version="1" comment="php53-posix is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111228" version="1" comment="php53-readline is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111229" version="1" comment="php53-sockets is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111230" version="1" comment="php53-sqlite is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111231" version="1" comment="php53-tidy is &lt;5.3.17-0.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109635" version="1" comment="kvm is &lt;1.4.2-0.22.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109905" version="1" comment="kvm is &lt;0.15.1-0.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110628" version="1" comment="wireshark is &lt;1.10.14-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110627" version="1" comment="wireshark-devel is &lt;1.10.14-0.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110837" version="1" comment="libmysql55client18 is &lt;5.5.43-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110836" version="1" comment="libmysql55client18-32bit is &lt;5.5.43-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110838" version="1" comment="libmysql55client_r18 is &lt;5.5.43-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110832" version="1" comment="libmysql55client_r18-32bit is &lt;5.5.43-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110840" version="1" comment="libmysqlclient15 is &lt;5.0.96-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110839" version="1" comment="libmysqlclient15-32bit is &lt;5.0.96-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110841" version="1" comment="libmysqlclient_r15 is &lt;5.0.96-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110834" version="1" comment="libmysqlclient_r15-32bit is &lt;5.0.96-0.8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045179"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110843" version="1" comment="mysql is &lt;5.5.43-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110842" version="1" comment="mysql-client is &lt;5.5.43-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110846" version="1" comment="mysql-tools is &lt;5.5.43-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111126" version="1" comment="strongswan is &lt;4.4.0-6.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111125" version="1" comment="strongswan-doc is &lt;4.4.0-6.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118193" version="1" comment="suse-cloud-release is ==5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128657" version="1" comment="bind is &lt;9.9.6P1-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128658" version="1" comment="bind-chrootenv is &lt;9.9.6P1-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128659" version="1" comment="bind-doc is &lt;9.9.6P1-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128660" version="1" comment="bind-libs is &lt;9.9.6P1-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128661" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128662" version="1" comment="bind-utils is &lt;9.9.6P1-0.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136713" version="1" comment="crowbar-barclamp-trove is &lt;1.9+git.1473844105.932298f-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118194" version="1" comment="haproxy is &lt;1.5.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118195" version="1" comment="haproxy is &lt;1.5.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118196" version="1" comment="mongodb is &lt;2.4.3-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118197" version="1" comment="crowbar-barclamp-neutron is &lt;1.9+git.1443859419.95e948a-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118198" version="1" comment="openstack-neutron is &lt;2014.2.4~a0~dev103-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118199" version="1" comment="openstack-neutron-dhcp-agent is &lt;2014.2.4~a0~dev103-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118200" version="1" comment="openstack-neutron-doc is &lt;2014.2.4~a0~dev103-16.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118201" version="1" comment="openstack-neutron-ha-tool is &lt;2014.2.4~a0~dev103-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118202" version="1" comment="openstack-neutron-ibm-agent is &lt;2014.2.4~a0~dev103-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118203" version="1" comment="openstack-neutron-l3-agent is &lt;2014.2.4~a0~dev103-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118204" version="1" comment="openstack-neutron-lbaas-agent is &lt;2014.2.4~a0~dev103-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118205" version="1" comment="openstack-neutron-linuxbridge-agent is &lt;2014.2.4~a0~dev103-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118206" version="1" comment="openstack-neutron-metadata-agent is &lt;2014.2.4~a0~dev103-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118207" version="1" comment="openstack-neutron-metering-agent is &lt;2014.2.4~a0~dev103-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118208" version="1" comment="openstack-neutron-mlnx-agent is &lt;2014.2.4~a0~dev103-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118209" version="1" comment="openstack-neutron-nec-agent is &lt;2014.2.4~a0~dev103-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118210" version="1" comment="openstack-neutron-nvsd-agent is &lt;2014.2.4~a0~dev103-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118211" version="1" comment="openstack-neutron-openvswitch-agent is &lt;2014.2.4~a0~dev103-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118212" version="1" comment="openstack-neutron-plugin-cisco is &lt;2014.2.4~a0~dev103-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118213" version="1" comment="openstack-neutron-restproxy-agent is &lt;2014.2.4~a0~dev103-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118214" version="1" comment="openstack-neutron-ryu-agent is &lt;2014.2.4~a0~dev103-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118215" version="1" comment="openstack-neutron-server is &lt;2014.2.4~a0~dev103-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118216" version="1" comment="openstack-neutron-vpn-agent is &lt;2014.2.4~a0~dev103-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118217" version="1" comment="python-neutron is &lt;2014.2.4~a0~dev103-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118218" version="1" comment="novnc is &lt;0.4-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126236" version="1" comment="libopenssl-devel is &lt;0.9.8j-0.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126237" version="1" comment="libopenssl0_9_8 is &lt;0.9.8j-0.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126238" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8j-0.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126239" version="1" comment="libopenssl0_9_8-hmac is &lt;0.9.8j-0.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126240" version="1" comment="libopenssl0_9_8-hmac-32bit is &lt;0.9.8j-0.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126241" version="1" comment="openssl is &lt;0.9.8j-0.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126242" version="1" comment="openssl-doc is &lt;0.9.8j-0.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118219" version="1" comment="openstack-ceilometer is &lt;2014.2.4.dev18-9.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118220" version="1" comment="openstack-ceilometer-agent-central is &lt;2014.2.4.dev18-9.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118221" version="1" comment="openstack-ceilometer-agent-compute is &lt;2014.2.4.dev18-9.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118222" version="1" comment="openstack-ceilometer-agent-ipmi is &lt;2014.2.4.dev18-9.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118223" version="1" comment="openstack-ceilometer-agent-notification is &lt;2014.2.4.dev18-9.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118224" version="1" comment="openstack-ceilometer-alarm-evaluator is &lt;2014.2.4.dev18-9.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118225" version="1" comment="openstack-ceilometer-alarm-notifier is &lt;2014.2.4.dev18-9.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118226" version="1" comment="openstack-ceilometer-api is &lt;2014.2.4.dev18-9.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118227" version="1" comment="openstack-ceilometer-collector is &lt;2014.2.4.dev18-9.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118228" version="1" comment="openstack-ceilometer-doc is &lt;2014.2.4.dev18-9.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118229" version="1" comment="openstack-cinder is &lt;2014.2.4.dev19-9.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118230" version="1" comment="openstack-cinder-api is &lt;2014.2.4.dev19-9.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118231" version="1" comment="openstack-cinder-backup is &lt;2014.2.4.dev19-9.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118232" version="1" comment="openstack-cinder-doc is &lt;2014.2.4.dev19-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118233" version="1" comment="openstack-cinder-scheduler is &lt;2014.2.4.dev19-9.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118234" version="1" comment="openstack-cinder-volume is &lt;2014.2.4.dev19-9.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118235" version="1" comment="openstack-glance is &lt;2014.2.4.dev5-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118236" version="1" comment="openstack-glance-doc is &lt;2014.2.4.dev5-9.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118237" version="1" comment="openstack-heat is &lt;2014.2.4.dev13-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118238" version="1" comment="openstack-heat-api is &lt;2014.2.4.dev13-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118239" version="1" comment="openstack-heat-api-cfn is &lt;2014.2.4.dev13-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118240" version="1" comment="openstack-heat-api-cloudwatch is &lt;2014.2.4.dev13-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118241" version="1" comment="openstack-heat-doc is &lt;2014.2.4.dev13-9.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118242" version="1" comment="openstack-heat-engine is &lt;2014.2.4.dev13-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118243" version="1" comment="openstack-keystone is &lt;2014.2.4.dev5-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118244" version="1" comment="openstack-keystone-doc is &lt;2014.2.4.dev5-11.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118245" version="1" comment="openstack-sahara is &lt;2014.2.4.dev3-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118246" version="1" comment="openstack-sahara-api is &lt;2014.2.4.dev3-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118247" version="1" comment="openstack-sahara-doc is &lt;2014.2.4.dev3-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118248" version="1" comment="openstack-sahara-engine is &lt;2014.2.4.dev3-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118249" version="1" comment="openstack-suse is &lt;2014.2-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118250" version="1" comment="openstack-suse-sudo is &lt;2014.2-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118251" version="1" comment="python-ceilometer is &lt;2014.2.4.dev18-9.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118252" version="1" comment="python-cinder is &lt;2014.2.4.dev19-9.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118253" version="1" comment="python-glance is &lt;2014.2.4.dev5-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118254" version="1" comment="python-heat is &lt;2014.2.4.dev13-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118255" version="1" comment="python-keystone is &lt;2014.2.4.dev5-11.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118256" version="1" comment="python-oslo.i18n is &lt;1.3.1-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118257" version="1" comment="python-oslo.utils is &lt;1.4.0-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118258" version="1" comment="python-oslotest is &lt;1.2.0-2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118259" version="1" comment="python-sahara is &lt;2014.2.4.dev3-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118260" version="1" comment="python-six is &lt;1.9.0-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118261" version="1" comment="crowbar-barclamp-nova_dashboard is &lt;1.9+git.1443622531.b2b2939-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118262" version="1" comment="openstack-dashboard is &lt;2014.2.4~a0~dev12-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118263" version="1" comment="python-django_openstack_auth is &lt;1.1.7-11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118264" version="1" comment="python-horizon is &lt;2014.2.4~a0~dev12-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119003" version="1" comment="openstack-glance is &lt;2014.2.4.juno-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119004" version="1" comment="openstack-glance-doc is &lt;2014.2.4.juno-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119005" version="1" comment="python-glance is &lt;2014.2.4.juno-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132808" version="1" comment="openstack-keystone is &lt;2014.2.4.juno-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132809" version="1" comment="openstack-keystone-doc is &lt;2014.2.4.juno-17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132810" version="1" comment="openstack-nova is &lt;2014.2.4.juno-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132811" version="1" comment="openstack-nova-api is &lt;2014.2.4.juno-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132812" version="1" comment="openstack-nova-cells is &lt;2014.2.4.juno-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132813" version="1" comment="openstack-nova-cert is &lt;2014.2.4.juno-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132814" version="1" comment="openstack-nova-compute is &lt;2014.2.4.juno-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132815" version="1" comment="openstack-nova-conductor is &lt;2014.2.4.juno-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132816" version="1" comment="openstack-nova-console is &lt;2014.2.4.juno-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132817" version="1" comment="openstack-nova-consoleauth is &lt;2014.2.4.juno-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132818" version="1" comment="openstack-nova-doc is &lt;2014.2.4.juno-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132819" version="1" comment="openstack-nova-novncproxy is &lt;2014.2.4.juno-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132820" version="1" comment="openstack-nova-objectstore is &lt;2014.2.4.juno-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132821" version="1" comment="openstack-nova-scheduler is &lt;2014.2.4.juno-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132822" version="1" comment="openstack-nova-serialproxy is &lt;2014.2.4.juno-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132823" version="1" comment="openstack-nova-vncproxy is &lt;2014.2.4.juno-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132824" version="1" comment="openstack-swift is &lt;2.1.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132825" version="1" comment="openstack-swift-account is &lt;2.1.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132826" version="1" comment="openstack-swift-container is &lt;2.1.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132827" version="1" comment="openstack-swift-doc is &lt;2.1.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132828" version="1" comment="openstack-swift-object is &lt;2.1.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132829" version="1" comment="openstack-swift-proxy is &lt;2.1.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132830" version="1" comment="python-keystone is &lt;2014.2.4.juno-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132831" version="1" comment="python-nova is &lt;2014.2.4.juno-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132832" version="1" comment="python-swift is &lt;2.1.0-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118268" version="1" comment="openstack-nova is &lt;2014.2.4~a0~dev80-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118269" version="1" comment="openstack-nova-api is &lt;2014.2.4~a0~dev80-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118270" version="1" comment="openstack-nova-cells is &lt;2014.2.4~a0~dev80-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118271" version="1" comment="openstack-nova-cert is &lt;2014.2.4~a0~dev80-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118272" version="1" comment="openstack-nova-compute is &lt;2014.2.4~a0~dev80-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118273" version="1" comment="openstack-nova-conductor is &lt;2014.2.4~a0~dev80-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118274" version="1" comment="openstack-nova-console is &lt;2014.2.4~a0~dev80-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118275" version="1" comment="openstack-nova-consoleauth is &lt;2014.2.4~a0~dev80-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118276" version="1" comment="openstack-nova-doc is &lt;2014.2.4~a0~dev80-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118277" version="1" comment="openstack-nova-novncproxy is &lt;2014.2.4~a0~dev80-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118278" version="1" comment="openstack-nova-objectstore is &lt;2014.2.4~a0~dev80-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118279" version="1" comment="openstack-nova-scheduler is &lt;2014.2.4~a0~dev80-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118280" version="1" comment="openstack-nova-serialproxy is &lt;2014.2.4~a0~dev80-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118281" version="1" comment="openstack-nova-vncproxy is &lt;2014.2.4~a0~dev80-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118282" version="1" comment="python-nova is &lt;2014.2.4~a0~dev80-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118283" version="1" comment="openstack-swift is &lt;2.1.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118284" version="1" comment="openstack-swift-account is &lt;2.1.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118285" version="1" comment="openstack-swift-container is &lt;2.1.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118286" version="1" comment="openstack-swift-doc is &lt;2.1.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118287" version="1" comment="openstack-swift-object is &lt;2.1.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118288" version="1" comment="openstack-swift-proxy is &lt;2.1.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118289" version="1" comment="python-swift is &lt;2.1.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123026" version="1" comment="openstack-trove is &lt;2014.2.4.juno-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123027" version="1" comment="openstack-trove-api is &lt;2014.2.4.juno-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123028" version="1" comment="openstack-trove-conductor is &lt;2014.2.4.juno-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123029" version="1" comment="openstack-trove-doc is &lt;2014.2.4.juno-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123030" version="1" comment="openstack-trove-guestagent is &lt;2014.2.4.juno-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123031" version="1" comment="openstack-trove-taskmanager is &lt;2014.2.4.juno-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123032" version="1" comment="python-trove is &lt;2014.2.4.juno-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118290" version="1" comment="python-Django is &lt;1.6.11-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118291" version="1" comment="python-Django is &lt;1.6.11-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118655" version="1" comment="python-Django is &lt;1.6.11-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118292" version="1" comment="python-Pillow is &lt;2.7.0-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125629" version="1" comment="python-Pillow is &lt;2.7.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118293" version="1" comment="python-PyYAML is &lt;3.10-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118294" version="1" comment="python-glanceclient is &lt;0.15.0-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118295" version="1" comment="python-keystoneclient is &lt;1.0.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118296" version="1" comment="python-keystoneclient-doc is &lt;1.0.0-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118297" version="1" comment="python-keystonemiddleware is &lt;1.2.0-11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118298" version="1" comment="python-novaclient is &lt;2.20.0-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118299" version="1" comment="python-novaclient-doc is &lt;2.20.0-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118300" version="1" comment="python-openstackclient is &lt;0.4.1-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118301" version="1" comment="python-requests is &lt;2.3.0-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118302" version="1" comment="ruby2.1-rubygem-sprockets-2_11 is &lt;2.11.0-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122441" version="1" comment="ruby2.1-rubygem-actionpack-4_1 is &lt;4.1.9-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122442" version="1" comment="rubygem-actionpack-4_1 is &lt;4.1.9-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122443" version="1" comment="ruby2.1-rubygem-actionview-4_1 is &lt;4.1.9-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122444" version="1" comment="rubygem-actionview-4_1 is &lt;4.1.9-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125291" version="1" comment="ruby2.1-rubygem-actionview-4_1 is &lt;4.1.9-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125292" version="1" comment="rubygem-actionview-4_1 is &lt;4.1.9-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122445" version="1" comment="ruby2.1-rubygem-activemodel-4_1 is &lt;4.1.9-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122446" version="1" comment="rubygem-activemodel-4_1 is &lt;4.1.9-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122447" version="1" comment="ruby2.1-rubygem-activerecord-4_1 is &lt;4.1.9-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122448" version="1" comment="rubygem-activerecord-4_1 is &lt;4.1.9-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119824" version="1" comment="ruby2.1-rubygem-activesupport-4_1 is &lt;4.1.9-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119825" version="1" comment="rubygem-activesupport-4_1 is &lt;4.1.9-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122449" version="1" comment="ruby2.1-rubygem-activesupport-4_1 is &lt;4.1.9-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122450" version="1" comment="rubygem-activesupport-4_1 is &lt;4.1.9-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125293" version="1" comment="ruby2.1-rubygem-activesupport-4_1 is &lt;4.1.9-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125294" version="1" comment="rubygem-activesupport-4_1 is &lt;4.1.9-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132833" version="1" comment="ruby2.1-rubygem-bson-1_11 is &lt;1.11.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132834" version="1" comment="ruby2.1-rubygem-easy_diff is &lt;0.0.5-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132835" version="1" comment="ruby2.1-rubygem-redcarpet is &lt;3.2.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132836" version="1" comment="ruby2.1-rubygem-sprockets-2_11 is &lt;2.11.3-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132837" version="1" comment="rubygem-bson-1_11 is &lt;1.11.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132838" version="1" comment="rubygem-easy_diff is &lt;0.0.5-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132839" version="1" comment="rubygem-redcarpet is &lt;3.2.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132840" version="1" comment="rubygem-sprockets-2_11 is &lt;2.11.3-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118303" version="1" comment="ruby2.1-rubygem-rack is &lt;1.5.2-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118304" version="1" comment="rubygem-rack is &lt;1.5.2-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147643" version="1" comment="apache2-mod_wsgi is &lt;4.4.13-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125305" version="1" comment="suse-openstack-cloud-release is ==6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147644" version="1" comment="couchdb is &lt;1.6.1-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147645" version="1" comment="crowbar-openstack is &lt;3.0+git.1456169766.1e60d19-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147646" version="1" comment="dnsmasq-utils is &lt;2.71-8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147647" version="1" comment="docker is &lt;1.9.1-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147648" version="1" comment="haproxy is &lt;1.5.14-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147649" version="1" comment="memcached is &lt;1.4.15-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147650" version="1" comment="mongodb is &lt;2.4.14-1.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147651" version="1" comment="openstack-cinder is &lt;7.0.2~a0~dev1-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147652" version="1" comment="openstack-cinder-api is &lt;7.0.2~a0~dev1-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147653" version="1" comment="openstack-cinder-backup is &lt;7.0.2~a0~dev1-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147654" version="1" comment="openstack-cinder-scheduler is &lt;7.0.2~a0~dev1-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147655" version="1" comment="openstack-cinder-volume is &lt;7.0.2~a0~dev1-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147656" version="1" comment="python-cinder is &lt;7.0.2~a0~dev1-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147657" version="1" comment="openstack-dashboard is &lt;8.0.2~a0~dev7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147658" version="1" comment="python-horizon is &lt;8.0.2~a0~dev7-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147659" version="1" comment="openstack-glance is &lt;11.0.2~a0~dev2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147660" version="1" comment="python-glance is &lt;11.0.2~a0~dev2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147661" version="1" comment="openstack-heat is &lt;5.0.2~a0~dev9-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147662" version="1" comment="openstack-heat-api is &lt;5.0.2~a0~dev9-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147663" version="1" comment="openstack-heat-api-cfn is &lt;5.0.2~a0~dev9-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147664" version="1" comment="openstack-heat-api-cloudwatch is &lt;5.0.2~a0~dev9-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147665" version="1" comment="openstack-heat-engine is &lt;5.0.2~a0~dev9-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147666" version="1" comment="openstack-heat-plugin-heat_docker is &lt;5.0.2~a0~dev9-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147667" version="1" comment="python-heat is &lt;5.0.2~a0~dev9-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147668" version="1" comment="openstack-heat-templates is &lt;0.0.0+git.1452795102.e53f5d3-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147669" version="1" comment="openstack-ironic is &lt;4.2.3~a0~dev14-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147670" version="1" comment="openstack-ironic-api is &lt;4.2.3~a0~dev14-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147671" version="1" comment="openstack-ironic-conductor is &lt;4.2.3~a0~dev14-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147672" version="1" comment="python-ironic is &lt;4.2.3~a0~dev14-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147673" version="1" comment="openstack-keystone is &lt;8.0.2~a0~dev8-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147674" version="1" comment="python-keystone is &lt;8.0.2~a0~dev8-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147675" version="1" comment="openstack-neutron is &lt;7.0.4~a0~dev18-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147676" version="1" comment="openstack-neutron-dhcp-agent is &lt;7.0.4~a0~dev18-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147677" version="1" comment="openstack-neutron-ha-tool is &lt;7.0.4~a0~dev18-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147678" version="1" comment="openstack-neutron-l3-agent is &lt;7.0.4~a0~dev18-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147679" version="1" comment="openstack-neutron-linuxbridge-agent is &lt;7.0.4~a0~dev18-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147680" version="1" comment="openstack-neutron-metadata-agent is &lt;7.0.4~a0~dev18-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147681" version="1" comment="openstack-neutron-metering-agent is &lt;7.0.4~a0~dev18-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147682" version="1" comment="openstack-neutron-mlnx-agent is &lt;7.0.4~a0~dev18-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147683" version="1" comment="openstack-neutron-nvsd-agent is &lt;7.0.4~a0~dev18-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147684" version="1" comment="openstack-neutron-openvswitch-agent is &lt;7.0.4~a0~dev18-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147685" version="1" comment="openstack-neutron-plugin-cisco is &lt;7.0.2~a0~dev63-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147686" version="1" comment="openstack-neutron-restproxy-agent is &lt;7.0.4~a0~dev18-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147687" version="1" comment="openstack-neutron-server is &lt;7.0.4~a0~dev18-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147688" version="1" comment="python-neutron is &lt;7.0.4~a0~dev18-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147689" version="1" comment="openstack-nova is &lt;12.0.2~a0~dev18-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147690" version="1" comment="openstack-nova-api is &lt;12.0.2~a0~dev18-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147691" version="1" comment="openstack-nova-cells is &lt;12.0.2~a0~dev18-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147692" version="1" comment="openstack-nova-cert is &lt;12.0.2~a0~dev18-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147693" version="1" comment="openstack-nova-compute is &lt;12.0.2~a0~dev18-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147694" version="1" comment="openstack-nova-conductor is &lt;12.0.2~a0~dev18-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147695" version="1" comment="openstack-nova-console is &lt;12.0.2~a0~dev18-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147696" version="1" comment="openstack-nova-consoleauth is &lt;12.0.2~a0~dev18-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147697" version="1" comment="openstack-nova-novncproxy is &lt;12.0.2~a0~dev18-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147698" version="1" comment="openstack-nova-objectstore is &lt;12.0.2~a0~dev18-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147699" version="1" comment="openstack-nova-scheduler is &lt;12.0.2~a0~dev18-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147700" version="1" comment="openstack-nova-serialproxy is &lt;12.0.2~a0~dev18-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147701" version="1" comment="openstack-nova-vncproxy is &lt;12.0.2~a0~dev18-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147702" version="1" comment="python-nova is &lt;12.0.2~a0~dev18-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147703" version="1" comment="openstack-swift is &lt;2.1.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147704" version="1" comment="openstack-swift-account is &lt;2.1.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147705" version="1" comment="openstack-swift-container is &lt;2.1.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147706" version="1" comment="openstack-swift-object is &lt;2.1.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147707" version="1" comment="openstack-swift-proxy is &lt;2.1.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147708" version="1" comment="python-swift is &lt;2.1.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147709" version="1" comment="openstack-trove is &lt;4.0.1~a0~dev2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147710" version="1" comment="openstack-trove-api is &lt;4.0.1~a0~dev2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147711" version="1" comment="openstack-trove-conductor is &lt;4.0.1~a0~dev2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147712" version="1" comment="openstack-trove-guestagent is &lt;4.0.1~a0~dev2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147713" version="1" comment="openstack-trove-taskmanager is &lt;4.0.1~a0~dev2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147714" version="1" comment="python-trove is &lt;4.0.1~a0~dev2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147715" version="1" comment="python-Beaker is &lt;1.6.4-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147716" version="1" comment="python-Django is &lt;1.8.9-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147717" version="1" comment="python-Jinja2 is &lt;2.7.3-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147718" version="1" comment="python-Pillow is &lt;2.7.0-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147719" version="1" comment="python-keystoneclient is &lt;1.7.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147720" version="1" comment="python-keystoneclient-doc is &lt;1.7.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147721" version="1" comment="python-keystonemiddleware is &lt;2.3.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147722" version="1" comment="python-pycrypto is &lt;2.6.1-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147723" version="1" comment="python-pymongo is &lt;3.0.3-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147724" version="1" comment="rabbitmq-server is &lt;3.4.4-2.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147725" version="1" comment="rabbitmq-server-plugins is &lt;3.4.4-2.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147726" version="1" comment="ruby2.1-rubygem-actionpack-4_2 is &lt;4.2.2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147727" version="1" comment="ruby2.1-rubygem-actionview-4_2 is &lt;4.2.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147728" version="1" comment="ruby2.1-rubygem-activemodel-4_2 is &lt;4.2.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147729" version="1" comment="ruby2.1-rubygem-activerecord-4_2 is &lt;4.2.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147730" version="1" comment="ruby2.1-rubygem-activesupport-4_2 is &lt;4.2.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147731" version="1" comment="ruby2.1-rubygem-bson-1_11 is &lt;1.11.1-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147732" version="1" comment="ruby2.1-rubygem-chef is &lt;10.32.2-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147733" version="1" comment="ruby2.1-rubygem-chef-expander is &lt;10.32.2-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147734" version="1" comment="ruby2.1-rubygem-chef-server is &lt;10.32.2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147735" version="1" comment="ruby2.1-rubygem-chef-server-api is &lt;10.32.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147736" version="1" comment="ruby2.1-rubygem-chef-solr is &lt;10.32.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147737" version="1" comment="rubygem-chef is &lt;10.32.2-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147738" version="1" comment="rubygem-chef-expander is &lt;10.32.2-1.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147739" version="1" comment="rubygem-chef-server-api is &lt;10.32.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147740" version="1" comment="rubygem-chef-solr is &lt;10.32.2-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147741" version="1" comment="ruby2.1-rubygem-extlib is &lt;0.9.16-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147742" version="1" comment="ruby2.1-rubygem-multi_xml is &lt;0.5.5-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147743" version="1" comment="ruby2.1-rubygem-rack is &lt;1.6.4-2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147744" version="1" comment="ruby2.1-rubygem-rails-html-sanitizer is &lt;1.0.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147745" version="1" comment="ruby2.1-rubygem-railties-4_2 is &lt;4.2.2-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147746" version="1" comment="ruby2.1-rubygem-sprockets-2_11 is &lt;2.11.3-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130832" version="1" comment="openstack-designate is &lt;1.0.3~a0~dev10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130833" version="1" comment="openstack-designate-agent is &lt;1.0.3~a0~dev10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130834" version="1" comment="openstack-designate-api is &lt;1.0.3~a0~dev10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130835" version="1" comment="openstack-designate-central is &lt;1.0.3~a0~dev10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130836" version="1" comment="openstack-designate-doc is &lt;1.0.3~a0~dev10-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130837" version="1" comment="openstack-designate-sink is &lt;1.0.3~a0~dev10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130838" version="1" comment="openstack-ironic is &lt;4.2.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130839" version="1" comment="openstack-ironic-api is &lt;4.2.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130840" version="1" comment="openstack-ironic-conductor is &lt;4.2.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130841" version="1" comment="openstack-ironic-doc is &lt;4.2.5-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130842" version="1" comment="openstack-neutron-vpn-agent is &lt;7.0.5~a0~dev3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130843" version="1" comment="openstack-neutron-vpnaas is &lt;7.0.5~a0~dev3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130844" version="1" comment="openstack-neutron-vpnaas-doc is &lt;7.0.5~a0~dev3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130845" version="1" comment="openstack-nova-docker is &lt;0.0.1~a0~dev238-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130846" version="1" comment="openstack-sahara is &lt;3.0.3~a0~dev1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130847" version="1" comment="openstack-sahara-api is &lt;3.0.3~a0~dev1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130848" version="1" comment="openstack-sahara-doc is &lt;3.0.3~a0~dev1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130849" version="1" comment="openstack-sahara-engine is &lt;3.0.3~a0~dev1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130850" version="1" comment="openstack-tempest is &lt;7.0.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130851" version="1" comment="openstack-tempest-test is &lt;7.0.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130852" version="1" comment="openstack-trove is &lt;4.0.1~a0~dev19-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130853" version="1" comment="openstack-trove-api is &lt;4.0.1~a0~dev19-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130854" version="1" comment="openstack-trove-conductor is &lt;4.0.1~a0~dev19-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130855" version="1" comment="openstack-trove-doc is &lt;4.0.1~a0~dev19-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130856" version="1" comment="openstack-trove-guestagent is &lt;4.0.1~a0~dev19-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130857" version="1" comment="openstack-trove-taskmanager is &lt;4.0.1~a0~dev19-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130858" version="1" comment="python-designate is &lt;1.0.3~a0~dev10-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130859" version="1" comment="python-ironic is &lt;4.2.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130860" version="1" comment="python-neutron-vpnaas is &lt;7.0.5~a0~dev3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130861" version="1" comment="python-sahara is &lt;3.0.3~a0~dev1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130862" version="1" comment="python-tempest is &lt;7.0.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130863" version="1" comment="python-trove is &lt;4.0.1~a0~dev19-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132841" version="1" comment="openstack-ceilometer is &lt;5.0.4~a0~dev6-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132842" version="1" comment="openstack-ceilometer-agent-central is &lt;5.0.4~a0~dev6-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132843" version="1" comment="openstack-ceilometer-agent-compute is &lt;5.0.4~a0~dev6-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132844" version="1" comment="openstack-ceilometer-agent-ipmi is &lt;5.0.4~a0~dev6-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132845" version="1" comment="openstack-ceilometer-agent-notification is &lt;5.0.4~a0~dev6-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132846" version="1" comment="openstack-ceilometer-alarm-evaluator is &lt;5.0.4~a0~dev6-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132847" version="1" comment="openstack-ceilometer-alarm-notifier is &lt;5.0.4~a0~dev6-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132848" version="1" comment="openstack-ceilometer-api is &lt;5.0.4~a0~dev6-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132849" version="1" comment="openstack-ceilometer-collector is &lt;5.0.4~a0~dev6-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132850" version="1" comment="openstack-ceilometer-doc is &lt;5.0.4~a0~dev6-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132851" version="1" comment="openstack-ceilometer-polling is &lt;5.0.4~a0~dev6-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132852" version="1" comment="openstack-cinder is &lt;7.0.3~a0~dev2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132853" version="1" comment="openstack-cinder-api is &lt;7.0.3~a0~dev2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132854" version="1" comment="openstack-cinder-backup is &lt;7.0.3~a0~dev2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132855" version="1" comment="openstack-cinder-doc is &lt;7.0.3~a0~dev2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132856" version="1" comment="openstack-cinder-scheduler is &lt;7.0.3~a0~dev2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132857" version="1" comment="openstack-cinder-volume is &lt;7.0.3~a0~dev2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132858" version="1" comment="openstack-dashboard is &lt;8.0.2~a0~dev34-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132859" version="1" comment="openstack-glance is &lt;11.0.2~a0~dev13-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132860" version="1" comment="openstack-glance-doc is &lt;11.0.2~a0~dev13-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132861" version="1" comment="openstack-heat is &lt;5.0.2~a0~dev93-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132862" version="1" comment="openstack-heat-api is &lt;5.0.2~a0~dev93-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132863" version="1" comment="openstack-heat-api-cfn is &lt;5.0.2~a0~dev93-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132864" version="1" comment="openstack-heat-api-cloudwatch is &lt;5.0.2~a0~dev93-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132865" version="1" comment="openstack-heat-doc is &lt;5.0.2~a0~dev93-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132866" version="1" comment="openstack-heat-engine is &lt;5.0.2~a0~dev93-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132867" version="1" comment="openstack-heat-plugin-heat_docker is &lt;5.0.2~a0~dev93-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132868" version="1" comment="openstack-keystone is &lt;8.1.1~a0~dev13-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132869" version="1" comment="openstack-keystone-doc is &lt;8.1.1~a0~dev13-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132870" version="1" comment="openstack-manila is &lt;1.0.2~a0~dev11-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132871" version="1" comment="openstack-manila-api is &lt;1.0.2~a0~dev11-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132872" version="1" comment="openstack-manila-doc is &lt;1.0.2~a0~dev11-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132873" version="1" comment="openstack-manila-scheduler is &lt;1.0.2~a0~dev11-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132874" version="1" comment="openstack-manila-share is &lt;1.0.2~a0~dev11-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132875" version="1" comment="openstack-neutron is &lt;7.1.2~a0~dev29-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132876" version="1" comment="openstack-neutron-dhcp-agent is &lt;7.1.2~a0~dev29-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132877" version="1" comment="openstack-neutron-doc is &lt;7.1.2~a0~dev29-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132878" version="1" comment="openstack-neutron-fwaas is &lt;7.1.2~a0~dev1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132879" version="1" comment="openstack-neutron-fwaas-doc is &lt;7.1.2~a0~dev1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132880" version="1" comment="openstack-neutron-ha-tool is &lt;7.1.2~a0~dev29-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132881" version="1" comment="openstack-neutron-l3-agent is &lt;7.1.2~a0~dev29-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132882" version="1" comment="openstack-neutron-lbaas is &lt;7.1.2~a0~dev1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132883" version="1" comment="openstack-neutron-lbaas-agent is &lt;7.1.2~a0~dev1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132884" version="1" comment="openstack-neutron-lbaas-doc is &lt;7.1.2~a0~dev1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132885" version="1" comment="openstack-neutron-linuxbridge-agent is &lt;7.1.2~a0~dev29-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132886" version="1" comment="openstack-neutron-metadata-agent is &lt;7.1.2~a0~dev29-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132887" version="1" comment="openstack-neutron-metering-agent is &lt;7.1.2~a0~dev29-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132888" version="1" comment="openstack-neutron-mlnx-agent is &lt;7.1.2~a0~dev29-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132889" version="1" comment="openstack-neutron-nvsd-agent is &lt;7.1.2~a0~dev29-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132890" version="1" comment="openstack-neutron-openvswitch-agent is &lt;7.1.2~a0~dev29-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132891" version="1" comment="openstack-neutron-restproxy-agent is &lt;7.1.2~a0~dev29-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132892" version="1" comment="openstack-neutron-server is &lt;7.1.2~a0~dev29-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132893" version="1" comment="openstack-nova is &lt;12.0.5~a0~dev2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132894" version="1" comment="openstack-nova-api is &lt;12.0.5~a0~dev2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132895" version="1" comment="openstack-nova-cells is &lt;12.0.5~a0~dev2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132896" version="1" comment="openstack-nova-cert is &lt;12.0.5~a0~dev2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132897" version="1" comment="openstack-nova-compute is &lt;12.0.5~a0~dev2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132898" version="1" comment="openstack-nova-conductor is &lt;12.0.5~a0~dev2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132899" version="1" comment="openstack-nova-console is &lt;12.0.5~a0~dev2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132900" version="1" comment="openstack-nova-consoleauth is &lt;12.0.5~a0~dev2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132901" version="1" comment="openstack-nova-doc is &lt;12.0.5~a0~dev2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132902" version="1" comment="openstack-nova-novncproxy is &lt;12.0.5~a0~dev2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132903" version="1" comment="openstack-nova-objectstore is &lt;12.0.5~a0~dev2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132904" version="1" comment="openstack-nova-scheduler is &lt;12.0.5~a0~dev2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132905" version="1" comment="openstack-nova-serialproxy is &lt;12.0.5~a0~dev2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132906" version="1" comment="openstack-nova-vncproxy is &lt;12.0.5~a0~dev2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132907" version="1" comment="openstack-resource-agents is &lt;1.0+git.1467079370.4f2c49d-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132908" version="1" comment="python-ceilometer is &lt;5.0.4~a0~dev6-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132909" version="1" comment="python-cinder is &lt;7.0.3~a0~dev2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132910" version="1" comment="python-glance is &lt;11.0.2~a0~dev13-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132911" version="1" comment="python-heat is &lt;5.0.2~a0~dev93-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132912" version="1" comment="python-horizon is &lt;8.0.2~a0~dev34-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132913" version="1" comment="python-keystone is &lt;8.1.1~a0~dev13-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132914" version="1" comment="python-manila is &lt;1.0.2~a0~dev11-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132915" version="1" comment="python-networking-cisco is &lt;2.1.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132916" version="1" comment="python-neutron is &lt;7.1.2~a0~dev29-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132917" version="1" comment="python-neutron-fwaas is &lt;7.1.2~a0~dev1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132918" version="1" comment="python-neutron-lbaas is &lt;7.1.2~a0~dev1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132919" version="1" comment="python-nova is &lt;12.0.5~a0~dev2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132920" version="1" comment="python-openstackclient is &lt;1.7.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132921" version="1" comment="openstack-horizon-plugin-manila-ui is &lt;1.2.1~a0~dev2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009132922" version="1" comment="python-horizon-plugin-manila-ui is &lt;1.2.1~a0~dev2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134765" version="1" comment="python-suds-jurko is &lt;0.6-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145858" version="1" comment="dnsmasq-utils is &lt;2.71-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125303" version="1" comment="ruby2.1-rubygem-actionview-4_2 is &lt;4.2.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125304" version="1" comment="rubygem-actionview-4_2 is &lt;4.2.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125652" version="1" comment="python-Pillow is &lt;2.7.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149006" version="1" comment="python-defusedxml is &lt;0.4.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149007" version="1" comment="python-pysaml2 is &lt;2.4.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147747" version="1" comment="openstack-cinder is &lt;7.0.2~a0~dev30-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147748" version="1" comment="openstack-cinder-api is &lt;7.0.2~a0~dev30-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147749" version="1" comment="openstack-cinder-backup is &lt;7.0.2~a0~dev30-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147750" version="1" comment="openstack-cinder-scheduler is &lt;7.0.2~a0~dev30-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147751" version="1" comment="openstack-cinder-volume is &lt;7.0.2~a0~dev30-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147752" version="1" comment="python-cinder is &lt;7.0.2~a0~dev30-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147753" version="1" comment="openstack-keystone is &lt;8.0.2~a0~dev34-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147754" version="1" comment="python-keystone is &lt;8.0.2~a0~dev34-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147755" version="1" comment="ruby2.1-rubygem-actionpack-4_2 is &lt;4.2.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147756" version="1" comment="ruby2.1-rubygem-activesupport-4_2 is &lt;4.2.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147757" version="1" comment="openstack-glance is &lt;11.0.2~a0~dev7-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147758" version="1" comment="python-glance is &lt;11.0.2~a0~dev7-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125264" version="1" comment="shotwell is &lt;0.22.0+git.20160103-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125265" version="1" comment="shotwell-lang is &lt;0.22.0+git.20160103-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117729" version="1" comment="openSUSE-release is ==13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133245" version="1" comment="irssi is &lt;0.8.20-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133246" version="1" comment="irssi-devel is &lt;0.8.20-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133247" version="1" comment="chromedriver is &lt;54.0.2840.59-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133248" version="1" comment="chromium is &lt;54.0.2840.59-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133249" version="1" comment="chromium-ffmpegsumo is &lt;54.0.2840.59-82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133250" version="1" comment="MozillaFirefox is &lt;49.0.2-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133251" version="1" comment="MozillaFirefox-branding-upstream is &lt;49.0.2-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133252" version="1" comment="MozillaFirefox-buildsymbols is &lt;49.0.2-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133253" version="1" comment="MozillaFirefox-devel is &lt;49.0.2-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133254" version="1" comment="MozillaFirefox-translations-common is &lt;49.0.2-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133255" version="1" comment="MozillaFirefox-translations-other is &lt;49.0.2-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136908" version="1" comment="FastCGI is &lt;2.4.0-167.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136909" version="1" comment="GraphicsMagick-devel is &lt;1.3.20-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136910" version="1" comment="libGraphicsMagick-Q16-3 is &lt;1.3.20-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136911" version="1" comment="libGraphicsMagick3-config is &lt;1.3.20-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136912" version="1" comment="libGraphicsMagickWand-Q16-2 is &lt;1.3.20-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136913" version="1" comment="ImageMagick is &lt;6.8.9.8-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136914" version="1" comment="ImageMagick-devel is &lt;6.8.9.8-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136915" version="1" comment="ImageMagick-doc is &lt;6.8.9.8-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136916" version="1" comment="ImageMagick-extra is &lt;6.8.9.8-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136917" version="1" comment="libMagick++-6_Q16-5 is &lt;6.8.9.8-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136918" version="1" comment="libMagickCore-6_Q16-2 is &lt;6.8.9.8-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136919" version="1" comment="libMagickWand-6_Q16-2 is &lt;6.8.9.8-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136920" version="1" comment="perl-PerlMagick is &lt;6.8.9.8-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136921" version="1" comment="MozillaFirefox is &lt;33.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136922" version="1" comment="MozillaFirefox-translations-common is &lt;33.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136923" version="1" comment="MozillaThunderbird is &lt;31.2.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136924" version="1" comment="MozillaThunderbird-translations-common is &lt;31.2.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136925" version="1" comment="a2ps is &lt;4.13-1361.1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136926" version="1" comment="aaa_base is &lt;13.2+git20140911.61c1681-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136927" version="1" comment="aaa_base-extras is &lt;13.2+git20140911.61c1681-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136928" version="1" comment="accountsservice is &lt;0.6.38-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136929" version="1" comment="libaccountsservice0 is &lt;0.6.38-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136930" version="1" comment="typelib-1_0-AccountsService-1_0 is &lt;0.6.38-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136931" version="1" comment="alsa is &lt;1.0.28-6.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136932" version="1" comment="alsa-devel is &lt;1.0.28-6.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136933" version="1" comment="libasound2 is &lt;1.0.28-6.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136934" version="1" comment="libasound2-32bit is &lt;1.0.28-6.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136935" version="1" comment="android-tools is &lt;4.2.2_r1-5.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136936" version="1" comment="ant is &lt;1.9.4-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136937" version="1" comment="ant-jmf is &lt;1.9.4-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136938" version="1" comment="ant-junit is &lt;1.9.4-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136939" version="1" comment="ant-scripts is &lt;1.9.4-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136940" version="1" comment="ant-swing is &lt;1.9.4-2.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136941" version="1" comment="apache-commons-beanutils is &lt;1.9.2-2.1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136942" version="1" comment="apache-commons-daemon is &lt;1.0.15-5.1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136943" version="1" comment="apache-commons-httpclient is &lt;3.1-7.1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136944" version="1" comment="apache2 is &lt;2.4.10-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136945" version="1" comment="apache2-devel is &lt;2.4.10-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136946" version="1" comment="apache2-doc is &lt;2.4.10-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136947" version="1" comment="apache2-example-pages is &lt;2.4.10-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136948" version="1" comment="apache2-prefork is &lt;2.4.10-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136949" version="1" comment="apache2-utils is &lt;2.4.10-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136950" version="1" comment="apache2-mod_mono is &lt;2.10-16.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136951" version="1" comment="libmono-2_0-1 is &lt;3.8.0-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136952" version="1" comment="libmono-2_0-devel is &lt;3.8.0-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136953" version="1" comment="libmonoboehm-2_0-1 is &lt;3.8.0-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136954" version="1" comment="libmonoboehm-2_0-devel is &lt;3.8.0-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136955" version="1" comment="libmonosgen-2_0-1 is &lt;3.8.0-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136956" version="1" comment="mono-core is &lt;3.8.0-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136957" version="1" comment="mono-data is &lt;3.8.0-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136958" version="1" comment="mono-data-oracle is &lt;3.8.0-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136959" version="1" comment="mono-data-postgresql is &lt;3.8.0-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136960" version="1" comment="mono-data-sqlite is &lt;3.8.0-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136961" version="1" comment="mono-devel is &lt;3.8.0-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136962" version="1" comment="mono-extras is &lt;3.8.0-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136963" version="1" comment="mono-locale-extras is &lt;3.8.0-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136964" version="1" comment="mono-mvc is &lt;3.8.0-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136965" version="1" comment="mono-nunit is &lt;3.8.0-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136966" version="1" comment="mono-wcf is &lt;3.8.0-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136967" version="1" comment="mono-web is &lt;3.8.0-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136968" version="1" comment="mono-winforms is &lt;3.8.0-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136969" version="1" comment="mono-winfxcore is &lt;3.8.0-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136970" version="1" comment="monodoc-core is &lt;3.8.0-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136971" version="1" comment="xsp is &lt;2.10.2-15.1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136972" version="1" comment="apache2-mod_perl is &lt;2.0.8-7.2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136973" version="1" comment="apache2-mod_php5 is &lt;5.6.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136974" version="1" comment="php5 is &lt;5.6.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136975" version="1" comment="php5-bcmath is &lt;5.6.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136976" version="1" comment="php5-bz2 is &lt;5.6.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136977" version="1" comment="php5-calendar is &lt;5.6.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136978" version="1" comment="php5-ctype is &lt;5.6.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136979" version="1" comment="php5-curl is &lt;5.6.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136980" version="1" comment="php5-dba is &lt;5.6.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136981" version="1" comment="php5-devel is &lt;5.6.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136982" version="1" comment="php5-dom is &lt;5.6.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136983" version="1" comment="php5-exif is &lt;5.6.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136984" version="1" comment="php5-fastcgi is &lt;5.6.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136985" version="1" comment="php5-ftp is &lt;5.6.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136986" version="1" comment="php5-gd is &lt;5.6.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136987" version="1" comment="php5-gettext is &lt;5.6.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136988" version="1" comment="php5-gmp is &lt;5.6.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136989" version="1" comment="php5-iconv is &lt;5.6.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136990" version="1" comment="php5-imap is &lt;5.6.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136991" version="1" comment="php5-json is &lt;5.6.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136992" version="1" comment="php5-ldap is &lt;5.6.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136993" version="1" comment="php5-mbstring is &lt;5.6.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136994" version="1" comment="php5-mcrypt is &lt;5.6.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136995" version="1" comment="php5-mysql is &lt;5.6.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136996" version="1" comment="php5-odbc is &lt;5.6.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136997" version="1" comment="php5-openssl is &lt;5.6.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136998" version="1" comment="php5-pdo is &lt;5.6.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136999" version="1" comment="php5-pear is &lt;5.6.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137000" version="1" comment="php5-pgsql is &lt;5.6.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137001" version="1" comment="php5-shmop is &lt;5.6.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137002" version="1" comment="php5-snmp is &lt;5.6.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137003" version="1" comment="php5-sockets is &lt;5.6.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137004" version="1" comment="php5-sqlite is &lt;5.6.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137005" version="1" comment="php5-suhosin is &lt;5.6.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137006" version="1" comment="php5-sysvsem is &lt;5.6.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137007" version="1" comment="php5-sysvshm is &lt;5.6.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137008" version="1" comment="php5-tidy is &lt;5.6.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137009" version="1" comment="php5-tokenizer is &lt;5.6.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137010" version="1" comment="php5-wddx is &lt;5.6.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137011" version="1" comment="php5-xmlreader is &lt;5.6.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137012" version="1" comment="php5-xmlwriter is &lt;5.6.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137013" version="1" comment="php5-xsl is &lt;5.6.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137014" version="1" comment="php5-zip is &lt;5.6.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137015" version="1" comment="php5-zlib is &lt;5.6.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137016" version="1" comment="argyllcms is &lt;1.6.3-2.1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137017" version="1" comment="aria2 is &lt;1.18.5-2.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137018" version="1" comment="augeas-lenses is &lt;1.2.0-4.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137019" version="1" comment="libaugeas0 is &lt;1.2.0-4.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137020" version="1" comment="automake is &lt;1.13.4-5.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137021" version="1" comment="m4 is &lt;1.4.17-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137022" version="1" comment="avahi is &lt;0.6.31-23.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137023" version="1" comment="avahi-autoipd is &lt;0.6.31-23.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137024" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.6.31-23.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137025" version="1" comment="libavahi-client3 is &lt;0.6.31-23.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137026" version="1" comment="libavahi-common3 is &lt;0.6.31-23.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137027" version="1" comment="libavahi-core7 is &lt;0.6.31-23.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137028" version="1" comment="libavahi-devel is &lt;0.6.31-23.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137029" version="1" comment="libdns_sd is &lt;0.6.31-23.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137030" version="1" comment="banshee is &lt;2.6.2-2.1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137031" version="1" comment="banshee-backend-engine-gstreamer is &lt;2.6.2-2.1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137032" version="1" comment="banshee-backend-io-gio is &lt;2.6.2-2.1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137033" version="1" comment="banshee-backend-platform-gnome is &lt;2.6.2-2.1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137034" version="1" comment="banshee-backend-platform-unix is &lt;2.6.2-2.1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137035" version="1" comment="banshee-core is &lt;2.6.2-2.1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137036" version="1" comment="banshee-dmp is &lt;2.6.2-2.1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137037" version="1" comment="banshee-dmp-apple-devices is &lt;2.6.2-2.1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137038" version="1" comment="banshee-dmp-mtp is &lt;2.6.2-2.1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137039" version="1" comment="banshee-extensions-default is &lt;2.6.2-2.1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137040" version="1" comment="bash is &lt;4.2-75.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137041" version="1" comment="bash-doc is &lt;4.2-75.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137042" version="1" comment="libreadline6 is &lt;6.2-75.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137043" version="1" comment="readline-devel is &lt;6.2-75.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137044" version="1" comment="readline-doc is &lt;6.2-75.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137045" version="1" comment="bind is &lt;9.9.5P1-2.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137046" version="1" comment="bind-chrootenv is &lt;9.9.5P1-2.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137047" version="1" comment="bind-doc is &lt;9.9.5P1-2.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137048" version="1" comment="bind-libs is &lt;9.9.5P1-2.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137049" version="1" comment="bind-utils is &lt;9.9.5P1-2.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137050" version="1" comment="bogofilter is &lt;1.2.4-4.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137051" version="1" comment="bzip2 is &lt;1.0.6-29.2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137052" version="1" comment="libbz2-1 is &lt;1.0.6-29.2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137053" version="1" comment="libbz2-1-32bit is &lt;1.0.6-29.2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137054" version="1" comment="libbz2-devel is &lt;1.0.6-29.2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137055" version="1" comment="cifs-utils is &lt;6.4-3.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137056" version="1" comment="clamav is &lt;0.98.4-2.1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137057" version="1" comment="claws-mail is &lt;3.10.1-2.1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137058" version="1" comment="claws-mail-lang is &lt;3.10.1-2.1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137059" version="1" comment="colord is &lt;1.2.3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137060" version="1" comment="libcolord-gtk1 is &lt;0.1.25-4.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137061" version="1" comment="libcolord2 is &lt;1.2.3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137062" version="1" comment="libcolorhug2 is &lt;1.2.3-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137063" version="1" comment="coreutils is &lt;8.23-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137064" version="1" comment="cpio is &lt;2.11-29.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137065" version="1" comment="tar is &lt;1.28-2.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137066" version="1" comment="cpp48 is &lt;4.8.3+r212056-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137067" version="1" comment="gcc48 is &lt;4.8.3+r212056-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137068" version="1" comment="gcc48-c++ is &lt;4.8.3+r212056-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137069" version="1" comment="gcc48-fortran is &lt;4.8.3+r212056-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137070" version="1" comment="gcc48-gij is &lt;4.8.3+r212056-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137071" version="1" comment="gcc48-info is &lt;4.8.3+r212056-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137072" version="1" comment="gcc48-java is &lt;4.8.3+r212056-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137073" version="1" comment="gcc48-locale is &lt;4.8.3+r212056-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137074" version="1" comment="gcc48-objc is &lt;4.8.3+r212056-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137075" version="1" comment="libasan0 is &lt;4.8.3+r212056-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137076" version="1" comment="libatomic1 is &lt;4.8.3+r212056-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137077" version="1" comment="libffi4 is &lt;4.8.3+r212056-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137078" version="1" comment="libffi4-32bit is &lt;4.8.3+r212056-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137079" version="1" comment="libffi48-devel is &lt;4.8.3+r212056-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137080" version="1" comment="libgcc_s1 is &lt;4.8.3+r212056-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137081" version="1" comment="libgcc_s1-32bit is &lt;4.8.3+r212056-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137082" version="1" comment="libgcj48 is &lt;4.8.3+r212056-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137083" version="1" comment="libgcj48-devel is &lt;4.8.3+r212056-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137084" version="1" comment="libgcj48-jar is &lt;4.8.3+r212056-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137085" version="1" comment="libgcj_bc1 is &lt;4.8.3+r212056-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137086" version="1" comment="libgfortran3 is &lt;4.8.3+r212056-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137087" version="1" comment="libgomp1 is &lt;4.8.3+r212056-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137088" version="1" comment="libitm1 is &lt;4.8.3+r212056-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137089" version="1" comment="libobjc4 is &lt;4.8.3+r212056-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137090" version="1" comment="libquadmath0 is &lt;4.8.3+r212056-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137091" version="1" comment="libstdc++48-devel is &lt;4.8.3+r212056-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137092" version="1" comment="libstdc++6 is &lt;4.8.3+r212056-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137093" version="1" comment="libstdc++6-32bit is &lt;4.8.3+r212056-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137094" version="1" comment="libstdc++6-locale is &lt;4.8.3+r212056-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137095" version="1" comment="libtsan0 is &lt;4.8.3+r212056-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137096" version="1" comment="cron is &lt;4.2-56.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137097" version="1" comment="cronie is &lt;1.4.12-56.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137098" version="1" comment="cups is &lt;1.5.4-21.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137099" version="1" comment="cups-client is &lt;1.5.4-21.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137100" version="1" comment="cups-devel is &lt;1.5.4-21.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137101" version="1" comment="cups-libs is &lt;1.5.4-21.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137102" version="1" comment="cups-libs-32bit is &lt;1.5.4-21.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137103" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-2.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137104" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-2.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137105" version="1" comment="cups-pk-helper is &lt;0.2.5-4.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137106" version="1" comment="curl is &lt;7.38.0-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137107" version="1" comment="libcurl-devel is &lt;7.38.0-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137108" version="1" comment="libcurl4 is &lt;7.38.0-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137109" version="1" comment="cvs is &lt;1.12.12-182.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137110" version="1" comment="cyradm is &lt;2.4.17-2.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137111" version="1" comment="cyrus-imapd is &lt;2.4.17-2.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137112" version="1" comment="perl-Cyrus-IMAP is &lt;2.4.17-2.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137113" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.4.17-2.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137114" version="1" comment="cyrus-sasl is &lt;2.1.26-7.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137115" version="1" comment="cyrus-sasl-crammd5 is &lt;2.1.26-7.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137116" version="1" comment="cyrus-sasl-devel is &lt;2.1.26-7.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137117" version="1" comment="cyrus-sasl-digestmd5 is &lt;2.1.26-7.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137118" version="1" comment="cyrus-sasl-gssapi is &lt;2.1.26-7.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137119" version="1" comment="cyrus-sasl-plain is &lt;2.1.26-7.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137120" version="1" comment="libsasl2-3 is &lt;2.1.26-7.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137121" version="1" comment="libsasl2-3-32bit is &lt;2.1.26-7.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137122" version="1" comment="dbus-1 is &lt;1.8.8-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137123" version="1" comment="dbus-1-devel is &lt;1.8.8-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137124" version="1" comment="dbus-1-x11 is &lt;1.8.8-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137125" version="1" comment="libdbus-1-3 is &lt;1.8.8-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137126" version="1" comment="libdbus-1-3-32bit is &lt;1.8.8-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137127" version="1" comment="dbus-1-glib is &lt;0.102-2.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137128" version="1" comment="dbus-1-glib-32bit is &lt;0.102-2.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137129" version="1" comment="dbus-1-glib-devel is &lt;0.102-2.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137130" version="1" comment="dhcp is &lt;4.2.6-9.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137131" version="1" comment="dhcp-client is &lt;4.2.6-9.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137132" version="1" comment="dhcp-doc is &lt;4.2.6-9.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137133" version="1" comment="dhcp-relay is &lt;4.2.6-9.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137134" version="1" comment="dhcp-server is &lt;4.2.6-9.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137135" version="1" comment="dhcpcd is &lt;3.2.3-47.80.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137136" version="1" comment="dia is &lt;0.97.3-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137137" version="1" comment="dia-lang is &lt;0.97.3-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137138" version="1" comment="dracut is &lt;037-17.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137139" version="1" comment="elfutils is &lt;0.158-4.2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137140" version="1" comment="libasm1 is &lt;0.158-4.2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137141" version="1" comment="libdw1 is &lt;0.158-4.2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137142" version="1" comment="libelf1 is &lt;0.158-4.2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137143" version="1" comment="libelf1-32bit is &lt;0.158-4.2.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137144" version="1" comment="emacs is &lt;24.3-17.2.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137145" version="1" comment="emacs-info is &lt;24.3-17.2.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137146" version="1" comment="emacs-nox is &lt;24.3-17.2.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137147" version="1" comment="emacs-x11 is &lt;24.3-17.2.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137148" version="1" comment="etags is &lt;24.3-17.2.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137149" version="1" comment="empathy is &lt;3.12.7-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137150" version="1" comment="telepathy-mission-control-plugin-goa is &lt;3.12.7-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137151" version="1" comment="evince is &lt;3.14.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137152" version="1" comment="evince-browser-plugin is &lt;3.14.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137153" version="1" comment="libevdocument3-4 is &lt;3.14.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137154" version="1" comment="libevview3-3 is &lt;3.14.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137155" version="1" comment="nautilus-evince is &lt;3.14.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137156" version="1" comment="typelib-1_0-EvinceDocument-3_0 is &lt;3.14.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137157" version="1" comment="typelib-1_0-EvinceView-3_0 is &lt;3.14.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137158" version="1" comment="exif is &lt;0.6.21-6.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137159" version="1" comment="exim is &lt;4.83-3.1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137160" version="1" comment="expat is &lt;2.1.0-14.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137161" version="1" comment="libexpat-devel is &lt;2.1.0-14.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137162" version="1" comment="libexpat1 is &lt;2.1.0-14.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137163" version="1" comment="libexpat1-32bit is &lt;2.1.0-14.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137164" version="1" comment="fetchmail is &lt;6.3.26-6.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137165" version="1" comment="file is &lt;5.19-3.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137166" version="1" comment="file-devel is &lt;5.19-3.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137167" version="1" comment="file-magic is &lt;5.19-3.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137168" version="1" comment="libmagic1 is &lt;5.19-3.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137169" version="1" comment="libmagic1-32bit is &lt;5.19-3.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137170" version="1" comment="freerdp is &lt;1.0.2-8.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137171" version="1" comment="libfreerdp-1_0 is &lt;1.0.2-8.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137172" version="1" comment="libfreerdp-1_0-plugins is &lt;1.0.2-8.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137173" version="1" comment="freetype2-devel is &lt;2.5.3-2.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137174" version="1" comment="libfreetype6 is &lt;2.5.3-2.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137175" version="1" comment="libfreetype6-32bit is &lt;2.5.3-2.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137176" version="1" comment="ft2demos is &lt;2.5.3-2.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137177" version="1" comment="fuse is &lt;2.9.3-4.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137178" version="1" comment="libfuse2 is &lt;2.9.3-4.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137179" version="1" comment="g3utils is &lt;1.1.36-55.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137180" version="1" comment="mgetty is &lt;1.1.36-55.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137181" version="1" comment="sendfax is &lt;1.1.36-55.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137182" version="1" comment="gd is &lt;2.1.0-7.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137183" version="1" comment="libgd3 is &lt;2.1.0-7.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137184" version="1" comment="libgd3-32bit is &lt;2.1.0-7.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137185" version="1" comment="gdk-pixbuf-devel is &lt;2.31.1-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137186" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.31.1-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137187" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.31.1-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137188" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.31.1-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137189" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.31.1-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137190" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.31.1-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137191" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.40.5-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137192" version="1" comment="librsvg-2-2 is &lt;2.40.5-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137193" version="1" comment="librsvg-devel is &lt;2.40.5-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137194" version="1" comment="typelib-1_0-Rsvg-2_0 is &lt;2.40.5-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137195" version="1" comment="gdm is &lt;3.14.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137196" version="1" comment="gdmflexiserver is &lt;3.14.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137197" version="1" comment="libgdm1 is &lt;3.14.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137198" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.14.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137199" version="1" comment="gimp is &lt;2.8.14-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137200" version="1" comment="gimp-help-browser is &lt;2.8.14-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137201" version="1" comment="gimp-plugin-aa is &lt;2.8.14-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137202" version="1" comment="gimp-plugins-python is &lt;2.8.14-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137203" version="1" comment="libgimp-2_0-0 is &lt;2.8.14-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137204" version="1" comment="libgimpui-2_0-0 is &lt;2.8.14-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137205" version="1" comment="git is &lt;2.1.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137206" version="1" comment="git-core is &lt;2.1.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137207" version="1" comment="git-cvs is &lt;2.1.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137208" version="1" comment="git-daemon is &lt;2.1.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137209" version="1" comment="git-email is &lt;2.1.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137210" version="1" comment="git-gui is &lt;2.1.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137211" version="1" comment="git-svn is &lt;2.1.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137212" version="1" comment="git-web is &lt;2.1.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137213" version="1" comment="gitk is &lt;2.1.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137214" version="1" comment="glib2-devel is &lt;2.42.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137215" version="1" comment="glib2-tools is &lt;2.42.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137216" version="1" comment="libgio-2_0-0 is &lt;2.42.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137217" version="1" comment="libgio-2_0-0-32bit is &lt;2.42.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137218" version="1" comment="libglib-2_0-0 is &lt;2.42.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137219" version="1" comment="libglib-2_0-0-32bit is &lt;2.42.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137220" version="1" comment="libgmodule-2_0-0 is &lt;2.42.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137221" version="1" comment="libgmodule-2_0-0-32bit is &lt;2.42.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137222" version="1" comment="libgobject-2_0-0 is &lt;2.42.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137223" version="1" comment="libgobject-2_0-0-32bit is &lt;2.42.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137224" version="1" comment="libgthread-2_0-0 is &lt;2.42.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137225" version="1" comment="libgthread-2_0-0-32bit is &lt;2.42.0-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137226" version="1" comment="glibc is &lt;2.19-16.2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137227" version="1" comment="glibc-32bit is &lt;2.19-16.2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137228" version="1" comment="glibc-devel is &lt;2.19-16.2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137229" version="1" comment="glibc-extra is &lt;2.19-16.2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137230" version="1" comment="glibc-info is &lt;2.19-16.2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137231" version="1" comment="glibc-locale is &lt;2.19-16.2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137232" version="1" comment="glibc-locale-32bit is &lt;2.19-16.2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137233" version="1" comment="nscd is &lt;2.19-16.2.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137234" version="1" comment="gnome-games is &lt;3.10.0-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137235" version="1" comment="gnome-games-recommended is &lt;3.10.0-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137236" version="1" comment="gnome-keyring is &lt;3.14.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137237" version="1" comment="gnome-keyring-32bit is &lt;3.14.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137238" version="1" comment="gnome-keyring-pam is &lt;3.14.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137239" version="1" comment="gnome-keyring-pam-32bit is &lt;3.14.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137240" version="1" comment="libgck-modules-gnome-keyring is &lt;3.14.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137241" version="1" comment="gnome-online-accounts is &lt;3.14.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137242" version="1" comment="gnome-online-accounts-devel is &lt;3.14.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137243" version="1" comment="libgoa-1_0-0 is &lt;3.14.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137244" version="1" comment="libgoa-backend-1_0-1 is &lt;3.14.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137245" version="1" comment="typelib-1_0-Goa-1_0 is &lt;3.14.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137246" version="1" comment="gnome-shell is &lt;3.14.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137247" version="1" comment="gnome-shell-browser-plugin is &lt;3.14.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137248" version="1" comment="gnutls is &lt;3.2.18-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137249" version="1" comment="libgnutls-devel is &lt;3.2.18-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137250" version="1" comment="libgnutls-openssl27 is &lt;3.2.18-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137251" version="1" comment="libgnutls28 is &lt;3.2.18-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137252" version="1" comment="libgnutls28-32bit is &lt;3.2.18-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137253" version="1" comment="gpg2 is &lt;2.0.26-2.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137254" version="1" comment="gpgme is &lt;1.5.1-2.1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137255" version="1" comment="libgpgme-devel is &lt;1.5.1-2.1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137256" version="1" comment="libgpgme11 is &lt;1.5.1-2.1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137257" version="1" comment="groff is &lt;1.22.2-6.1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137258" version="1" comment="groff-full is &lt;1.22.2-6.1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137259" version="1" comment="gxditview is &lt;1.22.2-6.1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137260" version="1" comment="gv is &lt;3.7.4-2.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137261" version="1" comment="wdiff is &lt;1.2.2-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137262" version="1" comment="wdiff-lang is &lt;1.2.2-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137263" version="1" comment="gvim is &lt;7.4.461.hg.6253-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137264" version="1" comment="vim is &lt;7.4.461.hg.6253-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137265" version="1" comment="vim-data is &lt;7.4.461.hg.6253-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137266" version="1" comment="gzip is &lt;1.6-8.1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137267" version="1" comment="hardlink is &lt;1.0-7.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137268" version="1" comment="hplip is &lt;3.14.6-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137269" version="1" comment="hplip-hpijs is &lt;3.14.6-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137270" version="1" comment="hplip-sane is &lt;3.14.6-2.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137271" version="1" comment="htmldoc is &lt;1.8.27-196.1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137272" version="1" comment="hyper-v is &lt;6-8.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137273" version="1" comment="ibus-pinyin is &lt;1.5.0-8.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137274" version="1" comment="icedtea-web-javadoc is &lt;1.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137275" version="1" comment="java-1_7_0-openjdk-plugin is &lt;1.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137276" version="1" comment="java-1_8_0-openjdk-plugin is &lt;1.5.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137277" version="1" comment="id3lib is &lt;3.8.3-264.1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137278" version="1" comment="iputils is &lt;s20121221-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137279" version="1" comment="irssi is &lt;0.8.16-3.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137280" version="1" comment="jakarta-commons-fileupload is &lt;1.1.1-124.1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137281" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.71-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137282" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.71-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137283" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.71-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137284" version="1" comment="jhead is &lt;2.97-4.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137285" version="1" comment="kbd is &lt;2.0.2-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137286" version="1" comment="kde4-kgreeter-plugins is &lt;4.11.12-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137287" version="1" comment="kdebase4-wallpaper-default is &lt;4.14.2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137288" version="1" comment="kdebase4-wallpapers is &lt;4.14.2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137289" version="1" comment="kdebase4-workspace is &lt;4.11.12-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137290" version="1" comment="kdebase4-workspace-addons is &lt;4.11.12-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137291" version="1" comment="kdebase4-workspace-devel is &lt;4.11.12-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137292" version="1" comment="kdebase4-workspace-ksysguardd is &lt;4.11.12-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137293" version="1" comment="kdebase4-workspace-liboxygenstyle is &lt;4.11.12-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137294" version="1" comment="kdebase4-workspace-libs is &lt;4.11.12-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137295" version="1" comment="kdm is &lt;4.11.12-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137296" version="1" comment="kwin is &lt;4.11.12-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137297" version="1" comment="oxygen-cursors4 is &lt;4.11.12-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137298" version="1" comment="python-kdebase4 is &lt;4.11.12-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137299" version="1" comment="kdelibs4 is &lt;4.14.2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137300" version="1" comment="kdelibs4-core is &lt;4.14.2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137301" version="1" comment="kdelibs4-doc is &lt;4.14.2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137302" version="1" comment="libkde4 is &lt;4.14.2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137303" version="1" comment="libkde4-devel is &lt;4.14.2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137304" version="1" comment="libkdecore4 is &lt;4.14.2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137305" version="1" comment="libkdecore4-devel is &lt;4.14.2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137306" version="1" comment="libksuseinstall-devel is &lt;4.14.2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137307" version="1" comment="libksuseinstall1 is &lt;4.14.2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137308" version="1" comment="kdenetwork4-filesharing is &lt;4.14.2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137309" version="1" comment="kdnssd is &lt;4.14.2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137310" version="1" comment="kget is &lt;4.14.2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137311" version="1" comment="kopete is &lt;4.14.2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137312" version="1" comment="kppp is &lt;4.14.2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137313" version="1" comment="krdc is &lt;4.14.2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137314" version="1" comment="krfb is &lt;4.14.2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137315" version="1" comment="kernel-default is &lt;3.16.6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137316" version="1" comment="kernel-default-devel is &lt;3.16.6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137317" version="1" comment="kernel-desktop is &lt;3.16.6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137318" version="1" comment="kernel-desktop-devel is &lt;3.16.6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137319" version="1" comment="kernel-devel is &lt;3.16.6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137320" version="1" comment="kernel-docs is &lt;3.16.6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137321" version="1" comment="kernel-macros is &lt;3.16.6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137322" version="1" comment="kernel-pae is &lt;3.16.6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137323" version="1" comment="kernel-pae-base is &lt;3.16.6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137324" version="1" comment="kernel-pae-devel is &lt;3.16.6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137325" version="1" comment="kernel-source is &lt;3.16.6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137326" version="1" comment="kernel-syms is &lt;3.16.6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137327" version="1" comment="kernel-xen is &lt;3.16.6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137328" version="1" comment="kernel-xen-devel is &lt;3.16.6-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137329" version="1" comment="klogd is &lt;1.4.1-778.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137330" version="1" comment="syslog-service is &lt;2.0-778.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137331" version="1" comment="krb5 is &lt;1.12.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137332" version="1" comment="krb5-32bit is &lt;1.12.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137333" version="1" comment="krb5-client is &lt;1.12.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137334" version="1" comment="krb5-devel is &lt;1.12.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137335" version="1" comment="libFS-devel is &lt;1.0.6-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137336" version="1" comment="libFS6 is &lt;1.0.6-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137337" version="1" comment="libHX28 is &lt;3.22-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137338" version="1" comment="libHX28-32bit is &lt;3.22-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137339" version="1" comment="libIlmImf-Imf_2_1-21 is &lt;2.1.0-5.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137340" version="1" comment="openexr-devel is &lt;2.1.0-5.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137341" version="1" comment="libImlib2-1 is &lt;1.4.5-17.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137342" version="1" comment="libSDL_sound-1_0-1 is &lt;1.0.3-91.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137343" version="1" comment="vorbis-tools is &lt;1.4.0-17.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137344" version="1" comment="libX11-6 is &lt;1.6.2-5.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137345" version="1" comment="libX11-6-32bit is &lt;1.6.2-5.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137346" version="1" comment="libX11-data is &lt;1.6.2-5.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137347" version="1" comment="libX11-devel is &lt;1.6.2-5.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137348" version="1" comment="libX11-xcb1 is &lt;1.6.2-5.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137349" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-5.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137350" version="1" comment="libXRes1 is &lt;1.0.7-4.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137351" version="1" comment="libXres-devel is &lt;1.0.7-4.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137352" version="1" comment="libXcursor-devel is &lt;1.1.14-5.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137353" version="1" comment="libXcursor1 is &lt;1.1.14-5.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137354" version="1" comment="libXcursor1-32bit is &lt;1.1.14-5.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137355" version="1" comment="libXext-devel is &lt;1.3.3-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137356" version="1" comment="libXext6 is &lt;1.3.3-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137357" version="1" comment="libXext6-32bit is &lt;1.3.3-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137358" version="1" comment="libXfixes-devel is &lt;5.0.1-4.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137359" version="1" comment="libXfixes3 is &lt;5.0.1-4.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137360" version="1" comment="libXfixes3-32bit is &lt;5.0.1-4.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137361" version="1" comment="libXfont-devel is &lt;1.5.0-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137362" version="1" comment="libXfont1 is &lt;1.5.0-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137363" version="1" comment="libXi-devel is &lt;1.7.4-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137364" version="1" comment="libXi6 is &lt;1.7.4-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137365" version="1" comment="libXi6-32bit is &lt;1.7.4-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137366" version="1" comment="libXinerama-devel is &lt;1.1.3-4.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137367" version="1" comment="libXinerama1 is &lt;1.1.3-4.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137368" version="1" comment="libXinerama1-32bit is &lt;1.1.3-4.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137369" version="1" comment="libXp-devel is &lt;1.0.2-4.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137370" version="1" comment="libXp6 is &lt;1.0.2-4.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137371" version="1" comment="libXrandr-devel is &lt;1.4.2-4.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137372" version="1" comment="libXrandr2 is &lt;1.4.2-4.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137373" version="1" comment="libXrandr2-32bit is &lt;1.4.2-4.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137374" version="1" comment="libXrender-devel is &lt;0.9.8-4.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137375" version="1" comment="libXrender1 is &lt;0.9.8-4.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137376" version="1" comment="libXrender1-32bit is &lt;0.9.8-4.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137377" version="1" comment="libXt-devel is &lt;1.1.4-4.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137378" version="1" comment="libXt6 is &lt;1.1.4-4.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137379" version="1" comment="libXt6-32bit is &lt;1.1.4-4.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137380" version="1" comment="libXtst-devel is &lt;1.2.2-4.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137381" version="1" comment="libXtst6 is &lt;1.2.2-4.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137382" version="1" comment="libXv-devel is &lt;1.0.10-4.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137383" version="1" comment="libXv1 is &lt;1.0.10-4.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137384" version="1" comment="libXv1-32bit is &lt;1.0.10-4.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137385" version="1" comment="libXvMC-devel is &lt;1.0.8-4.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137386" version="1" comment="libXvMC1 is &lt;1.0.8-4.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137387" version="1" comment="libXxf86dga-devel is &lt;1.1.4-4.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137388" version="1" comment="libXxf86dga1 is &lt;1.1.4-4.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137389" version="1" comment="libXxf86vm-devel is &lt;1.1.3-4.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137390" version="1" comment="libXxf86vm1 is &lt;1.1.3-4.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137391" version="1" comment="libXxf86vm1-32bit is &lt;1.1.3-4.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137392" version="1" comment="libapr-util1 is &lt;1.5.3-2.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137393" version="1" comment="libapr-util1-devel is &lt;1.5.3-2.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137394" version="1" comment="libapr1 is &lt;1.5.1-4.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137395" version="1" comment="libapr1-devel is &lt;1.5.1-4.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137396" version="1" comment="libavutil52 is &lt;2.1.4-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137397" version="1" comment="libblkid-devel is &lt;2.25.1-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137398" version="1" comment="libblkid1 is &lt;2.25.1-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137399" version="1" comment="libblkid1-32bit is &lt;2.25.1-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137400" version="1" comment="libmount1 is &lt;2.25.1-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137401" version="1" comment="libmount1-32bit is &lt;2.25.1-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137402" version="1" comment="libsmartcols1 is &lt;2.25.1-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137403" version="1" comment="libuuid-devel is &lt;2.25.1-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137404" version="1" comment="libuuid1 is &lt;2.25.1-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137405" version="1" comment="libuuid1-32bit is &lt;2.25.1-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137406" version="1" comment="util-linux is &lt;2.25.1-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137407" version="1" comment="util-linux-systemd is &lt;2.25.1-2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137408" version="1" comment="libcacard0 is &lt;2.1.0-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137409" version="1" comment="qemu is &lt;2.1.0-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137410" version="1" comment="qemu-arm is &lt;2.1.0-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137411" version="1" comment="qemu-block-curl is &lt;2.1.0-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137412" version="1" comment="qemu-extra is &lt;2.1.0-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137413" version="1" comment="qemu-ipxe is &lt;1.0.0-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137414" version="1" comment="qemu-ksm is &lt;2.1.0-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137415" version="1" comment="qemu-kvm is &lt;2.1.0-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137416" version="1" comment="qemu-lang is &lt;2.1.0-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137417" version="1" comment="qemu-ppc is &lt;2.1.0-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137418" version="1" comment="qemu-s390 is &lt;2.1.0-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137419" version="1" comment="qemu-seabios is &lt;1.7.5-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137420" version="1" comment="qemu-sgabios is &lt;8-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137421" version="1" comment="qemu-tools is &lt;2.1.0-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137422" version="1" comment="qemu-vgabios is &lt;1.7.5-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137423" version="1" comment="qemu-x86 is &lt;2.1.0-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137424" version="1" comment="libdcerpc-binding0 is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137425" version="1" comment="libdcerpc-binding0-32bit is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137426" version="1" comment="libdcerpc0 is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137427" version="1" comment="libdcerpc0-32bit is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137428" version="1" comment="libgensec0 is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137429" version="1" comment="libgensec0-32bit is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137430" version="1" comment="libndr-krb5pac0 is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137431" version="1" comment="libndr-krb5pac0-32bit is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137432" version="1" comment="libndr-nbt0 is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137433" version="1" comment="libndr-nbt0-32bit is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137434" version="1" comment="libndr-standard0 is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137435" version="1" comment="libndr-standard0-32bit is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137436" version="1" comment="libndr0 is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137437" version="1" comment="libndr0-32bit is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137438" version="1" comment="libnetapi0 is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137439" version="1" comment="libnetapi0-32bit is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137440" version="1" comment="libpdb0 is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137441" version="1" comment="libpdb0-32bit is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137442" version="1" comment="libregistry0 is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137443" version="1" comment="libsamba-credentials0 is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137444" version="1" comment="libsamba-credentials0-32bit is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137445" version="1" comment="libsamba-hostconfig0 is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137446" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137447" version="1" comment="libsamba-util0 is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137448" version="1" comment="libsamba-util0-32bit is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137449" version="1" comment="libsamdb0 is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137450" version="1" comment="libsamdb0-32bit is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137451" version="1" comment="libsmbclient-devel is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137452" version="1" comment="libsmbclient-raw0 is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137453" version="1" comment="libsmbclient-raw0-32bit is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137454" version="1" comment="libsmbclient0 is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137455" version="1" comment="libsmbconf0 is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137456" version="1" comment="libsmbconf0-32bit is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137457" version="1" comment="libsmbldap0 is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137458" version="1" comment="libsmbldap0-32bit is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137459" version="1" comment="libtevent-util0 is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137460" version="1" comment="libtevent-util0-32bit is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137461" version="1" comment="libwbclient0 is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137462" version="1" comment="libwbclient0-32bit is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137463" version="1" comment="samba is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137464" version="1" comment="samba-32bit is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137465" version="1" comment="samba-client is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137466" version="1" comment="samba-client-32bit is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137467" version="1" comment="samba-doc is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137468" version="1" comment="samba-libs is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137469" version="1" comment="samba-libs-32bit is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137470" version="1" comment="samba-winbind is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137471" version="1" comment="samba-winbind-32bit is &lt;4.1.12-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137472" version="1" comment="libdmx-devel is &lt;1.1.3-4.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137473" version="1" comment="libdmx1 is &lt;1.1.3-4.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137474" version="1" comment="libecpg6 is &lt;9.3.5-2.1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137475" version="1" comment="libpq5 is &lt;9.3.5-2.1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137476" version="1" comment="libpq5-32bit is &lt;9.3.5-2.1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137477" version="1" comment="postgresql93 is &lt;9.3.5-2.1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137478" version="1" comment="postgresql93-contrib is &lt;9.3.5-2.1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137479" version="1" comment="postgresql93-devel is &lt;9.3.5-2.1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137480" version="1" comment="postgresql93-docs is &lt;9.3.5-2.1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137481" version="1" comment="postgresql93-server is &lt;9.3.5-2.1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137482" version="1" comment="libexif-devel is &lt;0.6.21-9.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137483" version="1" comment="libexif12 is &lt;0.6.21-9.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137484" version="1" comment="libexif12-32bit is &lt;0.6.21-9.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137485" version="1" comment="libfbembed2_5 is &lt;2.5.2.26539-14.1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137486" version="1" comment="libfreebl3 is &lt;3.17.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137487" version="1" comment="libsoftokn3 is &lt;3.17.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137488" version="1" comment="mozilla-nss is &lt;3.17.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137489" version="1" comment="mozilla-nss-certs is &lt;3.17.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137490" version="1" comment="mozilla-nss-devel is &lt;3.17.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137491" version="1" comment="mozilla-nss-tools is &lt;3.17.1-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137492" version="1" comment="libgadu-devel is &lt;1.12.0-2.1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137493" version="1" comment="libgadu3 is &lt;1.12.0-2.1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137494" version="1" comment="libgc1 is &lt;7.2d-4.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137495" version="1" comment="libgcrypt-devel is &lt;1.6.1-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137496" version="1" comment="libgcrypt20 is &lt;1.6.1-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137497" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137498" version="1" comment="libgnomesu is &lt;1.0.0-353.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137499" version="1" comment="libgnomesu0 is &lt;1.0.0-353.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137500" version="1" comment="libgssglue-devel is &lt;0.4-4.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137501" version="1" comment="libgssglue1 is &lt;0.4-4.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137502" version="1" comment="libgudev-1_0-0 is &lt;210-25.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137503" version="1" comment="libgudev-1_0-devel is &lt;210-25.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137504" version="1" comment="libudev-devel is &lt;210-25.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137505" version="1" comment="libudev1 is &lt;210-25.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137506" version="1" comment="libudev1-32bit is &lt;210-25.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137507" version="1" comment="systemd is &lt;210-25.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137508" version="1" comment="systemd-32bit is &lt;210-25.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137509" version="1" comment="systemd-bash-completion is &lt;210-25.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137510" version="1" comment="systemd-logger is &lt;210-25.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137511" version="1" comment="systemd-sysvinit is &lt;210-25.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137512" version="1" comment="typelib-1_0-GUdev-1_0 is &lt;210-25.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137513" version="1" comment="udev is &lt;210-25.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137514" version="1" comment="libid3tag0 is &lt;0.15.1b-183.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137515" version="1" comment="libimobiledevice-devel is &lt;1.1.6-2.1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137516" version="1" comment="libimobiledevice4 is &lt;1.1.6-2.1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137517" version="1" comment="libjavascriptcoregtk-1_0-0 is &lt;2.4.6-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137518" version="1" comment="libjavascriptcoregtk-3_0-0 is &lt;2.4.6-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137519" version="1" comment="libwebkitgtk-1_0-0 is &lt;2.4.6-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137520" version="1" comment="libwebkitgtk-3_0-0 is &lt;2.4.6-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137521" version="1" comment="libwebkitgtk-devel is &lt;2.4.6-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137522" version="1" comment="typelib-1_0-JavaScriptCore-1_0 is &lt;2.4.6-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137523" version="1" comment="typelib-1_0-JavaScriptCore-3_0 is &lt;2.4.6-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137524" version="1" comment="typelib-1_0-WebKit-1_0 is &lt;2.4.6-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137525" version="1" comment="typelib-1_0-WebKit-3_0 is &lt;2.4.6-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137526" version="1" comment="libjbig2 is &lt;2.1-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137527" version="1" comment="libjbig2-32bit is &lt;2.1-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137528" version="1" comment="libjson-c2 is &lt;0.12-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137529" version="1" comment="libjson-c2-32bit is &lt;0.12-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137530" version="1" comment="liblcms1 is &lt;1.19-18.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137531" version="1" comment="python-lcms is &lt;1.19-18.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137532" version="1" comment="liblightdm-gobject-1-0 is &lt;1.12.1-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137533" version="1" comment="lightdm is &lt;1.12.1-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137534" version="1" comment="lightdm-lang is &lt;1.12.1-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137535" version="1" comment="libltdl7 is &lt;2.4.2-15.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137536" version="1" comment="libltdl7-32bit is &lt;2.4.2-15.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137537" version="1" comment="libtool is &lt;2.4.2-15.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137538" version="1" comment="liblzo2-2 is &lt;2.08-3.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137539" version="1" comment="libmikmod3 is &lt;3.3.6-3.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137540" version="1" comment="libminiupnpc10 is &lt;1.9-2.1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137541" version="1" comment="libmms-devel is &lt;0.6.4-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137542" version="1" comment="libmms0 is &lt;0.6.4-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137543" version="1" comment="libmodplug1 is &lt;0.8.8.5-3.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137544" version="1" comment="libmspack0 is &lt;0.4-5.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137545" version="1" comment="libmusicbrainz-devel is &lt;2.1.5-28.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137546" version="1" comment="libmusicbrainz4 is &lt;2.1.5-28.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137547" version="1" comment="libmysqlclient-devel is &lt;10.0.13-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137548" version="1" comment="libmysqlclient18 is &lt;10.0.13-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137549" version="1" comment="libmysqlclient18-32bit is &lt;10.0.13-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137550" version="1" comment="libmysqlclient_r18 is &lt;10.0.13-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137551" version="1" comment="libmysqld18 is &lt;10.0.13-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137552" version="1" comment="mariadb is &lt;10.0.13-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137553" version="1" comment="mariadb-client is &lt;10.0.13-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137554" version="1" comment="mariadb-errormessages is &lt;10.0.13-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137555" version="1" comment="libneon27 is &lt;0.30.0-4.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137556" version="1" comment="libnewt0_52 is &lt;0.52.16-2.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137557" version="1" comment="libopenjpeg1 is &lt;1.5.2-2.1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137558" version="1" comment="libopenssl-devel is &lt;1.0.1i-2.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137559" version="1" comment="libopenssl1_0_0 is &lt;1.0.1i-2.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137560" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1i-2.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137561" version="1" comment="openssl is &lt;1.0.1i-2.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137562" version="1" comment="libpango-1_0-0 is &lt;1.36.8-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137563" version="1" comment="libpango-1_0-0-32bit is &lt;1.36.8-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137564" version="1" comment="pango-devel is &lt;1.36.8-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137565" version="1" comment="pango-tools is &lt;1.36.8-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137566" version="1" comment="pango-tools-32bit is &lt;1.36.8-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137567" version="1" comment="typelib-1_0-Pango-1_0 is &lt;1.36.8-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137568" version="1" comment="libpcsclite1 is &lt;1.8.11-4.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137569" version="1" comment="pcsc-lite is &lt;1.8.11-4.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137570" version="1" comment="libpng12-0 is &lt;1.2.51-3.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137571" version="1" comment="libpng12-0-32bit is &lt;1.2.51-3.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137572" version="1" comment="libpng12-compat-devel is &lt;1.2.51-3.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137573" version="1" comment="libpng12-devel is &lt;1.2.51-3.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137574" version="1" comment="libpng16-16 is &lt;1.6.13-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137575" version="1" comment="libpng16-16-32bit is &lt;1.6.13-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137576" version="1" comment="libpng16-devel is &lt;1.6.13-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137577" version="1" comment="libpolkit0 is &lt;0.112-3.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137578" version="1" comment="polkit is &lt;0.112-3.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137579" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.112-3.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137580" version="1" comment="libpoppler-cpp0 is &lt;0.26.5-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137581" version="1" comment="libpoppler-devel is &lt;0.26.5-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137582" version="1" comment="libpoppler-glib8 is &lt;0.26.5-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137583" version="1" comment="libpoppler-qt4-4 is &lt;0.26.5-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137584" version="1" comment="libpoppler-qt4-devel is &lt;0.26.5-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137585" version="1" comment="libpoppler46 is &lt;0.26.5-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137586" version="1" comment="poppler-tools is &lt;0.26.5-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137587" version="1" comment="libproxy-devel is &lt;0.4.11-12.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137588" version="1" comment="libproxy1 is &lt;0.4.11-12.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137589" version="1" comment="libproxy1-config-gnome3 is &lt;0.4.11-12.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137590" version="1" comment="libproxy1-config-kde4 is &lt;0.4.11-12.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137591" version="1" comment="libproxy1-networkmanager is &lt;0.4.11-12.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137592" version="1" comment="libproxy1-pacrunner-webkit is &lt;0.4.11-12.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137593" version="1" comment="libpulse-devel is &lt;5.0-4.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137594" version="1" comment="libpulse-mainloop-glib0 is &lt;5.0-4.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137595" version="1" comment="libpulse0 is &lt;5.0-4.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137596" version="1" comment="libpulse0-32bit is &lt;5.0-4.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137597" version="1" comment="pulseaudio is &lt;5.0-4.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137598" version="1" comment="pulseaudio-module-bluetooth is &lt;5.0-4.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137599" version="1" comment="pulseaudio-module-gconf is &lt;5.0-4.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137600" version="1" comment="pulseaudio-module-jack is &lt;5.0-4.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137601" version="1" comment="pulseaudio-module-lirc is &lt;5.0-4.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137602" version="1" comment="pulseaudio-module-x11 is &lt;5.0-4.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137603" version="1" comment="pulseaudio-module-zeroconf is &lt;5.0-4.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137604" version="1" comment="pulseaudio-utils is &lt;5.0-4.2.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137605" version="1" comment="libpurple is &lt;2.10.9-5.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137606" version="1" comment="libpurple-meanwhile is &lt;2.10.9-5.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137607" version="1" comment="libpurple-tcl is &lt;2.10.9-5.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137608" version="1" comment="pidgin is &lt;2.10.9-5.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137609" version="1" comment="libpython2_7-1_0 is &lt;2.7.8-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137610" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.8-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137611" version="1" comment="python-base is &lt;2.7.8-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137612" version="1" comment="python-devel is &lt;2.7.8-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137613" version="1" comment="python-xml is &lt;2.7.8-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137614" version="1" comment="libpython3_4m1_0 is &lt;3.4.1-4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137615" version="1" comment="python3-base is &lt;3.4.1-4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137616" version="1" comment="libqt4 is &lt;4.8.6-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137617" version="1" comment="libqt4-32bit is &lt;4.8.6-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137618" version="1" comment="libqt4-devel is &lt;4.8.6-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137619" version="1" comment="libqt4-linguist is &lt;4.8.6-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137620" version="1" comment="libqt4-qt3support is &lt;4.8.6-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137621" version="1" comment="libqt4-qt3support-32bit is &lt;4.8.6-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137622" version="1" comment="libqt4-sql is &lt;4.8.6-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137623" version="1" comment="libqt4-sql-32bit is &lt;4.8.6-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137624" version="1" comment="libqt4-sql-mysql is &lt;4.8.6-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137625" version="1" comment="libqt4-sql-mysql-32bit is &lt;4.8.6-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137626" version="1" comment="libqt4-sql-postgresql is &lt;4.8.6-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137627" version="1" comment="libqt4-sql-postgresql-32bit is &lt;4.8.6-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137628" version="1" comment="libqt4-sql-sqlite is &lt;4.8.6-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137629" version="1" comment="libqt4-sql-sqlite-32bit is &lt;4.8.6-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137630" version="1" comment="libqt4-sql-unixODBC is &lt;4.8.6-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137631" version="1" comment="libqt4-sql-unixODBC-32bit is &lt;4.8.6-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137632" version="1" comment="libqt4-x11 is &lt;4.8.6-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137633" version="1" comment="libqt4-x11-32bit is &lt;4.8.6-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137634" version="1" comment="libraptor-devel is &lt;2.0.10-4.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137635" version="1" comment="libraptor2-0 is &lt;2.0.10-4.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137636" version="1" comment="raptor is &lt;2.0.10-4.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137637" version="1" comment="libraw-devel is &lt;0.16.0-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137638" version="1" comment="libraw10 is &lt;0.16.0-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137639" version="1" comment="libreoffice is &lt;4.3.2.2-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137640" version="1" comment="libreoffice-base is &lt;4.3.2.2-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137641" version="1" comment="libreoffice-base-drivers-mysql is &lt;4.3.2.2-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137642" version="1" comment="libreoffice-calc is &lt;4.3.2.2-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137643" version="1" comment="libreoffice-calc-extensions is &lt;4.3.2.2-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137644" version="1" comment="libreoffice-draw is &lt;4.3.2.2-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137645" version="1" comment="libreoffice-filters-optional is &lt;4.3.2.2-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137646" version="1" comment="libreoffice-gnome is &lt;4.3.2.2-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137647" version="1" comment="libreoffice-icon-theme-galaxy is &lt;4.3.2.2-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137648" version="1" comment="libreoffice-icon-theme-hicontrast is &lt;4.3.2.2-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137649" version="1" comment="libreoffice-icon-theme-oxygen is &lt;4.3.2.2-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137650" version="1" comment="libreoffice-icon-theme-sifr is &lt;4.3.2.2-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137651" version="1" comment="libreoffice-icon-theme-tango is &lt;4.3.2.2-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137652" version="1" comment="libreoffice-impress is &lt;4.3.2.2-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137653" version="1" comment="libreoffice-kde4 is &lt;4.3.2.2-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137654" version="1" comment="libreoffice-l10n-cs is &lt;4.3.2.2-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137655" version="1" comment="libreoffice-l10n-da is &lt;4.3.2.2-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137656" version="1" comment="libreoffice-l10n-de is &lt;4.3.2.2-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137657" version="1" comment="libreoffice-l10n-el is &lt;4.3.2.2-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137658" version="1" comment="libreoffice-l10n-en is &lt;4.3.2.2-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137659" version="1" comment="libreoffice-l10n-es is &lt;4.3.2.2-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137660" version="1" comment="libreoffice-l10n-fr is &lt;4.3.2.2-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137661" version="1" comment="libreoffice-l10n-hu is &lt;4.3.2.2-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137662" version="1" comment="libreoffice-l10n-it is &lt;4.3.2.2-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137663" version="1" comment="libreoffice-l10n-ja is &lt;4.3.2.2-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137664" version="1" comment="libreoffice-l10n-pl is &lt;4.3.2.2-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137665" version="1" comment="libreoffice-l10n-ru is &lt;4.3.2.2-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137666" version="1" comment="libreoffice-mailmerge is &lt;4.3.2.2-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137667" version="1" comment="libreoffice-math is &lt;4.3.2.2-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137668" version="1" comment="libreoffice-pyuno is &lt;4.3.2.2-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137669" version="1" comment="libreoffice-writer is &lt;4.3.2.2-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137670" version="1" comment="libreoffice-writer-extensions is &lt;4.3.2.2-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137671" version="1" comment="libruby2_1-2_1 is &lt;2.1.3-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137672" version="1" comment="ruby2.1 is &lt;2.1.3-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137673" version="1" comment="ruby2.1-devel is &lt;2.1.3-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137674" version="1" comment="ruby2.1-stdlib is &lt;2.1.3-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137675" version="1" comment="libserf-1-1 is &lt;1.3.7-2.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137676" version="1" comment="libsilc-1_1-2 is &lt;1.1.10-25.1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137677" version="1" comment="libsilcclient-1_1-3 is &lt;1.1.10-25.1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137678" version="1" comment="silc-toolkit is &lt;1.1.10-25.1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137679" version="1" comment="libsmi is &lt;0.4.8-19.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137680" version="1" comment="libsmi2 is &lt;0.4.8-19.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137681" version="1" comment="libsndfile-devel is &lt;1.0.25-19.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137682" version="1" comment="libsndfile1 is &lt;1.0.25-19.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137683" version="1" comment="libsndfile1-32bit is &lt;1.0.25-19.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137684" version="1" comment="libsnmp30 is &lt;5.7.3-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137685" version="1" comment="libsnmp30-32bit is &lt;5.7.3-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137686" version="1" comment="net-snmp is &lt;5.7.3-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137687" version="1" comment="net-snmp-devel is &lt;5.7.3-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137688" version="1" comment="perl-SNMP is &lt;5.7.3-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137689" version="1" comment="snmp-mibs is &lt;5.7.3-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137690" version="1" comment="libsoup-2_4-1 is &lt;2.48.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137691" version="1" comment="libsoup-devel is &lt;2.48.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137692" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.48.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137693" version="1" comment="libspice-client-glib-2_0-8 is &lt;0.25-2.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137694" version="1" comment="libspice-client-gtk-2_0-4 is &lt;0.25-2.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137695" version="1" comment="libspice-client-gtk-3_0-4 is &lt;0.25-2.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137696" version="1" comment="libspice-controller0 is &lt;0.25-2.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137697" version="1" comment="python-SpiceClientGtk is &lt;0.25-2.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137698" version="1" comment="typelib-1_0-SpiceClientGlib-2_0 is &lt;0.25-2.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137699" version="1" comment="typelib-1_0-SpiceClientGtk-2_0 is &lt;0.25-2.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137700" version="1" comment="libssh-devel is &lt;0.6.3-2.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137701" version="1" comment="libssh4 is &lt;0.6.3-2.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137702" version="1" comment="libsss_idmap0 is &lt;1.12.0-3.1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137703" version="1" comment="libsss_nss_idmap0 is &lt;1.12.0-3.1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137704" version="1" comment="sssd is &lt;1.12.0-3.1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137705" version="1" comment="sssd-32bit is &lt;1.12.0-3.1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137706" version="1" comment="sssd-krb5-common is &lt;1.12.0-3.1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137707" version="1" comment="sssd-ldap is &lt;1.12.0-3.1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137708" version="1" comment="libtag-devel is &lt;1.9.1-3.1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137709" version="1" comment="libtag1 is &lt;1.9.1-3.1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137710" version="1" comment="libtag_c0 is &lt;1.9.1-3.1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137711" version="1" comment="taglib is &lt;1.9.1-3.1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137712" version="1" comment="libtasn1 is &lt;3.7-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137713" version="1" comment="libtasn1-6 is &lt;3.7-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137714" version="1" comment="libtasn1-6-32bit is &lt;3.7-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137715" version="1" comment="libtasn1-devel is &lt;3.7-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137716" version="1" comment="libthunarx-2-0 is &lt;1.6.3-4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137717" version="1" comment="thunar is &lt;1.6.3-4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137718" version="1" comment="thunar-lang is &lt;1.6.3-4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137719" version="1" comment="libtiff-devel is &lt;4.0.3-10.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137720" version="1" comment="libtiff5 is &lt;4.0.3-10.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137721" version="1" comment="libtiff5-32bit is &lt;4.0.3-10.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137722" version="1" comment="tiff is &lt;4.0.3-10.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137723" version="1" comment="libudisks2-0 is &lt;2.1.3-2.1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137724" version="1" comment="udisks2 is &lt;2.1.3-2.1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137725" version="1" comment="libupnp6 is &lt;1.6.18-4.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137726" version="1" comment="libvirt is &lt;1.2.9-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137727" version="1" comment="libvirt-client is &lt;1.2.9-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137728" version="1" comment="libvirt-daemon is &lt;1.2.9-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137729" version="1" comment="libvirt-daemon-config-network is &lt;1.2.9-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137730" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.9-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137731" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.9-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137732" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.9-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137733" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.9-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137734" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.9-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137735" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.9-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137736" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.9-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137737" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.9-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137738" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.9-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137739" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.9-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137740" version="1" comment="libvirt-daemon-driver-uml is &lt;1.2.9-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137741" version="1" comment="libvirt-daemon-driver-vbox is &lt;1.2.9-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137742" version="1" comment="libvirt-daemon-driver-xen is &lt;1.2.9-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137743" version="1" comment="libvirt-daemon-qemu is &lt;1.2.9-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137744" version="1" comment="libvirt-daemon-xen is &lt;1.2.9-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137745" version="1" comment="libvorbis-devel is &lt;1.3.4-3.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137746" version="1" comment="libvorbis0 is &lt;1.3.4-3.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137747" version="1" comment="libvorbis0-32bit is &lt;1.3.4-3.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137748" version="1" comment="libvorbisenc2 is &lt;1.3.4-3.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137749" version="1" comment="libvorbisenc2-32bit is &lt;1.3.4-3.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137750" version="1" comment="libvorbisfile3 is &lt;1.3.4-3.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137751" version="1" comment="libvorbisfile3-32bit is &lt;1.3.4-3.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137752" version="1" comment="libvte9 is &lt;0.28.2-18.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137753" version="1" comment="vte2-lang is &lt;0.28.2-18.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137754" version="1" comment="libxcb-composite0 is &lt;1.11-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137755" version="1" comment="libxcb-damage0 is &lt;1.11-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137756" version="1" comment="libxcb-devel is &lt;1.11-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137757" version="1" comment="libxcb-dpms0 is &lt;1.11-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137758" version="1" comment="libxcb-dri2-0 is &lt;1.11-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137759" version="1" comment="libxcb-dri2-0-32bit is &lt;1.11-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137760" version="1" comment="libxcb-dri3-0 is &lt;1.11-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137761" version="1" comment="libxcb-dri3-0-32bit is &lt;1.11-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137762" version="1" comment="libxcb-glx0 is &lt;1.11-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137763" version="1" comment="libxcb-glx0-32bit is &lt;1.11-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137764" version="1" comment="libxcb-present0 is &lt;1.11-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137765" version="1" comment="libxcb-present0-32bit is &lt;1.11-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137766" version="1" comment="libxcb-randr0 is &lt;1.11-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137767" version="1" comment="libxcb-record0 is &lt;1.11-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137768" version="1" comment="libxcb-render0 is &lt;1.11-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137769" version="1" comment="libxcb-render0-32bit is &lt;1.11-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137770" version="1" comment="libxcb-res0 is &lt;1.11-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137771" version="1" comment="libxcb-screensaver0 is &lt;1.11-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137772" version="1" comment="libxcb-shape0 is &lt;1.11-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137773" version="1" comment="libxcb-shm0 is &lt;1.11-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137774" version="1" comment="libxcb-shm0-32bit is &lt;1.11-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137775" version="1" comment="libxcb-sync1 is &lt;1.11-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137776" version="1" comment="libxcb-sync1-32bit is &lt;1.11-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137777" version="1" comment="libxcb-xevie0 is &lt;1.11-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137778" version="1" comment="libxcb-xf86dri0 is &lt;1.11-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137779" version="1" comment="libxcb-xfixes0 is &lt;1.11-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137780" version="1" comment="libxcb-xfixes0-32bit is &lt;1.11-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137781" version="1" comment="libxcb-xinerama0 is &lt;1.11-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137782" version="1" comment="libxcb-xkb1 is &lt;1.11-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137783" version="1" comment="libxcb-xprint0 is &lt;1.11-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137784" version="1" comment="libxcb-xtest0 is &lt;1.11-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137785" version="1" comment="libxcb-xv0 is &lt;1.11-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137786" version="1" comment="libxcb-xvmc0 is &lt;1.11-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137787" version="1" comment="libxcb1 is &lt;1.11-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137788" version="1" comment="libxcb1-32bit is &lt;1.11-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137789" version="1" comment="libxerces-c-3_1 is &lt;3.1.1-13.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137790" version="1" comment="libxml2-2 is &lt;2.9.1-7.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137791" version="1" comment="libxml2-2-32bit is &lt;2.9.1-7.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137792" version="1" comment="libxml2-devel is &lt;2.9.1-7.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137793" version="1" comment="libxml2-tools is &lt;2.9.1-7.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137794" version="1" comment="libyaml-0-2 is &lt;0.1.6-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137795" version="1" comment="libzip-devel is &lt;0.11.2-3.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137796" version="1" comment="libzip2 is &lt;0.11.2-3.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137797" version="1" comment="links is &lt;2.8-2.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137798" version="1" comment="log4net is &lt;1.2.10-74.1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137799" version="1" comment="logrotate is &lt;3.8.7-6.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137800" version="1" comment="lynx is &lt;2.8.8rel.2-2.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137801" version="1" comment="mailman is &lt;2.1.17-2.1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137802" version="1" comment="mozilla-nspr is &lt;4.10.7-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137803" version="1" comment="mozilla-nspr-devel is &lt;4.10.7-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137804" version="1" comment="mutt is &lt;1.5.21-44.1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137805" version="1" comment="nano is &lt;2.3.6-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137806" version="1" comment="nano-lang is &lt;2.3.6-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137807" version="1" comment="nspluginwrapper is &lt;1.4.4-13.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137808" version="1" comment="ntp is &lt;4.2.6p5-25.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137809" version="1" comment="ntp-doc is &lt;4.2.6p5-25.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137810" version="1" comment="obex-data-server is &lt;0.4.6-14.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137811" version="1" comment="obs-service-set_version is &lt;0.4.2-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137812" version="1" comment="openconnect is &lt;6.00-3.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137813" version="1" comment="openconnect-devel is &lt;6.00-3.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137814" version="1" comment="openslp is &lt;2.0.0-3.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137815" version="1" comment="openslp-devel is &lt;2.0.0-3.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137816" version="1" comment="openslp-server is &lt;2.0.0-3.2.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137817" version="1" comment="opie is &lt;2.4-725.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137818" version="1" comment="opie-32bit is &lt;2.4-725.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137819" version="1" comment="osc is &lt;0.148.2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137820" version="1" comment="pam is &lt;1.1.8-11.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137821" version="1" comment="pam-32bit is &lt;1.1.8-11.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137822" version="1" comment="pam-devel is &lt;1.1.8-11.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137823" version="1" comment="pam-modules is &lt;12.1-24.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137824" version="1" comment="pam-modules-32bit is &lt;12.1-24.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137825" version="1" comment="pam_krb5 is &lt;2.4.4-5.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137826" version="1" comment="pam_krb5-32bit is &lt;2.4.4-5.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137827" version="1" comment="pam_ssh is &lt;2.0-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137828" version="1" comment="pam_ssh-32bit is &lt;2.0-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137829" version="1" comment="patch is &lt;2.7.1-7.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137830" version="1" comment="perl is &lt;5.20.1-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137831" version="1" comment="perl-32bit is &lt;5.20.1-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137832" version="1" comment="perl-base is &lt;5.20.1-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137833" version="1" comment="perl-doc is &lt;5.20.1-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137834" version="1" comment="perl-Config-IniFiles is &lt;2.83-2.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137835" version="1" comment="perl-HTML-Parser is &lt;3.71-2.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137836" version="1" comment="perl-LWP-Protocol-https is &lt;6.04-6.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137837" version="1" comment="perl-YAML-LibYAML is &lt;0.44-2.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137838" version="1" comment="ppp is &lt;2.4.7-2.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137839" version="1" comment="procmail is &lt;3.22-266.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137840" version="1" comment="python is &lt;2.7.8-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137841" version="1" comment="python-curses is &lt;2.7.8-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137842" version="1" comment="python-gdbm is &lt;2.7.8-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137843" version="1" comment="python-tk is &lt;2.7.8-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137844" version="1" comment="python3 is &lt;3.4.1-4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137845" version="1" comment="python3-curses is &lt;3.4.1-4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137846" version="1" comment="python3-dbm is &lt;3.4.1-4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137847" version="1" comment="python3-tk is &lt;3.4.1-4.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137848" version="1" comment="python-cupshelpers is &lt;1.4.5-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137849" version="1" comment="system-config-printer is &lt;1.4.5-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137850" version="1" comment="system-config-printer-applet is &lt;1.4.5-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137851" version="1" comment="system-config-printer-common is &lt;1.4.5-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137852" version="1" comment="system-config-printer-dbus-service is &lt;1.4.5-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137853" version="1" comment="udev-configure-printer is &lt;1.4.5-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137854" version="1" comment="python-libxml2 is &lt;2.9.1-7.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137855" version="1" comment="python-pyOpenSSL is &lt;0.13.1-9.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137856" version="1" comment="python-pycrypto is &lt;2.6.1-3.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137857" version="1" comment="python-pymongo is &lt;2.7.2-2.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137858" version="1" comment="python3-pip is &lt;1.5.6-2.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137859" version="1" comment="qemu-linux-user is &lt;2.1.0-2.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137860" version="1" comment="quagga is &lt;0.99.23-2.1.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137861" version="1" comment="radvd is &lt;2.2-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137862" version="1" comment="rhythmbox is &lt;3.1-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137863" version="1" comment="rhythmbox-lang is &lt;3.1-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137864" version="1" comment="rsync is &lt;3.1.1-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137865" version="1" comment="rsyslog is &lt;8.4.2-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137866" version="1" comment="rtkit is &lt;0.11_git201205151338-9.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137867" version="1" comment="rxvt-unicode is &lt;9.20-2.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137868" version="1" comment="seamonkey is &lt;2.29-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137869" version="1" comment="seamonkey-dom-inspector is &lt;2.29-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137870" version="1" comment="seamonkey-irc is &lt;2.29-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137871" version="1" comment="seamonkey-translations-common is &lt;2.29-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137872" version="1" comment="seamonkey-venkman is &lt;2.29-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137873" version="1" comment="shim is &lt;0.7.318.81ee561d-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137874" version="1" comment="socat is &lt;1.7.2.4-2.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137875" version="1" comment="squashfs is &lt;4.3-3.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137876" version="1" comment="squid is &lt;3.4.4-3.1.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137877" version="1" comment="subversion is &lt;1.8.10-2.4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137878" version="1" comment="subversion-devel is &lt;1.8.10-2.4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137879" version="1" comment="subversion-perl is &lt;1.8.10-2.4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137880" version="1" comment="subversion-python is &lt;1.8.10-2.4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137881" version="1" comment="subversion-server is &lt;1.8.10-2.4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137882" version="1" comment="subversion-tools is &lt;1.8.10-2.4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137883" version="1" comment="sudo is &lt;1.8.10p3-2.1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137884" version="1" comment="sysconfig is &lt;0.83.7-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137885" version="1" comment="sysconfig-netconfig is &lt;0.83.7-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137886" version="1" comment="sysvinit-tools is &lt;2.88+-96.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137887" version="1" comment="whois is &lt;5.2.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137888" version="1" comment="telepathy-gabble is &lt;0.18.3-1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137889" version="1" comment="telepathy-idle is &lt;0.2.0-2.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137890" version="1" comment="tftp is &lt;5.2-10.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137891" version="1" comment="tigervnc is &lt;1.3.1-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137892" version="1" comment="xorg-x11-Xvnc is &lt;1.3.1-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137893" version="1" comment="tkimg is &lt;1.4-4.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137894" version="1" comment="transmission-common is &lt;2.84-4.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137895" version="1" comment="transmission-gtk is &lt;2.84-4.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137896" version="1" comment="unixODBC is &lt;2.3.2-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137897" version="1" comment="unixODBC-32bit is &lt;2.3.2-2.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137898" version="1" comment="viewvc is &lt;1.1.22-2.1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137899" version="1" comment="vino is &lt;3.14.0-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137900" version="1" comment="w3m is &lt;0.5.3-155.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137901" version="1" comment="wget is &lt;1.15-4.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137902" version="1" comment="wireshark is &lt;1.12.1-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137903" version="1" comment="wireshark-ui-gtk is &lt;1.12.1-1.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137904" version="1" comment="xalan-j2 is &lt;2.7.2-3.1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137905" version="1" comment="xen is &lt;4.4.1_06-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137906" version="1" comment="xen-doc-html is &lt;4.4.1_06-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137907" version="1" comment="xen-kmp-default is &lt;4.4.1_06_k3.16.6_2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137908" version="1" comment="xen-kmp-desktop is &lt;4.4.1_06_k3.16.6_2-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137909" version="1" comment="xen-libs is &lt;4.4.1_06-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137910" version="1" comment="xen-tools is &lt;4.4.1_06-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137911" version="1" comment="xen-tools-domU is &lt;4.4.1_06-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137912" version="1" comment="xf86-video-intel is &lt;2.99.916-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137913" version="1" comment="xinetd is &lt;2.3.15-7.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137914" version="1" comment="xlockmore is &lt;5.43-6.1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137915" version="1" comment="xorg-x11 is &lt;7.6_1-15.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137916" version="1" comment="xorg-x11-essentials is &lt;7.6_1-15.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137917" version="1" comment="xrdb is &lt;1.1.0-4.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137918" version="1" comment="xorg-x11-devel is &lt;7.6-46.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137919" version="1" comment="xorg-x11-server is &lt;7.6_1.16.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137920" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.16.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137921" version="1" comment="xorg-x11-server-sdk is &lt;7.6_1.16.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137923" version="1" comment="yast2-devel-doc is &lt;3.1.108-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137924" version="1" comment="yast2-core is &lt;3.1.12-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137925" version="1" comment="yast2-core-devel is &lt;3.1.12-1.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137926" version="1" comment="zoo is &lt;2.10-1022.1.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101253" version="1" comment="wget is &lt;1.16-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101248" version="1" comment="quassel is &lt;0.10.0-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101249" version="1" comment="quassel-base is &lt;0.10.0-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101250" version="1" comment="quassel-client is &lt;0.10.0-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101251" version="1" comment="quassel-core is &lt;0.10.0-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101252" version="1" comment="quassel-mono is &lt;0.10.0-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101247" version="1" comment="tnftp is &lt;20130505-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101244" version="1" comment="claws-mail is &lt;3.11.0-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101245" version="1" comment="claws-mail-devel is &lt;3.11.0-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101246" version="1" comment="claws-mail-lang is &lt;3.11.0-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101273" version="1" comment="apache2-mod_php5 is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101274" version="1" comment="php5 is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101275" version="1" comment="php5-bcmath is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101276" version="1" comment="php5-bz2 is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101277" version="1" comment="php5-calendar is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101278" version="1" comment="php5-ctype is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101279" version="1" comment="php5-curl is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101280" version="1" comment="php5-dba is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101281" version="1" comment="php5-devel is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101282" version="1" comment="php5-dom is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101283" version="1" comment="php5-enchant is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101284" version="1" comment="php5-exif is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101285" version="1" comment="php5-fastcgi is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101286" version="1" comment="php5-fileinfo is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101287" version="1" comment="php5-firebird is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101288" version="1" comment="php5-fpm is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101289" version="1" comment="php5-ftp is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101290" version="1" comment="php5-gd is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101291" version="1" comment="php5-gettext is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101292" version="1" comment="php5-gmp is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101293" version="1" comment="php5-iconv is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101294" version="1" comment="php5-imap is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101295" version="1" comment="php5-intl is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101296" version="1" comment="php5-json is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101297" version="1" comment="php5-ldap is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101298" version="1" comment="php5-mbstring is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101299" version="1" comment="php5-mcrypt is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101300" version="1" comment="php5-mssql is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101301" version="1" comment="php5-mysql is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101302" version="1" comment="php5-odbc is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101303" version="1" comment="php5-opcache is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101304" version="1" comment="php5-openssl is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101305" version="1" comment="php5-pcntl is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101306" version="1" comment="php5-pdo is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101307" version="1" comment="php5-pear is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101308" version="1" comment="php5-pgsql is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101309" version="1" comment="php5-phar is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101310" version="1" comment="php5-posix is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101311" version="1" comment="php5-pspell is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101312" version="1" comment="php5-readline is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101313" version="1" comment="php5-shmop is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101314" version="1" comment="php5-snmp is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101315" version="1" comment="php5-soap is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101316" version="1" comment="php5-sockets is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101317" version="1" comment="php5-sqlite is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101318" version="1" comment="php5-suhosin is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101319" version="1" comment="php5-sysvmsg is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101320" version="1" comment="php5-sysvsem is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101321" version="1" comment="php5-sysvshm is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101322" version="1" comment="php5-tidy is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101323" version="1" comment="php5-tokenizer is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101324" version="1" comment="php5-wddx is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101325" version="1" comment="php5-xmlreader is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101326" version="1" comment="php5-xmlrpc is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101327" version="1" comment="php5-xmlwriter is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101328" version="1" comment="php5-xsl is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101329" version="1" comment="php5-zip is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101330" version="1" comment="php5-zlib is &lt;5.6.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101362" version="1" comment="libserf is &lt;1.3.8-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101334" version="1" comment="libserf-1-0 is &lt;1.1.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101361" version="1" comment="libserf-1-1 is &lt;1.3.8-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101363" version="1" comment="libserf-devel is &lt;1.3.8-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101351" version="1" comment="finch is &lt;2.10.10-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101352" version="1" comment="finch-devel is &lt;2.10.10-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101353" version="1" comment="libpurple is &lt;2.10.10-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101349" version="1" comment="libpurple-branding-openSUSE is &lt;13.2-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101354" version="1" comment="libpurple-branding-upstream is &lt;2.10.10-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101355" version="1" comment="libpurple-devel is &lt;2.10.10-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101356" version="1" comment="libpurple-lang is &lt;2.10.10-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101357" version="1" comment="libpurple-meanwhile is &lt;2.10.10-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101358" version="1" comment="libpurple-tcl is &lt;2.10.10-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101359" version="1" comment="pidgin is &lt;2.10.10-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101350" version="1" comment="pidgin-branding-openSUSE is &lt;13.2-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101360" version="1" comment="pidgin-devel is &lt;2.10.10-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101364" version="1" comment="ImageMagick is &lt;6.8.9.8-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101366" version="1" comment="ImageMagick-devel is &lt;6.8.9.8-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101365" version="1" comment="ImageMagick-devel-32bit is &lt;6.8.9.8-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101367" version="1" comment="ImageMagick-doc is &lt;6.8.9.8-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101368" version="1" comment="ImageMagick-extra is &lt;6.8.9.8-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101538" version="1" comment="libMagick++-6_Q16-2 is &lt;6.8.6.9-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101537" version="1" comment="libMagick++-6_Q16-2-32bit is &lt;6.8.6.9-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101370" version="1" comment="libMagick++-6_Q16-5 is &lt;6.8.9.8-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101369" version="1" comment="libMagick++-6_Q16-5-32bit is &lt;6.8.9.8-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101372" version="1" comment="libMagick++-devel is &lt;6.8.9.8-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101371" version="1" comment="libMagick++-devel-32bit is &lt;6.8.9.8-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101343" version="1" comment="libMagick++5 is &lt;6.7.8.8-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101542" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.6.9-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101541" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.6.9-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101374" version="1" comment="libMagickCore-6_Q16-2 is &lt;6.8.9.8-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101373" version="1" comment="libMagickCore-6_Q16-2-32bit is &lt;6.8.9.8-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101345" version="1" comment="libMagickCore5 is &lt;6.7.8.8-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101344" version="1" comment="libMagickCore5-32bit is &lt;6.7.8.8-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101544" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.6.9-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101543" version="1" comment="libMagickWand-6_Q16-1-32bit is &lt;6.8.6.9-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101376" version="1" comment="libMagickWand-6_Q16-2 is &lt;6.8.9.8-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101375" version="1" comment="libMagickWand-6_Q16-2-32bit is &lt;6.8.9.8-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101347" version="1" comment="libMagickWand5 is &lt;6.7.8.8-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101346" version="1" comment="libMagickWand5-32bit is &lt;6.7.8.8-4.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101377" version="1" comment="perl-PerlMagick is &lt;6.8.9.8-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101378" version="1" comment="libipa_hbac-devel is &lt;1.12.2-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101379" version="1" comment="libipa_hbac0 is &lt;1.12.2-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101380" version="1" comment="libnfsidmap-sss is &lt;1.12.2-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101381" version="1" comment="libsss_idmap-devel is &lt;1.12.2-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101382" version="1" comment="libsss_idmap0 is &lt;1.12.2-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101383" version="1" comment="libsss_nss_idmap-devel is &lt;1.12.2-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101384" version="1" comment="libsss_nss_idmap0 is &lt;1.12.2-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101385" version="1" comment="libsss_simpleifp-devel is &lt;1.12.2-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101386" version="1" comment="libsss_simpleifp0 is &lt;1.12.2-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101387" version="1" comment="libsss_sudo is &lt;1.12.2-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101388" version="1" comment="python-ipa_hbac is &lt;1.12.2-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101389" version="1" comment="python-sss_nss_idmap is &lt;1.12.2-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101390" version="1" comment="python-sssd-config is &lt;1.12.2-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101391" version="1" comment="sssd is &lt;1.12.2-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101392" version="1" comment="sssd-32bit is &lt;1.12.2-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101393" version="1" comment="sssd-ad is &lt;1.12.2-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101394" version="1" comment="sssd-dbus is &lt;1.12.2-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101395" version="1" comment="sssd-ipa is &lt;1.12.2-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101396" version="1" comment="sssd-krb5 is &lt;1.12.2-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101397" version="1" comment="sssd-krb5-common is &lt;1.12.2-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101398" version="1" comment="sssd-ldap is &lt;1.12.2-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101399" version="1" comment="sssd-proxy is &lt;1.12.2-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101400" version="1" comment="sssd-tools is &lt;1.12.2-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101401" version="1" comment="sssd-wbclient is &lt;1.12.2-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101402" version="1" comment="sssd-wbclient-devel is &lt;1.12.2-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101403" version="1" comment="konversation is &lt;1.5.1-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101404" version="1" comment="konversation-lang is &lt;1.5.1-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101421" version="1" comment="docker is &lt;1.3.1-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101422" version="1" comment="docker-bash-completion is &lt;1.3.1-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101423" version="1" comment="docker-zsh-completion is &lt;1.3.1-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101417" version="1" comment="go is &lt;1.3.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101418" version="1" comment="go-doc is &lt;1.3.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101419" version="1" comment="go-emacs is &lt;1.3.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101420" version="1" comment="go-vim is &lt;1.3.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101697" version="1" comment="libopenssl-devel is &lt;1.0.1j-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101698" version="1" comment="libopenssl-devel-32bit is &lt;1.0.1j-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101699" version="1" comment="libopenssl1_0_0 is &lt;1.0.1j-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101700" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1j-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101701" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1j-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101702" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1j-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101703" version="1" comment="openssl is &lt;1.0.1j-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101704" version="1" comment="openssl-doc is &lt;1.0.1j-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101781" version="1" comment="libreoffice is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101782" version="1" comment="libreoffice-base is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101783" version="1" comment="libreoffice-base-drivers-mysql is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101784" version="1" comment="libreoffice-base-drivers-postgresql is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101785" version="1" comment="libreoffice-branding-upstream is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101786" version="1" comment="libreoffice-calc is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101787" version="1" comment="libreoffice-calc-extensions is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101788" version="1" comment="libreoffice-draw is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101789" version="1" comment="libreoffice-filters-optional is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101790" version="1" comment="libreoffice-gnome is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101791" version="1" comment="libreoffice-icon-theme-crystal is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101792" version="1" comment="libreoffice-icon-theme-galaxy is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101793" version="1" comment="libreoffice-icon-theme-hicontrast is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101794" version="1" comment="libreoffice-icon-theme-oxygen is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101795" version="1" comment="libreoffice-icon-theme-sifr is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101796" version="1" comment="libreoffice-icon-theme-tango is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101797" version="1" comment="libreoffice-impress is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101798" version="1" comment="libreoffice-kde4 is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101799" version="1" comment="libreoffice-l10n-af is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101800" version="1" comment="libreoffice-l10n-ar is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101801" version="1" comment="libreoffice-l10n-as is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101802" version="1" comment="libreoffice-l10n-bg is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101803" version="1" comment="libreoffice-l10n-bn is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101804" version="1" comment="libreoffice-l10n-br is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101805" version="1" comment="libreoffice-l10n-ca is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101806" version="1" comment="libreoffice-l10n-cs is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101807" version="1" comment="libreoffice-l10n-cy is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101808" version="1" comment="libreoffice-l10n-da is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101809" version="1" comment="libreoffice-l10n-de is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101810" version="1" comment="libreoffice-l10n-dz is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101811" version="1" comment="libreoffice-l10n-el is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101812" version="1" comment="libreoffice-l10n-en is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101813" version="1" comment="libreoffice-l10n-es is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101814" version="1" comment="libreoffice-l10n-et is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101815" version="1" comment="libreoffice-l10n-eu is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101816" version="1" comment="libreoffice-l10n-fa is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101817" version="1" comment="libreoffice-l10n-fi is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101818" version="1" comment="libreoffice-l10n-fr is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101819" version="1" comment="libreoffice-l10n-ga is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101820" version="1" comment="libreoffice-l10n-gl is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101821" version="1" comment="libreoffice-l10n-gu is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101822" version="1" comment="libreoffice-l10n-he is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101823" version="1" comment="libreoffice-l10n-hi is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101824" version="1" comment="libreoffice-l10n-hr is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101825" version="1" comment="libreoffice-l10n-hu is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101826" version="1" comment="libreoffice-l10n-it is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101827" version="1" comment="libreoffice-l10n-ja is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101828" version="1" comment="libreoffice-l10n-kk is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101829" version="1" comment="libreoffice-l10n-kn is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101830" version="1" comment="libreoffice-l10n-ko is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101831" version="1" comment="libreoffice-l10n-lt is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101832" version="1" comment="libreoffice-l10n-lv is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101833" version="1" comment="libreoffice-l10n-mai is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101834" version="1" comment="libreoffice-l10n-ml is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101835" version="1" comment="libreoffice-l10n-mr is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101836" version="1" comment="libreoffice-l10n-nb is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101837" version="1" comment="libreoffice-l10n-nl is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101838" version="1" comment="libreoffice-l10n-nn is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101839" version="1" comment="libreoffice-l10n-nr is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101840" version="1" comment="libreoffice-l10n-nso is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101841" version="1" comment="libreoffice-l10n-or is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101842" version="1" comment="libreoffice-l10n-pa is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101843" version="1" comment="libreoffice-l10n-pl is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101844" version="1" comment="libreoffice-l10n-pt-BR is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101845" version="1" comment="libreoffice-l10n-pt-PT is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101846" version="1" comment="libreoffice-l10n-ro is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101847" version="1" comment="libreoffice-l10n-ru is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101848" version="1" comment="libreoffice-l10n-si is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101849" version="1" comment="libreoffice-l10n-sk is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101850" version="1" comment="libreoffice-l10n-sl is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101851" version="1" comment="libreoffice-l10n-sr is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101852" version="1" comment="libreoffice-l10n-ss is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101853" version="1" comment="libreoffice-l10n-st is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101854" version="1" comment="libreoffice-l10n-sv is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101855" version="1" comment="libreoffice-l10n-ta is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101856" version="1" comment="libreoffice-l10n-te is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101857" version="1" comment="libreoffice-l10n-th is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101858" version="1" comment="libreoffice-l10n-tn is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101859" version="1" comment="libreoffice-l10n-tr is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101860" version="1" comment="libreoffice-l10n-ts is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101861" version="1" comment="libreoffice-l10n-uk is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101862" version="1" comment="libreoffice-l10n-ve is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101863" version="1" comment="libreoffice-l10n-xh is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101864" version="1" comment="libreoffice-l10n-zh-Hans is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101865" version="1" comment="libreoffice-l10n-zh-Hant is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101866" version="1" comment="libreoffice-l10n-zu is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101867" version="1" comment="libreoffice-mailmerge is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101868" version="1" comment="libreoffice-math is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101869" version="1" comment="libreoffice-officebean is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101870" version="1" comment="libreoffice-pyuno is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101871" version="1" comment="libreoffice-sdk is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101872" version="1" comment="libreoffice-sdk-doc is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101873" version="1" comment="libreoffice-writer is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101874" version="1" comment="libreoffice-writer-extensions is &lt;4.3.3.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117556" version="1" comment="flash-player is &lt;11.2.202.418-2.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117557" version="1" comment="flash-player-gnome is &lt;11.2.202.418-2.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117558" version="1" comment="flash-player-kde4 is &lt;11.2.202.418-2.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101896" version="1" comment="libpolarssl7 is &lt;1.3.9-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101897" version="1" comment="polarssl is &lt;1.3.9-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101898" version="1" comment="polarssl-devel is &lt;1.3.9-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101899" version="1" comment="dbus-1 is &lt;1.8.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101902" version="1" comment="dbus-1-devel is &lt;1.8.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101903" version="1" comment="dbus-1-devel-32bit is &lt;1.8.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101900" version="1" comment="dbus-1-devel-doc is &lt;1.8.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101901" version="1" comment="dbus-1-x11 is &lt;1.8.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101904" version="1" comment="libdbus-1-3 is &lt;1.8.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101905" version="1" comment="libdbus-1-3-32bit is &lt;1.8.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101971" version="1" comment="libvirt is &lt;1.2.9-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101972" version="1" comment="libvirt-client is &lt;1.2.9-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101973" version="1" comment="libvirt-client-32bit is &lt;1.2.9-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101974" version="1" comment="libvirt-daemon is &lt;1.2.9-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101975" version="1" comment="libvirt-daemon-config-network is &lt;1.2.9-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101976" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.9-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101977" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.9-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101996" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.9-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101978" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.9-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101979" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.9-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101980" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.9-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101981" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.9-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101982" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.9-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101983" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.9-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101984" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.9-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101985" version="1" comment="libvirt-daemon-driver-uml is &lt;1.2.9-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101986" version="1" comment="libvirt-daemon-driver-vbox is &lt;1.2.9-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101997" version="1" comment="libvirt-daemon-driver-xen is &lt;1.2.9-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101987" version="1" comment="libvirt-daemon-lxc is &lt;1.2.9-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101988" version="1" comment="libvirt-daemon-qemu is &lt;1.2.9-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101989" version="1" comment="libvirt-daemon-uml is &lt;1.2.9-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101990" version="1" comment="libvirt-daemon-vbox is &lt;1.2.9-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101998" version="1" comment="libvirt-daemon-xen is &lt;1.2.9-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101991" version="1" comment="libvirt-devel is &lt;1.2.9-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101992" version="1" comment="libvirt-devel-32bit is &lt;1.2.9-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101993" version="1" comment="libvirt-doc is &lt;1.2.9-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101994" version="1" comment="libvirt-lock-sanlock is &lt;1.2.9-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101995" version="1" comment="libvirt-login-shell is &lt;1.2.9-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101958" version="1" comment="libvirt-python is &lt;1.1.2-2.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009101999" version="1" comment="gnutls is &lt;3.2.18-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102000" version="1" comment="libgnutls-devel is &lt;3.2.18-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102001" version="1" comment="libgnutls-devel-32bit is &lt;3.2.18-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102002" version="1" comment="libgnutls-openssl-devel is &lt;3.2.18-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102003" version="1" comment="libgnutls-openssl27 is &lt;3.2.18-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102004" version="1" comment="libgnutls28 is &lt;3.2.18-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102005" version="1" comment="libgnutls28-32bit is &lt;3.2.18-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102006" version="1" comment="libgnutlsxx-devel is &lt;3.2.18-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102007" version="1" comment="libgnutlsxx28 is &lt;3.2.18-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102029" version="1" comment="libopenssl-devel is &lt;1.0.1j-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102030" version="1" comment="libopenssl-devel-32bit is &lt;1.0.1j-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102031" version="1" comment="libopenssl1_0_0 is &lt;1.0.1j-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102032" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1j-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102033" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1j-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102034" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1j-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102035" version="1" comment="openssl is &lt;1.0.1j-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102036" version="1" comment="openssl-doc is &lt;1.0.1j-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102066" version="1" comment="ImageMagick is &lt;6.8.9.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102068" version="1" comment="ImageMagick-devel is &lt;6.8.9.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102067" version="1" comment="ImageMagick-devel-32bit is &lt;6.8.9.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102069" version="1" comment="ImageMagick-doc is &lt;6.8.9.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102070" version="1" comment="ImageMagick-extra is &lt;6.8.9.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102055" version="1" comment="libMagick++-6_Q16-2 is &lt;6.8.6.9-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102054" version="1" comment="libMagick++-6_Q16-2-32bit is &lt;6.8.6.9-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102072" version="1" comment="libMagick++-6_Q16-5 is &lt;6.8.9.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102071" version="1" comment="libMagick++-6_Q16-5-32bit is &lt;6.8.9.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102074" version="1" comment="libMagick++-devel is &lt;6.8.9.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102073" version="1" comment="libMagick++-devel-32bit is &lt;6.8.9.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102043" version="1" comment="libMagick++5 is &lt;6.7.8.8-4.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102059" version="1" comment="libMagickCore-6_Q16-1 is &lt;6.8.6.9-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102058" version="1" comment="libMagickCore-6_Q16-1-32bit is &lt;6.8.6.9-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102076" version="1" comment="libMagickCore-6_Q16-2 is &lt;6.8.9.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102075" version="1" comment="libMagickCore-6_Q16-2-32bit is &lt;6.8.9.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102045" version="1" comment="libMagickCore5 is &lt;6.7.8.8-4.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102044" version="1" comment="libMagickCore5-32bit is &lt;6.7.8.8-4.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102061" version="1" comment="libMagickWand-6_Q16-1 is &lt;6.8.6.9-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102060" version="1" comment="libMagickWand-6_Q16-1-32bit is &lt;6.8.6.9-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102078" version="1" comment="libMagickWand-6_Q16-2 is &lt;6.8.9.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102077" version="1" comment="libMagickWand-6_Q16-2-32bit is &lt;6.8.9.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102047" version="1" comment="libMagickWand5 is &lt;6.7.8.8-4.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102046" version="1" comment="libMagickWand5-32bit is &lt;6.7.8.8-4.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102079" version="1" comment="perl-PerlMagick is &lt;6.8.9.8-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102063" version="1" comment="libzmq4 is &lt;4.0.5-3.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102064" version="1" comment="zeromq is &lt;4.0.5-3.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102065" version="1" comment="zeromq-devel is &lt;4.0.5-3.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102092" version="1" comment="rubygem-sprockets-2_2 is &lt;2.2.2-8.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102093" version="1" comment="rubygem-sprockets-2_2-doc is &lt;2.2.2-8.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102094" version="1" comment="rubygem-sprockets-2_1 is &lt;2.1.3-8.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102095" version="1" comment="rubygem-sprockets-2_1-doc is &lt;2.1.3-8.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102096" version="1" comment="wireshark is &lt;1.12.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102097" version="1" comment="wireshark-devel is &lt;1.12.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102098" version="1" comment="wireshark-ui-gtk is &lt;1.12.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102099" version="1" comment="wireshark-ui-qt is &lt;1.12.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102120" version="1" comment="rubygem-sprockets is &lt;2.12.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102121" version="1" comment="rubygem-sprockets-doc is &lt;2.12.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102122" version="1" comment="rubygem-tilt-1_4 is &lt;1.4.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102123" version="1" comment="rubygem-tilt-1_4-doc is &lt;1.4.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102124" version="1" comment="rubygem-tilt-1_4-testsuite is &lt;1.4.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102125" version="1" comment="file is &lt;5.19-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102126" version="1" comment="file-devel is &lt;5.19-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102127" version="1" comment="file-magic is &lt;5.19-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102104" version="1" comment="libmagic-data is &lt;5.11-12.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102129" version="1" comment="libmagic1 is &lt;5.19-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102128" version="1" comment="libmagic1-32bit is &lt;5.19-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102130" version="1" comment="python-magic is &lt;5.19-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102131" version="1" comment="rubygem-actionpack-3_2 is &lt;3.2.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102132" version="1" comment="rubygem-actionpack-3_2-doc is &lt;3.2.17-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102499" version="1" comment="phpMyAdmin is &lt;4.2.12-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102498" version="1" comment="clamav is &lt;0.98.5-2.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102550" version="1" comment="MozillaFirefox is &lt;34.0.5-5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102551" version="1" comment="MozillaFirefox-branding-upstream is &lt;34.0.5-5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102552" version="1" comment="MozillaFirefox-buildsymbols is &lt;34.0.5-5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102553" version="1" comment="MozillaFirefox-devel is &lt;34.0.5-5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102554" version="1" comment="MozillaFirefox-translations-common is &lt;34.0.5-5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102555" version="1" comment="MozillaFirefox-translations-other is &lt;34.0.5-5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102559" version="1" comment="libfreebl3 is &lt;3.17.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102560" version="1" comment="libfreebl3-32bit is &lt;3.17.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102561" version="1" comment="libsoftokn3 is &lt;3.17.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102562" version="1" comment="libsoftokn3-32bit is &lt;3.17.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102557" version="1" comment="mozilla-nspr is &lt;4.10.7-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102556" version="1" comment="mozilla-nspr-32bit is &lt;4.10.7-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102558" version="1" comment="mozilla-nspr-devel is &lt;4.10.7-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102563" version="1" comment="mozilla-nss is &lt;3.17.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102564" version="1" comment="mozilla-nss-32bit is &lt;3.17.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102565" version="1" comment="mozilla-nss-certs is &lt;3.17.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102566" version="1" comment="mozilla-nss-certs-32bit is &lt;3.17.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102567" version="1" comment="mozilla-nss-devel is &lt;3.17.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102568" version="1" comment="mozilla-nss-sysinit is &lt;3.17.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102569" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.17.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102570" version="1" comment="mozilla-nss-tools is &lt;3.17.2-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102606" version="1" comment="icecast is &lt;2.4.0-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102607" version="1" comment="icecast-doc is &lt;2.4.0-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102608" version="1" comment="flac is &lt;1.3.0-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102609" version="1" comment="flac-devel is &lt;1.3.0-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102610" version="1" comment="flac-devel-32bit is &lt;1.3.0-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102611" version="1" comment="libFLAC++6 is &lt;1.3.0-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102612" version="1" comment="libFLAC++6-32bit is &lt;1.3.0-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102613" version="1" comment="libFLAC8 is &lt;1.3.0-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102614" version="1" comment="libFLAC8-32bit is &lt;1.3.0-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009042666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102616" version="1" comment="docker-bash-completion is &lt;1.3.2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102617" version="1" comment="docker-zsh-completion is &lt;1.3.2-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102618" version="1" comment="openvpn is &lt;2.3.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102619" version="1" comment="openvpn-auth-pam-plugin is &lt;2.3.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102620" version="1" comment="openvpn-down-root-plugin is &lt;2.3.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102711" version="1" comment="chromedriver is &lt;39.0.2171.65-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102712" version="1" comment="chromium is &lt;39.0.2171.65-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102713" version="1" comment="chromium-desktop-gnome is &lt;39.0.2171.65-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102714" version="1" comment="chromium-desktop-kde is &lt;39.0.2171.65-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102715" version="1" comment="chromium-ffmpegsumo is &lt;39.0.2171.65-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102717" version="1" comment="libyaml is &lt;0.1.6-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102716" version="1" comment="libyaml-0-2 is &lt;0.1.6-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102718" version="1" comment="libyaml-devel is &lt;0.1.6-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009043984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117562" version="1" comment="flash-player is &lt;11.2.202.425-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117563" version="1" comment="flash-player-gnome is &lt;11.2.202.425-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117564" version="1" comment="flash-player-kde4 is &lt;11.2.202.425-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102821" version="1" comment="cpio is &lt;2.11-29.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102822" version="1" comment="cpio-lang is &lt;2.11-29.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102823" version="1" comment="libjpeg-turbo is &lt;1.3.1-30.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102831" version="1" comment="libjpeg62 is &lt;62.1.0-30.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102830" version="1" comment="libjpeg62-32bit is &lt;62.1.0-30.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102833" version="1" comment="libjpeg62-devel is &lt;62.1.0-30.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102832" version="1" comment="libjpeg62-devel-32bit is &lt;62.1.0-30.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102834" version="1" comment="libjpeg62-turbo is &lt;1.3.1-30.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102825" version="1" comment="libjpeg8 is &lt;8.0.2-30.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102824" version="1" comment="libjpeg8-32bit is &lt;8.0.2-30.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102827" version="1" comment="libjpeg8-devel is &lt;8.0.2-30.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102826" version="1" comment="libjpeg8-devel-32bit is &lt;8.0.2-30.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102829" version="1" comment="libturbojpeg0 is &lt;8.0.2-30.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102828" version="1" comment="libturbojpeg0-32bit is &lt;8.0.2-30.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102835" version="1" comment="perl-Plack is &lt;1.0031-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102836" version="1" comment="phpMyAdmin is &lt;4.2.13.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102837" version="1" comment="lua-rrdtool is &lt;1.4.7-20.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102838" version="1" comment="python-rrdtool is &lt;1.4.7-20.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102839" version="1" comment="rrdtool is &lt;1.4.7-20.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102840" version="1" comment="rrdtool-cached is &lt;1.4.7-20.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102841" version="1" comment="rrdtool-devel is &lt;1.4.7-20.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102842" version="1" comment="ruby-rrdtool is &lt;1.4.7-20.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102843" version="1" comment="tcl-rrdtool is &lt;1.4.7-20.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102844" version="1" comment="mutt is &lt;1.5.21-44.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102848" version="1" comment="firebird is &lt;2.5.2.26539-14.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102849" version="1" comment="firebird-32bit is &lt;2.5.2.26539-14.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102845" version="1" comment="firebird-classic is &lt;2.5.2.26539-14.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102850" version="1" comment="firebird-devel is &lt;2.5.2.26539-14.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102851" version="1" comment="firebird-doc is &lt;2.5.2.26539-14.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102852" version="1" comment="firebird-superserver is &lt;2.5.2.26539-14.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102853" version="1" comment="libfbclient2 is &lt;2.5.2.26539-14.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102854" version="1" comment="libfbclient2-32bit is &lt;2.5.2.26539-14.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102855" version="1" comment="libfbclient2-devel is &lt;2.5.2.26539-14.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102846" version="1" comment="libfbembed-devel is &lt;2.5.2.26539-14.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102847" version="1" comment="libfbembed2_5 is &lt;2.5.2.26539-14.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102856" version="1" comment="jasper is &lt;1.900.1-163.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102857" version="1" comment="libjasper-devel is &lt;1.900.1-163.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102858" version="1" comment="libjasper1 is &lt;1.900.1-163.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102859" version="1" comment="libjasper1-32bit is &lt;1.900.1-163.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102926" version="1" comment="seamonkey is &lt;2.31-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102927" version="1" comment="seamonkey-dom-inspector is &lt;2.31-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102928" version="1" comment="seamonkey-irc is &lt;2.31-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102929" version="1" comment="seamonkey-translations-common is &lt;2.31-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102930" version="1" comment="seamonkey-translations-other is &lt;2.31-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102921" version="1" comment="MozillaThunderbird is &lt;31.3.0-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102922" version="1" comment="MozillaThunderbird-buildsymbols is &lt;31.3.0-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102923" version="1" comment="MozillaThunderbird-devel is &lt;31.3.0-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102924" version="1" comment="MozillaThunderbird-translations-common is &lt;31.3.0-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102925" version="1" comment="MozillaThunderbird-translations-other is &lt;31.3.0-4.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102973" version="1" comment="ntp is &lt;4.2.6p5-25.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009102974" version="1" comment="ntp-doc is &lt;4.2.6p5-25.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103080" version="1" comment="kernel-debug is &lt;3.16.7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103081" version="1" comment="kernel-debug-base is &lt;3.16.7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103082" version="1" comment="kernel-debug-devel is &lt;3.16.7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103083" version="1" comment="kernel-default is &lt;3.16.7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103084" version="1" comment="kernel-default-base is &lt;3.16.7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103085" version="1" comment="kernel-default-devel is &lt;3.16.7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103086" version="1" comment="kernel-desktop is &lt;3.16.7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103087" version="1" comment="kernel-desktop-base is &lt;3.16.7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103088" version="1" comment="kernel-desktop-devel is &lt;3.16.7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103099" version="1" comment="kernel-devel is &lt;3.16.7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103089" version="1" comment="kernel-docs is &lt;3.16.7-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103090" version="1" comment="kernel-ec2 is &lt;3.16.7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103091" version="1" comment="kernel-ec2-base is &lt;3.16.7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103092" version="1" comment="kernel-ec2-devel is &lt;3.16.7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103100" version="1" comment="kernel-macros is &lt;3.16.7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103093" version="1" comment="kernel-obs-build is &lt;3.16.7-7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103095" version="1" comment="kernel-obs-qa is &lt;3.16.7-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103094" version="1" comment="kernel-obs-qa-xen is &lt;3.16.7-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103096" version="1" comment="kernel-pae is &lt;3.16.7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103097" version="1" comment="kernel-pae-base is &lt;3.16.7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103098" version="1" comment="kernel-pae-devel is &lt;3.16.7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103101" version="1" comment="kernel-source is &lt;3.16.7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103102" version="1" comment="kernel-source-vanilla is &lt;3.16.7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103103" version="1" comment="kernel-syms is &lt;3.16.7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103104" version="1" comment="kernel-vanilla is &lt;3.16.7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103105" version="1" comment="kernel-vanilla-devel is &lt;3.16.7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103106" version="1" comment="kernel-xen is &lt;3.16.7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103107" version="1" comment="kernel-xen-base is &lt;3.16.7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103108" version="1" comment="kernel-xen-devel is &lt;3.16.7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103117" version="1" comment="libksba is &lt;1.3.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103118" version="1" comment="libksba-devel is &lt;1.3.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103119" version="1" comment="libksba8 is &lt;1.3.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103122" version="1" comment="libunbound2 is &lt;1.4.22-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103123" version="1" comment="unbound is &lt;1.4.22-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103124" version="1" comment="unbound-anchor is &lt;1.4.22-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103125" version="1" comment="unbound-devel is &lt;1.4.22-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103126" version="1" comment="unbound-munin is &lt;1.4.22-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103127" version="1" comment="unbound-python is &lt;1.4.22-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103229" version="1" comment="mailx is &lt;12.5-20.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103230" version="1" comment="xorg-x11-server is &lt;7.6_1.16.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103231" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.16.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103232" version="1" comment="xorg-x11-server-sdk is &lt;7.6_1.16.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103233" version="1" comment="python3-rpm is &lt;4.11.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103236" version="1" comment="rpm is &lt;4.11.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103235" version="1" comment="rpm-32bit is &lt;4.11.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103237" version="1" comment="rpm-build is &lt;4.11.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103238" version="1" comment="rpm-devel is &lt;4.11.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103234" version="1" comment="rpm-python is &lt;4.11.3-4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103239" version="1" comment="file is &lt;5.19-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103240" version="1" comment="file-devel is &lt;5.19-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103241" version="1" comment="file-magic is &lt;5.19-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103243" version="1" comment="libmagic1 is &lt;5.19-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103242" version="1" comment="libmagic1-32bit is &lt;5.19-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103244" version="1" comment="python-magic is &lt;5.19-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103226" version="1" comment="docker is &lt;1.4.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103227" version="1" comment="docker-bash-completion is &lt;1.4.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103228" version="1" comment="docker-zsh-completion is &lt;1.4.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103432" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.8.11-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103433" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.8.11-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103434" version="1" comment="subversion is &lt;1.8.11-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103435" version="1" comment="subversion-bash-completion is &lt;1.8.11-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103436" version="1" comment="subversion-devel is &lt;1.8.11-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103437" version="1" comment="subversion-perl is &lt;1.8.11-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103438" version="1" comment="subversion-python is &lt;1.8.11-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103439" version="1" comment="subversion-python-ctypes is &lt;1.8.11-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103440" version="1" comment="subversion-ruby is &lt;1.8.11-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103441" version="1" comment="subversion-server is &lt;1.8.11-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103442" version="1" comment="subversion-tools is &lt;1.8.11-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103537" version="1" comment="apache2 is &lt;2.4.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103538" version="1" comment="apache2-devel is &lt;2.4.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103539" version="1" comment="apache2-doc is &lt;2.4.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103540" version="1" comment="apache2-event is &lt;2.4.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103541" version="1" comment="apache2-example-pages is &lt;2.4.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103259" version="1" comment="apache2-itk is &lt;2.2.29-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103542" version="1" comment="apache2-prefork is &lt;2.4.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103543" version="1" comment="apache2-utils is &lt;2.4.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103544" version="1" comment="apache2-worker is &lt;2.4.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103443" version="1" comment="libreoffice is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103444" version="1" comment="libreoffice-base is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103445" version="1" comment="libreoffice-base-drivers-mysql is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103446" version="1" comment="libreoffice-base-drivers-postgresql is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103403" version="1" comment="libreoffice-base-extensions is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103447" version="1" comment="libreoffice-branding-upstream is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103448" version="1" comment="libreoffice-calc is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103449" version="1" comment="libreoffice-calc-extensions is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103450" version="1" comment="libreoffice-draw is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103407" version="1" comment="libreoffice-draw-extensions is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103451" version="1" comment="libreoffice-filters-optional is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103452" version="1" comment="libreoffice-gnome is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103275" version="1" comment="libreoffice-help-ast is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103276" version="1" comment="libreoffice-help-bg is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103277" version="1" comment="libreoffice-help-ca is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103278" version="1" comment="libreoffice-help-cs is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103279" version="1" comment="libreoffice-help-da is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103280" version="1" comment="libreoffice-help-de is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103283" version="1" comment="libreoffice-help-el is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103281" version="1" comment="libreoffice-help-en-GB is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103274" version="1" comment="libreoffice-help-en-US is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103284" version="1" comment="libreoffice-help-en-ZA is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103285" version="1" comment="libreoffice-help-es is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103286" version="1" comment="libreoffice-help-et is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103287" version="1" comment="libreoffice-help-eu is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103288" version="1" comment="libreoffice-help-fi is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103289" version="1" comment="libreoffice-help-fr is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103291" version="1" comment="libreoffice-help-gl is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103282" version="1" comment="libreoffice-help-group1 is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103290" version="1" comment="libreoffice-help-group2 is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103292" version="1" comment="libreoffice-help-group3 is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103299" version="1" comment="libreoffice-help-group4 is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103307" version="1" comment="libreoffice-help-group5 is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103293" version="1" comment="libreoffice-help-gu-IN is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103294" version="1" comment="libreoffice-help-hi-IN is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103295" version="1" comment="libreoffice-help-hu is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034108"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103296" version="1" comment="libreoffice-help-it is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103297" version="1" comment="libreoffice-help-ja is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034110"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103298" version="1" comment="libreoffice-help-km is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103300" version="1" comment="libreoffice-help-ko is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103301" version="1" comment="libreoffice-help-mk is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103302" version="1" comment="libreoffice-help-nb is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103303" version="1" comment="libreoffice-help-nl is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103304" version="1" comment="libreoffice-help-pl is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103305" version="1" comment="libreoffice-help-pt is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103306" version="1" comment="libreoffice-help-pt-BR is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103308" version="1" comment="libreoffice-help-ru is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103309" version="1" comment="libreoffice-help-sk is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103310" version="1" comment="libreoffice-help-sl is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103311" version="1" comment="libreoffice-help-sv is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103312" version="1" comment="libreoffice-help-tr is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103313" version="1" comment="libreoffice-help-vi is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103314" version="1" comment="libreoffice-help-zh-CN is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103315" version="1" comment="libreoffice-help-zh-TW is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103453" version="1" comment="libreoffice-icon-theme-crystal is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103454" version="1" comment="libreoffice-icon-theme-galaxy is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103455" version="1" comment="libreoffice-icon-theme-hicontrast is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103456" version="1" comment="libreoffice-icon-theme-oxygen is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103457" version="1" comment="libreoffice-icon-theme-sifr is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103458" version="1" comment="libreoffice-icon-theme-tango is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103321" version="1" comment="libreoffice-icon-themes is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034120"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103410" version="1" comment="libreoffice-icon-themes-prebuilt is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103459" version="1" comment="libreoffice-impress is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103412" version="1" comment="libreoffice-impress-extensions is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103413" version="1" comment="libreoffice-kde is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103460" version="1" comment="libreoffice-kde4 is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103322" version="1" comment="libreoffice-l10n is &lt;4.1.6.2-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103461" version="1" comment="libreoffice-l10n-af is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103324" version="1" comment="libreoffice-l10n-am is &lt;4.1.6.2-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103462" version="1" comment="libreoffice-l10n-ar is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103463" version="1" comment="libreoffice-l10n-as is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103327" version="1" comment="libreoffice-l10n-ast is &lt;4.1.6.2-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103328" version="1" comment="libreoffice-l10n-be-BY is &lt;4.1.6.2-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103464" version="1" comment="libreoffice-l10n-bg is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103465" version="1" comment="libreoffice-l10n-bn is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103466" version="1" comment="libreoffice-l10n-br is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103467" version="1" comment="libreoffice-l10n-ca is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103468" version="1" comment="libreoffice-l10n-cs is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103469" version="1" comment="libreoffice-l10n-cy is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103470" version="1" comment="libreoffice-l10n-da is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103471" version="1" comment="libreoffice-l10n-de is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103472" version="1" comment="libreoffice-l10n-dz is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103473" version="1" comment="libreoffice-l10n-el is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103474" version="1" comment="libreoffice-l10n-en is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103337" version="1" comment="libreoffice-l10n-en-GB is &lt;4.1.6.2-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103338" version="1" comment="libreoffice-l10n-en-ZA is &lt;4.1.6.2-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103339" version="1" comment="libreoffice-l10n-eo is &lt;4.1.6.2-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103475" version="1" comment="libreoffice-l10n-es is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103476" version="1" comment="libreoffice-l10n-et is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103477" version="1" comment="libreoffice-l10n-eu is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103478" version="1" comment="libreoffice-l10n-fa is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103479" version="1" comment="libreoffice-l10n-fi is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103480" version="1" comment="libreoffice-l10n-fr is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103481" version="1" comment="libreoffice-l10n-ga is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103346" version="1" comment="libreoffice-l10n-gd is &lt;4.1.6.2-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103482" version="1" comment="libreoffice-l10n-gl is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103483" version="1" comment="libreoffice-l10n-gu is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103348" version="1" comment="libreoffice-l10n-gu-IN is &lt;4.1.6.2-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103484" version="1" comment="libreoffice-l10n-he is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103485" version="1" comment="libreoffice-l10n-hi is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103350" version="1" comment="libreoffice-l10n-hi-IN is &lt;4.1.6.2-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103486" version="1" comment="libreoffice-l10n-hr is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103487" version="1" comment="libreoffice-l10n-hu is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103353" version="1" comment="libreoffice-l10n-id is &lt;4.1.6.2-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103354" version="1" comment="libreoffice-l10n-is is &lt;4.1.6.2-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103488" version="1" comment="libreoffice-l10n-it is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103489" version="1" comment="libreoffice-l10n-ja is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103357" version="1" comment="libreoffice-l10n-ka is &lt;4.1.6.2-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103490" version="1" comment="libreoffice-l10n-kk is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103358" version="1" comment="libreoffice-l10n-km is &lt;4.1.6.2-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103491" version="1" comment="libreoffice-l10n-kn is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103492" version="1" comment="libreoffice-l10n-ko is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103493" version="1" comment="libreoffice-l10n-lt is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103494" version="1" comment="libreoffice-l10n-lv is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103495" version="1" comment="libreoffice-l10n-mai is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103362" version="1" comment="libreoffice-l10n-mk is &lt;4.1.6.2-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103496" version="1" comment="libreoffice-l10n-ml is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103497" version="1" comment="libreoffice-l10n-mr is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103498" version="1" comment="libreoffice-l10n-nb is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103499" version="1" comment="libreoffice-l10n-nl is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103500" version="1" comment="libreoffice-l10n-nn is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103501" version="1" comment="libreoffice-l10n-nr is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103502" version="1" comment="libreoffice-l10n-nso is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103369" version="1" comment="libreoffice-l10n-om is &lt;4.1.6.2-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103503" version="1" comment="libreoffice-l10n-or is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103504" version="1" comment="libreoffice-l10n-pa is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103371" version="1" comment="libreoffice-l10n-pa-IN is &lt;4.1.6.2-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103505" version="1" comment="libreoffice-l10n-pl is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103415" version="1" comment="libreoffice-l10n-prebuilt is &lt;4.1.6.2-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103373" version="1" comment="libreoffice-l10n-pt is &lt;4.1.6.2-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103506" version="1" comment="libreoffice-l10n-pt-BR is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103507" version="1" comment="libreoffice-l10n-pt-PT is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103508" version="1" comment="libreoffice-l10n-ro is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103509" version="1" comment="libreoffice-l10n-ru is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103377" version="1" comment="libreoffice-l10n-rw is &lt;4.1.6.2-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103378" version="1" comment="libreoffice-l10n-sh is &lt;4.1.6.2-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103510" version="1" comment="libreoffice-l10n-si is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103511" version="1" comment="libreoffice-l10n-sk is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103512" version="1" comment="libreoffice-l10n-sl is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103513" version="1" comment="libreoffice-l10n-sr is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103514" version="1" comment="libreoffice-l10n-ss is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103515" version="1" comment="libreoffice-l10n-st is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103516" version="1" comment="libreoffice-l10n-sv is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103517" version="1" comment="libreoffice-l10n-ta is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103518" version="1" comment="libreoffice-l10n-te is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103387" version="1" comment="libreoffice-l10n-tg is &lt;4.1.6.2-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103519" version="1" comment="libreoffice-l10n-th is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103520" version="1" comment="libreoffice-l10n-tn is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103521" version="1" comment="libreoffice-l10n-tr is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103522" version="1" comment="libreoffice-l10n-ts is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103391" version="1" comment="libreoffice-l10n-ug is &lt;4.1.6.2-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103523" version="1" comment="libreoffice-l10n-uk is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103524" version="1" comment="libreoffice-l10n-ve is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103394" version="1" comment="libreoffice-l10n-vi is &lt;4.1.6.2-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103525" version="1" comment="libreoffice-l10n-xh is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103396" version="1" comment="libreoffice-l10n-zh-CN is &lt;4.1.6.2-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103526" version="1" comment="libreoffice-l10n-zh-Hans is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103527" version="1" comment="libreoffice-l10n-zh-Hant is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103397" version="1" comment="libreoffice-l10n-zh-TW is &lt;4.1.6.2-37.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103528" version="1" comment="libreoffice-l10n-zu is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103529" version="1" comment="libreoffice-mailmerge is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103530" version="1" comment="libreoffice-math is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103531" version="1" comment="libreoffice-officebean is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103532" version="1" comment="libreoffice-pyuno is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103533" version="1" comment="libreoffice-sdk is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103534" version="1" comment="libreoffice-sdk-doc is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103535" version="1" comment="libreoffice-writer is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103536" version="1" comment="libreoffice-writer-extensions is &lt;4.3.5.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105881" version="1" comment="libvirt is &lt;1.2.9-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105882" version="1" comment="libvirt-client is &lt;1.2.9-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105883" version="1" comment="libvirt-client-32bit is &lt;1.2.9-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105884" version="1" comment="libvirt-daemon is &lt;1.2.9-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105885" version="1" comment="libvirt-daemon-config-network is &lt;1.2.9-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105886" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.9-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105887" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.9-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105906" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.9-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105888" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.9-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105889" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.9-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105890" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.9-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105891" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.9-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105892" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.9-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105893" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.9-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105894" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.9-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105895" version="1" comment="libvirt-daemon-driver-uml is &lt;1.2.9-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105896" version="1" comment="libvirt-daemon-driver-vbox is &lt;1.2.9-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105907" version="1" comment="libvirt-daemon-driver-xen is &lt;1.2.9-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105897" version="1" comment="libvirt-daemon-lxc is &lt;1.2.9-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105898" version="1" comment="libvirt-daemon-qemu is &lt;1.2.9-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105899" version="1" comment="libvirt-daemon-uml is &lt;1.2.9-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105900" version="1" comment="libvirt-daemon-vbox is &lt;1.2.9-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105908" version="1" comment="libvirt-daemon-xen is &lt;1.2.9-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105901" version="1" comment="libvirt-devel is &lt;1.2.9-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105902" version="1" comment="libvirt-devel-32bit is &lt;1.2.9-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105903" version="1" comment="libvirt-doc is &lt;1.2.9-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105904" version="1" comment="libvirt-lock-sanlock is &lt;1.2.9-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105905" version="1" comment="libvirt-login-shell is &lt;1.2.9-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105860" version="1" comment="libvirt-python is &lt;1.1.2-2.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105909" version="1" comment="vorbis-tools is &lt;1.4.0-17.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105910" version="1" comment="vorbis-tools-lang is &lt;1.4.0-17.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105925" version="1" comment="privoxy is &lt;3.0.23-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105926" version="1" comment="privoxy-doc is &lt;3.0.23-8.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105911" version="1" comment="python-virtualbox is &lt;4.3.20-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105912" version="1" comment="virtualbox is &lt;4.3.20-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105913" version="1" comment="virtualbox-devel is &lt;4.3.20-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105914" version="1" comment="virtualbox-guest-desktop-icons is &lt;4.3.20-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105915" version="1" comment="virtualbox-guest-kmp-default is &lt;4.3.20_k3.16.7_7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105916" version="1" comment="virtualbox-guest-kmp-desktop is &lt;4.3.20_k3.16.7_7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105917" version="1" comment="virtualbox-guest-kmp-pae is &lt;4.3.20_k3.16.7_7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105918" version="1" comment="virtualbox-guest-tools is &lt;4.3.20-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105919" version="1" comment="virtualbox-guest-x11 is &lt;4.3.20-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105920" version="1" comment="virtualbox-host-kmp-default is &lt;4.3.20_k3.16.7_7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105921" version="1" comment="virtualbox-host-kmp-desktop is &lt;4.3.20_k3.16.7_7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105922" version="1" comment="virtualbox-host-kmp-pae is &lt;4.3.20_k3.16.7_7-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105923" version="1" comment="virtualbox-qt is &lt;4.3.20-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105924" version="1" comment="virtualbox-websrv is &lt;4.3.20-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117568" version="1" comment="flash-player is &lt;11.2.202.442-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117569" version="1" comment="flash-player-gnome is &lt;11.2.202.442-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117570" version="1" comment="flash-player-kde4 is &lt;11.2.202.442-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105943" version="1" comment="unzip is &lt;6.00-26.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105944" version="1" comment="unzip-doc is &lt;6.00-26.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105942" version="1" comment="unzip-rcc is &lt;6.00-26.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105112" version="1" comment="jasper is &lt;1.900.1-163.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105113" version="1" comment="libjasper-devel is &lt;1.900.1-163.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105114" version="1" comment="libjasper1 is &lt;1.900.1-163.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105115" version="1" comment="libjasper1-32bit is &lt;1.900.1-163.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105945" version="1" comment="grep is &lt;2.20-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105951" version="1" comment="openvas-manager is &lt;4.0.4-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105952" version="1" comment="rsync is &lt;3.1.1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105953" version="1" comment="curl is &lt;7.40.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105954" version="1" comment="libcurl-devel is &lt;7.40.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105956" version="1" comment="libcurl4 is &lt;7.40.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105955" version="1" comment="libcurl4-32bit is &lt;7.40.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105994" version="1" comment="krb5 is &lt;1.12.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105995" version="1" comment="krb5-32bit is &lt;1.12.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105996" version="1" comment="krb5-client is &lt;1.12.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105997" version="1" comment="krb5-devel is &lt;1.12.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105998" version="1" comment="krb5-devel-32bit is &lt;1.12.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105999" version="1" comment="krb5-doc is &lt;1.12.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105992" version="1" comment="krb5-mini is &lt;1.12.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105993" version="1" comment="krb5-mini-devel is &lt;1.12.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106000" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106001" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106002" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106003" version="1" comment="krb5-server is &lt;1.12.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105983" version="1" comment="xen is &lt;4.4.1_08-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105984" version="1" comment="xen-devel is &lt;4.4.1_08-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105988" version="1" comment="xen-doc-html is &lt;4.4.1_08-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105989" version="1" comment="xen-kmp-default is &lt;4.4.1_08_k3.16.7_7-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105990" version="1" comment="xen-kmp-desktop is &lt;4.4.1_08_k3.16.7_7-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105986" version="1" comment="xen-libs is &lt;4.4.1_08-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105985" version="1" comment="xen-libs-32bit is &lt;4.4.1_08-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105991" version="1" comment="xen-tools is &lt;4.4.1_08-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105987" version="1" comment="xen-tools-domU is &lt;4.4.1_08-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105116" version="1" comment="gcab is &lt;0.4-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105117" version="1" comment="gcab-devel is &lt;0.4-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105118" version="1" comment="gcab-lang is &lt;0.4-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105119" version="1" comment="libgcab-1_0-0 is &lt;0.4-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106041" version="1" comment="jython is &lt;2.2.1-13.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106042" version="1" comment="jython-demo is &lt;2.2.1-13.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106043" version="1" comment="jython-javadoc is &lt;2.2.1-13.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106044" version="1" comment="jython-manual is &lt;2.2.1-13.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106072" version="1" comment="tcpdump is &lt;4.6.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106071" version="1" comment="clamav is &lt;0.98.6-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106073" version="1" comment="roundcubemail is &lt;1.0.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106128" version="1" comment="dbus-1 is &lt;1.8.16-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106131" version="1" comment="dbus-1-devel is &lt;1.8.16-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106132" version="1" comment="dbus-1-devel-32bit is &lt;1.8.16-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106129" version="1" comment="dbus-1-devel-doc is &lt;1.8.16-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106130" version="1" comment="dbus-1-x11 is &lt;1.8.16-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106133" version="1" comment="libdbus-1-3 is &lt;1.8.16-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106134" version="1" comment="libdbus-1-3-32bit is &lt;1.8.16-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106164" version="1" comment="mdadm is &lt;3.3.1-5.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106165" version="1" comment="perl-YAML-LibYAML is &lt;0.59-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106233" version="1" comment="apache2-mod_php5 is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106234" version="1" comment="php5 is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106235" version="1" comment="php5-bcmath is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106236" version="1" comment="php5-bz2 is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106237" version="1" comment="php5-calendar is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106238" version="1" comment="php5-ctype is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106239" version="1" comment="php5-curl is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106240" version="1" comment="php5-dba is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106241" version="1" comment="php5-devel is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106242" version="1" comment="php5-dom is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106243" version="1" comment="php5-enchant is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106244" version="1" comment="php5-exif is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106245" version="1" comment="php5-fastcgi is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106246" version="1" comment="php5-fileinfo is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106247" version="1" comment="php5-firebird is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106248" version="1" comment="php5-fpm is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106249" version="1" comment="php5-ftp is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106250" version="1" comment="php5-gd is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106251" version="1" comment="php5-gettext is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106252" version="1" comment="php5-gmp is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106253" version="1" comment="php5-iconv is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106254" version="1" comment="php5-imap is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106255" version="1" comment="php5-intl is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106256" version="1" comment="php5-json is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106257" version="1" comment="php5-ldap is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106258" version="1" comment="php5-mbstring is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106259" version="1" comment="php5-mcrypt is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106260" version="1" comment="php5-mssql is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106261" version="1" comment="php5-mysql is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106262" version="1" comment="php5-odbc is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106263" version="1" comment="php5-opcache is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106264" version="1" comment="php5-openssl is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106265" version="1" comment="php5-pcntl is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106266" version="1" comment="php5-pdo is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106267" version="1" comment="php5-pear is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106268" version="1" comment="php5-pgsql is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106269" version="1" comment="php5-phar is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106270" version="1" comment="php5-posix is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106271" version="1" comment="php5-pspell is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106272" version="1" comment="php5-readline is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106273" version="1" comment="php5-shmop is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106274" version="1" comment="php5-snmp is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106275" version="1" comment="php5-soap is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106276" version="1" comment="php5-sockets is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106277" version="1" comment="php5-sqlite is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106278" version="1" comment="php5-suhosin is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106279" version="1" comment="php5-sysvmsg is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106280" version="1" comment="php5-sysvsem is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106281" version="1" comment="php5-sysvshm is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106282" version="1" comment="php5-tidy is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106283" version="1" comment="php5-tokenizer is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106284" version="1" comment="php5-wddx is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106285" version="1" comment="php5-xmlreader is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106286" version="1" comment="php5-xmlrpc is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106287" version="1" comment="php5-xmlwriter is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106288" version="1" comment="php5-xsl is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106289" version="1" comment="php5-zip is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106290" version="1" comment="php5-zlib is &lt;5.6.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106294" version="1" comment="xorg-x11-server is &lt;7.6_1.16.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106295" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.16.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106296" version="1" comment="xorg-x11-server-sdk is &lt;7.6_1.16.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106297" version="1" comment="tigervnc is &lt;1.4.1-6.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106298" version="1" comment="xorg-x11-Xvnc is &lt;1.4.1-6.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106726" version="1" comment="glibc is &lt;2.19-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106727" version="1" comment="glibc-32bit is &lt;2.19-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106728" version="1" comment="glibc-devel is &lt;2.19-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106729" version="1" comment="glibc-devel-32bit is &lt;2.19-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106730" version="1" comment="glibc-devel-static is &lt;2.19-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106731" version="1" comment="glibc-devel-static-32bit is &lt;2.19-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106736" version="1" comment="glibc-extra is &lt;2.19-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106737" version="1" comment="glibc-html is &lt;2.19-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106738" version="1" comment="glibc-i18ndata is &lt;2.19-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106739" version="1" comment="glibc-info is &lt;2.19-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106732" version="1" comment="glibc-locale is &lt;2.19-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106733" version="1" comment="glibc-locale-32bit is &lt;2.19-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106740" version="1" comment="glibc-obsolete is &lt;2.19-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106734" version="1" comment="glibc-profile is &lt;2.19-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106735" version="1" comment="glibc-profile-32bit is &lt;2.19-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106723" version="1" comment="glibc-testsuite is &lt;2.19-16.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106724" version="1" comment="glibc-utils is &lt;2.19-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106725" version="1" comment="glibc-utils-32bit is &lt;2.19-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106741" version="1" comment="nscd is &lt;2.19-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106742" version="1" comment="libdcerpc-atsvc-devel is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106744" version="1" comment="libdcerpc-atsvc0 is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106743" version="1" comment="libdcerpc-atsvc0-32bit is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106746" version="1" comment="libdcerpc-binding0 is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106745" version="1" comment="libdcerpc-binding0-32bit is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106747" version="1" comment="libdcerpc-devel is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106748" version="1" comment="libdcerpc-samr-devel is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106750" version="1" comment="libdcerpc-samr0 is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106749" version="1" comment="libdcerpc-samr0-32bit is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106752" version="1" comment="libdcerpc0 is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106751" version="1" comment="libdcerpc0-32bit is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106753" version="1" comment="libgensec-devel is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106755" version="1" comment="libgensec0 is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106754" version="1" comment="libgensec0-32bit is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106756" version="1" comment="libndr-devel is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106757" version="1" comment="libndr-krb5pac-devel is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106759" version="1" comment="libndr-krb5pac0 is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106758" version="1" comment="libndr-krb5pac0-32bit is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106760" version="1" comment="libndr-nbt-devel is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106762" version="1" comment="libndr-nbt0 is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106761" version="1" comment="libndr-nbt0-32bit is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106763" version="1" comment="libndr-standard-devel is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106765" version="1" comment="libndr-standard0 is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106764" version="1" comment="libndr-standard0-32bit is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106767" version="1" comment="libndr0 is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106766" version="1" comment="libndr0-32bit is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106768" version="1" comment="libnetapi-devel is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106770" version="1" comment="libnetapi0 is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106769" version="1" comment="libnetapi0-32bit is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106771" version="1" comment="libpdb-devel is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106773" version="1" comment="libpdb0 is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106772" version="1" comment="libpdb0-32bit is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106774" version="1" comment="libregistry-devel is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106776" version="1" comment="libregistry0 is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106775" version="1" comment="libregistry0-32bit is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106777" version="1" comment="libsamba-credentials-devel is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106779" version="1" comment="libsamba-credentials0 is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106778" version="1" comment="libsamba-credentials0-32bit is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106780" version="1" comment="libsamba-hostconfig-devel is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106782" version="1" comment="libsamba-hostconfig0 is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106781" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106783" version="1" comment="libsamba-policy-devel is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106785" version="1" comment="libsamba-policy0 is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106784" version="1" comment="libsamba-policy0-32bit is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106786" version="1" comment="libsamba-util-devel is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106788" version="1" comment="libsamba-util0 is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106787" version="1" comment="libsamba-util0-32bit is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106789" version="1" comment="libsamdb-devel is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106791" version="1" comment="libsamdb0 is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106790" version="1" comment="libsamdb0-32bit is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106792" version="1" comment="libsmbclient-devel is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106793" version="1" comment="libsmbclient-raw-devel is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106795" version="1" comment="libsmbclient-raw0 is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106794" version="1" comment="libsmbclient-raw0-32bit is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106797" version="1" comment="libsmbclient0 is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106796" version="1" comment="libsmbclient0-32bit is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106798" version="1" comment="libsmbconf-devel is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106800" version="1" comment="libsmbconf0 is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106799" version="1" comment="libsmbconf0-32bit is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106801" version="1" comment="libsmbldap-devel is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106803" version="1" comment="libsmbldap0 is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106802" version="1" comment="libsmbldap0-32bit is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106804" version="1" comment="libsmbsharemodes-devel is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106805" version="1" comment="libsmbsharemodes0 is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106806" version="1" comment="libtevent-util-devel is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106808" version="1" comment="libtevent-util0 is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106807" version="1" comment="libtevent-util0-32bit is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106809" version="1" comment="libwbclient-devel is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106811" version="1" comment="libwbclient0 is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106810" version="1" comment="libwbclient0-32bit is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106813" version="1" comment="samba is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106812" version="1" comment="samba-32bit is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106815" version="1" comment="samba-client is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106814" version="1" comment="samba-client-32bit is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106816" version="1" comment="samba-core-devel is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106817" version="1" comment="samba-doc is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106819" version="1" comment="samba-libs is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106818" version="1" comment="samba-libs-32bit is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106820" version="1" comment="samba-pidl is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106821" version="1" comment="samba-python is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106822" version="1" comment="samba-test is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106823" version="1" comment="samba-test-devel is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106825" version="1" comment="samba-winbind is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106824" version="1" comment="samba-winbind-32bit is &lt;4.1.17-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105121" version="1" comment="libsndfile is &lt;1.0.25-19.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105122" version="1" comment="libsndfile-devel is &lt;1.0.25-19.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105120" version="1" comment="libsndfile-progs is &lt;1.0.25-19.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105123" version="1" comment="libsndfile1 is &lt;1.0.25-19.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105124" version="1" comment="libsndfile1-32bit is &lt;1.0.25-19.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106843" version="1" comment="cups is &lt;1.5.4-21.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106844" version="1" comment="cups-client is &lt;1.5.4-21.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106845" version="1" comment="cups-ddk is &lt;1.5.4-21.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106846" version="1" comment="cups-devel is &lt;1.5.4-21.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106847" version="1" comment="cups-libs is &lt;1.5.4-21.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106848" version="1" comment="cups-libs-32bit is &lt;1.5.4-21.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106849" version="1" comment="snack is &lt;2.2.10-212.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106899" version="1" comment="MozillaFirefox is &lt;36.0-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106900" version="1" comment="MozillaFirefox-branding-upstream is &lt;36.0-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106901" version="1" comment="MozillaFirefox-buildsymbols is &lt;36.0-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106902" version="1" comment="MozillaFirefox-devel is &lt;36.0-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106903" version="1" comment="MozillaFirefox-translations-common is &lt;36.0-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106904" version="1" comment="MozillaFirefox-translations-other is &lt;36.0-14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106905" version="1" comment="libfreebl3 is &lt;3.17.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106906" version="1" comment="libfreebl3-32bit is &lt;3.17.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106907" version="1" comment="libsoftokn3 is &lt;3.17.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106908" version="1" comment="libsoftokn3-32bit is &lt;3.17.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106909" version="1" comment="mozilla-nss is &lt;3.17.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106910" version="1" comment="mozilla-nss-32bit is &lt;3.17.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106911" version="1" comment="mozilla-nss-certs is &lt;3.17.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106912" version="1" comment="mozilla-nss-certs-32bit is &lt;3.17.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106913" version="1" comment="mozilla-nss-devel is &lt;3.17.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106914" version="1" comment="mozilla-nss-sysinit is &lt;3.17.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106915" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.17.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106916" version="1" comment="mozilla-nss-tools is &lt;3.17.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106919" version="1" comment="libecpg6 is &lt;9.3.6-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106918" version="1" comment="libecpg6-32bit is &lt;9.3.6-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106921" version="1" comment="libpq5 is &lt;9.3.6-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106920" version="1" comment="libpq5-32bit is &lt;9.3.6-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106924" version="1" comment="postgresql93 is &lt;9.3.6-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106925" version="1" comment="postgresql93-contrib is &lt;9.3.6-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106922" version="1" comment="postgresql93-devel is &lt;9.3.6-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106926" version="1" comment="postgresql93-docs is &lt;9.3.6-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106923" version="1" comment="postgresql93-libs is &lt;9.3.6-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106927" version="1" comment="postgresql93-plperl is &lt;9.3.6-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106928" version="1" comment="postgresql93-plpython is &lt;9.3.6-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106929" version="1" comment="postgresql93-pltcl is &lt;9.3.6-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106930" version="1" comment="postgresql93-server is &lt;9.3.6-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106931" version="1" comment="postgresql93-test is &lt;9.3.6-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106932" version="1" comment="python-rope is &lt;0.9.4-8.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106938" version="1" comment="apache2 is &lt;2.4.10-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106939" version="1" comment="apache2-devel is &lt;2.4.10-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106940" version="1" comment="apache2-doc is &lt;2.4.10-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106941" version="1" comment="apache2-event is &lt;2.4.10-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106942" version="1" comment="apache2-example-pages is &lt;2.4.10-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106943" version="1" comment="apache2-prefork is &lt;2.4.10-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106944" version="1" comment="apache2-utils is &lt;2.4.10-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106945" version="1" comment="apache2-worker is &lt;2.4.10-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107011" version="1" comment="vsftpd is &lt;3.0.2-14.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107161" version="1" comment="apache2-mod_php5 is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107162" version="1" comment="php5 is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107163" version="1" comment="php5-bcmath is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107164" version="1" comment="php5-bz2 is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107165" version="1" comment="php5-calendar is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107166" version="1" comment="php5-ctype is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107167" version="1" comment="php5-curl is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107168" version="1" comment="php5-dba is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107169" version="1" comment="php5-devel is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107170" version="1" comment="php5-dom is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107171" version="1" comment="php5-enchant is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107172" version="1" comment="php5-exif is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107173" version="1" comment="php5-fastcgi is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107174" version="1" comment="php5-fileinfo is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107175" version="1" comment="php5-firebird is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107176" version="1" comment="php5-fpm is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107177" version="1" comment="php5-ftp is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107178" version="1" comment="php5-gd is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107179" version="1" comment="php5-gettext is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107180" version="1" comment="php5-gmp is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107181" version="1" comment="php5-iconv is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107182" version="1" comment="php5-imap is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107183" version="1" comment="php5-intl is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107184" version="1" comment="php5-json is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107185" version="1" comment="php5-ldap is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107186" version="1" comment="php5-mbstring is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107187" version="1" comment="php5-mcrypt is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107188" version="1" comment="php5-mssql is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107189" version="1" comment="php5-mysql is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107190" version="1" comment="php5-odbc is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107191" version="1" comment="php5-opcache is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107192" version="1" comment="php5-openssl is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107193" version="1" comment="php5-pcntl is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107194" version="1" comment="php5-pdo is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107195" version="1" comment="php5-pear is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107196" version="1" comment="php5-pgsql is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107197" version="1" comment="php5-phar is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107198" version="1" comment="php5-posix is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107199" version="1" comment="php5-pspell is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107200" version="1" comment="php5-readline is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107201" version="1" comment="php5-shmop is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107202" version="1" comment="php5-snmp is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107203" version="1" comment="php5-soap is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107204" version="1" comment="php5-sockets is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107205" version="1" comment="php5-sqlite is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107206" version="1" comment="php5-suhosin is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107207" version="1" comment="php5-sysvmsg is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107208" version="1" comment="php5-sysvsem is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107209" version="1" comment="php5-sysvshm is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107210" version="1" comment="php5-tidy is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107211" version="1" comment="php5-tokenizer is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107212" version="1" comment="php5-wddx is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107213" version="1" comment="php5-xmlreader is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107214" version="1" comment="php5-xmlrpc is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107215" version="1" comment="php5-xmlwriter is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107216" version="1" comment="php5-xsl is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107217" version="1" comment="php5-zip is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107218" version="1" comment="php5-zlib is &lt;5.6.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107156" version="1" comment="chromedriver is &lt;40.0.2214.111-13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107157" version="1" comment="chromium is &lt;40.0.2214.111-13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107158" version="1" comment="chromium-desktop-gnome is &lt;40.0.2214.111-13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107159" version="1" comment="chromium-desktop-kde is &lt;40.0.2214.111-13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107160" version="1" comment="chromium-ffmpegsumo is &lt;40.0.2214.111-13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107228" version="1" comment="MozillaThunderbird is &lt;31.5.0-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107229" version="1" comment="MozillaThunderbird-buildsymbols is &lt;31.5.0-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107230" version="1" comment="MozillaThunderbird-devel is &lt;31.5.0-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107231" version="1" comment="MozillaThunderbird-translations-common is &lt;31.5.0-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107232" version="1" comment="MozillaThunderbird-translations-other is &lt;31.5.0-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107242" version="1" comment="libtiff-devel is &lt;4.0.3-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107241" version="1" comment="libtiff-devel-32bit is &lt;4.0.3-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107244" version="1" comment="libtiff5 is &lt;4.0.3-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107243" version="1" comment="libtiff5-32bit is &lt;4.0.3-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107245" version="1" comment="tiff is &lt;4.0.3-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107246" version="1" comment="libmspack is &lt;0.4-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107247" version="1" comment="libmspack-devel is &lt;0.4-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107248" version="1" comment="libmspack0 is &lt;0.4-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107249" version="1" comment="libmspack0-32bit is &lt;0.4-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107597" version="1" comment="percona-toolkit is &lt;2.2.13-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107598" version="1" comment="xtrabackup is &lt;2.2.9-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107599" version="1" comment="xtrabackup-test is &lt;2.2.9-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107600" version="1" comment="putty is &lt;0.64-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107601" version="1" comment="autofs is &lt;5.1.0-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107602" version="1" comment="cacti is &lt;0.8.8c-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117571" version="1" comment="flash-player is &lt;11.2.202.451-2.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117572" version="1" comment="flash-player-gnome is &lt;11.2.202.451-2.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117573" version="1" comment="flash-player-kde4 is &lt;11.2.202.451-2.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107667" version="1" comment="wireshark is &lt;1.12.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107668" version="1" comment="wireshark-devel is &lt;1.12.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107669" version="1" comment="wireshark-ui-gtk is &lt;1.12.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107670" version="1" comment="wireshark-ui-qt is &lt;1.12.4-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107682" version="1" comment="chromedriver is &lt;41.0.2272.76-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107683" version="1" comment="chromium is &lt;41.0.2272.76-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107684" version="1" comment="chromium-desktop-gnome is &lt;41.0.2272.76-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107685" version="1" comment="chromium-desktop-kde is &lt;41.0.2272.76-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107686" version="1" comment="chromium-ffmpegsumo is &lt;41.0.2272.76-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107786" version="1" comment="vorbis-tools is &lt;1.4.0-17.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107787" version="1" comment="vorbis-tools-lang is &lt;1.4.0-17.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107788" version="1" comment="gdm is &lt;3.14.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107789" version="1" comment="gdm-branding-upstream is &lt;3.14.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107790" version="1" comment="gdm-devel is &lt;3.14.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107791" version="1" comment="gdm-lang is &lt;3.14.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107792" version="1" comment="gdmflexiserver is &lt;3.14.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107793" version="1" comment="libgdm1 is &lt;3.14.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107794" version="1" comment="typelib-1_0-Gdm-1_0 is &lt;3.14.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107795" version="1" comment="glusterfs is &lt;3.5.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107796" version="1" comment="glusterfs-devel is &lt;3.5.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107797" version="1" comment="libgfapi0 is &lt;3.5.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107798" version="1" comment="libgfchangelog0 is &lt;3.5.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107799" version="1" comment="libgfrpc0 is &lt;3.5.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107800" version="1" comment="libgfxdr0 is &lt;3.5.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107801" version="1" comment="libglusterfs0 is &lt;3.5.2-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107872" version="1" comment="libssh2-1 is &lt;1.5.0-9.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107873" version="1" comment="libssh2-1-32bit is &lt;1.5.0-9.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107874" version="1" comment="libssh2-devel is &lt;1.5.0-9.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107875" version="1" comment="libssh2_org is &lt;1.5.0-9.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107878" version="1" comment="krb5 is &lt;1.12.2-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107879" version="1" comment="krb5-32bit is &lt;1.12.2-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107880" version="1" comment="krb5-client is &lt;1.12.2-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107881" version="1" comment="krb5-devel is &lt;1.12.2-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107882" version="1" comment="krb5-devel-32bit is &lt;1.12.2-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107883" version="1" comment="krb5-doc is &lt;1.12.2-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107876" version="1" comment="krb5-mini is &lt;1.12.2-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107877" version="1" comment="krb5-mini-devel is &lt;1.12.2-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107884" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.2-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107885" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.2-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107886" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.2-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107887" version="1" comment="krb5-server is &lt;1.12.2-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107960" version="1" comment="libopenssl-devel is &lt;1.0.1k-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107961" version="1" comment="libopenssl-devel-32bit is &lt;1.0.1k-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107962" version="1" comment="libopenssl1_0_0 is &lt;1.0.1k-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107963" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1k-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107964" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1k-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107965" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1k-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107966" version="1" comment="openssl is &lt;1.0.1k-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107967" version="1" comment="openssl-doc is &lt;1.0.1k-2.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107977" version="1" comment="bsdtar is &lt;3.1.2-7.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107978" version="1" comment="libarchive is &lt;3.1.2-7.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107979" version="1" comment="libarchive-devel is &lt;3.1.2-7.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107980" version="1" comment="libarchive13 is &lt;3.1.2-7.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107981" version="1" comment="libarchive13-32bit is &lt;3.1.2-7.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108032" version="1" comment="seamonkey is &lt;2.33-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108033" version="1" comment="seamonkey-dom-inspector is &lt;2.33-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108034" version="1" comment="seamonkey-irc is &lt;2.33-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108035" version="1" comment="seamonkey-translations-common is &lt;2.33-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108036" version="1" comment="seamonkey-translations-other is &lt;2.33-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108090" version="1" comment="less is &lt;458-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108091" version="1" comment="tor is &lt;0.2.4.26-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108102" version="1" comment="MozillaFirefox is &lt;36.0.4-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108103" version="1" comment="MozillaFirefox-branding-upstream is &lt;36.0.4-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108104" version="1" comment="MozillaFirefox-buildsymbols is &lt;36.0.4-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108105" version="1" comment="MozillaFirefox-devel is &lt;36.0.4-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108106" version="1" comment="MozillaFirefox-translations-common is &lt;36.0.4-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108107" version="1" comment="MozillaFirefox-translations-other is &lt;36.0.4-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108119" version="1" comment="libzip is &lt;0.11.2-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108120" version="1" comment="libzip-devel is &lt;0.11.2-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108121" version="1" comment="libzip2 is &lt;0.11.2-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108122" version="1" comment="libzip2-32bit is &lt;0.11.2-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108123" version="1" comment="libXfont is &lt;1.5.0-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108124" version="1" comment="libXfont-devel is &lt;1.5.0-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108125" version="1" comment="libXfont-devel-32bit is &lt;1.5.0-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108126" version="1" comment="libXfont1 is &lt;1.5.0-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108127" version="1" comment="libXfont1-32bit is &lt;1.5.0-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108128" version="1" comment="tcpdump is &lt;4.6.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108129" version="1" comment="mercurial is &lt;3.1.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108130" version="1" comment="mercurial-lang is &lt;3.1.2-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108180" version="1" comment="gnutls is &lt;3.2.18-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108181" version="1" comment="libgnutls-devel is &lt;3.2.18-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108182" version="1" comment="libgnutls-devel-32bit is &lt;3.2.18-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108183" version="1" comment="libgnutls-openssl-devel is &lt;3.2.18-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108184" version="1" comment="libgnutls-openssl27 is &lt;3.2.18-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108185" version="1" comment="libgnutls28 is &lt;3.2.18-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108186" version="1" comment="libgnutls28-32bit is &lt;3.2.18-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108187" version="1" comment="libgnutlsxx-devel is &lt;3.2.18-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108188" version="1" comment="libgnutlsxx28 is &lt;3.2.18-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108189" version="1" comment="freetype2 is &lt;2.5.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108190" version="1" comment="freetype2-devel is &lt;2.5.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108191" version="1" comment="freetype2-devel-32bit is &lt;2.5.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108194" version="1" comment="ft2demos is &lt;2.5.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108192" version="1" comment="libfreetype6 is &lt;2.5.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108193" version="1" comment="libfreetype6-32bit is &lt;2.5.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108195" version="1" comment="rubygem-bundler is &lt;1.8.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108196" version="1" comment="rubygem-bundler-doc is &lt;1.8.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108197" version="1" comment="seamonkey is &lt;2.33.1-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108198" version="1" comment="seamonkey-dom-inspector is &lt;2.33.1-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108199" version="1" comment="seamonkey-irc is &lt;2.33.1-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108200" version="1" comment="seamonkey-translations-common is &lt;2.33.1-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108201" version="1" comment="seamonkey-translations-other is &lt;2.33.1-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108209" version="1" comment="gd is &lt;2.1.0-7.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108207" version="1" comment="gd-32bit is &lt;2.0.36.RC1-78.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108210" version="1" comment="gd-devel is &lt;2.1.0-7.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108211" version="1" comment="libgd3 is &lt;2.1.0-7.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108212" version="1" comment="libgd3-32bit is &lt;2.1.0-7.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108336" version="1" comment="python-Django is &lt;1.6.11-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108278" version="1" comment="apache2-mod_php5 is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108279" version="1" comment="php5 is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108280" version="1" comment="php5-bcmath is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108281" version="1" comment="php5-bz2 is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108282" version="1" comment="php5-calendar is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108283" version="1" comment="php5-ctype is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108284" version="1" comment="php5-curl is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108285" version="1" comment="php5-dba is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108286" version="1" comment="php5-devel is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108287" version="1" comment="php5-dom is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108288" version="1" comment="php5-enchant is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108289" version="1" comment="php5-exif is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108290" version="1" comment="php5-fastcgi is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108291" version="1" comment="php5-fileinfo is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108292" version="1" comment="php5-firebird is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108293" version="1" comment="php5-fpm is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108294" version="1" comment="php5-ftp is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108295" version="1" comment="php5-gd is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108296" version="1" comment="php5-gettext is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108297" version="1" comment="php5-gmp is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108298" version="1" comment="php5-iconv is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108299" version="1" comment="php5-imap is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108300" version="1" comment="php5-intl is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108301" version="1" comment="php5-json is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108302" version="1" comment="php5-ldap is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108303" version="1" comment="php5-mbstring is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108304" version="1" comment="php5-mcrypt is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108305" version="1" comment="php5-mssql is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108306" version="1" comment="php5-mysql is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108307" version="1" comment="php5-odbc is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108308" version="1" comment="php5-opcache is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108309" version="1" comment="php5-openssl is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108310" version="1" comment="php5-pcntl is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108311" version="1" comment="php5-pdo is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108312" version="1" comment="php5-pear is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108313" version="1" comment="php5-pgsql is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108314" version="1" comment="php5-phar is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108315" version="1" comment="php5-posix is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108316" version="1" comment="php5-pspell is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108317" version="1" comment="php5-readline is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108318" version="1" comment="php5-shmop is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108319" version="1" comment="php5-snmp is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108320" version="1" comment="php5-soap is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108321" version="1" comment="php5-sockets is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108322" version="1" comment="php5-sqlite is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108323" version="1" comment="php5-suhosin is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108324" version="1" comment="php5-sysvmsg is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108325" version="1" comment="php5-sysvsem is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108326" version="1" comment="php5-sysvshm is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108327" version="1" comment="php5-tidy is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108328" version="1" comment="php5-tokenizer is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108329" version="1" comment="php5-wddx is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108330" version="1" comment="php5-xmlreader is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108331" version="1" comment="php5-xmlrpc is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108332" version="1" comment="php5-xmlwriter is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108333" version="1" comment="php5-xsl is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108334" version="1" comment="php5-zip is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108335" version="1" comment="php5-zlib is &lt;5.6.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108406" version="1" comment="libgit2 is &lt;0.21.5-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108393" version="1" comment="libgit2-0 is &lt;0.19.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108407" version="1" comment="libgit2-21 is &lt;0.21.5-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108408" version="1" comment="libgit2-devel is &lt;0.21.5-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108409" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.8.13-2.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108410" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.8.13-2.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108411" version="1" comment="subversion is &lt;1.8.13-2.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108412" version="1" comment="subversion-bash-completion is &lt;1.8.13-2.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108413" version="1" comment="subversion-devel is &lt;1.8.13-2.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108414" version="1" comment="subversion-perl is &lt;1.8.13-2.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108415" version="1" comment="subversion-python is &lt;1.8.13-2.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108416" version="1" comment="subversion-python-ctypes is &lt;1.8.13-2.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108417" version="1" comment="subversion-ruby is &lt;1.8.13-2.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108418" version="1" comment="subversion-server is &lt;1.8.13-2.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108419" version="1" comment="subversion-tools is &lt;1.8.13-2.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108533" version="1" comment="MozillaFirefox is &lt;37.0.1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108534" version="1" comment="MozillaFirefox-branding-upstream is &lt;37.0.1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108535" version="1" comment="MozillaFirefox-buildsymbols is &lt;37.0.1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108536" version="1" comment="MozillaFirefox-devel is &lt;37.0.1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108537" version="1" comment="MozillaFirefox-translations-common is &lt;37.0.1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108538" version="1" comment="MozillaFirefox-translations-other is &lt;37.0.1-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108539" version="1" comment="MozillaThunderbird is &lt;31.6.0-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108540" version="1" comment="MozillaThunderbird-buildsymbols is &lt;31.6.0-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108541" version="1" comment="MozillaThunderbird-devel is &lt;31.6.0-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108542" version="1" comment="MozillaThunderbird-translations-common is &lt;31.6.0-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108543" version="1" comment="MozillaThunderbird-translations-other is &lt;31.6.0-15.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108545" version="1" comment="mozilla-nspr is &lt;4.10.8-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108544" version="1" comment="mozilla-nspr-32bit is &lt;4.10.8-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108546" version="1" comment="mozilla-nspr-devel is &lt;4.10.8-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108605" version="1" comment="quassel is &lt;0.10.0-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108606" version="1" comment="quassel-base is &lt;0.10.0-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108607" version="1" comment="quassel-client is &lt;0.10.0-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108608" version="1" comment="quassel-core is &lt;0.10.0-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108609" version="1" comment="quassel-mono is &lt;0.10.0-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108547" version="1" comment="apache2-mod_php5 is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108548" version="1" comment="php5 is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108549" version="1" comment="php5-bcmath is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108550" version="1" comment="php5-bz2 is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108551" version="1" comment="php5-calendar is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108552" version="1" comment="php5-ctype is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108553" version="1" comment="php5-curl is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108554" version="1" comment="php5-dba is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108555" version="1" comment="php5-devel is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108556" version="1" comment="php5-dom is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108557" version="1" comment="php5-enchant is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108558" version="1" comment="php5-exif is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108559" version="1" comment="php5-fastcgi is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108560" version="1" comment="php5-fileinfo is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108561" version="1" comment="php5-firebird is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108562" version="1" comment="php5-fpm is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108563" version="1" comment="php5-ftp is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108564" version="1" comment="php5-gd is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108565" version="1" comment="php5-gettext is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108566" version="1" comment="php5-gmp is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108567" version="1" comment="php5-iconv is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108568" version="1" comment="php5-imap is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108569" version="1" comment="php5-intl is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108570" version="1" comment="php5-json is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108571" version="1" comment="php5-ldap is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108572" version="1" comment="php5-mbstring is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108573" version="1" comment="php5-mcrypt is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108574" version="1" comment="php5-mssql is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108575" version="1" comment="php5-mysql is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108576" version="1" comment="php5-odbc is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108577" version="1" comment="php5-opcache is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108578" version="1" comment="php5-openssl is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108579" version="1" comment="php5-pcntl is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108580" version="1" comment="php5-pdo is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108581" version="1" comment="php5-pear is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108582" version="1" comment="php5-pgsql is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108583" version="1" comment="php5-phar is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108584" version="1" comment="php5-posix is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108585" version="1" comment="php5-pspell is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108586" version="1" comment="php5-readline is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108587" version="1" comment="php5-shmop is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108588" version="1" comment="php5-snmp is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108589" version="1" comment="php5-soap is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108590" version="1" comment="php5-sockets is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108591" version="1" comment="php5-sqlite is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108592" version="1" comment="php5-suhosin is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108593" version="1" comment="php5-sysvmsg is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108594" version="1" comment="php5-sysvsem is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108595" version="1" comment="php5-sysvshm is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108596" version="1" comment="php5-tidy is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108597" version="1" comment="php5-tokenizer is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108598" version="1" comment="php5-wddx is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108599" version="1" comment="php5-xmlreader is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108600" version="1" comment="php5-xmlrpc is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108601" version="1" comment="php5-xmlwriter is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108602" version="1" comment="php5-xsl is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108603" version="1" comment="php5-zip is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108604" version="1" comment="php5-zlib is &lt;5.6.1-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108615" version="1" comment="libpotrace0 is &lt;1.11-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108616" version="1" comment="potrace is &lt;1.11-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108617" version="1" comment="potrace-devel is &lt;1.11-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108610" version="1" comment="chromedriver is &lt;41.0.2272.118-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108611" version="1" comment="chromium is &lt;41.0.2272.118-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108612" version="1" comment="chromium-desktop-gnome is &lt;41.0.2272.118-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108613" version="1" comment="chromium-desktop-kde is &lt;41.0.2272.118-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108614" version="1" comment="chromium-ffmpegsumo is &lt;41.0.2272.118-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103696" version="1" comment="libvirt is &lt;1.2.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103697" version="1" comment="libvirt-client is &lt;1.2.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103698" version="1" comment="libvirt-client-32bit is &lt;1.2.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103699" version="1" comment="libvirt-daemon is &lt;1.2.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103700" version="1" comment="libvirt-daemon-config-network is &lt;1.2.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103701" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103702" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103721" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103703" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103704" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103705" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103706" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103707" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103708" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103709" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103710" version="1" comment="libvirt-daemon-driver-uml is &lt;1.2.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103711" version="1" comment="libvirt-daemon-driver-vbox is &lt;1.2.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103722" version="1" comment="libvirt-daemon-driver-xen is &lt;1.2.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103712" version="1" comment="libvirt-daemon-lxc is &lt;1.2.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103713" version="1" comment="libvirt-daemon-qemu is &lt;1.2.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103714" version="1" comment="libvirt-daemon-uml is &lt;1.2.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103715" version="1" comment="libvirt-daemon-vbox is &lt;1.2.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103723" version="1" comment="libvirt-daemon-xen is &lt;1.2.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103716" version="1" comment="libvirt-devel is &lt;1.2.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103717" version="1" comment="libvirt-devel-32bit is &lt;1.2.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103718" version="1" comment="libvirt-doc is &lt;1.2.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103719" version="1" comment="libvirt-lock-sanlock is &lt;1.2.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103720" version="1" comment="libvirt-login-shell is &lt;1.2.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117574" version="1" comment="flash-player is &lt;11.2.202.429-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117575" version="1" comment="flash-player-gnome is &lt;11.2.202.429-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117576" version="1" comment="flash-player-kde4 is &lt;11.2.202.429-2.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108876" version="1" comment="tor is &lt;0.2.4.27-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108989" version="1" comment="bbswitch is &lt;0.8-3.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108990" version="1" comment="bbswitch-kmp-default is &lt;0.8_k3.16.7_21-3.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108991" version="1" comment="bbswitch-kmp-desktop is &lt;0.8_k3.16.7_21-3.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108992" version="1" comment="bbswitch-kmp-pae is &lt;0.8_k3.16.7_21-3.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108993" version="1" comment="bbswitch-kmp-xen is &lt;0.8_k3.16.7_21-3.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108994" version="1" comment="cloop is &lt;2.639-14.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108995" version="1" comment="cloop-kmp-default is &lt;2.639_k3.16.7_21-14.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108996" version="1" comment="cloop-kmp-desktop is &lt;2.639_k3.16.7_21-14.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108997" version="1" comment="cloop-kmp-pae is &lt;2.639_k3.16.7_21-14.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108998" version="1" comment="cloop-kmp-xen is &lt;2.639_k3.16.7_21-14.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108999" version="1" comment="crash is &lt;7.0.8-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109000" version="1" comment="crash-devel is &lt;7.0.8-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109001" version="1" comment="crash-doc is &lt;7.0.8-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109002" version="1" comment="crash-eppic is &lt;7.0.8-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109003" version="1" comment="crash-gcore is &lt;7.0.8-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109004" version="1" comment="crash-kmp-default is &lt;7.0.8_k3.16.7_21-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109005" version="1" comment="crash-kmp-desktop is &lt;7.0.8_k3.16.7_21-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109006" version="1" comment="crash-kmp-pae is &lt;7.0.8_k3.16.7_21-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109007" version="1" comment="crash-kmp-xen is &lt;7.0.8_k3.16.7_21-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109008" version="1" comment="hdjmod is &lt;1.28-18.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109009" version="1" comment="hdjmod-kmp-default is &lt;1.28_k3.16.7_21-18.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109010" version="1" comment="hdjmod-kmp-desktop is &lt;1.28_k3.16.7_21-18.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109011" version="1" comment="hdjmod-kmp-pae is &lt;1.28_k3.16.7_21-18.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109012" version="1" comment="hdjmod-kmp-xen is &lt;1.28_k3.16.7_21-18.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109013" version="1" comment="ipset is &lt;6.23-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109014" version="1" comment="ipset-devel is &lt;6.23-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109015" version="1" comment="ipset-kmp-default is &lt;6.23_k3.16.7_21-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109016" version="1" comment="ipset-kmp-desktop is &lt;6.23_k3.16.7_21-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109017" version="1" comment="ipset-kmp-pae is &lt;6.23_k3.16.7_21-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109018" version="1" comment="ipset-kmp-xen is &lt;6.23_k3.16.7_21-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109020" version="1" comment="kernel-debug is &lt;3.16.7-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109021" version="1" comment="kernel-debug-base is &lt;3.16.7-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109022" version="1" comment="kernel-debug-devel is &lt;3.16.7-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109023" version="1" comment="kernel-default is &lt;3.16.7-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109024" version="1" comment="kernel-default-base is &lt;3.16.7-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109025" version="1" comment="kernel-default-devel is &lt;3.16.7-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109026" version="1" comment="kernel-desktop is &lt;3.16.7-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109027" version="1" comment="kernel-desktop-base is &lt;3.16.7-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109028" version="1" comment="kernel-desktop-devel is &lt;3.16.7-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109039" version="1" comment="kernel-devel is &lt;3.16.7-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109029" version="1" comment="kernel-docs is &lt;3.16.7-21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109030" version="1" comment="kernel-ec2 is &lt;3.16.7-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109031" version="1" comment="kernel-ec2-base is &lt;3.16.7-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109032" version="1" comment="kernel-ec2-devel is &lt;3.16.7-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109040" version="1" comment="kernel-macros is &lt;3.16.7-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109033" version="1" comment="kernel-obs-build is &lt;3.16.7-21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109035" version="1" comment="kernel-obs-qa is &lt;3.16.7-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109034" version="1" comment="kernel-obs-qa-xen is &lt;3.16.7-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109036" version="1" comment="kernel-pae is &lt;3.16.7-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109037" version="1" comment="kernel-pae-base is &lt;3.16.7-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109038" version="1" comment="kernel-pae-devel is &lt;3.16.7-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109041" version="1" comment="kernel-source is &lt;3.16.7-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109042" version="1" comment="kernel-source-vanilla is &lt;3.16.7-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109043" version="1" comment="kernel-syms is &lt;3.16.7-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109044" version="1" comment="kernel-vanilla is &lt;3.16.7-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109045" version="1" comment="kernel-vanilla-devel is &lt;3.16.7-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109046" version="1" comment="kernel-xen is &lt;3.16.7-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109047" version="1" comment="kernel-xen-base is &lt;3.16.7-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109048" version="1" comment="kernel-xen-devel is &lt;3.16.7-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109019" version="1" comment="libipset3 is &lt;6.23-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109049" version="1" comment="pcfclock is &lt;0.44-260.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109050" version="1" comment="pcfclock-kmp-default is &lt;0.44_k3.16.7_21-260.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109051" version="1" comment="pcfclock-kmp-desktop is &lt;0.44_k3.16.7_21-260.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109052" version="1" comment="pcfclock-kmp-pae is &lt;0.44_k3.16.7_21-260.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109058" version="1" comment="python-virtualbox is &lt;4.3.20-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109053" version="1" comment="vhba-kmp is &lt;20140629-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109054" version="1" comment="vhba-kmp-default is &lt;20140629_k3.16.7_21-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109055" version="1" comment="vhba-kmp-desktop is &lt;20140629_k3.16.7_21-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109056" version="1" comment="vhba-kmp-pae is &lt;20140629_k3.16.7_21-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109057" version="1" comment="vhba-kmp-xen is &lt;20140629_k3.16.7_21-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109059" version="1" comment="virtualbox is &lt;4.3.20-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109060" version="1" comment="virtualbox-devel is &lt;4.3.20-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109061" version="1" comment="virtualbox-guest-desktop-icons is &lt;4.3.20-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109062" version="1" comment="virtualbox-guest-kmp-default is &lt;4.3.20_k3.16.7_21-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109063" version="1" comment="virtualbox-guest-kmp-desktop is &lt;4.3.20_k3.16.7_21-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109064" version="1" comment="virtualbox-guest-kmp-pae is &lt;4.3.20_k3.16.7_21-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109065" version="1" comment="virtualbox-guest-tools is &lt;4.3.20-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109066" version="1" comment="virtualbox-guest-x11 is &lt;4.3.20-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109067" version="1" comment="virtualbox-host-kmp-default is &lt;4.3.20_k3.16.7_21-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109068" version="1" comment="virtualbox-host-kmp-desktop is &lt;4.3.20_k3.16.7_21-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109069" version="1" comment="virtualbox-host-kmp-pae is &lt;4.3.20_k3.16.7_21-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109070" version="1" comment="virtualbox-qt is &lt;4.3.20-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109071" version="1" comment="virtualbox-websrv is &lt;4.3.20-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109072" version="1" comment="xen is &lt;4.4.1_08-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109073" version="1" comment="xen-devel is &lt;4.4.1_08-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109082" version="1" comment="xen-doc-html is &lt;4.4.1_08-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109083" version="1" comment="xen-kmp-default is &lt;4.4.1_08_k3.16.7_21-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109084" version="1" comment="xen-kmp-desktop is &lt;4.4.1_08_k3.16.7_21-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109075" version="1" comment="xen-libs is &lt;4.4.1_08-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109074" version="1" comment="xen-libs-32bit is &lt;4.4.1_08-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109085" version="1" comment="xen-tools is &lt;4.4.1_08-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109076" version="1" comment="xen-tools-domU is &lt;4.4.1_08-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109077" version="1" comment="xtables-addons is &lt;2.6-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109078" version="1" comment="xtables-addons-kmp-default is &lt;2.6_k3.16.7_21-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109079" version="1" comment="xtables-addons-kmp-desktop is &lt;2.6_k3.16.7_21-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109080" version="1" comment="xtables-addons-kmp-pae is &lt;2.6_k3.16.7_21-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109081" version="1" comment="xtables-addons-kmp-xen is &lt;2.6_k3.16.7_21-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117577" version="1" comment="flash-player is &lt;11.2.202.457-2.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117578" version="1" comment="flash-player-gnome is &lt;11.2.202.457-2.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117579" version="1" comment="flash-player-kde4 is &lt;11.2.202.457-2.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108889" version="1" comment="rubygem-rest-client is &lt;1.6.7-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108890" version="1" comment="rubygem-rest-client-doc is &lt;1.6.7-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108891" version="1" comment="rubygem-rest-client-testsuite is &lt;1.6.7-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108892" version="1" comment="ntop is &lt;5.0.2-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108893" version="1" comment="icecast is &lt;2.4.0-2.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108894" version="1" comment="icecast-doc is &lt;2.4.0-2.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109086" version="1" comment="chromedriver is &lt;42.0.2311.90-23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109087" version="1" comment="chromium is &lt;42.0.2311.90-23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109088" version="1" comment="chromium-desktop-gnome is &lt;42.0.2311.90-23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109089" version="1" comment="chromium-desktop-kde is &lt;42.0.2311.90-23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109090" version="1" comment="chromium-ffmpegsumo is &lt;42.0.2311.90-23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109099" version="1" comment="MozillaFirefox is &lt;37.0.2-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109100" version="1" comment="MozillaFirefox-branding-upstream is &lt;37.0.2-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109101" version="1" comment="MozillaFirefox-buildsymbols is &lt;37.0.2-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109102" version="1" comment="MozillaFirefox-devel is &lt;37.0.2-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109103" version="1" comment="MozillaFirefox-translations-common is &lt;37.0.2-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109104" version="1" comment="MozillaFirefox-translations-other is &lt;37.0.2-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109121" version="1" comment="ntp is &lt;4.2.6p5-25.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109122" version="1" comment="ntp-doc is &lt;4.2.6p5-25.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109107" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.79-7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109108" version="1" comment="java-1_7_0-openjdk-accessibility is &lt;1.7.0.79-7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109109" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.79-7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109110" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.79-7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109111" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.79-7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109112" version="1" comment="java-1_7_0-openjdk-javadoc is &lt;1.7.0.79-7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109113" version="1" comment="java-1_7_0-openjdk-src is &lt;1.7.0.79-7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109114" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.45-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109115" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.45-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109116" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.45-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109117" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.45-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109118" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.45-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109119" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.45-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109120" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.45-9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109154" version="1" comment="curl is &lt;7.42.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109155" version="1" comment="libcurl-devel is &lt;7.42.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109157" version="1" comment="libcurl4 is &lt;7.42.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109156" version="1" comment="libcurl4-32bit is &lt;7.42.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109158" version="1" comment="python-Pillow is &lt;2.8.1-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109159" version="1" comment="python-Pillow-tk is &lt;2.8.1-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105150" version="1" comment="libblkid-devel is &lt;2.25.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105151" version="1" comment="libblkid-devel-32bit is &lt;2.25.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105152" version="1" comment="libblkid-devel-static is &lt;2.25.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105153" version="1" comment="libblkid1 is &lt;2.25.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105154" version="1" comment="libblkid1-32bit is &lt;2.25.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105155" version="1" comment="libmount-devel is &lt;2.25.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105156" version="1" comment="libmount-devel-32bit is &lt;2.25.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105157" version="1" comment="libmount-devel-static is &lt;2.25.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105158" version="1" comment="libmount1 is &lt;2.25.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105159" version="1" comment="libmount1-32bit is &lt;2.25.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105160" version="1" comment="libsmartcols-devel is &lt;2.25.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105161" version="1" comment="libsmartcols-devel-static is &lt;2.25.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105162" version="1" comment="libsmartcols1 is &lt;2.25.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105163" version="1" comment="libuuid-devel is &lt;2.25.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105164" version="1" comment="libuuid-devel-32bit is &lt;2.25.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105165" version="1" comment="libuuid-devel-static is &lt;2.25.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105166" version="1" comment="libuuid1 is &lt;2.25.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105167" version="1" comment="libuuid1-32bit is &lt;2.25.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105147" version="1" comment="python-libmount is &lt;2.25.1-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105168" version="1" comment="util-linux is &lt;2.25.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105169" version="1" comment="util-linux-lang is &lt;2.25.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105148" version="1" comment="util-linux-systemd is &lt;2.25.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105149" version="1" comment="uuidd is &lt;2.25.1-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109181" version="1" comment="DirectFB is &lt;1.7.5-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109182" version="1" comment="DirectFB-Mesa is &lt;1.7.5-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109183" version="1" comment="DirectFB-devel is &lt;1.7.5-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109184" version="1" comment="DirectFB-devel-32bit is &lt;1.7.5-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109185" version="1" comment="DirectFB-doc is &lt;1.7.5-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109186" version="1" comment="DirectFB-libSDL is &lt;1.7.5-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109187" version="1" comment="DirectFB-libvncclient is &lt;1.7.5-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109188" version="1" comment="lib++dfb-1_7-5 is &lt;1.7.5-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109189" version="1" comment="lib++dfb-devel is &lt;1.7.5-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109179" version="1" comment="libdirectfb-1_6-0 is &lt;1.6.3-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109180" version="1" comment="libdirectfb-1_6-0-32bit is &lt;1.6.3-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109190" version="1" comment="libdirectfb-1_7-5 is &lt;1.7.5-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109191" version="1" comment="libdirectfb-1_7-5-32bit is &lt;1.7.5-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109206" version="1" comment="wpa_supplicant is &lt;2.2-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109207" version="1" comment="wpa_supplicant-gui is &lt;2.2-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109363" version="1" comment="apache2-mod_php5 is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109364" version="1" comment="php5 is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109365" version="1" comment="php5-bcmath is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109366" version="1" comment="php5-bz2 is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109367" version="1" comment="php5-calendar is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109368" version="1" comment="php5-ctype is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109369" version="1" comment="php5-curl is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109370" version="1" comment="php5-dba is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109371" version="1" comment="php5-devel is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109372" version="1" comment="php5-dom is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109373" version="1" comment="php5-enchant is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109374" version="1" comment="php5-exif is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109375" version="1" comment="php5-fastcgi is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109376" version="1" comment="php5-fileinfo is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109377" version="1" comment="php5-firebird is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109378" version="1" comment="php5-fpm is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109379" version="1" comment="php5-ftp is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109380" version="1" comment="php5-gd is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109381" version="1" comment="php5-gettext is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109382" version="1" comment="php5-gmp is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109383" version="1" comment="php5-iconv is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109384" version="1" comment="php5-imap is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109385" version="1" comment="php5-intl is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109386" version="1" comment="php5-json is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109387" version="1" comment="php5-ldap is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109388" version="1" comment="php5-mbstring is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109389" version="1" comment="php5-mcrypt is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109390" version="1" comment="php5-mssql is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109391" version="1" comment="php5-mysql is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109392" version="1" comment="php5-odbc is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109393" version="1" comment="php5-opcache is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109394" version="1" comment="php5-openssl is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109395" version="1" comment="php5-pcntl is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109396" version="1" comment="php5-pdo is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109397" version="1" comment="php5-pear is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109398" version="1" comment="php5-pgsql is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109399" version="1" comment="php5-phar is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109400" version="1" comment="php5-posix is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109401" version="1" comment="php5-pspell is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109402" version="1" comment="php5-readline is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109403" version="1" comment="php5-shmop is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109404" version="1" comment="php5-snmp is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109405" version="1" comment="php5-soap is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109406" version="1" comment="php5-sockets is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109407" version="1" comment="php5-sqlite is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109408" version="1" comment="php5-suhosin is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109409" version="1" comment="php5-sysvmsg is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109410" version="1" comment="php5-sysvsem is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109411" version="1" comment="php5-sysvshm is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109412" version="1" comment="php5-tidy is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109413" version="1" comment="php5-tokenizer is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109414" version="1" comment="php5-wddx is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109415" version="1" comment="php5-xmlreader is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109416" version="1" comment="php5-xmlrpc is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109417" version="1" comment="php5-xmlwriter is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109418" version="1" comment="php5-xsl is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109419" version="1" comment="php5-zip is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109420" version="1" comment="php5-zlib is &lt;5.6.1-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109526" version="1" comment="libpcre1 is &lt;8.37-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109525" version="1" comment="libpcre1-32bit is &lt;8.37-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109528" version="1" comment="libpcre16-0 is &lt;8.37-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109527" version="1" comment="libpcre16-0-32bit is &lt;8.37-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109530" version="1" comment="libpcrecpp0 is &lt;8.37-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109529" version="1" comment="libpcrecpp0-32bit is &lt;8.37-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109532" version="1" comment="libpcreposix0 is &lt;8.37-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109531" version="1" comment="libpcreposix0-32bit is &lt;8.37-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109533" version="1" comment="pcre is &lt;8.37-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109534" version="1" comment="pcre-devel is &lt;8.37-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109535" version="1" comment="pcre-devel-static is &lt;8.37-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109536" version="1" comment="pcre-doc is &lt;8.37-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109537" version="1" comment="pcre-tools is &lt;8.37-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109520" version="1" comment="chromedriver is &lt;42.0.2311.135-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109521" version="1" comment="chromium is &lt;42.0.2311.135-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109522" version="1" comment="chromium-desktop-gnome is &lt;42.0.2311.135-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109523" version="1" comment="chromium-desktop-kde is &lt;42.0.2311.135-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109524" version="1" comment="chromium-ffmpegsumo is &lt;42.0.2311.135-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109538" version="1" comment="libssh is &lt;0.6.3-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109539" version="1" comment="libssh-devel is &lt;0.6.3-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109540" version="1" comment="libssh-devel-doc is &lt;0.6.3-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109541" version="1" comment="libssh4 is &lt;0.6.3-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109542" version="1" comment="libssh4-32bit is &lt;0.6.3-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109515" version="1" comment="curl is &lt;7.42.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109517" version="1" comment="libcurl-devel is &lt;7.42.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109516" version="1" comment="libcurl-devel-32bit is &lt;7.42.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109519" version="1" comment="libcurl4 is &lt;7.42.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109518" version="1" comment="libcurl4-32bit is &lt;7.42.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109421" version="1" comment="libreoffice is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109422" version="1" comment="libreoffice-base is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109423" version="1" comment="libreoffice-base-drivers-mysql is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109424" version="1" comment="libreoffice-base-drivers-postgresql is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109425" version="1" comment="libreoffice-branding-upstream is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109426" version="1" comment="libreoffice-calc is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109427" version="1" comment="libreoffice-calc-extensions is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109428" version="1" comment="libreoffice-draw is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109429" version="1" comment="libreoffice-filters-optional is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109430" version="1" comment="libreoffice-gnome is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109431" version="1" comment="libreoffice-icon-theme-crystal is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109432" version="1" comment="libreoffice-icon-theme-galaxy is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109433" version="1" comment="libreoffice-icon-theme-hicontrast is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109434" version="1" comment="libreoffice-icon-theme-oxygen is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109435" version="1" comment="libreoffice-icon-theme-sifr is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109436" version="1" comment="libreoffice-icon-theme-tango is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109437" version="1" comment="libreoffice-impress is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109438" version="1" comment="libreoffice-kde4 is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109439" version="1" comment="libreoffice-l10n-af is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109440" version="1" comment="libreoffice-l10n-ar is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109441" version="1" comment="libreoffice-l10n-as is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109442" version="1" comment="libreoffice-l10n-bg is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109443" version="1" comment="libreoffice-l10n-bn is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109444" version="1" comment="libreoffice-l10n-br is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109445" version="1" comment="libreoffice-l10n-ca is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109446" version="1" comment="libreoffice-l10n-cs is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109447" version="1" comment="libreoffice-l10n-cy is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109448" version="1" comment="libreoffice-l10n-da is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109449" version="1" comment="libreoffice-l10n-de is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109450" version="1" comment="libreoffice-l10n-dz is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109451" version="1" comment="libreoffice-l10n-el is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109452" version="1" comment="libreoffice-l10n-en is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109453" version="1" comment="libreoffice-l10n-es is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109454" version="1" comment="libreoffice-l10n-et is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109455" version="1" comment="libreoffice-l10n-eu is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109456" version="1" comment="libreoffice-l10n-fa is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109457" version="1" comment="libreoffice-l10n-fi is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109458" version="1" comment="libreoffice-l10n-fr is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109459" version="1" comment="libreoffice-l10n-ga is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109460" version="1" comment="libreoffice-l10n-gl is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109461" version="1" comment="libreoffice-l10n-gu is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109462" version="1" comment="libreoffice-l10n-he is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109463" version="1" comment="libreoffice-l10n-hi is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109464" version="1" comment="libreoffice-l10n-hr is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109465" version="1" comment="libreoffice-l10n-hu is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109466" version="1" comment="libreoffice-l10n-it is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109467" version="1" comment="libreoffice-l10n-ja is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109468" version="1" comment="libreoffice-l10n-kk is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109469" version="1" comment="libreoffice-l10n-kn is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109470" version="1" comment="libreoffice-l10n-ko is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109471" version="1" comment="libreoffice-l10n-lt is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109472" version="1" comment="libreoffice-l10n-lv is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109473" version="1" comment="libreoffice-l10n-mai is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109474" version="1" comment="libreoffice-l10n-ml is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109475" version="1" comment="libreoffice-l10n-mr is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109476" version="1" comment="libreoffice-l10n-nb is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109477" version="1" comment="libreoffice-l10n-nl is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109478" version="1" comment="libreoffice-l10n-nn is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109479" version="1" comment="libreoffice-l10n-nr is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109480" version="1" comment="libreoffice-l10n-nso is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109481" version="1" comment="libreoffice-l10n-or is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109482" version="1" comment="libreoffice-l10n-pa is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109483" version="1" comment="libreoffice-l10n-pl is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109484" version="1" comment="libreoffice-l10n-pt-BR is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109485" version="1" comment="libreoffice-l10n-pt-PT is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109486" version="1" comment="libreoffice-l10n-ro is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109487" version="1" comment="libreoffice-l10n-ru is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109488" version="1" comment="libreoffice-l10n-si is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109489" version="1" comment="libreoffice-l10n-sk is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109490" version="1" comment="libreoffice-l10n-sl is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109491" version="1" comment="libreoffice-l10n-sr is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109492" version="1" comment="libreoffice-l10n-ss is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109493" version="1" comment="libreoffice-l10n-st is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109494" version="1" comment="libreoffice-l10n-sv is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109495" version="1" comment="libreoffice-l10n-ta is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109496" version="1" comment="libreoffice-l10n-te is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109497" version="1" comment="libreoffice-l10n-th is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109498" version="1" comment="libreoffice-l10n-tn is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109499" version="1" comment="libreoffice-l10n-tr is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109500" version="1" comment="libreoffice-l10n-ts is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109501" version="1" comment="libreoffice-l10n-uk is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109502" version="1" comment="libreoffice-l10n-ve is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109503" version="1" comment="libreoffice-l10n-xh is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109504" version="1" comment="libreoffice-l10n-zh-Hans is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109505" version="1" comment="libreoffice-l10n-zh-Hant is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109506" version="1" comment="libreoffice-l10n-zu is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109507" version="1" comment="libreoffice-mailmerge is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109508" version="1" comment="libreoffice-math is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109509" version="1" comment="libreoffice-officebean is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109510" version="1" comment="libreoffice-pyuno is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109511" version="1" comment="libreoffice-sdk is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109512" version="1" comment="libreoffice-sdk-doc is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109513" version="1" comment="libreoffice-writer is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109514" version="1" comment="libreoffice-writer-extensions is &lt;4.3.7.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109326" version="1" comment="gnu_parallel is &lt;20150422-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109327" version="1" comment="gnu_parallel-doc is &lt;20150422-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109361" version="1" comment="dnsmasq is &lt;2.71-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109362" version="1" comment="dnsmasq-utils is &lt;2.71-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109356" version="1" comment="libtasn1 is &lt;3.7-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109357" version="1" comment="libtasn1-6 is &lt;3.7-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109358" version="1" comment="libtasn1-6-32bit is &lt;3.7-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109359" version="1" comment="libtasn1-devel is &lt;3.7-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109360" version="1" comment="libtasn1-devel-32bit is &lt;3.7-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109813" version="1" comment="libcacard is &lt;2.1.3-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109814" version="1" comment="libcacard-devel is &lt;2.1.3-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109815" version="1" comment="libcacard0 is &lt;2.1.3-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109817" version="1" comment="qemu is &lt;2.1.3-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109818" version="1" comment="qemu-arm is &lt;2.1.3-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109819" version="1" comment="qemu-block-curl is &lt;2.1.3-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109820" version="1" comment="qemu-extra is &lt;2.1.3-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109821" version="1" comment="qemu-guest-agent is &lt;2.1.3-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109822" version="1" comment="qemu-ipxe is &lt;1.0.0-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109823" version="1" comment="qemu-ksm is &lt;2.1.3-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109824" version="1" comment="qemu-kvm is &lt;2.1.3-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109825" version="1" comment="qemu-lang is &lt;2.1.3-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109816" version="1" comment="qemu-linux-user is &lt;2.1.3-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109826" version="1" comment="qemu-ppc is &lt;2.1.3-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109827" version="1" comment="qemu-s390 is &lt;2.1.3-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109828" version="1" comment="qemu-seabios is &lt;1.7.5-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109829" version="1" comment="qemu-sgabios is &lt;8-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109830" version="1" comment="qemu-tools is &lt;2.1.3-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109831" version="1" comment="qemu-vgabios is &lt;1.7.5-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109832" version="1" comment="qemu-x86 is &lt;2.1.3-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109688" version="1" comment="docker is &lt;1.6.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109689" version="1" comment="docker-bash-completion is &lt;1.6.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109690" version="1" comment="docker-zsh-completion is &lt;1.6.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109691" version="1" comment="clamav is &lt;0.98.7-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117580" version="1" comment="flash-player is &lt;11.2.202.460-2.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117581" version="1" comment="flash-player-gnome is &lt;11.2.202.460-2.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117582" version="1" comment="flash-player-kde4 is &lt;11.2.202.460-2.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109786" version="1" comment="MozillaThunderbird is &lt;31.7.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109787" version="1" comment="MozillaThunderbird-buildsymbols is &lt;31.7.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109788" version="1" comment="MozillaThunderbird-devel is &lt;31.7.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109789" version="1" comment="MozillaThunderbird-translations-common is &lt;31.7.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109790" version="1" comment="MozillaThunderbird-translations-other is &lt;31.7.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109791" version="1" comment="MozillaFirefox is &lt;38.0.1-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109792" version="1" comment="MozillaFirefox-branding-upstream is &lt;38.0.1-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109793" version="1" comment="MozillaFirefox-buildsymbols is &lt;38.0.1-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109794" version="1" comment="MozillaFirefox-devel is &lt;38.0.1-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109795" version="1" comment="MozillaFirefox-translations-common is &lt;38.0.1-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109796" version="1" comment="MozillaFirefox-translations-other is &lt;38.0.1-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109797" version="1" comment="libfreebl3 is &lt;3.18.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109798" version="1" comment="libfreebl3-32bit is &lt;3.18.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109799" version="1" comment="libsoftokn3 is &lt;3.18.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109800" version="1" comment="libsoftokn3-32bit is &lt;3.18.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109801" version="1" comment="mozilla-nss is &lt;3.18.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109802" version="1" comment="mozilla-nss-32bit is &lt;3.18.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109803" version="1" comment="mozilla-nss-certs is &lt;3.18.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109804" version="1" comment="mozilla-nss-certs-32bit is &lt;3.18.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109805" version="1" comment="mozilla-nss-devel is &lt;3.18.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109806" version="1" comment="mozilla-nss-sysinit is &lt;3.18.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109807" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.18.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109808" version="1" comment="mozilla-nss-tools is &lt;3.18.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109769" version="1" comment="quassel is &lt;0.10.0-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109770" version="1" comment="quassel-base is &lt;0.10.0-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109771" version="1" comment="quassel-client is &lt;0.10.0-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109772" version="1" comment="quassel-core is &lt;0.10.0-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109773" version="1" comment="quassel-mono is &lt;0.10.0-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109777" version="1" comment="LibVNCServer is &lt;0.9.10-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109778" version="1" comment="LibVNCServer-devel is &lt;0.9.10-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109779" version="1" comment="libvncclient0 is &lt;0.9.10-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109780" version="1" comment="libvncserver0 is &lt;0.9.10-10.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109781" version="1" comment="libraw is &lt;0.16.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109782" version="1" comment="libraw-devel is &lt;0.16.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109783" version="1" comment="libraw-devel-static is &lt;0.16.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109784" version="1" comment="libraw-tools is &lt;0.16.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109785" version="1" comment="libraw10 is &lt;0.16.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109743" version="1" comment="libraw9 is &lt;0.15.4-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109809" version="1" comment="wireshark is &lt;1.12.5-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109810" version="1" comment="wireshark-devel is &lt;1.12.5-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109811" version="1" comment="wireshark-ui-gtk is &lt;1.12.5-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109812" version="1" comment="wireshark-ui-qt is &lt;1.12.5-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105184" version="1" comment="vsftpd is &lt;3.0.2-14.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109775" version="1" comment="coreutils is &lt;8.23-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109776" version="1" comment="coreutils-lang is &lt;8.23-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109774" version="1" comment="coreutils-testsuite is &lt;8.23-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110738" version="1" comment="glibc is &lt;2.19-16.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110739" version="1" comment="glibc-32bit is &lt;2.19-16.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110740" version="1" comment="glibc-devel is &lt;2.19-16.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110741" version="1" comment="glibc-devel-32bit is &lt;2.19-16.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110742" version="1" comment="glibc-devel-static is &lt;2.19-16.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110743" version="1" comment="glibc-devel-static-32bit is &lt;2.19-16.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110748" version="1" comment="glibc-extra is &lt;2.19-16.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110749" version="1" comment="glibc-html is &lt;2.19-16.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110750" version="1" comment="glibc-i18ndata is &lt;2.19-16.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110751" version="1" comment="glibc-info is &lt;2.19-16.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110744" version="1" comment="glibc-locale is &lt;2.19-16.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110745" version="1" comment="glibc-locale-32bit is &lt;2.19-16.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110752" version="1" comment="glibc-obsolete is &lt;2.19-16.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110746" version="1" comment="glibc-profile is &lt;2.19-16.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110747" version="1" comment="glibc-profile-32bit is &lt;2.19-16.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110735" version="1" comment="glibc-testsuite is &lt;2.19-16.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110736" version="1" comment="glibc-utils is &lt;2.19-16.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110737" version="1" comment="glibc-utils-32bit is &lt;2.19-16.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110753" version="1" comment="nscd is &lt;2.19-16.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109969" version="1" comment="gnu_parallel is &lt;20150522-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109970" version="1" comment="gnu_parallel-doc is &lt;20150522-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109982" version="1" comment="mysql-connector-java is &lt;5.1.35-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109977" version="1" comment="chromedriver is &lt;43.0.2357.65-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109978" version="1" comment="chromium is &lt;43.0.2357.65-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109979" version="1" comment="chromium-desktop-gnome is &lt;43.0.2357.65-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109980" version="1" comment="chromium-desktop-kde is &lt;43.0.2357.65-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109981" version="1" comment="chromium-ffmpegsumo is &lt;43.0.2357.65-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110102" version="1" comment="nbd is &lt;3.3-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110103" version="1" comment="nbd-doc is &lt;3.3-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110104" version="1" comment="fuse is &lt;2.9.4-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110105" version="1" comment="fuse-devel is &lt;2.9.4-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110106" version="1" comment="fuse-devel-static is &lt;2.9.4-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110107" version="1" comment="libfuse2 is &lt;2.9.4-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110108" version="1" comment="libfuse2-32bit is &lt;2.9.4-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110109" version="1" comment="libulockmgr1 is &lt;2.9.4-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110110" version="1" comment="apache2-mod_php5 is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110111" version="1" comment="php5 is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110112" version="1" comment="php5-bcmath is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110113" version="1" comment="php5-bz2 is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110114" version="1" comment="php5-calendar is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110115" version="1" comment="php5-ctype is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110116" version="1" comment="php5-curl is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110117" version="1" comment="php5-dba is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110118" version="1" comment="php5-devel is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110119" version="1" comment="php5-dom is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110120" version="1" comment="php5-enchant is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110121" version="1" comment="php5-exif is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110122" version="1" comment="php5-fastcgi is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110123" version="1" comment="php5-fileinfo is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110124" version="1" comment="php5-firebird is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110125" version="1" comment="php5-fpm is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110126" version="1" comment="php5-ftp is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110127" version="1" comment="php5-gd is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110128" version="1" comment="php5-gettext is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110129" version="1" comment="php5-gmp is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110130" version="1" comment="php5-iconv is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110131" version="1" comment="php5-imap is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110132" version="1" comment="php5-intl is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110133" version="1" comment="php5-json is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110134" version="1" comment="php5-ldap is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110135" version="1" comment="php5-mbstring is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110136" version="1" comment="php5-mcrypt is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110137" version="1" comment="php5-mssql is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110138" version="1" comment="php5-mysql is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110139" version="1" comment="php5-odbc is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110140" version="1" comment="php5-opcache is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110141" version="1" comment="php5-openssl is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110142" version="1" comment="php5-pcntl is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110143" version="1" comment="php5-pdo is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110144" version="1" comment="php5-pear is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110145" version="1" comment="php5-pgsql is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110146" version="1" comment="php5-phar is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110147" version="1" comment="php5-posix is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110148" version="1" comment="php5-pspell is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110149" version="1" comment="php5-readline is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110150" version="1" comment="php5-shmop is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110151" version="1" comment="php5-snmp is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110152" version="1" comment="php5-soap is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110153" version="1" comment="php5-sockets is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110154" version="1" comment="php5-sqlite is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110155" version="1" comment="php5-suhosin is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110156" version="1" comment="php5-sysvmsg is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110157" version="1" comment="php5-sysvsem is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110158" version="1" comment="php5-sysvshm is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110159" version="1" comment="php5-tidy is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110160" version="1" comment="php5-tokenizer is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110161" version="1" comment="php5-wddx is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110162" version="1" comment="php5-xmlreader is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110163" version="1" comment="php5-xmlrpc is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110164" version="1" comment="php5-xmlwriter is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110165" version="1" comment="php5-xsl is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110166" version="1" comment="php5-zip is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110167" version="1" comment="php5-zlib is &lt;5.6.1-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110189" version="1" comment="e2fsprogs is &lt;1.42.12-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110190" version="1" comment="e2fsprogs-devel is &lt;1.42.12-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110191" version="1" comment="libcom_err-devel is &lt;1.42.12-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110192" version="1" comment="libcom_err-devel-32bit is &lt;1.42.12-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110193" version="1" comment="libcom_err2 is &lt;1.42.12-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110194" version="1" comment="libcom_err2-32bit is &lt;1.42.12-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110195" version="1" comment="libext2fs-devel is &lt;1.42.12-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110196" version="1" comment="libext2fs-devel-32bit is &lt;1.42.12-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110197" version="1" comment="libext2fs2 is &lt;1.42.12-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110198" version="1" comment="libext2fs2-32bit is &lt;1.42.12-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105185" version="1" comment="MozillaFirefox is &lt;35.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105186" version="1" comment="MozillaFirefox-branding-upstream is &lt;35.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105187" version="1" comment="MozillaFirefox-buildsymbols is &lt;35.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105188" version="1" comment="MozillaFirefox-devel is &lt;35.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105189" version="1" comment="MozillaFirefox-translations-common is &lt;35.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105190" version="1" comment="MozillaFirefox-translations-other is &lt;35.0-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110267" version="1" comment="libzmq4 is &lt;4.0.5-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110268" version="1" comment="zeromq is &lt;4.0.5-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110269" version="1" comment="zeromq-devel is &lt;4.0.5-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110270" version="1" comment="zeromq-tools is &lt;4.0.5-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110302" version="1" comment="proftpd is &lt;1.3.5a-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110303" version="1" comment="proftpd-devel is &lt;1.3.5a-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110304" version="1" comment="proftpd-doc is &lt;1.3.5a-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110305" version="1" comment="proftpd-lang is &lt;1.3.5a-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110306" version="1" comment="proftpd-ldap is &lt;1.3.5a-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110307" version="1" comment="proftpd-mysql is &lt;1.3.5a-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110308" version="1" comment="proftpd-pgsql is &lt;1.3.5a-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110309" version="1" comment="proftpd-radius is &lt;1.3.5a-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110310" version="1" comment="proftpd-sqlite is &lt;1.3.5a-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110300" version="1" comment="wpa_supplicant is &lt;2.2-5.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110301" version="1" comment="wpa_supplicant-gui is &lt;2.2-5.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117583" version="1" comment="flash-player is &lt;11.2.202.466-2.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117584" version="1" comment="flash-player-gnome is &lt;11.2.202.466-2.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117585" version="1" comment="flash-player-kde4 is &lt;11.2.202.466-2.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110311" version="1" comment="libtidy-0_99-0 is &lt;1.0.20100204cvs-19.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110312" version="1" comment="libtidy-0_99-0-devel is &lt;1.0.20100204cvs-19.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110313" version="1" comment="tidy is &lt;1.0.20100204cvs-19.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110314" version="1" comment="tidy-doc is &lt;1.0.20100204cvs-19.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110482" version="1" comment="cups is &lt;1.5.4-21.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110483" version="1" comment="cups-client is &lt;1.5.4-21.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110484" version="1" comment="cups-ddk is &lt;1.5.4-21.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110485" version="1" comment="cups-devel is &lt;1.5.4-21.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110486" version="1" comment="cups-libs is &lt;1.5.4-21.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110487" version="1" comment="cups-libs-32bit is &lt;1.5.4-21.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110417" version="1" comment="apache2-mod_php5 is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110418" version="1" comment="php5 is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110419" version="1" comment="php5-bcmath is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110420" version="1" comment="php5-bz2 is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110421" version="1" comment="php5-calendar is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110422" version="1" comment="php5-ctype is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110423" version="1" comment="php5-curl is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110424" version="1" comment="php5-dba is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110425" version="1" comment="php5-devel is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110426" version="1" comment="php5-dom is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110427" version="1" comment="php5-enchant is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110428" version="1" comment="php5-exif is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110429" version="1" comment="php5-fastcgi is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110430" version="1" comment="php5-fileinfo is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110431" version="1" comment="php5-firebird is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110432" version="1" comment="php5-fpm is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110433" version="1" comment="php5-ftp is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110434" version="1" comment="php5-gd is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110435" version="1" comment="php5-gettext is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110436" version="1" comment="php5-gmp is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110437" version="1" comment="php5-iconv is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110438" version="1" comment="php5-imap is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110439" version="1" comment="php5-intl is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110440" version="1" comment="php5-json is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110441" version="1" comment="php5-ldap is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110442" version="1" comment="php5-mbstring is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110443" version="1" comment="php5-mcrypt is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110444" version="1" comment="php5-mssql is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110445" version="1" comment="php5-mysql is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110446" version="1" comment="php5-odbc is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110447" version="1" comment="php5-opcache is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110448" version="1" comment="php5-openssl is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110449" version="1" comment="php5-pcntl is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110450" version="1" comment="php5-pdo is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110451" version="1" comment="php5-pear is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110452" version="1" comment="php5-pgsql is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110453" version="1" comment="php5-phar is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110454" version="1" comment="php5-posix is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110455" version="1" comment="php5-pspell is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110456" version="1" comment="php5-readline is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110457" version="1" comment="php5-shmop is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110458" version="1" comment="php5-snmp is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110459" version="1" comment="php5-soap is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110460" version="1" comment="php5-sockets is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110461" version="1" comment="php5-sqlite is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110462" version="1" comment="php5-suhosin is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110463" version="1" comment="php5-sysvmsg is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110464" version="1" comment="php5-sysvsem is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110465" version="1" comment="php5-sysvshm is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110466" version="1" comment="php5-tidy is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110467" version="1" comment="php5-tokenizer is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110468" version="1" comment="php5-wddx is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110469" version="1" comment="php5-xmlreader is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110470" version="1" comment="php5-xmlrpc is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110471" version="1" comment="php5-xmlwriter is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110472" version="1" comment="php5-xsl is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110473" version="1" comment="php5-zip is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110474" version="1" comment="php5-zlib is &lt;5.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110476" version="1" comment="coreutils is &lt;8.23-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110477" version="1" comment="coreutils-lang is &lt;8.23-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110475" version="1" comment="coreutils-testsuite is &lt;8.23-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110478" version="1" comment="dpkg is &lt;1.16.16-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110479" version="1" comment="dpkg-devel is &lt;1.16.16-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110480" version="1" comment="dpkg-lang is &lt;1.16.16-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110481" version="1" comment="update-alternatives is &lt;1.16.16-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110551" version="1" comment="strongswan is &lt;5.1.3-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110552" version="1" comment="strongswan-doc is &lt;5.1.3-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110553" version="1" comment="strongswan-ipsec is &lt;5.1.3-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110554" version="1" comment="strongswan-libs0 is &lt;5.1.3-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110555" version="1" comment="strongswan-mysql is &lt;5.1.3-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110556" version="1" comment="strongswan-nm is &lt;5.1.3-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110557" version="1" comment="strongswan-sqlite is &lt;5.1.3-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110559" version="1" comment="busybox is &lt;1.22.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110558" version="1" comment="busybox-static is &lt;1.22.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110614" version="1" comment="xen is &lt;4.4.2_06-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110615" version="1" comment="xen-devel is &lt;4.4.2_06-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110619" version="1" comment="xen-doc-html is &lt;4.4.2_06-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110620" version="1" comment="xen-kmp-default is &lt;4.4.2_06_k3.16.7_21-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110621" version="1" comment="xen-kmp-desktop is &lt;4.4.2_06_k3.16.7_21-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110617" version="1" comment="xen-libs is &lt;4.4.2_06-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110616" version="1" comment="xen-libs-32bit is &lt;4.4.2_06-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110622" version="1" comment="xen-tools is &lt;4.4.2_06-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110618" version="1" comment="xen-tools-domU is &lt;4.4.2_06-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110623" version="1" comment="cgit is &lt;0.11.2-13.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110624" version="1" comment="xorg-x11-server is &lt;7.6_1.16.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110625" version="1" comment="xorg-x11-server-extra is &lt;7.6_1.16.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110626" version="1" comment="xorg-x11-server-sdk is &lt;7.6_1.16.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110653" version="1" comment="libwmf is &lt;0.2.8.4-239.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110654" version="1" comment="libwmf-0_2-7 is &lt;0.2.8.4-239.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110655" version="1" comment="libwmf-0_2-7-32bit is &lt;0.2.8.4-239.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110656" version="1" comment="libwmf-devel is &lt;0.2.8.4-239.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110657" version="1" comment="libwmf-gnome is &lt;0.2.8.4-239.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110658" version="1" comment="libwmf-gnome-32bit is &lt;0.2.8.4-239.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110659" version="1" comment="libwmf-tools is &lt;0.2.8.4-239.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110660" version="1" comment="cacti is &lt;0.8.8d-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110648" version="1" comment="curl is &lt;7.42.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110650" version="1" comment="libcurl-devel is &lt;7.42.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110649" version="1" comment="libcurl-devel-32bit is &lt;7.42.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110652" version="1" comment="libcurl4 is &lt;7.42.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110651" version="1" comment="libcurl4-32bit is &lt;7.42.1-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110688" version="1" comment="libopenssl-devel is &lt;1.0.1k-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110689" version="1" comment="libopenssl-devel-32bit is &lt;1.0.1k-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110690" version="1" comment="libopenssl1_0_0 is &lt;1.0.1k-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110691" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1k-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110692" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1k-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110693" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1k-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110694" version="1" comment="openssl is &lt;1.0.1k-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110695" version="1" comment="openssl-doc is &lt;1.0.1k-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110754" version="1" comment="chromedriver is &lt;43.0.2357.130-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110755" version="1" comment="chromium is &lt;43.0.2357.130-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110756" version="1" comment="chromium-desktop-gnome is &lt;43.0.2357.130-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110757" version="1" comment="chromium-desktop-kde is &lt;43.0.2357.130-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110758" version="1" comment="chromium-ffmpegsumo is &lt;43.0.2357.130-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117586" version="1" comment="flash-player is &lt;11.2.202.468-2.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117587" version="1" comment="flash-player-gnome is &lt;11.2.202.468-2.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117588" version="1" comment="flash-player-kde4 is &lt;11.2.202.468-2.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110762" version="1" comment="roundcubemail is &lt;1.0.6-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110797" version="1" comment="p7zip is &lt;9.20.1-12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110801" version="1" comment="rubygem-RedCloth is &lt;4.2.9-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110802" version="1" comment="rubygem-RedCloth-doc is &lt;4.2.9-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110803" version="1" comment="rubygem-RedCloth-testsuite is &lt;4.2.9-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045174"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110879" version="1" comment="phpMyAdmin is &lt;4.2.13.3-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110937" version="1" comment="apache2-mod_php5 is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110938" version="1" comment="php5 is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110939" version="1" comment="php5-bcmath is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110940" version="1" comment="php5-bz2 is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110941" version="1" comment="php5-calendar is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110942" version="1" comment="php5-ctype is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110943" version="1" comment="php5-curl is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110944" version="1" comment="php5-dba is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110945" version="1" comment="php5-devel is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110946" version="1" comment="php5-dom is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110947" version="1" comment="php5-enchant is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110948" version="1" comment="php5-exif is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110949" version="1" comment="php5-fastcgi is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110950" version="1" comment="php5-fileinfo is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110951" version="1" comment="php5-firebird is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110952" version="1" comment="php5-fpm is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110953" version="1" comment="php5-ftp is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110954" version="1" comment="php5-gd is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110955" version="1" comment="php5-gettext is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110956" version="1" comment="php5-gmp is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110957" version="1" comment="php5-iconv is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110958" version="1" comment="php5-imap is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110959" version="1" comment="php5-intl is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110960" version="1" comment="php5-json is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110961" version="1" comment="php5-ldap is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110962" version="1" comment="php5-mbstring is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110963" version="1" comment="php5-mcrypt is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110964" version="1" comment="php5-mssql is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110965" version="1" comment="php5-mysql is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110966" version="1" comment="php5-odbc is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110967" version="1" comment="php5-opcache is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110968" version="1" comment="php5-openssl is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110969" version="1" comment="php5-pcntl is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110970" version="1" comment="php5-pdo is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110971" version="1" comment="php5-pear is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110972" version="1" comment="php5-pgsql is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110973" version="1" comment="php5-phar is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110974" version="1" comment="php5-posix is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110975" version="1" comment="php5-pspell is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110976" version="1" comment="php5-readline is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110977" version="1" comment="php5-shmop is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110978" version="1" comment="php5-snmp is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110979" version="1" comment="php5-soap is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110980" version="1" comment="php5-sockets is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110981" version="1" comment="php5-sqlite is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110982" version="1" comment="php5-suhosin is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110983" version="1" comment="php5-sysvmsg is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110984" version="1" comment="php5-sysvsem is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110985" version="1" comment="php5-sysvshm is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110986" version="1" comment="php5-tidy is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110987" version="1" comment="php5-tokenizer is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110988" version="1" comment="php5-wddx is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110989" version="1" comment="php5-xmlreader is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110990" version="1" comment="php5-xmlrpc is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110991" version="1" comment="php5-xmlwriter is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110992" version="1" comment="php5-xsl is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110993" version="1" comment="php5-zip is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110994" version="1" comment="php5-zlib is &lt;5.6.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117589" version="1" comment="flash-player is &lt;11.2.202.481-2.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117590" version="1" comment="flash-player-gnome is &lt;11.2.202.481-2.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117591" version="1" comment="flash-player-kde4 is &lt;11.2.202.481-2.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111015" version="1" comment="libmysql56client18 is &lt;5.6.25-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111014" version="1" comment="libmysql56client18-32bit is &lt;5.6.25-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111017" version="1" comment="libmysql56client_r18 is &lt;5.6.25-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111016" version="1" comment="libmysql56client_r18-32bit is &lt;5.6.25-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111018" version="1" comment="mysql-community-server is &lt;5.6.25-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111019" version="1" comment="mysql-community-server-bench is &lt;5.6.25-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111020" version="1" comment="mysql-community-server-client is &lt;5.6.25-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111021" version="1" comment="mysql-community-server-errormessages is &lt;5.6.25-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111022" version="1" comment="mysql-community-server-test is &lt;5.6.25-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111023" version="1" comment="mysql-community-server-tools is &lt;5.6.25-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111098" version="1" comment="libtiff-devel is &lt;4.0.4-10.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111097" version="1" comment="libtiff-devel-32bit is &lt;4.0.4-10.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111100" version="1" comment="libtiff5 is &lt;4.0.4-10.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111099" version="1" comment="libtiff5-32bit is &lt;4.0.4-10.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111101" version="1" comment="tiff is &lt;4.0.4-10.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111102" version="1" comment="libwmf is &lt;0.2.8.4-239.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111103" version="1" comment="libwmf-0_2-7 is &lt;0.2.8.4-239.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111104" version="1" comment="libwmf-0_2-7-32bit is &lt;0.2.8.4-239.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111105" version="1" comment="libwmf-devel is &lt;0.2.8.4-239.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111106" version="1" comment="libwmf-gnome is &lt;0.2.8.4-239.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111107" version="1" comment="libwmf-gnome-32bit is &lt;0.2.8.4-239.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111108" version="1" comment="libwmf-tools is &lt;0.2.8.4-239.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111109" version="1" comment="wireshark is &lt;1.12.6-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111110" version="1" comment="wireshark-devel is &lt;1.12.6-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111111" version="1" comment="wireshark-ui-gtk is &lt;1.12.6-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111112" version="1" comment="wireshark-ui-qt is &lt;1.12.6-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111084" version="1" comment="libmysqlclient-devel is &lt;10.0.20-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111085" version="1" comment="libmysqlclient18 is &lt;10.0.20-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111086" version="1" comment="libmysqlclient18-32bit is &lt;10.0.20-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111087" version="1" comment="libmysqlclient_r18 is &lt;10.0.20-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111088" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.20-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111089" version="1" comment="libmysqld-devel is &lt;10.0.20-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111090" version="1" comment="libmysqld18 is &lt;10.0.20-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111091" version="1" comment="mariadb is &lt;10.0.20-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111092" version="1" comment="mariadb-bench is &lt;10.0.20-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111093" version="1" comment="mariadb-client is &lt;10.0.20-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111094" version="1" comment="mariadb-errormessages is &lt;10.0.20-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111095" version="1" comment="mariadb-test is &lt;10.0.20-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111096" version="1" comment="mariadb-tools is &lt;10.0.20-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111145" version="1" comment="MozillaFirefox is &lt;39.0-34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111146" version="1" comment="MozillaFirefox-branding-upstream is &lt;39.0-34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111147" version="1" comment="MozillaFirefox-buildsymbols is &lt;39.0-34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111148" version="1" comment="MozillaFirefox-devel is &lt;39.0-34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111149" version="1" comment="MozillaFirefox-translations-common is &lt;39.0-34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111150" version="1" comment="MozillaFirefox-translations-other is &lt;39.0-34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111151" version="1" comment="libfreebl3 is &lt;3.19.2-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111152" version="1" comment="libfreebl3-32bit is &lt;3.19.2-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111153" version="1" comment="libsoftokn3 is &lt;3.19.2-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111154" version="1" comment="libsoftokn3-32bit is &lt;3.19.2-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111155" version="1" comment="mozilla-nss is &lt;3.19.2-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111156" version="1" comment="mozilla-nss-32bit is &lt;3.19.2-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111157" version="1" comment="mozilla-nss-certs is &lt;3.19.2-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111158" version="1" comment="mozilla-nss-certs-32bit is &lt;3.19.2-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111159" version="1" comment="mozilla-nss-devel is &lt;3.19.2-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111160" version="1" comment="mozilla-nss-sysinit is &lt;3.19.2-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111161" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.19.2-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111162" version="1" comment="mozilla-nss-tools is &lt;3.19.2-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117592" version="1" comment="flash-player is &lt;11.2.202.438-2.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117593" version="1" comment="flash-player-gnome is &lt;11.2.202.438-2.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117594" version="1" comment="flash-player-kde4 is &lt;11.2.202.438-2.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111167" version="1" comment="libunwind is &lt;1.1-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111168" version="1" comment="libunwind-32bit is &lt;1.1-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111169" version="1" comment="libunwind-devel is &lt;1.1-10.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111170" version="1" comment="cups-filters is &lt;1.0.58-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111171" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111172" version="1" comment="cups-filters-devel is &lt;1.0.58-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111173" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111174" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111175" version="1" comment="bind is &lt;9.9.6P1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111176" version="1" comment="bind-chrootenv is &lt;9.9.6P1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111177" version="1" comment="bind-devel is &lt;9.9.6P1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111178" version="1" comment="bind-doc is &lt;9.9.6P1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111180" version="1" comment="bind-libs is &lt;9.9.6P1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111179" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111181" version="1" comment="bind-lwresd is &lt;9.9.6P1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111182" version="1" comment="bind-utils is &lt;9.9.6P1-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111220" version="1" comment="MozillaThunderbird is &lt;38.1.0-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111221" version="1" comment="MozillaThunderbird-buildsymbols is &lt;38.1.0-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111222" version="1" comment="MozillaThunderbird-devel is &lt;38.1.0-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111223" version="1" comment="MozillaThunderbird-translations-common is &lt;38.1.0-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111224" version="1" comment="MozillaThunderbird-translations-other is &lt;38.1.0-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117595" version="1" comment="flash-player is &lt;11.2.202.491-2.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117596" version="1" comment="flash-player-gnome is &lt;11.2.202.491-2.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117597" version="1" comment="flash-player-kde4 is &lt;11.2.202.491-2.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111204" version="1" comment="libidn is &lt;1.31-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111205" version="1" comment="libidn-devel is &lt;1.31-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111206" version="1" comment="libidn-tools is &lt;1.31-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111207" version="1" comment="libidn11 is &lt;1.31-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111208" version="1" comment="libidn11-32bit is &lt;1.31-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111209" version="1" comment="rubygem-rack is &lt;1.5.2-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111210" version="1" comment="rubygem-rack-doc is &lt;1.5.2-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111211" version="1" comment="rubygem-rack-testsuite is &lt;1.5.2-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111212" version="1" comment="rubygem-rack-1_3 is &lt;1.3.10-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111213" version="1" comment="rubygem-rack-1_3-doc is &lt;1.3.10-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111214" version="1" comment="rubygem-rack-1_3-testsuite is &lt;1.3.10-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105256" version="1" comment="dbus-1 is &lt;1.8.14-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105260" version="1" comment="dbus-1-devel is &lt;1.8.14-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105261" version="1" comment="dbus-1-devel-32bit is &lt;1.8.14-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105257" version="1" comment="dbus-1-devel-doc is &lt;1.8.14-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105258" version="1" comment="dbus-1-x11 is &lt;1.8.14-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105262" version="1" comment="libdbus-1-3 is &lt;1.8.14-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105263" version="1" comment="libdbus-1-3-32bit is &lt;1.8.14-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111215" version="1" comment="rubygem-rack-1_4 is &lt;1.4.5-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111216" version="1" comment="rubygem-rack-1_4-doc is &lt;1.4.5-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111217" version="1" comment="rubygem-rack-1_4-testsuite is &lt;1.4.5-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111218" version="1" comment="rubygem-jquery-rails is &lt;3.1.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111219" version="1" comment="rubygem-jquery-rails-doc is &lt;3.1.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111281" version="1" comment="libcryptopp is &lt;5.6.2-7.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111283" version="1" comment="libcryptopp-5_6_2-0 is &lt;5.6.2-7.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111282" version="1" comment="libcryptopp-5_6_2-0-32bit is &lt;5.6.2-7.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111284" version="1" comment="libcryptopp-devel is &lt;5.6.2-7.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111285" version="1" comment="libcryptopp-devel-static is &lt;5.6.2-7.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111302" version="1" comment="pdns is &lt;3.3.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111303" version="1" comment="pdns-backend-ldap is &lt;3.3.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111304" version="1" comment="pdns-backend-lua is &lt;3.3.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111305" version="1" comment="pdns-backend-mydns is &lt;3.3.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111306" version="1" comment="pdns-backend-mysql is &lt;3.3.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111307" version="1" comment="pdns-backend-postgresql is &lt;3.3.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111308" version="1" comment="pdns-backend-sqlite3 is &lt;3.3.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111286" version="1" comment="pdns-recursor is &lt;3.6.2-8.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111309" version="1" comment="rubygem-activesupport-3_2 is &lt;3.2.17-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111310" version="1" comment="rubygem-activesupport-3_2-doc is &lt;3.2.17-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111311" version="1" comment="libcrypto34 is &lt;2.2.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111312" version="1" comment="libcrypto34-32bit is &lt;2.2.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111313" version="1" comment="libressl is &lt;2.2.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111314" version="1" comment="libressl-devel is &lt;2.2.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111315" version="1" comment="libressl-devel-32bit is &lt;2.2.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111316" version="1" comment="libressl-devel-doc is &lt;2.2.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111317" version="1" comment="libssl33 is &lt;2.2.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111318" version="1" comment="libssl33-32bit is &lt;2.2.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111319" version="1" comment="libtls4 is &lt;2.2.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111320" version="1" comment="libtls4-32bit is &lt;2.2.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111321" version="1" comment="ansible is &lt;1.7.1-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111322" version="1" comment="cacti is &lt;0.8.8e-4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111326" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.85-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111327" version="1" comment="java-1_7_0-openjdk-accessibility is &lt;1.7.0.85-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111323" version="1" comment="java-1_7_0-openjdk-bootstrap is &lt;1.7.0.85-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111324" version="1" comment="java-1_7_0-openjdk-bootstrap-devel is &lt;1.7.0.85-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111325" version="1" comment="java-1_7_0-openjdk-bootstrap-headless is &lt;1.7.0.85-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111328" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.85-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111329" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.85-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111330" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.85-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111331" version="1" comment="java-1_7_0-openjdk-javadoc is &lt;1.7.0.85-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111332" version="1" comment="java-1_7_0-openjdk-src is &lt;1.7.0.85-10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111333" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.51-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111334" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.51-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111335" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.51-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111336" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.51-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111337" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.51-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111338" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.51-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111339" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.51-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111340" version="1" comment="chromedriver is &lt;44.0.2403.89-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111341" version="1" comment="chromium is &lt;44.0.2403.89-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111342" version="1" comment="chromium-desktop-gnome is &lt;44.0.2403.89-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111343" version="1" comment="chromium-desktop-kde is &lt;44.0.2403.89-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111344" version="1" comment="chromium-ffmpegsumo is &lt;44.0.2403.89-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105264" version="1" comment="wireshark is &lt;1.12.3-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105265" version="1" comment="wireshark-devel is &lt;1.12.3-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105266" version="1" comment="wireshark-ui-gtk is &lt;1.12.3-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105267" version="1" comment="wireshark-ui-qt is &lt;1.12.3-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111521" version="1" comment="lxc is &lt;1.0.6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111522" version="1" comment="lxc-devel is &lt;1.0.6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111557" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-8.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111551" version="1" comment="libldap-2_4-2 is &lt;2.4.39-8.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111552" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.39-8.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111558" version="1" comment="openldap2 is &lt;2.4.39-8.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111559" version="1" comment="openldap2-back-meta is &lt;2.4.39-8.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111560" version="1" comment="openldap2-back-perl is &lt;2.4.39-8.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111561" version="1" comment="openldap2-back-sql is &lt;2.4.39-8.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111553" version="1" comment="openldap2-client is &lt;2.4.39-8.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111554" version="1" comment="openldap2-devel is &lt;2.4.39-8.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111555" version="1" comment="openldap2-devel-32bit is &lt;2.4.39-8.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111556" version="1" comment="openldap2-devel-static is &lt;2.4.39-8.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111562" version="1" comment="openldap2-doc is &lt;2.4.39-8.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113228" version="1" comment="libuser is &lt;0.60-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113229" version="1" comment="libuser-devel is &lt;0.60-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113230" version="1" comment="libuser-lang is &lt;0.60-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113231" version="1" comment="libuser-python is &lt;0.60-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113232" version="1" comment="libuser1 is &lt;0.60-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105246" version="1" comment="otrs is &lt;3.3.11-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105247" version="1" comment="otrs-doc is &lt;3.3.11-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105248" version="1" comment="otrs-itsm is &lt;3.3.11-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113233" version="1" comment="bind is &lt;9.9.6P1-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113234" version="1" comment="bind-chrootenv is &lt;9.9.6P1-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113235" version="1" comment="bind-devel is &lt;9.9.6P1-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113236" version="1" comment="bind-doc is &lt;9.9.6P1-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113238" version="1" comment="bind-libs is &lt;9.9.6P1-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113237" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113239" version="1" comment="bind-lwresd is &lt;9.9.6P1-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113240" version="1" comment="bind-utils is &lt;9.9.6P1-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113357" version="1" comment="apache2-mod_php5 is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113358" version="1" comment="php5 is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113359" version="1" comment="php5-bcmath is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113360" version="1" comment="php5-bz2 is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113361" version="1" comment="php5-calendar is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113362" version="1" comment="php5-ctype is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113363" version="1" comment="php5-curl is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113364" version="1" comment="php5-dba is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113365" version="1" comment="php5-devel is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113366" version="1" comment="php5-dom is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113367" version="1" comment="php5-enchant is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113368" version="1" comment="php5-exif is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113369" version="1" comment="php5-fastcgi is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113370" version="1" comment="php5-fileinfo is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113371" version="1" comment="php5-firebird is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113372" version="1" comment="php5-fpm is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113373" version="1" comment="php5-ftp is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113374" version="1" comment="php5-gd is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113375" version="1" comment="php5-gettext is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113376" version="1" comment="php5-gmp is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113377" version="1" comment="php5-iconv is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113378" version="1" comment="php5-imap is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113379" version="1" comment="php5-intl is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113380" version="1" comment="php5-json is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113381" version="1" comment="php5-ldap is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113382" version="1" comment="php5-mbstring is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113383" version="1" comment="php5-mcrypt is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113384" version="1" comment="php5-mssql is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113385" version="1" comment="php5-mysql is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113386" version="1" comment="php5-odbc is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113387" version="1" comment="php5-opcache is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113388" version="1" comment="php5-openssl is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113389" version="1" comment="php5-pcntl is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113390" version="1" comment="php5-pdo is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113391" version="1" comment="php5-pear is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113392" version="1" comment="php5-pgsql is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113393" version="1" comment="php5-phar is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113394" version="1" comment="php5-posix is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113395" version="1" comment="php5-pspell is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113396" version="1" comment="php5-readline is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113397" version="1" comment="php5-shmop is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113398" version="1" comment="php5-snmp is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113399" version="1" comment="php5-soap is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113400" version="1" comment="php5-sockets is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113401" version="1" comment="php5-sqlite is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113402" version="1" comment="php5-suhosin is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113403" version="1" comment="php5-sysvmsg is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113404" version="1" comment="php5-sysvsem is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113405" version="1" comment="php5-sysvshm is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113406" version="1" comment="php5-tidy is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113407" version="1" comment="php5-tokenizer is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113408" version="1" comment="php5-wddx is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113409" version="1" comment="php5-xmlreader is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113410" version="1" comment="php5-xmlrpc is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113411" version="1" comment="php5-xmlwriter is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113412" version="1" comment="php5-xsl is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113413" version="1" comment="php5-zip is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113414" version="1" comment="php5-zlib is &lt;5.6.1-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113417" version="1" comment="ghostscript is &lt;9.15-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113418" version="1" comment="ghostscript-devel is &lt;9.15-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113415" version="1" comment="ghostscript-mini is &lt;9.15-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113416" version="1" comment="ghostscript-mini-devel is &lt;9.15-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113419" version="1" comment="ghostscript-x11 is &lt;9.15-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105249" version="1" comment="strongswan is &lt;5.1.3-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105250" version="1" comment="strongswan-doc is &lt;5.1.3-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105251" version="1" comment="strongswan-ipsec is &lt;5.1.3-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105252" version="1" comment="strongswan-libs0 is &lt;5.1.3-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105253" version="1" comment="strongswan-mysql is &lt;5.1.3-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105254" version="1" comment="strongswan-nm is &lt;5.1.3-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105255" version="1" comment="strongswan-sqlite is &lt;5.1.3-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113495" version="1" comment="gnutls is &lt;3.2.18-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113496" version="1" comment="libgnutls-devel is &lt;3.2.18-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113497" version="1" comment="libgnutls-devel-32bit is &lt;3.2.18-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113498" version="1" comment="libgnutls-openssl-devel is &lt;3.2.18-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113499" version="1" comment="libgnutls-openssl27 is &lt;3.2.18-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113500" version="1" comment="libgnutls28 is &lt;3.2.18-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113501" version="1" comment="libgnutls28-32bit is &lt;3.2.18-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113502" version="1" comment="libgnutlsxx-devel is &lt;3.2.18-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113503" version="1" comment="libgnutlsxx28 is &lt;3.2.18-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113567" version="1" comment="bbswitch is &lt;0.8-3.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113568" version="1" comment="bbswitch-kmp-default is &lt;0.8_k3.16.7_24-3.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113569" version="1" comment="bbswitch-kmp-desktop is &lt;0.8_k3.16.7_24-3.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113570" version="1" comment="bbswitch-kmp-pae is &lt;0.8_k3.16.7_24-3.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113571" version="1" comment="bbswitch-kmp-xen is &lt;0.8_k3.16.7_24-3.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113572" version="1" comment="cloop is &lt;2.639-14.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113573" version="1" comment="cloop-kmp-default is &lt;2.639_k3.16.7_24-14.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113574" version="1" comment="cloop-kmp-desktop is &lt;2.639_k3.16.7_24-14.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113575" version="1" comment="cloop-kmp-pae is &lt;2.639_k3.16.7_24-14.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113576" version="1" comment="cloop-kmp-xen is &lt;2.639_k3.16.7_24-14.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113577" version="1" comment="crash is &lt;7.0.8-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113578" version="1" comment="crash-devel is &lt;7.0.8-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113579" version="1" comment="crash-doc is &lt;7.0.8-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113580" version="1" comment="crash-eppic is &lt;7.0.8-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113581" version="1" comment="crash-gcore is &lt;7.0.8-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113582" version="1" comment="crash-kmp-default is &lt;7.0.8_k3.16.7_24-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113583" version="1" comment="crash-kmp-desktop is &lt;7.0.8_k3.16.7_24-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113584" version="1" comment="crash-kmp-pae is &lt;7.0.8_k3.16.7_24-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113585" version="1" comment="crash-kmp-xen is &lt;7.0.8_k3.16.7_24-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113586" version="1" comment="hdjmod is &lt;1.28-18.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113587" version="1" comment="hdjmod-kmp-default is &lt;1.28_k3.16.7_24-18.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113588" version="1" comment="hdjmod-kmp-desktop is &lt;1.28_k3.16.7_24-18.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113589" version="1" comment="hdjmod-kmp-pae is &lt;1.28_k3.16.7_24-18.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113590" version="1" comment="hdjmod-kmp-xen is &lt;1.28_k3.16.7_24-18.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113591" version="1" comment="ipset is &lt;6.23-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113592" version="1" comment="ipset-devel is &lt;6.23-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113593" version="1" comment="ipset-kmp-default is &lt;6.23_k3.16.7_24-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113594" version="1" comment="ipset-kmp-desktop is &lt;6.23_k3.16.7_24-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113595" version="1" comment="ipset-kmp-pae is &lt;6.23_k3.16.7_24-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113596" version="1" comment="ipset-kmp-xen is &lt;6.23_k3.16.7_24-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113598" version="1" comment="kernel-debug is &lt;3.16.7-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113599" version="1" comment="kernel-debug-base is &lt;3.16.7-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113600" version="1" comment="kernel-debug-devel is &lt;3.16.7-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113601" version="1" comment="kernel-default is &lt;3.16.7-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113602" version="1" comment="kernel-default-base is &lt;3.16.7-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113603" version="1" comment="kernel-default-devel is &lt;3.16.7-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113604" version="1" comment="kernel-desktop is &lt;3.16.7-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113605" version="1" comment="kernel-desktop-base is &lt;3.16.7-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113606" version="1" comment="kernel-desktop-devel is &lt;3.16.7-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113617" version="1" comment="kernel-devel is &lt;3.16.7-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113607" version="1" comment="kernel-docs is &lt;3.16.7-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113608" version="1" comment="kernel-ec2 is &lt;3.16.7-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113609" version="1" comment="kernel-ec2-base is &lt;3.16.7-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113610" version="1" comment="kernel-ec2-devel is &lt;3.16.7-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113618" version="1" comment="kernel-macros is &lt;3.16.7-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113611" version="1" comment="kernel-obs-build is &lt;3.16.7-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113613" version="1" comment="kernel-obs-qa is &lt;3.16.7-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113612" version="1" comment="kernel-obs-qa-xen is &lt;3.16.7-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113614" version="1" comment="kernel-pae is &lt;3.16.7-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113615" version="1" comment="kernel-pae-base is &lt;3.16.7-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113616" version="1" comment="kernel-pae-devel is &lt;3.16.7-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113619" version="1" comment="kernel-source is &lt;3.16.7-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113620" version="1" comment="kernel-source-vanilla is &lt;3.16.7-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113621" version="1" comment="kernel-syms is &lt;3.16.7-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113622" version="1" comment="kernel-vanilla is &lt;3.16.7-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113623" version="1" comment="kernel-vanilla-devel is &lt;3.16.7-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113624" version="1" comment="kernel-xen is &lt;3.16.7-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113625" version="1" comment="kernel-xen-base is &lt;3.16.7-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113626" version="1" comment="kernel-xen-devel is &lt;3.16.7-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113597" version="1" comment="libipset3 is &lt;6.23-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113627" version="1" comment="pcfclock is &lt;0.44-260.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113628" version="1" comment="pcfclock-kmp-default is &lt;0.44_k3.16.7_24-260.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113629" version="1" comment="pcfclock-kmp-desktop is &lt;0.44_k3.16.7_24-260.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113630" version="1" comment="pcfclock-kmp-pae is &lt;0.44_k3.16.7_24-260.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113631" version="1" comment="vhba-kmp is &lt;20140629-2.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113632" version="1" comment="vhba-kmp-default is &lt;20140629_k3.16.7_24-2.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113633" version="1" comment="vhba-kmp-desktop is &lt;20140629_k3.16.7_24-2.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113634" version="1" comment="vhba-kmp-pae is &lt;20140629_k3.16.7_24-2.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113635" version="1" comment="vhba-kmp-xen is &lt;20140629_k3.16.7_24-2.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113636" version="1" comment="xen is &lt;4.4.2_06-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113637" version="1" comment="xen-devel is &lt;4.4.2_06-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113646" version="1" comment="xen-doc-html is &lt;4.4.2_06-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113647" version="1" comment="xen-kmp-default is &lt;4.4.2_06_k3.16.7_24-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113648" version="1" comment="xen-kmp-desktop is &lt;4.4.2_06_k3.16.7_24-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113639" version="1" comment="xen-libs is &lt;4.4.2_06-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113638" version="1" comment="xen-libs-32bit is &lt;4.4.2_06-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113649" version="1" comment="xen-tools is &lt;4.4.2_06-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113640" version="1" comment="xen-tools-domU is &lt;4.4.2_06-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113641" version="1" comment="xtables-addons is &lt;2.6-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113642" version="1" comment="xtables-addons-kmp-default is &lt;2.6_k3.16.7_24-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113643" version="1" comment="xtables-addons-kmp-desktop is &lt;2.6_k3.16.7_24-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113644" version="1" comment="xtables-addons-kmp-pae is &lt;2.6_k3.16.7_24-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113645" version="1" comment="xtables-addons-kmp-xen is &lt;2.6_k3.16.7_24-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117730" version="1" comment="flash-player is &lt;11.2.202.508-2.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117731" version="1" comment="flash-player-gnome is &lt;11.2.202.508-2.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117732" version="1" comment="flash-player-kde4 is &lt;11.2.202.508-2.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113651" version="1" comment="MozillaFirefox is &lt;40.0-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113650" version="1" comment="MozillaFirefox-branding-openSUSE is &lt;40-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113652" version="1" comment="MozillaFirefox-branding-upstream is &lt;40.0-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113653" version="1" comment="MozillaFirefox-buildsymbols is &lt;40.0-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113654" version="1" comment="MozillaFirefox-devel is &lt;40.0-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113655" version="1" comment="MozillaFirefox-translations-common is &lt;40.0-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113656" version="1" comment="MozillaFirefox-translations-other is &lt;40.0-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113809" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.8.14-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113810" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.8.14-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113811" version="1" comment="subversion is &lt;1.8.14-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113812" version="1" comment="subversion-bash-completion is &lt;1.8.14-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113813" version="1" comment="subversion-devel is &lt;1.8.14-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113814" version="1" comment="subversion-perl is &lt;1.8.14-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113815" version="1" comment="subversion-python is &lt;1.8.14-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113816" version="1" comment="subversion-python-ctypes is &lt;1.8.14-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113817" version="1" comment="subversion-ruby is &lt;1.8.14-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113818" version="1" comment="subversion-server is &lt;1.8.14-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113819" version="1" comment="subversion-tools is &lt;1.8.14-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113820" version="1" comment="python-virtualbox is &lt;4.3.30-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113821" version="1" comment="virtualbox is &lt;4.3.30-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113822" version="1" comment="virtualbox-devel is &lt;4.3.30-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113823" version="1" comment="virtualbox-guest-desktop-icons is &lt;4.3.30-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113824" version="1" comment="virtualbox-guest-kmp-default is &lt;4.3.30_k3.16.7_21-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113825" version="1" comment="virtualbox-guest-kmp-desktop is &lt;4.3.30_k3.16.7_21-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113826" version="1" comment="virtualbox-guest-kmp-pae is &lt;4.3.30_k3.16.7_21-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113827" version="1" comment="virtualbox-guest-tools is &lt;4.3.30-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113828" version="1" comment="virtualbox-guest-x11 is &lt;4.3.30-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113829" version="1" comment="virtualbox-host-kmp-default is &lt;4.3.30_k3.16.7_21-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113830" version="1" comment="virtualbox-host-kmp-desktop is &lt;4.3.30_k3.16.7_21-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113831" version="1" comment="virtualbox-host-kmp-pae is &lt;4.3.30_k3.16.7_21-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113832" version="1" comment="virtualbox-host-source is &lt;4.3.30-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113833" version="1" comment="virtualbox-qt is &lt;4.3.30-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113834" version="1" comment="virtualbox-websrv is &lt;4.3.30-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113952" version="1" comment="wireshark is &lt;1.12.7-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113953" version="1" comment="wireshark-devel is &lt;1.12.7-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113954" version="1" comment="wireshark-ui-gtk is &lt;1.12.7-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113955" version="1" comment="wireshark-ui-qt is &lt;1.12.7-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113956" version="1" comment="xfsprogs is &lt;3.2.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113957" version="1" comment="xfsprogs-devel is &lt;3.2.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113965" version="1" comment="ansible is &lt;1.7.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113966" version="1" comment="MozillaThunderbird is &lt;38.2.0-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113967" version="1" comment="MozillaThunderbird-buildsymbols is &lt;38.2.0-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113968" version="1" comment="MozillaThunderbird-devel is &lt;38.2.0-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113969" version="1" comment="MozillaThunderbird-translations-common is &lt;38.2.0-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009113970" version="1" comment="MozillaThunderbird-translations-other is &lt;38.2.0-25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114143" version="1" comment="MozillaFirefox is &lt;40.0.3-41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114144" version="1" comment="MozillaFirefox-branding-upstream is &lt;40.0.3-41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114145" version="1" comment="MozillaFirefox-buildsymbols is &lt;40.0.3-41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114146" version="1" comment="MozillaFirefox-devel is &lt;40.0.3-41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114147" version="1" comment="MozillaFirefox-translations-common is &lt;40.0.3-41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114148" version="1" comment="MozillaFirefox-translations-other is &lt;40.0.3-41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114195" version="1" comment="libgcrypt is &lt;1.6.1-8.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114196" version="1" comment="libgcrypt-cavs is &lt;1.6.1-8.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114197" version="1" comment="libgcrypt-devel is &lt;1.6.1-8.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114198" version="1" comment="libgcrypt-devel-32bit is &lt;1.6.1-8.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114174" version="1" comment="libgcrypt11 is &lt;1.5.4-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114175" version="1" comment="libgcrypt11-32bit is &lt;1.5.4-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114199" version="1" comment="libgcrypt20 is &lt;1.6.1-8.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114200" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-8.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114201" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-8.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114202" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-8.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114203" version="1" comment="gnutls is &lt;3.2.18-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114204" version="1" comment="libgnutls-devel is &lt;3.2.18-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114205" version="1" comment="libgnutls-devel-32bit is &lt;3.2.18-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114206" version="1" comment="libgnutls-openssl-devel is &lt;3.2.18-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114207" version="1" comment="libgnutls-openssl27 is &lt;3.2.18-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114208" version="1" comment="libgnutls28 is &lt;3.2.18-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114209" version="1" comment="libgnutls28-32bit is &lt;3.2.18-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114210" version="1" comment="libgnutlsxx-devel is &lt;3.2.18-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114211" version="1" comment="libgnutlsxx28 is &lt;3.2.18-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114213" version="1" comment="libsnmp30 is &lt;5.7.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114212" version="1" comment="libsnmp30-32bit is &lt;5.7.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114214" version="1" comment="net-snmp is &lt;5.7.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114216" version="1" comment="net-snmp-devel is &lt;5.7.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114215" version="1" comment="net-snmp-devel-32bit is &lt;5.7.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114217" version="1" comment="net-snmp-python is &lt;5.7.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114218" version="1" comment="perl-SNMP is &lt;5.7.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114219" version="1" comment="snmp-mibs is &lt;5.7.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114220" version="1" comment="tor is &lt;0.2.4.27-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114221" version="1" comment="gdk-pixbuf is &lt;2.31.6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114222" version="1" comment="gdk-pixbuf-devel is &lt;2.31.6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114223" version="1" comment="gdk-pixbuf-devel-32bit is &lt;2.31.6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114224" version="1" comment="gdk-pixbuf-lang is &lt;2.31.6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114225" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.31.6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114226" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.31.6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114227" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.31.6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114228" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.31.6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114229" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.31.6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114194" version="1" comment="perl-XML-LibXML is &lt;2.0121-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114313" version="1" comment="libvdpau is &lt;0.8-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114314" version="1" comment="libvdpau-devel is &lt;0.8-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114315" version="1" comment="libvdpau-devel-32bit is &lt;0.8-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114316" version="1" comment="libvdpau1 is &lt;0.8-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114317" version="1" comment="libvdpau1-32bit is &lt;0.8-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114318" version="1" comment="libvdpau_trace1 is &lt;0.8-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114319" version="1" comment="libvdpau_trace1-32bit is &lt;0.8-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105292" version="1" comment="roundcubemail is &lt;1.0.4-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114320" version="1" comment="squid is &lt;3.4.4-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114351" version="1" comment="libspice-server-devel is &lt;0.12.4-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114352" version="1" comment="libspice-server1 is &lt;0.12.4-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114353" version="1" comment="spice is &lt;0.12.4-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114354" version="1" comment="spice-client is &lt;0.12.4-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114356" version="1" comment="sblim-sfcb is &lt;1.4.8-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105268" version="1" comment="elfutils is &lt;0.158-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105269" version="1" comment="libasm-devel is &lt;0.158-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105270" version="1" comment="libasm1 is &lt;0.158-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105271" version="1" comment="libasm1-32bit is &lt;0.158-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105272" version="1" comment="libdw-devel is &lt;0.158-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105273" version="1" comment="libdw1 is &lt;0.158-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105274" version="1" comment="libdw1-32bit is &lt;0.158-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105275" version="1" comment="libebl-devel is &lt;0.158-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105276" version="1" comment="libebl1 is &lt;0.158-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105277" version="1" comment="libebl1-32bit is &lt;0.158-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105278" version="1" comment="libelf-devel is &lt;0.158-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105279" version="1" comment="libelf-devel-32bit is &lt;0.158-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105280" version="1" comment="libelf1 is &lt;0.158-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105281" version="1" comment="libelf1-32bit is &lt;0.158-4.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114369" version="1" comment="remind is &lt;3.1.13-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114370" version="1" comment="python-Django is &lt;1.6.11-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114376" version="1" comment="chromedriver is &lt;45.0.2454.85-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114377" version="1" comment="chromium is &lt;45.0.2454.85-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114378" version="1" comment="chromium-desktop-gnome is &lt;45.0.2454.85-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114379" version="1" comment="chromium-desktop-kde is &lt;45.0.2454.85-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114380" version="1" comment="chromium-ffmpegsumo is &lt;45.0.2454.85-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114400" version="1" comment="libgcrypt is &lt;1.6.1-8.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114401" version="1" comment="libgcrypt-cavs is &lt;1.6.1-8.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114402" version="1" comment="libgcrypt-devel is &lt;1.6.1-8.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114403" version="1" comment="libgcrypt-devel-32bit is &lt;1.6.1-8.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114387" version="1" comment="libgcrypt11 is &lt;1.5.4-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114388" version="1" comment="libgcrypt11-32bit is &lt;1.5.4-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114404" version="1" comment="libgcrypt20 is &lt;1.6.1-8.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114405" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-8.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114406" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-8.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114407" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-8.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114408" version="1" comment="criu is &lt;1.3.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114409" version="1" comment="criu-devel is &lt;1.3.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114410" version="1" comment="libcriu1 is &lt;1.3.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103724" version="1" comment="libruby2_1-2_1 is &lt;2.1.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103725" version="1" comment="ruby2.1 is &lt;2.1.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103726" version="1" comment="ruby2.1-devel is &lt;2.1.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103727" version="1" comment="ruby2.1-devel-extra is &lt;2.1.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103728" version="1" comment="ruby2.1-doc is &lt;2.1.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103729" version="1" comment="ruby2.1-doc-ri is &lt;2.1.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009103730" version="1" comment="ruby2.1-stdlib is &lt;2.1.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114411" version="1" comment="bind is &lt;9.9.6P1-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114412" version="1" comment="bind-chrootenv is &lt;9.9.6P1-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114413" version="1" comment="bind-devel is &lt;9.9.6P1-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114414" version="1" comment="bind-doc is &lt;9.9.6P1-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114416" version="1" comment="bind-libs is &lt;9.9.6P1-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114415" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114417" version="1" comment="bind-lwresd is &lt;9.9.6P1-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114418" version="1" comment="bind-utils is &lt;9.9.6P1-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114419" version="1" comment="icedtea-web is &lt;1.6.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114420" version="1" comment="icedtea-web-javadoc is &lt;1.6.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114421" version="1" comment="java-1_7_0-openjdk-plugin is &lt;1.6.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114422" version="1" comment="java-1_8_0-openjdk-plugin is &lt;1.6.1-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117601" version="1" comment="flash-player is &lt;11.2.202.521-2.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117602" version="1" comment="flash-player-gnome is &lt;11.2.202.521-2.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117603" version="1" comment="flash-player-kde4 is &lt;11.2.202.521-2.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114493" version="1" comment="cyradm is &lt;2.4.18-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114494" version="1" comment="cyrus-imapd is &lt;2.4.18-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114495" version="1" comment="cyrus-imapd-devel is &lt;2.4.18-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114496" version="1" comment="cyrus-imapd-snmp is &lt;2.4.18-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114497" version="1" comment="cyrus-imapd-snmp-mibs is &lt;2.4.18-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114498" version="1" comment="cyrus-imapd-utils is &lt;2.4.18-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114499" version="1" comment="perl-Cyrus-IMAP is &lt;2.4.18-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114500" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.4.18-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114573" version="1" comment="libmysql56client18 is &lt;5.6.26-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114572" version="1" comment="libmysql56client18-32bit is &lt;5.6.26-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114575" version="1" comment="libmysql56client_r18 is &lt;5.6.26-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114574" version="1" comment="libmysql56client_r18-32bit is &lt;5.6.26-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114576" version="1" comment="mysql-community-server is &lt;5.6.26-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114577" version="1" comment="mysql-community-server-bench is &lt;5.6.26-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114578" version="1" comment="mysql-community-server-client is &lt;5.6.26-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114579" version="1" comment="mysql-community-server-errormessages is &lt;5.6.26-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114580" version="1" comment="mysql-community-server-test is &lt;5.6.26-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114581" version="1" comment="mysql-community-server-tools is &lt;5.6.26-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114582" version="1" comment="apache2-mod_php5 is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114583" version="1" comment="php5 is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114584" version="1" comment="php5-bcmath is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114585" version="1" comment="php5-bz2 is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114586" version="1" comment="php5-calendar is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114587" version="1" comment="php5-ctype is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114588" version="1" comment="php5-curl is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114589" version="1" comment="php5-dba is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114590" version="1" comment="php5-devel is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114591" version="1" comment="php5-dom is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114592" version="1" comment="php5-enchant is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114593" version="1" comment="php5-exif is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114594" version="1" comment="php5-fastcgi is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114595" version="1" comment="php5-fileinfo is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114596" version="1" comment="php5-firebird is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114597" version="1" comment="php5-fpm is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114598" version="1" comment="php5-ftp is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114599" version="1" comment="php5-gd is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114600" version="1" comment="php5-gettext is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114601" version="1" comment="php5-gmp is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114602" version="1" comment="php5-iconv is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114603" version="1" comment="php5-imap is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114604" version="1" comment="php5-intl is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114605" version="1" comment="php5-json is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114606" version="1" comment="php5-ldap is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114607" version="1" comment="php5-mbstring is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114608" version="1" comment="php5-mcrypt is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114609" version="1" comment="php5-mssql is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114610" version="1" comment="php5-mysql is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114611" version="1" comment="php5-odbc is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114612" version="1" comment="php5-opcache is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114613" version="1" comment="php5-openssl is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114614" version="1" comment="php5-pcntl is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114615" version="1" comment="php5-pdo is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114616" version="1" comment="php5-pear is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114617" version="1" comment="php5-pgsql is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114618" version="1" comment="php5-phar is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114619" version="1" comment="php5-posix is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114620" version="1" comment="php5-pspell is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114621" version="1" comment="php5-readline is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114622" version="1" comment="php5-shmop is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114623" version="1" comment="php5-snmp is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114624" version="1" comment="php5-soap is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114625" version="1" comment="php5-sockets is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114626" version="1" comment="php5-sqlite is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114627" version="1" comment="php5-suhosin is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114628" version="1" comment="php5-sysvmsg is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114629" version="1" comment="php5-sysvsem is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114630" version="1" comment="php5-sysvshm is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114631" version="1" comment="php5-tidy is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114632" version="1" comment="php5-tokenizer is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114633" version="1" comment="php5-wddx is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114634" version="1" comment="php5-xmlreader is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114635" version="1" comment="php5-xmlrpc is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114636" version="1" comment="php5-xmlwriter is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114637" version="1" comment="php5-xsl is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114638" version="1" comment="php5-zip is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114639" version="1" comment="php5-zlib is &lt;5.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114737" version="1" comment="MozillaFirefox is &lt;41.0-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114738" version="1" comment="MozillaFirefox-branding-upstream is &lt;41.0-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114739" version="1" comment="MozillaFirefox-buildsymbols is &lt;41.0-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114740" version="1" comment="MozillaFirefox-devel is &lt;41.0-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114741" version="1" comment="MozillaFirefox-translations-common is &lt;41.0-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114742" version="1" comment="MozillaFirefox-translations-other is &lt;41.0-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114743" version="1" comment="python-PyJWT is &lt;0.2.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114756" version="1" comment="phpMyAdmin is &lt;4.4.15-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114757" version="1" comment="MozillaThunderbird is &lt;38.3.0-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114758" version="1" comment="MozillaThunderbird-buildsymbols is &lt;38.3.0-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114759" version="1" comment="MozillaThunderbird-devel is &lt;38.3.0-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114760" version="1" comment="MozillaThunderbird-translations-common is &lt;38.3.0-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114761" version="1" comment="MozillaThunderbird-translations-other is &lt;38.3.0-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114762" version="1" comment="seamonkey is &lt;2.38-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114763" version="1" comment="seamonkey-dom-inspector is &lt;2.38-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114764" version="1" comment="seamonkey-irc is &lt;2.38-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114765" version="1" comment="seamonkey-translations-common is &lt;2.38-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114766" version="1" comment="seamonkey-translations-other is &lt;2.38-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114823" version="1" comment="libipa_hbac-devel is &lt;1.12.2-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114824" version="1" comment="libipa_hbac0 is &lt;1.12.2-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114825" version="1" comment="libnfsidmap-sss is &lt;1.12.2-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114826" version="1" comment="libsss_idmap-devel is &lt;1.12.2-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114827" version="1" comment="libsss_idmap0 is &lt;1.12.2-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114828" version="1" comment="libsss_nss_idmap-devel is &lt;1.12.2-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114829" version="1" comment="libsss_nss_idmap0 is &lt;1.12.2-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114830" version="1" comment="libsss_simpleifp-devel is &lt;1.12.2-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114831" version="1" comment="libsss_simpleifp0 is &lt;1.12.2-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114832" version="1" comment="libsss_sudo is &lt;1.12.2-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114833" version="1" comment="python-ipa_hbac is &lt;1.12.2-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114834" version="1" comment="python-sss_nss_idmap is &lt;1.12.2-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114835" version="1" comment="python-sssd-config is &lt;1.12.2-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114836" version="1" comment="sssd is &lt;1.12.2-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114837" version="1" comment="sssd-32bit is &lt;1.12.2-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114838" version="1" comment="sssd-ad is &lt;1.12.2-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114839" version="1" comment="sssd-dbus is &lt;1.12.2-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114840" version="1" comment="sssd-ipa is &lt;1.12.2-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114841" version="1" comment="sssd-krb5 is &lt;1.12.2-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114842" version="1" comment="sssd-krb5-common is &lt;1.12.2-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114843" version="1" comment="sssd-ldap is &lt;1.12.2-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114844" version="1" comment="sssd-proxy is &lt;1.12.2-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114845" version="1" comment="sssd-tools is &lt;1.12.2-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114846" version="1" comment="sssd-wbclient is &lt;1.12.2-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114847" version="1" comment="sssd-wbclient-devel is &lt;1.12.2-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114848" version="1" comment="vorbis-tools is &lt;1.4.0-17.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114849" version="1" comment="vorbis-tools-lang is &lt;1.4.0-17.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114851" version="1" comment="libipa_hbac-devel is &lt;1.12.2-3.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114852" version="1" comment="libipa_hbac0 is &lt;1.12.2-3.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114853" version="1" comment="libnfsidmap-sss is &lt;1.12.2-3.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114854" version="1" comment="libsss_idmap-devel is &lt;1.12.2-3.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114855" version="1" comment="libsss_idmap0 is &lt;1.12.2-3.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114856" version="1" comment="libsss_nss_idmap-devel is &lt;1.12.2-3.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114857" version="1" comment="libsss_nss_idmap0 is &lt;1.12.2-3.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114858" version="1" comment="libsss_simpleifp-devel is &lt;1.12.2-3.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114859" version="1" comment="libsss_simpleifp0 is &lt;1.12.2-3.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114860" version="1" comment="libsss_sudo is &lt;1.12.2-3.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114861" version="1" comment="python-ipa_hbac is &lt;1.12.2-3.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114862" version="1" comment="python-sss_nss_idmap is &lt;1.12.2-3.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114863" version="1" comment="python-sssd-config is &lt;1.12.2-3.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114850" version="1" comment="redis is &lt;2.8.22-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114864" version="1" comment="sssd is &lt;1.12.2-3.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114865" version="1" comment="sssd-32bit is &lt;1.12.2-3.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114866" version="1" comment="sssd-ad is &lt;1.12.2-3.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114867" version="1" comment="sssd-dbus is &lt;1.12.2-3.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114868" version="1" comment="sssd-ipa is &lt;1.12.2-3.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114869" version="1" comment="sssd-krb5 is &lt;1.12.2-3.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114870" version="1" comment="sssd-krb5-common is &lt;1.12.2-3.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114871" version="1" comment="sssd-ldap is &lt;1.12.2-3.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114872" version="1" comment="sssd-proxy is &lt;1.12.2-3.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114873" version="1" comment="sssd-tools is &lt;1.12.2-3.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114874" version="1" comment="sssd-wbclient is &lt;1.12.2-3.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114875" version="1" comment="sssd-wbclient-devel is &lt;1.12.2-3.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114876" version="1" comment="apache2 is &lt;2.4.10-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114877" version="1" comment="apache2-devel is &lt;2.4.10-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114878" version="1" comment="apache2-doc is &lt;2.4.10-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114879" version="1" comment="apache2-event is &lt;2.4.10-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114880" version="1" comment="apache2-example-pages is &lt;2.4.10-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114881" version="1" comment="apache2-prefork is &lt;2.4.10-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114882" version="1" comment="apache2-utils is &lt;2.4.10-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114883" version="1" comment="apache2-worker is &lt;2.4.10-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114884" version="1" comment="froxlor is &lt;0.9.34-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114885" version="1" comment="conntrack-tools is &lt;1.4.2-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114896" version="1" comment="IPython is &lt;2.2.0-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114897" version="1" comment="IPython-doc is &lt;2.2.0-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114898" version="1" comment="python3-IPython is &lt;2.2.0-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114899" version="1" comment="python3-IPython-doc is &lt;2.2.0-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114964" version="1" comment="lxc is &lt;1.0.6-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114965" version="1" comment="lxc-devel is &lt;1.0.6-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114971" version="1" comment="chromedriver is &lt;45.0.2454.101-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114972" version="1" comment="chromium is &lt;45.0.2454.101-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114973" version="1" comment="chromium-desktop-gnome is &lt;45.0.2454.101-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114974" version="1" comment="chromium-desktop-kde is &lt;45.0.2454.101-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114975" version="1" comment="chromium-ffmpegsumo is &lt;45.0.2454.101-50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115013" version="1" comment="libpolkit0 is &lt;0.113-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115014" version="1" comment="libpolkit0-32bit is &lt;0.113-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115015" version="1" comment="polkit is &lt;0.113-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115016" version="1" comment="polkit-devel is &lt;0.113-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115017" version="1" comment="polkit-doc is &lt;0.113-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115018" version="1" comment="typelib-1_0-Polkit-1_0 is &lt;0.113-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117604" version="1" comment="flash-player is &lt;11.2.202.535-2.73.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117605" version="1" comment="flash-player-gnome is &lt;11.2.202.535-2.73.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117606" version="1" comment="flash-player-kde4 is &lt;11.2.202.535-2.73.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115042" version="1" comment="libspice-server-devel is &lt;0.12.4-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115043" version="1" comment="libspice-server1 is &lt;0.12.4-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115044" version="1" comment="spice is &lt;0.12.4-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115045" version="1" comment="spice-client is &lt;0.12.4-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115040" version="1" comment="jakarta-taglibs-standard is &lt;1.1.1-255.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115041" version="1" comment="jakarta-taglibs-standard-javadoc is &lt;1.1.1-255.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115031" version="1" comment="xalan-j2 is &lt;2.7.2-262.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115032" version="1" comment="xalan-j2-demo is &lt;2.7.2-262.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115033" version="1" comment="xalan-j2-manual is &lt;2.7.2-262.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115034" version="1" comment="xalan-j2-xsltc is &lt;2.7.2-262.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115046" version="1" comment="rsync is &lt;3.1.1-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117607" version="1" comment="flash-player is &lt;11.2.202.540-2.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117608" version="1" comment="flash-player-gnome is &lt;11.2.202.540-2.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117609" version="1" comment="flash-player-kde4 is &lt;11.2.202.540-2.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115059" version="1" comment="docker is &lt;1.8.3-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115060" version="1" comment="docker-bash-completion is &lt;1.8.3-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115061" version="1" comment="docker-test is &lt;1.8.3-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115062" version="1" comment="docker-zsh-completion is &lt;1.8.3-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105297" version="1" comment="libopenssl-devel is &lt;1.0.1k-2.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105298" version="1" comment="libopenssl-devel-32bit is &lt;1.0.1k-2.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105299" version="1" comment="libopenssl1_0_0 is &lt;1.0.1k-2.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105300" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1k-2.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105301" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1k-2.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105302" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1k-2.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105303" version="1" comment="openssl is &lt;1.0.1k-2.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105304" version="1" comment="openssl-doc is &lt;1.0.1k-2.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115118" version="1" comment="python-Django is &lt;1.6.11-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115130" version="1" comment="MozillaFirefox is &lt;41.0.2-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115131" version="1" comment="MozillaFirefox-branding-upstream is &lt;41.0.2-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115132" version="1" comment="MozillaFirefox-buildsymbols is &lt;41.0.2-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115133" version="1" comment="MozillaFirefox-devel is &lt;41.0.2-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115134" version="1" comment="MozillaFirefox-translations-common is &lt;41.0.2-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115135" version="1" comment="MozillaFirefox-translations-other is &lt;41.0.2-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115136" version="1" comment="chromedriver is &lt;46.0.2490.71-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115137" version="1" comment="chromium is &lt;46.0.2490.71-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115138" version="1" comment="chromium-desktop-gnome is &lt;46.0.2490.71-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115139" version="1" comment="chromium-desktop-kde is &lt;46.0.2490.71-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115140" version="1" comment="chromium-ffmpegsumo is &lt;46.0.2490.71-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105293" version="1" comment="libevent is &lt;2.0.21-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105294" version="1" comment="libevent-2_0-5 is &lt;2.0.21-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105295" version="1" comment="libevent-2_0-5-32bit is &lt;2.0.21-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105296" version="1" comment="libevent-devel is &lt;2.0.21-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117990" version="1" comment="nodejs is &lt;4.2.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117991" version="1" comment="nodejs-devel is &lt;4.2.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117992" version="1" comment="nodejs-doc is &lt;4.2.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117993" version="1" comment="nodejs-docs is &lt;4.2.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117994" version="1" comment="nodejs-npm is &lt;4.2.1-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115199" version="1" comment="libcrypto34 is &lt;2.2.1-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115200" version="1" comment="libcrypto34-32bit is &lt;2.2.1-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117733" version="1" comment="libcrypto36 is &lt;2.3.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117734" version="1" comment="libcrypto36-32bit is &lt;2.3.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117735" version="1" comment="libressl is &lt;2.3.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117736" version="1" comment="libressl-devel is &lt;2.3.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117737" version="1" comment="libressl-devel-32bit is &lt;2.3.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117738" version="1" comment="libressl-devel-doc is &lt;2.3.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115205" version="1" comment="libssl33 is &lt;2.2.1-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115206" version="1" comment="libssl33-32bit is &lt;2.2.1-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117739" version="1" comment="libssl37 is &lt;2.3.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117740" version="1" comment="libssl37-32bit is &lt;2.3.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115207" version="1" comment="libtls4 is &lt;2.2.1-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115208" version="1" comment="libtls4-32bit is &lt;2.2.1-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117741" version="1" comment="libtls9 is &lt;2.3.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117742" version="1" comment="libtls9-32bit is &lt;2.3.0-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115212" version="1" comment="haproxy is &lt;1.5.5-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117614" version="1" comment="wireshark is &lt;1.12.8-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117615" version="1" comment="wireshark-devel is &lt;1.12.8-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117616" version="1" comment="wireshark-ui-gtk is &lt;1.12.8-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117617" version="1" comment="wireshark-ui-qt is &lt;1.12.8-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117618" version="1" comment="squid is &lt;3.3.13-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115288" version="1" comment="bbswitch is &lt;0.8-3.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115289" version="1" comment="bbswitch-kmp-default is &lt;0.8_k3.16.7_29-3.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115290" version="1" comment="bbswitch-kmp-desktop is &lt;0.8_k3.16.7_29-3.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115291" version="1" comment="bbswitch-kmp-pae is &lt;0.8_k3.16.7_29-3.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115292" version="1" comment="bbswitch-kmp-xen is &lt;0.8_k3.16.7_29-3.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115293" version="1" comment="cloop is &lt;2.639-14.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115294" version="1" comment="cloop-kmp-default is &lt;2.639_k3.16.7_29-14.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115295" version="1" comment="cloop-kmp-desktop is &lt;2.639_k3.16.7_29-14.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115296" version="1" comment="cloop-kmp-pae is &lt;2.639_k3.16.7_29-14.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115297" version="1" comment="cloop-kmp-xen is &lt;2.639_k3.16.7_29-14.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115298" version="1" comment="crash is &lt;7.0.8-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115299" version="1" comment="crash-devel is &lt;7.0.8-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115300" version="1" comment="crash-doc is &lt;7.0.8-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115301" version="1" comment="crash-eppic is &lt;7.0.8-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115302" version="1" comment="crash-gcore is &lt;7.0.8-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115303" version="1" comment="crash-kmp-default is &lt;7.0.8_k3.16.7_29-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115304" version="1" comment="crash-kmp-desktop is &lt;7.0.8_k3.16.7_29-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115305" version="1" comment="crash-kmp-pae is &lt;7.0.8_k3.16.7_29-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115306" version="1" comment="crash-kmp-xen is &lt;7.0.8_k3.16.7_29-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115307" version="1" comment="hdjmod is &lt;1.28-18.14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115308" version="1" comment="hdjmod-kmp-default is &lt;1.28_k3.16.7_29-18.14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115309" version="1" comment="hdjmod-kmp-desktop is &lt;1.28_k3.16.7_29-18.14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115310" version="1" comment="hdjmod-kmp-pae is &lt;1.28_k3.16.7_29-18.14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115311" version="1" comment="hdjmod-kmp-xen is &lt;1.28_k3.16.7_29-18.14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115312" version="1" comment="ipset is &lt;6.23-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115313" version="1" comment="ipset-devel is &lt;6.23-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115314" version="1" comment="ipset-kmp-default is &lt;6.23_k3.16.7_29-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115315" version="1" comment="ipset-kmp-desktop is &lt;6.23_k3.16.7_29-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115316" version="1" comment="ipset-kmp-pae is &lt;6.23_k3.16.7_29-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115317" version="1" comment="ipset-kmp-xen is &lt;6.23_k3.16.7_29-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115319" version="1" comment="kernel-debug is &lt;3.16.7-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115320" version="1" comment="kernel-debug-base is &lt;3.16.7-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115321" version="1" comment="kernel-debug-devel is &lt;3.16.7-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115322" version="1" comment="kernel-default is &lt;3.16.7-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115323" version="1" comment="kernel-default-base is &lt;3.16.7-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115324" version="1" comment="kernel-default-devel is &lt;3.16.7-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115325" version="1" comment="kernel-desktop is &lt;3.16.7-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115326" version="1" comment="kernel-desktop-base is &lt;3.16.7-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115327" version="1" comment="kernel-desktop-devel is &lt;3.16.7-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115338" version="1" comment="kernel-devel is &lt;3.16.7-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115328" version="1" comment="kernel-docs is &lt;3.16.7-29.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115329" version="1" comment="kernel-ec2 is &lt;3.16.7-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115330" version="1" comment="kernel-ec2-base is &lt;3.16.7-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115331" version="1" comment="kernel-ec2-devel is &lt;3.16.7-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115339" version="1" comment="kernel-macros is &lt;3.16.7-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115332" version="1" comment="kernel-obs-build is &lt;3.16.7-29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115334" version="1" comment="kernel-obs-qa is &lt;3.16.7-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115333" version="1" comment="kernel-obs-qa-xen is &lt;3.16.7-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115335" version="1" comment="kernel-pae is &lt;3.16.7-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115336" version="1" comment="kernel-pae-base is &lt;3.16.7-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115337" version="1" comment="kernel-pae-devel is &lt;3.16.7-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115340" version="1" comment="kernel-source is &lt;3.16.7-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115341" version="1" comment="kernel-source-vanilla is &lt;3.16.7-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115342" version="1" comment="kernel-syms is &lt;3.16.7-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115343" version="1" comment="kernel-vanilla is &lt;3.16.7-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115344" version="1" comment="kernel-vanilla-devel is &lt;3.16.7-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115345" version="1" comment="kernel-xen is &lt;3.16.7-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115346" version="1" comment="kernel-xen-base is &lt;3.16.7-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115347" version="1" comment="kernel-xen-devel is &lt;3.16.7-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115318" version="1" comment="libipset3 is &lt;6.23-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115348" version="1" comment="pcfclock is &lt;0.44-260.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115349" version="1" comment="pcfclock-kmp-default is &lt;0.44_k3.16.7_29-260.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115350" version="1" comment="pcfclock-kmp-desktop is &lt;0.44_k3.16.7_29-260.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115351" version="1" comment="pcfclock-kmp-pae is &lt;0.44_k3.16.7_29-260.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115352" version="1" comment="vhba-kmp is &lt;20140629-2.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115353" version="1" comment="vhba-kmp-default is &lt;20140629_k3.16.7_29-2.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115354" version="1" comment="vhba-kmp-desktop is &lt;20140629_k3.16.7_29-2.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115355" version="1" comment="vhba-kmp-pae is &lt;20140629_k3.16.7_29-2.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115356" version="1" comment="vhba-kmp-xen is &lt;20140629_k3.16.7_29-2.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115357" version="1" comment="xen is &lt;4.4.2_06-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115358" version="1" comment="xen-devel is &lt;4.4.2_06-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115367" version="1" comment="xen-doc-html is &lt;4.4.2_06-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115368" version="1" comment="xen-kmp-default is &lt;4.4.2_06_k3.16.7_29-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115369" version="1" comment="xen-kmp-desktop is &lt;4.4.2_06_k3.16.7_29-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115360" version="1" comment="xen-libs is &lt;4.4.2_06-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115359" version="1" comment="xen-libs-32bit is &lt;4.4.2_06-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115370" version="1" comment="xen-tools is &lt;4.4.2_06-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115361" version="1" comment="xen-tools-domU is &lt;4.4.2_06-27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115362" version="1" comment="xtables-addons is &lt;2.6-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115363" version="1" comment="xtables-addons-kmp-default is &lt;2.6_k3.16.7_29-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115364" version="1" comment="xtables-addons-kmp-desktop is &lt;2.6_k3.16.7_29-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115365" version="1" comment="xtables-addons-kmp-pae is &lt;2.6_k3.16.7_29-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115366" version="1" comment="xtables-addons-kmp-xen is &lt;2.6_k3.16.7_29-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115421" version="1" comment="python-virtualbox is &lt;4.3.32-32.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115422" version="1" comment="virtualbox is &lt;4.3.32-32.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115423" version="1" comment="virtualbox-devel is &lt;4.3.32-32.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115424" version="1" comment="virtualbox-guest-desktop-icons is &lt;4.3.32-32.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115425" version="1" comment="virtualbox-guest-kmp-default is &lt;4.3.32_k3.16.7_29-32.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115426" version="1" comment="virtualbox-guest-kmp-desktop is &lt;4.3.32_k3.16.7_29-32.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115427" version="1" comment="virtualbox-guest-kmp-pae is &lt;4.3.32_k3.16.7_29-32.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115428" version="1" comment="virtualbox-guest-tools is &lt;4.3.32-32.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115429" version="1" comment="virtualbox-guest-x11 is &lt;4.3.32-32.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115430" version="1" comment="virtualbox-host-kmp-default is &lt;4.3.32_k3.16.7_29-32.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115431" version="1" comment="virtualbox-host-kmp-desktop is &lt;4.3.32_k3.16.7_29-32.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115432" version="1" comment="virtualbox-host-kmp-pae is &lt;4.3.32_k3.16.7_29-32.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115433" version="1" comment="virtualbox-host-source is &lt;4.3.32-32.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115434" version="1" comment="virtualbox-qt is &lt;4.3.32-32.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115435" version="1" comment="virtualbox-websrv is &lt;4.3.32-32.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105287" version="1" comment="MozillaThunderbird is &lt;31.4.0-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105288" version="1" comment="MozillaThunderbird-buildsymbols is &lt;31.4.0-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105289" version="1" comment="MozillaThunderbird-devel is &lt;31.4.0-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105290" version="1" comment="MozillaThunderbird-translations-common is &lt;31.4.0-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105291" version="1" comment="MozillaThunderbird-translations-other is &lt;31.4.0-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115543" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.91-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115544" version="1" comment="java-1_7_0-openjdk-accessibility is &lt;1.7.0.91-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115540" version="1" comment="java-1_7_0-openjdk-bootstrap is &lt;1.7.0.91-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115541" version="1" comment="java-1_7_0-openjdk-bootstrap-devel is &lt;1.7.0.91-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115542" version="1" comment="java-1_7_0-openjdk-bootstrap-headless is &lt;1.7.0.91-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115545" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.91-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115546" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.91-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115547" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.91-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115548" version="1" comment="java-1_7_0-openjdk-javadoc is &lt;1.7.0.91-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115549" version="1" comment="java-1_7_0-openjdk-src is &lt;1.7.0.91-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115531" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.65-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115532" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.65-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115533" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.65-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115534" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.65-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115535" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.65-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115536" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.65-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115537" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.65-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117619" version="1" comment="audiofile is &lt;0.3.6-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117620" version="1" comment="audiofile-devel is &lt;0.3.6-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117621" version="1" comment="audiofile-devel-32bit is &lt;0.3.6-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117622" version="1" comment="audiofile-doc is &lt;0.3.6-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117623" version="1" comment="libaudiofile1 is &lt;0.3.6-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117624" version="1" comment="libaudiofile1-32bit is &lt;0.3.6-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115559" version="1" comment="roundcubemail is &lt;1.0.7-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105055" version="1" comment="libssh is &lt;0.6.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105056" version="1" comment="libssh-devel is &lt;0.6.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105057" version="1" comment="libssh-devel-doc is &lt;0.6.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105058" version="1" comment="libssh4 is &lt;0.6.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105059" version="1" comment="libssh4-32bit is &lt;0.6.3-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105284" version="1" comment="libvala-0_26-0 is &lt;0.26.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105285" version="1" comment="libvala-0_26-devel is &lt;0.26.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105282" version="1" comment="shotwell is &lt;0.20.1-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105283" version="1" comment="shotwell-lang is &lt;0.20.1-5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105286" version="1" comment="vala is &lt;0.26.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115560" version="1" comment="wpa_supplicant is &lt;2.2-5.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115561" version="1" comment="wpa_supplicant-gui is &lt;2.2-5.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115518" version="1" comment="libecpg6 is &lt;9.3.10-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115517" version="1" comment="libecpg6-32bit is &lt;9.3.10-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115520" version="1" comment="libpq5 is &lt;9.3.10-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115519" version="1" comment="libpq5-32bit is &lt;9.3.10-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115523" version="1" comment="postgresql93 is &lt;9.3.10-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115524" version="1" comment="postgresql93-contrib is &lt;9.3.10-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115521" version="1" comment="postgresql93-devel is &lt;9.3.10-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115525" version="1" comment="postgresql93-docs is &lt;9.3.10-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115522" version="1" comment="postgresql93-libs is &lt;9.3.10-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115526" version="1" comment="postgresql93-plperl is &lt;9.3.10-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115527" version="1" comment="postgresql93-plpython is &lt;9.3.10-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115528" version="1" comment="postgresql93-pltcl is &lt;9.3.10-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115529" version="1" comment="postgresql93-server is &lt;9.3.10-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115530" version="1" comment="postgresql93-test is &lt;9.3.10-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117625" version="1" comment="libblkid-devel is &lt;2.25-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117626" version="1" comment="libblkid-devel-32bit is &lt;2.25-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115499" version="1" comment="libblkid-devel-static is &lt;2.25.1-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117627" version="1" comment="libblkid1 is &lt;2.25-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117628" version="1" comment="libblkid1-32bit is &lt;2.25-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117629" version="1" comment="libmount-devel is &lt;2.25-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117630" version="1" comment="libmount-devel-32bit is &lt;2.25-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115504" version="1" comment="libmount-devel-static is &lt;2.25.1-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117631" version="1" comment="libmount1 is &lt;2.25-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117632" version="1" comment="libmount1-32bit is &lt;2.25-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117633" version="1" comment="libsmartcols-devel is &lt;2.25-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115508" version="1" comment="libsmartcols-devel-static is &lt;2.25.1-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117634" version="1" comment="libsmartcols1 is &lt;2.25-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117635" version="1" comment="libuuid-devel is &lt;2.25-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117636" version="1" comment="libuuid-devel-32bit is &lt;2.25-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115512" version="1" comment="libuuid-devel-static is &lt;2.25.1-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117637" version="1" comment="libuuid1 is &lt;2.25-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117638" version="1" comment="libuuid1-32bit is &lt;2.25-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117639" version="1" comment="python-libmount is &lt;2.25-9.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117640" version="1" comment="util-linux is &lt;2.25-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117641" version="1" comment="util-linux-lang is &lt;2.25-9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117642" version="1" comment="util-linux-systemd is &lt;2.25-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117643" version="1" comment="uuidd is &lt;2.25-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115491" version="1" comment="sudo is &lt;1.8.10p3-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115492" version="1" comment="sudo-devel is &lt;1.8.10p3-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115493" version="1" comment="sudo-test is &lt;1.8.10p3-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117644" version="1" comment="libpotrace0 is &lt;1.13-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117645" version="1" comment="potrace is &lt;1.13-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117646" version="1" comment="potrace-devel is &lt;1.13-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117647" version="1" comment="bouncycastle is &lt;1.53-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117648" version="1" comment="bouncycastle-javadoc is &lt;1.53-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115999" version="1" comment="krb5 is &lt;1.12.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116000" version="1" comment="krb5-32bit is &lt;1.12.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116001" version="1" comment="krb5-client is &lt;1.12.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116002" version="1" comment="krb5-devel is &lt;1.12.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116003" version="1" comment="krb5-devel-32bit is &lt;1.12.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116004" version="1" comment="krb5-doc is &lt;1.12.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115997" version="1" comment="krb5-mini is &lt;1.12.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115998" version="1" comment="krb5-mini-devel is &lt;1.12.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116005" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116006" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116007" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116008" version="1" comment="krb5-server is &lt;1.12.2-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116009" version="1" comment="phpMyAdmin is &lt;4.4.15.1-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117649" version="1" comment="MozillaFirefox is &lt;42.0-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117650" version="1" comment="MozillaFirefox-branding-upstream is &lt;42.0-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117651" version="1" comment="MozillaFirefox-buildsymbols is &lt;42.0-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117652" version="1" comment="MozillaFirefox-devel is &lt;42.0-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117653" version="1" comment="MozillaFirefox-translations-common is &lt;42.0-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117654" version="1" comment="MozillaFirefox-translations-other is &lt;42.0-3.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117655" version="1" comment="libfreebl3 is &lt;3.20.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117656" version="1" comment="libfreebl3-32bit is &lt;3.20.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117657" version="1" comment="libsoftokn3 is &lt;3.20.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117658" version="1" comment="libsoftokn3-32bit is &lt;3.20.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117659" version="1" comment="mozilla-nspr is &lt;4.10.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117660" version="1" comment="mozilla-nspr-32bit is &lt;4.10.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117661" version="1" comment="mozilla-nspr-devel is &lt;4.10.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117662" version="1" comment="mozilla-nss is &lt;3.20.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117663" version="1" comment="mozilla-nss-32bit is &lt;3.20.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117664" version="1" comment="mozilla-nss-certs is &lt;3.20.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117665" version="1" comment="mozilla-nss-certs-32bit is &lt;3.20.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117666" version="1" comment="mozilla-nss-devel is &lt;3.20.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117667" version="1" comment="mozilla-nss-sysinit is &lt;3.20.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117668" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.20.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117669" version="1" comment="mozilla-nss-tools is &lt;3.20.1-3.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117670" version="1" comment="seamonkey is &lt;2.39-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117671" version="1" comment="seamonkey-dom-inspector is &lt;2.39-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117672" version="1" comment="seamonkey-irc is &lt;2.39-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117673" version="1" comment="seamonkey-translations-common is &lt;2.39-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117674" version="1" comment="seamonkey-translations-other is &lt;2.39-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117675" version="1" comment="xulrunner is &lt;38.4.0-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117676" version="1" comment="xulrunner-32bit is &lt;38.4.0-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117677" version="1" comment="xulrunner-devel is &lt;38.4.0-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117388" version="1" comment="git is &lt;2.1.4-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117389" version="1" comment="git-arch is &lt;2.1.4-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117390" version="1" comment="git-core is &lt;2.1.4-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117391" version="1" comment="git-cvs is &lt;2.1.4-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117392" version="1" comment="git-daemon is &lt;2.1.4-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117393" version="1" comment="git-doc is &lt;2.1.4-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117394" version="1" comment="git-email is &lt;2.1.4-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117395" version="1" comment="git-gui is &lt;2.1.4-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117384" version="1" comment="git-remote-helpers is &lt;1.8.4.5-3.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117396" version="1" comment="git-svn is &lt;2.1.4-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117397" version="1" comment="git-web is &lt;2.1.4-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117398" version="1" comment="gitk is &lt;2.1.4-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117858" version="1" comment="flash-player is &lt;11.2.202.548-2.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117859" version="1" comment="flash-player-gnome is &lt;11.2.202.548-2.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117860" version="1" comment="flash-player-kde4 is &lt;11.2.202.548-2.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117876" version="1" comment="libsndfile is &lt;1.0.25-19.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117877" version="1" comment="libsndfile-devel is &lt;1.0.25-19.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117878" version="1" comment="libsndfile-progs is &lt;1.0.25-19.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117879" version="1" comment="libsndfile1 is &lt;1.0.25-19.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117880" version="1" comment="libsndfile1-32bit is &lt;1.0.25-19.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117956" version="1" comment="xen is &lt;4.4.3_02-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117957" version="1" comment="xen-devel is &lt;4.4.3_02-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117958" version="1" comment="xen-doc-html is &lt;4.4.3_02-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117959" version="1" comment="xen-kmp-default is &lt;4.4.3_02_k3.16.7_29-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117960" version="1" comment="xen-kmp-desktop is &lt;4.4.3_02_k3.16.7_29-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117961" version="1" comment="xen-libs is &lt;4.4.3_02-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117962" version="1" comment="xen-libs-32bit is &lt;4.4.3_02-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117963" version="1" comment="xen-tools is &lt;4.4.3_02-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117964" version="1" comment="xen-tools-domU is &lt;4.4.3_02-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117999" version="1" comment="dracut is &lt;037-17.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118000" version="1" comment="dracut-fips is &lt;037-17.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117995" version="1" comment="putty is &lt;0.66-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117678" version="1" comment="flash-player is &lt;11.2.202.440-2.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117679" version="1" comment="flash-player-gnome is &lt;11.2.202.440-2.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117680" version="1" comment="flash-player-kde4 is &lt;11.2.202.440-2.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118004" version="1" comment="xscreensaver is &lt;5.33-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118005" version="1" comment="xscreensaver-data is &lt;5.33-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118006" version="1" comment="xscreensaver-data-extra is &lt;5.33-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118016" version="1" comment="krb5 is &lt;1.12.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118017" version="1" comment="krb5-32bit is &lt;1.12.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118018" version="1" comment="krb5-client is &lt;1.12.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118019" version="1" comment="krb5-devel is &lt;1.12.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118020" version="1" comment="krb5-devel-32bit is &lt;1.12.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118021" version="1" comment="krb5-doc is &lt;1.12.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118022" version="1" comment="krb5-mini is &lt;1.12.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118023" version="1" comment="krb5-mini-devel is &lt;1.12.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118024" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118025" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118026" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118027" version="1" comment="krb5-server is &lt;1.12.2-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118028" version="1" comment="libksba is &lt;1.3.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118029" version="1" comment="libksba-devel is &lt;1.3.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118030" version="1" comment="libksba8 is &lt;1.3.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118042" version="1" comment="chromedriver is &lt;46.0.2490.86-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118043" version="1" comment="chromium is &lt;46.0.2490.86-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118044" version="1" comment="chromium-desktop-gnome is &lt;46.0.2490.86-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118045" version="1" comment="chromium-desktop-kde is &lt;46.0.2490.86-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118046" version="1" comment="chromium-ffmpegsumo is &lt;46.0.2490.86-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118047" version="1" comment="libminiupnpc-devel is &lt;1.9-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118048" version="1" comment="libminiupnpc10 is &lt;1.9-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118049" version="1" comment="libminiupnpc10-32bit is &lt;1.9-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118050" version="1" comment="miniupnpc is &lt;1.9-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118051" version="1" comment="python-miniupnpc is &lt;1.9-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105589" version="1" comment="libpng16 is &lt;1.6.13-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105590" version="1" comment="libpng16-16 is &lt;1.6.13-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105591" version="1" comment="libpng16-16-32bit is &lt;1.6.13-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105592" version="1" comment="libpng16-compat-devel is &lt;1.6.13-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105593" version="1" comment="libpng16-compat-devel-32bit is &lt;1.6.13-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105594" version="1" comment="libpng16-devel is &lt;1.6.13-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105595" version="1" comment="libpng16-devel-32bit is &lt;1.6.13-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105596" version="1" comment="libpng16-tools is &lt;1.6.13-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105579" version="1" comment="git is &lt;2.1.4-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105580" version="1" comment="git-arch is &lt;2.1.4-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105581" version="1" comment="git-core is &lt;2.1.4-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105582" version="1" comment="git-cvs is &lt;2.1.4-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105583" version="1" comment="git-daemon is &lt;2.1.4-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105573" version="1" comment="git-doc is &lt;2.1.4-9.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105584" version="1" comment="git-email is &lt;2.1.4-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105585" version="1" comment="git-gui is &lt;2.1.4-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105556" version="1" comment="git-remote-helpers is &lt;1.8.4.5-3.8.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105586" version="1" comment="git-svn is &lt;2.1.4-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105587" version="1" comment="git-web is &lt;2.1.4-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105588" version="1" comment="gitk is &lt;2.1.4-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118102" version="1" comment="libpng16 is &lt;1.6.13-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118103" version="1" comment="libpng16-16 is &lt;1.6.13-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118104" version="1" comment="libpng16-16-32bit is &lt;1.6.13-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118105" version="1" comment="libpng16-compat-devel is &lt;1.6.13-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118106" version="1" comment="libpng16-compat-devel-32bit is &lt;1.6.13-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118107" version="1" comment="libpng16-devel is &lt;1.6.13-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118108" version="1" comment="libpng16-devel-32bit is &lt;1.6.13-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118109" version="1" comment="libpng16-tools is &lt;1.6.13-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118110" version="1" comment="libpng12 is &lt;1.2.51-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118111" version="1" comment="libpng12-0 is &lt;1.2.51-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118112" version="1" comment="libpng12-0-32bit is &lt;1.2.51-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118113" version="1" comment="libpng12-compat-devel is &lt;1.2.51-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118114" version="1" comment="libpng12-compat-devel-32bit is &lt;1.2.51-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118115" version="1" comment="libpng12-devel is &lt;1.2.51-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118116" version="1" comment="libpng12-devel-32bit is &lt;1.2.51-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118117" version="1" comment="strongswan is &lt;5.2.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118118" version="1" comment="strongswan-doc is &lt;5.2.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118119" version="1" comment="strongswan-hmac is &lt;5.2.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118120" version="1" comment="strongswan-ipsec is &lt;5.2.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118121" version="1" comment="strongswan-libs0 is &lt;5.2.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118122" version="1" comment="strongswan-mysql is &lt;5.2.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118123" version="1" comment="strongswan-nm is &lt;5.2.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118124" version="1" comment="strongswan-sqlite is &lt;5.2.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118321" version="1" comment="ppp is &lt;2.4.7-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118322" version="1" comment="ppp-devel is &lt;2.4.7-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118325" version="1" comment="cyradm is &lt;2.4.18-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118326" version="1" comment="cyrus-imapd is &lt;2.4.18-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118327" version="1" comment="cyrus-imapd-devel is &lt;2.4.18-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118328" version="1" comment="cyrus-imapd-snmp is &lt;2.4.18-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118329" version="1" comment="cyrus-imapd-snmp-mibs is &lt;2.4.18-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118330" version="1" comment="cyrus-imapd-utils is &lt;2.4.18-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118331" version="1" comment="perl-Cyrus-IMAP is &lt;2.4.18-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118332" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.4.18-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118549" version="1" comment="gpg2 is &lt;2.0.26-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118550" version="1" comment="gpg2-lang is &lt;2.0.26-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118827" version="1" comment="python-Django is &lt;1.6.11-3.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105716" version="1" comment="libmspack is &lt;0.4-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105717" version="1" comment="libmspack-devel is &lt;0.4-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105718" version="1" comment="libmspack0 is &lt;0.4-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105719" version="1" comment="libmspack0-32bit is &lt;0.4-5.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105720" version="1" comment="libpolarssl7 is &lt;1.3.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105721" version="1" comment="polarssl is &lt;1.3.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105722" version="1" comment="polarssl-devel is &lt;1.3.9-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044473"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118891" version="1" comment="flash-player is &lt;11.2.202.554-2.82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118892" version="1" comment="flash-player-gnome is &lt;11.2.202.554-2.82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118893" version="1" comment="flash-player-kde4 is &lt;11.2.202.554-2.82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118940" version="1" comment="libmysqlclient-devel is &lt;10.0.22-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118941" version="1" comment="libmysqlclient18 is &lt;10.0.22-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118942" version="1" comment="libmysqlclient18-32bit is &lt;10.0.22-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118943" version="1" comment="libmysqlclient_r18 is &lt;10.0.22-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118944" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.22-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118945" version="1" comment="libmysqld-devel is &lt;10.0.22-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118946" version="1" comment="libmysqld18 is &lt;10.0.22-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118947" version="1" comment="mariadb is &lt;10.0.22-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118948" version="1" comment="mariadb-bench is &lt;10.0.22-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118949" version="1" comment="mariadb-client is &lt;10.0.22-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118950" version="1" comment="mariadb-errormessages is &lt;10.0.22-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118951" version="1" comment="mariadb-test is &lt;10.0.22-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118952" version="1" comment="mariadb-tools is &lt;10.0.22-2.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118894" version="1" comment="MozillaThunderbird is &lt;38.4.0-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118895" version="1" comment="MozillaThunderbird-buildsymbols is &lt;38.4.0-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118896" version="1" comment="MozillaThunderbird-devel is &lt;38.4.0-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118897" version="1" comment="MozillaThunderbird-translations-common is &lt;38.4.0-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118898" version="1" comment="MozillaThunderbird-translations-other is &lt;38.4.0-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118899" version="1" comment="libmysql56client18 is &lt;5.6.27-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118900" version="1" comment="libmysql56client18-32bit is &lt;5.6.27-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118901" version="1" comment="libmysql56client_r18 is &lt;5.6.27-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118902" version="1" comment="libmysql56client_r18-32bit is &lt;5.6.27-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118903" version="1" comment="mysql-community-server is &lt;5.6.27-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118904" version="1" comment="mysql-community-server-bench is &lt;5.6.27-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118905" version="1" comment="mysql-community-server-client is &lt;5.6.27-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118906" version="1" comment="mysql-community-server-errormessages is &lt;5.6.27-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118907" version="1" comment="mysql-community-server-test is &lt;5.6.27-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118908" version="1" comment="mysql-community-server-tools is &lt;5.6.27-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105723" version="1" comment="hivex is &lt;1.3.10-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105724" version="1" comment="hivex-devel is &lt;1.3.10-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105725" version="1" comment="libhivex0 is &lt;1.3.10-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105726" version="1" comment="perl-Win-Hivex is &lt;1.3.10-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105727" version="1" comment="python-hivex is &lt;1.3.10-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118953" version="1" comment="xen is &lt;4.4.3_04-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118954" version="1" comment="xen-devel is &lt;4.4.3_04-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118955" version="1" comment="xen-doc-html is &lt;4.4.3_04-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118956" version="1" comment="xen-kmp-default is &lt;4.4.3_04_k3.16.7_29-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118957" version="1" comment="xen-kmp-desktop is &lt;4.4.3_04_k3.16.7_29-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118958" version="1" comment="xen-libs is &lt;4.4.3_04-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118959" version="1" comment="xen-libs-32bit is &lt;4.4.3_04-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118960" version="1" comment="xen-tools is &lt;4.4.3_04-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118961" version="1" comment="xen-tools-domU is &lt;4.4.3_04-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105710" version="1" comment="xdg-utils is &lt;20140922-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119206" version="1" comment="libraw is &lt;0.16.0-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119207" version="1" comment="libraw-devel is &lt;0.16.0-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119208" version="1" comment="libraw-devel-static is &lt;0.16.0-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119209" version="1" comment="libraw-tools is &lt;0.16.0-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119210" version="1" comment="libraw10 is &lt;0.16.0-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119211" version="1" comment="libraw9 is &lt;0.15.4-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119240" version="1" comment="libpng12 is &lt;1.2.51-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119241" version="1" comment="libpng12-0 is &lt;1.2.51-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119242" version="1" comment="libpng12-0-32bit is &lt;1.2.51-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119243" version="1" comment="libpng12-compat-devel is &lt;1.2.51-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119244" version="1" comment="libpng12-compat-devel-32bit is &lt;1.2.51-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119245" version="1" comment="libpng12-devel is &lt;1.2.51-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119246" version="1" comment="libpng12-devel-32bit is &lt;1.2.51-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119247" version="1" comment="libpng16 is &lt;1.6.13-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119248" version="1" comment="libpng16-16 is &lt;1.6.13-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119249" version="1" comment="libpng16-16-32bit is &lt;1.6.13-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119250" version="1" comment="libpng16-compat-devel is &lt;1.6.13-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119251" version="1" comment="libpng16-compat-devel-32bit is &lt;1.6.13-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119252" version="1" comment="libpng16-devel is &lt;1.6.13-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119253" version="1" comment="libpng16-devel-32bit is &lt;1.6.13-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119254" version="1" comment="libpng16-tools is &lt;1.6.13-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119577" version="1" comment="libopenssl-devel is &lt;1.0.1k-2.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119578" version="1" comment="libopenssl-devel-32bit is &lt;1.0.1k-2.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119579" version="1" comment="libopenssl1_0_0 is &lt;1.0.1k-2.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119580" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1k-2.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119581" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1k-2.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119582" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1k-2.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119583" version="1" comment="openssl is &lt;1.0.1k-2.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119584" version="1" comment="openssl-doc is &lt;1.0.1k-2.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105731" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.75-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105732" version="1" comment="java-1_7_0-openjdk-accessibility is &lt;1.7.0.75-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105728" version="1" comment="java-1_7_0-openjdk-bootstrap is &lt;1.7.0.75-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105729" version="1" comment="java-1_7_0-openjdk-bootstrap-devel is &lt;1.7.0.75-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105730" version="1" comment="java-1_7_0-openjdk-bootstrap-headless is &lt;1.7.0.75-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105733" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.75-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105734" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.75-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105735" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.75-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105736" version="1" comment="java-1_7_0-openjdk-javadoc is &lt;1.7.0.75-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105737" version="1" comment="java-1_7_0-openjdk-src is &lt;1.7.0.75-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119591" version="1" comment="chromedriver is &lt;47.0.2526.80-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119592" version="1" comment="chromium is &lt;47.0.2526.80-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119593" version="1" comment="chromium-desktop-gnome is &lt;47.0.2526.80-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119594" version="1" comment="chromium-desktop-kde is &lt;47.0.2526.80-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119595" version="1" comment="chromium-ffmpegsumo is &lt;47.0.2526.80-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119757" version="1" comment="libXfont is &lt;1.5.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119758" version="1" comment="libXfont-devel is &lt;1.5.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119759" version="1" comment="libXfont-devel-32bit is &lt;1.5.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119760" version="1" comment="libXfont1 is &lt;1.5.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119761" version="1" comment="libXfont1-32bit is &lt;1.5.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119772" version="1" comment="libcrypto34 is &lt;2.2.1-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119773" version="1" comment="libcrypto34-32bit is &lt;2.2.1-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119774" version="1" comment="libcrypto36 is &lt;2.3.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119775" version="1" comment="libcrypto36-32bit is &lt;2.3.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119776" version="1" comment="libressl is &lt;2.3.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119777" version="1" comment="libressl-devel is &lt;2.3.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119778" version="1" comment="libressl-devel-32bit is &lt;2.3.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119779" version="1" comment="libressl-devel-doc is &lt;2.3.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119780" version="1" comment="libssl33 is &lt;2.2.1-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119781" version="1" comment="libssl33-32bit is &lt;2.2.1-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119782" version="1" comment="libssl37 is &lt;2.3.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119783" version="1" comment="libssl37-32bit is &lt;2.3.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119784" version="1" comment="libtls4 is &lt;2.2.1-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119785" version="1" comment="libtls4-32bit is &lt;2.2.1-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119786" version="1" comment="libtls9 is &lt;2.3.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119787" version="1" comment="libtls9-32bit is &lt;2.3.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105711" version="1" comment="seamonkey is &lt;2.32-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105712" version="1" comment="seamonkey-dom-inspector is &lt;2.32-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105713" version="1" comment="seamonkey-irc is &lt;2.32-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105714" version="1" comment="seamonkey-translations-common is &lt;2.32-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105715" version="1" comment="seamonkey-translations-other is &lt;2.32-8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044472"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119863" version="1" comment="quassel is &lt;0.12.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119864" version="1" comment="quassel-base is &lt;0.12.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119865" version="1" comment="quassel-client is &lt;0.12.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119866" version="1" comment="quassel-core is &lt;0.12.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119867" version="1" comment="quassel-mono is &lt;0.12.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119868" version="1" comment="chromedriver is &lt;47.0.2526.106-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119869" version="1" comment="chromium is &lt;47.0.2526.106-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119870" version="1" comment="chromium-desktop-gnome is &lt;47.0.2526.106-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119871" version="1" comment="chromium-desktop-kde is &lt;47.0.2526.106-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119872" version="1" comment="chromium-ffmpegsumo is &lt;47.0.2526.106-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119896" version="1" comment="MozillaFirefox is &lt;43.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119897" version="1" comment="MozillaFirefox-branding-upstream is &lt;43.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119898" version="1" comment="MozillaFirefox-buildsymbols is &lt;43.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119899" version="1" comment="MozillaFirefox-devel is &lt;43.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119900" version="1" comment="MozillaFirefox-translations-common is &lt;43.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119901" version="1" comment="MozillaFirefox-translations-other is &lt;43.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119908" version="1" comment="glibc is &lt;2.19-16.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119909" version="1" comment="glibc-devel is &lt;2.19-16.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119910" version="1" comment="glibc-devel-static is &lt;2.19-16.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119911" version="1" comment="glibc-extra is &lt;2.19-16.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119912" version="1" comment="glibc-html is &lt;2.19-16.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119913" version="1" comment="glibc-i18ndata is &lt;2.19-16.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119914" version="1" comment="glibc-info is &lt;2.19-16.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119915" version="1" comment="glibc-locale is &lt;2.19-16.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119916" version="1" comment="glibc-obsolete is &lt;2.19-16.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119917" version="1" comment="glibc-profile is &lt;2.19-16.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119918" version="1" comment="glibc-testsuite is &lt;2.19-16.18.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119919" version="1" comment="glibc-utils is &lt;2.19-16.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119920" version="1" comment="glibc-utils-32bit is &lt;2.19-16.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119921" version="1" comment="nscd is &lt;2.19-16.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120133" version="1" comment="ldb is &lt;1.1.24-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120134" version="1" comment="ldb-tools is &lt;1.1.24-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120135" version="1" comment="libdcerpc-atsvc-devel is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120136" version="1" comment="libdcerpc-atsvc0 is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120137" version="1" comment="libdcerpc-atsvc0-32bit is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120138" version="1" comment="libdcerpc-binding0 is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120139" version="1" comment="libdcerpc-binding0-32bit is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120140" version="1" comment="libdcerpc-devel is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120141" version="1" comment="libdcerpc-samr-devel is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120142" version="1" comment="libdcerpc-samr0 is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120143" version="1" comment="libdcerpc-samr0-32bit is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120144" version="1" comment="libdcerpc0 is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120145" version="1" comment="libdcerpc0-32bit is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120146" version="1" comment="libgensec-devel is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120147" version="1" comment="libgensec0 is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120148" version="1" comment="libgensec0-32bit is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120149" version="1" comment="libldb-devel is &lt;1.1.24-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120150" version="1" comment="libldb1 is &lt;1.1.24-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120151" version="1" comment="libldb1-32bit is &lt;1.1.24-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120152" version="1" comment="libndr-devel is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120153" version="1" comment="libndr-krb5pac-devel is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120154" version="1" comment="libndr-krb5pac0 is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120155" version="1" comment="libndr-krb5pac0-32bit is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120156" version="1" comment="libndr-nbt-devel is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120157" version="1" comment="libndr-nbt0 is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120158" version="1" comment="libndr-nbt0-32bit is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120159" version="1" comment="libndr-standard-devel is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120160" version="1" comment="libndr-standard0 is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120161" version="1" comment="libndr-standard0-32bit is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120162" version="1" comment="libndr0 is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120163" version="1" comment="libndr0-32bit is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120164" version="1" comment="libnetapi-devel is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120165" version="1" comment="libnetapi0 is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120166" version="1" comment="libnetapi0-32bit is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120167" version="1" comment="libpdb-devel is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120168" version="1" comment="libpdb0 is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120169" version="1" comment="libpdb0-32bit is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120170" version="1" comment="libregistry-devel is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120171" version="1" comment="libregistry0 is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120172" version="1" comment="libregistry0-32bit is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120173" version="1" comment="libsamba-credentials-devel is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120174" version="1" comment="libsamba-credentials0 is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120175" version="1" comment="libsamba-credentials0-32bit is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120176" version="1" comment="libsamba-hostconfig-devel is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120177" version="1" comment="libsamba-hostconfig0 is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120178" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120179" version="1" comment="libsamba-policy-devel is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120180" version="1" comment="libsamba-policy0 is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120181" version="1" comment="libsamba-policy0-32bit is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120182" version="1" comment="libsamba-util-devel is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120183" version="1" comment="libsamba-util0 is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120184" version="1" comment="libsamba-util0-32bit is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120185" version="1" comment="libsamdb-devel is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120186" version="1" comment="libsamdb0 is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120187" version="1" comment="libsamdb0-32bit is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120188" version="1" comment="libsmbclient-devel is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120189" version="1" comment="libsmbclient-raw-devel is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120190" version="1" comment="libsmbclient-raw0 is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120191" version="1" comment="libsmbclient-raw0-32bit is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120192" version="1" comment="libsmbclient0 is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120193" version="1" comment="libsmbclient0-32bit is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120194" version="1" comment="libsmbconf-devel is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120195" version="1" comment="libsmbconf0 is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120196" version="1" comment="libsmbconf0-32bit is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120197" version="1" comment="libsmbldap-devel is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120198" version="1" comment="libsmbldap0 is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120199" version="1" comment="libsmbldap0-32bit is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120200" version="1" comment="libsmbsharemodes-devel is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120201" version="1" comment="libsmbsharemodes0 is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120202" version="1" comment="libtalloc-devel is &lt;2.1.5-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120203" version="1" comment="libtalloc2 is &lt;2.1.5-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120204" version="1" comment="libtalloc2-32bit is &lt;2.1.5-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120205" version="1" comment="libtdb-devel is &lt;1.3.8-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120206" version="1" comment="libtdb1 is &lt;1.3.8-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120207" version="1" comment="libtdb1-32bit is &lt;1.3.8-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120208" version="1" comment="libtevent-devel is &lt;0.9.26-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120209" version="1" comment="libtevent-util-devel is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120210" version="1" comment="libtevent-util0 is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120211" version="1" comment="libtevent-util0-32bit is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120212" version="1" comment="libtevent0 is &lt;0.9.26-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120213" version="1" comment="libtevent0-32bit is &lt;0.9.26-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120214" version="1" comment="libwbclient-devel is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120215" version="1" comment="libwbclient0 is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120216" version="1" comment="libwbclient0-32bit is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120217" version="1" comment="pyldb is &lt;1.1.24-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120218" version="1" comment="pyldb-32bit is &lt;1.1.24-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120219" version="1" comment="pyldb-devel is &lt;1.1.24-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120220" version="1" comment="pytalloc is &lt;2.1.5-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120221" version="1" comment="pytalloc-32bit is &lt;2.1.5-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120222" version="1" comment="pytalloc-devel is &lt;2.1.5-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120223" version="1" comment="python-tdb is &lt;1.3.8-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120224" version="1" comment="python-tdb-32bit is &lt;1.3.8-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120225" version="1" comment="python-tevent is &lt;0.9.26-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120226" version="1" comment="python-tevent-32bit is &lt;0.9.26-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120227" version="1" comment="samba is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120228" version="1" comment="samba-32bit is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120229" version="1" comment="samba-client is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120230" version="1" comment="samba-client-32bit is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120231" version="1" comment="samba-core-devel is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120232" version="1" comment="samba-doc is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120233" version="1" comment="samba-libs is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120234" version="1" comment="samba-libs-32bit is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120235" version="1" comment="samba-pidl is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120236" version="1" comment="samba-python is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120237" version="1" comment="samba-test is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120238" version="1" comment="samba-test-devel is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120239" version="1" comment="samba-winbind is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120240" version="1" comment="samba-winbind-32bit is &lt;4.1.22-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120241" version="1" comment="talloc is &lt;2.1.5-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120242" version="1" comment="tdb is &lt;1.3.8-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120243" version="1" comment="tdb-tools is &lt;1.3.8-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120244" version="1" comment="tevent is &lt;0.9.26-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120357" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.8.15-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120358" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.8.15-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120359" version="1" comment="subversion is &lt;1.8.15-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120360" version="1" comment="subversion-bash-completion is &lt;1.8.15-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120361" version="1" comment="subversion-devel is &lt;1.8.15-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120362" version="1" comment="subversion-perl is &lt;1.8.15-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120363" version="1" comment="subversion-python is &lt;1.8.15-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120364" version="1" comment="subversion-python-ctypes is &lt;1.8.15-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120365" version="1" comment="subversion-ruby is &lt;1.8.15-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120366" version="1" comment="subversion-server is &lt;1.8.15-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120367" version="1" comment="subversion-tools is &lt;1.8.15-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120368" version="1" comment="bind is &lt;9.9.6P1-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120369" version="1" comment="bind-chrootenv is &lt;9.9.6P1-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120370" version="1" comment="bind-devel is &lt;9.9.6P1-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120371" version="1" comment="bind-doc is &lt;9.9.6P1-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120372" version="1" comment="bind-libs is &lt;9.9.6P1-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120373" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120374" version="1" comment="bind-lwresd is &lt;9.9.6P1-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120375" version="1" comment="bind-utils is &lt;9.9.6P1-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120442" version="1" comment="cups-filters is &lt;1.0.58-2.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120443" version="1" comment="cups-filters-cups-browsed is &lt;1.0.58-2.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120444" version="1" comment="cups-filters-devel is &lt;1.0.58-2.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120445" version="1" comment="cups-filters-foomatic-rip is &lt;1.0.58-2.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120446" version="1" comment="cups-filters-ghostscript is &lt;1.0.58-2.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120412" version="1" comment="gummi is &lt;0.7.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120413" version="1" comment="gummi-lang is &lt;0.7.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120414" version="1" comment="grub2 is &lt;2.02~beta2-20.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120415" version="1" comment="grub2-branding-upstream is &lt;2.02~beta2-20.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120416" version="1" comment="grub2-i386-efi is &lt;2.02~beta2-20.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120417" version="1" comment="grub2-i386-pc is &lt;2.02~beta2-20.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120418" version="1" comment="grub2-snapper-plugin is &lt;2.02~beta2-20.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120419" version="1" comment="grub2-x86_64-efi is &lt;2.02~beta2-20.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120420" version="1" comment="grub2-x86_64-xen is &lt;2.02~beta2-20.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120421" version="1" comment="libxml2 is &lt;2.9.3-7.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120422" version="1" comment="libxml2-2 is &lt;2.9.3-7.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120423" version="1" comment="libxml2-2-32bit is &lt;2.9.3-7.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120424" version="1" comment="libxml2-devel is &lt;2.9.3-7.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120425" version="1" comment="libxml2-devel-32bit is &lt;2.9.3-7.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120426" version="1" comment="libxml2-doc is &lt;2.9.3-7.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120427" version="1" comment="libxml2-tools is &lt;2.9.3-7.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120428" version="1" comment="python-libxml2 is &lt;2.9.3-7.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120447" version="1" comment="libpolarssl7 is &lt;1.3.9-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120448" version="1" comment="polarssl is &lt;1.3.9-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120449" version="1" comment="polarssl-devel is &lt;1.3.9-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105809" version="1" comment="jasper is &lt;1.900.1-163.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105810" version="1" comment="libjasper-devel is &lt;1.900.1-163.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105811" version="1" comment="libjasper1 is &lt;1.900.1-163.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105812" version="1" comment="libjasper1-32bit is &lt;1.900.1-163.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120905" version="1" comment="flash-player is &lt;11.2.202.559-2.85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120906" version="1" comment="flash-player-gnome is &lt;11.2.202.559-2.85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120907" version="1" comment="flash-player-kde4 is &lt;11.2.202.559-2.85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120911" version="1" comment="MozillaThunderbird is &lt;38.5.0-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120912" version="1" comment="MozillaThunderbird-buildsymbols is &lt;38.5.0-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120913" version="1" comment="MozillaThunderbird-devel is &lt;38.5.0-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120914" version="1" comment="MozillaThunderbird-translations-common is &lt;38.5.0-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120915" version="1" comment="MozillaThunderbird-translations-other is &lt;38.5.0-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120916" version="1" comment="libfreebl3 is &lt;3.20.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120917" version="1" comment="libfreebl3-32bit is &lt;3.20.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120918" version="1" comment="libsoftokn3 is &lt;3.20.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120919" version="1" comment="libsoftokn3-32bit is &lt;3.20.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120920" version="1" comment="mozilla-nss is &lt;3.20.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120921" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120922" version="1" comment="mozilla-nss-certs is &lt;3.20.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120923" version="1" comment="mozilla-nss-certs-32bit is &lt;3.20.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120924" version="1" comment="mozilla-nss-devel is &lt;3.20.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120925" version="1" comment="mozilla-nss-sysinit is &lt;3.20.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120926" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.20.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120927" version="1" comment="mozilla-nss-tools is &lt;3.20.2-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105813" version="1" comment="patch is &lt;2.7.3-7.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105801" version="1" comment="libvlc5 is &lt;2.1.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105802" version="1" comment="libvlccore7 is &lt;2.1.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105799" version="1" comment="live555 is &lt;2014.09.22-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105800" version="1" comment="live555-devel is &lt;2014.09.22-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105803" version="1" comment="vlc is &lt;2.1.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105804" version="1" comment="vlc-devel is &lt;2.1.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105805" version="1" comment="vlc-gnome is &lt;2.1.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105806" version="1" comment="vlc-noX is &lt;2.1.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105807" version="1" comment="vlc-noX-lang is &lt;2.1.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105808" version="1" comment="vlc-qt is &lt;2.1.5-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120964" version="1" comment="claws-mail is &lt;3.12.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120965" version="1" comment="claws-mail-devel is &lt;3.12.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120966" version="1" comment="claws-mail-lang is &lt;3.12.0-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122130" version="1" comment="apache2-mod_php5 is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122131" version="1" comment="php5 is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122132" version="1" comment="php5-bcmath is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122133" version="1" comment="php5-bz2 is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122134" version="1" comment="php5-calendar is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122135" version="1" comment="php5-ctype is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122136" version="1" comment="php5-curl is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122137" version="1" comment="php5-dba is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122138" version="1" comment="php5-devel is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122139" version="1" comment="php5-dom is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122140" version="1" comment="php5-enchant is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122141" version="1" comment="php5-exif is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122142" version="1" comment="php5-fastcgi is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122143" version="1" comment="php5-fileinfo is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122144" version="1" comment="php5-firebird is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122145" version="1" comment="php5-fpm is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122146" version="1" comment="php5-ftp is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122147" version="1" comment="php5-gd is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122148" version="1" comment="php5-gettext is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122149" version="1" comment="php5-gmp is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122150" version="1" comment="php5-iconv is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122151" version="1" comment="php5-imap is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122152" version="1" comment="php5-intl is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122153" version="1" comment="php5-json is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122154" version="1" comment="php5-ldap is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122155" version="1" comment="php5-mbstring is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122156" version="1" comment="php5-mcrypt is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122157" version="1" comment="php5-mssql is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122158" version="1" comment="php5-mysql is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122159" version="1" comment="php5-odbc is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122160" version="1" comment="php5-opcache is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122161" version="1" comment="php5-openssl is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122162" version="1" comment="php5-pcntl is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122163" version="1" comment="php5-pdo is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122164" version="1" comment="php5-pear is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122165" version="1" comment="php5-pgsql is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122166" version="1" comment="php5-phar is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122167" version="1" comment="php5-posix is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122168" version="1" comment="php5-pspell is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122169" version="1" comment="php5-readline is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122170" version="1" comment="php5-shmop is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122171" version="1" comment="php5-snmp is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122172" version="1" comment="php5-soap is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122173" version="1" comment="php5-sockets is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122174" version="1" comment="php5-sqlite is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122175" version="1" comment="php5-suhosin is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122176" version="1" comment="php5-sysvmsg is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122177" version="1" comment="php5-sysvsem is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122178" version="1" comment="php5-sysvshm is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122179" version="1" comment="php5-tidy is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122180" version="1" comment="php5-tokenizer is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122181" version="1" comment="php5-wddx is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122182" version="1" comment="php5-xmlreader is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122183" version="1" comment="php5-xmlrpc is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122184" version="1" comment="php5-xmlwriter is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122185" version="1" comment="php5-xsl is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122186" version="1" comment="php5-zip is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122187" version="1" comment="php5-zlib is &lt;5.6.1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133256" version="1" comment="typo3-cms-4_7 is &lt;4.7.20-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133257" version="1" comment="gd is &lt;2.1.0-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133258" version="1" comment="gd-devel is &lt;2.1.0-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133259" version="1" comment="libgd3 is &lt;2.1.0-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133260" version="1" comment="libgd3-32bit is &lt;2.1.0-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133261" version="1" comment="pdns is &lt;3.4.6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133262" version="1" comment="pdns-backend-ldap is &lt;3.4.6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133263" version="1" comment="pdns-backend-lua is &lt;3.4.6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133264" version="1" comment="pdns-backend-mydns is &lt;3.4.6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133265" version="1" comment="pdns-backend-mysql is &lt;3.4.6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133266" version="1" comment="pdns-backend-postgresql is &lt;3.4.6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133267" version="1" comment="pdns-backend-sqlite3 is &lt;3.4.6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133268" version="1" comment="apache2-mod_fcgid is &lt;2.3.9-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133269" version="1" comment="iperf is &lt;3.0.12-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133270" version="1" comment="iperf-devel is &lt;3.0.12-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133271" version="1" comment="libiperf0 is &lt;3.0.12-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133272" version="1" comment="bbswitch is &lt;0.8-3.20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133273" version="1" comment="bbswitch-kmp-default is &lt;0.8_k3.16.7_42-3.20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133274" version="1" comment="bbswitch-kmp-desktop is &lt;0.8_k3.16.7_42-3.20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133275" version="1" comment="bbswitch-kmp-pae is &lt;0.8_k3.16.7_42-3.20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133276" version="1" comment="bbswitch-kmp-xen is &lt;0.8_k3.16.7_42-3.20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133277" version="1" comment="cloop is &lt;2.639-14.20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133278" version="1" comment="cloop-kmp-default is &lt;2.639_k3.16.7_42-14.20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133279" version="1" comment="cloop-kmp-desktop is &lt;2.639_k3.16.7_42-14.20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133280" version="1" comment="cloop-kmp-pae is &lt;2.639_k3.16.7_42-14.20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133281" version="1" comment="cloop-kmp-xen is &lt;2.639_k3.16.7_42-14.20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133282" version="1" comment="crash is &lt;7.0.8-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133283" version="1" comment="crash-devel is &lt;7.0.8-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133284" version="1" comment="crash-doc is &lt;7.0.8-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133285" version="1" comment="crash-eppic is &lt;7.0.8-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133286" version="1" comment="crash-gcore is &lt;7.0.8-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133287" version="1" comment="crash-kmp-default is &lt;7.0.8_k3.16.7_42-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133288" version="1" comment="crash-kmp-desktop is &lt;7.0.8_k3.16.7_42-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133289" version="1" comment="crash-kmp-pae is &lt;7.0.8_k3.16.7_42-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133290" version="1" comment="crash-kmp-xen is &lt;7.0.8_k3.16.7_42-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133291" version="1" comment="hdjmod is &lt;1.28-18.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133292" version="1" comment="hdjmod-kmp-default is &lt;1.28_k3.16.7_42-18.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133293" version="1" comment="hdjmod-kmp-desktop is &lt;1.28_k3.16.7_42-18.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133294" version="1" comment="hdjmod-kmp-pae is &lt;1.28_k3.16.7_42-18.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133295" version="1" comment="hdjmod-kmp-xen is &lt;1.28_k3.16.7_42-18.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133296" version="1" comment="ipset is &lt;6.23-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133297" version="1" comment="ipset-devel is &lt;6.23-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133298" version="1" comment="ipset-kmp-default is &lt;6.23_k3.16.7_42-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133299" version="1" comment="ipset-kmp-desktop is &lt;6.23_k3.16.7_42-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133300" version="1" comment="ipset-kmp-pae is &lt;6.23_k3.16.7_42-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133301" version="1" comment="ipset-kmp-xen is &lt;6.23_k3.16.7_42-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133302" version="1" comment="kernel-debug is &lt;3.16.7-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133303" version="1" comment="kernel-debug-base is &lt;3.16.7-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133304" version="1" comment="kernel-debug-devel is &lt;3.16.7-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133305" version="1" comment="kernel-default is &lt;3.16.7-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133306" version="1" comment="kernel-default-base is &lt;3.16.7-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133307" version="1" comment="kernel-default-devel is &lt;3.16.7-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133308" version="1" comment="kernel-desktop is &lt;3.16.7-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133309" version="1" comment="kernel-desktop-base is &lt;3.16.7-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133310" version="1" comment="kernel-desktop-devel is &lt;3.16.7-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133311" version="1" comment="kernel-devel is &lt;3.16.7-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133312" version="1" comment="kernel-docs is &lt;3.16.7-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133313" version="1" comment="kernel-ec2 is &lt;3.16.7-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133314" version="1" comment="kernel-ec2-base is &lt;3.16.7-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133315" version="1" comment="kernel-ec2-devel is &lt;3.16.7-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133316" version="1" comment="kernel-macros is &lt;3.16.7-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133317" version="1" comment="kernel-obs-build is &lt;3.16.7-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133318" version="1" comment="kernel-obs-qa is &lt;3.16.7-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133319" version="1" comment="kernel-obs-qa-xen is &lt;3.16.7-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133320" version="1" comment="kernel-pae is &lt;3.16.7-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133321" version="1" comment="kernel-pae-base is &lt;3.16.7-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133322" version="1" comment="kernel-pae-devel is &lt;3.16.7-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133323" version="1" comment="kernel-source is &lt;3.16.7-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133324" version="1" comment="kernel-source-vanilla is &lt;3.16.7-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133325" version="1" comment="kernel-syms is &lt;3.16.7-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133326" version="1" comment="kernel-vanilla is &lt;3.16.7-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133327" version="1" comment="kernel-vanilla-devel is &lt;3.16.7-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133328" version="1" comment="kernel-xen is &lt;3.16.7-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133329" version="1" comment="kernel-xen-base is &lt;3.16.7-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133330" version="1" comment="kernel-xen-devel is &lt;3.16.7-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133331" version="1" comment="libipset3 is &lt;6.23-20.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133332" version="1" comment="pcfclock is &lt;0.44-260.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133333" version="1" comment="pcfclock-kmp-default is &lt;0.44_k3.16.7_42-260.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133334" version="1" comment="pcfclock-kmp-desktop is &lt;0.44_k3.16.7_42-260.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133335" version="1" comment="pcfclock-kmp-pae is &lt;0.44_k3.16.7_42-260.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133336" version="1" comment="python-virtualbox is &lt;5.0.20-48.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133337" version="1" comment="vhba-kmp is &lt;20140629-2.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133338" version="1" comment="vhba-kmp-default is &lt;20140629_k3.16.7_42-2.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133339" version="1" comment="vhba-kmp-desktop is &lt;20140629_k3.16.7_42-2.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133340" version="1" comment="vhba-kmp-pae is &lt;20140629_k3.16.7_42-2.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133341" version="1" comment="vhba-kmp-xen is &lt;20140629_k3.16.7_42-2.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133342" version="1" comment="virtualbox is &lt;5.0.20-48.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133343" version="1" comment="virtualbox-devel is &lt;5.0.20-48.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133344" version="1" comment="virtualbox-guest-desktop-icons is &lt;5.0.20-48.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133345" version="1" comment="virtualbox-guest-kmp-default is &lt;5.0.20_k3.16.7_42-48.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133346" version="1" comment="virtualbox-guest-kmp-desktop is &lt;5.0.20_k3.16.7_42-48.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133347" version="1" comment="virtualbox-guest-kmp-pae is &lt;5.0.20_k3.16.7_42-48.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133348" version="1" comment="virtualbox-guest-tools is &lt;5.0.20-48.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133349" version="1" comment="virtualbox-guest-x11 is &lt;5.0.20-48.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133350" version="1" comment="virtualbox-host-kmp-default is &lt;5.0.20_k3.16.7_42-48.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133351" version="1" comment="virtualbox-host-kmp-desktop is &lt;5.0.20_k3.16.7_42-48.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133352" version="1" comment="virtualbox-host-kmp-pae is &lt;5.0.20_k3.16.7_42-48.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133353" version="1" comment="virtualbox-host-source is &lt;5.0.20-48.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133354" version="1" comment="virtualbox-qt is &lt;5.0.20-48.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133355" version="1" comment="virtualbox-websrv is &lt;5.0.20-48.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133356" version="1" comment="xen is &lt;4.4.4_02-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133357" version="1" comment="xen-devel is &lt;4.4.4_02-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133358" version="1" comment="xen-doc-html is &lt;4.4.4_02-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133359" version="1" comment="xen-kmp-default is &lt;4.4.4_02_k3.16.7_42-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133360" version="1" comment="xen-kmp-desktop is &lt;4.4.4_02_k3.16.7_42-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133361" version="1" comment="xen-libs is &lt;4.4.4_02-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133362" version="1" comment="xen-libs-32bit is &lt;4.4.4_02-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133363" version="1" comment="xen-tools is &lt;4.4.4_02-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133364" version="1" comment="xen-tools-domU is &lt;4.4.4_02-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133365" version="1" comment="xtables-addons is &lt;2.6-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133366" version="1" comment="xtables-addons-kmp-default is &lt;2.6_k3.16.7_42-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133367" version="1" comment="xtables-addons-kmp-desktop is &lt;2.6_k3.16.7_42-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133368" version="1" comment="xtables-addons-kmp-pae is &lt;2.6_k3.16.7_42-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133369" version="1" comment="xtables-addons-kmp-xen is &lt;2.6_k3.16.7_42-22.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133370" version="1" comment="phpMyAdmin is &lt;4.4.15.8-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133371" version="1" comment="typo3-cms-4_5 is &lt;4.5.40-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133372" version="1" comment="MozillaFirefox is &lt;48.0.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133373" version="1" comment="MozillaFirefox-branding-upstream is &lt;48.0.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133374" version="1" comment="MozillaFirefox-buildsymbols is &lt;48.0.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133375" version="1" comment="MozillaFirefox-devel is &lt;48.0.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133376" version="1" comment="MozillaFirefox-translations-common is &lt;48.0.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133377" version="1" comment="MozillaFirefox-translations-other is &lt;48.0.1-30.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133378" version="1" comment="libfreebl3 is &lt;3.24-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133379" version="1" comment="libfreebl3-32bit is &lt;3.24-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133380" version="1" comment="libsoftokn3 is &lt;3.24-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133381" version="1" comment="libsoftokn3-32bit is &lt;3.24-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133382" version="1" comment="mozilla-nss is &lt;3.24-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133383" version="1" comment="mozilla-nss-32bit is &lt;3.24-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133384" version="1" comment="mozilla-nss-certs is &lt;3.24-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133385" version="1" comment="mozilla-nss-certs-32bit is &lt;3.24-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133386" version="1" comment="mozilla-nss-devel is &lt;3.24-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133387" version="1" comment="mozilla-nss-sysinit is &lt;3.24-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133388" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.24-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133389" version="1" comment="mozilla-nss-tools is &lt;3.24-26.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133390" version="1" comment="gd is &lt;2.1.0-7.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133391" version="1" comment="gd-devel is &lt;2.1.0-7.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133392" version="1" comment="libgd3 is &lt;2.1.0-7.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133393" version="1" comment="libgd3-32bit is &lt;2.1.0-7.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133394" version="1" comment="libgcrypt is &lt;1.6.1-8.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133395" version="1" comment="libgcrypt-cavs is &lt;1.6.1-8.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133396" version="1" comment="libgcrypt-devel is &lt;1.6.1-8.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133397" version="1" comment="libgcrypt-devel-32bit is &lt;1.6.1-8.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133398" version="1" comment="libgcrypt20 is &lt;1.6.1-8.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133399" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-8.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133400" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-8.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133401" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-8.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133402" version="1" comment="curl is &lt;7.42.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133403" version="1" comment="libcurl-devel is &lt;7.42.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133404" version="1" comment="libcurl-devel-32bit is &lt;7.42.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133405" version="1" comment="libcurl4 is &lt;7.42.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133406" version="1" comment="libcurl4-32bit is &lt;7.42.1-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122288" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.72-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122289" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.72-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122290" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.72-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122291" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.72-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122292" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.72-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122293" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.72-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122294" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.72-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133407" version="1" comment="eog is &lt;3.16.5-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133408" version="1" comment="eog-devel is &lt;3.16.5-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133409" version="1" comment="eog-lang is &lt;3.16.5-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133410" version="1" comment="MozillaThunderbird is &lt;45.3.0-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133411" version="1" comment="MozillaThunderbird-buildsymbols is &lt;45.3.0-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133412" version="1" comment="MozillaThunderbird-devel is &lt;45.3.0-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133413" version="1" comment="MozillaThunderbird-translations-common is &lt;45.3.0-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133414" version="1" comment="MozillaThunderbird-translations-other is &lt;45.3.0-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133415" version="1" comment="libtiff-devel is &lt;4.0.6-10.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133416" version="1" comment="libtiff-devel-32bit is &lt;4.0.6-10.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133417" version="1" comment="libtiff5 is &lt;4.0.6-10.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133418" version="1" comment="libtiff5-32bit is &lt;4.0.6-10.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133419" version="1" comment="tiff is &lt;4.0.6-10.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122295" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.95-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122296" version="1" comment="java-1_7_0-openjdk-accessibility is &lt;1.7.0.95-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122297" version="1" comment="java-1_7_0-openjdk-bootstrap is &lt;1.7.0.95-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122298" version="1" comment="java-1_7_0-openjdk-bootstrap-devel is &lt;1.7.0.95-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122299" version="1" comment="java-1_7_0-openjdk-bootstrap-headless is &lt;1.7.0.95-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122300" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.95-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122301" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.95-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122302" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.95-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122303" version="1" comment="java-1_7_0-openjdk-javadoc is &lt;1.7.0.95-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122304" version="1" comment="java-1_7_0-openjdk-src is &lt;1.7.0.95-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133420" version="1" comment="gdk-pixbuf is &lt;2.32.3-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133421" version="1" comment="gdk-pixbuf-devel is &lt;2.32.3-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133422" version="1" comment="gdk-pixbuf-devel-32bit is &lt;2.32.3-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133423" version="1" comment="gdk-pixbuf-lang is &lt;2.32.3-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133424" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.32.3-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133425" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.32.3-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133426" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.32.3-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133427" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.32.3-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133428" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.32.3-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133429" version="1" comment="wget is &lt;1.16-4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133430" version="1" comment="chromedriver is &lt;53.0.2785.101-120.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133431" version="1" comment="chromium is &lt;53.0.2785.101-120.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133432" version="1" comment="chromium-desktop-gnome is &lt;53.0.2785.101-120.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133433" version="1" comment="chromium-desktop-kde is &lt;53.0.2785.101-120.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133434" version="1" comment="chromium-ffmpegsumo is &lt;53.0.2785.101-120.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133435" version="1" comment="rpmlint is &lt;1.5-39.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133436" version="1" comment="rpmlint-mini is &lt;1.5-8.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133437" version="1" comment="flash-player is &lt;11.2.202.635-2.108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133438" version="1" comment="flash-player-gnome is &lt;11.2.202.635-2.108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133439" version="1" comment="flash-player-kde4 is &lt;11.2.202.635-2.108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133440" version="1" comment="chromedriver is &lt;53.0.2785.113-123.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133441" version="1" comment="chromium is &lt;53.0.2785.113-123.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133442" version="1" comment="chromium-desktop-gnome is &lt;53.0.2785.113-123.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133443" version="1" comment="chromium-desktop-kde is &lt;53.0.2785.113-123.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133444" version="1" comment="chromium-ffmpegsumo is &lt;53.0.2785.113-123.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133445" version="1" comment="python-virtualbox is &lt;5.0.26-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133446" version="1" comment="virtualbox is &lt;5.0.26-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133447" version="1" comment="virtualbox-devel is &lt;5.0.26-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133448" version="1" comment="virtualbox-guest-desktop-icons is &lt;5.0.26-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133449" version="1" comment="virtualbox-guest-kmp-default is &lt;5.0.26_k3.16.7_42-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133450" version="1" comment="virtualbox-guest-kmp-desktop is &lt;5.0.26_k3.16.7_42-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133451" version="1" comment="virtualbox-guest-kmp-pae is &lt;5.0.26_k3.16.7_42-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133452" version="1" comment="virtualbox-guest-tools is &lt;5.0.26-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133453" version="1" comment="virtualbox-guest-x11 is &lt;5.0.26-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133454" version="1" comment="virtualbox-host-kmp-default is &lt;5.0.26_k3.16.7_42-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133455" version="1" comment="virtualbox-host-kmp-desktop is &lt;5.0.26_k3.16.7_42-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133456" version="1" comment="virtualbox-host-kmp-pae is &lt;5.0.26_k3.16.7_42-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133457" version="1" comment="virtualbox-host-source is &lt;5.0.26-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133458" version="1" comment="virtualbox-qt is &lt;5.0.26-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133459" version="1" comment="virtualbox-websrv is &lt;5.0.26-51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133460" version="1" comment="apache2-mod_php5 is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133461" version="1" comment="php5 is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133462" version="1" comment="php5-bcmath is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133463" version="1" comment="php5-bz2 is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133464" version="1" comment="php5-calendar is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133465" version="1" comment="php5-ctype is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133466" version="1" comment="php5-curl is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133467" version="1" comment="php5-dba is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133468" version="1" comment="php5-devel is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133469" version="1" comment="php5-dom is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133470" version="1" comment="php5-enchant is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133471" version="1" comment="php5-exif is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133472" version="1" comment="php5-fastcgi is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133473" version="1" comment="php5-fileinfo is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133474" version="1" comment="php5-firebird is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133475" version="1" comment="php5-fpm is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133476" version="1" comment="php5-ftp is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133477" version="1" comment="php5-gd is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133478" version="1" comment="php5-gettext is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133479" version="1" comment="php5-gmp is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133480" version="1" comment="php5-iconv is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133481" version="1" comment="php5-imap is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133482" version="1" comment="php5-intl is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133483" version="1" comment="php5-json is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133484" version="1" comment="php5-ldap is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133485" version="1" comment="php5-mbstring is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133486" version="1" comment="php5-mcrypt is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133487" version="1" comment="php5-mssql is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133488" version="1" comment="php5-mysql is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133489" version="1" comment="php5-odbc is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133490" version="1" comment="php5-opcache is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133491" version="1" comment="php5-openssl is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133492" version="1" comment="php5-pcntl is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133493" version="1" comment="php5-pdo is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133494" version="1" comment="php5-pear is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133495" version="1" comment="php5-pgsql is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133496" version="1" comment="php5-phar is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133497" version="1" comment="php5-posix is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133498" version="1" comment="php5-pspell is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133499" version="1" comment="php5-readline is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133500" version="1" comment="php5-shmop is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133501" version="1" comment="php5-snmp is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133502" version="1" comment="php5-soap is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133503" version="1" comment="php5-sockets is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133504" version="1" comment="php5-sqlite is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133505" version="1" comment="php5-suhosin is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133506" version="1" comment="php5-sysvmsg is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133507" version="1" comment="php5-sysvsem is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133508" version="1" comment="php5-sysvshm is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133509" version="1" comment="php5-tidy is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133510" version="1" comment="php5-tokenizer is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133511" version="1" comment="php5-wddx is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133512" version="1" comment="php5-xmlreader is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133513" version="1" comment="php5-xmlrpc is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133514" version="1" comment="php5-xmlwriter is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133515" version="1" comment="php5-xsl is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133516" version="1" comment="php5-zip is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133517" version="1" comment="php5-zlib is &lt;5.6.1-75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133518" version="1" comment="file-roller is &lt;3.16.5-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133519" version="1" comment="file-roller-lang is &lt;3.16.5-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133520" version="1" comment="nautilus-file-roller is &lt;3.16.5-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133521" version="1" comment="pdns is &lt;3.4.6-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133522" version="1" comment="pdns-backend-ldap is &lt;3.4.6-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133523" version="1" comment="pdns-backend-lua is &lt;3.4.6-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133524" version="1" comment="pdns-backend-mydns is &lt;3.4.6-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133525" version="1" comment="pdns-backend-mysql is &lt;3.4.6-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133526" version="1" comment="pdns-backend-postgresql is &lt;3.4.6-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133527" version="1" comment="pdns-backend-sqlite3 is &lt;3.4.6-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133528" version="1" comment="gtk2 is &lt;2.24.31-4.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133529" version="1" comment="gtk2-branding-SLED is &lt;13.2-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133530" version="1" comment="gtk2-branding-openSUSE is &lt;13.2-14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133531" version="1" comment="gtk2-branding-upstream is &lt;2.24.31-4.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133532" version="1" comment="gtk2-data is &lt;2.24.31-4.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133533" version="1" comment="gtk2-devel is &lt;2.24.31-4.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133534" version="1" comment="gtk2-devel-32bit is &lt;2.24.31-4.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133535" version="1" comment="gtk2-engine-clearlooks is &lt;2.20.2-18.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133536" version="1" comment="gtk2-engine-clearlooks-32bit is &lt;2.20.2-18.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133537" version="1" comment="gtk2-engine-crux is &lt;2.20.2-18.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133538" version="1" comment="gtk2-engine-crux-32bit is &lt;2.20.2-18.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133539" version="1" comment="gtk2-engine-glide is &lt;2.20.2-18.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133540" version="1" comment="gtk2-engine-glide-32bit is &lt;2.20.2-18.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133541" version="1" comment="gtk2-engine-hcengine is &lt;2.20.2-18.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133542" version="1" comment="gtk2-engine-industrial is &lt;2.20.2-18.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133543" version="1" comment="gtk2-engine-industrial-32bit is &lt;2.20.2-18.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133544" version="1" comment="gtk2-engine-mist is &lt;2.20.2-18.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133545" version="1" comment="gtk2-engine-mist-32bit is &lt;2.20.2-18.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133546" version="1" comment="gtk2-engine-redmond95 is &lt;2.20.2-18.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133547" version="1" comment="gtk2-engine-redmond95-32bit is &lt;2.20.2-18.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133548" version="1" comment="gtk2-engine-thinice is &lt;2.20.2-18.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133549" version="1" comment="gtk2-engine-thinice-32bit is &lt;2.20.2-18.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133550" version="1" comment="gtk2-engines is &lt;2.20.2-18.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133551" version="1" comment="gtk2-engines-devel is &lt;2.20.2-18.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133552" version="1" comment="gtk2-immodule-amharic is &lt;2.24.31-4.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133553" version="1" comment="gtk2-immodule-amharic-32bit is &lt;2.24.31-4.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133554" version="1" comment="gtk2-immodule-inuktitut is &lt;2.24.31-4.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133555" version="1" comment="gtk2-immodule-inuktitut-32bit is &lt;2.24.31-4.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133556" version="1" comment="gtk2-immodule-multipress is &lt;2.24.31-4.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133557" version="1" comment="gtk2-immodule-multipress-32bit is &lt;2.24.31-4.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133558" version="1" comment="gtk2-immodule-thai is &lt;2.24.31-4.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133559" version="1" comment="gtk2-immodule-thai-32bit is &lt;2.24.31-4.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133560" version="1" comment="gtk2-immodule-vietnamese is &lt;2.24.31-4.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133561" version="1" comment="gtk2-immodule-vietnamese-32bit is &lt;2.24.31-4.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133562" version="1" comment="gtk2-immodule-xim is &lt;2.24.31-4.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133563" version="1" comment="gtk2-immodule-xim-32bit is &lt;2.24.31-4.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133564" version="1" comment="gtk2-immodules-tigrigna is &lt;2.24.31-4.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133565" version="1" comment="gtk2-immodules-tigrigna-32bit is &lt;2.24.31-4.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133566" version="1" comment="gtk2-lang is &lt;2.24.31-4.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133567" version="1" comment="gtk2-theme-clearlooks is &lt;2.20.2-18.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133568" version="1" comment="gtk2-theme-crux is &lt;2.20.2-18.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133569" version="1" comment="gtk2-theme-industrial is &lt;2.20.2-18.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133570" version="1" comment="gtk2-theme-mist is &lt;2.20.2-18.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133571" version="1" comment="gtk2-theme-redmond95 is &lt;2.20.2-18.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133572" version="1" comment="gtk2-theme-thinice is &lt;2.20.2-18.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133573" version="1" comment="gtk2-tools is &lt;2.24.31-4.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133574" version="1" comment="gtk2-tools-32bit is &lt;2.24.31-4.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133575" version="1" comment="libgtk-2_0-0 is &lt;2.24.31-4.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133576" version="1" comment="libgtk-2_0-0-32bit is &lt;2.24.31-4.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133577" version="1" comment="typelib-1_0-Gtk-2_0 is &lt;2.24.31-4.17.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133578" version="1" comment="MozillaFirefox is &lt;49.0-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133579" version="1" comment="MozillaFirefox-branding-upstream is &lt;49.0-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133580" version="1" comment="MozillaFirefox-buildsymbols is &lt;49.0-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133581" version="1" comment="MozillaFirefox-devel is &lt;49.0-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133582" version="1" comment="MozillaFirefox-translations-common is &lt;49.0-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133583" version="1" comment="MozillaFirefox-translations-other is &lt;49.0-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133584" version="1" comment="libfreebl3 is &lt;3.25-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133585" version="1" comment="libfreebl3-32bit is &lt;3.25-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133586" version="1" comment="libsoftokn3 is &lt;3.25-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133587" version="1" comment="libsoftokn3-32bit is &lt;3.25-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133588" version="1" comment="mozilla-nss is &lt;3.25-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133589" version="1" comment="mozilla-nss-32bit is &lt;3.25-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133590" version="1" comment="mozilla-nss-certs is &lt;3.25-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133591" version="1" comment="mozilla-nss-certs-32bit is &lt;3.25-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133592" version="1" comment="mozilla-nss-devel is &lt;3.25-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133593" version="1" comment="mozilla-nss-sysinit is &lt;3.25-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133594" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.25-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133595" version="1" comment="mozilla-nss-tools is &lt;3.25-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133596" version="1" comment="libopenssl-devel is &lt;1.0.1k-2.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133597" version="1" comment="libopenssl-devel-32bit is &lt;1.0.1k-2.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133598" version="1" comment="libopenssl1_0_0 is &lt;1.0.1k-2.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133599" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1k-2.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133600" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1k-2.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133601" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1k-2.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133602" version="1" comment="openssl is &lt;1.0.1k-2.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133603" version="1" comment="openssl-doc is &lt;1.0.1k-2.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133604" version="1" comment="freerdp is &lt;1.0.2-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133605" version="1" comment="freerdp-devel is &lt;1.0.2-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133606" version="1" comment="libfreerdp-1_0 is &lt;1.0.2-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133607" version="1" comment="libfreerdp-1_0-plugins is &lt;1.0.2-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133608" version="1" comment="bind is &lt;9.9.9P1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133609" version="1" comment="bind-chrootenv is &lt;9.9.9P1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133610" version="1" comment="bind-devel is &lt;9.9.9P1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133611" version="1" comment="bind-doc is &lt;9.9.9P1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133612" version="1" comment="bind-libs is &lt;9.9.9P1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133613" version="1" comment="bind-libs-32bit is &lt;9.9.9P1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133614" version="1" comment="bind-lwresd is &lt;9.9.9P1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133615" version="1" comment="bind-utils is &lt;9.9.9P1-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133616" version="1" comment="libecpg6 is &lt;9.3.14-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133617" version="1" comment="libecpg6-32bit is &lt;9.3.14-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133618" version="1" comment="libpq5 is &lt;9.3.14-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133619" version="1" comment="libpq5-32bit is &lt;9.3.14-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133620" version="1" comment="postgresql93 is &lt;9.3.14-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133621" version="1" comment="postgresql93-contrib is &lt;9.3.14-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133622" version="1" comment="postgresql93-devel is &lt;9.3.14-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133623" version="1" comment="postgresql93-docs is &lt;9.3.14-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133624" version="1" comment="postgresql93-libs is &lt;9.3.14-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133625" version="1" comment="postgresql93-plperl is &lt;9.3.14-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133626" version="1" comment="postgresql93-plpython is &lt;9.3.14-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133627" version="1" comment="postgresql93-pltcl is &lt;9.3.14-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133628" version="1" comment="postgresql93-server is &lt;9.3.14-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133629" version="1" comment="postgresql93-test is &lt;9.3.14-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133630" version="1" comment="chromedriver is &lt;53.0.2785.143-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133631" version="1" comment="chromium is &lt;53.0.2785.143-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133632" version="1" comment="chromium-desktop-gnome is &lt;53.0.2785.143-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133633" version="1" comment="chromium-desktop-kde is &lt;53.0.2785.143-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133634" version="1" comment="chromium-ffmpegsumo is &lt;53.0.2785.143-79.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133635" version="1" comment="glibc is &lt;2.19-16.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133636" version="1" comment="glibc-32bit is &lt;2.19-16.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133637" version="1" comment="glibc-devel is &lt;2.19-16.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133638" version="1" comment="glibc-devel-32bit is &lt;2.19-16.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133639" version="1" comment="glibc-devel-static is &lt;2.19-16.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133640" version="1" comment="glibc-devel-static-32bit is &lt;2.19-16.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133641" version="1" comment="glibc-extra is &lt;2.19-16.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133642" version="1" comment="glibc-html is &lt;2.19-16.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133643" version="1" comment="glibc-i18ndata is &lt;2.19-16.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133644" version="1" comment="glibc-info is &lt;2.19-16.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133645" version="1" comment="glibc-locale is &lt;2.19-16.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133646" version="1" comment="glibc-locale-32bit is &lt;2.19-16.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133647" version="1" comment="glibc-obsolete is &lt;2.19-16.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133648" version="1" comment="glibc-profile is &lt;2.19-16.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133649" version="1" comment="glibc-profile-32bit is &lt;2.19-16.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133650" version="1" comment="glibc-testsuite is &lt;2.19-16.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133651" version="1" comment="glibc-utils is &lt;2.19-16.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133652" version="1" comment="glibc-utils-32bit is &lt;2.19-16.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133653" version="1" comment="nscd is &lt;2.19-16.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133654" version="1" comment="apache2-mod_php5 is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133655" version="1" comment="php5 is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133656" version="1" comment="php5-bcmath is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133657" version="1" comment="php5-bz2 is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133658" version="1" comment="php5-calendar is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133659" version="1" comment="php5-ctype is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133660" version="1" comment="php5-curl is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133661" version="1" comment="php5-dba is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133662" version="1" comment="php5-devel is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133663" version="1" comment="php5-dom is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133664" version="1" comment="php5-enchant is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133665" version="1" comment="php5-exif is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133666" version="1" comment="php5-fastcgi is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133667" version="1" comment="php5-fileinfo is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133668" version="1" comment="php5-firebird is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133669" version="1" comment="php5-fpm is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133670" version="1" comment="php5-ftp is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133671" version="1" comment="php5-gd is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133672" version="1" comment="php5-gettext is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133673" version="1" comment="php5-gmp is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133674" version="1" comment="php5-iconv is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133675" version="1" comment="php5-imap is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133676" version="1" comment="php5-intl is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133677" version="1" comment="php5-json is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133678" version="1" comment="php5-ldap is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133679" version="1" comment="php5-mbstring is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133680" version="1" comment="php5-mcrypt is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133681" version="1" comment="php5-mssql is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133682" version="1" comment="php5-mysql is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133683" version="1" comment="php5-odbc is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133684" version="1" comment="php5-opcache is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133685" version="1" comment="php5-openssl is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133686" version="1" comment="php5-pcntl is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133687" version="1" comment="php5-pdo is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133688" version="1" comment="php5-pear is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133689" version="1" comment="php5-pgsql is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133690" version="1" comment="php5-phar is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133691" version="1" comment="php5-posix is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133692" version="1" comment="php5-pspell is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133693" version="1" comment="php5-readline is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133694" version="1" comment="php5-shmop is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133695" version="1" comment="php5-snmp is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133696" version="1" comment="php5-soap is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133697" version="1" comment="php5-sockets is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133698" version="1" comment="php5-sqlite is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133699" version="1" comment="php5-suhosin is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133700" version="1" comment="php5-sysvmsg is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133701" version="1" comment="php5-sysvsem is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133702" version="1" comment="php5-sysvshm is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133703" version="1" comment="php5-tidy is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133704" version="1" comment="php5-tokenizer is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133705" version="1" comment="php5-wddx is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133706" version="1" comment="php5-xmlreader is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133707" version="1" comment="php5-xmlrpc is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133708" version="1" comment="php5-xmlwriter is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133709" version="1" comment="php5-xsl is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133710" version="1" comment="php5-zip is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133711" version="1" comment="php5-zlib is &lt;5.6.1-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133712" version="1" comment="python-Jinja2 is &lt;2.8-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133713" version="1" comment="python-Jinja2-emacs is &lt;2.8-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133714" version="1" comment="python-Jinja2-vim is &lt;2.8-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133715" version="1" comment="MozillaThunderbird is &lt;45.4.0-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133716" version="1" comment="MozillaThunderbird-buildsymbols is &lt;45.4.0-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133717" version="1" comment="MozillaThunderbird-devel is &lt;45.4.0-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133718" version="1" comment="MozillaThunderbird-translations-common is &lt;45.4.0-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133719" version="1" comment="MozillaThunderbird-translations-other is &lt;45.4.0-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133720" version="1" comment="xen is &lt;4.4.4_05-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133721" version="1" comment="xen-devel is &lt;4.4.4_05-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133722" version="1" comment="xen-doc-html is &lt;4.4.4_05-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133723" version="1" comment="xen-kmp-default is &lt;4.4.4_05_k3.16.7_42-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133724" version="1" comment="xen-kmp-desktop is &lt;4.4.4_05_k3.16.7_42-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133725" version="1" comment="xen-libs is &lt;4.4.4_05-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133726" version="1" comment="xen-libs-32bit is &lt;4.4.4_05-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133727" version="1" comment="xen-tools is &lt;4.4.4_05-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133728" version="1" comment="xen-tools-domU is &lt;4.4.4_05-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133729" version="1" comment="kde-cli-tools5 is &lt;5.5.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133730" version="1" comment="kde-cli-tools5-lang is &lt;5.5.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133731" version="1" comment="nodejs is &lt;4.6.0-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133732" version="1" comment="nodejs-devel is &lt;4.6.0-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133733" version="1" comment="nodejs-doc is &lt;4.6.0-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133734" version="1" comment="nodejs-docs is &lt;4.6.0-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133735" version="1" comment="npm is &lt;4.6.0-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133736" version="1" comment="flash-player is &lt;11.2.202.637-2.112.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133737" version="1" comment="flash-player-gnome is &lt;11.2.202.637-2.112.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133738" version="1" comment="flash-player-kde4 is &lt;11.2.202.637-2.112.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133739" version="1" comment="libgudev-1_0-0 is &lt;210.1475218254.1e76ce0-25.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133740" version="1" comment="libgudev-1_0-0-32bit is &lt;210.1475218254.1e76ce0-25.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133741" version="1" comment="libgudev-1_0-devel is &lt;210.1475218254.1e76ce0-25.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133742" version="1" comment="libudev-devel is &lt;210.1475218254.1e76ce0-25.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133743" version="1" comment="libudev-mini-devel is &lt;210.1475218254.1e76ce0-25.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133744" version="1" comment="libudev-mini1 is &lt;210.1475218254.1e76ce0-25.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133745" version="1" comment="libudev1 is &lt;210.1475218254.1e76ce0-25.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133746" version="1" comment="libudev1-32bit is &lt;210.1475218254.1e76ce0-25.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133747" version="1" comment="nss-myhostname is &lt;210.1475218254.1e76ce0-25.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133748" version="1" comment="nss-myhostname-32bit is &lt;210.1475218254.1e76ce0-25.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133749" version="1" comment="systemd is &lt;210.1475218254.1e76ce0-25.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133750" version="1" comment="systemd-32bit is &lt;210.1475218254.1e76ce0-25.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133751" version="1" comment="systemd-bash-completion is &lt;210.1475218254.1e76ce0-25.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133752" version="1" comment="systemd-devel is &lt;210.1475218254.1e76ce0-25.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133753" version="1" comment="systemd-journal-gateway is &lt;210.1475218254.1e76ce0-25.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133754" version="1" comment="systemd-logger is &lt;210.1475218254.1e76ce0-25.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133755" version="1" comment="systemd-mini is &lt;210.1475218254.1e76ce0-25.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133756" version="1" comment="systemd-mini-devel is &lt;210.1475218254.1e76ce0-25.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133757" version="1" comment="systemd-mini-sysvinit is &lt;210.1475218254.1e76ce0-25.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133758" version="1" comment="systemd-sysvinit is &lt;210.1475218254.1e76ce0-25.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133759" version="1" comment="typelib-1_0-GUdev-1_0 is &lt;210.1475218254.1e76ce0-25.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133760" version="1" comment="udev is &lt;210.1475218254.1e76ce0-25.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133761" version="1" comment="udev-mini is &lt;210.1475218254.1e76ce0-25.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133762" version="1" comment="libtiff-devel is &lt;4.0.6-10.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133763" version="1" comment="libtiff-devel-32bit is &lt;4.0.6-10.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133764" version="1" comment="libtiff5 is &lt;4.0.6-10.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133765" version="1" comment="libtiff5-32bit is &lt;4.0.6-10.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133766" version="1" comment="tiff is &lt;4.0.6-10.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133767" version="1" comment="unzip is &lt;6.00-26.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133768" version="1" comment="unzip-doc is &lt;6.00-26.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133769" version="1" comment="unzip-rcc is &lt;6.00-26.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133770" version="1" comment="derby is &lt;10.10.2.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133771" version="1" comment="derby-javadoc is &lt;10.10.2.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121171" version="1" comment="wireshark is &lt;1.12.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121172" version="1" comment="wireshark-devel is &lt;1.12.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121173" version="1" comment="wireshark-ui-gtk is &lt;1.12.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121174" version="1" comment="wireshark-ui-qt is &lt;1.12.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133772" version="1" comment="kcoreaddons is &lt;5.21.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133773" version="1" comment="kcoreaddons-devel is &lt;5.21.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133774" version="1" comment="kcoreaddons-devel-32bit is &lt;5.21.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133775" version="1" comment="kcoreaddons-lang is &lt;5.21.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133776" version="1" comment="libKF5CoreAddons5 is &lt;5.21.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133777" version="1" comment="libKF5CoreAddons5-32bit is &lt;5.21.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133778" version="1" comment="dbus-1 is &lt;1.8.22-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133779" version="1" comment="dbus-1-devel is &lt;1.8.22-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133780" version="1" comment="dbus-1-devel-32bit is &lt;1.8.22-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133781" version="1" comment="dbus-1-devel-doc is &lt;1.8.22-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133782" version="1" comment="dbus-1-x11 is &lt;1.8.22-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133783" version="1" comment="libdbus-1-3 is &lt;1.8.22-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133784" version="1" comment="libdbus-1-3-32bit is &lt;1.8.22-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133785" version="1" comment="tor is &lt;0.2.7.6-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133786" version="1" comment="gd is &lt;2.1.0-7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133787" version="1" comment="gd-devel is &lt;2.1.0-7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133788" version="1" comment="libgd3 is &lt;2.1.0-7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133789" version="1" comment="libgd3-32bit is &lt;2.1.0-7.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133790" version="1" comment="apache2-mod_php5 is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133791" version="1" comment="php5 is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133792" version="1" comment="php5-bcmath is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133793" version="1" comment="php5-bz2 is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133794" version="1" comment="php5-calendar is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133795" version="1" comment="php5-ctype is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133796" version="1" comment="php5-curl is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133797" version="1" comment="php5-dba is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133798" version="1" comment="php5-devel is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133799" version="1" comment="php5-dom is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133800" version="1" comment="php5-enchant is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133801" version="1" comment="php5-exif is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133802" version="1" comment="php5-fastcgi is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133803" version="1" comment="php5-fileinfo is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133804" version="1" comment="php5-firebird is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133805" version="1" comment="php5-fpm is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133806" version="1" comment="php5-ftp is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133807" version="1" comment="php5-gd is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133808" version="1" comment="php5-gettext is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133809" version="1" comment="php5-gmp is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133810" version="1" comment="php5-iconv is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133811" version="1" comment="php5-imap is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133812" version="1" comment="php5-intl is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133813" version="1" comment="php5-json is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133814" version="1" comment="php5-ldap is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133815" version="1" comment="php5-mbstring is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133816" version="1" comment="php5-mcrypt is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133817" version="1" comment="php5-mssql is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133818" version="1" comment="php5-mysql is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133819" version="1" comment="php5-odbc is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133820" version="1" comment="php5-opcache is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133821" version="1" comment="php5-openssl is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133822" version="1" comment="php5-pcntl is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133823" version="1" comment="php5-pdo is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133824" version="1" comment="php5-pear is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133825" version="1" comment="php5-pgsql is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133826" version="1" comment="php5-phar is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133827" version="1" comment="php5-posix is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133828" version="1" comment="php5-pspell is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133829" version="1" comment="php5-readline is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133830" version="1" comment="php5-shmop is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133831" version="1" comment="php5-snmp is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133832" version="1" comment="php5-soap is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133833" version="1" comment="php5-sockets is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133834" version="1" comment="php5-sqlite is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133835" version="1" comment="php5-suhosin is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133836" version="1" comment="php5-sysvmsg is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133837" version="1" comment="php5-sysvsem is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133838" version="1" comment="php5-sysvshm is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133839" version="1" comment="php5-tidy is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133840" version="1" comment="php5-tokenizer is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133841" version="1" comment="php5-wddx is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133842" version="1" comment="php5-xmlreader is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133843" version="1" comment="php5-xmlrpc is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133844" version="1" comment="php5-xmlwriter is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133845" version="1" comment="php5-xsl is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133846" version="1" comment="php5-zip is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133847" version="1" comment="php5-zlib is &lt;5.6.1-83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133848" version="1" comment="quagga is &lt;0.99.23-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133849" version="1" comment="quagga-devel is &lt;0.99.23-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133850" version="1" comment="python-virtualbox is &lt;5.0.28-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133851" version="1" comment="virtualbox is &lt;5.0.28-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133852" version="1" comment="virtualbox-devel is &lt;5.0.28-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133853" version="1" comment="virtualbox-guest-desktop-icons is &lt;5.0.28-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133854" version="1" comment="virtualbox-guest-kmp-default is &lt;5.0.28_k3.16.7_42-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133855" version="1" comment="virtualbox-guest-kmp-desktop is &lt;5.0.28_k3.16.7_42-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133856" version="1" comment="virtualbox-guest-kmp-pae is &lt;5.0.28_k3.16.7_42-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133857" version="1" comment="virtualbox-guest-tools is &lt;5.0.28-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133858" version="1" comment="virtualbox-guest-x11 is &lt;5.0.28-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133859" version="1" comment="virtualbox-host-kmp-default is &lt;5.0.28_k3.16.7_42-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133860" version="1" comment="virtualbox-host-kmp-desktop is &lt;5.0.28_k3.16.7_42-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133861" version="1" comment="virtualbox-host-kmp-pae is &lt;5.0.28_k3.16.7_42-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133862" version="1" comment="virtualbox-host-source is &lt;5.0.28-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133863" version="1" comment="virtualbox-qt is &lt;5.0.28-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133864" version="1" comment="virtualbox-websrv is &lt;5.0.28-54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133865" version="1" comment="bbswitch is &lt;0.8-3.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133866" version="1" comment="bbswitch-kmp-default is &lt;0.8_k3.16.7_45-3.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133867" version="1" comment="bbswitch-kmp-desktop is &lt;0.8_k3.16.7_45-3.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133868" version="1" comment="bbswitch-kmp-pae is &lt;0.8_k3.16.7_45-3.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133869" version="1" comment="bbswitch-kmp-xen is &lt;0.8_k3.16.7_45-3.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133870" version="1" comment="cloop is &lt;2.639-14.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133871" version="1" comment="cloop-kmp-default is &lt;2.639_k3.16.7_45-14.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133872" version="1" comment="cloop-kmp-desktop is &lt;2.639_k3.16.7_45-14.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133873" version="1" comment="cloop-kmp-pae is &lt;2.639_k3.16.7_45-14.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133874" version="1" comment="cloop-kmp-xen is &lt;2.639_k3.16.7_45-14.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133875" version="1" comment="crash is &lt;7.0.8-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133876" version="1" comment="crash-devel is &lt;7.0.8-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133877" version="1" comment="crash-doc is &lt;7.0.8-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133878" version="1" comment="crash-eppic is &lt;7.0.8-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133879" version="1" comment="crash-gcore is &lt;7.0.8-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133880" version="1" comment="crash-kmp-default is &lt;7.0.8_k3.16.7_45-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133881" version="1" comment="crash-kmp-desktop is &lt;7.0.8_k3.16.7_45-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133882" version="1" comment="crash-kmp-pae is &lt;7.0.8_k3.16.7_45-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133883" version="1" comment="crash-kmp-xen is &lt;7.0.8_k3.16.7_45-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133884" version="1" comment="hdjmod is &lt;1.28-18.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133885" version="1" comment="hdjmod-kmp-default is &lt;1.28_k3.16.7_45-18.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133886" version="1" comment="hdjmod-kmp-desktop is &lt;1.28_k3.16.7_45-18.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133887" version="1" comment="hdjmod-kmp-pae is &lt;1.28_k3.16.7_45-18.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133888" version="1" comment="hdjmod-kmp-xen is &lt;1.28_k3.16.7_45-18.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133889" version="1" comment="ipset is &lt;6.23-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133890" version="1" comment="ipset-devel is &lt;6.23-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133891" version="1" comment="ipset-kmp-default is &lt;6.23_k3.16.7_45-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133892" version="1" comment="ipset-kmp-desktop is &lt;6.23_k3.16.7_45-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133893" version="1" comment="ipset-kmp-pae is &lt;6.23_k3.16.7_45-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133894" version="1" comment="ipset-kmp-xen is &lt;6.23_k3.16.7_45-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133895" version="1" comment="kernel-debug is &lt;3.16.7-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133896" version="1" comment="kernel-debug-base is &lt;3.16.7-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133897" version="1" comment="kernel-debug-devel is &lt;3.16.7-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133898" version="1" comment="kernel-default is &lt;3.16.7-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133899" version="1" comment="kernel-default-base is &lt;3.16.7-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133900" version="1" comment="kernel-default-devel is &lt;3.16.7-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133901" version="1" comment="kernel-desktop is &lt;3.16.7-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133902" version="1" comment="kernel-desktop-base is &lt;3.16.7-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133903" version="1" comment="kernel-desktop-devel is &lt;3.16.7-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133904" version="1" comment="kernel-devel is &lt;3.16.7-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133905" version="1" comment="kernel-docs is &lt;3.16.7-45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133906" version="1" comment="kernel-ec2 is &lt;3.16.7-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133907" version="1" comment="kernel-ec2-base is &lt;3.16.7-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133908" version="1" comment="kernel-ec2-devel is &lt;3.16.7-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133909" version="1" comment="kernel-macros is &lt;3.16.7-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133910" version="1" comment="kernel-obs-build is &lt;3.16.7-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133911" version="1" comment="kernel-obs-qa is &lt;3.16.7-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133912" version="1" comment="kernel-obs-qa-xen is &lt;3.16.7-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133913" version="1" comment="kernel-pae is &lt;3.16.7-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133914" version="1" comment="kernel-pae-base is &lt;3.16.7-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133915" version="1" comment="kernel-pae-devel is &lt;3.16.7-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133916" version="1" comment="kernel-source is &lt;3.16.7-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133917" version="1" comment="kernel-source-vanilla is &lt;3.16.7-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133918" version="1" comment="kernel-syms is &lt;3.16.7-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133919" version="1" comment="kernel-vanilla is &lt;3.16.7-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133920" version="1" comment="kernel-vanilla-devel is &lt;3.16.7-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133921" version="1" comment="kernel-xen is &lt;3.16.7-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133922" version="1" comment="kernel-xen-base is &lt;3.16.7-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133923" version="1" comment="kernel-xen-devel is &lt;3.16.7-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133924" version="1" comment="libipset3 is &lt;6.23-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133925" version="1" comment="pcfclock is &lt;0.44-260.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133926" version="1" comment="pcfclock-kmp-default is &lt;0.44_k3.16.7_45-260.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133927" version="1" comment="pcfclock-kmp-desktop is &lt;0.44_k3.16.7_45-260.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133928" version="1" comment="pcfclock-kmp-pae is &lt;0.44_k3.16.7_45-260.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133929" version="1" comment="python-virtualbox is &lt;5.0.28-54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133930" version="1" comment="vhba-kmp is &lt;20140629-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133931" version="1" comment="vhba-kmp-default is &lt;20140629_k3.16.7_45-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133932" version="1" comment="vhba-kmp-desktop is &lt;20140629_k3.16.7_45-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133933" version="1" comment="vhba-kmp-pae is &lt;20140629_k3.16.7_45-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133934" version="1" comment="vhba-kmp-xen is &lt;20140629_k3.16.7_45-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133935" version="1" comment="virtualbox is &lt;5.0.28-54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133936" version="1" comment="virtualbox-devel is &lt;5.0.28-54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133937" version="1" comment="virtualbox-guest-desktop-icons is &lt;5.0.28-54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133938" version="1" comment="virtualbox-guest-kmp-default is &lt;5.0.28_k3.16.7_45-54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133939" version="1" comment="virtualbox-guest-kmp-desktop is &lt;5.0.28_k3.16.7_45-54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133940" version="1" comment="virtualbox-guest-kmp-pae is &lt;5.0.28_k3.16.7_45-54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133941" version="1" comment="virtualbox-guest-tools is &lt;5.0.28-54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133942" version="1" comment="virtualbox-guest-x11 is &lt;5.0.28-54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133943" version="1" comment="virtualbox-host-kmp-default is &lt;5.0.28_k3.16.7_45-54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133944" version="1" comment="virtualbox-host-kmp-desktop is &lt;5.0.28_k3.16.7_45-54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133945" version="1" comment="virtualbox-host-kmp-pae is &lt;5.0.28_k3.16.7_45-54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133946" version="1" comment="virtualbox-host-source is &lt;5.0.28-54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133947" version="1" comment="virtualbox-qt is &lt;5.0.28-54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133948" version="1" comment="virtualbox-websrv is &lt;5.0.28-54.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133949" version="1" comment="xen is &lt;4.4.4_05-51.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133950" version="1" comment="xen-devel is &lt;4.4.4_05-51.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133951" version="1" comment="xen-doc-html is &lt;4.4.4_05-51.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133952" version="1" comment="xen-kmp-default is &lt;4.4.4_05_k3.16.7_45-51.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133953" version="1" comment="xen-kmp-desktop is &lt;4.4.4_05_k3.16.7_45-51.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133954" version="1" comment="xen-libs is &lt;4.4.4_05-51.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133955" version="1" comment="xen-libs-32bit is &lt;4.4.4_05-51.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133956" version="1" comment="xen-tools is &lt;4.4.4_05-51.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133957" version="1" comment="xen-tools-domU is &lt;4.4.4_05-51.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133958" version="1" comment="xtables-addons is &lt;2.6-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133959" version="1" comment="xtables-addons-kmp-default is &lt;2.6_k3.16.7_45-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133960" version="1" comment="xtables-addons-kmp-desktop is &lt;2.6_k3.16.7_45-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133961" version="1" comment="xtables-addons-kmp-pae is &lt;2.6_k3.16.7_45-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133962" version="1" comment="xtables-addons-kmp-xen is &lt;2.6_k3.16.7_45-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133963" version="1" comment="GraphicsMagick is &lt;1.3.20-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133964" version="1" comment="GraphicsMagick-devel is &lt;1.3.20-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133965" version="1" comment="libGraphicsMagick++-Q16-3 is &lt;1.3.20-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133966" version="1" comment="libGraphicsMagick++-devel is &lt;1.3.20-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133967" version="1" comment="libGraphicsMagick-Q16-3 is &lt;1.3.20-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133968" version="1" comment="libGraphicsMagick3-config is &lt;1.3.20-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133969" version="1" comment="libGraphicsMagickWand-Q16-2 is &lt;1.3.20-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133970" version="1" comment="perl-GraphicsMagick is &lt;1.3.20-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133971" version="1" comment="guile1 is &lt;1.8.8-16.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133972" version="1" comment="libguile-srfi-srfi-1-v-3-3 is &lt;1.8.8-16.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133973" version="1" comment="libguile-srfi-srfi-13-14-v-3-3 is &lt;1.8.8-16.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133974" version="1" comment="libguile-srfi-srfi-4-v-3-3 is &lt;1.8.8-16.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133975" version="1" comment="libguile-srfi-srfi-60-v-2-2 is &lt;1.8.8-16.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133976" version="1" comment="libguile1-devel is &lt;1.8.8-16.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133977" version="1" comment="libguile17 is &lt;1.8.8-16.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133978" version="1" comment="libguilereadline-v-17-17 is &lt;1.8.8-16.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133979" version="1" comment="guile is &lt;2.0.11-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133980" version="1" comment="guile-devel is &lt;2.0.11-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133981" version="1" comment="guile-modules-2_0 is &lt;2.0.11-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133982" version="1" comment="libguile-2_0-22 is &lt;2.0.11-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133983" version="1" comment="libguilereadline-v-18-18 is &lt;2.0.11-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133984" version="1" comment="ghostscript is &lt;9.15-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133985" version="1" comment="ghostscript-devel is &lt;9.15-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133986" version="1" comment="ghostscript-x11 is &lt;9.15-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133987" version="1" comment="flash-player is &lt;11.2.202.643-2.115.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133988" version="1" comment="flash-player-gnome is &lt;11.2.202.643-2.115.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133989" version="1" comment="flash-player-kde4 is &lt;11.2.202.643-2.115.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133990" version="1" comment="ImageMagick is &lt;6.8.9.8-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133991" version="1" comment="ImageMagick-devel is &lt;6.8.9.8-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133992" version="1" comment="ImageMagick-devel-32bit is &lt;6.8.9.8-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133993" version="1" comment="ImageMagick-doc is &lt;6.8.9.8-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133994" version="1" comment="ImageMagick-extra is &lt;6.8.9.8-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133995" version="1" comment="libMagick++-6_Q16-5 is &lt;6.8.9.8-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133996" version="1" comment="libMagick++-6_Q16-5-32bit is &lt;6.8.9.8-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133997" version="1" comment="libMagick++-devel is &lt;6.8.9.8-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133998" version="1" comment="libMagick++-devel-32bit is &lt;6.8.9.8-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009133999" version="1" comment="libMagickCore-6_Q16-2 is &lt;6.8.9.8-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134000" version="1" comment="libMagickCore-6_Q16-2-32bit is &lt;6.8.9.8-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134001" version="1" comment="libMagickWand-6_Q16-2 is &lt;6.8.9.8-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134002" version="1" comment="libMagickWand-6_Q16-2-32bit is &lt;6.8.9.8-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134003" version="1" comment="perl-PerlMagick is &lt;6.8.9.8-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134004" version="1" comment="libpng12 is &lt;1.2.51-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134005" version="1" comment="libpng12-0 is &lt;1.2.51-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134006" version="1" comment="libpng12-0-32bit is &lt;1.2.51-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134007" version="1" comment="libpng12-compat-devel is &lt;1.2.51-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134008" version="1" comment="libpng12-compat-devel-32bit is &lt;1.2.51-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134009" version="1" comment="libpng12-devel is &lt;1.2.51-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134010" version="1" comment="libpng12-devel-32bit is &lt;1.2.51-3.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122694" version="1" comment="seamonkey is &lt;2.40-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122695" version="1" comment="seamonkey-dom-inspector is &lt;2.40-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122696" version="1" comment="seamonkey-irc is &lt;2.40-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122697" version="1" comment="seamonkey-translations-common is &lt;2.40-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122698" version="1" comment="seamonkey-translations-other is &lt;2.40-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135243" version="1" comment="bash is &lt;4.2-75.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135244" version="1" comment="bash-devel is &lt;4.2-75.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135245" version="1" comment="bash-doc is &lt;4.2-75.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135246" version="1" comment="bash-lang is &lt;4.2-75.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135247" version="1" comment="bash-loadables is &lt;4.2-75.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135248" version="1" comment="libreadline6 is &lt;6.2-75.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135249" version="1" comment="libreadline6-32bit is &lt;6.2-75.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135250" version="1" comment="readline-devel is &lt;6.2-75.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135251" version="1" comment="readline-devel-32bit is &lt;6.2-75.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135252" version="1" comment="readline-doc is &lt;6.2-75.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135287" version="1" comment="jasper is &lt;1.900.14-163.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135288" version="1" comment="libjasper-devel is &lt;1.900.14-163.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135289" version="1" comment="libjasper1 is &lt;1.900.14-163.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135290" version="1" comment="libjasper1-32bit is &lt;1.900.14-163.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135291" version="1" comment="libxml2 is &lt;2.9.4-7.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135292" version="1" comment="libxml2-2 is &lt;2.9.4-7.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135293" version="1" comment="libxml2-2-32bit is &lt;2.9.4-7.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135294" version="1" comment="libxml2-devel is &lt;2.9.4-7.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135295" version="1" comment="libxml2-devel-32bit is &lt;2.9.4-7.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135296" version="1" comment="libxml2-doc is &lt;2.9.4-7.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135297" version="1" comment="libxml2-tools is &lt;2.9.4-7.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135298" version="1" comment="python-libxml2 is &lt;2.9.4-7.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135299" version="1" comment="chromedriver is &lt;54.0.2840.90-85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135300" version="1" comment="chromium is &lt;54.0.2840.90-85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135301" version="1" comment="chromium-ffmpegsumo is &lt;54.0.2840.90-85.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135327" version="1" comment="bind is &lt;9.9.6P1-2.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135328" version="1" comment="bind-chrootenv is &lt;9.9.6P1-2.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135329" version="1" comment="bind-devel is &lt;9.9.6P1-2.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135330" version="1" comment="bind-doc is &lt;9.9.6P1-2.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135331" version="1" comment="bind-libs is &lt;9.9.6P1-2.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135332" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-2.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135333" version="1" comment="bind-lwresd is &lt;9.9.6P1-2.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135334" version="1" comment="bind-utils is &lt;9.9.6P1-2.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135343" version="1" comment="libmysqlclient-devel is &lt;10.0.27-2.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135344" version="1" comment="libmysqlclient18 is &lt;10.0.27-2.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135345" version="1" comment="libmysqlclient18-32bit is &lt;10.0.27-2.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135346" version="1" comment="libmysqlclient_r18 is &lt;10.0.27-2.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135347" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.27-2.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135348" version="1" comment="libmysqld-devel is &lt;10.0.27-2.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135349" version="1" comment="libmysqld18 is &lt;10.0.27-2.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135350" version="1" comment="mariadb is &lt;10.0.27-2.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135351" version="1" comment="mariadb-bench is &lt;10.0.27-2.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135352" version="1" comment="mariadb-client is &lt;10.0.27-2.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135353" version="1" comment="mariadb-errormessages is &lt;10.0.27-2.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135354" version="1" comment="mariadb-test is &lt;10.0.27-2.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135355" version="1" comment="mariadb-tools is &lt;10.0.27-2.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135435" version="1" comment="nodejs is &lt;4.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135436" version="1" comment="nodejs-devel is &lt;4.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135437" version="1" comment="nodejs-doc is &lt;4.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135438" version="1" comment="nodejs-docs is &lt;4.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135439" version="1" comment="npm is &lt;4.6.1-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122699" version="1" comment="MozillaFirefox is &lt;44.0-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122700" version="1" comment="MozillaFirefox-branding-upstream is &lt;44.0-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122701" version="1" comment="MozillaFirefox-buildsymbols is &lt;44.0-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122702" version="1" comment="MozillaFirefox-devel is &lt;44.0-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122703" version="1" comment="MozillaFirefox-translations-common is &lt;44.0-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122704" version="1" comment="MozillaFirefox-translations-other is &lt;44.0-12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122705" version="1" comment="libfreebl3 is &lt;3.21-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122706" version="1" comment="libfreebl3-32bit is &lt;3.21-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122707" version="1" comment="libsoftokn3 is &lt;3.21-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122708" version="1" comment="libsoftokn3-32bit is &lt;3.21-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122709" version="1" comment="mozilla-nspr is &lt;4.11-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122710" version="1" comment="mozilla-nspr-32bit is &lt;4.11-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122711" version="1" comment="mozilla-nspr-devel is &lt;4.11-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122712" version="1" comment="mozilla-nss is &lt;3.21-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122713" version="1" comment="mozilla-nss-32bit is &lt;3.21-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122714" version="1" comment="mozilla-nss-certs is &lt;3.21-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122715" version="1" comment="mozilla-nss-certs-32bit is &lt;3.21-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122716" version="1" comment="mozilla-nss-devel is &lt;3.21-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122717" version="1" comment="mozilla-nss-sysinit is &lt;3.21-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122718" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.21-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122719" version="1" comment="mozilla-nss-tools is &lt;3.21-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135440" version="1" comment="libmysql56client18 is &lt;5.6.34-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135441" version="1" comment="libmysql56client18-32bit is &lt;5.6.34-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135442" version="1" comment="libmysql56client_r18 is &lt;5.6.34-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135443" version="1" comment="libmysql56client_r18-32bit is &lt;5.6.34-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135444" version="1" comment="mysql-community-server is &lt;5.6.34-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135445" version="1" comment="mysql-community-server-bench is &lt;5.6.34-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135446" version="1" comment="mysql-community-server-client is &lt;5.6.34-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135447" version="1" comment="mysql-community-server-errormessages is &lt;5.6.34-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135448" version="1" comment="mysql-community-server-test is &lt;5.6.34-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135449" version="1" comment="mysql-community-server-tools is &lt;5.6.34-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135450" version="1" comment="flash-player is &lt;11.2.202.644-2.118.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135451" version="1" comment="flash-player-gnome is &lt;11.2.202.644-2.118.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135452" version="1" comment="flash-player-kde4 is &lt;11.2.202.644-2.118.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135516" version="1" comment="chromedriver is &lt;54.0.2840.100-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135517" version="1" comment="chromium is &lt;54.0.2840.100-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135518" version="1" comment="chromium-ffmpegsumo is &lt;54.0.2840.100-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121317" version="1" comment="phpMyAdmin is &lt;4.4.15.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122720" version="1" comment="privoxy is &lt;3.0.24-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122721" version="1" comment="privoxy-doc is &lt;3.0.24-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135519" version="1" comment="libpcre1 is &lt;8.39-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135520" version="1" comment="libpcre1-32bit is &lt;8.39-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135521" version="1" comment="libpcre16-0 is &lt;8.39-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038690"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135522" version="1" comment="libpcre16-0-32bit is &lt;8.39-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135523" version="1" comment="libpcrecpp0 is &lt;8.39-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135524" version="1" comment="libpcrecpp0-32bit is &lt;8.39-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135525" version="1" comment="libpcreposix0 is &lt;8.39-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135526" version="1" comment="libpcreposix0-32bit is &lt;8.39-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135527" version="1" comment="pcre is &lt;8.39-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135528" version="1" comment="pcre-devel is &lt;8.39-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135529" version="1" comment="pcre-devel-static is &lt;8.39-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135530" version="1" comment="pcre-doc is &lt;8.39-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038696"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135531" version="1" comment="pcre-tools is &lt;8.39-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135562" version="1" comment="GraphicsMagick is &lt;1.3.21-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135563" version="1" comment="GraphicsMagick-devel is &lt;1.3.21-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135564" version="1" comment="libGraphicsMagick++-Q16-11 is &lt;1.3.21-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135565" version="1" comment="libGraphicsMagick++-Q16-3 is &lt;1.3.20-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135566" version="1" comment="libGraphicsMagick++-devel is &lt;1.3.21-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135567" version="1" comment="libGraphicsMagick-Q16-3 is &lt;1.3.21-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135568" version="1" comment="libGraphicsMagick3-config is &lt;1.3.21-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135569" version="1" comment="libGraphicsMagickWand-Q16-2 is &lt;1.3.21-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135570" version="1" comment="perl-GraphicsMagick is &lt;1.3.21-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135571" version="1" comment="ImageMagick is &lt;6.8.9.8-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135572" version="1" comment="ImageMagick-devel is &lt;6.8.9.8-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135573" version="1" comment="ImageMagick-devel-32bit is &lt;6.8.9.8-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135574" version="1" comment="ImageMagick-doc is &lt;6.8.9.8-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135575" version="1" comment="ImageMagick-extra is &lt;6.8.9.8-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135576" version="1" comment="libMagick++-6_Q16-5 is &lt;6.8.9.8-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135577" version="1" comment="libMagick++-6_Q16-5-32bit is &lt;6.8.9.8-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135578" version="1" comment="libMagick++-devel is &lt;6.8.9.8-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135579" version="1" comment="libMagick++-devel-32bit is &lt;6.8.9.8-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135580" version="1" comment="libMagickCore-6_Q16-2 is &lt;6.8.9.8-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135581" version="1" comment="libMagickCore-6_Q16-2-32bit is &lt;6.8.9.8-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135582" version="1" comment="libMagickWand-6_Q16-2 is &lt;6.8.9.8-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135583" version="1" comment="libMagickWand-6_Q16-2-32bit is &lt;6.8.9.8-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135584" version="1" comment="perl-PerlMagick is &lt;6.8.9.8-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135585" version="1" comment="memcached is &lt;1.4.22-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135586" version="1" comment="memcached-devel is &lt;1.4.22-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135720" version="1" comment="otrs is &lt;3.3.16-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135721" version="1" comment="otrs-doc is &lt;3.3.16-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135722" version="1" comment="otrs-itsm is &lt;3.3.14-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135723" version="1" comment="MozillaFirefox is &lt;50.0-39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135724" version="1" comment="MozillaFirefox-branding-upstream is &lt;50.0-39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135725" version="1" comment="MozillaFirefox-buildsymbols is &lt;50.0-39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135726" version="1" comment="MozillaFirefox-devel is &lt;50.0-39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135727" version="1" comment="MozillaFirefox-translations-common is &lt;50.0-39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135728" version="1" comment="MozillaFirefox-translations-other is &lt;50.0-39.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135690" version="1" comment="libfreebl3 is &lt;3.26.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135691" version="1" comment="libfreebl3-32bit is &lt;3.26.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135692" version="1" comment="libsoftokn3 is &lt;3.26.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135693" version="1" comment="libsoftokn3-32bit is &lt;3.26.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135694" version="1" comment="mozilla-nss is &lt;3.26.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135695" version="1" comment="mozilla-nss-32bit is &lt;3.26.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135696" version="1" comment="mozilla-nss-certs is &lt;3.26.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135697" version="1" comment="mozilla-nss-certs-32bit is &lt;3.26.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135698" version="1" comment="mozilla-nss-devel is &lt;3.26.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135699" version="1" comment="mozilla-nss-sysinit is &lt;3.26.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135700" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.26.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135701" version="1" comment="mozilla-nss-tools is &lt;3.26.2-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135795" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.111-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135796" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.111-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135797" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.111-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135798" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.111-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135799" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.111-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135800" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.111-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135801" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.111-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135802" version="1" comment="apache2-mod_php5 is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135803" version="1" comment="php5 is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135804" version="1" comment="php5-bcmath is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135805" version="1" comment="php5-bz2 is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135806" version="1" comment="php5-calendar is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135807" version="1" comment="php5-ctype is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135808" version="1" comment="php5-curl is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135809" version="1" comment="php5-dba is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135810" version="1" comment="php5-devel is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135811" version="1" comment="php5-dom is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135812" version="1" comment="php5-enchant is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135813" version="1" comment="php5-exif is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135814" version="1" comment="php5-fastcgi is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135815" version="1" comment="php5-fileinfo is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135816" version="1" comment="php5-firebird is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135817" version="1" comment="php5-fpm is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135818" version="1" comment="php5-ftp is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135819" version="1" comment="php5-gd is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135820" version="1" comment="php5-gettext is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135821" version="1" comment="php5-gmp is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135822" version="1" comment="php5-iconv is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135823" version="1" comment="php5-imap is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135824" version="1" comment="php5-intl is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135825" version="1" comment="php5-json is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135826" version="1" comment="php5-ldap is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135827" version="1" comment="php5-mbstring is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135828" version="1" comment="php5-mcrypt is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135829" version="1" comment="php5-mssql is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135830" version="1" comment="php5-mysql is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135831" version="1" comment="php5-odbc is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135832" version="1" comment="php5-opcache is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135833" version="1" comment="php5-openssl is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135834" version="1" comment="php5-pcntl is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135835" version="1" comment="php5-pdo is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135836" version="1" comment="php5-pear is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135837" version="1" comment="php5-pgsql is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135838" version="1" comment="php5-phar is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135839" version="1" comment="php5-posix is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135840" version="1" comment="php5-pspell is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135841" version="1" comment="php5-readline is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135842" version="1" comment="php5-shmop is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135843" version="1" comment="php5-snmp is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135844" version="1" comment="php5-soap is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135845" version="1" comment="php5-sockets is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135846" version="1" comment="php5-sqlite is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135847" version="1" comment="php5-suhosin is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135848" version="1" comment="php5-sysvmsg is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135849" version="1" comment="php5-sysvsem is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135850" version="1" comment="php5-sysvshm is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135851" version="1" comment="php5-tidy is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135852" version="1" comment="php5-tokenizer is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135853" version="1" comment="php5-wddx is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135854" version="1" comment="php5-xmlreader is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135855" version="1" comment="php5-xmlrpc is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135856" version="1" comment="php5-xmlwriter is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135857" version="1" comment="php5-xsl is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135858" version="1" comment="php5-zip is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135859" version="1" comment="php5-zlib is &lt;5.6.1-86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135893" version="1" comment="monit is &lt;5.20.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135894" version="1" comment="monit-doc is &lt;5.20.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135895" version="1" comment="tar is &lt;1.28-2.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135896" version="1" comment="tar-backup-scripts is &lt;1.28-2.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135897" version="1" comment="tar-lang is &lt;1.28-2.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135898" version="1" comment="tar-tests is &lt;1.28-2.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135899" version="1" comment="dovecot22 is &lt;2.2.25-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135900" version="1" comment="dovecot22-backend-mysql is &lt;2.2.25-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135901" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.25-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135902" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.25-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135903" version="1" comment="dovecot22-devel is &lt;2.2.25-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135904" version="1" comment="dovecot22-fts is &lt;2.2.25-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135905" version="1" comment="dovecot22-fts-lucene is &lt;2.2.25-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135906" version="1" comment="dovecot22-fts-solr is &lt;2.2.25-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135907" version="1" comment="dovecot22-fts-squat is &lt;2.2.25-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135908" version="1" comment="sudo is &lt;1.8.10p3-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135909" version="1" comment="sudo-devel is &lt;1.8.10p3-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135910" version="1" comment="sudo-test is &lt;1.8.10p3-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135936" version="1" comment="gnuchess is &lt;6.2.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135952" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.121-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135953" version="1" comment="java-1_7_0-openjdk-accessibility is &lt;1.7.0.121-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135954" version="1" comment="java-1_7_0-openjdk-bootstrap is &lt;1.7.0.121-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135955" version="1" comment="java-1_7_0-openjdk-bootstrap-devel is &lt;1.7.0.121-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135956" version="1" comment="java-1_7_0-openjdk-bootstrap-headless is &lt;1.7.0.121-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135957" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.121-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135958" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.121-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135959" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.121-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135960" version="1" comment="java-1_7_0-openjdk-javadoc is &lt;1.7.0.121-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135961" version="1" comment="java-1_7_0-openjdk-src is &lt;1.7.0.121-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122787" version="1" comment="bbswitch is &lt;0.8-3.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122788" version="1" comment="bbswitch-kmp-default is &lt;0.8_k3.16.7_32-3.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122789" version="1" comment="bbswitch-kmp-desktop is &lt;0.8_k3.16.7_32-3.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122790" version="1" comment="bbswitch-kmp-pae is &lt;0.8_k3.16.7_32-3.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122791" version="1" comment="bbswitch-kmp-xen is &lt;0.8_k3.16.7_32-3.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122792" version="1" comment="cloop is &lt;2.639-14.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122793" version="1" comment="cloop-kmp-default is &lt;2.639_k3.16.7_32-14.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122794" version="1" comment="cloop-kmp-desktop is &lt;2.639_k3.16.7_32-14.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122795" version="1" comment="cloop-kmp-pae is &lt;2.639_k3.16.7_32-14.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122796" version="1" comment="cloop-kmp-xen is &lt;2.639_k3.16.7_32-14.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122797" version="1" comment="crash is &lt;7.0.8-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122798" version="1" comment="crash-devel is &lt;7.0.8-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122799" version="1" comment="crash-doc is &lt;7.0.8-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122800" version="1" comment="crash-eppic is &lt;7.0.8-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122801" version="1" comment="crash-gcore is &lt;7.0.8-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122802" version="1" comment="crash-kmp-default is &lt;7.0.8_k3.16.7_32-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122803" version="1" comment="crash-kmp-desktop is &lt;7.0.8_k3.16.7_32-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122804" version="1" comment="crash-kmp-pae is &lt;7.0.8_k3.16.7_32-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122805" version="1" comment="crash-kmp-xen is &lt;7.0.8_k3.16.7_32-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122806" version="1" comment="hdjmod is &lt;1.28-18.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122807" version="1" comment="hdjmod-kmp-default is &lt;1.28_k3.16.7_32-18.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122808" version="1" comment="hdjmod-kmp-desktop is &lt;1.28_k3.16.7_32-18.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122809" version="1" comment="hdjmod-kmp-pae is &lt;1.28_k3.16.7_32-18.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122810" version="1" comment="hdjmod-kmp-xen is &lt;1.28_k3.16.7_32-18.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122811" version="1" comment="ipset is &lt;6.23-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122812" version="1" comment="ipset-devel is &lt;6.23-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122813" version="1" comment="ipset-kmp-default is &lt;6.23_k3.16.7_32-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122814" version="1" comment="ipset-kmp-desktop is &lt;6.23_k3.16.7_32-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122815" version="1" comment="ipset-kmp-pae is &lt;6.23_k3.16.7_32-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122816" version="1" comment="ipset-kmp-xen is &lt;6.23_k3.16.7_32-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122817" version="1" comment="kernel-debug is &lt;3.16.7-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122818" version="1" comment="kernel-debug-base is &lt;3.16.7-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122819" version="1" comment="kernel-debug-devel is &lt;3.16.7-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122820" version="1" comment="kernel-default is &lt;3.16.7-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122821" version="1" comment="kernel-default-base is &lt;3.16.7-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122822" version="1" comment="kernel-default-devel is &lt;3.16.7-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122823" version="1" comment="kernel-desktop is &lt;3.16.7-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122824" version="1" comment="kernel-desktop-base is &lt;3.16.7-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122825" version="1" comment="kernel-desktop-devel is &lt;3.16.7-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122826" version="1" comment="kernel-devel is &lt;3.16.7-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122827" version="1" comment="kernel-docs is &lt;3.16.7-32.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122828" version="1" comment="kernel-ec2 is &lt;3.16.7-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122829" version="1" comment="kernel-ec2-base is &lt;3.16.7-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122830" version="1" comment="kernel-ec2-devel is &lt;3.16.7-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122831" version="1" comment="kernel-macros is &lt;3.16.7-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122832" version="1" comment="kernel-obs-build is &lt;3.16.7-32.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122833" version="1" comment="kernel-obs-qa is &lt;3.16.7-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122834" version="1" comment="kernel-obs-qa-xen is &lt;3.16.7-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122835" version="1" comment="kernel-pae is &lt;3.16.7-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122836" version="1" comment="kernel-pae-base is &lt;3.16.7-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122837" version="1" comment="kernel-pae-devel is &lt;3.16.7-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122838" version="1" comment="kernel-source is &lt;3.16.7-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122839" version="1" comment="kernel-source-vanilla is &lt;3.16.7-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122840" version="1" comment="kernel-syms is &lt;3.16.7-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122841" version="1" comment="kernel-vanilla is &lt;3.16.7-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122842" version="1" comment="kernel-vanilla-devel is &lt;3.16.7-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122843" version="1" comment="kernel-xen is &lt;3.16.7-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122844" version="1" comment="kernel-xen-base is &lt;3.16.7-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122845" version="1" comment="kernel-xen-devel is &lt;3.16.7-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122846" version="1" comment="libipset3 is &lt;6.23-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122847" version="1" comment="pcfclock is &lt;0.44-260.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122848" version="1" comment="pcfclock-kmp-default is &lt;0.44_k3.16.7_32-260.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122849" version="1" comment="pcfclock-kmp-desktop is &lt;0.44_k3.16.7_32-260.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122850" version="1" comment="pcfclock-kmp-pae is &lt;0.44_k3.16.7_32-260.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122851" version="1" comment="python-virtualbox is &lt;4.3.34-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122852" version="1" comment="vhba-kmp is &lt;20140629-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122853" version="1" comment="vhba-kmp-default is &lt;20140629_k3.16.7_32-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122854" version="1" comment="vhba-kmp-desktop is &lt;20140629_k3.16.7_32-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122855" version="1" comment="vhba-kmp-pae is &lt;20140629_k3.16.7_32-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122856" version="1" comment="vhba-kmp-xen is &lt;20140629_k3.16.7_32-2.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122857" version="1" comment="virtualbox is &lt;4.3.34-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122858" version="1" comment="virtualbox-devel is &lt;4.3.34-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122859" version="1" comment="virtualbox-guest-desktop-icons is &lt;4.3.34-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122860" version="1" comment="virtualbox-guest-kmp-default is &lt;4.3.34_k3.16.7_32-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122861" version="1" comment="virtualbox-guest-kmp-desktop is &lt;4.3.34_k3.16.7_32-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122862" version="1" comment="virtualbox-guest-kmp-pae is &lt;4.3.34_k3.16.7_32-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122863" version="1" comment="virtualbox-guest-tools is &lt;4.3.34-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122864" version="1" comment="virtualbox-guest-x11 is &lt;4.3.34-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122865" version="1" comment="virtualbox-host-kmp-default is &lt;4.3.34_k3.16.7_32-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122866" version="1" comment="virtualbox-host-kmp-desktop is &lt;4.3.34_k3.16.7_32-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122867" version="1" comment="virtualbox-host-kmp-pae is &lt;4.3.34_k3.16.7_32-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122868" version="1" comment="virtualbox-host-source is &lt;4.3.34-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122869" version="1" comment="virtualbox-qt is &lt;4.3.34-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122870" version="1" comment="virtualbox-websrv is &lt;4.3.34-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122871" version="1" comment="xen is &lt;4.4.3_08-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122872" version="1" comment="xen-devel is &lt;4.4.3_08-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122873" version="1" comment="xen-doc-html is &lt;4.4.3_08-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122874" version="1" comment="xen-kmp-default is &lt;4.4.3_08_k3.16.7_32-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122875" version="1" comment="xen-kmp-desktop is &lt;4.4.3_08_k3.16.7_32-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122876" version="1" comment="xen-libs is &lt;4.4.3_08-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122877" version="1" comment="xen-libs-32bit is &lt;4.4.3_08-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122878" version="1" comment="xen-tools is &lt;4.4.3_08-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122879" version="1" comment="xen-tools-domU is &lt;4.4.3_08-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122880" version="1" comment="xtables-addons is &lt;2.6-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122881" version="1" comment="xtables-addons-kmp-default is &lt;2.6_k3.16.7_32-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122882" version="1" comment="xtables-addons-kmp-desktop is &lt;2.6_k3.16.7_32-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122883" version="1" comment="xtables-addons-kmp-pae is &lt;2.6_k3.16.7_32-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122884" version="1" comment="xtables-addons-kmp-xen is &lt;2.6_k3.16.7_32-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136187" version="1" comment="libcares-devel is &lt;1.10.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136188" version="1" comment="libcares2 is &lt;1.10.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136189" version="1" comment="libcares2-32bit is &lt;1.10.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136326" version="1" comment="gvim is &lt;7.4.326-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136327" version="1" comment="vim is &lt;7.4.326-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136328" version="1" comment="vim-data is &lt;7.4.326-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136329" version="1" comment="MozillaFirefox is &lt;50.0.2-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136330" version="1" comment="MozillaFirefox-branding-upstream is &lt;50.0.2-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136331" version="1" comment="MozillaFirefox-buildsymbols is &lt;50.0.2-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136332" version="1" comment="MozillaFirefox-devel is &lt;50.0.2-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136333" version="1" comment="MozillaFirefox-translations-common is &lt;50.0.2-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136334" version="1" comment="MozillaFirefox-translations-other is &lt;50.0.2-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136335" version="1" comment="MozillaThunderbird is &lt;45.5.1-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136336" version="1" comment="MozillaThunderbird-buildsymbols is &lt;45.5.1-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136337" version="1" comment="MozillaThunderbird-devel is &lt;45.5.1-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136338" version="1" comment="MozillaThunderbird-translations-common is &lt;45.5.1-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136339" version="1" comment="MozillaThunderbird-translations-other is &lt;45.5.1-28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121319" version="1" comment="pitivi is &lt;0.94-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121320" version="1" comment="pitivi-lang is &lt;0.94-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136433" version="1" comment="phpMyAdmin is &lt;4.4.15.9-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136585" version="1" comment="ImageMagick is &lt;6.8.9.8-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136586" version="1" comment="ImageMagick-devel is &lt;6.8.9.8-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136587" version="1" comment="ImageMagick-devel-32bit is &lt;6.8.9.8-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136588" version="1" comment="ImageMagick-doc is &lt;6.8.9.8-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136589" version="1" comment="ImageMagick-extra is &lt;6.8.9.8-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136590" version="1" comment="libMagick++-6_Q16-5 is &lt;6.8.9.8-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136591" version="1" comment="libMagick++-6_Q16-5-32bit is &lt;6.8.9.8-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136592" version="1" comment="libMagick++-devel is &lt;6.8.9.8-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136593" version="1" comment="libMagick++-devel-32bit is &lt;6.8.9.8-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136594" version="1" comment="libMagickCore-6_Q16-2 is &lt;6.8.9.8-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136595" version="1" comment="libMagickCore-6_Q16-2-32bit is &lt;6.8.9.8-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136596" version="1" comment="libMagickWand-6_Q16-2 is &lt;6.8.9.8-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136597" version="1" comment="libMagickWand-6_Q16-2-32bit is &lt;6.8.9.8-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136598" version="1" comment="perl-PerlMagick is &lt;6.8.9.8-42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136599" version="1" comment="GraphicsMagick is &lt;1.3.20-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136600" version="1" comment="GraphicsMagick-devel is &lt;1.3.20-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136601" version="1" comment="libGraphicsMagick++-Q16-3 is &lt;1.3.20-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136602" version="1" comment="libGraphicsMagick++-devel is &lt;1.3.20-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136603" version="1" comment="libGraphicsMagick-Q16-3 is &lt;1.3.20-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136604" version="1" comment="libGraphicsMagick3-config is &lt;1.3.20-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136605" version="1" comment="libGraphicsMagickWand-Q16-2 is &lt;1.3.20-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136606" version="1" comment="perl-GraphicsMagick is &lt;1.3.20-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136714" version="1" comment="roundcubemail is &lt;1.0.9-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136715" version="1" comment="libX11 is &lt;1.6.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136716" version="1" comment="libX11-6 is &lt;1.6.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136717" version="1" comment="libX11-6-32bit is &lt;1.6.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136718" version="1" comment="libX11-data is &lt;1.6.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136719" version="1" comment="libX11-devel is &lt;1.6.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136720" version="1" comment="libX11-devel-32bit is &lt;1.6.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136721" version="1" comment="libX11-xcb1 is &lt;1.6.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136722" version="1" comment="libX11-xcb1-32bit is &lt;1.6.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136723" version="1" comment="libXi is &lt;1.7.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136724" version="1" comment="libXi-devel is &lt;1.7.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136725" version="1" comment="libXi-devel-32bit is &lt;1.7.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136726" version="1" comment="libXi6 is &lt;1.7.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136727" version="1" comment="libXi6-32bit is &lt;1.7.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136728" version="1" comment="libXrandr is &lt;1.5.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136729" version="1" comment="libXrandr-devel is &lt;1.5.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136730" version="1" comment="libXrandr-devel-32bit is &lt;1.5.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136731" version="1" comment="libXrandr2 is &lt;1.5.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136732" version="1" comment="libXrandr2-32bit is &lt;1.5.0-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136733" version="1" comment="libxcb is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136734" version="1" comment="libxcb-composite0 is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136735" version="1" comment="libxcb-composite0-32bit is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136736" version="1" comment="libxcb-damage0 is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136737" version="1" comment="libxcb-damage0-32bit is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136738" version="1" comment="libxcb-devel is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136739" version="1" comment="libxcb-devel-32bit is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136740" version="1" comment="libxcb-devel-doc is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136741" version="1" comment="libxcb-dpms0 is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136742" version="1" comment="libxcb-dpms0-32bit is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136743" version="1" comment="libxcb-dri2-0 is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136744" version="1" comment="libxcb-dri2-0-32bit is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136745" version="1" comment="libxcb-dri3-0 is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136746" version="1" comment="libxcb-dri3-0-32bit is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136747" version="1" comment="libxcb-glx0 is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136748" version="1" comment="libxcb-glx0-32bit is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136749" version="1" comment="libxcb-present0 is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136750" version="1" comment="libxcb-present0-32bit is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136751" version="1" comment="libxcb-randr0 is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136752" version="1" comment="libxcb-randr0-32bit is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136753" version="1" comment="libxcb-record0 is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136754" version="1" comment="libxcb-record0-32bit is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136755" version="1" comment="libxcb-render0 is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136756" version="1" comment="libxcb-render0-32bit is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136757" version="1" comment="libxcb-res0 is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136758" version="1" comment="libxcb-res0-32bit is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136759" version="1" comment="libxcb-screensaver0 is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136760" version="1" comment="libxcb-screensaver0-32bit is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136761" version="1" comment="libxcb-shape0 is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136762" version="1" comment="libxcb-shape0-32bit is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136763" version="1" comment="libxcb-shm0 is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136764" version="1" comment="libxcb-shm0-32bit is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136765" version="1" comment="libxcb-sync1 is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136766" version="1" comment="libxcb-sync1-32bit is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136767" version="1" comment="libxcb-xevie0 is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136768" version="1" comment="libxcb-xevie0-32bit is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136769" version="1" comment="libxcb-xf86dri0 is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136770" version="1" comment="libxcb-xf86dri0-32bit is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136771" version="1" comment="libxcb-xfixes0 is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136772" version="1" comment="libxcb-xfixes0-32bit is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136773" version="1" comment="libxcb-xinerama0 is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136774" version="1" comment="libxcb-xinerama0-32bit is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136775" version="1" comment="libxcb-xkb1 is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136776" version="1" comment="libxcb-xkb1-32bit is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136777" version="1" comment="libxcb-xprint0 is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136778" version="1" comment="libxcb-xprint0-32bit is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136779" version="1" comment="libxcb-xtest0 is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136780" version="1" comment="libxcb-xtest0-32bit is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136781" version="1" comment="libxcb-xv0 is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136782" version="1" comment="libxcb-xv0-32bit is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136783" version="1" comment="libxcb-xvmc0 is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136784" version="1" comment="libxcb-xvmc0-32bit is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136785" version="1" comment="libxcb1 is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136786" version="1" comment="libxcb1-32bit is &lt;1.11-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136787" version="1" comment="libXrender is &lt;0.9.8-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136788" version="1" comment="libXrender-devel is &lt;0.9.8-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136789" version="1" comment="libXrender-devel-32bit is &lt;0.9.8-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136790" version="1" comment="libXrender1 is &lt;0.9.8-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136791" version="1" comment="libXrender1-32bit is &lt;0.9.8-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136792" version="1" comment="libXtst is &lt;1.2.2-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136793" version="1" comment="libXtst-devel is &lt;1.2.2-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136794" version="1" comment="libXtst-devel-32bit is &lt;1.2.2-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136795" version="1" comment="libXtst6 is &lt;1.2.2-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136796" version="1" comment="libXtst6-32bit is &lt;1.2.2-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136797" version="1" comment="libXv is &lt;1.0.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136798" version="1" comment="libXv-devel is &lt;1.0.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136799" version="1" comment="libXv-devel-32bit is &lt;1.0.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136800" version="1" comment="libXv1 is &lt;1.0.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136801" version="1" comment="libXv1-32bit is &lt;1.0.10-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136802" version="1" comment="libXvMC is &lt;1.0.8-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136803" version="1" comment="libXvMC-devel is &lt;1.0.8-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136804" version="1" comment="libXvMC-devel-32bit is &lt;1.0.8-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136805" version="1" comment="libXvMC1 is &lt;1.0.8-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136806" version="1" comment="libXvMC1-32bit is &lt;1.0.8-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136807" version="1" comment="libtiff-devel is &lt;4.0.7-10.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136808" version="1" comment="libtiff-devel-32bit is &lt;4.0.7-10.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136809" version="1" comment="libtiff5 is &lt;4.0.7-10.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136810" version="1" comment="libtiff5-32bit is &lt;4.0.7-10.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136811" version="1" comment="tiff is &lt;4.0.7-10.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048732"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137927" version="1" comment="libXfixes is &lt;5.0.1-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137928" version="1" comment="libXfixes-devel is &lt;5.0.1-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137929" version="1" comment="libXfixes-devel-32bit is &lt;5.0.1-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137930" version="1" comment="libXfixes3 is &lt;5.0.1-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137931" version="1" comment="libXfixes3-32bit is &lt;5.0.1-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137932" version="1" comment="bbswitch is &lt;0.8-3.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137933" version="1" comment="bbswitch-kmp-default is &lt;0.8_k3.16.7_53-3.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137934" version="1" comment="bbswitch-kmp-desktop is &lt;0.8_k3.16.7_53-3.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137935" version="1" comment="bbswitch-kmp-pae is &lt;0.8_k3.16.7_53-3.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137936" version="1" comment="bbswitch-kmp-xen is &lt;0.8_k3.16.7_53-3.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137937" version="1" comment="cloop is &lt;2.639-14.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137938" version="1" comment="cloop-kmp-default is &lt;2.639_k3.16.7_53-14.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137939" version="1" comment="cloop-kmp-desktop is &lt;2.639_k3.16.7_53-14.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137940" version="1" comment="cloop-kmp-pae is &lt;2.639_k3.16.7_53-14.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137941" version="1" comment="cloop-kmp-xen is &lt;2.639_k3.16.7_53-14.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137942" version="1" comment="crash is &lt;7.0.8-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137943" version="1" comment="crash-devel is &lt;7.0.8-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137944" version="1" comment="crash-doc is &lt;7.0.8-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137945" version="1" comment="crash-eppic is &lt;7.0.8-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137946" version="1" comment="crash-gcore is &lt;7.0.8-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137947" version="1" comment="crash-kmp-default is &lt;7.0.8_k3.16.7_53-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137948" version="1" comment="crash-kmp-desktop is &lt;7.0.8_k3.16.7_53-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137949" version="1" comment="crash-kmp-pae is &lt;7.0.8_k3.16.7_53-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137950" version="1" comment="crash-kmp-xen is &lt;7.0.8_k3.16.7_53-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137951" version="1" comment="hdjmod is &lt;1.28-18.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137952" version="1" comment="hdjmod-kmp-default is &lt;1.28_k3.16.7_53-18.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137953" version="1" comment="hdjmod-kmp-desktop is &lt;1.28_k3.16.7_53-18.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137954" version="1" comment="hdjmod-kmp-pae is &lt;1.28_k3.16.7_53-18.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137955" version="1" comment="hdjmod-kmp-xen is &lt;1.28_k3.16.7_53-18.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137956" version="1" comment="ipset is &lt;6.23-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137957" version="1" comment="ipset-devel is &lt;6.23-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137958" version="1" comment="ipset-kmp-default is &lt;6.23_k3.16.7_53-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137959" version="1" comment="ipset-kmp-desktop is &lt;6.23_k3.16.7_53-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137960" version="1" comment="ipset-kmp-pae is &lt;6.23_k3.16.7_53-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137961" version="1" comment="ipset-kmp-xen is &lt;6.23_k3.16.7_53-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137962" version="1" comment="kernel-debug is &lt;3.16.7-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137963" version="1" comment="kernel-debug-base is &lt;3.16.7-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137964" version="1" comment="kernel-debug-devel is &lt;3.16.7-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137965" version="1" comment="kernel-default is &lt;3.16.7-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137966" version="1" comment="kernel-default-base is &lt;3.16.7-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137967" version="1" comment="kernel-default-devel is &lt;3.16.7-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137968" version="1" comment="kernel-desktop is &lt;3.16.7-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137969" version="1" comment="kernel-desktop-base is &lt;3.16.7-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137970" version="1" comment="kernel-desktop-devel is &lt;3.16.7-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137971" version="1" comment="kernel-devel is &lt;3.16.7-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137972" version="1" comment="kernel-docs is &lt;3.16.7-53.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137973" version="1" comment="kernel-ec2 is &lt;3.16.7-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137974" version="1" comment="kernel-ec2-base is &lt;3.16.7-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137975" version="1" comment="kernel-ec2-devel is &lt;3.16.7-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137976" version="1" comment="kernel-macros is &lt;3.16.7-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137977" version="1" comment="kernel-obs-build is &lt;3.16.7-53.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137978" version="1" comment="kernel-obs-qa is &lt;3.16.7-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137979" version="1" comment="kernel-pae is &lt;3.16.7-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137980" version="1" comment="kernel-pae-base is &lt;3.16.7-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137981" version="1" comment="kernel-pae-devel is &lt;3.16.7-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137982" version="1" comment="kernel-source is &lt;3.16.7-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137983" version="1" comment="kernel-source-vanilla is &lt;3.16.7-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137984" version="1" comment="kernel-syms is &lt;3.16.7-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137985" version="1" comment="kernel-vanilla is &lt;3.16.7-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137986" version="1" comment="kernel-vanilla-devel is &lt;3.16.7-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137987" version="1" comment="kernel-xen is &lt;3.16.7-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137988" version="1" comment="kernel-xen-base is &lt;3.16.7-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137989" version="1" comment="kernel-xen-devel is &lt;3.16.7-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137990" version="1" comment="libipset3 is &lt;6.23-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137991" version="1" comment="pcfclock is &lt;0.44-260.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137992" version="1" comment="pcfclock-kmp-default is &lt;0.44_k3.16.7_53-260.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137993" version="1" comment="pcfclock-kmp-desktop is &lt;0.44_k3.16.7_53-260.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137994" version="1" comment="pcfclock-kmp-pae is &lt;0.44_k3.16.7_53-260.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137995" version="1" comment="python-virtualbox is &lt;5.0.30-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137996" version="1" comment="vhba-kmp is &lt;20140629-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137997" version="1" comment="vhba-kmp-default is &lt;20140629_k3.16.7_53-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137998" version="1" comment="vhba-kmp-desktop is &lt;20140629_k3.16.7_53-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009137999" version="1" comment="vhba-kmp-pae is &lt;20140629_k3.16.7_53-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138000" version="1" comment="vhba-kmp-xen is &lt;20140629_k3.16.7_53-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138001" version="1" comment="virtualbox is &lt;5.0.30-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138002" version="1" comment="virtualbox-devel is &lt;5.0.30-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138003" version="1" comment="virtualbox-guest-desktop-icons is &lt;5.0.30-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138004" version="1" comment="virtualbox-guest-kmp-default is &lt;5.0.30_k3.16.7_53-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138005" version="1" comment="virtualbox-guest-kmp-desktop is &lt;5.0.30_k3.16.7_53-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138006" version="1" comment="virtualbox-guest-kmp-pae is &lt;5.0.30_k3.16.7_53-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138007" version="1" comment="virtualbox-guest-tools is &lt;5.0.30-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138008" version="1" comment="virtualbox-guest-x11 is &lt;5.0.30-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138009" version="1" comment="virtualbox-host-kmp-default is &lt;5.0.30_k3.16.7_53-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138010" version="1" comment="virtualbox-host-kmp-desktop is &lt;5.0.30_k3.16.7_53-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138011" version="1" comment="virtualbox-host-kmp-pae is &lt;5.0.30_k3.16.7_53-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138012" version="1" comment="virtualbox-host-source is &lt;5.0.30-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138013" version="1" comment="virtualbox-qt is &lt;5.0.30-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138014" version="1" comment="virtualbox-websrv is &lt;5.0.30-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138015" version="1" comment="xen is &lt;4.4.4_05-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138016" version="1" comment="xen-devel is &lt;4.4.4_05-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138017" version="1" comment="xen-doc-html is &lt;4.4.4_05-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138018" version="1" comment="xen-kmp-default is &lt;4.4.4_05_k3.16.7_53-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138019" version="1" comment="xen-kmp-desktop is &lt;4.4.4_05_k3.16.7_53-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138020" version="1" comment="xen-libs is &lt;4.4.4_05-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138021" version="1" comment="xen-libs-32bit is &lt;4.4.4_05-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138022" version="1" comment="xen-tools is &lt;4.4.4_05-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138023" version="1" comment="xen-tools-domU is &lt;4.4.4_05-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138024" version="1" comment="xtables-addons is &lt;2.6-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138025" version="1" comment="xtables-addons-kmp-default is &lt;2.6_k3.16.7_53-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138026" version="1" comment="xtables-addons-kmp-desktop is &lt;2.6_k3.16.7_53-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138027" version="1" comment="xtables-addons-kmp-pae is &lt;2.6_k3.16.7_53-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009138028" version="1" comment="xtables-addons-kmp-xen is &lt;2.6_k3.16.7_53-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142382" version="1" comment="perl-DBD-mysql is &lt;4.021-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142383" version="1" comment="libass is &lt;0.12.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142384" version="1" comment="libass-devel is &lt;0.12.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142385" version="1" comment="libass5 is &lt;0.12.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142386" version="1" comment="libass5-32bit is &lt;0.12.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142894" version="1" comment="chromedriver is &lt;55.0.2883.75-99.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142895" version="1" comment="chromium is &lt;55.0.2883.75-99.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142896" version="1" comment="chromium-ffmpegsumo is &lt;55.0.2883.75-148.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142950" version="1" comment="gstreamer-0_10-plugins-bad is &lt;0.10.23-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142951" version="1" comment="gstreamer-0_10-plugins-bad-32bit is &lt;0.10.23-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142952" version="1" comment="gstreamer-0_10-plugins-bad-devel is &lt;0.10.23-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142953" version="1" comment="gstreamer-0_10-plugins-bad-doc is &lt;0.10.23-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142954" version="1" comment="gstreamer-0_10-plugins-bad-lang is &lt;0.10.23-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142955" version="1" comment="libgstbasecamerabinsrc-0_10-23 is &lt;0.10.23-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142956" version="1" comment="libgstbasecamerabinsrc-0_10-23-32bit is &lt;0.10.23-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142957" version="1" comment="libgstbasevideo-0_10-23 is &lt;0.10.23-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142958" version="1" comment="libgstbasevideo-0_10-23-32bit is &lt;0.10.23-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142959" version="1" comment="libgstcodecparsers-0_10-23 is &lt;0.10.23-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142960" version="1" comment="libgstcodecparsers-0_10-23-32bit is &lt;0.10.23-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142961" version="1" comment="libgstphotography-0_10-23 is &lt;0.10.23-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142962" version="1" comment="libgstphotography-0_10-23-32bit is &lt;0.10.23-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142963" version="1" comment="libgstsignalprocessor-0_10-23 is &lt;0.10.23-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142964" version="1" comment="libgstsignalprocessor-0_10-23-32bit is &lt;0.10.23-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142965" version="1" comment="libgstvdp-0_10-23 is &lt;0.10.23-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142966" version="1" comment="libgstvdp-0_10-23-32bit is &lt;0.10.23-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142967" version="1" comment="gstreamer-plugins-bad is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142968" version="1" comment="gstreamer-plugins-bad-32bit is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142969" version="1" comment="gstreamer-plugins-bad-devel is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142970" version="1" comment="gstreamer-plugins-bad-doc is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142971" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142972" version="1" comment="libgstbadbase-1_0-0 is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142973" version="1" comment="libgstbadbase-1_0-0-32bit is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142974" version="1" comment="libgstbadvideo-1_0-0 is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142975" version="1" comment="libgstbadvideo-1_0-0-32bit is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142976" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142977" version="1" comment="libgstbasecamerabinsrc-1_0-0-32bit is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142978" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142979" version="1" comment="libgstcodecparsers-1_0-0-32bit is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142980" version="1" comment="libgstgl-1_0-0 is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142981" version="1" comment="libgstgl-1_0-0-32bit is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142982" version="1" comment="libgstinsertbin-1_0-0 is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142983" version="1" comment="libgstinsertbin-1_0-0-32bit is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142984" version="1" comment="libgstmpegts-1_0-0 is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142985" version="1" comment="libgstmpegts-1_0-0-32bit is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142986" version="1" comment="libgstphotography-1_0-0 is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142987" version="1" comment="libgstphotography-1_0-0-32bit is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142988" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142989" version="1" comment="libgsturidownloader-1_0-0-32bit is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142990" version="1" comment="libgstwayland-1_0-0 is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142991" version="1" comment="libgstwayland-1_0-0-32bit is &lt;1.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143051" version="1" comment="flash-player is &lt;24.0.0.186-2.121.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143052" version="1" comment="flash-player-gnome is &lt;24.0.0.186-2.121.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143053" version="1" comment="flash-player-kde4 is &lt;24.0.0.186-2.121.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143097" version="1" comment="gc is &lt;7.2d-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143098" version="1" comment="gc-devel is &lt;7.2d-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143099" version="1" comment="libgc1 is &lt;7.2d-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143100" version="1" comment="lxc is &lt;1.1.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143101" version="1" comment="lxc-devel is &lt;1.1.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143102" version="1" comment="MozillaFirefox is &lt;50.1.0-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143103" version="1" comment="MozillaFirefox-branding-upstream is &lt;50.1.0-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143104" version="1" comment="MozillaFirefox-buildsymbols is &lt;50.1.0-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143105" version="1" comment="MozillaFirefox-devel is &lt;50.1.0-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143106" version="1" comment="MozillaFirefox-translations-common is &lt;50.1.0-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143107" version="1" comment="MozillaFirefox-translations-other is &lt;50.1.0-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144594" version="1" comment="libminizip1 is &lt;1.2.8-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144595" version="1" comment="libz1 is &lt;1.2.8-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144596" version="1" comment="libz1-32bit is &lt;1.2.8-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144597" version="1" comment="minizip-devel is &lt;1.2.8-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144598" version="1" comment="zlib is &lt;1.2.8-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144599" version="1" comment="zlib-devel is &lt;1.2.8-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144600" version="1" comment="zlib-devel-32bit is &lt;1.2.8-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144601" version="1" comment="zlib-devel-static is &lt;1.2.8-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144602" version="1" comment="zlib-devel-static-32bit is &lt;1.2.8-5.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121321" version="1" comment="ruby2.1-rubygem-mail-2_5 is &lt;2.5.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121322" version="1" comment="ruby2.1-rubygem-mail-doc-2_5 is &lt;2.5.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121323" version="1" comment="rubygem-mail is &lt;2.5.4-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121324" version="1" comment="rubygem-mail-2_4 is &lt;2.4.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121325" version="1" comment="rubygem-mail-2_4-doc is &lt;2.4.4-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121326" version="1" comment="rubygem-mail-2_5 is &lt;2.5.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121327" version="1" comment="rubygem-mail-doc is &lt;2.5.4-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144696" version="1" comment="shellinabox is &lt;2.20-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145716" version="1" comment="apache2-mod_php5 is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145717" version="1" comment="php5 is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145718" version="1" comment="php5-bcmath is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145719" version="1" comment="php5-bz2 is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145720" version="1" comment="php5-calendar is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145721" version="1" comment="php5-ctype is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145722" version="1" comment="php5-curl is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145723" version="1" comment="php5-dba is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145724" version="1" comment="php5-devel is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145725" version="1" comment="php5-dom is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145726" version="1" comment="php5-enchant is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145727" version="1" comment="php5-exif is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145728" version="1" comment="php5-fastcgi is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145729" version="1" comment="php5-fileinfo is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145730" version="1" comment="php5-firebird is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145731" version="1" comment="php5-fpm is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145732" version="1" comment="php5-ftp is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145733" version="1" comment="php5-gd is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145734" version="1" comment="php5-gettext is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145735" version="1" comment="php5-gmp is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145736" version="1" comment="php5-iconv is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145737" version="1" comment="php5-imap is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145738" version="1" comment="php5-intl is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145739" version="1" comment="php5-json is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145740" version="1" comment="php5-ldap is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145741" version="1" comment="php5-mbstring is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145742" version="1" comment="php5-mcrypt is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145743" version="1" comment="php5-mssql is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145744" version="1" comment="php5-mysql is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145745" version="1" comment="php5-odbc is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145746" version="1" comment="php5-opcache is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145747" version="1" comment="php5-openssl is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145748" version="1" comment="php5-pcntl is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145749" version="1" comment="php5-pdo is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145750" version="1" comment="php5-pear is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145751" version="1" comment="php5-pgsql is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145752" version="1" comment="php5-phar is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145753" version="1" comment="php5-posix is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145754" version="1" comment="php5-pspell is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145755" version="1" comment="php5-readline is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145756" version="1" comment="php5-shmop is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145757" version="1" comment="php5-snmp is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145758" version="1" comment="php5-soap is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145759" version="1" comment="php5-sockets is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145760" version="1" comment="php5-sqlite is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145761" version="1" comment="php5-suhosin is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145762" version="1" comment="php5-sysvmsg is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145763" version="1" comment="php5-sysvsem is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145764" version="1" comment="php5-sysvshm is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145765" version="1" comment="php5-tidy is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145766" version="1" comment="php5-tokenizer is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145767" version="1" comment="php5-wddx is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145768" version="1" comment="php5-xmlreader is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145769" version="1" comment="php5-xmlrpc is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145770" version="1" comment="php5-xmlwriter is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145771" version="1" comment="php5-xsl is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145772" version="1" comment="php5-zip is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145773" version="1" comment="php5-zlib is &lt;5.6.1-89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122885" version="1" comment="phpMyAdmin is &lt;4.4.15.4-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145774" version="1" comment="gd is &lt;2.1.0-7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145775" version="1" comment="gd-devel is &lt;2.1.0-7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145776" version="1" comment="libgd3 is &lt;2.1.0-7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145777" version="1" comment="libgd3-32bit is &lt;2.1.0-7.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145778" version="1" comment="GraphicsMagick is &lt;1.3.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145779" version="1" comment="GraphicsMagick-devel is &lt;1.3.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145780" version="1" comment="libGraphicsMagick++-Q16-11 is &lt;1.3.21-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145781" version="1" comment="libGraphicsMagick++-Q16-12 is &lt;1.3.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145782" version="1" comment="libGraphicsMagick++-Q16-3 is &lt;1.3.20-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145783" version="1" comment="libGraphicsMagick++-devel is &lt;1.3.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145784" version="1" comment="libGraphicsMagick-Q16-3 is &lt;1.3.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145785" version="1" comment="libGraphicsMagick3-config is &lt;1.3.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145786" version="1" comment="libGraphicsMagickWand-Q16-2 is &lt;1.3.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145787" version="1" comment="perl-GraphicsMagick is &lt;1.3.25-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145788" version="1" comment="ImageMagick is &lt;6.8.9.8-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145789" version="1" comment="ImageMagick-devel is &lt;6.8.9.8-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145790" version="1" comment="ImageMagick-devel-32bit is &lt;6.8.9.8-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145791" version="1" comment="ImageMagick-doc is &lt;6.8.9.8-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145792" version="1" comment="ImageMagick-extra is &lt;6.8.9.8-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145793" version="1" comment="libMagick++-6_Q16-5 is &lt;6.8.9.8-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145794" version="1" comment="libMagick++-6_Q16-5-32bit is &lt;6.8.9.8-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145795" version="1" comment="libMagick++-devel is &lt;6.8.9.8-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145796" version="1" comment="libMagick++-devel-32bit is &lt;6.8.9.8-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145797" version="1" comment="libMagickCore-6_Q16-2 is &lt;6.8.9.8-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145798" version="1" comment="libMagickCore-6_Q16-2-32bit is &lt;6.8.9.8-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145799" version="1" comment="libMagickWand-6_Q16-2 is &lt;6.8.9.8-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145800" version="1" comment="libMagickWand-6_Q16-2-32bit is &lt;6.8.9.8-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145801" version="1" comment="perl-PerlMagick is &lt;6.8.9.8-45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145994" version="1" comment="tor is &lt;0.2.7.6-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122886" version="1" comment="curl is &lt;7.42.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122887" version="1" comment="libcurl-devel is &lt;7.42.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122888" version="1" comment="libcurl-devel-32bit is &lt;7.42.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122889" version="1" comment="libcurl4 is &lt;7.42.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122890" version="1" comment="libcurl4-32bit is &lt;7.42.1-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146167" version="1" comment="MozillaThunderbird is &lt;45.6.0-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146168" version="1" comment="MozillaThunderbird-buildsymbols is &lt;45.6.0-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146169" version="1" comment="MozillaThunderbird-devel is &lt;45.6.0-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146170" version="1" comment="MozillaThunderbird-translations-common is &lt;45.6.0-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146171" version="1" comment="MozillaThunderbird-translations-other is &lt;45.6.0-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122891" version="1" comment="libopenssl-devel is &lt;1.0.1k-2.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122892" version="1" comment="libopenssl-devel-32bit is &lt;1.0.1k-2.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122893" version="1" comment="libopenssl1_0_0 is &lt;1.0.1k-2.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122894" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1k-2.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122895" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1k-2.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122896" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1k-2.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122897" version="1" comment="openssl is &lt;1.0.1k-2.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122898" version="1" comment="openssl-doc is &lt;1.0.1k-2.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122899" version="1" comment="rubygem-actionpack-3_2 is &lt;3.2.17-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122900" version="1" comment="rubygem-actionpack-3_2-doc is &lt;3.2.17-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122901" version="1" comment="rubygem-activerecord-3_2 is &lt;3.2.17-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122902" version="1" comment="rubygem-activerecord-3_2-doc is &lt;3.2.17-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122903" version="1" comment="rubygem-activesupport-3_2 is &lt;3.2.17-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122904" version="1" comment="rubygem-activesupport-3_2-doc is &lt;3.2.17-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122905" version="1" comment="libmysql56client18 is &lt;5.6.28-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122906" version="1" comment="libmysql56client18-32bit is &lt;5.6.28-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122907" version="1" comment="libmysql56client_r18 is &lt;5.6.28-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122908" version="1" comment="libmysql56client_r18-32bit is &lt;5.6.28-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122909" version="1" comment="mysql-community-server is &lt;5.6.28-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122910" version="1" comment="mysql-community-server-bench is &lt;5.6.28-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122911" version="1" comment="mysql-community-server-client is &lt;5.6.28-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122912" version="1" comment="mysql-community-server-errormessages is &lt;5.6.28-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122913" version="1" comment="mysql-community-server-test is &lt;5.6.28-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122914" version="1" comment="mysql-community-server-tools is &lt;5.6.28-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123151" version="1" comment="libmysqlclient-devel is &lt;10.0.22-2.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123152" version="1" comment="libmysqlclient18 is &lt;10.0.22-2.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123153" version="1" comment="libmysqlclient18-32bit is &lt;10.0.22-2.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123154" version="1" comment="libmysqlclient_r18 is &lt;10.0.22-2.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123155" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.22-2.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123156" version="1" comment="libmysqld-devel is &lt;10.0.22-2.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123157" version="1" comment="libmysqld18 is &lt;10.0.22-2.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123158" version="1" comment="mariadb is &lt;10.0.22-2.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123159" version="1" comment="mariadb-bench is &lt;10.0.22-2.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123160" version="1" comment="mariadb-client is &lt;10.0.22-2.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123161" version="1" comment="mariadb-errormessages is &lt;10.0.22-2.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123162" version="1" comment="mariadb-test is &lt;10.0.22-2.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123163" version="1" comment="mariadb-tools is &lt;10.0.22-2.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123197" version="1" comment="libtiff-devel is &lt;4.0.6-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123198" version="1" comment="libtiff-devel-32bit is &lt;4.0.6-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123199" version="1" comment="libtiff5 is &lt;4.0.6-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123200" version="1" comment="libtiff5-32bit is &lt;4.0.6-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123201" version="1" comment="tiff is &lt;4.0.6-10.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123202" version="1" comment="jasper is &lt;1.900.1-163.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123203" version="1" comment="libjasper-devel is &lt;1.900.1-163.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123204" version="1" comment="libjasper1 is &lt;1.900.1-163.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123205" version="1" comment="libjasper1-32bit is &lt;1.900.1-163.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123206" version="1" comment="krb5 is &lt;1.12.2-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123207" version="1" comment="krb5-32bit is &lt;1.12.2-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123208" version="1" comment="krb5-client is &lt;1.12.2-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123209" version="1" comment="krb5-devel is &lt;1.12.2-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123210" version="1" comment="krb5-devel-32bit is &lt;1.12.2-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123211" version="1" comment="krb5-doc is &lt;1.12.2-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123212" version="1" comment="krb5-mini is &lt;1.12.2-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123213" version="1" comment="krb5-mini-devel is &lt;1.12.2-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123214" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.2-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123215" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.2-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123216" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.2-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123217" version="1" comment="krb5-server is &lt;1.12.2-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123218" version="1" comment="flash-player is &lt;11.2.202.569-2.88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123219" version="1" comment="flash-player-gnome is &lt;11.2.202.569-2.88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123220" version="1" comment="flash-player-kde4 is &lt;11.2.202.569-2.88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123266" version="1" comment="cacti is &lt;0.8.8f-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123267" version="1" comment="cacti-spine is &lt;0.8.8f-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123291" version="1" comment="libhogweed2 is &lt;2.7.1-6.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123292" version="1" comment="libhogweed2-32bit is &lt;2.7.1-6.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123293" version="1" comment="libnettle is &lt;2.7.1-6.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123294" version="1" comment="libnettle-devel is &lt;2.7.1-6.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123295" version="1" comment="libnettle-devel-32bit is &lt;2.7.1-6.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123296" version="1" comment="libnettle4 is &lt;2.7.1-6.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123297" version="1" comment="libnettle4-32bit is &lt;2.7.1-6.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123298" version="1" comment="nettle is &lt;2.7.1-6.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123299" version="1" comment="claws-mail is &lt;3.12.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123300" version="1" comment="claws-mail-devel is &lt;3.12.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123301" version="1" comment="claws-mail-lang is &lt;3.12.0-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123302" version="1" comment="socat is &lt;1.7.3.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123322" version="1" comment="chromedriver is &lt;48.0.2564.109-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123323" version="1" comment="chromium is &lt;48.0.2564.109-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123324" version="1" comment="chromium-desktop-gnome is &lt;48.0.2564.109-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123325" version="1" comment="chromium-desktop-kde is &lt;48.0.2564.109-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123326" version="1" comment="chromium-ffmpegsumo is &lt;48.0.2564.109-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123327" version="1" comment="MozillaThunderbird is &lt;38.6.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123328" version="1" comment="MozillaThunderbird-buildsymbols is &lt;38.6.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123329" version="1" comment="MozillaThunderbird-devel is &lt;38.6.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123330" version="1" comment="MozillaThunderbird-translations-common is &lt;38.6.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123331" version="1" comment="MozillaThunderbird-translations-other is &lt;38.6.0-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123332" version="1" comment="MozillaFirefox is &lt;44.0.2-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123333" version="1" comment="MozillaFirefox-branding-upstream is &lt;44.0.2-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123334" version="1" comment="MozillaFirefox-buildsymbols is &lt;44.0.2-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123335" version="1" comment="MozillaFirefox-devel is &lt;44.0.2-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123336" version="1" comment="MozillaFirefox-translations-common is &lt;44.0.2-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123337" version="1" comment="MozillaFirefox-translations-other is &lt;44.0.2-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123373" version="1" comment="glibc is &lt;2.19-16.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123374" version="1" comment="glibc-32bit is &lt;2.19-16.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123375" version="1" comment="glibc-devel is &lt;2.19-16.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123376" version="1" comment="glibc-devel-32bit is &lt;2.19-16.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123377" version="1" comment="glibc-devel-static is &lt;2.19-16.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123378" version="1" comment="glibc-devel-static-32bit is &lt;2.19-16.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123379" version="1" comment="glibc-extra is &lt;2.19-16.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123380" version="1" comment="glibc-html is &lt;2.19-16.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123381" version="1" comment="glibc-i18ndata is &lt;2.19-16.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123382" version="1" comment="glibc-info is &lt;2.19-16.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123383" version="1" comment="glibc-locale is &lt;2.19-16.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123384" version="1" comment="glibc-locale-32bit is &lt;2.19-16.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123385" version="1" comment="glibc-obsolete is &lt;2.19-16.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123386" version="1" comment="glibc-profile is &lt;2.19-16.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123387" version="1" comment="glibc-profile-32bit is &lt;2.19-16.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123388" version="1" comment="glibc-testsuite is &lt;2.19-16.22.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123389" version="1" comment="glibc-utils is &lt;2.19-16.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123390" version="1" comment="glibc-utils-32bit is &lt;2.19-16.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123391" version="1" comment="nscd is &lt;2.19-16.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123444" version="1" comment="chromedriver is &lt;48.0.2564.116-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123445" version="1" comment="chromium is &lt;48.0.2564.116-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123446" version="1" comment="chromium-desktop-gnome is &lt;48.0.2564.116-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123447" version="1" comment="chromium-desktop-kde is &lt;48.0.2564.116-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123448" version="1" comment="chromium-ffmpegsumo is &lt;48.0.2564.116-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123495" version="1" comment="xdelta3 is &lt;3.0.8-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123496" version="1" comment="erlang is &lt;17.1-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123497" version="1" comment="erlang-debugger is &lt;17.1-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123498" version="1" comment="erlang-debugger-src is &lt;17.1-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123499" version="1" comment="erlang-dialyzer is &lt;17.1-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123500" version="1" comment="erlang-dialyzer-src is &lt;17.1-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123501" version="1" comment="erlang-doc is &lt;17.1-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123502" version="1" comment="erlang-epmd is &lt;17.1-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123503" version="1" comment="erlang-et is &lt;17.1-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123504" version="1" comment="erlang-et-src is &lt;17.1-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123505" version="1" comment="erlang-gs is &lt;17.1-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123506" version="1" comment="erlang-gs-src is &lt;17.1-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123507" version="1" comment="erlang-jinterface is &lt;17.1-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123508" version="1" comment="erlang-jinterface-src is &lt;17.1-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123509" version="1" comment="erlang-observer is &lt;17.1-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123510" version="1" comment="erlang-observer-src is &lt;17.1-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123511" version="1" comment="erlang-reltool is &lt;17.1-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123512" version="1" comment="erlang-reltool-src is &lt;17.1-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123513" version="1" comment="erlang-src is &lt;17.1-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123514" version="1" comment="erlang-wx is &lt;17.1-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123515" version="1" comment="erlang-wx-src is &lt;17.1-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123478" version="1" comment="obs-service-download_files is &lt;0.5.1.git.1455712026.9c0a4a0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123479" version="1" comment="obs-service-extract_file is &lt;0.3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123480" version="1" comment="obs-service-recompress is &lt;0.3.1+git20160217.7897d3f-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123481" version="1" comment="obs-service-source_validator is &lt;0.6+git20160218.73d6618-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123482" version="1" comment="obs-service-verify_file is &lt;0.1.1-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123516" version="1" comment="libecpg6 is &lt;9.3.11-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123517" version="1" comment="libecpg6-32bit is &lt;9.3.11-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123518" version="1" comment="libpq5 is &lt;9.3.11-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123519" version="1" comment="libpq5-32bit is &lt;9.3.11-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123633" version="1" comment="postgresql-init is &lt;9.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123634" version="1" comment="postgresql93 is &lt;9.3.11-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123635" version="1" comment="postgresql93-contrib is &lt;9.3.11-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123636" version="1" comment="postgresql93-devel is &lt;9.3.11-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123637" version="1" comment="postgresql93-docs is &lt;9.3.11-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123638" version="1" comment="postgresql93-libs is &lt;9.3.11-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123639" version="1" comment="postgresql93-plperl is &lt;9.3.11-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123640" version="1" comment="postgresql93-plpython is &lt;9.3.11-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123641" version="1" comment="postgresql93-pltcl is &lt;9.3.11-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123642" version="1" comment="postgresql93-server is &lt;9.3.11-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123643" version="1" comment="postgresql93-test is &lt;9.3.11-3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123530" version="1" comment="bbswitch is &lt;0.8-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123531" version="1" comment="bbswitch-kmp-default is &lt;0.8_k3.16.7_35-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123532" version="1" comment="bbswitch-kmp-desktop is &lt;0.8_k3.16.7_35-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123533" version="1" comment="bbswitch-kmp-pae is &lt;0.8_k3.16.7_35-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123534" version="1" comment="bbswitch-kmp-xen is &lt;0.8_k3.16.7_35-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123535" version="1" comment="cloop is &lt;2.639-14.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123536" version="1" comment="cloop-kmp-default is &lt;2.639_k3.16.7_35-14.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123537" version="1" comment="cloop-kmp-desktop is &lt;2.639_k3.16.7_35-14.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123538" version="1" comment="cloop-kmp-pae is &lt;2.639_k3.16.7_35-14.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123539" version="1" comment="cloop-kmp-xen is &lt;2.639_k3.16.7_35-14.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123540" version="1" comment="crash is &lt;7.0.8-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123541" version="1" comment="crash-devel is &lt;7.0.8-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123542" version="1" comment="crash-doc is &lt;7.0.8-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123543" version="1" comment="crash-eppic is &lt;7.0.8-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123544" version="1" comment="crash-gcore is &lt;7.0.8-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123545" version="1" comment="crash-kmp-default is &lt;7.0.8_k3.16.7_35-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123546" version="1" comment="crash-kmp-desktop is &lt;7.0.8_k3.16.7_35-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123547" version="1" comment="crash-kmp-pae is &lt;7.0.8_k3.16.7_35-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123548" version="1" comment="crash-kmp-xen is &lt;7.0.8_k3.16.7_35-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123549" version="1" comment="hdjmod is &lt;1.28-18.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123550" version="1" comment="hdjmod-kmp-default is &lt;1.28_k3.16.7_35-18.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123551" version="1" comment="hdjmod-kmp-desktop is &lt;1.28_k3.16.7_35-18.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123552" version="1" comment="hdjmod-kmp-pae is &lt;1.28_k3.16.7_35-18.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123553" version="1" comment="hdjmod-kmp-xen is &lt;1.28_k3.16.7_35-18.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123554" version="1" comment="ipset is &lt;6.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123555" version="1" comment="ipset-devel is &lt;6.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123556" version="1" comment="ipset-kmp-default is &lt;6.23_k3.16.7_35-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123557" version="1" comment="ipset-kmp-desktop is &lt;6.23_k3.16.7_35-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123558" version="1" comment="ipset-kmp-pae is &lt;6.23_k3.16.7_35-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123559" version="1" comment="ipset-kmp-xen is &lt;6.23_k3.16.7_35-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123560" version="1" comment="kernel-debug is &lt;3.16.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123561" version="1" comment="kernel-debug-base is &lt;3.16.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123562" version="1" comment="kernel-debug-devel is &lt;3.16.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123563" version="1" comment="kernel-default is &lt;3.16.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123564" version="1" comment="kernel-default-base is &lt;3.16.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123565" version="1" comment="kernel-default-devel is &lt;3.16.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123566" version="1" comment="kernel-desktop is &lt;3.16.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123567" version="1" comment="kernel-desktop-base is &lt;3.16.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123568" version="1" comment="kernel-desktop-devel is &lt;3.16.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123569" version="1" comment="kernel-devel is &lt;3.16.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123570" version="1" comment="kernel-docs is &lt;3.16.7-35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123571" version="1" comment="kernel-ec2 is &lt;3.16.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123572" version="1" comment="kernel-ec2-base is &lt;3.16.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123573" version="1" comment="kernel-ec2-devel is &lt;3.16.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123574" version="1" comment="kernel-macros is &lt;3.16.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123575" version="1" comment="kernel-obs-build is &lt;3.16.7-35.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123576" version="1" comment="kernel-obs-qa is &lt;3.16.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123577" version="1" comment="kernel-obs-qa-xen is &lt;3.16.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123578" version="1" comment="kernel-pae is &lt;3.16.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123579" version="1" comment="kernel-pae-base is &lt;3.16.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123580" version="1" comment="kernel-pae-devel is &lt;3.16.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123581" version="1" comment="kernel-source is &lt;3.16.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123582" version="1" comment="kernel-source-vanilla is &lt;3.16.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123583" version="1" comment="kernel-syms is &lt;3.16.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123584" version="1" comment="kernel-vanilla is &lt;3.16.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032883"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123585" version="1" comment="kernel-vanilla-devel is &lt;3.16.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123586" version="1" comment="kernel-xen is &lt;3.16.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123587" version="1" comment="kernel-xen-base is &lt;3.16.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123588" version="1" comment="kernel-xen-devel is &lt;3.16.7-35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123589" version="1" comment="libipset3 is &lt;6.23-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123590" version="1" comment="pcfclock is &lt;0.44-260.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123591" version="1" comment="pcfclock-kmp-default is &lt;0.44_k3.16.7_35-260.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123592" version="1" comment="pcfclock-kmp-desktop is &lt;0.44_k3.16.7_35-260.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123593" version="1" comment="pcfclock-kmp-pae is &lt;0.44_k3.16.7_35-260.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123594" version="1" comment="python-virtualbox is &lt;4.3.36-43.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123595" version="1" comment="vhba-kmp is &lt;20140629-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123596" version="1" comment="vhba-kmp-default is &lt;20140629_k3.16.7_35-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123597" version="1" comment="vhba-kmp-desktop is &lt;20140629_k3.16.7_35-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123598" version="1" comment="vhba-kmp-pae is &lt;20140629_k3.16.7_35-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123599" version="1" comment="vhba-kmp-xen is &lt;20140629_k3.16.7_35-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123600" version="1" comment="virtualbox is &lt;4.3.36-43.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123601" version="1" comment="virtualbox-devel is &lt;4.3.36-43.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123602" version="1" comment="virtualbox-guest-desktop-icons is &lt;4.3.36-43.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123603" version="1" comment="virtualbox-guest-kmp-default is &lt;4.3.36_k3.16.7_35-43.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123604" version="1" comment="virtualbox-guest-kmp-desktop is &lt;4.3.36_k3.16.7_35-43.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123605" version="1" comment="virtualbox-guest-kmp-pae is &lt;4.3.36_k3.16.7_35-43.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123606" version="1" comment="virtualbox-guest-tools is &lt;4.3.36-43.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123607" version="1" comment="virtualbox-guest-x11 is &lt;4.3.36-43.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123608" version="1" comment="virtualbox-host-kmp-default is &lt;4.3.36_k3.16.7_35-43.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123609" version="1" comment="virtualbox-host-kmp-desktop is &lt;4.3.36_k3.16.7_35-43.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123610" version="1" comment="virtualbox-host-kmp-pae is &lt;4.3.36_k3.16.7_35-43.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123611" version="1" comment="virtualbox-host-source is &lt;4.3.36-43.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123612" version="1" comment="virtualbox-qt is &lt;4.3.36-43.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123613" version="1" comment="virtualbox-websrv is &lt;4.3.36-43.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123614" version="1" comment="xen is &lt;4.4.3_08-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123615" version="1" comment="xen-devel is &lt;4.4.3_08-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123616" version="1" comment="xen-doc-html is &lt;4.4.3_08-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123617" version="1" comment="xen-kmp-default is &lt;4.4.3_08_k3.16.7_35-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123618" version="1" comment="xen-kmp-desktop is &lt;4.4.3_08_k3.16.7_35-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123619" version="1" comment="xen-libs is &lt;4.4.3_08-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123620" version="1" comment="xen-libs-32bit is &lt;4.4.3_08-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123621" version="1" comment="xen-tools is &lt;4.4.3_08-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123622" version="1" comment="xen-tools-domU is &lt;4.4.3_08-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123623" version="1" comment="xtables-addons is &lt;2.6-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123624" version="1" comment="xtables-addons-kmp-default is &lt;2.6_k3.16.7_35-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123625" version="1" comment="xtables-addons-kmp-desktop is &lt;2.6_k3.16.7_35-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123626" version="1" comment="xtables-addons-kmp-pae is &lt;2.6_k3.16.7_35-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123627" version="1" comment="xtables-addons-kmp-xen is &lt;2.6_k3.16.7_35-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123695" version="1" comment="gummi is &lt;0.7.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123696" version="1" comment="gummi-lang is &lt;0.7.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123697" version="1" comment="libgcrypt is &lt;1.6.1-8.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123698" version="1" comment="libgcrypt-cavs is &lt;1.6.1-8.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123699" version="1" comment="libgcrypt-devel is &lt;1.6.1-8.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123700" version="1" comment="libgcrypt-devel-32bit is &lt;1.6.1-8.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123701" version="1" comment="libgcrypt20 is &lt;1.6.1-8.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123702" version="1" comment="libgcrypt20-32bit is &lt;1.6.1-8.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123703" version="1" comment="libgcrypt20-hmac is &lt;1.6.1-8.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123704" version="1" comment="libgcrypt20-hmac-32bit is &lt;1.6.1-8.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123705" version="1" comment="cmis-client is &lt;0.5.0-4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123706" version="1" comment="libcmis-0_5-5 is &lt;0.5.0-4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123707" version="1" comment="libcmis-c-0_5-5 is &lt;0.5.0-4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123708" version="1" comment="libcmis-c-devel is &lt;0.5.0-4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123709" version="1" comment="libcmis-devel is &lt;0.5.0-4.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123710" version="1" comment="libetonyek is &lt;0.1.3-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123711" version="1" comment="libetonyek-0_1-1 is &lt;0.1.3-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123712" version="1" comment="libetonyek-devel is &lt;0.1.3-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123713" version="1" comment="libetonyek-devel-doc is &lt;0.1.3-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123714" version="1" comment="libetonyek-tools is &lt;0.1.3-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123715" version="1" comment="libmwaw is &lt;0.3.6-2.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123716" version="1" comment="libmwaw-0_3-3 is &lt;0.3.6-2.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123717" version="1" comment="libmwaw-devel is &lt;0.3.6-2.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123718" version="1" comment="libmwaw-devel-doc is &lt;0.3.6-2.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123719" version="1" comment="libmwaw-tools is &lt;0.3.6-2.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123720" version="1" comment="libodfgen is &lt;0.1.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123721" version="1" comment="libodfgen-0_1-1 is &lt;0.1.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123722" version="1" comment="libodfgen-devel is &lt;0.1.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123723" version="1" comment="libodfgen-devel-doc is &lt;0.1.4-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123724" version="1" comment="libpagemaker is &lt;0.0.2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123725" version="1" comment="libpagemaker-0_0-0 is &lt;0.0.2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123726" version="1" comment="libpagemaker-devel is &lt;0.0.2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123727" version="1" comment="libpagemaker-devel-doc is &lt;0.0.2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123728" version="1" comment="libpagemaker-tools is &lt;0.0.2-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123729" version="1" comment="libreoffice is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123730" version="1" comment="libreoffice-base is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123731" version="1" comment="libreoffice-base-drivers-mysql is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123732" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123733" version="1" comment="libreoffice-branding-upstream is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123734" version="1" comment="libreoffice-calc is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123735" version="1" comment="libreoffice-calc-extensions is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123736" version="1" comment="libreoffice-draw is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123737" version="1" comment="libreoffice-filters-optional is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123738" version="1" comment="libreoffice-gnome is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123739" version="1" comment="libreoffice-gtk3 is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123740" version="1" comment="libreoffice-icon-theme-breeze is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123741" version="1" comment="libreoffice-icon-theme-galaxy is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123742" version="1" comment="libreoffice-icon-theme-hicontrast is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123743" version="1" comment="libreoffice-icon-theme-oxygen is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123744" version="1" comment="libreoffice-icon-theme-sifr is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123745" version="1" comment="libreoffice-icon-theme-tango is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123746" version="1" comment="libreoffice-impress is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123747" version="1" comment="libreoffice-kde4 is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123748" version="1" comment="libreoffice-l10n-af is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123749" version="1" comment="libreoffice-l10n-ar is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123750" version="1" comment="libreoffice-l10n-as is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123751" version="1" comment="libreoffice-l10n-bg is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123752" version="1" comment="libreoffice-l10n-bn is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123753" version="1" comment="libreoffice-l10n-br is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123754" version="1" comment="libreoffice-l10n-ca is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123755" version="1" comment="libreoffice-l10n-cs is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123756" version="1" comment="libreoffice-l10n-cy is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123757" version="1" comment="libreoffice-l10n-da is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123758" version="1" comment="libreoffice-l10n-de is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123759" version="1" comment="libreoffice-l10n-dz is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123760" version="1" comment="libreoffice-l10n-el is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123761" version="1" comment="libreoffice-l10n-en is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123762" version="1" comment="libreoffice-l10n-es is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123763" version="1" comment="libreoffice-l10n-et is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123764" version="1" comment="libreoffice-l10n-eu is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123765" version="1" comment="libreoffice-l10n-fa is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123766" version="1" comment="libreoffice-l10n-fi is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123767" version="1" comment="libreoffice-l10n-fr is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123768" version="1" comment="libreoffice-l10n-ga is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123769" version="1" comment="libreoffice-l10n-gl is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123770" version="1" comment="libreoffice-l10n-gu is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123771" version="1" comment="libreoffice-l10n-he is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123772" version="1" comment="libreoffice-l10n-hi is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123773" version="1" comment="libreoffice-l10n-hr is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123774" version="1" comment="libreoffice-l10n-hu is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123775" version="1" comment="libreoffice-l10n-it is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123776" version="1" comment="libreoffice-l10n-ja is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123777" version="1" comment="libreoffice-l10n-kk is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123778" version="1" comment="libreoffice-l10n-kn is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123779" version="1" comment="libreoffice-l10n-ko is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123780" version="1" comment="libreoffice-l10n-lt is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123781" version="1" comment="libreoffice-l10n-lv is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123782" version="1" comment="libreoffice-l10n-mai is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123783" version="1" comment="libreoffice-l10n-ml is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123784" version="1" comment="libreoffice-l10n-mr is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123785" version="1" comment="libreoffice-l10n-nb is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123786" version="1" comment="libreoffice-l10n-nl is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123787" version="1" comment="libreoffice-l10n-nn is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123788" version="1" comment="libreoffice-l10n-nr is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123789" version="1" comment="libreoffice-l10n-nso is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123790" version="1" comment="libreoffice-l10n-or is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123791" version="1" comment="libreoffice-l10n-pa is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123792" version="1" comment="libreoffice-l10n-pl is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123793" version="1" comment="libreoffice-l10n-pt-BR is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123794" version="1" comment="libreoffice-l10n-pt-PT is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123795" version="1" comment="libreoffice-l10n-ro is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123796" version="1" comment="libreoffice-l10n-ru is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123797" version="1" comment="libreoffice-l10n-si is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123798" version="1" comment="libreoffice-l10n-sk is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123799" version="1" comment="libreoffice-l10n-sl is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123800" version="1" comment="libreoffice-l10n-sr is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123801" version="1" comment="libreoffice-l10n-ss is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123802" version="1" comment="libreoffice-l10n-st is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123803" version="1" comment="libreoffice-l10n-sv is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123804" version="1" comment="libreoffice-l10n-ta is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123805" version="1" comment="libreoffice-l10n-te is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123806" version="1" comment="libreoffice-l10n-th is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123807" version="1" comment="libreoffice-l10n-tn is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123808" version="1" comment="libreoffice-l10n-tr is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123809" version="1" comment="libreoffice-l10n-ts is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123810" version="1" comment="libreoffice-l10n-uk is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123811" version="1" comment="libreoffice-l10n-ve is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123812" version="1" comment="libreoffice-l10n-xh is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123813" version="1" comment="libreoffice-l10n-zh-Hans is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123814" version="1" comment="libreoffice-l10n-zh-Hant is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123815" version="1" comment="libreoffice-l10n-zu is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123816" version="1" comment="libreoffice-mailmerge is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123817" version="1" comment="libreoffice-math is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123818" version="1" comment="libreoffice-officebean is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123819" version="1" comment="libreoffice-pyuno is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123820" version="1" comment="libreoffice-sdk is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123821" version="1" comment="libreoffice-sdk-doc is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123822" version="1" comment="libreoffice-share-linker is &lt;1-2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123823" version="1" comment="libreoffice-writer is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123824" version="1" comment="libreoffice-writer-extensions is &lt;5.0.4.2-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123825" version="1" comment="libwps is &lt;0.4.1-2.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123826" version="1" comment="libwps-0_4-4 is &lt;0.4.1-2.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123827" version="1" comment="libwps-devel is &lt;0.4.1-2.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123828" version="1" comment="libwps-tools is &lt;0.4.1-2.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123829" version="1" comment="mdds is &lt;0.12.1-2.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123830" version="1" comment="mdds-devel is &lt;0.12.1-2.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123846" version="1" comment="dhcp is &lt;4.2.6-9.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123847" version="1" comment="dhcp-client is &lt;4.2.6-9.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123848" version="1" comment="dhcp-devel is &lt;4.2.6-9.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123849" version="1" comment="dhcp-doc is &lt;4.2.6-9.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123850" version="1" comment="dhcp-relay is &lt;4.2.6-9.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123851" version="1" comment="dhcp-server is &lt;4.2.6-9.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123852" version="1" comment="bouncycastle is &lt;1.54-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123853" version="1" comment="bouncycastle-javadoc is &lt;1.54-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123854" version="1" comment="nodejs is &lt;4.3.1-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123855" version="1" comment="nodejs-devel is &lt;4.3.1-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123856" version="1" comment="nodejs-doc is &lt;4.3.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123857" version="1" comment="nodejs-docs is &lt;4.3.1-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123858" version="1" comment="npm is &lt;4.3.1-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124389" version="1" comment="libopenssl-devel is &lt;1.0.1k-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124390" version="1" comment="libopenssl-devel-32bit is &lt;1.0.1k-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124391" version="1" comment="libopenssl1_0_0 is &lt;1.0.1k-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124392" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1k-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124393" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1k-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124394" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1k-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124395" version="1" comment="openssl is &lt;1.0.1k-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124396" version="1" comment="openssl-doc is &lt;1.0.1k-2.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124409" version="1" comment="libopenssl0_9_8 is &lt;0.9.8zh-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124410" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8zh-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124411" version="1" comment="libssh2-1 is &lt;1.5.0-9.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124412" version="1" comment="libssh2-1-32bit is &lt;1.5.0-9.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124413" version="1" comment="libssh2-devel is &lt;1.5.0-9.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124414" version="1" comment="libssh2_org is &lt;1.5.0-9.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124415" version="1" comment="eog is &lt;3.16.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124416" version="1" comment="eog-devel is &lt;3.16.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124417" version="1" comment="eog-lang is &lt;3.16.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124423" version="1" comment="pigz is &lt;2.3-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124447" version="1" comment="wireshark is &lt;1.12.10-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124448" version="1" comment="wireshark-devel is &lt;1.12.10-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124449" version="1" comment="wireshark-ui-gtk is &lt;1.12.10-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124450" version="1" comment="wireshark-ui-qt is &lt;1.12.10-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124456" version="1" comment="phpMyAdmin is &lt;4.4.15.5-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124494" version="1" comment="libotr is &lt;4.1.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124495" version="1" comment="libotr-devel is &lt;4.1.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124496" version="1" comment="libotr-tools is &lt;4.1.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124497" version="1" comment="libotr2 is &lt;3.2.1-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124498" version="1" comment="libotr2-devel is &lt;3.2.1-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124499" version="1" comment="libotr2-tools is &lt;3.2.1-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124500" version="1" comment="libotr5 is &lt;4.1.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124528" version="1" comment="apache2-mod_php5 is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124529" version="1" comment="php5 is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124530" version="1" comment="php5-bcmath is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124531" version="1" comment="php5-bz2 is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124532" version="1" comment="php5-calendar is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124533" version="1" comment="php5-ctype is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124534" version="1" comment="php5-curl is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124535" version="1" comment="php5-dba is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124536" version="1" comment="php5-devel is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124537" version="1" comment="php5-dom is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124538" version="1" comment="php5-enchant is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124539" version="1" comment="php5-exif is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124540" version="1" comment="php5-fastcgi is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124541" version="1" comment="php5-fileinfo is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124542" version="1" comment="php5-firebird is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124543" version="1" comment="php5-fpm is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124544" version="1" comment="php5-ftp is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124545" version="1" comment="php5-gd is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124546" version="1" comment="php5-gettext is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124547" version="1" comment="php5-gmp is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124548" version="1" comment="php5-iconv is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124549" version="1" comment="php5-imap is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124550" version="1" comment="php5-intl is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124551" version="1" comment="php5-json is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124552" version="1" comment="php5-ldap is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124553" version="1" comment="php5-mbstring is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124554" version="1" comment="php5-mcrypt is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124555" version="1" comment="php5-mssql is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124556" version="1" comment="php5-mysql is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124557" version="1" comment="php5-odbc is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124558" version="1" comment="php5-opcache is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124559" version="1" comment="php5-openssl is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124560" version="1" comment="php5-pcntl is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124561" version="1" comment="php5-pdo is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124562" version="1" comment="php5-pear is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124563" version="1" comment="php5-pgsql is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124564" version="1" comment="php5-phar is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124565" version="1" comment="php5-posix is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124566" version="1" comment="php5-pspell is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124567" version="1" comment="php5-readline is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124568" version="1" comment="php5-shmop is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124569" version="1" comment="php5-snmp is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124570" version="1" comment="php5-soap is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124571" version="1" comment="php5-sockets is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124572" version="1" comment="php5-sqlite is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124573" version="1" comment="php5-suhosin is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124574" version="1" comment="php5-sysvmsg is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124575" version="1" comment="php5-sysvsem is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124576" version="1" comment="php5-sysvshm is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124577" version="1" comment="php5-tidy is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124578" version="1" comment="php5-tokenizer is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124579" version="1" comment="php5-wddx is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124580" version="1" comment="php5-xmlreader is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124581" version="1" comment="php5-xmlrpc is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124582" version="1" comment="php5-xmlwriter is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124583" version="1" comment="php5-xsl is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124584" version="1" comment="php5-zip is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124585" version="1" comment="php5-zlib is &lt;5.6.1-42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124586" version="1" comment="openvpn is &lt;2.3.4-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124587" version="1" comment="openvpn-auth-pam-plugin is &lt;2.3.4-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124588" version="1" comment="openvpn-down-root-plugin is &lt;2.3.4-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124625" version="1" comment="flash-player is &lt;11.2.202.577-2.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124626" version="1" comment="flash-player-gnome is &lt;11.2.202.577-2.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124627" version="1" comment="flash-player-kde4 is &lt;11.2.202.577-2.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124628" version="1" comment="exim is &lt;4.86.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124629" version="1" comment="eximon is &lt;4.86.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124630" version="1" comment="eximstats-html is &lt;4.86.2-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121400" version="1" comment="python-rsa is &lt;3.1.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124631" version="1" comment="chromedriver is &lt;49.0.2623.75-81.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124632" version="1" comment="chromium is &lt;49.0.2623.75-81.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124633" version="1" comment="chromium-desktop-gnome is &lt;49.0.2623.75-81.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124634" version="1" comment="chromium-desktop-kde is &lt;49.0.2623.75-81.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124635" version="1" comment="chromium-ffmpegsumo is &lt;49.0.2623.75-81.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124636" version="1" comment="MozillaFirefox is &lt;45.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124637" version="1" comment="MozillaFirefox-branding-upstream is &lt;45.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124638" version="1" comment="MozillaFirefox-buildsymbols is &lt;45.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124639" version="1" comment="MozillaFirefox-devel is &lt;45.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124640" version="1" comment="MozillaFirefox-translations-common is &lt;45.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124641" version="1" comment="MozillaFirefox-translations-other is &lt;45.0-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124642" version="1" comment="libfreebl3 is &lt;3.21.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124643" version="1" comment="libfreebl3-32bit is &lt;3.21.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124644" version="1" comment="libsoftokn3 is &lt;3.21.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124645" version="1" comment="libsoftokn3-32bit is &lt;3.21.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124646" version="1" comment="mozilla-nspr is &lt;4.12-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124647" version="1" comment="mozilla-nspr-32bit is &lt;4.12-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124648" version="1" comment="mozilla-nspr-devel is &lt;4.12-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124649" version="1" comment="mozilla-nss is &lt;3.21.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124650" version="1" comment="mozilla-nss-32bit is &lt;3.21.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124651" version="1" comment="mozilla-nss-certs is &lt;3.21.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124652" version="1" comment="mozilla-nss-certs-32bit is &lt;3.21.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124653" version="1" comment="mozilla-nss-devel is &lt;3.21.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124654" version="1" comment="mozilla-nss-sysinit is &lt;3.21.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124655" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.21.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124656" version="1" comment="mozilla-nss-tools is &lt;3.21.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124773" version="1" comment="python-Pillow is &lt;2.9.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124774" version="1" comment="python-Pillow-tk is &lt;2.9.0-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124841" version="1" comment="graphite2 is &lt;1.2.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124842" version="1" comment="graphite2-devel is &lt;1.2.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124843" version="1" comment="libgraphite2-3 is &lt;1.2.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124844" version="1" comment="libgraphite2-3-32bit is &lt;1.2.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121479" version="1" comment="xen is &lt;4.4.3_08-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121480" version="1" comment="xen-devel is &lt;4.4.3_08-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121481" version="1" comment="xen-doc-html is &lt;4.4.3_08-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121482" version="1" comment="xen-kmp-default is &lt;4.4.3_08_k3.16.7_29-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121483" version="1" comment="xen-kmp-desktop is &lt;4.4.3_08_k3.16.7_29-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121484" version="1" comment="xen-libs is &lt;4.4.3_08-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121485" version="1" comment="xen-libs-32bit is &lt;4.4.3_08-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121486" version="1" comment="xen-tools is &lt;4.4.3_08-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121487" version="1" comment="xen-tools-domU is &lt;4.4.3_08-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124855" version="1" comment="git is &lt;2.6.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124856" version="1" comment="git-arch is &lt;2.6.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124857" version="1" comment="git-core is &lt;2.6.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124858" version="1" comment="git-credential-gnome-keyring is &lt;2.6.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124859" version="1" comment="git-cvs is &lt;2.6.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124860" version="1" comment="git-daemon is &lt;2.6.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124861" version="1" comment="git-doc is &lt;2.6.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124862" version="1" comment="git-email is &lt;2.6.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124863" version="1" comment="git-gui is &lt;2.6.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124864" version="1" comment="git-svn is &lt;2.6.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124865" version="1" comment="git-web is &lt;2.6.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124866" version="1" comment="gitk is &lt;2.6.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124867" version="1" comment="cgit is &lt;0.12-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125050" version="1" comment="libdcerpc-atsvc-devel is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125051" version="1" comment="libdcerpc-atsvc0 is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125052" version="1" comment="libdcerpc-atsvc0-32bit is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125053" version="1" comment="libdcerpc-binding0 is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125054" version="1" comment="libdcerpc-binding0-32bit is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125055" version="1" comment="libdcerpc-devel is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125056" version="1" comment="libdcerpc-samr-devel is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125057" version="1" comment="libdcerpc-samr0 is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125058" version="1" comment="libdcerpc-samr0-32bit is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125059" version="1" comment="libdcerpc0 is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125060" version="1" comment="libdcerpc0-32bit is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125061" version="1" comment="libgensec-devel is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125062" version="1" comment="libgensec0 is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125063" version="1" comment="libgensec0-32bit is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125064" version="1" comment="libndr-devel is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125065" version="1" comment="libndr-krb5pac-devel is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125066" version="1" comment="libndr-krb5pac0 is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125067" version="1" comment="libndr-krb5pac0-32bit is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125068" version="1" comment="libndr-nbt-devel is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125069" version="1" comment="libndr-nbt0 is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125070" version="1" comment="libndr-nbt0-32bit is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125071" version="1" comment="libndr-standard-devel is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125072" version="1" comment="libndr-standard0 is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125073" version="1" comment="libndr-standard0-32bit is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125074" version="1" comment="libndr0 is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125075" version="1" comment="libndr0-32bit is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125076" version="1" comment="libnetapi-devel is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125077" version="1" comment="libnetapi0 is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125078" version="1" comment="libnetapi0-32bit is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125079" version="1" comment="libpdb-devel is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125080" version="1" comment="libpdb0 is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125081" version="1" comment="libpdb0-32bit is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125082" version="1" comment="libregistry-devel is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125083" version="1" comment="libregistry0 is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125084" version="1" comment="libregistry0-32bit is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125085" version="1" comment="libsamba-credentials-devel is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125086" version="1" comment="libsamba-credentials0 is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125087" version="1" comment="libsamba-credentials0-32bit is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125088" version="1" comment="libsamba-hostconfig-devel is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125089" version="1" comment="libsamba-hostconfig0 is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125090" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125091" version="1" comment="libsamba-policy-devel is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125092" version="1" comment="libsamba-policy0 is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125093" version="1" comment="libsamba-policy0-32bit is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125094" version="1" comment="libsamba-util-devel is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125095" version="1" comment="libsamba-util0 is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125096" version="1" comment="libsamba-util0-32bit is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125097" version="1" comment="libsamdb-devel is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125098" version="1" comment="libsamdb0 is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125099" version="1" comment="libsamdb0-32bit is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125100" version="1" comment="libsmbclient-devel is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125101" version="1" comment="libsmbclient-raw-devel is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125102" version="1" comment="libsmbclient-raw0 is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125103" version="1" comment="libsmbclient-raw0-32bit is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125104" version="1" comment="libsmbclient0 is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125105" version="1" comment="libsmbclient0-32bit is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125106" version="1" comment="libsmbconf-devel is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125107" version="1" comment="libsmbconf0 is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125108" version="1" comment="libsmbconf0-32bit is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125109" version="1" comment="libsmbldap-devel is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125110" version="1" comment="libsmbldap0 is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125111" version="1" comment="libsmbldap0-32bit is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125112" version="1" comment="libsmbsharemodes-devel is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125113" version="1" comment="libsmbsharemodes0 is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125114" version="1" comment="libtevent-util-devel is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125115" version="1" comment="libtevent-util0 is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125116" version="1" comment="libtevent-util0-32bit is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125117" version="1" comment="libwbclient-devel is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125118" version="1" comment="libwbclient0 is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125119" version="1" comment="libwbclient0-32bit is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125120" version="1" comment="samba is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125121" version="1" comment="samba-32bit is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125122" version="1" comment="samba-client is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125123" version="1" comment="samba-client-32bit is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125124" version="1" comment="samba-core-devel is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125125" version="1" comment="samba-doc is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125126" version="1" comment="samba-libs is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125127" version="1" comment="samba-libs-32bit is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125128" version="1" comment="samba-pidl is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125129" version="1" comment="samba-python is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125130" version="1" comment="samba-test is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125131" version="1" comment="samba-test-devel is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125132" version="1" comment="samba-winbind is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125133" version="1" comment="samba-winbind-32bit is &lt;4.1.23-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125134" version="1" comment="chromedriver is &lt;49.0.2623.87-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125135" version="1" comment="chromium is &lt;49.0.2623.87-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125136" version="1" comment="chromium-desktop-gnome is &lt;49.0.2623.87-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125137" version="1" comment="chromium-desktop-kde is &lt;49.0.2623.87-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125138" version="1" comment="chromium-ffmpegsumo is &lt;49.0.2623.87-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125199" version="1" comment="bind is &lt;9.9.6P1-2.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125200" version="1" comment="bind-chrootenv is &lt;9.9.6P1-2.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125201" version="1" comment="bind-devel is &lt;9.9.6P1-2.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125202" version="1" comment="bind-doc is &lt;9.9.6P1-2.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125203" version="1" comment="bind-libs is &lt;9.9.6P1-2.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125204" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-2.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125205" version="1" comment="bind-lwresd is &lt;9.9.6P1-2.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125206" version="1" comment="bind-utils is &lt;9.9.6P1-2.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125207" version="1" comment="rubygem-actionpack-3_2 is &lt;3.2.17-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125208" version="1" comment="rubygem-actionpack-3_2-doc is &lt;3.2.17-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121471" version="1" comment="libebml is &lt;1.3.3-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121472" version="1" comment="libebml-devel is &lt;1.3.3-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121473" version="1" comment="libebml4 is &lt;1.3.3-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121474" version="1" comment="libebml4-32bit is &lt;1.3.3-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121475" version="1" comment="libmatroska is &lt;1.4.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121476" version="1" comment="libmatroska-devel is &lt;1.4.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121477" version="1" comment="libmatroska6 is &lt;1.4.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121478" version="1" comment="libmatroska6-32bit is &lt;1.4.4-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125209" version="1" comment="bsh2 is &lt;2.0.0.b6-27.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125210" version="1" comment="bsh2-bsf is &lt;2.0.0.b6-27.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125211" version="1" comment="bsh2-classgen is &lt;2.0.0.b6-27.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125212" version="1" comment="bsh2-demo is &lt;2.0.0.b6-27.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125213" version="1" comment="bsh2-javadoc is &lt;2.0.0.b6-27.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125214" version="1" comment="bsh2-manual is &lt;2.0.0.b6-27.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125306" version="1" comment="quagga is &lt;0.99.23-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125307" version="1" comment="quagga-devel is &lt;0.99.23-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125347" version="1" comment="perl is &lt;5.20.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125348" version="1" comment="perl-32bit is &lt;5.20.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125349" version="1" comment="perl-base is &lt;5.20.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125350" version="1" comment="perl-base-32bit is &lt;5.20.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125351" version="1" comment="perl-doc is &lt;5.20.1-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125352" version="1" comment="dropbear is &lt;2016.72-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121488" version="1" comment="openssh is &lt;6.6p1-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121489" version="1" comment="openssh-askpass-gnome is &lt;6.6p1-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121490" version="1" comment="openssh-fips is &lt;6.6p1-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121491" version="1" comment="openssh-helpers is &lt;6.6p1-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125353" version="1" comment="libssh is &lt;0.6.3-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125354" version="1" comment="libssh-devel is &lt;0.6.3-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125355" version="1" comment="libssh-devel-doc is &lt;0.6.3-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125356" version="1" comment="libssh4 is &lt;0.6.3-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125357" version="1" comment="libssh4-32bit is &lt;0.6.3-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125358" version="1" comment="MozillaThunderbird is &lt;38.7.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125359" version="1" comment="MozillaThunderbird-buildsymbols is &lt;38.7.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125360" version="1" comment="MozillaThunderbird-devel is &lt;38.7.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125361" version="1" comment="MozillaThunderbird-translations-common is &lt;38.7.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125362" version="1" comment="MozillaThunderbird-translations-other is &lt;38.7.0-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125363" version="1" comment="pidgin-otr is &lt;4.0.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125467" version="1" comment="gdk-pixbuf is &lt;2.31.6-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125468" version="1" comment="gdk-pixbuf-devel is &lt;2.31.6-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125469" version="1" comment="gdk-pixbuf-devel-32bit is &lt;2.31.6-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125470" version="1" comment="gdk-pixbuf-lang is &lt;2.31.6-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125471" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.31.6-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125472" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.31.6-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125473" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.31.6-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125474" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.31.6-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125475" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.31.6-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125560" version="1" comment="libjavascriptcoregtk-1_0-0 is &lt;2.4.10-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125561" version="1" comment="libjavascriptcoregtk-1_0-0-32bit is &lt;2.4.10-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125562" version="1" comment="libjavascriptcoregtk-3_0-0 is &lt;2.4.10-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125563" version="1" comment="libjavascriptcoregtk-3_0-0-32bit is &lt;2.4.10-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125564" version="1" comment="libwebkitgtk-1_0-0 is &lt;2.4.10-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125565" version="1" comment="libwebkitgtk-1_0-0-32bit is &lt;2.4.10-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125566" version="1" comment="libwebkitgtk-3_0-0 is &lt;2.4.10-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125567" version="1" comment="libwebkitgtk-3_0-0-32bit is &lt;2.4.10-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125568" version="1" comment="libwebkitgtk-devel is &lt;2.4.10-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125569" version="1" comment="libwebkitgtk2-lang is &lt;2.4.10-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125570" version="1" comment="libwebkitgtk3-devel is &lt;2.4.10-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125571" version="1" comment="libwebkitgtk3-lang is &lt;2.4.10-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125572" version="1" comment="typelib-1_0-JavaScriptCore-1_0 is &lt;2.4.10-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125573" version="1" comment="typelib-1_0-JavaScriptCore-3_0 is &lt;2.4.10-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125574" version="1" comment="typelib-1_0-WebKit-1_0 is &lt;2.4.10-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125575" version="1" comment="typelib-1_0-WebKit-3_0 is &lt;2.4.10-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125576" version="1" comment="webkit-jsc-1 is &lt;2.4.10-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125577" version="1" comment="webkit-jsc-3 is &lt;2.4.10-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125578" version="1" comment="webkitgtk is &lt;2.4.10-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125579" version="1" comment="webkitgtk3 is &lt;2.4.10-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125630" version="1" comment="chromedriver is &lt;49.0.2623.110-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125631" version="1" comment="chromium is &lt;49.0.2623.110-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125632" version="1" comment="chromium-desktop-gnome is &lt;49.0.2623.110-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125633" version="1" comment="chromium-desktop-kde is &lt;49.0.2623.110-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125634" version="1" comment="chromium-ffmpegsumo is &lt;49.0.2623.110-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125655" version="1" comment="krb5 is &lt;1.12.2-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125656" version="1" comment="krb5-32bit is &lt;1.12.2-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125657" version="1" comment="krb5-client is &lt;1.12.2-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125658" version="1" comment="krb5-devel is &lt;1.12.2-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125659" version="1" comment="krb5-devel-32bit is &lt;1.12.2-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125660" version="1" comment="krb5-doc is &lt;1.12.2-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125661" version="1" comment="krb5-mini is &lt;1.12.2-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125662" version="1" comment="krb5-mini-devel is &lt;1.12.2-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125663" version="1" comment="krb5-plugin-kdb-ldap is &lt;1.12.2-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125664" version="1" comment="krb5-plugin-preauth-otp is &lt;1.12.2-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125665" version="1" comment="krb5-plugin-preauth-pkinit is &lt;1.12.2-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125666" version="1" comment="krb5-server is &lt;1.12.2-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125996" version="1" comment="libxerces-c-3_1 is &lt;3.1.1-13.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125997" version="1" comment="libxerces-c-3_1-32bit is &lt;3.1.1-13.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125998" version="1" comment="libxerces-c-devel is &lt;3.1.1-13.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125999" version="1" comment="xerces-c is &lt;3.1.1-13.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126000" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.99-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126001" version="1" comment="java-1_7_0-openjdk-accessibility is &lt;1.7.0.99-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126002" version="1" comment="java-1_7_0-openjdk-bootstrap is &lt;1.7.0.99-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126003" version="1" comment="java-1_7_0-openjdk-bootstrap-devel is &lt;1.7.0.99-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126004" version="1" comment="java-1_7_0-openjdk-bootstrap-headless is &lt;1.7.0.99-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126005" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.99-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126006" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.99-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126007" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.99-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126008" version="1" comment="java-1_7_0-openjdk-javadoc is &lt;1.7.0.99-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126009" version="1" comment="java-1_7_0-openjdk-src is &lt;1.7.0.99-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126010" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.77-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126011" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.77-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126012" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.77-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126013" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.77-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126014" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.77-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126015" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.77-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126016" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.77-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126017" version="1" comment="flash-player is &lt;11.2.202.616-2.94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126018" version="1" comment="flash-player-gnome is &lt;11.2.202.616-2.94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126019" version="1" comment="flash-player-kde4 is &lt;11.2.202.616-2.94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126020" version="1" comment="xen is &lt;4.4.4_02-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126021" version="1" comment="xen-devel is &lt;4.4.4_02-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126022" version="1" comment="xen-doc-html is &lt;4.4.4_02-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126023" version="1" comment="xen-kmp-default is &lt;4.4.4_02_k3.16.7_35-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126024" version="1" comment="xen-kmp-desktop is &lt;4.4.4_02_k3.16.7_35-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126025" version="1" comment="xen-libs is &lt;4.4.4_02-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126026" version="1" comment="xen-libs-32bit is &lt;4.4.4_02-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126027" version="1" comment="xen-tools is &lt;4.4.4_02-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126028" version="1" comment="xen-tools-domU is &lt;4.4.4_02-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126029" version="1" comment="cairo is &lt;1.14.0-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126030" version="1" comment="cairo-devel is &lt;1.14.0-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126031" version="1" comment="cairo-devel-32bit is &lt;1.14.0-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126032" version="1" comment="cairo-tools is &lt;1.14.0-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126033" version="1" comment="libcairo-gobject2 is &lt;1.14.0-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126034" version="1" comment="libcairo-gobject2-32bit is &lt;1.14.0-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126035" version="1" comment="libcairo-script-interpreter2 is &lt;1.14.0-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126036" version="1" comment="libcairo-script-interpreter2-32bit is &lt;1.14.0-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126037" version="1" comment="libcairo2 is &lt;1.14.0-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040390"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126038" version="1" comment="libcairo2-32bit is &lt;1.14.0-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126039" version="1" comment="mercurial is &lt;3.1.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126040" version="1" comment="mercurial-lang is &lt;3.1.2-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126115" version="1" comment="lhasa is &lt;0.3.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126116" version="1" comment="lhasa-devel is &lt;0.3.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126117" version="1" comment="liblhasa0 is &lt;0.3.1-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126250" version="1" comment="quagga is &lt;0.99.24.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126251" version="1" comment="quagga-devel is &lt;0.99.24.1-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121518" version="1" comment="nodejs is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121519" version="1" comment="nodejs-devel is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121520" version="1" comment="nodejs-doc is &lt;4.2.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121521" version="1" comment="nodejs-docs is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121522" version="1" comment="npm is &lt;4.2.4-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126263" version="1" comment="ctdb is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126264" version="1" comment="ctdb-devel is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126265" version="1" comment="ctdb-pcp-pmda is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126266" version="1" comment="ctdb-tests is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126267" version="1" comment="libdcerpc-atsvc-devel is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126268" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126269" version="1" comment="libdcerpc-atsvc0-32bit is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126270" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126271" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126272" version="1" comment="libdcerpc-devel is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126273" version="1" comment="libdcerpc-samr-devel is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126274" version="1" comment="libdcerpc-samr0 is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126275" version="1" comment="libdcerpc-samr0-32bit is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126276" version="1" comment="libdcerpc0 is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126277" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126278" version="1" comment="libgensec-devel is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126279" version="1" comment="libgensec0 is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126280" version="1" comment="libgensec0-32bit is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126281" version="1" comment="libndr-devel is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126282" version="1" comment="libndr-krb5pac-devel is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126283" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126284" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126285" version="1" comment="libndr-nbt-devel is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126286" version="1" comment="libndr-nbt0 is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126287" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126288" version="1" comment="libndr-standard-devel is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126289" version="1" comment="libndr-standard0 is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126290" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126291" version="1" comment="libndr0 is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126292" version="1" comment="libndr0-32bit is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126293" version="1" comment="libnetapi-devel is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126294" version="1" comment="libnetapi0 is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126295" version="1" comment="libnetapi0-32bit is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126296" version="1" comment="libregistry-devel is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126297" version="1" comment="libregistry0 is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126298" version="1" comment="libregistry0-32bit is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126299" version="1" comment="libsamba-credentials-devel is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126300" version="1" comment="libsamba-credentials0 is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126301" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126302" version="1" comment="libsamba-hostconfig-devel is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126303" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126304" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126305" version="1" comment="libsamba-passdb-devel is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126306" version="1" comment="libsamba-passdb0 is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126307" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126308" version="1" comment="libsamba-policy-devel is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126309" version="1" comment="libsamba-policy0 is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126310" version="1" comment="libsamba-policy0-32bit is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126311" version="1" comment="libsamba-util-devel is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126312" version="1" comment="libsamba-util0 is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126313" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126314" version="1" comment="libsamdb-devel is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126315" version="1" comment="libsamdb0 is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126316" version="1" comment="libsamdb0-32bit is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126317" version="1" comment="libsmbclient-devel is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126318" version="1" comment="libsmbclient-raw-devel is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126319" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126320" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126321" version="1" comment="libsmbclient0 is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126322" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126323" version="1" comment="libsmbconf-devel is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126324" version="1" comment="libsmbconf0 is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126325" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126326" version="1" comment="libsmbldap-devel is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126327" version="1" comment="libsmbldap0 is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126328" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126329" version="1" comment="libtevent-util-devel is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126330" version="1" comment="libtevent-util0 is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126331" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126332" version="1" comment="libwbclient-devel is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126333" version="1" comment="libwbclient0 is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126334" version="1" comment="libwbclient0-32bit is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126335" version="1" comment="samba is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126336" version="1" comment="samba-32bit is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126337" version="1" comment="samba-client is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126338" version="1" comment="samba-client-32bit is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126339" version="1" comment="samba-core-devel is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126340" version="1" comment="samba-doc is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126341" version="1" comment="samba-libs is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126342" version="1" comment="samba-libs-32bit is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126343" version="1" comment="samba-pidl is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126344" version="1" comment="samba-python is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126345" version="1" comment="samba-test is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126346" version="1" comment="samba-test-devel is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126347" version="1" comment="samba-winbind is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126348" version="1" comment="samba-winbind-32bit is &lt;4.2.4-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126349" version="1" comment="optipng is &lt;0.7.5-2.3.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031852"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126350" version="1" comment="libtiff-devel is &lt;4.0.6-10.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126351" version="1" comment="libtiff-devel-32bit is &lt;4.0.6-10.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126352" version="1" comment="libtiff5 is &lt;4.0.6-10.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126353" version="1" comment="libtiff5-32bit is &lt;4.0.6-10.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126354" version="1" comment="tiff is &lt;4.0.6-10.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126496" version="1" comment="libgudev-1_0-0 is &lt;210.1459453449.5237776-25.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126497" version="1" comment="libgudev-1_0-0-32bit is &lt;210.1459453449.5237776-25.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126498" version="1" comment="libgudev-1_0-devel is &lt;210.1459453449.5237776-25.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126499" version="1" comment="libudev-devel is &lt;210.1459453449.5237776-25.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126500" version="1" comment="libudev-mini-devel is &lt;210.1459453449.5237776-25.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126501" version="1" comment="libudev-mini1 is &lt;210.1459453449.5237776-25.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126502" version="1" comment="libudev1 is &lt;210.1459453449.5237776-25.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126503" version="1" comment="libudev1-32bit is &lt;210.1459453449.5237776-25.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126504" version="1" comment="nss-myhostname is &lt;210.1459453449.5237776-25.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126505" version="1" comment="nss-myhostname-32bit is &lt;210.1459453449.5237776-25.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126506" version="1" comment="systemd is &lt;210.1459453449.5237776-25.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126507" version="1" comment="systemd-32bit is &lt;210.1459453449.5237776-25.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126508" version="1" comment="systemd-bash-completion is &lt;210.1459453449.5237776-25.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126509" version="1" comment="systemd-devel is &lt;210.1459453449.5237776-25.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126510" version="1" comment="systemd-journal-gateway is &lt;210.1459453449.5237776-25.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126511" version="1" comment="systemd-logger is &lt;210.1459453449.5237776-25.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126512" version="1" comment="systemd-mini is &lt;210.1459453449.5237776-25.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126513" version="1" comment="systemd-mini-devel is &lt;210.1459453449.5237776-25.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126514" version="1" comment="systemd-mini-sysvinit is &lt;210.1459453449.5237776-25.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126515" version="1" comment="systemd-sysvinit is &lt;210.1459453449.5237776-25.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126516" version="1" comment="typelib-1_0-GUdev-1_0 is &lt;210.1459453449.5237776-25.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126517" version="1" comment="udev is &lt;210.1459453449.5237776-25.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126518" version="1" comment="udev-mini is &lt;210.1459453449.5237776-25.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126685" version="1" comment="giflib is &lt;5.0.5-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126686" version="1" comment="giflib-devel is &lt;5.0.5-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126687" version="1" comment="giflib-devel-32bit is &lt;5.0.5-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126688" version="1" comment="giflib-progs is &lt;5.0.5-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126689" version="1" comment="libgif6 is &lt;5.0.5-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126690" version="1" comment="libgif6-32bit is &lt;5.0.5-4.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126696" version="1" comment="chromedriver is &lt;50.0.2661.75-94.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126697" version="1" comment="chromium is &lt;50.0.2661.75-94.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126698" version="1" comment="chromium-desktop-gnome is &lt;50.0.2661.75-94.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126699" version="1" comment="chromium-desktop-kde is &lt;50.0.2661.75-94.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126700" version="1" comment="chromium-ffmpegsumo is &lt;50.0.2661.75-94.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126844" version="1" comment="apache2-mod_php5 is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126845" version="1" comment="php5 is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126846" version="1" comment="php5-bcmath is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126847" version="1" comment="php5-bz2 is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126848" version="1" comment="php5-calendar is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126849" version="1" comment="php5-ctype is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126850" version="1" comment="php5-curl is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126851" version="1" comment="php5-dba is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126852" version="1" comment="php5-devel is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126853" version="1" comment="php5-dom is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126854" version="1" comment="php5-enchant is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126855" version="1" comment="php5-exif is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126856" version="1" comment="php5-fastcgi is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126857" version="1" comment="php5-fileinfo is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126858" version="1" comment="php5-firebird is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126859" version="1" comment="php5-fpm is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126860" version="1" comment="php5-ftp is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126861" version="1" comment="php5-gd is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126862" version="1" comment="php5-gettext is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126863" version="1" comment="php5-gmp is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126864" version="1" comment="php5-iconv is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126865" version="1" comment="php5-imap is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126866" version="1" comment="php5-intl is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126867" version="1" comment="php5-json is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126868" version="1" comment="php5-ldap is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126869" version="1" comment="php5-mbstring is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126870" version="1" comment="php5-mcrypt is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126871" version="1" comment="php5-mssql is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126872" version="1" comment="php5-mysql is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126873" version="1" comment="php5-odbc is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126874" version="1" comment="php5-opcache is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126875" version="1" comment="php5-openssl is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126876" version="1" comment="php5-pcntl is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126877" version="1" comment="php5-pdo is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126878" version="1" comment="php5-pear is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126879" version="1" comment="php5-pgsql is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126880" version="1" comment="php5-phar is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126881" version="1" comment="php5-posix is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126882" version="1" comment="php5-pspell is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126883" version="1" comment="php5-readline is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126884" version="1" comment="php5-shmop is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126885" version="1" comment="php5-snmp is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126886" version="1" comment="php5-soap is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126887" version="1" comment="php5-sockets is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126888" version="1" comment="php5-sqlite is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126889" version="1" comment="php5-suhosin is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126890" version="1" comment="php5-sysvmsg is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126891" version="1" comment="php5-sysvsem is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126892" version="1" comment="php5-sysvshm is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126893" version="1" comment="php5-tidy is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126894" version="1" comment="php5-tokenizer is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126895" version="1" comment="php5-wddx is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126896" version="1" comment="php5-xmlreader is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126897" version="1" comment="php5-xmlrpc is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126898" version="1" comment="php5-xmlwriter is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126899" version="1" comment="php5-xsl is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126900" version="1" comment="php5-zip is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126901" version="1" comment="php5-zlib is &lt;5.6.1-53.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127121" version="1" comment="chromedriver is &lt;50.0.2661.94-97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127122" version="1" comment="chromium is &lt;50.0.2661.94-97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127123" version="1" comment="chromium-desktop-gnome is &lt;50.0.2661.94-97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127124" version="1" comment="chromium-desktop-kde is &lt;50.0.2661.94-97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127125" version="1" comment="chromium-ffmpegsumo is &lt;50.0.2661.94-97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127156" version="1" comment="MozillaFirefox is &lt;46.0-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127157" version="1" comment="MozillaFirefox-branding-upstream is &lt;46.0-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127158" version="1" comment="MozillaFirefox-buildsymbols is &lt;46.0-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127159" version="1" comment="MozillaFirefox-devel is &lt;46.0-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127160" version="1" comment="MozillaFirefox-translations-common is &lt;46.0-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127161" version="1" comment="MozillaFirefox-translations-other is &lt;46.0-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127162" version="1" comment="libfreebl3 is &lt;3.22.3-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127163" version="1" comment="libfreebl3-32bit is &lt;3.22.3-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127164" version="1" comment="libsoftokn3 is &lt;3.22.3-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127165" version="1" comment="libsoftokn3-32bit is &lt;3.22.3-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127166" version="1" comment="mozilla-nss is &lt;3.22.3-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127167" version="1" comment="mozilla-nss-32bit is &lt;3.22.3-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127168" version="1" comment="mozilla-nss-certs is &lt;3.22.3-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127169" version="1" comment="mozilla-nss-certs-32bit is &lt;3.22.3-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127170" version="1" comment="mozilla-nss-devel is &lt;3.22.3-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127171" version="1" comment="mozilla-nss-sysinit is &lt;3.22.3-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127172" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.22.3-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127173" version="1" comment="mozilla-nss-tools is &lt;3.22.3-15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127174" version="1" comment="jq is &lt;1.4-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127175" version="1" comment="libjq-devel is &lt;1.4-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127176" version="1" comment="libjq1 is &lt;1.4-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127177" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.101-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127178" version="1" comment="java-1_7_0-openjdk-accessibility is &lt;1.7.0.101-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127179" version="1" comment="java-1_7_0-openjdk-bootstrap is &lt;1.7.0.101-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127180" version="1" comment="java-1_7_0-openjdk-bootstrap-devel is &lt;1.7.0.101-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127181" version="1" comment="java-1_7_0-openjdk-bootstrap-headless is &lt;1.7.0.101-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127182" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.101-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127183" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.101-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127184" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.101-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127185" version="1" comment="java-1_7_0-openjdk-javadoc is &lt;1.7.0.101-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127186" version="1" comment="java-1_7_0-openjdk-src is &lt;1.7.0.101-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127187" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.91-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127188" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.91-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127189" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.91-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127190" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.91-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127191" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.91-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127192" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.91-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127193" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.91-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127194" version="1" comment="wireshark is &lt;1.12.11-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127195" version="1" comment="wireshark-devel is &lt;1.12.11-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127196" version="1" comment="wireshark-ui-gtk is &lt;1.12.11-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127197" version="1" comment="wireshark-ui-qt is &lt;1.12.11-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127198" version="1" comment="xerces-j2 is &lt;2.11.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127199" version="1" comment="xerces-j2-demo is &lt;2.11.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127200" version="1" comment="xerces-j2-scripts is &lt;2.11.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127201" version="1" comment="xerces-j2-xml-apis is &lt;2.11.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127202" version="1" comment="xerces-j2-xml-resolver is &lt;2.11.0-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127240" version="1" comment="libopenssl-devel is &lt;1.0.1k-2.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127241" version="1" comment="libopenssl-devel-32bit is &lt;1.0.1k-2.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127242" version="1" comment="libopenssl1_0_0 is &lt;1.0.1k-2.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127243" version="1" comment="libopenssl1_0_0-32bit is &lt;1.0.1k-2.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127244" version="1" comment="libopenssl1_0_0-hmac is &lt;1.0.1k-2.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127245" version="1" comment="libopenssl1_0_0-hmac-32bit is &lt;1.0.1k-2.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127246" version="1" comment="openssl is &lt;1.0.1k-2.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127247" version="1" comment="openssl-doc is &lt;1.0.1k-2.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127248" version="1" comment="libopenssl0_9_8 is &lt;0.9.8zh-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127249" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8zh-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127295" version="1" comment="ImageMagick is &lt;6.8.9.8-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127296" version="1" comment="ImageMagick-devel is &lt;6.8.9.8-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127297" version="1" comment="ImageMagick-devel-32bit is &lt;6.8.9.8-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127298" version="1" comment="ImageMagick-doc is &lt;6.8.9.8-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127299" version="1" comment="ImageMagick-extra is &lt;6.8.9.8-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127300" version="1" comment="libMagick++-6_Q16-5 is &lt;6.8.9.8-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127301" version="1" comment="libMagick++-6_Q16-5-32bit is &lt;6.8.9.8-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127302" version="1" comment="libMagick++-devel is &lt;6.8.9.8-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127303" version="1" comment="libMagick++-devel-32bit is &lt;6.8.9.8-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127304" version="1" comment="libMagickCore-6_Q16-2 is &lt;6.8.9.8-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127305" version="1" comment="libMagickCore-6_Q16-2-32bit is &lt;6.8.9.8-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127306" version="1" comment="libMagickWand-6_Q16-2 is &lt;6.8.9.8-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127307" version="1" comment="libMagickWand-6_Q16-2-32bit is &lt;6.8.9.8-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127308" version="1" comment="perl-PerlMagick is &lt;6.8.9.8-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127309" version="1" comment="libsvn_auth_gnome_keyring-1-0 is &lt;1.8.16-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127310" version="1" comment="libsvn_auth_kwallet-1-0 is &lt;1.8.16-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127311" version="1" comment="subversion is &lt;1.8.16-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127312" version="1" comment="subversion-bash-completion is &lt;1.8.16-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127313" version="1" comment="subversion-devel is &lt;1.8.16-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127314" version="1" comment="subversion-perl is &lt;1.8.16-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127315" version="1" comment="subversion-python is &lt;1.8.16-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127316" version="1" comment="subversion-python-ctypes is &lt;1.8.16-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127317" version="1" comment="subversion-ruby is &lt;1.8.16-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127318" version="1" comment="subversion-server is &lt;1.8.16-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127319" version="1" comment="subversion-tools is &lt;1.8.16-2.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127477" version="1" comment="apache2-mod_php5 is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127478" version="1" comment="php5 is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127479" version="1" comment="php5-bcmath is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127480" version="1" comment="php5-bz2 is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127481" version="1" comment="php5-calendar is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127482" version="1" comment="php5-ctype is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127483" version="1" comment="php5-curl is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127484" version="1" comment="php5-dba is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127485" version="1" comment="php5-devel is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127486" version="1" comment="php5-dom is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127487" version="1" comment="php5-enchant is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127488" version="1" comment="php5-exif is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127489" version="1" comment="php5-fastcgi is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127490" version="1" comment="php5-fileinfo is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127491" version="1" comment="php5-firebird is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127492" version="1" comment="php5-fpm is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127493" version="1" comment="php5-ftp is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127494" version="1" comment="php5-gd is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127495" version="1" comment="php5-gettext is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127496" version="1" comment="php5-gmp is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127497" version="1" comment="php5-iconv is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127498" version="1" comment="php5-imap is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127499" version="1" comment="php5-intl is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127500" version="1" comment="php5-json is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127501" version="1" comment="php5-ldap is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127502" version="1" comment="php5-mbstring is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127503" version="1" comment="php5-mcrypt is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127504" version="1" comment="php5-mssql is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127505" version="1" comment="php5-mysql is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127506" version="1" comment="php5-odbc is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127507" version="1" comment="php5-opcache is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127508" version="1" comment="php5-openssl is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127509" version="1" comment="php5-pcntl is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127510" version="1" comment="php5-pdo is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127511" version="1" comment="php5-pear is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127512" version="1" comment="php5-pgsql is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127513" version="1" comment="php5-phar is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127514" version="1" comment="php5-posix is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127515" version="1" comment="php5-pspell is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127516" version="1" comment="php5-readline is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127517" version="1" comment="php5-shmop is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127518" version="1" comment="php5-snmp is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127519" version="1" comment="php5-soap is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127520" version="1" comment="php5-sockets is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127521" version="1" comment="php5-sqlite is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127522" version="1" comment="php5-suhosin is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127523" version="1" comment="php5-sysvmsg is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127524" version="1" comment="php5-sysvsem is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127525" version="1" comment="php5-sysvshm is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127526" version="1" comment="php5-tidy is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127527" version="1" comment="php5-tokenizer is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127528" version="1" comment="php5-wddx is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127529" version="1" comment="php5-xmlreader is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127530" version="1" comment="php5-xmlrpc is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127531" version="1" comment="php5-xmlwriter is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127532" version="1" comment="php5-xsl is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127533" version="1" comment="php5-zip is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127534" version="1" comment="php5-zlib is &lt;5.6.1-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127581" version="1" comment="chromedriver is &lt;50.0.2661.102-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127582" version="1" comment="chromium is &lt;50.0.2661.102-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127583" version="1" comment="chromium-desktop-gnome is &lt;50.0.2661.102-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127584" version="1" comment="chromium-desktop-kde is &lt;50.0.2661.102-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127585" version="1" comment="chromium-ffmpegsumo is &lt;50.0.2661.102-48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127586" version="1" comment="flash-player is &lt;11.2.202.621-2.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127587" version="1" comment="flash-player-gnome is &lt;11.2.202.621-2.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127588" version="1" comment="flash-player-kde4 is &lt;11.2.202.621-2.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127663" version="1" comment="libvarnishapi1 is &lt;3.0.7-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127664" version="1" comment="varnish is &lt;3.0.7-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127665" version="1" comment="varnish-devel is &lt;3.0.7-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127666" version="1" comment="quassel is &lt;0.12.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127667" version="1" comment="quassel-base is &lt;0.12.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127668" version="1" comment="quassel-client is &lt;0.12.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127669" version="1" comment="quassel-core is &lt;0.12.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127670" version="1" comment="quassel-mono is &lt;0.12.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127671" version="1" comment="atheme is &lt;7.2.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127672" version="1" comment="atheme-devel is &lt;7.2.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127673" version="1" comment="libathemecore1 is &lt;7.2.6-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127674" version="1" comment="quagga is &lt;0.99.24.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127675" version="1" comment="quagga-devel is &lt;0.99.24.1-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127676" version="1" comment="libpoppler-cpp0 is &lt;0.26.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127677" version="1" comment="libpoppler-cpp0-32bit is &lt;0.26.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127678" version="1" comment="libpoppler-devel is &lt;0.26.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127679" version="1" comment="libpoppler-glib-devel is &lt;0.26.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127680" version="1" comment="libpoppler-glib8 is &lt;0.26.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127681" version="1" comment="libpoppler-glib8-32bit is &lt;0.26.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127682" version="1" comment="libpoppler-qt4-4 is &lt;0.26.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127683" version="1" comment="libpoppler-qt4-4-32bit is &lt;0.26.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127684" version="1" comment="libpoppler-qt4-devel is &lt;0.26.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127685" version="1" comment="libpoppler-qt5-1 is &lt;0.26.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127686" version="1" comment="libpoppler-qt5-1-32bit is &lt;0.26.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127687" version="1" comment="libpoppler-qt5-devel is &lt;0.26.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127688" version="1" comment="libpoppler46 is &lt;0.26.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127689" version="1" comment="libpoppler46-32bit is &lt;0.26.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127690" version="1" comment="poppler is &lt;0.26.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127691" version="1" comment="poppler-qt is &lt;0.26.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127692" version="1" comment="poppler-qt5 is &lt;0.26.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127693" version="1" comment="poppler-tools is &lt;0.26.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127694" version="1" comment="typelib-1_0-Poppler-0_18 is &lt;0.26.5-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120973" version="1" comment="MozillaFirefox is &lt;43.0.3-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120974" version="1" comment="MozillaFirefox-branding-upstream is &lt;43.0.3-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120975" version="1" comment="MozillaFirefox-buildsymbols is &lt;43.0.3-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120976" version="1" comment="MozillaFirefox-devel is &lt;43.0.3-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120977" version="1" comment="MozillaFirefox-translations-common is &lt;43.0.3-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120978" version="1" comment="MozillaFirefox-translations-other is &lt;43.0.3-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046728"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121681" version="1" comment="libpolarssl7 is &lt;1.3.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121682" version="1" comment="polarssl is &lt;1.3.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121683" version="1" comment="polarssl-devel is &lt;1.3.9-14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127747" version="1" comment="imlib2 is &lt;1.4.9-17.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127748" version="1" comment="imlib2-devel is &lt;1.4.9-17.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127749" version="1" comment="imlib2-filters is &lt;1.4.9-17.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127750" version="1" comment="imlib2-loaders is &lt;1.4.9-17.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127751" version="1" comment="libImlib2-1 is &lt;1.4.9-17.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127752" version="1" comment="cacti is &lt;0.8.8f-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127753" version="1" comment="GraphicsMagick is &lt;1.3.21-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127754" version="1" comment="GraphicsMagick-devel is &lt;1.3.21-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127755" version="1" comment="libGraphicsMagick++-Q16-11 is &lt;1.3.21-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127756" version="1" comment="libGraphicsMagick++-Q16-3 is &lt;1.3.20-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127757" version="1" comment="libGraphicsMagick++-devel is &lt;1.3.21-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127758" version="1" comment="libGraphicsMagick-Q16-3 is &lt;1.3.21-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127759" version="1" comment="libGraphicsMagick3-config is &lt;1.3.21-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127760" version="1" comment="libGraphicsMagickWand-Q16-2 is &lt;1.3.21-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127761" version="1" comment="perl-GraphicsMagick is &lt;1.3.21-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127762" version="1" comment="proftpd is &lt;1.3.5b-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127763" version="1" comment="proftpd-devel is &lt;1.3.5b-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127764" version="1" comment="proftpd-doc is &lt;1.3.5b-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127765" version="1" comment="proftpd-lang is &lt;1.3.5b-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127766" version="1" comment="proftpd-ldap is &lt;1.3.5b-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127767" version="1" comment="proftpd-mysql is &lt;1.3.5b-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127768" version="1" comment="proftpd-pgsql is &lt;1.3.5b-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127769" version="1" comment="proftpd-radius is &lt;1.3.5b-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127770" version="1" comment="proftpd-sqlite is &lt;1.3.5b-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127771" version="1" comment="libcrypto34 is &lt;2.2.7-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127772" version="1" comment="libcrypto34-32bit is &lt;2.2.7-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127773" version="1" comment="libressl is &lt;2.2.7-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127774" version="1" comment="libressl-devel is &lt;2.2.7-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127775" version="1" comment="libressl-devel-32bit is &lt;2.2.7-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127776" version="1" comment="libressl-devel-doc is &lt;2.2.7-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127777" version="1" comment="libssl33 is &lt;2.2.7-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127778" version="1" comment="libssl33-32bit is &lt;2.2.7-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127779" version="1" comment="libtls4 is &lt;2.2.7-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127780" version="1" comment="libtls4-32bit is &lt;2.2.7-2.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127781" version="1" comment="ocaml is &lt;4.01.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127782" version="1" comment="ocaml-camlp4 is &lt;4.01.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127783" version="1" comment="ocaml-camlp4-devel is &lt;4.01.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127784" version="1" comment="ocaml-compiler-libs is &lt;4.01.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127785" version="1" comment="ocaml-compiler-libs-devel is &lt;4.01.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127786" version="1" comment="ocaml-docs is &lt;4.01.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127787" version="1" comment="ocaml-emacs is &lt;4.01.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127788" version="1" comment="ocaml-labltk is &lt;4.01.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127789" version="1" comment="ocaml-labltk-devel is &lt;4.01.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127790" version="1" comment="ocaml-ocamldoc is &lt;4.01.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127791" version="1" comment="ocaml-runtime is &lt;4.01.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127792" version="1" comment="ocaml-source is &lt;4.01.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127793" version="1" comment="ocaml-x11 is &lt;4.01.0-6.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127794" version="1" comment="libmysql56client18 is &lt;5.6.30-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127795" version="1" comment="libmysql56client18-32bit is &lt;5.6.30-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127796" version="1" comment="libmysql56client_r18 is &lt;5.6.30-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127797" version="1" comment="libmysql56client_r18-32bit is &lt;5.6.30-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127798" version="1" comment="mysql-community-server is &lt;5.6.30-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127799" version="1" comment="mysql-community-server-bench is &lt;5.6.30-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127800" version="1" comment="mysql-community-server-client is &lt;5.6.30-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127801" version="1" comment="mysql-community-server-errormessages is &lt;5.6.30-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127802" version="1" comment="mysql-community-server-test is &lt;5.6.30-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127803" version="1" comment="mysql-community-server-tools is &lt;5.6.30-16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127804" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.40.15-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127805" version="1" comment="gdk-pixbuf-loader-rsvg-32bit is &lt;2.40.15-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127806" version="1" comment="librsvg is &lt;2.40.15-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127807" version="1" comment="librsvg-2-2 is &lt;2.40.15-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127808" version="1" comment="librsvg-2-2-32bit is &lt;2.40.15-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127809" version="1" comment="librsvg-devel is &lt;2.40.15-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127810" version="1" comment="rsvg-view is &lt;2.40.15-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127811" version="1" comment="typelib-1_0-Rsvg-2_0 is &lt;2.40.15-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127812" version="1" comment="mercurial is &lt;3.5.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127813" version="1" comment="mercurial-lang is &lt;3.5.1-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121679" version="1" comment="perl-Module-Signature is &lt;0.79-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127859" version="1" comment="apache2-mod_php5 is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127860" version="1" comment="php5 is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127861" version="1" comment="php5-bcmath is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127862" version="1" comment="php5-bz2 is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127863" version="1" comment="php5-calendar is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127864" version="1" comment="php5-ctype is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127865" version="1" comment="php5-curl is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127866" version="1" comment="php5-dba is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127867" version="1" comment="php5-devel is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127868" version="1" comment="php5-dom is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127869" version="1" comment="php5-enchant is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127870" version="1" comment="php5-exif is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127871" version="1" comment="php5-fastcgi is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127872" version="1" comment="php5-fileinfo is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127873" version="1" comment="php5-firebird is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127874" version="1" comment="php5-fpm is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127875" version="1" comment="php5-ftp is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127876" version="1" comment="php5-gd is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127877" version="1" comment="php5-gettext is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127878" version="1" comment="php5-gmp is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127879" version="1" comment="php5-iconv is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127880" version="1" comment="php5-imap is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127881" version="1" comment="php5-intl is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127882" version="1" comment="php5-json is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127883" version="1" comment="php5-ldap is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127884" version="1" comment="php5-mbstring is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127885" version="1" comment="php5-mcrypt is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127886" version="1" comment="php5-mssql is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127887" version="1" comment="php5-mysql is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127888" version="1" comment="php5-odbc is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127889" version="1" comment="php5-opcache is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127890" version="1" comment="php5-openssl is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127891" version="1" comment="php5-pcntl is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127892" version="1" comment="php5-pdo is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127893" version="1" comment="php5-pear is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127894" version="1" comment="php5-pgsql is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127895" version="1" comment="php5-phar is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127896" version="1" comment="php5-posix is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127897" version="1" comment="php5-pspell is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127898" version="1" comment="php5-readline is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127899" version="1" comment="php5-shmop is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127900" version="1" comment="php5-snmp is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127901" version="1" comment="php5-soap is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127902" version="1" comment="php5-sockets is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127903" version="1" comment="php5-sqlite is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127904" version="1" comment="php5-suhosin is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127905" version="1" comment="php5-sysvmsg is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127906" version="1" comment="php5-sysvsem is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127907" version="1" comment="php5-sysvshm is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127908" version="1" comment="php5-tidy is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127909" version="1" comment="php5-tokenizer is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127910" version="1" comment="php5-wddx is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127911" version="1" comment="php5-xmlreader is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127912" version="1" comment="php5-xmlrpc is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127913" version="1" comment="php5-xmlwriter is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127914" version="1" comment="php5-xsl is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127915" version="1" comment="php5-zip is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127916" version="1" comment="php5-zlib is &lt;5.6.1-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127951" version="1" comment="libksba is &lt;1.3.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127952" version="1" comment="libksba-devel is &lt;1.3.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127953" version="1" comment="libksba8 is &lt;1.3.1-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128060" version="1" comment="libreoffice is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128061" version="1" comment="libreoffice-base is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128062" version="1" comment="libreoffice-base-drivers-mysql is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128063" version="1" comment="libreoffice-base-drivers-postgresql is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128064" version="1" comment="libreoffice-branding-upstream is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128065" version="1" comment="libreoffice-calc is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128066" version="1" comment="libreoffice-calc-extensions is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128067" version="1" comment="libreoffice-draw is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128068" version="1" comment="libreoffice-filters-optional is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128069" version="1" comment="libreoffice-gnome is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128070" version="1" comment="libreoffice-gtk3 is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128071" version="1" comment="libreoffice-icon-theme-breeze is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128072" version="1" comment="libreoffice-icon-theme-galaxy is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128073" version="1" comment="libreoffice-icon-theme-hicontrast is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128074" version="1" comment="libreoffice-icon-theme-oxygen is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128075" version="1" comment="libreoffice-icon-theme-sifr is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038216"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128076" version="1" comment="libreoffice-icon-theme-tango is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128077" version="1" comment="libreoffice-impress is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128078" version="1" comment="libreoffice-kde4 is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128079" version="1" comment="libreoffice-l10n-af is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128080" version="1" comment="libreoffice-l10n-ar is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128081" version="1" comment="libreoffice-l10n-as is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128082" version="1" comment="libreoffice-l10n-bg is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128083" version="1" comment="libreoffice-l10n-bn is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128084" version="1" comment="libreoffice-l10n-br is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128085" version="1" comment="libreoffice-l10n-ca is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128086" version="1" comment="libreoffice-l10n-cs is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128087" version="1" comment="libreoffice-l10n-cy is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128088" version="1" comment="libreoffice-l10n-da is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128089" version="1" comment="libreoffice-l10n-de is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128090" version="1" comment="libreoffice-l10n-dz is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128091" version="1" comment="libreoffice-l10n-el is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128092" version="1" comment="libreoffice-l10n-en is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128093" version="1" comment="libreoffice-l10n-es is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034133"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128094" version="1" comment="libreoffice-l10n-et is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128095" version="1" comment="libreoffice-l10n-eu is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128096" version="1" comment="libreoffice-l10n-fa is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128097" version="1" comment="libreoffice-l10n-fi is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128098" version="1" comment="libreoffice-l10n-fr is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128099" version="1" comment="libreoffice-l10n-ga is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128100" version="1" comment="libreoffice-l10n-gl is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128101" version="1" comment="libreoffice-l10n-gu is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128102" version="1" comment="libreoffice-l10n-he is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128103" version="1" comment="libreoffice-l10n-hi is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128104" version="1" comment="libreoffice-l10n-hr is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128105" version="1" comment="libreoffice-l10n-hu is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128106" version="1" comment="libreoffice-l10n-it is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128107" version="1" comment="libreoffice-l10n-ja is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128108" version="1" comment="libreoffice-l10n-kk is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128109" version="1" comment="libreoffice-l10n-kn is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128110" version="1" comment="libreoffice-l10n-ko is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128111" version="1" comment="libreoffice-l10n-lt is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128112" version="1" comment="libreoffice-l10n-lv is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038224"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128113" version="1" comment="libreoffice-l10n-mai is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128114" version="1" comment="libreoffice-l10n-ml is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128115" version="1" comment="libreoffice-l10n-mr is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128116" version="1" comment="libreoffice-l10n-nb is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128117" version="1" comment="libreoffice-l10n-nl is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128118" version="1" comment="libreoffice-l10n-nn is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128119" version="1" comment="libreoffice-l10n-nr is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128120" version="1" comment="libreoffice-l10n-nso is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128121" version="1" comment="libreoffice-l10n-or is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128122" version="1" comment="libreoffice-l10n-pa is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128123" version="1" comment="libreoffice-l10n-pl is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128124" version="1" comment="libreoffice-l10n-pt-BR is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128125" version="1" comment="libreoffice-l10n-pt-PT is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128126" version="1" comment="libreoffice-l10n-ro is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128127" version="1" comment="libreoffice-l10n-ru is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128128" version="1" comment="libreoffice-l10n-si is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128129" version="1" comment="libreoffice-l10n-sk is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128130" version="1" comment="libreoffice-l10n-sl is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128131" version="1" comment="libreoffice-l10n-sr is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128132" version="1" comment="libreoffice-l10n-ss is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128133" version="1" comment="libreoffice-l10n-st is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128134" version="1" comment="libreoffice-l10n-sv is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128135" version="1" comment="libreoffice-l10n-ta is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128136" version="1" comment="libreoffice-l10n-te is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128137" version="1" comment="libreoffice-l10n-th is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128138" version="1" comment="libreoffice-l10n-tn is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128139" version="1" comment="libreoffice-l10n-tr is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128140" version="1" comment="libreoffice-l10n-ts is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128141" version="1" comment="libreoffice-l10n-uk is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128142" version="1" comment="libreoffice-l10n-ve is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128143" version="1" comment="libreoffice-l10n-xh is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128144" version="1" comment="libreoffice-l10n-zh-Hans is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128145" version="1" comment="libreoffice-l10n-zh-Hant is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128146" version="1" comment="libreoffice-l10n-zu is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128147" version="1" comment="libreoffice-mailmerge is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128148" version="1" comment="libreoffice-math is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128149" version="1" comment="libreoffice-officebean is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128150" version="1" comment="libreoffice-pyuno is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128151" version="1" comment="libreoffice-sdk is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128152" version="1" comment="libreoffice-sdk-doc is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128153" version="1" comment="libreoffice-writer is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128154" version="1" comment="libreoffice-writer-extensions is &lt;5.0.6.3-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128155" version="1" comment="docker is &lt;1.9.1-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128156" version="1" comment="docker-bash-completion is &lt;1.9.1-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128157" version="1" comment="docker-test is &lt;1.9.1-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128158" version="1" comment="docker-zsh-completion is &lt;1.9.1-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128159" version="1" comment="ntp is &lt;4.2.8p7-25.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128160" version="1" comment="ntp-doc is &lt;4.2.8p7-25.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128189" version="1" comment="phpMyAdmin is &lt;4.4.15.6-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128193" version="1" comment="ctdb is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128194" version="1" comment="ctdb-devel is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128195" version="1" comment="ctdb-pcp-pmda is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128196" version="1" comment="ctdb-tests is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128197" version="1" comment="libdcerpc-atsvc-devel is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128198" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128199" version="1" comment="libdcerpc-atsvc0-32bit is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128200" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128201" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128202" version="1" comment="libdcerpc-devel is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128203" version="1" comment="libdcerpc-samr-devel is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128204" version="1" comment="libdcerpc-samr0 is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128205" version="1" comment="libdcerpc-samr0-32bit is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128206" version="1" comment="libdcerpc0 is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128207" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128208" version="1" comment="libgensec-devel is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128209" version="1" comment="libgensec0 is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128210" version="1" comment="libgensec0-32bit is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128211" version="1" comment="libndr-devel is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128212" version="1" comment="libndr-krb5pac-devel is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128213" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128214" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128215" version="1" comment="libndr-nbt-devel is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128216" version="1" comment="libndr-nbt0 is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128217" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128218" version="1" comment="libndr-standard-devel is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128219" version="1" comment="libndr-standard0 is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128220" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128221" version="1" comment="libndr0 is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128222" version="1" comment="libndr0-32bit is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128223" version="1" comment="libnetapi-devel is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128224" version="1" comment="libnetapi0 is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128225" version="1" comment="libnetapi0-32bit is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128226" version="1" comment="libregistry-devel is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128227" version="1" comment="libregistry0 is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128228" version="1" comment="libregistry0-32bit is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128229" version="1" comment="libsamba-credentials-devel is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128230" version="1" comment="libsamba-credentials0 is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128231" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128232" version="1" comment="libsamba-hostconfig-devel is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128233" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128234" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128235" version="1" comment="libsamba-passdb-devel is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128236" version="1" comment="libsamba-passdb0 is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128237" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128238" version="1" comment="libsamba-policy-devel is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128239" version="1" comment="libsamba-policy0 is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128240" version="1" comment="libsamba-policy0-32bit is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128241" version="1" comment="libsamba-util-devel is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128242" version="1" comment="libsamba-util0 is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128243" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128244" version="1" comment="libsamdb-devel is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128245" version="1" comment="libsamdb0 is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128246" version="1" comment="libsamdb0-32bit is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128247" version="1" comment="libsmbclient-devel is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128248" version="1" comment="libsmbclient-raw-devel is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128249" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128250" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128251" version="1" comment="libsmbclient0 is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128252" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128253" version="1" comment="libsmbconf-devel is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128254" version="1" comment="libsmbconf0 is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128255" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128256" version="1" comment="libsmbldap-devel is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128257" version="1" comment="libsmbldap0 is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128258" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128259" version="1" comment="libtevent-util-devel is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128260" version="1" comment="libtevent-util0 is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128261" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128262" version="1" comment="libwbclient-devel is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128263" version="1" comment="libwbclient0 is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128264" version="1" comment="libwbclient0-32bit is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128265" version="1" comment="samba is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128266" version="1" comment="samba-32bit is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128267" version="1" comment="samba-client is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128268" version="1" comment="samba-client-32bit is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128269" version="1" comment="samba-core-devel is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128270" version="1" comment="samba-doc is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128271" version="1" comment="samba-libs is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128272" version="1" comment="samba-libs-32bit is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128273" version="1" comment="samba-pidl is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128274" version="1" comment="samba-python is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128275" version="1" comment="samba-test is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128276" version="1" comment="samba-test-devel is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128277" version="1" comment="samba-winbind is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128278" version="1" comment="samba-winbind-32bit is &lt;4.2.4-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128279" version="1" comment="expat is &lt;2.1.0-14.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128280" version="1" comment="libexpat-devel is &lt;2.1.0-14.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128281" version="1" comment="libexpat-devel-32bit is &lt;2.1.0-14.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128282" version="1" comment="libexpat1 is &lt;2.1.0-14.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128283" version="1" comment="libexpat1-32bit is &lt;2.1.0-14.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128284" version="1" comment="libxslt is &lt;1.1.28-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128285" version="1" comment="libxslt-devel is &lt;1.1.28-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128286" version="1" comment="libxslt-devel-32bit is &lt;1.1.28-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128287" version="1" comment="libxslt-python is &lt;1.1.28-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128288" version="1" comment="libxslt-tools is &lt;1.1.28-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128289" version="1" comment="libxslt1 is &lt;1.1.28-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128290" version="1" comment="libxslt1-32bit is &lt;1.1.28-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128291" version="1" comment="libxml2 is &lt;2.9.3-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128292" version="1" comment="libxml2-2 is &lt;2.9.3-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128293" version="1" comment="libxml2-2-32bit is &lt;2.9.3-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128294" version="1" comment="libxml2-devel is &lt;2.9.3-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128295" version="1" comment="libxml2-devel-32bit is &lt;2.9.3-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128296" version="1" comment="libxml2-doc is &lt;2.9.3-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128297" version="1" comment="libxml2-tools is &lt;2.9.3-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128298" version="1" comment="python-libxml2 is &lt;2.9.3-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128299" version="1" comment="redis is &lt;3.0.4-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128326" version="1" comment="putty is &lt;0.67-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128356" version="1" comment="bsdtar is &lt;3.1.2-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128357" version="1" comment="libarchive is &lt;3.1.2-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128358" version="1" comment="libarchive-devel is &lt;3.1.2-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128359" version="1" comment="libarchive13 is &lt;3.1.2-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128360" version="1" comment="libarchive13-32bit is &lt;3.1.2-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128361" version="1" comment="dosfstools is &lt;3.0.26-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128362" version="1" comment="python-virtualbox is &lt;5.0.20-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128363" version="1" comment="virtualbox is &lt;5.0.20-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128364" version="1" comment="virtualbox-devel is &lt;5.0.20-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128365" version="1" comment="virtualbox-guest-desktop-icons is &lt;5.0.20-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128366" version="1" comment="virtualbox-guest-kmp-default is &lt;5.0.20_k3.16.7_35-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128367" version="1" comment="virtualbox-guest-kmp-desktop is &lt;5.0.20_k3.16.7_35-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128368" version="1" comment="virtualbox-guest-kmp-pae is &lt;5.0.20_k3.16.7_35-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128369" version="1" comment="virtualbox-guest-tools is &lt;5.0.20-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128370" version="1" comment="virtualbox-guest-x11 is &lt;5.0.20-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128371" version="1" comment="virtualbox-host-kmp-default is &lt;5.0.20_k3.16.7_35-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128372" version="1" comment="virtualbox-host-kmp-desktop is &lt;5.0.20_k3.16.7_35-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128373" version="1" comment="virtualbox-host-kmp-pae is &lt;5.0.20_k3.16.7_35-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128374" version="1" comment="virtualbox-host-source is &lt;5.0.20-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128375" version="1" comment="virtualbox-qt is &lt;5.0.20-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128376" version="1" comment="virtualbox-websrv is &lt;5.0.20-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128377" version="1" comment="p7zip is &lt;9.20.1-12.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128405" version="1" comment="chromedriver is &lt;51.0.2704.79-105.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128406" version="1" comment="chromium is &lt;51.0.2704.79-105.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128407" version="1" comment="chromium-desktop-gnome is &lt;51.0.2704.79-105.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128408" version="1" comment="chromium-desktop-kde is &lt;51.0.2704.79-105.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128409" version="1" comment="chromium-ffmpegsumo is &lt;51.0.2704.79-105.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128485" version="1" comment="gd is &lt;2.1.0-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128486" version="1" comment="gd-devel is &lt;2.1.0-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128487" version="1" comment="libgd3 is &lt;2.1.0-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128488" version="1" comment="libgd3-32bit is &lt;2.1.0-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121925" version="1" comment="cgit is &lt;0.12-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128494" version="1" comment="GraphicsMagick is &lt;1.3.20-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128495" version="1" comment="GraphicsMagick-devel is &lt;1.3.20-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128496" version="1" comment="libGraphicsMagick++-Q16-3 is &lt;1.3.20-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128497" version="1" comment="libGraphicsMagick++-devel is &lt;1.3.20-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128498" version="1" comment="libGraphicsMagick-Q16-3 is &lt;1.3.20-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128499" version="1" comment="libGraphicsMagick3-config is &lt;1.3.20-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128500" version="1" comment="libGraphicsMagickWand-Q16-2 is &lt;1.3.20-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128501" version="1" comment="perl-GraphicsMagick is &lt;1.3.20-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128502" version="1" comment="imobiledevice-tools is &lt;1.2.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128503" version="1" comment="iproxy is &lt;1.0.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128504" version="1" comment="libimobiledevice is &lt;1.2.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128505" version="1" comment="libimobiledevice-devel is &lt;1.2.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128506" version="1" comment="libimobiledevice-doc is &lt;1.2.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128507" version="1" comment="libimobiledevice4 is &lt;1.1.6-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128508" version="1" comment="libimobiledevice4-32bit is &lt;1.1.6-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128509" version="1" comment="libimobiledevice6 is &lt;1.2.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128510" version="1" comment="libimobiledevice6-32bit is &lt;1.2.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128511" version="1" comment="libusbmuxd is &lt;1.0.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128512" version="1" comment="libusbmuxd-devel is &lt;1.0.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128513" version="1" comment="libusbmuxd2 is &lt;1.0.9-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128514" version="1" comment="libusbmuxd2-32bit is &lt;1.0.9-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128515" version="1" comment="libusbmuxd4 is &lt;1.0.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128516" version="1" comment="libusbmuxd4-32bit is &lt;1.0.10-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128517" version="1" comment="python-imobiledevice is &lt;1.2.0-6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128518" version="1" comment="glibc is &lt;2.19-16.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128519" version="1" comment="glibc-32bit is &lt;2.19-16.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128520" version="1" comment="glibc-devel is &lt;2.19-16.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128521" version="1" comment="glibc-devel-32bit is &lt;2.19-16.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128522" version="1" comment="glibc-devel-static is &lt;2.19-16.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128523" version="1" comment="glibc-devel-static-32bit is &lt;2.19-16.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128524" version="1" comment="glibc-extra is &lt;2.19-16.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128525" version="1" comment="glibc-html is &lt;2.19-16.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128526" version="1" comment="glibc-i18ndata is &lt;2.19-16.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128527" version="1" comment="glibc-info is &lt;2.19-16.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128528" version="1" comment="glibc-locale is &lt;2.19-16.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128529" version="1" comment="glibc-locale-32bit is &lt;2.19-16.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128530" version="1" comment="glibc-obsolete is &lt;2.19-16.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128531" version="1" comment="glibc-profile is &lt;2.19-16.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128532" version="1" comment="glibc-profile-32bit is &lt;2.19-16.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128533" version="1" comment="glibc-testsuite is &lt;2.19-16.25.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128534" version="1" comment="glibc-utils is &lt;2.19-16.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128535" version="1" comment="glibc-utils-32bit is &lt;2.19-16.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128536" version="1" comment="nscd is &lt;2.19-16.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128622" version="1" comment="ImageMagick is &lt;6.8.9.8-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128623" version="1" comment="ImageMagick-devel is &lt;6.8.9.8-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128624" version="1" comment="ImageMagick-devel-32bit is &lt;6.8.9.8-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128625" version="1" comment="ImageMagick-doc is &lt;6.8.9.8-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128626" version="1" comment="ImageMagick-extra is &lt;6.8.9.8-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128627" version="1" comment="libMagick++-6_Q16-5 is &lt;6.8.9.8-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128628" version="1" comment="libMagick++-6_Q16-5-32bit is &lt;6.8.9.8-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128629" version="1" comment="libMagick++-devel is &lt;6.8.9.8-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128630" version="1" comment="libMagick++-devel-32bit is &lt;6.8.9.8-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128631" version="1" comment="libMagickCore-6_Q16-2 is &lt;6.8.9.8-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128632" version="1" comment="libMagickCore-6_Q16-2-32bit is &lt;6.8.9.8-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128633" version="1" comment="libMagickWand-6_Q16-2 is &lt;6.8.9.8-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128634" version="1" comment="libMagickWand-6_Q16-2-32bit is &lt;6.8.9.8-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128635" version="1" comment="perl-PerlMagick is &lt;6.8.9.8-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128692" version="1" comment="apache2-mod_php5 is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128693" version="1" comment="php5 is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128694" version="1" comment="php5-bcmath is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128695" version="1" comment="php5-bz2 is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128696" version="1" comment="php5-calendar is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128697" version="1" comment="php5-ctype is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128698" version="1" comment="php5-curl is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128699" version="1" comment="php5-dba is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128700" version="1" comment="php5-devel is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128701" version="1" comment="php5-dom is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128702" version="1" comment="php5-enchant is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128703" version="1" comment="php5-exif is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128704" version="1" comment="php5-fastcgi is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128705" version="1" comment="php5-fileinfo is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128706" version="1" comment="php5-firebird is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128707" version="1" comment="php5-fpm is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128708" version="1" comment="php5-ftp is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128709" version="1" comment="php5-gd is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128710" version="1" comment="php5-gettext is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128711" version="1" comment="php5-gmp is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128712" version="1" comment="php5-iconv is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128713" version="1" comment="php5-imap is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128714" version="1" comment="php5-intl is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128715" version="1" comment="php5-json is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128716" version="1" comment="php5-ldap is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128717" version="1" comment="php5-mbstring is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128718" version="1" comment="php5-mcrypt is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128719" version="1" comment="php5-mssql is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128720" version="1" comment="php5-mysql is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128721" version="1" comment="php5-odbc is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128722" version="1" comment="php5-opcache is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128723" version="1" comment="php5-openssl is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128724" version="1" comment="php5-pcntl is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128725" version="1" comment="php5-pdo is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128726" version="1" comment="php5-pear is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128727" version="1" comment="php5-pgsql is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128728" version="1" comment="php5-phar is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128729" version="1" comment="php5-posix is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128730" version="1" comment="php5-pspell is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128731" version="1" comment="php5-readline is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128732" version="1" comment="php5-shmop is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128733" version="1" comment="php5-snmp is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128734" version="1" comment="php5-soap is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128735" version="1" comment="php5-sockets is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128736" version="1" comment="php5-sqlite is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128737" version="1" comment="php5-suhosin is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128738" version="1" comment="php5-sysvmsg is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128739" version="1" comment="php5-sysvsem is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128740" version="1" comment="php5-sysvshm is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128741" version="1" comment="php5-tidy is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128742" version="1" comment="php5-tokenizer is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128743" version="1" comment="php5-wddx is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128744" version="1" comment="php5-xmlreader is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128745" version="1" comment="php5-xmlrpc is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128746" version="1" comment="php5-xmlwriter is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128747" version="1" comment="php5-xsl is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128748" version="1" comment="php5-zip is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128749" version="1" comment="php5-zlib is &lt;5.6.1-66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128750" version="1" comment="MozillaFirefox is &lt;47.0-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128751" version="1" comment="MozillaFirefox-branding-upstream is &lt;47.0-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128752" version="1" comment="MozillaFirefox-buildsymbols is &lt;47.0-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128753" version="1" comment="MozillaFirefox-devel is &lt;47.0-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128754" version="1" comment="MozillaFirefox-translations-common is &lt;47.0-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128755" version="1" comment="MozillaFirefox-translations-other is &lt;47.0-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128756" version="1" comment="libfreebl3 is &lt;3.23-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128757" version="1" comment="libfreebl3-32bit is &lt;3.23-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128758" version="1" comment="libsoftokn3 is &lt;3.23-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128759" version="1" comment="libsoftokn3-32bit is &lt;3.23-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128760" version="1" comment="mozilla-nss is &lt;3.23-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128761" version="1" comment="mozilla-nss-32bit is &lt;3.23-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128762" version="1" comment="mozilla-nss-certs is &lt;3.23-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128763" version="1" comment="mozilla-nss-certs-32bit is &lt;3.23-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128764" version="1" comment="mozilla-nss-devel is &lt;3.23-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128765" version="1" comment="mozilla-nss-sysinit is &lt;3.23-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128766" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.23-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128767" version="1" comment="mozilla-nss-tools is &lt;3.23-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121926" version="1" comment="bind is &lt;9.9.6P1-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121927" version="1" comment="bind-chrootenv is &lt;9.9.6P1-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121928" version="1" comment="bind-devel is &lt;9.9.6P1-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121929" version="1" comment="bind-doc is &lt;9.9.6P1-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121930" version="1" comment="bind-libs is &lt;9.9.6P1-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121931" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121932" version="1" comment="bind-lwresd is &lt;9.9.6P1-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121933" version="1" comment="bind-utils is &lt;9.9.6P1-2.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128870" version="1" comment="nodejs is &lt;4.4.5-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128871" version="1" comment="nodejs-devel is &lt;4.4.5-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128872" version="1" comment="nodejs-doc is &lt;4.4.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128873" version="1" comment="nodejs-docs is &lt;4.4.5-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128874" version="1" comment="npm is &lt;4.4.5-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128875" version="1" comment="libtasn1 is &lt;3.7-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128876" version="1" comment="libtasn1-6 is &lt;3.7-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128877" version="1" comment="libtasn1-6-32bit is &lt;3.7-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128878" version="1" comment="libtasn1-devel is &lt;3.7-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128879" version="1" comment="libtasn1-devel-32bit is &lt;3.7-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121934" version="1" comment="giflib is &lt;5.0.5-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121935" version="1" comment="giflib-devel is &lt;5.0.5-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032175"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121936" version="1" comment="giflib-devel-32bit is &lt;5.0.5-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121937" version="1" comment="giflib-progs is &lt;5.0.5-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121938" version="1" comment="libgif6 is &lt;5.0.5-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121939" version="1" comment="libgif6-32bit is &lt;5.0.5-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128886" version="1" comment="ntp is &lt;4.2.8p8-25.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128887" version="1" comment="ntp-doc is &lt;4.2.8p8-25.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128921" version="1" comment="libxml2 is &lt;2.9.4-7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128922" version="1" comment="libxml2-2 is &lt;2.9.4-7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128923" version="1" comment="libxml2-2-32bit is &lt;2.9.4-7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128924" version="1" comment="libxml2-devel is &lt;2.9.4-7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128925" version="1" comment="libxml2-devel-32bit is &lt;2.9.4-7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128926" version="1" comment="libxml2-doc is &lt;2.9.4-7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128927" version="1" comment="libxml2-tools is &lt;2.9.4-7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128928" version="1" comment="python-libxml2 is &lt;2.9.4-7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128990" version="1" comment="wireshark is &lt;1.12.12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128991" version="1" comment="wireshark-devel is &lt;1.12.12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128992" version="1" comment="wireshark-ui-gtk is &lt;1.12.12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128993" version="1" comment="wireshark-ui-qt is &lt;1.12.12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128994" version="1" comment="flash-player is &lt;11.2.202.626-2.100.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128995" version="1" comment="flash-player-gnome is &lt;11.2.202.626-2.100.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128996" version="1" comment="flash-player-kde4 is &lt;11.2.202.626-2.100.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129009" version="1" comment="chromedriver is &lt;51.0.2704.103-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129010" version="1" comment="chromium is &lt;51.0.2704.103-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129011" version="1" comment="chromium-desktop-gnome is &lt;51.0.2704.103-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129012" version="1" comment="chromium-desktop-kde is &lt;51.0.2704.103-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129013" version="1" comment="chromium-ffmpegsumo is &lt;51.0.2704.103-108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129074" version="1" comment="libtorrent-rasterbar is &lt;1.0.9-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129075" version="1" comment="libtorrent-rasterbar-devel is &lt;1.0.9-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129076" version="1" comment="libtorrent-rasterbar-doc is &lt;1.0.9-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129077" version="1" comment="libtorrent-rasterbar7 is &lt;0.16.17-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129078" version="1" comment="libtorrent-rasterbar8 is &lt;1.0.9-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129079" version="1" comment="python-libtorrent-rasterbar is &lt;1.0.9-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129080" version="1" comment="ctdb is &lt;2.5.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129081" version="1" comment="ctdb-devel is &lt;2.5.5-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129082" version="1" comment="ctdb-pcp-pmda is &lt;2.5.3-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129185" version="1" comment="libvlc5 is &lt;2.1.6-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129186" version="1" comment="libvlccore7 is &lt;2.1.6-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129187" version="1" comment="vlc is &lt;2.1.6-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129188" version="1" comment="vlc-devel is &lt;2.1.6-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129189" version="1" comment="vlc-gnome is &lt;2.1.6-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129190" version="1" comment="vlc-noX is &lt;2.1.6-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129191" version="1" comment="vlc-noX-lang is &lt;2.1.6-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129192" version="1" comment="vlc-qt is &lt;2.1.6-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129193" version="1" comment="obs-service-source_validator is &lt;0.6+git20160531.fbfe336-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129216" version="1" comment="libmysqlclient-devel is &lt;10.0.25-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129217" version="1" comment="libmysqlclient18 is &lt;10.0.25-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129218" version="1" comment="libmysqlclient18-32bit is &lt;10.0.25-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129219" version="1" comment="libmysqlclient_r18 is &lt;10.0.25-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129220" version="1" comment="libmysqlclient_r18-32bit is &lt;10.0.25-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129221" version="1" comment="libmysqld-devel is &lt;10.0.25-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129222" version="1" comment="libmysqld18 is &lt;10.0.25-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129223" version="1" comment="mariadb is &lt;10.0.25-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129224" version="1" comment="mariadb-bench is &lt;10.0.25-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129225" version="1" comment="mariadb-client is &lt;10.0.25-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129226" version="1" comment="mariadb-errormessages is &lt;10.0.25-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129227" version="1" comment="mariadb-test is &lt;10.0.25-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129228" version="1" comment="mariadb-tools is &lt;10.0.25-2.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121989" version="1" comment="libvirt is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121990" version="1" comment="libvirt-client is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121991" version="1" comment="libvirt-client-32bit is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121992" version="1" comment="libvirt-daemon is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121993" version="1" comment="libvirt-daemon-config-network is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121994" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121995" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121996" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121997" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121998" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121999" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122000" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122001" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122002" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122003" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122004" version="1" comment="libvirt-daemon-driver-uml is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122005" version="1" comment="libvirt-daemon-driver-vbox is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122006" version="1" comment="libvirt-daemon-driver-xen is &lt;1.2.9-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122007" version="1" comment="libvirt-daemon-lxc is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122008" version="1" comment="libvirt-daemon-qemu is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122009" version="1" comment="libvirt-daemon-uml is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122010" version="1" comment="libvirt-daemon-vbox is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122011" version="1" comment="libvirt-daemon-xen is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122012" version="1" comment="libvirt-devel is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122013" version="1" comment="libvirt-devel-32bit is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122014" version="1" comment="libvirt-doc is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122015" version="1" comment="libvirt-lock-sanlock is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122016" version="1" comment="libvirt-login-shell is &lt;1.2.18.2-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129256" version="1" comment="bsdtar is &lt;3.1.2-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129257" version="1" comment="libarchive is &lt;3.1.2-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129258" version="1" comment="libarchive-devel is &lt;3.1.2-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129259" version="1" comment="libarchive13 is &lt;3.1.2-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129260" version="1" comment="libarchive13-32bit is &lt;3.1.2-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122017" version="1" comment="jasper is &lt;1.900.1-163.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122018" version="1" comment="libjasper-devel is &lt;1.900.1-163.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122019" version="1" comment="libjasper1 is &lt;1.900.1-163.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122020" version="1" comment="libjasper1-32bit is &lt;1.900.1-163.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122021" version="1" comment="libtiff-devel is &lt;4.0.6-10.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122022" version="1" comment="libtiff-devel-32bit is &lt;4.0.6-10.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122023" version="1" comment="libtiff5 is &lt;4.0.6-10.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122024" version="1" comment="libtiff5-32bit is &lt;4.0.6-10.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122025" version="1" comment="tiff is &lt;4.0.6-10.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129366" version="1" comment="rsync is &lt;3.1.1-2.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129367" version="1" comment="phpMyAdmin is &lt;4.4.15.7-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122026" version="1" comment="roundcubemail is &lt;1.0.8-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129704" version="1" comment="kinit is &lt;5.21.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129705" version="1" comment="kinit-32bit is &lt;5.21.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129706" version="1" comment="kinit-devel is &lt;5.21.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129707" version="1" comment="kinit-lang is &lt;5.21.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129708" version="1" comment="gimp is &lt;2.8.16-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129709" version="1" comment="gimp-devel is &lt;2.8.16-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129710" version="1" comment="gimp-help-browser is &lt;2.8.16-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129711" version="1" comment="gimp-lang is &lt;2.8.16-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129712" version="1" comment="gimp-plugin-aa is &lt;2.8.16-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129713" version="1" comment="gimp-plugins-python is &lt;2.8.16-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129714" version="1" comment="libgimp-2_0-0 is &lt;2.8.16-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129715" version="1" comment="libgimp-2_0-0-32bit is &lt;2.8.16-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129716" version="1" comment="libgimpui-2_0-0 is &lt;2.8.16-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129717" version="1" comment="libgimpui-2_0-0-32bit is &lt;2.8.16-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129692" version="1" comment="libspice-server-devel is &lt;0.12.4-4.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129693" version="1" comment="libspice-server1 is &lt;0.12.4-4.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129694" version="1" comment="spice is &lt;0.12.4-4.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129695" version="1" comment="spice-client is &lt;0.12.4-4.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129696" version="1" comment="GraphicsMagick is &lt;1.3.20-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129697" version="1" comment="GraphicsMagick-devel is &lt;1.3.20-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129698" version="1" comment="libGraphicsMagick++-Q16-3 is &lt;1.3.20-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129699" version="1" comment="libGraphicsMagick++-devel is &lt;1.3.20-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129700" version="1" comment="libGraphicsMagick-Q16-3 is &lt;1.3.20-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129701" version="1" comment="libGraphicsMagick3-config is &lt;1.3.20-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129702" version="1" comment="libGraphicsMagickWand-Q16-2 is &lt;1.3.20-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129703" version="1" comment="perl-GraphicsMagick is &lt;1.3.20-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129739" version="1" comment="libircclient is &lt;1.6-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129740" version="1" comment="libircclient-devel is &lt;1.6-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129741" version="1" comment="libircclient-doc is &lt;1.6-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129742" version="1" comment="libircclient1 is &lt;1.6-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129743" version="1" comment="cronic is &lt;3-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129744" version="1" comment="libxerces-c-3_1 is &lt;3.1.1-13.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129745" version="1" comment="libxerces-c-3_1-32bit is &lt;3.1.1-13.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129746" version="1" comment="libxerces-c-devel is &lt;3.1.1-13.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129747" version="1" comment="xerces-c is &lt;3.1.1-13.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129762" version="1" comment="ImageMagick is &lt;6.8.9.8-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129763" version="1" comment="ImageMagick-devel is &lt;6.8.9.8-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129764" version="1" comment="ImageMagick-devel-32bit is &lt;6.8.9.8-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129765" version="1" comment="ImageMagick-doc is &lt;6.8.9.8-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129766" version="1" comment="ImageMagick-extra is &lt;6.8.9.8-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129767" version="1" comment="libMagick++-6_Q16-5 is &lt;6.8.9.8-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129768" version="1" comment="libMagick++-6_Q16-5-32bit is &lt;6.8.9.8-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129769" version="1" comment="libMagick++-devel is &lt;6.8.9.8-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129770" version="1" comment="libMagick++-devel-32bit is &lt;6.8.9.8-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129771" version="1" comment="libMagickCore-6_Q16-2 is &lt;6.8.9.8-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129772" version="1" comment="libMagickCore-6_Q16-2-32bit is &lt;6.8.9.8-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129773" version="1" comment="libMagickWand-6_Q16-2 is &lt;6.8.9.8-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129774" version="1" comment="libMagickWand-6_Q16-2-32bit is &lt;6.8.9.8-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129775" version="1" comment="perl-PerlMagick is &lt;6.8.9.8-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129776" version="1" comment="apache2-mod_php5 is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129777" version="1" comment="php5 is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129778" version="1" comment="php5-bcmath is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129779" version="1" comment="php5-bz2 is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129780" version="1" comment="php5-calendar is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129781" version="1" comment="php5-ctype is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129782" version="1" comment="php5-curl is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129783" version="1" comment="php5-dba is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129784" version="1" comment="php5-devel is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129785" version="1" comment="php5-dom is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129786" version="1" comment="php5-enchant is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129787" version="1" comment="php5-exif is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129788" version="1" comment="php5-fastcgi is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129789" version="1" comment="php5-fileinfo is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129790" version="1" comment="php5-firebird is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129791" version="1" comment="php5-fpm is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129792" version="1" comment="php5-ftp is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129793" version="1" comment="php5-gd is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129794" version="1" comment="php5-gettext is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129795" version="1" comment="php5-gmp is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129796" version="1" comment="php5-iconv is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129797" version="1" comment="php5-imap is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129798" version="1" comment="php5-intl is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129799" version="1" comment="php5-json is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129800" version="1" comment="php5-ldap is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129801" version="1" comment="php5-mbstring is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129802" version="1" comment="php5-mcrypt is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129803" version="1" comment="php5-mssql is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129804" version="1" comment="php5-mysql is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129805" version="1" comment="php5-odbc is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129806" version="1" comment="php5-opcache is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129807" version="1" comment="php5-openssl is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129808" version="1" comment="php5-pcntl is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129809" version="1" comment="php5-pdo is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129810" version="1" comment="php5-pear is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129811" version="1" comment="php5-pgsql is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129812" version="1" comment="php5-phar is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129813" version="1" comment="php5-posix is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129814" version="1" comment="php5-pspell is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129815" version="1" comment="php5-readline is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129816" version="1" comment="php5-shmop is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129817" version="1" comment="php5-snmp is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129818" version="1" comment="php5-soap is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129819" version="1" comment="php5-sockets is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129820" version="1" comment="php5-sqlite is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129821" version="1" comment="php5-suhosin is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129822" version="1" comment="php5-sysvmsg is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129823" version="1" comment="php5-sysvsem is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129824" version="1" comment="php5-sysvshm is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129825" version="1" comment="php5-tidy is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129826" version="1" comment="php5-tokenizer is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129827" version="1" comment="php5-wddx is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129828" version="1" comment="php5-xmlreader is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129829" version="1" comment="php5-xmlrpc is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129830" version="1" comment="php5-xmlwriter is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129831" version="1" comment="php5-xsl is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129832" version="1" comment="php5-zip is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129833" version="1" comment="php5-zlib is &lt;5.6.1-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129875" version="1" comment="MozillaThunderbird is &lt;45.2-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129876" version="1" comment="MozillaThunderbird-buildsymbols is &lt;45.2-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129877" version="1" comment="MozillaThunderbird-devel is &lt;45.2-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129878" version="1" comment="MozillaThunderbird-translations-common is &lt;45.2-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129879" version="1" comment="MozillaThunderbird-translations-other is &lt;45.2-16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130044" version="1" comment="flash-player is &lt;11.2.202.632-2.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130045" version="1" comment="flash-player-gnome is &lt;11.2.202.632-2.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130046" version="1" comment="flash-player-kde4 is &lt;11.2.202.632-2.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130386" version="1" comment="libvirt is &lt;1.2.9-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130387" version="1" comment="libvirt-client is &lt;1.2.9-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130388" version="1" comment="libvirt-client-32bit is &lt;1.2.9-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130389" version="1" comment="libvirt-daemon is &lt;1.2.9-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130390" version="1" comment="libvirt-daemon-config-network is &lt;1.2.9-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130391" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.9-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130392" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.9-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130393" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.9-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130394" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.9-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130395" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.9-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130396" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.9-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130397" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.9-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130398" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.9-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130399" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.9-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130400" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.9-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130401" version="1" comment="libvirt-daemon-driver-uml is &lt;1.2.9-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130402" version="1" comment="libvirt-daemon-driver-vbox is &lt;1.2.9-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130403" version="1" comment="libvirt-daemon-driver-xen is &lt;1.2.9-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130404" version="1" comment="libvirt-daemon-lxc is &lt;1.2.9-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130405" version="1" comment="libvirt-daemon-qemu is &lt;1.2.9-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130406" version="1" comment="libvirt-daemon-uml is &lt;1.2.9-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130407" version="1" comment="libvirt-daemon-vbox is &lt;1.2.9-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130408" version="1" comment="libvirt-daemon-xen is &lt;1.2.9-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130409" version="1" comment="libvirt-devel is &lt;1.2.9-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130410" version="1" comment="libvirt-devel-32bit is &lt;1.2.9-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130411" version="1" comment="libvirt-doc is &lt;1.2.9-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130412" version="1" comment="libvirt-lock-sanlock is &lt;1.2.9-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130413" version="1" comment="libvirt-login-shell is &lt;1.2.9-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130414" version="1" comment="libxerces-c-3_1 is &lt;3.1.4-13.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130415" version="1" comment="libxerces-c-3_1-32bit is &lt;3.1.4-13.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130416" version="1" comment="libxerces-c-devel is &lt;3.1.4-13.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130417" version="1" comment="xerces-c is &lt;3.1.4-13.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130418" version="1" comment="xerces-c-doc is &lt;3.1.4-13.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130467" version="1" comment="apache2 is &lt;2.4.16-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130468" version="1" comment="apache2-devel is &lt;2.4.16-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130469" version="1" comment="apache2-doc is &lt;2.4.16-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130470" version="1" comment="apache2-event is &lt;2.4.16-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130471" version="1" comment="apache2-example-pages is &lt;2.4.16-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130472" version="1" comment="apache2-prefork is &lt;2.4.16-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130473" version="1" comment="apache2-utils is &lt;2.4.16-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130474" version="1" comment="apache2-worker is &lt;2.4.16-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130475" version="1" comment="ctdb is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130476" version="1" comment="ctdb-devel is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130477" version="1" comment="ctdb-pcp-pmda is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130478" version="1" comment="ctdb-tests is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130479" version="1" comment="libdcerpc-atsvc-devel is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130480" version="1" comment="libdcerpc-atsvc0 is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130481" version="1" comment="libdcerpc-atsvc0-32bit is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130482" version="1" comment="libdcerpc-binding0 is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130483" version="1" comment="libdcerpc-binding0-32bit is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130484" version="1" comment="libdcerpc-devel is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130485" version="1" comment="libdcerpc-samr-devel is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130486" version="1" comment="libdcerpc-samr0 is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130487" version="1" comment="libdcerpc-samr0-32bit is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130488" version="1" comment="libdcerpc0 is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130489" version="1" comment="libdcerpc0-32bit is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130490" version="1" comment="libgensec-devel is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130491" version="1" comment="libgensec0 is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130492" version="1" comment="libgensec0-32bit is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130493" version="1" comment="libndr-devel is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130494" version="1" comment="libndr-krb5pac-devel is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130495" version="1" comment="libndr-krb5pac0 is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130496" version="1" comment="libndr-krb5pac0-32bit is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130497" version="1" comment="libndr-nbt-devel is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130498" version="1" comment="libndr-nbt0 is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130499" version="1" comment="libndr-nbt0-32bit is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130500" version="1" comment="libndr-standard-devel is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130501" version="1" comment="libndr-standard0 is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130502" version="1" comment="libndr-standard0-32bit is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130503" version="1" comment="libndr0 is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130504" version="1" comment="libndr0-32bit is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130505" version="1" comment="libnetapi-devel is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130506" version="1" comment="libnetapi0 is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130507" version="1" comment="libnetapi0-32bit is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130508" version="1" comment="libregistry-devel is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130509" version="1" comment="libregistry0 is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130510" version="1" comment="libregistry0-32bit is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130511" version="1" comment="libsamba-credentials-devel is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130512" version="1" comment="libsamba-credentials0 is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130513" version="1" comment="libsamba-credentials0-32bit is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130514" version="1" comment="libsamba-hostconfig-devel is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130515" version="1" comment="libsamba-hostconfig0 is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130516" version="1" comment="libsamba-hostconfig0-32bit is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130517" version="1" comment="libsamba-passdb-devel is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130518" version="1" comment="libsamba-passdb0 is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130519" version="1" comment="libsamba-passdb0-32bit is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130520" version="1" comment="libsamba-policy-devel is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130521" version="1" comment="libsamba-policy0 is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130522" version="1" comment="libsamba-policy0-32bit is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130523" version="1" comment="libsamba-util-devel is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130524" version="1" comment="libsamba-util0 is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130525" version="1" comment="libsamba-util0-32bit is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130526" version="1" comment="libsamdb-devel is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130527" version="1" comment="libsamdb0 is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130528" version="1" comment="libsamdb0-32bit is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130529" version="1" comment="libsmbclient-devel is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130530" version="1" comment="libsmbclient-raw-devel is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130531" version="1" comment="libsmbclient-raw0 is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130532" version="1" comment="libsmbclient-raw0-32bit is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130533" version="1" comment="libsmbclient0 is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130534" version="1" comment="libsmbclient0-32bit is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130535" version="1" comment="libsmbconf-devel is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130536" version="1" comment="libsmbconf0 is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130537" version="1" comment="libsmbconf0-32bit is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130538" version="1" comment="libsmbldap-devel is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130539" version="1" comment="libsmbldap0 is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130540" version="1" comment="libsmbldap0-32bit is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130541" version="1" comment="libtevent-util-devel is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130542" version="1" comment="libtevent-util0 is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130543" version="1" comment="libtevent-util0-32bit is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130544" version="1" comment="libwbclient-devel is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130545" version="1" comment="libwbclient0 is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130546" version="1" comment="libwbclient0-32bit is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130547" version="1" comment="samba is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130548" version="1" comment="samba-32bit is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130549" version="1" comment="samba-client is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130550" version="1" comment="samba-client-32bit is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130551" version="1" comment="samba-core-devel is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130552" version="1" comment="samba-doc is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130553" version="1" comment="samba-libs is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130554" version="1" comment="samba-libs-32bit is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130555" version="1" comment="samba-pidl is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130556" version="1" comment="samba-python is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130557" version="1" comment="samba-test is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130558" version="1" comment="samba-test-devel is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130559" version="1" comment="samba-winbind is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130560" version="1" comment="samba-winbind-32bit is &lt;4.2.4-40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130626" version="1" comment="nodejs is &lt;4.4.5-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130627" version="1" comment="nodejs-devel is &lt;4.4.5-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130628" version="1" comment="nodejs-doc is &lt;4.4.5-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130629" version="1" comment="nodejs-docs is &lt;4.4.5-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130630" version="1" comment="npm is &lt;4.4.5-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130654" version="1" comment="gnugk is &lt;4.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130655" version="1" comment="h323plus is &lt;1.26.5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130656" version="1" comment="h323plus-devel is &lt;1.26.5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130657" version="1" comment="libh323-1_26_5 is &lt;1.26.5-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130660" version="1" comment="chromedriver is &lt;52.0.2743.82-111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130661" version="1" comment="chromium is &lt;52.0.2743.82-111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130662" version="1" comment="chromium-desktop-gnome is &lt;52.0.2743.82-111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130663" version="1" comment="chromium-desktop-kde is &lt;52.0.2743.82-111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130664" version="1" comment="chromium-ffmpegsumo is &lt;52.0.2743.82-111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130670" version="1" comment="karchive is &lt;5.21.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130671" version="1" comment="karchive-devel is &lt;5.21.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130672" version="1" comment="karchive-devel-32bit is &lt;5.21.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130673" version="1" comment="libKF5Archive5 is &lt;5.21.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130674" version="1" comment="libKF5Archive5-32bit is &lt;5.21.0-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130675" version="1" comment="libpython2_7-1_0 is &lt;2.7.12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130676" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130677" version="1" comment="python is &lt;2.7.12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130678" version="1" comment="python-32bit is &lt;2.7.12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130679" version="1" comment="python-base is &lt;2.7.12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130680" version="1" comment="python-base-32bit is &lt;2.7.12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130681" version="1" comment="python-curses is &lt;2.7.12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130682" version="1" comment="python-demo is &lt;2.7.12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130683" version="1" comment="python-devel is &lt;2.7.12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130684" version="1" comment="python-doc is &lt;2.7.12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130685" version="1" comment="python-doc-pdf is &lt;2.7.12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130686" version="1" comment="python-gdbm is &lt;2.7.12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130687" version="1" comment="python-idle is &lt;2.7.12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130688" version="1" comment="python-tk is &lt;2.7.12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130689" version="1" comment="python-xml is &lt;2.7.12-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130690" version="1" comment="go is &lt;1.4.3-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130691" version="1" comment="go-doc is &lt;1.4.3-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130692" version="1" comment="libtiff-devel is &lt;4.0.6-10.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130693" version="1" comment="libtiff-devel-32bit is &lt;4.0.6-10.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130694" version="1" comment="libtiff5 is &lt;4.0.6-10.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130695" version="1" comment="libtiff5-32bit is &lt;4.0.6-10.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130696" version="1" comment="tiff is &lt;4.0.6-10.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130697" version="1" comment="dropbear is &lt;2016.74-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122067" version="1" comment="compat-libldap-2_3-0 is &lt;2.3.37-8.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122068" version="1" comment="libldap-2_4-2 is &lt;2.4.39-8.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122069" version="1" comment="libldap-2_4-2-32bit is &lt;2.4.39-8.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122070" version="1" comment="openldap2 is &lt;2.4.39-8.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122071" version="1" comment="openldap2-back-meta is &lt;2.4.39-8.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122072" version="1" comment="openldap2-back-perl is &lt;2.4.39-8.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122073" version="1" comment="openldap2-back-sql is &lt;2.4.39-8.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122074" version="1" comment="openldap2-client is &lt;2.4.39-8.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122075" version="1" comment="openldap2-devel is &lt;2.4.39-8.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122076" version="1" comment="openldap2-devel-32bit is &lt;2.4.39-8.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122077" version="1" comment="openldap2-devel-static is &lt;2.4.39-8.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122078" version="1" comment="openldap2-doc is &lt;2.4.39-8.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130734" version="1" comment="libidn is &lt;1.33-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130735" version="1" comment="libidn-devel is &lt;1.33-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038783"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130736" version="1" comment="libidn-tools is &lt;1.33-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130737" version="1" comment="libidn11 is &lt;1.33-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130738" version="1" comment="libidn11-32bit is &lt;1.33-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130739" version="1" comment="mupdf is &lt;1.7a-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130740" version="1" comment="mupdf-devel-static is &lt;1.7a-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122079" version="1" comment="ecryptfs-utils is &lt;104-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122080" version="1" comment="ecryptfs-utils-32bit is &lt;104-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130741" version="1" comment="libsqlite3-0 is &lt;3.8.6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130742" version="1" comment="libsqlite3-0-32bit is &lt;3.8.6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130743" version="1" comment="sqlite3 is &lt;3.8.6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130744" version="1" comment="sqlite3-devel is &lt;3.8.6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130745" version="1" comment="sqlite3-doc is &lt;3.8.6-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130746" version="1" comment="libpolarssl7 is &lt;1.3.9-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130747" version="1" comment="polarssl is &lt;1.3.9-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130748" version="1" comment="polarssl-devel is &lt;1.3.9-17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130796" version="1" comment="MozillaFirefox is &lt;48.0-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130797" version="1" comment="MozillaFirefox-branding-upstream is &lt;48.0-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130798" version="1" comment="MozillaFirefox-buildsymbols is &lt;48.0-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130799" version="1" comment="MozillaFirefox-devel is &lt;48.0-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130800" version="1" comment="MozillaFirefox-translations-common is &lt;48.0-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130801" version="1" comment="MozillaFirefox-translations-other is &lt;48.0-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130802" version="1" comment="libfreebl3 is &lt;3.24-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130803" version="1" comment="libfreebl3-32bit is &lt;3.24-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130804" version="1" comment="libsoftokn3 is &lt;3.24-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130805" version="1" comment="libsoftokn3-32bit is &lt;3.24-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130806" version="1" comment="mozilla-nss is &lt;3.24-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130807" version="1" comment="mozilla-nss-32bit is &lt;3.24-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130808" version="1" comment="mozilla-nss-certs is &lt;3.24-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130809" version="1" comment="mozilla-nss-certs-32bit is &lt;3.24-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130810" version="1" comment="mozilla-nss-devel is &lt;3.24-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130811" version="1" comment="mozilla-nss-sysinit is &lt;3.24-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130812" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.24-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130813" version="1" comment="mozilla-nss-tools is &lt;3.24-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130864" version="1" comment="java-1_8_0-openjdk is &lt;1.8.0.101-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130865" version="1" comment="java-1_8_0-openjdk-accessibility is &lt;1.8.0.101-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130866" version="1" comment="java-1_8_0-openjdk-demo is &lt;1.8.0.101-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130867" version="1" comment="java-1_8_0-openjdk-devel is &lt;1.8.0.101-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130868" version="1" comment="java-1_8_0-openjdk-headless is &lt;1.8.0.101-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130869" version="1" comment="java-1_8_0-openjdk-javadoc is &lt;1.8.0.101-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130870" version="1" comment="java-1_8_0-openjdk-src is &lt;1.8.0.101-30.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130871" version="1" comment="redis is &lt;3.0.4-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130872" version="1" comment="bsdiff is &lt;4.3-9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130873" version="1" comment="wireshark is &lt;1.12.13-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130874" version="1" comment="wireshark-devel is &lt;1.12.13-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130875" version="1" comment="wireshark-ui-gtk is &lt;1.12.13-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130876" version="1" comment="wireshark-ui-qt is &lt;1.12.13-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130910" version="1" comment="chromedriver is &lt;52.0.2743.116-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130911" version="1" comment="chromium is &lt;52.0.2743.116-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130912" version="1" comment="chromium-desktop-gnome is &lt;52.0.2743.116-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130913" version="1" comment="chromium-desktop-kde is &lt;52.0.2743.116-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130914" version="1" comment="chromium-ffmpegsumo is &lt;52.0.2743.116-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134011" version="1" comment="wget is &lt;1.16-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134012" version="1" comment="java-1_7_0-openjdk is &lt;1.7.0.111-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134013" version="1" comment="java-1_7_0-openjdk-accessibility is &lt;1.7.0.111-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134014" version="1" comment="java-1_7_0-openjdk-bootstrap is &lt;1.7.0.111-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134015" version="1" comment="java-1_7_0-openjdk-bootstrap-devel is &lt;1.7.0.111-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134016" version="1" comment="java-1_7_0-openjdk-bootstrap-headless is &lt;1.7.0.111-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134017" version="1" comment="java-1_7_0-openjdk-demo is &lt;1.7.0.111-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134018" version="1" comment="java-1_7_0-openjdk-devel is &lt;1.7.0.111-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134019" version="1" comment="java-1_7_0-openjdk-headless is &lt;1.7.0.111-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134020" version="1" comment="java-1_7_0-openjdk-javadoc is &lt;1.7.0.111-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134021" version="1" comment="java-1_7_0-openjdk-src is &lt;1.7.0.111-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134022" version="1" comment="go is &lt;1.6.2-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134023" version="1" comment="go-doc is &lt;1.6.2-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134024" version="1" comment="ImageMagick is &lt;6.8.9.8-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134025" version="1" comment="ImageMagick-devel is &lt;6.8.9.8-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134026" version="1" comment="ImageMagick-devel-32bit is &lt;6.8.9.8-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134027" version="1" comment="ImageMagick-doc is &lt;6.8.9.8-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134028" version="1" comment="ImageMagick-extra is &lt;6.8.9.8-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134029" version="1" comment="libMagick++-6_Q16-5 is &lt;6.8.9.8-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134030" version="1" comment="libMagick++-6_Q16-5-32bit is &lt;6.8.9.8-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134031" version="1" comment="libMagick++-devel is &lt;6.8.9.8-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134032" version="1" comment="libMagick++-devel-32bit is &lt;6.8.9.8-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134033" version="1" comment="libMagickCore-6_Q16-2 is &lt;6.8.9.8-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134034" version="1" comment="libMagickCore-6_Q16-2-32bit is &lt;6.8.9.8-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134035" version="1" comment="libMagickWand-6_Q16-2 is &lt;6.8.9.8-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134036" version="1" comment="libMagickWand-6_Q16-2-32bit is &lt;6.8.9.8-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134037" version="1" comment="perl-PerlMagick is &lt;6.8.9.8-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134038" version="1" comment="apache2-mod_php5 is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134039" version="1" comment="php5 is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134040" version="1" comment="php5-bcmath is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134041" version="1" comment="php5-bz2 is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134042" version="1" comment="php5-calendar is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134043" version="1" comment="php5-ctype is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134044" version="1" comment="php5-curl is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134045" version="1" comment="php5-dba is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134046" version="1" comment="php5-devel is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134047" version="1" comment="php5-dom is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134048" version="1" comment="php5-enchant is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134049" version="1" comment="php5-exif is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134050" version="1" comment="php5-fastcgi is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134051" version="1" comment="php5-fileinfo is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134052" version="1" comment="php5-firebird is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134053" version="1" comment="php5-fpm is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134054" version="1" comment="php5-ftp is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134055" version="1" comment="php5-gd is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134056" version="1" comment="php5-gettext is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134057" version="1" comment="php5-gmp is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134058" version="1" comment="php5-iconv is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134059" version="1" comment="php5-imap is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134060" version="1" comment="php5-intl is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134061" version="1" comment="php5-json is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134062" version="1" comment="php5-ldap is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134063" version="1" comment="php5-mbstring is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134064" version="1" comment="php5-mcrypt is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134065" version="1" comment="php5-mssql is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134066" version="1" comment="php5-mysql is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134067" version="1" comment="php5-odbc is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134068" version="1" comment="php5-opcache is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134069" version="1" comment="php5-openssl is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134070" version="1" comment="php5-pcntl is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134071" version="1" comment="php5-pdo is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134072" version="1" comment="php5-pear is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134073" version="1" comment="php5-pgsql is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134074" version="1" comment="php5-phar is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134075" version="1" comment="php5-posix is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134076" version="1" comment="php5-pspell is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134077" version="1" comment="php5-readline is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134078" version="1" comment="php5-shmop is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134079" version="1" comment="php5-snmp is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134080" version="1" comment="php5-soap is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134081" version="1" comment="php5-sockets is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134082" version="1" comment="php5-sqlite is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134083" version="1" comment="php5-suhosin is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134084" version="1" comment="php5-sysvmsg is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134085" version="1" comment="php5-sysvsem is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134086" version="1" comment="php5-sysvshm is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134087" version="1" comment="php5-tidy is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134088" version="1" comment="php5-tokenizer is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134089" version="1" comment="php5-wddx is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134090" version="1" comment="php5-xmlreader is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134091" version="1" comment="php5-xmlrpc is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134092" version="1" comment="php5-xmlwriter is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134093" version="1" comment="php5-xsl is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134094" version="1" comment="php5-zip is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134095" version="1" comment="php5-zlib is &lt;5.6.1-72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134096" version="1" comment="harfbuzz is &lt;1.0.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134097" version="1" comment="harfbuzz-devel is &lt;1.0.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134098" version="1" comment="harfbuzz-tools is &lt;1.0.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134099" version="1" comment="libharfbuzz-icu0 is &lt;1.0.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134100" version="1" comment="libharfbuzz-icu0-32bit is &lt;1.0.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134101" version="1" comment="libharfbuzz0 is &lt;1.0.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134102" version="1" comment="libharfbuzz0-32bit is &lt;1.0.3-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122188" version="1" comment="chromedriver is &lt;48.0.2564.82-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122189" version="1" comment="chromium is &lt;48.0.2564.82-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122190" version="1" comment="chromium-desktop-gnome is &lt;48.0.2564.82-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122191" version="1" comment="chromium-desktop-kde is &lt;48.0.2564.82-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122192" version="1" comment="chromium-ffmpegsumo is &lt;48.0.2564.82-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134103" version="1" comment="roundcubemail is &lt;1.0.9-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134104" version="1" comment="libpython3_4m1_0 is &lt;3.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134105" version="1" comment="libpython3_4m1_0-32bit is &lt;3.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134106" version="1" comment="python3 is &lt;3.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134107" version="1" comment="python3-32bit is &lt;3.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134108" version="1" comment="python3-base is &lt;3.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134109" version="1" comment="python3-base-32bit is &lt;3.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134110" version="1" comment="python3-curses is &lt;3.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134111" version="1" comment="python3-dbm is &lt;3.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134112" version="1" comment="python3-devel is &lt;3.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134113" version="1" comment="python3-doc is &lt;3.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134114" version="1" comment="python3-doc-pdf is &lt;3.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134115" version="1" comment="python3-idle is &lt;3.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134116" version="1" comment="python3-testsuite is &lt;3.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134117" version="1" comment="python3-tk is &lt;3.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134118" version="1" comment="python3-tools is &lt;3.4.5-8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048358"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146986" version="1" comment="icoutils is &lt;0.31.1-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147253" version="1" comment="libpcsclite1 is &lt;1.8.17-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147254" version="1" comment="libpcsclite1-32bit is &lt;1.8.17-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147255" version="1" comment="libpcscspy0 is &lt;1.8.17-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147256" version="1" comment="libpcscspy0-32bit is &lt;1.8.17-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147257" version="1" comment="pcsc-lite is &lt;1.8.17-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147258" version="1" comment="pcsc-lite-devel is &lt;1.8.17-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147259" version="1" comment="libopenjp2-7 is &lt;2.1.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147260" version="1" comment="openjpeg2 is &lt;2.1.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147261" version="1" comment="openjpeg2-devel is &lt;2.1.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147262" version="1" comment="bind is &lt;9.9.6P1-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147263" version="1" comment="bind-chrootenv is &lt;9.9.6P1-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147264" version="1" comment="bind-devel is &lt;9.9.6P1-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147265" version="1" comment="bind-doc is &lt;9.9.6P1-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147266" version="1" comment="bind-libs is &lt;9.9.6P1-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147267" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147268" version="1" comment="bind-lwresd is &lt;9.9.6P1-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147269" version="1" comment="bind-utils is &lt;9.9.6P1-2.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147270" version="1" comment="libgit2 is &lt;0.21.5-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147271" version="1" comment="libgit2-21 is &lt;0.21.5-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147272" version="1" comment="libgit2-devel is &lt;0.21.5-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147273" version="1" comment="pdns is &lt;3.4.9-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147274" version="1" comment="pdns-backend-ldap is &lt;3.4.9-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147275" version="1" comment="pdns-backend-lua is &lt;3.4.9-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147276" version="1" comment="pdns-backend-mydns is &lt;3.4.9-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147277" version="1" comment="pdns-backend-mysql is &lt;3.4.9-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147278" version="1" comment="pdns-backend-postgresql is &lt;3.4.9-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147279" version="1" comment="pdns-backend-sqlite3 is &lt;3.4.9-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146588" version="1" comment="kopete is &lt;16.08.2-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146589" version="1" comment="kopete-devel is &lt;15.12.3-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146189" version="1" comment="xen is &lt;4.4.4_06-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146190" version="1" comment="xen-devel is &lt;4.4.4_06-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146191" version="1" comment="xen-doc-html is &lt;4.4.4_06-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146192" version="1" comment="xen-kmp-default is &lt;4.4.4_06_k3.16.7_53-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146193" version="1" comment="xen-kmp-desktop is &lt;4.4.4_06_k3.16.7_53-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146194" version="1" comment="xen-libs is &lt;4.4.4_06-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146195" version="1" comment="xen-libs-32bit is &lt;4.4.4_06-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146196" version="1" comment="xen-tools is &lt;4.4.4_06-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146197" version="1" comment="xen-tools-domU is &lt;4.4.4_06-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146853" version="1" comment="irssi is &lt;0.8.21-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146854" version="1" comment="irssi-devel is &lt;0.8.21-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146955" version="1" comment="flash-player is &lt;24.0.0.194-2.124.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146956" version="1" comment="flash-player-gnome is &lt;24.0.0.194-2.124.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146957" version="1" comment="flash-player-kde4 is &lt;24.0.0.194-2.124.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146987" version="1" comment="encfs is &lt;1.8.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146988" version="1" comment="encfs-lang is &lt;1.8.1-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146989" version="1" comment="gstreamer-plugins-good is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146990" version="1" comment="gstreamer-plugins-good-32bit is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146991" version="1" comment="gstreamer-plugins-good-doc is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146992" version="1" comment="gstreamer-plugins-good-extra is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146993" version="1" comment="gstreamer-plugins-good-extra-32bit is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146994" version="1" comment="gstreamer-plugins-good-lang is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146995" version="1" comment="gstreamer-plugins-bad is &lt;1.4.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146996" version="1" comment="gstreamer-plugins-bad-32bit is &lt;1.4.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146997" version="1" comment="gstreamer-plugins-bad-devel is &lt;1.4.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146998" version="1" comment="gstreamer-plugins-bad-doc is &lt;1.4.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146999" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.4.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147000" version="1" comment="libgstbadbase-1_0-0 is &lt;1.4.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147001" version="1" comment="libgstbadbase-1_0-0-32bit is &lt;1.4.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147002" version="1" comment="libgstbadvideo-1_0-0 is &lt;1.4.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147003" version="1" comment="libgstbadvideo-1_0-0-32bit is &lt;1.4.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147004" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.4.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147005" version="1" comment="libgstbasecamerabinsrc-1_0-0-32bit is &lt;1.4.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147006" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.4.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147007" version="1" comment="libgstcodecparsers-1_0-0-32bit is &lt;1.4.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147008" version="1" comment="libgstgl-1_0-0 is &lt;1.4.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147009" version="1" comment="libgstgl-1_0-0-32bit is &lt;1.4.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147010" version="1" comment="libgstinsertbin-1_0-0 is &lt;1.4.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147011" version="1" comment="libgstinsertbin-1_0-0-32bit is &lt;1.4.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147012" version="1" comment="libgstmpegts-1_0-0 is &lt;1.4.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147013" version="1" comment="libgstmpegts-1_0-0-32bit is &lt;1.4.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147014" version="1" comment="libgstphotography-1_0-0 is &lt;1.4.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147015" version="1" comment="libgstphotography-1_0-0-32bit is &lt;1.4.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147016" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.4.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147017" version="1" comment="libgsturidownloader-1_0-0-32bit is &lt;1.4.3-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147018" version="1" comment="gstreamer-0_10-plugins-bad is &lt;0.10.23-15.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147019" version="1" comment="gstreamer-0_10-plugins-bad-32bit is &lt;0.10.23-15.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147020" version="1" comment="gstreamer-0_10-plugins-bad-devel is &lt;0.10.23-15.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147021" version="1" comment="gstreamer-0_10-plugins-bad-doc is &lt;0.10.23-15.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147022" version="1" comment="gstreamer-0_10-plugins-bad-lang is &lt;0.10.23-15.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147023" version="1" comment="libgstbasecamerabinsrc-0_10-23 is &lt;0.10.23-15.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147024" version="1" comment="libgstbasecamerabinsrc-0_10-23-32bit is &lt;0.10.23-15.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147025" version="1" comment="libgstbasevideo-0_10-23 is &lt;0.10.23-15.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147026" version="1" comment="libgstbasevideo-0_10-23-32bit is &lt;0.10.23-15.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147027" version="1" comment="libgstcodecparsers-0_10-23 is &lt;0.10.23-15.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147028" version="1" comment="libgstcodecparsers-0_10-23-32bit is &lt;0.10.23-15.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147029" version="1" comment="libgstphotography-0_10-23 is &lt;0.10.23-15.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147030" version="1" comment="libgstphotography-0_10-23-32bit is &lt;0.10.23-15.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147031" version="1" comment="libgstsignalprocessor-0_10-23 is &lt;0.10.23-15.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147032" version="1" comment="libgstsignalprocessor-0_10-23-32bit is &lt;0.10.23-15.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147033" version="1" comment="libgstvdp-0_10-23 is &lt;0.10.23-15.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147034" version="1" comment="libgstvdp-0_10-23-32bit is &lt;0.10.23-15.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147035" version="1" comment="python-pycrypto is &lt;2.6.1-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147036" version="1" comment="gstreamer-plugins-base is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147037" version="1" comment="gstreamer-plugins-base-32bit is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147038" version="1" comment="gstreamer-plugins-base-devel is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147039" version="1" comment="gstreamer-plugins-base-doc is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147040" version="1" comment="gstreamer-plugins-base-lang is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147041" version="1" comment="libgstallocators-1_0-0 is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147042" version="1" comment="libgstallocators-1_0-0-32bit is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147043" version="1" comment="libgstapp-1_0-0 is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147044" version="1" comment="libgstapp-1_0-0-32bit is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147045" version="1" comment="libgstaudio-1_0-0 is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147046" version="1" comment="libgstaudio-1_0-0-32bit is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147047" version="1" comment="libgstfft-1_0-0 is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147048" version="1" comment="libgstfft-1_0-0-32bit is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147049" version="1" comment="libgstpbutils-1_0-0 is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147050" version="1" comment="libgstpbutils-1_0-0-32bit is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147051" version="1" comment="libgstriff-1_0-0 is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147052" version="1" comment="libgstriff-1_0-0-32bit is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147053" version="1" comment="libgstrtp-1_0-0 is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147054" version="1" comment="libgstrtp-1_0-0-32bit is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147055" version="1" comment="libgstrtsp-1_0-0 is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147056" version="1" comment="libgstrtsp-1_0-0-32bit is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147057" version="1" comment="libgstsdp-1_0-0 is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147058" version="1" comment="libgstsdp-1_0-0-32bit is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147059" version="1" comment="libgsttag-1_0-0 is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147060" version="1" comment="libgsttag-1_0-0-32bit is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147061" version="1" comment="libgstvideo-1_0-0 is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147062" version="1" comment="libgstvideo-1_0-0-32bit is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147063" version="1" comment="typelib-1_0-GstAllocators-1_0 is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147064" version="1" comment="typelib-1_0-GstApp-1_0 is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147065" version="1" comment="typelib-1_0-GstAudio-1_0 is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147066" version="1" comment="typelib-1_0-GstFft-1_0 is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147067" version="1" comment="typelib-1_0-GstPbutils-1_0 is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147068" version="1" comment="typelib-1_0-GstRiff-1_0 is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147069" version="1" comment="typelib-1_0-GstRtp-1_0 is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147070" version="1" comment="typelib-1_0-GstRtsp-1_0 is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147071" version="1" comment="typelib-1_0-GstSdp-1_0 is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147072" version="1" comment="typelib-1_0-GstTag-1_0 is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147073" version="1" comment="typelib-1_0-GstVideo-1_0 is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147074" version="1" comment="gstreamer-0_10-plugin-esd is &lt;0.10.31-13.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147075" version="1" comment="gstreamer-0_10-plugin-esd-32bit is &lt;0.10.31-13.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147076" version="1" comment="gstreamer-0_10-plugins-good is &lt;0.10.31-13.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147077" version="1" comment="gstreamer-0_10-plugins-good-32bit is &lt;0.10.31-13.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147078" version="1" comment="gstreamer-0_10-plugins-good-doc is &lt;0.10.31-13.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147079" version="1" comment="gstreamer-0_10-plugins-good-extra is &lt;0.10.31-13.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147080" version="1" comment="gstreamer-0_10-plugins-good-extra-32bit is &lt;0.10.31-13.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147081" version="1" comment="gstreamer-0_10-plugins-good-lang is &lt;0.10.31-13.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147082" version="1" comment="gstreamer-0_10-plugin-gnomevfs is &lt;0.10.36-11.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147086" version="1" comment="gstreamer-0_10-plugins-base-doc is &lt;0.10.36-11.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123520" version="1" comment="postgresql93 is &lt;9.3.11-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123521" version="1" comment="postgresql93-contrib is &lt;9.3.11-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123522" version="1" comment="postgresql93-devel is &lt;9.3.11-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123523" version="1" comment="postgresql93-docs is &lt;9.3.11-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123524" version="1" comment="postgresql93-libs is &lt;9.3.11-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123525" version="1" comment="postgresql93-plperl is &lt;9.3.11-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123526" version="1" comment="postgresql93-plpython is &lt;9.3.11-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123527" version="1" comment="postgresql93-pltcl is &lt;9.3.11-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123528" version="1" comment="postgresql93-server is &lt;9.3.11-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123529" version="1" comment="postgresql93-test is &lt;9.3.11-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130658" version="1" comment="gnugk is &lt;4.2-139.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124418" version="1" comment="libopenssl0_9_8 is &lt;0.9.8zh-9.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124419" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8zh-9.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134119" version="1" comment="typo3-cms-4_7 is &lt;4.7.20-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134120" version="1" comment="typo3-cms-4_5 is &lt;4.5.40-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115550" version="1" comment="libpotrace0 is &lt;1.13-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115551" version="1" comment="potrace is &lt;1.13-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115552" version="1" comment="potrace-devel is &lt;1.13-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124420" version="1" comment="eog is &lt;3.14.5-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124421" version="1" comment="eog-devel is &lt;3.14.5-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124422" version="1" comment="eog-lang is &lt;3.14.5-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130877" version="1" comment="redis is &lt;2.8.22-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147094" version="1" comment="python-pycrypto is &lt;2.6.1-3.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125580" version="1" comment="libjavascriptcoregtk-1_0-0 is &lt;2.4.10-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125581" version="1" comment="libjavascriptcoregtk-1_0-0-32bit is &lt;2.4.10-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125582" version="1" comment="libjavascriptcoregtk-3_0-0 is &lt;2.4.10-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125583" version="1" comment="libjavascriptcoregtk-3_0-0-32bit is &lt;2.4.10-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125584" version="1" comment="libwebkitgtk-1_0-0 is &lt;2.4.10-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125585" version="1" comment="libwebkitgtk-1_0-0-32bit is &lt;2.4.10-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125586" version="1" comment="libwebkitgtk-3_0-0 is &lt;2.4.10-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125587" version="1" comment="libwebkitgtk-3_0-0-32bit is &lt;2.4.10-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125588" version="1" comment="libwebkitgtk-devel is &lt;2.4.10-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125589" version="1" comment="libwebkitgtk2-lang is &lt;2.4.10-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125590" version="1" comment="libwebkitgtk3-devel is &lt;2.4.10-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125591" version="1" comment="libwebkitgtk3-lang is &lt;2.4.10-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125592" version="1" comment="typelib-1_0-JavaScriptCore-1_0 is &lt;2.4.10-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125593" version="1" comment="typelib-1_0-JavaScriptCore-3_0 is &lt;2.4.10-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125594" version="1" comment="typelib-1_0-WebKit-1_0 is &lt;2.4.10-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125595" version="1" comment="typelib-1_0-WebKit-3_0 is &lt;2.4.10-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125596" version="1" comment="webkit-jsc-1 is &lt;2.4.10-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125597" version="1" comment="webkit-jsc-3 is &lt;2.4.10-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125598" version="1" comment="webkitgtk is &lt;2.4.10-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125599" version="1" comment="webkitgtk3 is &lt;2.4.10-13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147095" version="1" comment="encfs is &lt;1.8.1-25.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147096" version="1" comment="encfs-lang is &lt;1.8.1-25.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135911" version="1" comment="monit is &lt;5.20.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135912" version="1" comment="monit-doc is &lt;5.20.0-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134122" version="1" comment="libpython3_4m1_0-32bit is &lt;3.4.5-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134123" version="1" comment="python3 is &lt;3.4.5-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134124" version="1" comment="python3-32bit is &lt;3.4.5-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134126" version="1" comment="python3-base-32bit is &lt;3.4.5-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134127" version="1" comment="python3-curses is &lt;3.4.5-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134128" version="1" comment="python3-dbm is &lt;3.4.5-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134129" version="1" comment="python3-devel is &lt;3.4.5-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134130" version="1" comment="python3-doc is &lt;3.4.5-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134131" version="1" comment="python3-doc-pdf is &lt;3.4.5-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134132" version="1" comment="python3-idle is &lt;3.4.5-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134133" version="1" comment="python3-testsuite is &lt;3.4.5-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134134" version="1" comment="python3-tk is &lt;3.4.5-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134135" version="1" comment="python3-tools is &lt;3.4.5-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115287" version="1" comment="squid is &lt;3.4.4-3.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127695" version="1" comment="atheme is &lt;7.2.6-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127696" version="1" comment="atheme-devel is &lt;7.2.6-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127697" version="1" comment="libathemecore1 is &lt;7.2.6-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130878" version="1" comment="bsdiff is &lt;4.3-2.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118962" version="1" comment="libmysql56client18 is &lt;5.6.27-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118963" version="1" comment="libmysql56client18-32bit is &lt;5.6.27-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118964" version="1" comment="libmysql56client_r18 is &lt;5.6.27-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118965" version="1" comment="libmysql56client_r18-32bit is &lt;5.6.27-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118966" version="1" comment="mysql-community-server is &lt;5.6.27-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118967" version="1" comment="mysql-community-server-bench is &lt;5.6.27-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118968" version="1" comment="mysql-community-server-client is &lt;5.6.27-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118969" version="1" comment="mysql-community-server-errormessages is &lt;5.6.27-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118970" version="1" comment="mysql-community-server-test is &lt;5.6.27-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118971" version="1" comment="mysql-community-server-tools is &lt;5.6.27-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121328" version="1" comment="pitivi is &lt;0.94-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121329" version="1" comment="pitivi-lang is &lt;0.94-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118061" version="1" comment="chromedriver is &lt;46.0.2490.86-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118062" version="1" comment="chromium is &lt;46.0.2490.86-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118063" version="1" comment="chromium-desktop-gnome is &lt;46.0.2490.86-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118064" version="1" comment="chromium-desktop-kde is &lt;46.0.2490.86-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118065" version="1" comment="chromium-ffmpegsumo is &lt;46.0.2490.86-57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119788" version="1" comment="libXfont is &lt;1.5.0-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119789" version="1" comment="libXfont-devel is &lt;1.5.0-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119790" version="1" comment="libXfont-devel-32bit is &lt;1.5.0-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119791" version="1" comment="libXfont1 is &lt;1.5.0-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119792" version="1" comment="libXfont1-32bit is &lt;1.5.0-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127814" version="1" comment="libmysql56client18 is &lt;5.6.30-2.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127815" version="1" comment="libmysql56client18-32bit is &lt;5.6.30-2.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127816" version="1" comment="libmysql56client_r18 is &lt;5.6.30-2.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127817" version="1" comment="libmysql56client_r18-32bit is &lt;5.6.30-2.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127818" version="1" comment="mysql-community-server is &lt;5.6.30-2.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127819" version="1" comment="mysql-community-server-bench is &lt;5.6.30-2.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127820" version="1" comment="mysql-community-server-client is &lt;5.6.30-2.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127821" version="1" comment="mysql-community-server-errormessages is &lt;5.6.30-2.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127822" version="1" comment="mysql-community-server-test is &lt;5.6.30-2.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127823" version="1" comment="mysql-community-server-tools is &lt;5.6.30-2.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118333" version="1" comment="ppp is &lt;2.4.7-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118334" version="1" comment="ppp-devel is &lt;2.4.7-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123303" version="1" comment="socat is &lt;1.7.3.1-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125364" version="1" comment="MozillaThunderbird is &lt;38.7.0-40.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125365" version="1" comment="MozillaThunderbird-buildsymbols is &lt;38.7.0-40.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125366" version="1" comment="MozillaThunderbird-devel is &lt;38.7.0-40.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125367" version="1" comment="MozillaThunderbird-translations-common is &lt;38.7.0-40.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125368" version="1" comment="MozillaThunderbird-translations-other is &lt;38.7.0-40.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116086" version="1" comment="MozillaFirefox is &lt;42.0-50.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116087" version="1" comment="MozillaFirefox-branding-upstream is &lt;42.0-50.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116088" version="1" comment="MozillaFirefox-buildsymbols is &lt;42.0-50.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116089" version="1" comment="MozillaFirefox-devel is &lt;42.0-50.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116090" version="1" comment="MozillaFirefox-translations-common is &lt;42.0-50.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116091" version="1" comment="MozillaFirefox-translations-other is &lt;42.0-50.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116092" version="1" comment="libfreebl3 is &lt;3.20.1-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116093" version="1" comment="libfreebl3-32bit is &lt;3.20.1-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116094" version="1" comment="libsoftokn3 is &lt;3.20.1-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116095" version="1" comment="libsoftokn3-32bit is &lt;3.20.1-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116096" version="1" comment="mozilla-nss is &lt;3.20.1-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116097" version="1" comment="mozilla-nss-32bit is &lt;3.20.1-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116098" version="1" comment="mozilla-nss-certs is &lt;3.20.1-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116099" version="1" comment="mozilla-nss-certs-32bit is &lt;3.20.1-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116100" version="1" comment="mozilla-nss-devel is &lt;3.20.1-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116101" version="1" comment="mozilla-nss-sysinit is &lt;3.20.1-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116102" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.20.1-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116103" version="1" comment="mozilla-nss-tools is &lt;3.20.1-19.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116104" version="1" comment="seamonkey is &lt;2.39-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116105" version="1" comment="seamonkey-dom-inspector is &lt;2.39-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116106" version="1" comment="seamonkey-irc is &lt;2.39-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116107" version="1" comment="seamonkey-translations-common is &lt;2.39-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009116108" version="1" comment="seamonkey-translations-other is &lt;2.39-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115497" version="1" comment="libblkid-devel is &lt;2.25.1-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115498" version="1" comment="libblkid-devel-32bit is &lt;2.25.1-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115500" version="1" comment="libblkid1 is &lt;2.25.1-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115501" version="1" comment="libblkid1-32bit is &lt;2.25.1-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115502" version="1" comment="libmount-devel is &lt;2.25.1-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115503" version="1" comment="libmount-devel-32bit is &lt;2.25.1-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115505" version="1" comment="libmount1 is &lt;2.25.1-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115506" version="1" comment="libmount1-32bit is &lt;2.25.1-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115507" version="1" comment="libsmartcols-devel is &lt;2.25.1-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115509" version="1" comment="libsmartcols1 is &lt;2.25.1-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115510" version="1" comment="libuuid-devel is &lt;2.25.1-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115511" version="1" comment="libuuid-devel-32bit is &lt;2.25.1-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115513" version="1" comment="libuuid1 is &lt;2.25.1-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115514" version="1" comment="libuuid1-32bit is &lt;2.25.1-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115494" version="1" comment="python-libmount is &lt;2.25.1-20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115515" version="1" comment="util-linux is &lt;2.25.1-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115516" version="1" comment="util-linux-lang is &lt;2.25.1-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115495" version="1" comment="util-linux-systemd is &lt;2.25.1-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115496" version="1" comment="uuidd is &lt;2.25.1-20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118001" version="1" comment="putty is &lt;0.66-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122027" version="1" comment="libvirt is &lt;1.2.9-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122028" version="1" comment="libvirt-client is &lt;1.2.9-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122029" version="1" comment="libvirt-client-32bit is &lt;1.2.9-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122030" version="1" comment="libvirt-daemon is &lt;1.2.9-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122031" version="1" comment="libvirt-daemon-config-network is &lt;1.2.9-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122032" version="1" comment="libvirt-daemon-config-nwfilter is &lt;1.2.9-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122033" version="1" comment="libvirt-daemon-driver-interface is &lt;1.2.9-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122034" version="1" comment="libvirt-daemon-driver-libxl is &lt;1.2.9-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122035" version="1" comment="libvirt-daemon-driver-lxc is &lt;1.2.9-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122036" version="1" comment="libvirt-daemon-driver-network is &lt;1.2.9-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122037" version="1" comment="libvirt-daemon-driver-nodedev is &lt;1.2.9-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122038" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;1.2.9-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122039" version="1" comment="libvirt-daemon-driver-qemu is &lt;1.2.9-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122040" version="1" comment="libvirt-daemon-driver-secret is &lt;1.2.9-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122041" version="1" comment="libvirt-daemon-driver-storage is &lt;1.2.9-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122042" version="1" comment="libvirt-daemon-driver-uml is &lt;1.2.9-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122043" version="1" comment="libvirt-daemon-driver-vbox is &lt;1.2.9-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122044" version="1" comment="libvirt-daemon-lxc is &lt;1.2.9-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122045" version="1" comment="libvirt-daemon-qemu is &lt;1.2.9-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122046" version="1" comment="libvirt-daemon-uml is &lt;1.2.9-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122047" version="1" comment="libvirt-daemon-vbox is &lt;1.2.9-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122048" version="1" comment="libvirt-daemon-xen is &lt;1.2.9-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122049" version="1" comment="libvirt-devel is &lt;1.2.9-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122050" version="1" comment="libvirt-devel-32bit is &lt;1.2.9-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122051" version="1" comment="libvirt-doc is &lt;1.2.9-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122052" version="1" comment="libvirt-lock-sanlock is &lt;1.2.9-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122053" version="1" comment="libvirt-login-shell is &lt;1.2.9-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122915" version="1" comment="libmysql56client18 is &lt;5.6.28-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122916" version="1" comment="libmysql56client18-32bit is &lt;5.6.28-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122917" version="1" comment="libmysql56client_r18 is &lt;5.6.28-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122918" version="1" comment="libmysql56client_r18-32bit is &lt;5.6.28-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122919" version="1" comment="mysql-community-server is &lt;5.6.28-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122920" version="1" comment="mysql-community-server-bench is &lt;5.6.28-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122921" version="1" comment="mysql-community-server-client is &lt;5.6.28-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122922" version="1" comment="mysql-community-server-errormessages is &lt;5.6.28-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122923" version="1" comment="mysql-community-server-test is &lt;5.6.28-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122924" version="1" comment="mysql-community-server-tools is &lt;5.6.28-2.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118066" version="1" comment="libminiupnpc-devel is &lt;1.9-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118067" version="1" comment="libminiupnpc10 is &lt;1.9-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118068" version="1" comment="miniupnpc is &lt;1.9-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118069" version="1" comment="python-miniupnpc is &lt;1.9-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115283" version="1" comment="wireshark is &lt;1.12.8-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115284" version="1" comment="wireshark-devel is &lt;1.12.8-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115285" version="1" comment="wireshark-ui-gtk is &lt;1.12.8-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115286" version="1" comment="wireshark-ui-qt is &lt;1.12.8-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119596" version="1" comment="chromedriver is &lt;47.0.2526.80-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119597" version="1" comment="chromium is &lt;47.0.2526.80-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119598" version="1" comment="chromium-desktop-gnome is &lt;47.0.2526.80-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119599" version="1" comment="chromium-desktop-kde is &lt;47.0.2526.80-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119600" version="1" comment="chromium-ffmpegsumo is &lt;47.0.2526.80-61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121523" version="1" comment="nodejs is &lt;4.2.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121524" version="1" comment="nodejs-devel is &lt;4.2.4-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119883" version="1" comment="chromedriver is &lt;47.0.2526.106-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119884" version="1" comment="chromium is &lt;47.0.2526.106-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119885" version="1" comment="chromium-desktop-gnome is &lt;47.0.2526.106-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119886" version="1" comment="chromium-desktop-kde is &lt;47.0.2526.106-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119887" version="1" comment="chromium-ffmpegsumo is &lt;47.0.2526.106-64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119922" version="1" comment="MozillaFirefox is &lt;43.0-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119923" version="1" comment="MozillaFirefox-branding-upstream is &lt;43.0-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119924" version="1" comment="MozillaFirefox-buildsymbols is &lt;43.0-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119925" version="1" comment="MozillaFirefox-devel is &lt;43.0-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119926" version="1" comment="MozillaFirefox-translations-common is &lt;43.0-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119927" version="1" comment="MozillaFirefox-translations-other is &lt;43.0-53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120945" version="1" comment="MozillaThunderbird is &lt;38.5.0-34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120946" version="1" comment="MozillaThunderbird-buildsymbols is &lt;38.5.0-34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120947" version="1" comment="MozillaThunderbird-devel is &lt;38.5.0-34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120948" version="1" comment="MozillaThunderbird-translations-common is &lt;38.5.0-34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120949" version="1" comment="MozillaThunderbird-translations-other is &lt;38.5.0-34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122722" version="1" comment="seamonkey is &lt;2.40-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122723" version="1" comment="seamonkey-dom-inspector is &lt;2.40-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122724" version="1" comment="seamonkey-irc is &lt;2.40-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122725" version="1" comment="seamonkey-translations-common is &lt;2.40-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122726" version="1" comment="seamonkey-translations-other is &lt;2.40-26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122727" version="1" comment="MozillaFirefox is &lt;44.0-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122728" version="1" comment="MozillaFirefox-branding-upstream is &lt;44.0-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122729" version="1" comment="MozillaFirefox-buildsymbols is &lt;44.0-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122730" version="1" comment="MozillaFirefox-devel is &lt;44.0-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122731" version="1" comment="MozillaFirefox-translations-common is &lt;44.0-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122732" version="1" comment="MozillaFirefox-translations-other is &lt;44.0-59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122733" version="1" comment="libfreebl3 is &lt;3.21-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122734" version="1" comment="libfreebl3-32bit is &lt;3.21-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122735" version="1" comment="libsoftokn3 is &lt;3.21-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122736" version="1" comment="libsoftokn3-32bit is &lt;3.21-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122737" version="1" comment="mozilla-nspr is &lt;4.11-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122738" version="1" comment="mozilla-nspr-32bit is &lt;4.11-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122739" version="1" comment="mozilla-nspr-devel is &lt;4.11-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122740" version="1" comment="mozilla-nss is &lt;3.21-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122741" version="1" comment="mozilla-nss-32bit is &lt;3.21-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122742" version="1" comment="mozilla-nss-certs is &lt;3.21-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122743" version="1" comment="mozilla-nss-certs-32bit is &lt;3.21-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122744" version="1" comment="mozilla-nss-devel is &lt;3.21-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122745" version="1" comment="mozilla-nss-sysinit is &lt;3.21-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122746" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.21-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122747" version="1" comment="mozilla-nss-tools is &lt;3.21-25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117997" version="1" comment="nodejs is &lt;4.2.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009117998" version="1" comment="nodejs-devel is &lt;4.2.1-4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120985" version="1" comment="MozillaFirefox is &lt;43.0.3-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120986" version="1" comment="MozillaFirefox-branding-upstream is &lt;43.0.3-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120987" version="1" comment="MozillaFirefox-buildsymbols is &lt;43.0.3-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120988" version="1" comment="MozillaFirefox-devel is &lt;43.0.3-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120989" version="1" comment="MozillaFirefox-translations-common is &lt;43.0.3-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120990" version="1" comment="MozillaFirefox-translations-other is &lt;43.0.3-56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123859" version="1" comment="bouncycastle is &lt;1.54-13.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123860" version="1" comment="bouncycastle-javadoc is &lt;1.54-13.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120950" version="1" comment="libfreebl3 is &lt;3.20.2-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120951" version="1" comment="libfreebl3-32bit is &lt;3.20.2-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120952" version="1" comment="libsoftokn3 is &lt;3.20.2-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120953" version="1" comment="libsoftokn3-32bit is &lt;3.20.2-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120954" version="1" comment="mozilla-nss is &lt;3.20.2-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120955" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120956" version="1" comment="mozilla-nss-certs is &lt;3.20.2-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120957" version="1" comment="mozilla-nss-certs-32bit is &lt;3.20.2-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120958" version="1" comment="mozilla-nss-devel is &lt;3.20.2-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120959" version="1" comment="mozilla-nss-sysinit is &lt;3.20.2-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120960" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.20.2-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009120961" version="1" comment="mozilla-nss-tools is &lt;3.20.2-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115553" version="1" comment="audiofile is &lt;0.3.6-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115554" version="1" comment="audiofile-devel is &lt;0.3.6-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115555" version="1" comment="audiofile-devel-32bit is &lt;0.3.6-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115556" version="1" comment="audiofile-doc is &lt;0.3.6-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115557" version="1" comment="libaudiofile1 is &lt;0.3.6-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115558" version="1" comment="libaudiofile1-32bit is &lt;0.3.6-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123831" version="1" comment="gummi is &lt;0.6.5-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115538" version="1" comment="bouncycastle is &lt;1.53-13.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009115539" version="1" comment="bouncycastle-javadoc is &lt;1.53-13.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118147" version="1" comment="strongswan is &lt;5.1.3-4.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118148" version="1" comment="strongswan-doc is &lt;5.1.3-4.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118149" version="1" comment="strongswan-ipsec is &lt;5.1.3-4.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118150" version="1" comment="strongswan-libs0 is &lt;5.1.3-4.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118151" version="1" comment="strongswan-mysql is &lt;5.1.3-4.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118152" version="1" comment="strongswan-nm is &lt;5.1.3-4.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118153" version="1" comment="strongswan-sqlite is &lt;5.1.3-4.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118010" version="1" comment="xscreensaver is &lt;5.29-2.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118011" version="1" comment="xscreensaver-data is &lt;5.29-2.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118012" version="1" comment="xscreensaver-data-extra is &lt;5.29-2.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118335" version="1" comment="cyradm is &lt;2.4.18-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118336" version="1" comment="cyrus-imapd is &lt;2.4.18-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118337" version="1" comment="cyrus-imapd-devel is &lt;2.4.18-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118338" version="1" comment="cyrus-imapd-snmp is &lt;2.4.18-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118339" version="1" comment="cyrus-imapd-snmp-mibs is &lt;2.4.18-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118340" version="1" comment="cyrus-imapd-utils is &lt;2.4.18-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038988"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118341" version="1" comment="perl-Cyrus-IMAP is &lt;2.4.18-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118342" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.4.18-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128300" version="1" comment="redis is &lt;2.8.22-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009144697" version="1" comment="shellinabox is &lt;2.20-5.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119888" version="1" comment="quassel is &lt;0.10.0-3.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119889" version="1" comment="quassel-base is &lt;0.10.0-3.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119890" version="1" comment="quassel-client is &lt;0.10.0-3.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119891" version="1" comment="quassel-core is &lt;0.10.0-3.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009119892" version="1" comment="quassel-mono is &lt;0.10.0-3.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123304" version="1" comment="claws-mail is &lt;3.11.0-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123305" version="1" comment="claws-mail-devel is &lt;3.11.0-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123306" version="1" comment="claws-mail-lang is &lt;3.11.0-2.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121330" version="1" comment="phpMyAdmin is &lt;4.4.15.2-22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121179" version="1" comment="wireshark is &lt;1.12.9-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121180" version="1" comment="wireshark-devel is &lt;1.12.9-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121181" version="1" comment="wireshark-ui-gtk is &lt;1.12.9-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121182" version="1" comment="wireshark-ui-qt is &lt;1.12.9-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125369" version="1" comment="pidgin-otr is &lt;4.0.2-7.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128378" version="1" comment="dosfstools is &lt;3.0.26-3.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134136" version="1" comment="harfbuzz is &lt;0.9.35-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134137" version="1" comment="harfbuzz-devel is &lt;0.9.35-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134138" version="1" comment="harfbuzz-tools is &lt;0.9.35-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134139" version="1" comment="libharfbuzz-icu0 is &lt;0.9.35-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134140" version="1" comment="libharfbuzz-icu0-32bit is &lt;0.9.35-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134141" version="1" comment="libharfbuzz0 is &lt;0.9.35-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134142" version="1" comment="libharfbuzz0-32bit is &lt;0.9.35-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135937" version="1" comment="gnuchess is &lt;6.0.2-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127250" version="1" comment="libopenssl0_9_8 is &lt;0.9.8zh-9.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127251" version="1" comment="libopenssl0_9_8-32bit is &lt;0.9.8zh-9.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128880" version="1" comment="nodejs is &lt;4.4.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128881" version="1" comment="nodejs-devel is &lt;4.4.5-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130814" version="1" comment="MozillaFirefox is &lt;48.0-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130815" version="1" comment="MozillaFirefox-branding-upstream is &lt;48.0-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130816" version="1" comment="MozillaFirefox-buildsymbols is &lt;48.0-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130817" version="1" comment="MozillaFirefox-devel is &lt;48.0-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130818" version="1" comment="MozillaFirefox-translations-common is &lt;48.0-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130819" version="1" comment="MozillaFirefox-translations-other is &lt;48.0-74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130820" version="1" comment="libfreebl3 is &lt;3.24-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130821" version="1" comment="libfreebl3-32bit is &lt;3.24-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130822" version="1" comment="libsoftokn3 is &lt;3.24-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130823" version="1" comment="libsoftokn3-32bit is &lt;3.24-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130824" version="1" comment="mozilla-nss is &lt;3.24-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130825" version="1" comment="mozilla-nss-32bit is &lt;3.24-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130826" version="1" comment="mozilla-nss-certs is &lt;3.24-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130827" version="1" comment="mozilla-nss-certs-32bit is &lt;3.24-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130828" version="1" comment="mozilla-nss-devel is &lt;3.24-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130829" version="1" comment="mozilla-nss-sysinit is &lt;3.24-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130830" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.24-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130831" version="1" comment="mozilla-nss-tools is &lt;3.24-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124775" version="1" comment="python-Pillow is &lt;2.8.1-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124776" version="1" comment="python-Pillow-tk is &lt;2.8.1-3.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130698" version="1" comment="libpython2_7-1_0 is &lt;2.7.12-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130699" version="1" comment="libpython2_7-1_0-32bit is &lt;2.7.12-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134121" version="1" comment="libpython3_4m1_0 is &lt;3.4.5-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130700" version="1" comment="python is &lt;2.7.12-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130701" version="1" comment="python-32bit is &lt;2.7.12-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130702" version="1" comment="python-base is &lt;2.7.12-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130703" version="1" comment="python-base-32bit is &lt;2.7.12-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130704" version="1" comment="python-curses is &lt;2.7.12-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130705" version="1" comment="python-demo is &lt;2.7.12-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130706" version="1" comment="python-devel is &lt;2.7.12-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130707" version="1" comment="python-doc is &lt;2.7.12-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130708" version="1" comment="python-doc-pdf is &lt;2.7.12-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130709" version="1" comment="python-gdbm is &lt;2.7.12-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130710" version="1" comment="python-idle is &lt;2.7.12-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130711" version="1" comment="python-tk is &lt;2.7.12-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130712" version="1" comment="python-xml is &lt;2.7.12-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134125" version="1" comment="python3-base is &lt;3.4.5-4.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134143" version="1" comment="apache2-mod_fcgid is &lt;2.3.9-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147280" version="1" comment="libpcsclite1 is &lt;1.8.11-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147281" version="1" comment="libpcsclite1-32bit is &lt;1.8.11-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147282" version="1" comment="libpcscspy0 is &lt;1.8.11-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147283" version="1" comment="libpcscspy0-32bit is &lt;1.8.11-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147284" version="1" comment="pcsc-lite is &lt;1.8.11-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147285" version="1" comment="pcsc-lite-devel is &lt;1.8.11-4.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136340" version="1" comment="gvim is &lt;7.4.461.hg.6253-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136341" version="1" comment="vim is &lt;7.4.461.hg.6253-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136342" version="1" comment="vim-data is &lt;7.4.461.hg.6253-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145995" version="1" comment="tor is &lt;0.2.7.6-29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121402" version="1" comment="python-rsa is &lt;3.1.4-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124657" version="1" comment="exim is &lt;4.86.2-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124658" version="1" comment="eximon is &lt;4.86.2-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124659" version="1" comment="eximstats-html is &lt;4.86.2-3.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122193" version="1" comment="chromedriver is &lt;48.0.2564.82-67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122194" version="1" comment="chromium is &lt;48.0.2564.82-67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122195" version="1" comment="chromium-desktop-gnome is &lt;48.0.2564.82-67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122196" version="1" comment="chromium-desktop-kde is &lt;48.0.2564.82-67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122197" version="1" comment="chromium-ffmpegsumo is &lt;48.0.2564.82-67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123338" version="1" comment="chromedriver is &lt;48.0.2564.109-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123339" version="1" comment="chromium is &lt;48.0.2564.109-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123340" version="1" comment="chromium-desktop-gnome is &lt;48.0.2564.109-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123341" version="1" comment="chromium-desktop-kde is &lt;48.0.2564.109-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123342" version="1" comment="chromium-ffmpegsumo is &lt;48.0.2564.109-75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123628" version="1" comment="chromedriver is &lt;48.0.2564.116-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123629" version="1" comment="chromium is &lt;48.0.2564.116-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123630" version="1" comment="chromium-desktop-gnome is &lt;48.0.2564.116-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123631" version="1" comment="chromium-desktop-kde is &lt;48.0.2564.116-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123632" version="1" comment="chromium-ffmpegsumo is &lt;48.0.2564.116-78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125139" version="1" comment="chromedriver is &lt;49.0.2623.87-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125140" version="1" comment="chromium is &lt;49.0.2623.87-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125141" version="1" comment="chromium-desktop-gnome is &lt;49.0.2623.87-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125142" version="1" comment="chromium-desktop-kde is &lt;49.0.2623.87-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125143" version="1" comment="chromium-ffmpegsumo is &lt;49.0.2623.87-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125635" version="1" comment="chromedriver is &lt;49.0.2623.110-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125636" version="1" comment="chromium is &lt;49.0.2623.110-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125637" version="1" comment="chromium-desktop-gnome is &lt;49.0.2623.110-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125638" version="1" comment="chromium-desktop-kde is &lt;49.0.2623.110-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125639" version="1" comment="chromium-ffmpegsumo is &lt;49.0.2623.110-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127589" version="1" comment="chromedriver is &lt;50.0.2661.102-100.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127590" version="1" comment="chromium is &lt;50.0.2661.102-100.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127591" version="1" comment="chromium-desktop-gnome is &lt;50.0.2661.102-100.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127592" version="1" comment="chromium-desktop-kde is &lt;50.0.2661.102-100.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127593" version="1" comment="chromium-ffmpegsumo is &lt;50.0.2661.102-100.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134144" version="1" comment="nodejs is &lt;4.6.0-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134145" version="1" comment="nodejs-devel is &lt;4.6.0-24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121940" version="1" comment="cgit is &lt;0.12-13.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122925" version="1" comment="phpMyAdmin is &lt;4.4.15.4-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123343" version="1" comment="MozillaThunderbird is &lt;38.6.0-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123344" version="1" comment="MozillaThunderbird-buildsymbols is &lt;38.6.0-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123345" version="1" comment="MozillaThunderbird-devel is &lt;38.6.0-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123346" version="1" comment="MozillaThunderbird-translations-common is &lt;38.6.0-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123347" version="1" comment="MozillaThunderbird-translations-other is &lt;38.6.0-37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123348" version="1" comment="MozillaFirefox is &lt;44.0.2-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123349" version="1" comment="MozillaFirefox-branding-upstream is &lt;44.0.2-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123350" version="1" comment="MozillaFirefox-buildsymbols is &lt;44.0.2-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123351" version="1" comment="MozillaFirefox-devel is &lt;44.0.2-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123352" version="1" comment="MozillaFirefox-translations-common is &lt;44.0.2-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123353" version="1" comment="MozillaFirefox-translations-other is &lt;44.0.2-62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124660" version="1" comment="MozillaFirefox is &lt;45.0-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124661" version="1" comment="MozillaFirefox-branding-upstream is &lt;45.0-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124662" version="1" comment="MozillaFirefox-buildsymbols is &lt;45.0-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124663" version="1" comment="MozillaFirefox-devel is &lt;45.0-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124664" version="1" comment="MozillaFirefox-translations-common is &lt;45.0-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124665" version="1" comment="MozillaFirefox-translations-other is &lt;45.0-65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124666" version="1" comment="libfreebl3 is &lt;3.21.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124667" version="1" comment="libfreebl3-32bit is &lt;3.21.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124668" version="1" comment="libsoftokn3 is &lt;3.21.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124669" version="1" comment="libsoftokn3-32bit is &lt;3.21.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124670" version="1" comment="mozilla-nspr is &lt;4.12-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124671" version="1" comment="mozilla-nspr-32bit is &lt;4.12-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124672" version="1" comment="mozilla-nspr-devel is &lt;4.12-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124673" version="1" comment="mozilla-nss is &lt;3.21.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124674" version="1" comment="mozilla-nss-32bit is &lt;3.21.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124675" version="1" comment="mozilla-nss-certs is &lt;3.21.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124676" version="1" comment="mozilla-nss-certs-32bit is &lt;3.21.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124677" version="1" comment="mozilla-nss-devel is &lt;3.21.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124678" version="1" comment="mozilla-nss-sysinit is &lt;3.21.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124679" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.21.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124680" version="1" comment="mozilla-nss-tools is &lt;3.21.1-28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129880" version="1" comment="MozillaThunderbird is &lt;45.2-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129881" version="1" comment="MozillaThunderbird-buildsymbols is &lt;45.2-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129882" version="1" comment="MozillaThunderbird-devel is &lt;45.2-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129883" version="1" comment="MozillaThunderbird-translations-common is &lt;45.2-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129884" version="1" comment="MozillaThunderbird-translations-other is &lt;45.2-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122748" version="1" comment="privoxy is &lt;3.0.24-8.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122749" version="1" comment="privoxy-doc is &lt;3.0.24-8.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123861" version="1" comment="nodejs is &lt;4.3.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123862" version="1" comment="nodejs-devel is &lt;4.3.1-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135453" version="1" comment="libmysql56client18 is &lt;5.6.34-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135454" version="1" comment="libmysql56client18-32bit is &lt;5.6.34-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135455" version="1" comment="libmysql56client_r18 is &lt;5.6.34-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135456" version="1" comment="libmysql56client_r18-32bit is &lt;5.6.34-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135457" version="1" comment="mysql-community-server is &lt;5.6.34-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135458" version="1" comment="mysql-community-server-bench is &lt;5.6.34-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135459" version="1" comment="mysql-community-server-client is &lt;5.6.34-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135460" version="1" comment="mysql-community-server-errormessages is &lt;5.6.34-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135461" version="1" comment="mysql-community-server-test is &lt;5.6.34-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135462" version="1" comment="mysql-community-server-tools is &lt;5.6.34-2.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147286" version="1" comment="pdns is &lt;3.3.1-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147287" version="1" comment="pdns-backend-ldap is &lt;3.3.1-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147288" version="1" comment="pdns-backend-lua is &lt;3.3.1-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147289" version="1" comment="pdns-backend-mydns is &lt;3.3.1-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147290" version="1" comment="pdns-backend-mysql is &lt;3.3.1-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147291" version="1" comment="pdns-backend-postgresql is &lt;3.3.1-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147292" version="1" comment="pdns-backend-sqlite3 is &lt;3.3.1-2.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124868" version="1" comment="cgit is &lt;0.12-13.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124869" version="1" comment="git is &lt;2.1.4-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124870" version="1" comment="git-arch is &lt;2.1.4-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124871" version="1" comment="git-core is &lt;2.1.4-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124872" version="1" comment="git-cvs is &lt;2.1.4-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124873" version="1" comment="git-daemon is &lt;2.1.4-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124874" version="1" comment="git-doc is &lt;2.1.4-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124875" version="1" comment="git-email is &lt;2.1.4-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124876" version="1" comment="git-gui is &lt;2.1.4-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124877" version="1" comment="git-svn is &lt;2.1.4-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124878" version="1" comment="git-web is &lt;2.1.4-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124879" version="1" comment="gitk is &lt;2.1.4-19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124451" version="1" comment="wireshark is &lt;1.12.10-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124452" version="1" comment="wireshark-devel is &lt;1.12.10-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124453" version="1" comment="wireshark-ui-gtk is &lt;1.12.10-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124454" version="1" comment="wireshark-ui-qt is &lt;1.12.10-32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124457" version="1" comment="phpMyAdmin is &lt;4.4.15.5-30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128327" version="1" comment="putty is &lt;0.67-4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134146" version="1" comment="bind is &lt;9.9.6P1-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134147" version="1" comment="bind-chrootenv is &lt;9.9.6P1-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134148" version="1" comment="bind-devel is &lt;9.9.6P1-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134149" version="1" comment="bind-doc is &lt;9.9.6P1-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134150" version="1" comment="bind-libs is &lt;9.9.6P1-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134151" version="1" comment="bind-libs-32bit is &lt;9.9.6P1-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134152" version="1" comment="bind-lwresd is &lt;9.9.6P1-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134153" version="1" comment="bind-utils is &lt;9.9.6P1-2.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048364"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127203" version="1" comment="MozillaFirefox is &lt;46.0-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127204" version="1" comment="MozillaFirefox-branding-upstream is &lt;46.0-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127205" version="1" comment="MozillaFirefox-buildsymbols is &lt;46.0-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127206" version="1" comment="MozillaFirefox-devel is &lt;46.0-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127207" version="1" comment="MozillaFirefox-translations-common is &lt;46.0-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127208" version="1" comment="MozillaFirefox-translations-other is &lt;46.0-68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127209" version="1" comment="libfreebl3 is &lt;3.22.3-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127210" version="1" comment="libfreebl3-32bit is &lt;3.22.3-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127211" version="1" comment="libsoftokn3 is &lt;3.22.3-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127212" version="1" comment="libsoftokn3-32bit is &lt;3.22.3-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127213" version="1" comment="mozilla-nss is &lt;3.22.3-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127214" version="1" comment="mozilla-nss-32bit is &lt;3.22.3-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127215" version="1" comment="mozilla-nss-certs is &lt;3.22.3-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127216" version="1" comment="mozilla-nss-certs-32bit is &lt;3.22.3-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127217" version="1" comment="mozilla-nss-devel is &lt;3.22.3-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127218" version="1" comment="mozilla-nss-sysinit is &lt;3.22.3-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127219" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.22.3-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127220" version="1" comment="mozilla-nss-tools is &lt;3.22.3-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128768" version="1" comment="MozillaFirefox is &lt;47.0-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128769" version="1" comment="MozillaFirefox-branding-upstream is &lt;47.0-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128770" version="1" comment="MozillaFirefox-buildsymbols is &lt;47.0-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128771" version="1" comment="MozillaFirefox-devel is &lt;47.0-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128772" version="1" comment="MozillaFirefox-translations-common is &lt;47.0-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128773" version="1" comment="MozillaFirefox-translations-other is &lt;47.0-71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128774" version="1" comment="libfreebl3 is &lt;3.23-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128775" version="1" comment="libfreebl3-32bit is &lt;3.23-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128776" version="1" comment="libsoftokn3 is &lt;3.23-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128777" version="1" comment="libsoftokn3-32bit is &lt;3.23-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128778" version="1" comment="mozilla-nss is &lt;3.23-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128779" version="1" comment="mozilla-nss-32bit is &lt;3.23-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128780" version="1" comment="mozilla-nss-certs is &lt;3.23-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128781" version="1" comment="mozilla-nss-certs-32bit is &lt;3.23-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128782" version="1" comment="mozilla-nss-devel is &lt;3.23-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128783" version="1" comment="mozilla-nss-sysinit is &lt;3.23-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128784" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.23-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128785" version="1" comment="mozilla-nss-tools is &lt;3.23-34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134154" version="1" comment="MozillaFirefox is &lt;49.0-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134155" version="1" comment="MozillaFirefox-branding-upstream is &lt;49.0-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134156" version="1" comment="MozillaFirefox-buildsymbols is &lt;49.0-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134157" version="1" comment="MozillaFirefox-devel is &lt;49.0-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134158" version="1" comment="MozillaFirefox-translations-common is &lt;49.0-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134159" version="1" comment="MozillaFirefox-translations-other is &lt;49.0-80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134160" version="1" comment="libfreebl3 is &lt;3.25-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134161" version="1" comment="libfreebl3-32bit is &lt;3.25-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134162" version="1" comment="libsoftokn3 is &lt;3.25-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134163" version="1" comment="libsoftokn3-32bit is &lt;3.25-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134164" version="1" comment="mozilla-nss is &lt;3.25-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134165" version="1" comment="mozilla-nss-32bit is &lt;3.25-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134166" version="1" comment="mozilla-nss-certs is &lt;3.25-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134167" version="1" comment="mozilla-nss-certs-32bit is &lt;3.25-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134168" version="1" comment="mozilla-nss-devel is &lt;3.25-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134169" version="1" comment="mozilla-nss-sysinit is &lt;3.25-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134170" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.25-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134171" version="1" comment="mozilla-nss-tools is &lt;3.25-46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134172" version="1" comment="MozillaThunderbird is &lt;45.3.0-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134173" version="1" comment="MozillaThunderbird-buildsymbols is &lt;45.3.0-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134174" version="1" comment="MozillaThunderbird-devel is &lt;45.3.0-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134175" version="1" comment="MozillaThunderbird-translations-common is &lt;45.3.0-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134176" version="1" comment="MozillaThunderbird-translations-other is &lt;45.3.0-46.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048367"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124501" version="1" comment="libotr is &lt;4.0.0-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124502" version="1" comment="libotr-devel is &lt;4.0.0-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124503" version="1" comment="libotr-tools is &lt;4.0.0-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124504" version="1" comment="libotr2 is &lt;3.2.1-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124505" version="1" comment="libotr2-devel is &lt;3.2.1-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124506" version="1" comment="libotr2-tools is &lt;3.2.1-7.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124507" version="1" comment="libotr5 is &lt;4.0.0-8.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129678" version="1" comment="kinit is &lt;5.11.0-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129679" version="1" comment="kinit-32bit is &lt;5.11.0-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129680" version="1" comment="kinit-devel is &lt;5.11.0-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129681" version="1" comment="kinit-lang is &lt;5.11.0-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127824" version="1" comment="mercurial is &lt;3.1.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127825" version="1" comment="mercurial-lang is &lt;3.1.2-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125370" version="1" comment="dropbear is &lt;2016.72-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127826" version="1" comment="proftpd is &lt;1.3.5b-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127827" version="1" comment="proftpd-devel is &lt;1.3.5b-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127828" version="1" comment="proftpd-doc is &lt;1.3.5b-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127829" version="1" comment="proftpd-lang is &lt;1.3.5b-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127830" version="1" comment="proftpd-ldap is &lt;1.3.5b-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127831" version="1" comment="proftpd-mysql is &lt;1.3.5b-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127832" version="1" comment="proftpd-pgsql is &lt;1.3.5b-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127833" version="1" comment="proftpd-radius is &lt;1.3.5b-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127834" version="1" comment="proftpd-sqlite is &lt;1.3.5b-6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127835" version="1" comment="cacti is &lt;0.8.8f-4.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127836" version="1" comment="GraphicsMagick is &lt;1.3.20-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127837" version="1" comment="GraphicsMagick-devel is &lt;1.3.20-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127838" version="1" comment="libGraphicsMagick++-devel is &lt;1.3.20-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127839" version="1" comment="libGraphicsMagick-Q16-3 is &lt;1.3.20-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127840" version="1" comment="libGraphicsMagick3-config is &lt;1.3.20-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127841" version="1" comment="libGraphicsMagickWand-Q16-2 is &lt;1.3.20-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127842" version="1" comment="perl-GraphicsMagick is &lt;1.3.20-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129748" version="1" comment="cronic is &lt;3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127698" version="1" comment="quagga is &lt;0.99.23-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127699" version="1" comment="quagga-devel is &lt;0.99.23-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134177" version="1" comment="iperf is &lt;3.0.12-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134178" version="1" comment="iperf-devel is &lt;3.0.12-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134179" version="1" comment="libiperf0 is &lt;3.0.12-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127843" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.40.15-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127844" version="1" comment="gdk-pixbuf-loader-rsvg-32bit is &lt;2.40.15-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127845" version="1" comment="librsvg is &lt;2.40.15-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127846" version="1" comment="librsvg-2-2 is &lt;2.40.15-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127847" version="1" comment="librsvg-2-2-32bit is &lt;2.40.15-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127848" version="1" comment="librsvg-devel is &lt;2.40.15-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127849" version="1" comment="rsvg-view is &lt;2.40.15-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127850" version="1" comment="typelib-1_0-Rsvg-2_0 is &lt;2.40.15-10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127700" version="1" comment="quassel is &lt;0.10.0-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127701" version="1" comment="quassel-base is &lt;0.10.0-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127702" version="1" comment="quassel-client is &lt;0.10.0-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127703" version="1" comment="quassel-core is &lt;0.10.0-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127704" version="1" comment="quassel-mono is &lt;0.10.0-3.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135913" version="1" comment="dovecot22 is &lt;2.2.13-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135914" version="1" comment="dovecot22-backend-mysql is &lt;2.2.13-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135915" version="1" comment="dovecot22-backend-pgsql is &lt;2.2.13-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135916" version="1" comment="dovecot22-backend-sqlite is &lt;2.2.13-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135917" version="1" comment="dovecot22-devel is &lt;2.2.13-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135918" version="1" comment="dovecot22-fts-lucene is &lt;2.2.13-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135919" version="1" comment="dovecot22-fts-solr is &lt;2.2.13-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129682" version="1" comment="gimp is &lt;2.8.16-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129683" version="1" comment="gimp-devel is &lt;2.8.16-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129684" version="1" comment="gimp-help-browser is &lt;2.8.16-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129685" version="1" comment="gimp-lang is &lt;2.8.16-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129686" version="1" comment="gimp-plugin-aa is &lt;2.8.16-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129687" version="1" comment="gimp-plugins-python is &lt;2.8.16-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129688" version="1" comment="libgimp-2_0-0 is &lt;2.8.16-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129689" version="1" comment="libgimp-2_0-0-32bit is &lt;2.8.16-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129690" version="1" comment="libgimpui-2_0-0 is &lt;2.8.16-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129691" version="1" comment="libgimpui-2_0-0-32bit is &lt;2.8.16-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128190" version="1" comment="phpMyAdmin is &lt;4.4.15.6-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128537" version="1" comment="imobiledevice-tools is &lt;1.1.6-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128538" version="1" comment="iproxy is &lt;1.0.9-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128539" version="1" comment="libimobiledevice is &lt;1.1.6-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128540" version="1" comment="libimobiledevice-devel is &lt;1.1.6-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128541" version="1" comment="libimobiledevice-doc is &lt;1.1.6-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128542" version="1" comment="libusbmuxd is &lt;1.0.9-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128543" version="1" comment="libusbmuxd-devel is &lt;1.0.9-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128544" version="1" comment="python-imobiledevice is &lt;1.1.6-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130915" version="1" comment="chromedriver is &lt;52.0.2743.116-114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130916" version="1" comment="chromium is &lt;52.0.2743.116-114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130917" version="1" comment="chromium-desktop-gnome is &lt;52.0.2743.116-114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130918" version="1" comment="chromium-desktop-kde is &lt;52.0.2743.116-114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130919" version="1" comment="chromium-ffmpegsumo is &lt;52.0.2743.116-114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134180" version="1" comment="chromedriver is &lt;53.0.2785.143-128.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134181" version="1" comment="chromium is &lt;53.0.2785.143-128.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134182" version="1" comment="chromium-desktop-gnome is &lt;53.0.2785.143-128.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134183" version="1" comment="chromium-desktop-kde is &lt;53.0.2785.143-128.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134184" version="1" comment="chromium-ffmpegsumo is &lt;53.0.2785.143-128.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135463" version="1" comment="nodejs is &lt;4.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135464" version="1" comment="nodejs-devel is &lt;4.6.1-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134185" version="1" comment="chromedriver is &lt;54.0.2840.59-131.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134186" version="1" comment="chromium is &lt;54.0.2840.59-131.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134187" version="1" comment="chromium-ffmpegsumo is &lt;54.0.2840.59-131.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135302" version="1" comment="chromedriver is &lt;54.0.2840.90-134.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135303" version="1" comment="chromium is &lt;54.0.2840.90-134.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135304" version="1" comment="chromium-ffmpegsumo is &lt;54.0.2840.90-134.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135532" version="1" comment="chromedriver is &lt;54.0.2840.100-140.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135533" version="1" comment="chromium is &lt;54.0.2840.100-140.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135534" version="1" comment="chromium-ffmpegsumo is &lt;54.0.2840.100-140.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142897" version="1" comment="chromedriver is &lt;55.0.2883.75-148.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142898" version="1" comment="chromium is &lt;55.0.2883.75-148.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134188" version="1" comment="MozillaFirefox is &lt;49.0.2-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134189" version="1" comment="MozillaFirefox-branding-upstream is &lt;49.0.2-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134190" version="1" comment="MozillaFirefox-buildsymbols is &lt;49.0.2-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134191" version="1" comment="MozillaFirefox-devel is &lt;49.0.2-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134192" version="1" comment="MozillaFirefox-translations-common is &lt;49.0.2-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134193" version="1" comment="MozillaFirefox-translations-other is &lt;49.0.2-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135702" version="1" comment="MozillaFirefox is &lt;50.0-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135703" version="1" comment="MozillaFirefox-branding-upstream is &lt;50.0-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135704" version="1" comment="MozillaFirefox-buildsymbols is &lt;50.0-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135705" version="1" comment="MozillaFirefox-devel is &lt;50.0-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135706" version="1" comment="MozillaFirefox-translations-common is &lt;50.0-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135707" version="1" comment="MozillaFirefox-translations-other is &lt;50.0-88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135708" version="1" comment="libfreebl3 is &lt;3.26.2-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135709" version="1" comment="libfreebl3-32bit is &lt;3.26.2-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135710" version="1" comment="libsoftokn3 is &lt;3.26.2-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135711" version="1" comment="libsoftokn3-32bit is &lt;3.26.2-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135712" version="1" comment="mozilla-nss is &lt;3.26.2-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135713" version="1" comment="mozilla-nss-32bit is &lt;3.26.2-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135714" version="1" comment="mozilla-nss-certs is &lt;3.26.2-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135715" version="1" comment="mozilla-nss-certs-32bit is &lt;3.26.2-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135716" version="1" comment="mozilla-nss-devel is &lt;3.26.2-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135717" version="1" comment="mozilla-nss-sysinit is &lt;3.26.2-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135718" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.26.2-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135719" version="1" comment="mozilla-nss-tools is &lt;3.26.2-49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129083" version="1" comment="libtorrent-rasterbar is &lt;0.16.17-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129084" version="1" comment="libtorrent-rasterbar-devel is &lt;0.16.17-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129085" version="1" comment="libtorrent-rasterbar-doc is &lt;0.16.17-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129086" version="1" comment="python-libtorrent-rasterbar is &lt;0.16.17-2.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128997" version="1" comment="wireshark is &lt;1.12.12-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128998" version="1" comment="wireshark-devel is &lt;1.12.12-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128999" version="1" comment="wireshark-ui-gtk is &lt;1.12.12-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129000" version="1" comment="wireshark-ui-qt is &lt;1.12.12-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134194" version="1" comment="go is &lt;1.4.3-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134195" version="1" comment="go-doc is &lt;1.4.3-18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130561" version="1" comment="apache2 is &lt;2.4.10-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130562" version="1" comment="apache2-devel is &lt;2.4.10-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130563" version="1" comment="apache2-doc is &lt;2.4.10-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130564" version="1" comment="apache2-event is &lt;2.4.10-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130565" version="1" comment="apache2-example-pages is &lt;2.4.10-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130566" version="1" comment="apache2-prefork is &lt;2.4.10-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130567" version="1" comment="apache2-utils is &lt;2.4.10-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130568" version="1" comment="apache2-worker is &lt;2.4.10-31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134196" version="1" comment="pdns is &lt;3.3.1-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134197" version="1" comment="pdns-backend-ldap is &lt;3.3.1-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134198" version="1" comment="pdns-backend-lua is &lt;3.3.1-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134199" version="1" comment="pdns-backend-mydns is &lt;3.3.1-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134200" version="1" comment="pdns-backend-mysql is &lt;3.3.1-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134201" version="1" comment="pdns-backend-postgresql is &lt;3.3.1-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134202" version="1" comment="pdns-backend-sqlite3 is &lt;3.3.1-2.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129368" version="1" comment="phpMyAdmin is &lt;4.4.15.7-36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134203" version="1" comment="pdns is &lt;3.3.1-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134204" version="1" comment="pdns-backend-ldap is &lt;3.3.1-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134205" version="1" comment="pdns-backend-lua is &lt;3.3.1-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134206" version="1" comment="pdns-backend-mydns is &lt;3.3.1-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134207" version="1" comment="pdns-backend-mysql is &lt;3.3.1-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134208" version="1" comment="pdns-backend-postgresql is &lt;3.3.1-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134209" version="1" comment="pdns-backend-sqlite3 is &lt;3.3.1-2.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130713" version="1" comment="karchive is &lt;5.11.0-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130714" version="1" comment="karchive-devel is &lt;5.11.0-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130715" version="1" comment="karchive-devel-32bit is &lt;5.11.0-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130716" version="1" comment="libKF5Archive5 is &lt;5.11.0-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130717" version="1" comment="libKF5Archive5-32bit is &lt;5.11.0-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130749" version="1" comment="mupdf is &lt;1.5-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130750" version="1" comment="mupdf-devel-static is &lt;1.5-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134210" version="1" comment="gdk-pixbuf is &lt;2.32.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134211" version="1" comment="gdk-pixbuf-devel is &lt;2.32.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134212" version="1" comment="gdk-pixbuf-devel-32bit is &lt;2.32.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134213" version="1" comment="gdk-pixbuf-lang is &lt;2.32.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134214" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.32.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134215" version="1" comment="gdk-pixbuf-query-loaders-32bit is &lt;2.32.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134216" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.32.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134217" version="1" comment="libgdk_pixbuf-2_0-0-32bit is &lt;2.32.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134218" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.32.3-9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048375"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134219" version="1" comment="MozillaFirefox is &lt;48.0.1-77.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134220" version="1" comment="MozillaFirefox-branding-upstream is &lt;48.0.1-77.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134221" version="1" comment="MozillaFirefox-buildsymbols is &lt;48.0.1-77.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134222" version="1" comment="MozillaFirefox-devel is &lt;48.0.1-77.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134223" version="1" comment="MozillaFirefox-translations-common is &lt;48.0.1-77.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134224" version="1" comment="MozillaFirefox-translations-other is &lt;48.0.1-77.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134225" version="1" comment="libfreebl3 is &lt;3.24-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134226" version="1" comment="libfreebl3-32bit is &lt;3.24-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134227" version="1" comment="libsoftokn3 is &lt;3.24-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134228" version="1" comment="libsoftokn3-32bit is &lt;3.24-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134229" version="1" comment="mozilla-nss is &lt;3.24-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134230" version="1" comment="mozilla-nss-32bit is &lt;3.24-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134231" version="1" comment="mozilla-nss-certs is &lt;3.24-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134232" version="1" comment="mozilla-nss-certs-32bit is &lt;3.24-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134233" version="1" comment="mozilla-nss-devel is &lt;3.24-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134234" version="1" comment="mozilla-nss-sysinit is &lt;3.24-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134235" version="1" comment="mozilla-nss-sysinit-32bit is &lt;3.24-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134236" version="1" comment="mozilla-nss-tools is &lt;3.24-43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130879" version="1" comment="wireshark is &lt;1.12.13-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130880" version="1" comment="wireshark-devel is &lt;1.12.13-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130881" version="1" comment="wireshark-ui-gtk is &lt;1.12.13-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130882" version="1" comment="wireshark-ui-qt is &lt;1.12.13-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134237" version="1" comment="phpMyAdmin is &lt;4.4.15.8-39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134238" version="1" comment="eog is &lt;3.14.5-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134239" version="1" comment="eog-devel is &lt;3.14.5-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134240" version="1" comment="eog-lang is &lt;3.14.5-13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134241" version="1" comment="irssi is &lt;0.8.20-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134242" version="1" comment="irssi-devel is &lt;0.8.20-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134243" version="1" comment="file-roller is &lt;3.14.2-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134244" version="1" comment="file-roller-lang is &lt;3.14.2-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134245" version="1" comment="nautilus-file-roller is &lt;3.14.2-7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134246" version="1" comment="kde-cli-tools5 is &lt;5.3.2-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134247" version="1" comment="kde-cli-tools5-lang is &lt;5.3.2-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136812" version="1" comment="libX11 is &lt;1.6.2-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036213"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136813" version="1" comment="libX11-6 is &lt;1.6.2-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136814" version="1" comment="libX11-6-32bit is &lt;1.6.2-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136815" version="1" comment="libX11-data is &lt;1.6.2-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136816" version="1" comment="libX11-devel is &lt;1.6.2-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136817" version="1" comment="libX11-devel-32bit is &lt;1.6.2-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136818" version="1" comment="libX11-xcb1 is &lt;1.6.2-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136819" version="1" comment="libX11-xcb1-32bit is &lt;1.6.2-5.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048733"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136820" version="1" comment="libXi is &lt;1.7.4-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136821" version="1" comment="libXi-devel is &lt;1.7.4-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136822" version="1" comment="libXi-devel-32bit is &lt;1.7.4-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136823" version="1" comment="libXi6 is &lt;1.7.4-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136824" version="1" comment="libXi6-32bit is &lt;1.7.4-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136825" version="1" comment="libXrandr is &lt;1.4.2-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136826" version="1" comment="libXrandr-devel is &lt;1.4.2-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136827" version="1" comment="libXrandr-devel-32bit is &lt;1.4.2-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136828" version="1" comment="libXrandr2 is &lt;1.4.2-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136829" version="1" comment="libXrandr2-32bit is &lt;1.4.2-4.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134248" version="1" comment="kcoreaddons is &lt;5.11.0-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134249" version="1" comment="kcoreaddons-devel is &lt;5.11.0-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134250" version="1" comment="kcoreaddons-devel-32bit is &lt;5.11.0-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134251" version="1" comment="kcoreaddons-lang is &lt;5.11.0-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134252" version="1" comment="libKF5CoreAddons5 is &lt;5.11.0-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009134253" version="1" comment="libKF5CoreAddons5-32bit is &lt;5.11.0-27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040132"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142387" version="1" comment="libass is &lt;0.12.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142388" version="1" comment="libass-devel is &lt;0.12.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142389" version="1" comment="libass5 is &lt;0.12.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142390" version="1" comment="libass5-32bit is &lt;0.12.1-2.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143108" version="1" comment="lxc is &lt;1.0.6-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143109" version="1" comment="lxc-devel is &lt;1.0.6-12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135590" version="1" comment="memcached is &lt;1.4.20-2.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135591" version="1" comment="GraphicsMagick is &lt;1.3.20-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135592" version="1" comment="GraphicsMagick-devel is &lt;1.3.20-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135593" version="1" comment="libGraphicsMagick++-devel is &lt;1.3.20-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135594" version="1" comment="libGraphicsMagick-Q16-3 is &lt;1.3.20-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135595" version="1" comment="libGraphicsMagick3-config is &lt;1.3.20-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135596" version="1" comment="libGraphicsMagickWand-Q16-2 is &lt;1.3.20-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135597" version="1" comment="perl-GraphicsMagick is &lt;1.3.20-15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145802" version="1" comment="GraphicsMagick is &lt;1.3.20-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145803" version="1" comment="GraphicsMagick-devel is &lt;1.3.20-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145804" version="1" comment="libGraphicsMagick++-devel is &lt;1.3.20-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145805" version="1" comment="libGraphicsMagick-Q16-3 is &lt;1.3.20-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145806" version="1" comment="libGraphicsMagick3-config is &lt;1.3.20-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145807" version="1" comment="libGraphicsMagickWand-Q16-2 is &lt;1.3.20-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009145808" version="1" comment="perl-GraphicsMagick is &lt;1.3.20-21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136343" version="1" comment="MozillaFirefox is &lt;50.0.2-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136344" version="1" comment="MozillaFirefox-branding-upstream is &lt;50.0.2-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136345" version="1" comment="MozillaFirefox-buildsymbols is &lt;50.0.2-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136346" version="1" comment="MozillaFirefox-devel is &lt;50.0.2-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136347" version="1" comment="MozillaFirefox-translations-common is &lt;50.0.2-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136348" version="1" comment="MozillaFirefox-translations-other is &lt;50.0.2-91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136349" version="1" comment="MozillaThunderbird is &lt;45.5.1-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136350" version="1" comment="MozillaThunderbird-buildsymbols is &lt;45.5.1-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136351" version="1" comment="MozillaThunderbird-devel is &lt;45.5.1-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136352" version="1" comment="MozillaThunderbird-translations-common is &lt;45.5.1-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136353" version="1" comment="MozillaThunderbird-translations-other is &lt;45.5.1-55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143110" version="1" comment="MozillaFirefox is &lt;50.1.0-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143111" version="1" comment="MozillaFirefox-branding-upstream is &lt;50.1.0-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143112" version="1" comment="MozillaFirefox-buildsymbols is &lt;50.1.0-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143113" version="1" comment="MozillaFirefox-devel is &lt;50.1.0-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143114" version="1" comment="MozillaFirefox-translations-common is &lt;50.1.0-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143115" version="1" comment="MozillaFirefox-translations-other is &lt;50.1.0-94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135587" version="1" comment="otrs is &lt;3.3.16-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135588" version="1" comment="otrs-doc is &lt;3.3.16-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009135589" version="1" comment="otrs-itsm is &lt;3.3.14-7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142992" version="1" comment="gstreamer-0_10-plugins-bad is &lt;0.10.23-15.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142993" version="1" comment="gstreamer-0_10-plugins-bad-32bit is &lt;0.10.23-15.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142994" version="1" comment="gstreamer-0_10-plugins-bad-devel is &lt;0.10.23-15.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142995" version="1" comment="gstreamer-0_10-plugins-bad-doc is &lt;0.10.23-15.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142996" version="1" comment="gstreamer-0_10-plugins-bad-lang is &lt;0.10.23-15.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142997" version="1" comment="gstreamer-plugins-bad is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142998" version="1" comment="gstreamer-plugins-bad-32bit is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041150"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009142999" version="1" comment="gstreamer-plugins-bad-devel is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143000" version="1" comment="gstreamer-plugins-bad-doc is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143001" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143002" version="1" comment="libgstbadbase-1_0-0 is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143003" version="1" comment="libgstbadbase-1_0-0-32bit is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143004" version="1" comment="libgstbadvideo-1_0-0 is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143005" version="1" comment="libgstbadvideo-1_0-0-32bit is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143006" version="1" comment="libgstbasecamerabinsrc-0_10-23 is &lt;0.10.23-15.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143007" version="1" comment="libgstbasecamerabinsrc-0_10-23-32bit is &lt;0.10.23-15.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143008" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143009" version="1" comment="libgstbasecamerabinsrc-1_0-0-32bit is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143010" version="1" comment="libgstbasevideo-0_10-23 is &lt;0.10.23-15.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143011" version="1" comment="libgstbasevideo-0_10-23-32bit is &lt;0.10.23-15.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143012" version="1" comment="libgstcodecparsers-0_10-23 is &lt;0.10.23-15.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143013" version="1" comment="libgstcodecparsers-0_10-23-32bit is &lt;0.10.23-15.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143014" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143015" version="1" comment="libgstcodecparsers-1_0-0-32bit is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143016" version="1" comment="libgstgl-1_0-0 is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143017" version="1" comment="libgstgl-1_0-0-32bit is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143018" version="1" comment="libgstinsertbin-1_0-0 is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143019" version="1" comment="libgstinsertbin-1_0-0-32bit is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143020" version="1" comment="libgstmpegts-1_0-0 is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143021" version="1" comment="libgstmpegts-1_0-0-32bit is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143022" version="1" comment="libgstphotography-0_10-23 is &lt;0.10.23-15.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143023" version="1" comment="libgstphotography-0_10-23-32bit is &lt;0.10.23-15.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038739"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143024" version="1" comment="libgstphotography-1_0-0 is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143025" version="1" comment="libgstphotography-1_0-0-32bit is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041169"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143026" version="1" comment="libgstsignalprocessor-0_10-23 is &lt;0.10.23-15.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143027" version="1" comment="libgstsignalprocessor-0_10-23-32bit is &lt;0.10.23-15.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143028" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143029" version="1" comment="libgsturidownloader-1_0-0-32bit is &lt;1.4.3-3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143030" version="1" comment="libgstvdp-0_10-23 is &lt;0.10.23-15.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009143031" version="1" comment="libgstvdp-0_10-23-32bit is &lt;0.10.23-15.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146172" version="1" comment="MozillaThunderbird is &lt;45.6.0-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146173" version="1" comment="MozillaThunderbird-buildsymbols is &lt;45.6.0-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146174" version="1" comment="MozillaThunderbird-devel is &lt;45.6.0-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146175" version="1" comment="MozillaThunderbird-translations-common is &lt;45.6.0-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146176" version="1" comment="MozillaThunderbird-translations-other is &lt;45.6.0-58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146855" version="1" comment="irssi is &lt;0.8.21-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009146856" version="1" comment="irssi-devel is &lt;0.8.21-3.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050953"/>
	</rpminfo_test>
</tests>
<objects>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>haproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>suse-sle12-cloud-compute-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder-volume</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-cinder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-dhcp-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-ha-tool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-l3-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-lbaas-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-linuxbridge-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-metadata-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-metering-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-openvswitch-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-vpn-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-neutron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Beaker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-keystoneclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-keystoneclient-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pycrypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pymongo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-requests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-chef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-chef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-6_Q16-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore-6_Q16-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore-6_Q16-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand-6_Q16-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sled-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aaa_base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aaa_base-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>accountsservice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>accountsservice-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaccountsservice0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-AccountsService-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasound2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasound2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>argyllcms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-client3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-client3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-common3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-common3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-core7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns_sd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns_sd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>readline-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bogofilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cifs-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>colord</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>colord-gtk-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>colord-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord-gtk1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolorhug2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coolkey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpp48</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-gij</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-gij-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libatomic1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libffi4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libffi4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcj48</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcj48-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcj48-jar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcj_bc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgomp1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libitm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++48-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++48-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtsan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cronie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters-cups-browsed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters-foomatic-rip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters-ghostscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-pk-helper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-pk-helper-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cvs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-crammd5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-crammd5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-digestmd5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-digestmd5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gssapi-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-plain</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-plain-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-saslauthd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsasl2-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsasl2-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdbus-1-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdbus-1-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dia-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dracut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ecryptfs-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ecryptfs-utils-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elfutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>etags</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>empathy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>empathy-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telepathy-mission-control-plugin-goa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevdocument3-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevview3-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-EvinceDocument-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-EvinceView-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>expat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>facter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fetchmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-magic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmagic1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmagic1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>finch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-meanwhile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flash-player</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flash-player-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreerdp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreerdp-1_0-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ft2demos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfuse2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>g3utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mgetty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-query-loaders</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-query-loaders-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdk_pixbuf-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdk_pixbuf-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GdkPixbuf-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-loader-rsvg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsvg-view</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdmflexiserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gdm-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-plugins-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimp-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimpui-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-fam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglib-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglib-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmodule-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmodule-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgobject-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgobject-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgthread-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgthread-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-i18ndata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nscd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring-pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring-pam-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgck-modules-gnome-keyring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-online-accounts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-online-accounts-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgoa-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgoa-backend-1_0-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Goa-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-browser-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls28-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpgme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpgme11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hardlink</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip-hpijs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip-sane</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-chewing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibus-pinyin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iputils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-syms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-appl-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lcms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX28-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmImf-Imf_2_1-21</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmImf-Imf_2_1-21-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openexr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-xcb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-xcb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXRes1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXRes1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXext6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXext6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXinerama1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXinerama1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXp6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXp6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86dga1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaugeas0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmartcols1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-libmount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux-systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uuidd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcgroup1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-binding0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-binding0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgensec0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgensec0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-krb5pac0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-krb5pac0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-nbt0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-nbt0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-standard0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-standard0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpdb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpdb0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libregistry0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-credentials0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-credentials0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-hostconfig0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-hostconfig0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-util0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-util0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamdb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamdb0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient-raw0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient-raw0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbconf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbconf0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbldap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbldap0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent-util0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent-util0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdmx1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecpg6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql93</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevent-2_0-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif12-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfbembed2_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-certs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-certs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreetype6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreetype6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgadu3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomesu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomesu-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomesu0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgssglue1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgssglue1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgudev-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgudev-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-sysvinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libid3tag0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libipa_hbac0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_idmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-sssd-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ipa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-3_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit2gtk-3_0-25</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk-3_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk3-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-JavaScriptCore-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjbig2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjbig2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjson-c2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjson-c2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libltdl7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libltdl7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblua5_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzo2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzo2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmikmod3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmikmod3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmms0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmodplug1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspack0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmusicbrainz4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient_r18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient_r18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-errormessages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libneon27</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpango-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpango-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-modules-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Pango-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcsclite1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcsclite1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-lite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-16-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpolkit0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpolkit0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Polkit-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-glib8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt4-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler44</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-config-gnome3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-config-gnome3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-networkmanager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-networkmanager-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-mainloop-glib0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-mainloop-glib0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-esound-compat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-gdm-hooks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-bluetooth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-gconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-jack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-lirc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-module-zeroconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pulseaudio-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_7-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_7-1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_4m1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-mysql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-postgresql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-sqlite-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-unixODBC-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraptor2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>raptor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base-drivers-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base-drivers-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-calc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-calc-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-draw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-filters-optional</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-tango</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-impress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-af</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-da</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt-BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt-PT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-xh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh-Hans</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh-Hant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-mailmerge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-math</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-officebean</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-pyuno</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-writer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-writer-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librpcsecgss3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsilc-1_1-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsilcclient-1_1-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>silc-toolkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmi2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp30-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-SNMP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>snmp-mibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-2_4-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-2_4-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Soup-2_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-glib-2_0-8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-gtk-2_0-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-gtk-3_0-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-controller0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-SpiceClientGlib-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-SpiceClientGtk-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtag1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtag1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtag_c0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtag_c0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>taglib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-config-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-config-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-interface</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-libxl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-lxc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nodedev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-secret</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-lxc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbisenc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbisenc2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbisfile3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbisfile3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvte9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri2-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-glx0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-glx0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-randr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-render0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-render0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shape0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shm0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shm0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-sync1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xf86dri0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xfixes0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xfixes0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xkb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xkb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xv0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxerces-c-3_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxerces-c-3_1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyaml-0-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzip2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzmq3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logrotate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>m4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mipv6d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mutt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-helpers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-modules-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_krb5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ssh-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>patch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-ccid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Config-IniFiles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-HTML-Parser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-LWP-Protocol-https</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-YAML-LibYAML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-otr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>puppet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-cupshelpers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer-common-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer-dbus-service</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev-configure-printer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-imaging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-libxml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pyOpenSSL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pywbem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ipxe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-kvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-seabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-sgabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-vgabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>radvd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhythmbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhythmbox-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rtkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>socat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squashfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-ipsec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-libs0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysconfig-netconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syslog-service</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysvinit-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>whois</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telepathy-gabble</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>telepathy-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-Xvnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unixODBC-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vino</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vino-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vorbis-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vorbis-tools-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>w3m</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wdiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xf86-video-intel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xinetd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xlockmore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-essentials</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xrdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zoo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>DirectFB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lib++dfb-1_7-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdirectfb-1_7-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdirectfb-1_7-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autofs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsmasq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-settings-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-settings-daemon-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-bad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-bad-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasecamerabinsrc-0_10-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasecamerabinsrc-0_10-23-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasevideo-0_10-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasevideo-0_10-23-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstcodecparsers-0_10-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstphotography-0_10-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstphotography-0_10-23-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsignalprocessor-0_10-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsignalprocessor-0_10-23-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvdp-0_10-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvdp-0_10-23-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hyper-v</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu52_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu52_1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu52_1-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Core5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5DBus5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Gui5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Widgets5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-passdb0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-passdb0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-sysinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-sysinit-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-turbo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62-turbo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libturbojpeg0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksba8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpfr4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng15-15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libruby2_1-2_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-stdlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-server1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-0_2-7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>p7zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-XML-LibXML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pigz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpcbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sblim-sfcb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcpdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpa_supplicant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm-glib-vpn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm-glib4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm-util2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnm0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-NM-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-NMClient-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-NetworkManager-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>at</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQtWebKit4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQtWebKit4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbonobo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbonobo-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbonobo-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksuseinstall1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksuseinstall1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netpbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas-lenses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cracklib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcrack2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcrack2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctags</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dosfstools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eog-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-browser-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-djvudocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-dvidocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-pdfdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-psdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-tiffdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-plugin-xpsdocument</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-evince</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontconfig-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreerdp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgoa-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-i386-pc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-snapper-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-systemd-sleep-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-tools-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtk-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gtk-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imobiledevice-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libimobiledevice6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lhasa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblhasa0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC++6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Concurrent5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Network5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGL5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PrintSupport5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql5-unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Test5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Xml5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WebKit5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WebKit5-imports</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WebKitWidgets5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvnc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasan2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpx0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpx0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpxwrappers0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpxwrappers0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfdisk1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-atsvc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-errors0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-errors0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgif6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgif6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgraphite2-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgraphite2-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgypsy0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhogweed2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhogweed2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-4_0-18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit2gtk-4_0-37</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit2gtk3-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-JavaScriptCore-4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit2-4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk-4_0-injected-bundles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2_4-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2_4-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnewt0_52</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libotr5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler60</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-pacrunner-webkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-galaxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreofficekit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-client-glib-helper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsqlite3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsqlite3-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsrtp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsystemd0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsystemd0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libusbmuxd4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dri3-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-present0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-present0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-sync1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xinerama0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>supportutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>update-alternatives</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xfsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xscreensaver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xscreensaver-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-users</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-module-adv-systems-management-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>puppet-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-module-containers-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-PyYAML</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups154</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups154-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups154-filters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups154-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-module-legacy-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syslog-ng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-module-public-cloud</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpp5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-fortran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libffi-devel-gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-devel-gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-module-toolchain-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sles-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>alsa-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-beanutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-beanutils-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-daemon-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-httpclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-example-pages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-prefork</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-worker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_jk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>automake</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-chrootenv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cvs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-otp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-otp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-sqlauxprop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-sqlauxprop-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-relay</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot22</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot22-backend-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot22-backend-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot22-backend-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dracut-fips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasm1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-nox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fetchmailconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-openssl27</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>groff-full</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gxditview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guestfs-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guestfs-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guestfsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Sys-Guestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-fileupload</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-fileupload-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-kdb-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-preauth-otp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugin-preauth-pkinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-appl-servers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-dbd-sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcgroup-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql93-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql93-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql93-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt20-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtool-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblua5_2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libneon27-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt4-x11-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libupsclient1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nut-drivers-net</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-lock-sanlock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-vte</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logwatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-fips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-switch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opie-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Cyrus-IMAP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Cyrus-SIEVE-managesieve</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppc64-diag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-gdbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-guest-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ppc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-s390</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quagga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-diag-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-gssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-gtls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-relp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsyslog-module-udpspoof</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squidGuard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squidGuard-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>stunnel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemtap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemtap-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemtap-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-admin-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-docs-webapp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-el-2_2-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-jsp-2_2-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-servlet-3_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-doc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools-domU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>davfs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-libguestfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipsec-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_1-ibm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_1-ibm-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_1-ibm-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_1-ibm-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhivex0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Win-Hivex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjansson4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpfr4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-meta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn-auth-pam-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>powerpc-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>smt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>smt-support</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-el-3_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-jsp-2_3-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-servlet-3_1-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vsftpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flex-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbonobo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chrony</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib-progs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-arm64-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-powerpc-ieee1275</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-s390x-emu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-p2v</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-v2v</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2-14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtcnative-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvncclient0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvncserver0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-dpdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvswitch-dpdk-switch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-arm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-ssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>res-signingkeys</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>FastCGI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-FastCGI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-sdk-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PerlMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aaa_base-malloccheck</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>accountsservice-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>alsa-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-jmf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-swing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>augeas-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-howl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-mDNSResponder-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhowl0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>readline-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>checkbashisms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cifs-utils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coolkey-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot22-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>finch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firebird-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfbembed-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libulockmgr1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-ada</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-fortran</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-obj-c++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-objc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-objc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libada48</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libffi48-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcj48-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfortran3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libobjc4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libobjc4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquadmath0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-arch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-cvs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-email</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-svn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gitk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-online-accounts-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-shell-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hplip-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icecream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lzo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>id3lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-obs-build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-zfcpdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lib3ds-1-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXcursor-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXext-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXinerama-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXres-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86dga-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXxf86vm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libasm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmartcols-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcgroup-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcolord-gtk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-ColorHug-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Colord-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-ColordGtk-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-atsvc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-samr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-samr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgensec-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-krb5pac-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-nbt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libndr-standard-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetapi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpdb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libregistry-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-credentials-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-hostconfig-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-policy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-policy0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-util-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamdb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient-raw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbconf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbldap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbsharemodes-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbsharemodes0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent-util-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-core-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-test-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdmx-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevent-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgadu-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomesu-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-openssl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutlsxx-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutlsxx28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpgme-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgssglue-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgudev-1_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GUdev-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguestfs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-libguestfs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libid3tag-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libipa_hbac-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_idmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_nss_idmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_nss_idmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-JavaScriptCore-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjbig-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjson-c-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmikmod-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmms-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmodplug-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspack-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmusicbrainz-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqld-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqld18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libneon-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpacemaker-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-cts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-iostat2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-mrtg2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-sar2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-sheet2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-LogImport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-LogSummary</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-MMV</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-PMDA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcscspy0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-lite-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-compat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-compat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Poppler-0_18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-devel-doc-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-linguist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraptor-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librpcsecgss-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Rsvg-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libserf-1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>silc-toolkit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsvn_auth_gnome_keyring-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsvn_auth_kwallet-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtag-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-composite0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-damage0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dpms0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-record0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-res0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-screensaver0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xevie0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xprint0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xtest0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xvmc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyaml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzip-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zeromq-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>newt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>newt-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nut-cgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nut-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openexr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>osc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Tk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql93-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ppp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quagga-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhythmbox-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-bundler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-gtk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-SpiceClientGtk-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemtap-sdt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unixODBC-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-core-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>DirectFB-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lib++dfb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-gold</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-ppc-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-spu-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-settings-daemon-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-bad-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hivex-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_1-ibm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-ibm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Bootstrap-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Concurrent-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Core-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Core-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5DBus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5DBus-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Gui-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Gui-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Network-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Network-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGL-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGL-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5OpenGLExtensions-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PlatformSupport-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PlatformSupport-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PrintSupport-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PrintSupport-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Sql-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Test-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Test-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Widgets-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Widgets-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5Xml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-common-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-passdb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgypsy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksba-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libspice-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtidy-0_99-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtidy-0_99-0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxerces-c-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mercurial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpfr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>LibVNCServer-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsh2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsh2-classgen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsh2-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cracklib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-ddk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eog-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQtWebKit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbonobo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mdbtools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sgmltool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontconfig-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphite2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lhasa-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5PlatformHeaders-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WebKit-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WebKit5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WebKitWidgets-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQt5WebKitWidgets-private-headers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libimobiledevice-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pyldb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pyldb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libotr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-cpp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtcnative-1-0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libusbmuxd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-connector-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-compiler-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-rpm-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xfsprogs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-we-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-bg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-lt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-uk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-bsk-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-mini-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Jinja2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libformula</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblayout</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libloader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librepository</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librevenge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librevenge-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librevenge-generators-0_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libserializer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mdds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mdds-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pentaho-libxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pentaho-reporting-flow-engine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Capture-Tiny</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tevent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tevent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-mini-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-go</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgo7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev-mini-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev-mini1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-mini-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cracklib-dict-small</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-ocamldoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs4-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmdbodbc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mdbtools-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtuoso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtuoso-drivers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtuoso-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lynx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Twisted</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-branding-SLE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-openssl098</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql93-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-c</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2_org</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkitgtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkitgtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fltk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfltk1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcamel-1_2-45</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcamel-1_2-45-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebackend-1_2-7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebackend-1_2-7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebook-1_2-14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebook-1_2-14-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebook-contacts-1_2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebook-contacts-1_2-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecal-1_2-16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecal-1_2-16-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedata-book-1_2-20</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedata-book-1_2-20-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedata-cal-1_2-23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedata-cal-1_2-23-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedataserver-1_2-18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libedataserver-1_2-18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt5-qtbase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libyaml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zeromq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jasper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-askpass-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpfr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-logging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cmis-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphite2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hyphen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabw-0_1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdr-0_1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcmis-0_5-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libe-book</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libe-book-0_1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libetonyek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libetonyek-0_1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreehand</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreehand-0_1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgltf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgltf-0_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhyphen0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libixion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libixion-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblangtag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblangtag1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspub</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspub-0_1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmwaw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmwaw-0_3-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libodfgen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libodfgen-0_1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liborcus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liborcus-0_8-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpagemaker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpagemaker-0_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-share-linker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-voikko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librevenge-0_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librevenge-stream-0_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvisio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvisio-0_1-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvoikko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvoikko1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwps-0_4-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>malaga-suomi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-af_ZA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-be_BY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bg_BG</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bn_BD</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bs_BA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-cs_CZ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-da_DK</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-dictionaries</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-el_GR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-et_EE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_FR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-gu_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-he_IL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-hi_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-hr_HR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-hu_HU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-it_IT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lo_LA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lt_LT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lv_LV</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-nl_NL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-no</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-pl_PL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-pt_BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-pt_PT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ru_RU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sk_SK</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sl_SI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sv_SE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-te_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-th_TH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-vi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-zu_ZA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>LibVNCServer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtdb1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtdb1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pytalloc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pytalloc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>talloc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-license1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenCOLLADA0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_atomic1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_date_time1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_filesystem1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_iostreams1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_program_options1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_regex1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_signals1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_system1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_thread1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libixion-0_11-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liborcus-0_11-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-af_NA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_AE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_BH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_DZ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_EG</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_IQ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_JO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_KW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_LB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_LY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_MA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_OM</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_QA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_SA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_SD</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_SY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_TN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ar_YE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bn_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-bs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca_AD</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca_ES</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca_ES_valencia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca_FR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ca_IT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-de_AT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-de_CH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-de_DE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_AU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_BS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_BZ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_CA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_GH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_IE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_JM</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_MW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_NA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_NZ</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_PH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_TT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_US</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_ZA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-en_ZW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_AR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_BO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_CL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_CO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_CR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_CU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_DO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_EC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_ES</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_GT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_HN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_MX</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_NI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_PA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_PE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_PR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_PY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_SV</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_UY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-es_VE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_BE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_CA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_CH</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_LU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-fr_MC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lightproof-en</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lightproof-hu_HU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lightproof-pt_BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lightproof-ru_RU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-nb_NO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-nl_BE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-nn_NO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-pt_AO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-ro_RO</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sr_CS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sr_Latn_CS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sr_Latn_RS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sr_RS</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-sv_FI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-te</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-vi_VN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openCOLLADA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql94-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libotr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcilkrts5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcilkrts5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libffi-gcc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblsan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libubsan0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-backports.ssl_match_hostname</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tornado</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo-gobject2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo-gobject2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-ntp-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libc-client2007e_suse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libimobiledevice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libimobiledevice-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libimobiledevice4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libusbmuxd2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>usbmuxd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstorage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstorage-ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstorage6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre16-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcrecpp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcrecpp0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libass</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libass5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgme0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcares2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcares2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasecamerabinsrc-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstcodecparsers-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstegl-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstmpegts-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstphotography-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo-script-interpreter2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-good</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-good-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-base-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstinterfaces-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstinterfaces-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guile-modules-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguile-2_0-22</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopus0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libz1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libz1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquicktime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquicktime0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gegl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gegl-0_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gegl-0_2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgegl-0_2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvmtools0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends-autoconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rrdtool-cached</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstallocators-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstaudio-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstaudio-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstfft-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstfft-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstpbutils-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstpbutils-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstriff-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtsp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsdp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsttag-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsttag-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvideo-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvideo-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstAudio-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstPbutils-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstTag-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstVideo-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenjp2-7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstadaptivedemux-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbadaudio-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbadbase-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbadvideo-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstgl-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsturidownloader-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-ha-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>conntrack-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetfilter_cthelper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetfilter_cthelper0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetfilter_cttimeout</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetfilter_cttimeout1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hawk2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpacemaker3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pacemaker-remote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcreposix0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-md-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-network-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dlm-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_38-44-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_38-44-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-live-patching-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_39-47-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_39-47-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_32-33-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_32-33-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_36-38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_36-38-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_43-52_6-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_43-52_6-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_44-52_10-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_44-52_10-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_44-52_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_44-52_18-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_48-52_27-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_48-52_27-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-52_31-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-52_31-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-60_20-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-60_20-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_60-52_49-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_60-52_49-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_59-60_41-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_59-60_41-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_59-60_45-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_59-60_45-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_60-52_54-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_60-52_54-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-52_34-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-52_34-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_49-11-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_49-11-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_57-60_35-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_57-60_35-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_53-60_30-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_53-60_30-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-60_25-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-60_25-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_62-60_62-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_62-60_62-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-52_39-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-52_39-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_62-60_64_8-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_62-60_64_8-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_67-60_64_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_67-60_64_18-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_67-60_64_21-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_67-60_64_21-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_21-84-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_21-90-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_21-69-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_67-60_64_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_67-60_64_24-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_21-81-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_55-52_42-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_55-52_42-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_55-52_45-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_55-52_45-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_38-93-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_69-60_64_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_69-60_64_29-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_69-60_64_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_69-60_64_32-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP1_Update_13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_49-92_11-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12-SP2_Update_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-passenger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-passenger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-passenger-apache2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-setuptools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-rack-1_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rack-1_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sles12-docker-image</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sles12sp1-docker-image</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-docker-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-excon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-docker-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-excon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>runc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sles11sp4-docker-image</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>portus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-libldap-2_3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ec2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ec2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ec2-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-rsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-ada</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-ada-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-c++-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc5-fortran-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libada5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libada5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libffi-devel-gcc5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-devel-gcc5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_php5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-bcmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-bz2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ctype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-dba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-dom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-enchant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-exif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-fastcgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-fileinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-fpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-gettext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-gmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-iconv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-intl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mbstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pcntl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pdo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pear</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-shmop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-soap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-suhosin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sysvmsg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sysvsem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sysvshm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-tokenizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-wddx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xmlreader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xmlrpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xmlwriter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-module-web-scripting</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-opcache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-posix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-imap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-phar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_php7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-bcmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-bz2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-ctype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-dba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-dom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-enchant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-exif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-fastcgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-fileinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-fpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-ftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-gettext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-gmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-iconv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-imap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-intl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-mbstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-mcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-opcache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pcntl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pdo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pear</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pear-Archive_Tar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-phar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-posix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-pspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-shmop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-soap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sysvmsg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sysvsem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-sysvshm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-tokenizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-wddx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-xmlreader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-xmlrpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-xmlwriter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-xsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php7-zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs4-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>npm4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs6-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs6-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>npm6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>policycoreutils-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-DBD-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-compute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-compute-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-compute-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-compute_debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-compute_debug-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-devel-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt_debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt_debug-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-syms-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SUSE-Linux-Enterprise-RT-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>SUSE_SLES_SAP-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstorage5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_60-52_57-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_60-52_57-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_60-52_60-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_60-52_60-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_17</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_60-52_63-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_60-52_63-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamsap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_66-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_61-52_66-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-SLE12_Update_19</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_cml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_magnet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_mysql_vhost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_trigger_b4_dl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_webdav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-magic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fltk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fltk-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-EBook-1_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-EBookContacts-1_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-EDataServer-1_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetfilter_cthelper-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetfilter_cttimeout-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libffi48</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hyphen-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libabw-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcdr-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcmis-c-0_5-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcmis-c-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcmis-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libe-book-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libe-book-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libetonyek-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libetonyek-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreehand-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreehand-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libixion-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblangtag-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspub-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspub-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmwaw-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmwaw-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libodfgen-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libodfgen-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liborcus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvisio-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvisio-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvoikko-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwps-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hivex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtdb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pytalloc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hunspell-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_chrono1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_graph1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_graph_parallel1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_locale1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_log1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_math1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_mpi1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_python1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_random1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_serialization1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_test1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_timer1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_wave1_54_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhyphen0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-ntp-client-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obs-service-source_validator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstorage-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libass-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgme-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcares-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstinsertbin-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-users-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-base-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstApp-0_10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstInterfaces-0_10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guile-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguilereadline-v-18-18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopus-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libquicktime-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gegl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rrdtool-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstAllocators-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstApp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstFft-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstRiff-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstRtp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstRtsp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstSdp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgit2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgit2-24</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXpm-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-sle2docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle2docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-doc-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_auth_kerb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_security2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tdb-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-collections</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache-commons-collections-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-imapd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lttng-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lttng-modules-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsmasq-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-glanceclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-keystonemiddleware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-novaclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-novaclient-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-swiftclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-swiftclient-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-agent-compute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-compute</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-suse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-suse-sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ceilometer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-nova</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-python-memcached</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenEXR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenEXR-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenEXR-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hal-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hal-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hal-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PolicyKit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PolicyKit-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PolicyKit-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PolicyKit-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acpid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>amavisd-new</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-dbase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-hash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_php53</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-bcmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-bz2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-ctype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-dba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-dom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-exif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-fastcgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-fileinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-ftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-gettext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-gmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-iconv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-intl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-mbstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-mcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-pcntl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-pdo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-pear</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-pspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-shmop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-soap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-suhosin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-sysvmsg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-sysvsem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-sysvshm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-tokenizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-wddx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-xmlreader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-xmlrpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-xmlwriter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-xsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-client3-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-common3-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-core5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns_sd-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-license</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_program_options1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_regex1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_signals1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbz2-1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcpcd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcpv6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ecryptfs-utils-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>enscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>findutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>findutils-locate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>foomatic-filters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-server-dialupadmin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fvwm2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-fonts-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-fonts-rus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-fonts-std</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-library</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-omni</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimpprint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-2_0-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglib-2_0-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmodule-2_0-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgobject-2_0-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgthread-2_0-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmime-2_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmime-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmime-2_0-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmime-2_4-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-screensaver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-screensaver-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls26-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls26-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-base-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-base-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-0_10-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstinterfaces-0_10-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-good-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_4_2-ibm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_4_2-ibm-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_4_2-ibm-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kgreeter-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-wallpapers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace-ksysguardd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-runtime-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-runtime-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-default-style</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-default-style-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-default-style-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkde4-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdecore4-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork4-filesharing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kopete</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krdc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krfb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pae-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pae-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ppc64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ppc64-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ppc64-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-trace-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-trace-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-apps-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-apps-servers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldapsmb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtdb1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwbclient0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-krb-printing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libQtWebKit4-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-qt3support-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x11-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libadns1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-progs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreebl3-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdiplus0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop-2_0-7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libltdl7-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtool-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient15-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient15-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient_r15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-Max</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libneon27-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm10-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>newt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-newt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopensc2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopensc2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopensc2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-glib4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt4-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-browse0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_6-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_6-1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython2_6-1_0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-base-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librpcsecgss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamplerate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamplerate-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamplerate-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp15-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp15-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-2_4-1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff3-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcrypt-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcrypt-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-modules-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pwdutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pwdutils-plugin-audit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzip1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>log4net</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lvm2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-locale-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-nunit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-winforms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-www</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-plugins-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-ppc64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-askpass</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openswan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opie-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_krb5-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ldap-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ldap-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_mount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_mount-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_mount-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-lite-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-lite-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-libwww-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-spamassassin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spamassassin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-libs-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pure-ftpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pyxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-doc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squid3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>star</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysstat-isag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>t1lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tgt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-admin-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-docs-webapp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-jsp-2_1-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-servlet-2_5-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat6-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unrar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-doc-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-xauth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libs-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xterm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-trax</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcalc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcharselect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdessh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kfloppy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgpg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ktimer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwalletmanager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kwikdisk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>okteta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_thread1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-2_4-2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-extra26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibutils-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-httpclient3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-ibm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-ibm-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-ibm-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-ibm-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jpeg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql91</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql91-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql91-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql91-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoftokn3-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8-hmac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8-hmac-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libotr2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0-config-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0-config-kde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0-networkmanager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtspi1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtspi1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtspi1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>trousers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nut-classic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openCryptoki</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openCryptoki-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openCryptoki-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Module-Build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Test-Simple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>taglib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>taglib-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unixODBC_23</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>x3270</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libxcb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libxcb-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libxcb-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-dmx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-rdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>a2ps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreadline5-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-license1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_system1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_thread1_49_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdw1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebl1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fastjar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdirstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC8-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uuid-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevent-1_4-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc_s1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++6-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt11-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblzo2-2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpfr1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpfr1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmpfr1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql55client18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql55client18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql55client18-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql55client_r18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql55client_r18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql55client_r18-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpixman-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpixman-1-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpixman-1-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpulse-mainloop-glib0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-3-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtevent0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsman1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>suseRegister</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lxc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-nrpe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-nrpe-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-plugins-nrpe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-kernel-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>popt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>popt-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>popt-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-lxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sendmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libX11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libX11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libX11-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXext-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXext-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXfixes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXfixes-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXfixes-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXp-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXrender</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXrender-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXrender-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXt-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXt-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXv-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXv-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>GraphicsMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagick2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-GraphicsMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenEXR-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PackageKit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hal-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-glib10-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-qt10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpackagekit-qt10-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>PolicyKit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Xerces-c</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXerces-c-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXerces-c28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>a2ps-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-antlr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-bcel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-bsf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-log4j</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-oro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-regexp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-resolver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-commons-logging</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-javamail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-jdepend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-junit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-nodeps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_fcgid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_perl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boinc-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boinc-client-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_date_time1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_date_time1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_filesystem1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_filesystem1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_graph1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_graph1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_iostreams1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_iostreams1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_math1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_math1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_mpi1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_program_options1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_python1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_python1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_regex1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_serialization1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_serialization1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_signals1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_system1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_system1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_test1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_test1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_thread1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_wave1_36_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libboost_wave1_36_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bytefx-data-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-firebird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-oracle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-sybase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-jscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-wcf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-winfxcore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monodoc-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcc48-fortran-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cscope</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-imapd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>derby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libext2fs2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>empathy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fileshareset</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>misc-console-font</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFLAC++6-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-ijs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimpprint-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmime-2_4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmime-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gmime-sharp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnucash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnucash-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnucash-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibutils-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib2-filters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib2-loaders</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape-extensions-dia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape-extensions-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape-extensions-fig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape-extensions-gimp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-arts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-arts-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-arts-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kopete-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-mysql-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-postgresql-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-sqlite-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libqt4-sql-unixODBC-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libadns-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr1-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdhcp6client-1_0-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdhcp6client-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdrm-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-4-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgadu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-extra-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpgme11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpgme11-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop-2_0-7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop-2_0-7-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgtop-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libid3tag</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-lcms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmikmod</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpfr-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient_r15-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysqlclient_r15-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpixman-1-0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>readline-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-base-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-draw-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-impress-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-kde</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-kde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-prebuilt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-mono</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-themes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-en-GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gu-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-hi-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh-CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-zh-TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-da</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-en-GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-en-US</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-gu-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-hi-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-pt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-pt-BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-zh-CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-zh-TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-testtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamplerate-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh2-1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_sudo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthai-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtirpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtunepimp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtunepimp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtunepimp5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit-1_0-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit-1_0-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-gnome-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-gnome-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwpd-0_8-8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwpd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwpd-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsman-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openwsman-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcrypt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxine-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxine1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxine1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxine1-gnome-vfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxine1-pulse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lxc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lzo-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>memcached</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-gnome-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-translations-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netatalk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netatalk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>novell-ipsec-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>novell-ipsec-tools-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obex-data-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openCryptoki-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-DBD-Pg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-imap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-posix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-readline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-sockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php53-tidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>popt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>popt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pwlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pwlib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-crypto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-imaging-sane</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-logilab-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-lxml-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-devel-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-devel-tools-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-doc-ri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-test-suite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionmailer-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionpack-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activemodel-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activeresource-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rails-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-railties-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activerecord-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activesupport-3_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-bundler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-i18n-0_6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-json_pure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rack-ssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rdoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-sprockets-2_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rxvt-unicode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sendmail-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>struts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>struts-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>struts-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>t1lib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>taglib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-arab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-cjk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-dvilj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-jadetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-metapost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-musictex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-omega</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-tex4ht</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-xetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-bin-xmltex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-cjk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-context</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-dvilj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-jadetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-latex-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-metapost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-musictex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-omega</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-ppower4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tex4ht</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>texlive-xmltex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>trousers-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unixODBC_23-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>valgrind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>valgrind-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libX11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libX11-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXext-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXext-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXfixes-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXfixes-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXp-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXrender-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXrender-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXv-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXv-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libxcb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libxcb-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ncurses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-readline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-tidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beagle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beagle-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beagle-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inn-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inst-source-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_4_2-ibm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-ibm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql91-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-base-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-httplib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rack-1_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionmailer-2_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionpack-2_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activerecord-2_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activeresource-2_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activesupport-2_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rails</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rails-2_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionpack-2_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-mail-2_3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rack-cache-1_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-de-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-de-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql91-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnu-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtidy-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-fontconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-fontconfig-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsdtar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontconfig-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-ng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-ng-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-capng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>google-carlito-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmythes-1_2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mythes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mythes-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-importlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-SOAP-Lite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-mail-2_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sane-backends-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXpm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXpm-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-storage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-storage-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-openssl1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4-openssl1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl1_0_0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl1-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-openssl1-2_4-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-openssl1-2_4-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldap-openssl1-2_4-2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-client-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-openssl1-helpers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wget-openssl1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread-cmaps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread-fonts-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread-fonts-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread-fonts-zh_CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread-fonts-zh_TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acroread_ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibm-data-db2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-openssl097g</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-openssl097g-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-branding-SLED</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beagle-evolution</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beagle-firefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beagle-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mhtml-firefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flash-player-kde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icedtea-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-pae-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-trace-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>permissions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0-config-gnome-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy0-networkmanager-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-certs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quota</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vm-install</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xrdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper-log</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cabextract</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-wireless-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-wireless-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-wireless-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasecamerabinsrc-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasecamerabinsrc-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasevideo-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasevideo-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstphotography-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstphotography-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsignalprocessor-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsignalprocessor-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvdp-0_10-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvdp-0_10-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-da</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-da-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-da-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-en_GB</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-es-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-es-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-fr-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-fr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-it-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-it-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-nb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-nl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-nl-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-nl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pl-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pt_BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pt_BR-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pt_BR-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ru</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ru-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ru-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-sv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-sv-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-sv-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-zh_CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-zh_TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-runtime-xine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-bigsmp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lcms2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblcms2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>novell-qtgui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>novell-qtgui-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>novell-ui-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orca-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pwlib-plugins-avc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pwlib-plugins-dc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pwlib-plugins-v4l2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpa_supplicant-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-hae-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hawk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hawk-templates</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-network-kmp-bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-network-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-network-kmp-ppc64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-network-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-network-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-ppc64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-ppc64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-kmp-bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sle-pos-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>POS_Image-Minimal3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>POS_Image-Netboot-hooks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>POS_Image-Tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>POS_Image3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>POS_Migration</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>POS_Server-Admin3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>POS_Server-AdminGUI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>POS_Server-AdminTools3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>POS_Server-BranchTools3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>POS_Server-Modules3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>POS_Server3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>admind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>admind-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>posbios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ec2-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>brocade-bna-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-network-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-network-kmp-rt_trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-kmp-rt_trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt_trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt_trace-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt_trace-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-rt_trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-rt_trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lttng-modules-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lttng-modules-kmp-rt_trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-rt_trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_4_2-ibm-sap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_4_2-ibm-sap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sap_suse_cluster_connector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhn-virtualization-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhn-virtualization-host</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhncfg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhncfg-actions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhncfg-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhncfg-management</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>koan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhnmd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-backend-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spacewalk-certs-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gconf2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gconf2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gconf2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidl-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190-gnomevfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191-gnomevfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orbit2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orbit2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orbit2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libacl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libacl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libacl-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cifs-mount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtalloc1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc43</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc43-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcc43-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++43</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++43-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libstdc++43-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keyutils-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keyutils-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keyutils-libs-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libidn-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-crammd5-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-gssapi-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-otp-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-plain-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtkhtml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtkhtml2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cdparanoia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cdparanoia-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cdparanoia-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>desktop-file-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fam-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fam-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-vfs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-vfs2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-vfs2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libogg0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libogg0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libogg0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liboil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liboil-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liboil-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpg-error0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpg-error0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgpg-error0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-ppc64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-vmi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-bea</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-bea-console</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-bea-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-bea-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm-alsa-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-akonadi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-akregator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kaddressbook</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kalarm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kjots</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-knode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-knotes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kontact</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-korganizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-ktimetracker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-ktnef</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdepim4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdepim4-wizards</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdepimlibs4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libakonadi4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdepim4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkdepimlibs4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-gwenview</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kcolorchooser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kruler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-ksnapshot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-okular</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkipi5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kwin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-knewsticker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-kopete</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-krdc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-krfb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>utempter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>utempter-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>utempter-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ext4dev-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ext4dev-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ext4dev-kmp-ppc64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ext4dev-kmp-vmi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ext4dev-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-kdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-vmi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-vmi-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oracleasm-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kvm-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kvm-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX13-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libHX13-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libesmtp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>neon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtheora0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtheora0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtheora0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvolume_id1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-IO-Socket-SSL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>websphere-as_ce</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcmpiutil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-cim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-viewer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-xml-apis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-xml-resolver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xpdf-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-ldap-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libgcc_s1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libstdc++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>btrfs-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>btrfs-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>btrfs-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ext4dev-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hyper-v-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hyper-v-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hyper-v-kmp-trace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gcc47</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl0_9_8-hmac-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quota-nfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-branding-SLES-for-VMware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>giflib-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-collections</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-collections-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-commons-collections-tomcat5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-bg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-csb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-et</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-eu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-fi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-gl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-hi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-is</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-kk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-km</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ku</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-lt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-lv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-mk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-nds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-nn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-pa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-ro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-sl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-th</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-tr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-uk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde4-l10n-wa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-bigsmp-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget-kmp-bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oracleasm-kmp-bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-kde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-kde4-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-kde4-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-openvpn-kde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-pptp-kde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>plasmoid-networkmanagement</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhnlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>suseRegisterInfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cracklib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cracklib-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontconfig-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-bigmem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-bigmem-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-bigmem-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lha</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-ng-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-ng0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcap-ng0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Sys-Virt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsqlite3-0-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXpm-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libXpm-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-storage-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>suse-cloud-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crowbar-barclamp-trove</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mongodb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crowbar-barclamp-neutron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-ibm-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-mlnx-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-nec-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-nvsd-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-plugin-cisco</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-restproxy-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-ryu-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>novnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-agent-central</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-agent-ipmi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-agent-notification</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-alarm-evaluator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-alarm-notifier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-collector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder-backup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-cinder-scheduler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-glance</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-glance-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat-api-cfn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat-api-cloudwatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat-engine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-keystone</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-keystone-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-sahara</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-sahara-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-sahara-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-sahara-engine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-glance</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-heat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-keystone</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.i18n</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslo.utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-oslotest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-sahara</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-six</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crowbar-barclamp-nova_dashboard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-dashboard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-django_openstack_auth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-horizon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-cells</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-cert</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-conductor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-console</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-consoleauth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-novncproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-objectstore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-scheduler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-serialproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-vncproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-swift</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-swift-account</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-swift-container</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-swift-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-swift-object</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-swift-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-swift</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-trove</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-trove-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-trove-conductor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-trove-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-trove-guestagent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-trove-taskmanager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-trove</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Django</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Pillow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-openstackclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-sprockets-2_11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-actionpack-4_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionpack-4_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-actionview-4_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionview-4_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-activemodel-4_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activemodel-4_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-activerecord-4_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activerecord-4_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-activesupport-4_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activesupport-4_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-bson-1_11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-easy_diff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-redcarpet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-bson-1_11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-easy_diff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-redcarpet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-sprockets-2_11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-rack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_wsgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>suse-openstack-cloud-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>couchdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crowbar-openstack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat-plugin-heat_docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-heat-templates</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ironic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ironic-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ironic-conductor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ironic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rabbitmq-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rabbitmq-server-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-actionpack-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-actionview-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-activemodel-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-activerecord-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-activesupport-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-chef-expander</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-chef-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-chef-server-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-chef-solr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-chef-expander</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-chef-server-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-chef-solr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-extlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-multi_xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-rails-html-sanitizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-railties-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-designate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-designate-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-designate-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-designate-central</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-designate-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-designate-sink</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ironic-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-vpnaas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-vpnaas-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-nova-docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-tempest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-tempest-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-designate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-neutron-vpnaas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tempest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-ceilometer-polling</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-manila</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-manila-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-manila-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-manila-scheduler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-manila-share</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-fwaas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-fwaas-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-lbaas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-neutron-lbaas-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-resource-agents</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-manila</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-networking-cisco</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-neutron-fwaas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-neutron-lbaas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openstack-horizon-plugin-manila-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-horizon-plugin-manila-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-suds-jurko</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionview-4_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-defusedxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pysaml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shotwell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shotwell-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openSUSE-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>irssi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>irssi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chromedriver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chromium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chromium-ffmpegsumo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-buildsymbols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>GraphicsMagick-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagick-Q16-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagick3-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagickWand-Q16-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-6_Q16-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore-6_Q16-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand-6_Q16-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>android-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_mono</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmono-2_0-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmono-2_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmonoboehm-2_0-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmonoboehm-2_0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmonosgen-2_0-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-mvc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xsp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aria2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-autoipd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>banshee</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>banshee-backend-engine-gstreamer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>banshee-backend-io-gio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>banshee-backend-platform-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>banshee-backend-platform-unix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>banshee-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>banshee-dmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>banshee-dmp-apple-devices</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>banshee-dmp-mtp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>banshee-extensions-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>claws-mail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>claws-mail-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyradm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sendfax</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgd3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgd3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-help-browser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-plugin-aa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-games</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-games-recommended</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wdiff-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>htmldoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icedtea-web-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jhead</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-wallpaper-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace-addons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace-liboxygenstyle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase4-workspace-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oxygen-cursors4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-kdebase4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libksuseinstall-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdnssd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kppp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-desktop-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>klogd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFS-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libFS6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libImlib2-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libSDL_sound-1_0-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavutil52</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcacard0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ksm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-logger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblightdm-gobject-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lightdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lightdm-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libminiupnpc10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenjpeg1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-tools-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler46</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libproxy1-config-kde4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-hicontrast</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-oxygen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-sifr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-SpiceClientGtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libthunarx-2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>thunar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>thunar-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libupnp6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-uml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-vbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>links</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nano</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nano-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nspluginwrapper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obs-service-set_version</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openconnect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openconnect-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-dbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>system-config-printer-applet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-pip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-linux-user</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-dom-inspector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-irc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-venkman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tkimg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>transmission-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>transmission-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>viewvc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-ui-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quassel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quassel-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quassel-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quassel-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quassel-mono</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tnftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>claws-mail-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-firebird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mssql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libserf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libserf-1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libserf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-branding-openSUSE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-branding-openSUSE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-6_Q16-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-6_Q16-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-6_Q16-5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore-6_Q16-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand-6_Q16-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand-6_Q16-2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnfsidmap-sss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_simpleifp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_simpleifp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-ipa_hbac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-sss_nss_idmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-dbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-wbclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-wbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>konversation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>konversation-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go-emacs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go-vim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-crystal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-as</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-bn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-br</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-cy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-dz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-et</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-eu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-fa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-he</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-kk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-kn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-lv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-mai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-mr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-nso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-or</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-si</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-st</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-te</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-th</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-tn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-tr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ve</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-sdk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpolarssl7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polarssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polarssl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-uml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-vbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-login-shell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzmq4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-sprockets-2_2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-sprockets-2_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-sprockets-2_1-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-ui-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-sprockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-sprockets-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-tilt-1_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-tilt-1_4-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-tilt-1_4-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmagic-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionpack-3_2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>phpMyAdmin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icecast</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icecast-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flac-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn-down-root-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chromium-desktop-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chromium-desktop-kde</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg62-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg8-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libturbojpeg0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Plack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lua-rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcl-rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firebird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firebird-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firebird-classic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firebird-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firebird-superserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfbclient2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfbclient2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfbclient2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>seamonkey-translations-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-buildsymbols</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-translations-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-desktop-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-obs-qa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-obs-qa-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source-vanilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-vanilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-vanilla-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunbound2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-anchor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-munin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-python-ctypes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-event</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-itk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-ast</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-bg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-ca</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-en-ZA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-et</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-eu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-fi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-gl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-group1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-group2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-group3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-group4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-group5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-km</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-mk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-nb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-sk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-sl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-tr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-help-vi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-themes-prebuilt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-am</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ast</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-be-BY</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-en-ZA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-eo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-id</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-is</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ka</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-km</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-mk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-om</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-pa-IN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-rw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-sh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-tg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-ug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-l10n-vi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>privoxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>privoxy-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-virtualbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-guest-desktop-icons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-guest-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-guest-kmp-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-guest-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-guest-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-guest-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-host-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-host-kmp-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-host-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-websrv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unzip-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unzip-rcc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvas-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcab</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcab-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gcab-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcab-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jython-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jython-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jython-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>roundcubemail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mdadm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-static-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-obsolete</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-utils-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-atsvc0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdcerpc-samr0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libregistry0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsamba-policy0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-pidl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-progs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>snack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecpg6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql93-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql93-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql93-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql93-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-rope</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmspack0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>percona-toolkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xtrabackup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xtrabackup-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>putty</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cacti</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glusterfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glusterfs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfapi0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfchangelog0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfrpc0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgfxdr0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglusterfs0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libarchive13-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>less</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzip2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfont1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mercurial-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-bundler-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgit2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgit2-21</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgit2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpotrace0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>potrace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>potrace-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bbswitch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bbswitch-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bbswitch-kmp-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bbswitch-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bbswitch-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cloop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cloop-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cloop-kmp-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cloop-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cloop-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-eppic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-gcore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-kmp-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>crash-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdjmod</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdjmod-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdjmod-kmp-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdjmod-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hdjmod-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipset</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipset-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipset-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipset-kmp-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipset-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipset-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libipset3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcfclock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcfclock-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcfclock-kmp-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcfclock-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vhba-kmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vhba-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vhba-kmp-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vhba-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vhba-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xtables-addons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xtables-addons-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xtables-addons-kmp-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xtables-addons-kmp-pae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xtables-addons-kmp-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rest-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rest-client-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rest-client-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-accessibility</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-accessibility</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_8_0-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Pillow-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libblkid-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmount-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmartcols-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuuid-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>DirectFB-Mesa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>DirectFB-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>DirectFB-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>DirectFB-libSDL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>DirectFB-libvncclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lib++dfb-1_7-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdirectfb-1_6-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdirectfb-1_6-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdirectfb-1_7-5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdirectfb-1_7-5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcre16-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcreposix0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcre-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssh4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnu_parallel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnu_parallel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcacard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcacard-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libraw-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfuse2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zeromq-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-radius</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>proftpd-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tidy-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpkg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpkg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpkg-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-nm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cgit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-0_2-7-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-RedCloth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-RedCloth-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-RedCloth-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql56client18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql56client18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql56client_r18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmysql56client_r18-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-community-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-community-server-bench</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-community-server-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-community-server-errormessages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-community-server-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-community-server-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-bench</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunwind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunwind-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunwind-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-filters-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-lwresd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rack-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rack-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rack-1_3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rack-1_3-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rack-1_4-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-rack-1_4-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-jquery-rails</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-jquery-rails-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcryptopp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcryptopp-5_6_2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcryptopp-5_6_2-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcryptopp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcryptopp-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-lua</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-mydns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-backend-sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pdns-recursor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activesupport-3_2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcrypto34</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcrypto34-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libressl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libressl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libressl-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libressl-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssl33</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssl33-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtls4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtls4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ansible</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-bootstrap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_7_0-openjdk-bootstrap-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuser-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuser-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuser-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuser1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>otrs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>otrs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>otrs-itsm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-branding-openSUSE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtualbox-host-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgcrypt-cavs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_trace1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvdpau_trace1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>spice-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libelf-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>remind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>criu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>criu-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcriu1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-devel-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-doc-ri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-imapd-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-imapd-snmp-mibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-imapd-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-PyJWT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>redis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>froxlor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>IPython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>IPython-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-IPython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-IPython-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>polkit-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-taglibs-standard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jakarta-taglibs-standard-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xalan-j2-xsltc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libevent-2_0-5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs-npm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcrypto36</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcrypto36-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssl37</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libssl37-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtls9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtls9-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaudiofile1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaudiofile1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvala-0_26-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvala-0_26-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vala</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bouncycastle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bouncycastle-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xulrunner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xulrunner-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xulrunner-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-remote-helpers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xscreensaver-data-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libminiupnpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libminiupnpc10-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>miniupnpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-miniupnpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-compat-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-compat-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng12-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-hivex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldb-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pyldb-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tdb-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tevent-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gummi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gummi-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-i386-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvlc5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvlccore7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>live555</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>live555-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-noX</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-noX-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vlc-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typo3-cms-4_7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iperf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iperf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libiperf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typo3-cms-4_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpmlint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpmlint-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-roller</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>file-roller-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-file-roller</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-branding-SLED</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-branding-openSUSE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-engine-clearlooks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-engine-clearlooks-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-engine-crux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-engine-crux-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-engine-glide</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-engine-glide-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-engine-hcengine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-engine-industrial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-engine-industrial-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-engine-mist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-engine-mist-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-engine-redmond95</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-engine-redmond95-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-engine-thinice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-engine-thinice-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-engines</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-engines-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-amharic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-amharic-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-inuktitut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-inuktitut-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-multipress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-multipress-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-thai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-thai-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-vietnamese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-vietnamese-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-xim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodule-xim-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodules-tigrigna</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-immodules-tigrigna-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-theme-clearlooks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-theme-crux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-theme-industrial</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-theme-mist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-theme-redmond95</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-theme-thinice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Jinja2-emacs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-Jinja2-vim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde-cli-tools5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kde-cli-tools5-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>npm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-myhostname</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss-myhostname-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-journal-gateway</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-mini-sysvinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>derby-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcoreaddons</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcoreaddons-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcoreaddons-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kcoreaddons-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5CoreAddons5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5CoreAddons5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagick++-Q16-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagick++-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>guile1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguile-srfi-srfi-1-v-3-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguile-srfi-srfi-13-14-v-3-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguile-srfi-srfi-4-v-3-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguile-srfi-srfi-60-v-2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguile1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguile17</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libguilereadline-v-17-17</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-loadables</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagick++-Q16-11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>memcached-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>monit-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar-backup-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot22-fts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot22-fts-lucene</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot22-fts-solr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot22-fts-squat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnuchess</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pitivi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pitivi-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libX11-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXi-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrandr-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-composite0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-damage0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-dpms0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-randr0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-record0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-res0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-screensaver0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-shape0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xevie0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xf86dri0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xinerama0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xprint0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xtest0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xv0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcb-xvmc0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXrender-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXtst-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXv-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvMC1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXfixes-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libass5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-bad-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-bad-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstcodecparsers-0_10-23-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbadbase-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbadvideo-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasecamerabinsrc-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstcodecparsers-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstgl-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstinsertbin-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstmpegts-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstphotography-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsturidownloader-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstwayland-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstwayland-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libminizip1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>minizip-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zlib-devel-static-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-mail-2_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby2.1-rubygem-mail-doc-2_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-mail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-mail-2_4-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-mail-2_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-mail-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shellinabox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagick++-Q16-12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activerecord-3_2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cacti-spine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnettle-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nettle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdelta3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-debugger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-debugger-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-dialyzer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-dialyzer-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-epmd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-et</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-et-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-gs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-gs-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-jinterface</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-jinterface-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-observer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-observer-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-reltool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-reltool-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-wx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-wx-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obs-service-download_files</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obs-service-extract_file</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obs-service-recompress</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obs-service-verify_file</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-init</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libetonyek-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmwaw-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpagemaker-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpagemaker-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpagemaker-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-icon-theme-breeze</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwps-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libotr-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libotr2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libotr2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eximon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eximstats-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-credential-gnome-keyring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebml4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libebml4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmatroska</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmatroska-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmatroska6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmatroska6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsh2-bsf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsh2-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsh2-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dropbear</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-3_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk-3_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit-jsc-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit-jsc-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcairo-script-interpreter2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb-pcp-pmda</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>optipng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jq</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjq-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjq1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvarnishapi1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>varnish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>varnish-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>atheme</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>atheme-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libathemecore1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-cpp0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-glib8-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt4-4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt5-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt5-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler46-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-qt5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-camlp4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-camlp4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-compiler-libs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-emacs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-labltk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-labltk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-loader-rsvg-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Module-Signature</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libimobiledevice-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libimobiledevice4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libimobiledevice6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libusbmuxd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libusbmuxd2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libusbmuxd4-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-imobiledevice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtorrent-rasterbar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtorrent-rasterbar-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtorrent-rasterbar-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtorrent-rasterbar7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtorrent-rasterbar8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-libtorrent-rasterbar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kinit-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kinit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kinit-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimp-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimpui-2_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libircclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libircclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libircclient-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libircclient1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cronic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-c-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnugk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>h323plus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>h323plus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libh323-1_26_5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>karchive</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>karchive-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>karchive-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Archive5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libKF5Archive5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mupdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mupdf-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sqlite3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bsdiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>harfbuzz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>harfbuzz-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>harfbuzz-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libharfbuzz-icu0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libharfbuzz-icu0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libharfbuzz0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libharfbuzz0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_4m1_0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-doc-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icoutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcscspy0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>encfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>encfs-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-extra-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstallocators-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstriff-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtp-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtsp-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsdp-1_0-0-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugin-esd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugin-esd-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-good-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-good-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugins-good-extra-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-0_10-plugin-gnomevfs</name>
	</rpminfo_object>
</objects>
<states>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4-1.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">5</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.3.dev13-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.2.dev26-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.4-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.1-1.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.3-2.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.0-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.32.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-5.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">12</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.1.0esr-1.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:13.2+git20140911.61c1681-1.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.35-1.126</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.27.2-11.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-1.179</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.31-20.59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2-75.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2-75.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.5P1-1.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-3.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-27.1129</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.98.4-1.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.7-2.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.25-3.113</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0-147.71</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.22-5.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11-26.182</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.27.1-2.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.3+r212056-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2-55.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.11-55.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.58-2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.5-3.75</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.12-181.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.26-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.8-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.8-1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.100.2-3.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.6-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.97.2-13.253</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:037-34.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:103-5.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.158-3.200</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.3-14.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.3-1.131</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.3-1.213</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-13.232</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3.26-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.19-2.149</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.9-5.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.406-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-7.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.3-2.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.3-3.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.36-54.100</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-3.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.30.6-1.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.40.2-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.10-1.164</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.38.2-5.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-17.72</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.5-1.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.4-22.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.15-1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.24-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.22.2-5.429</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.326-2.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6-7.392</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-6.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.14.6-3.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.10.1-2.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-2.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:s20121221-2.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.65-3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.5-7.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.28-4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.1-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.19-17.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.18-1.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-4.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.7-3.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.14-3.60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.2-3.61</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.1-3.53</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.7-2.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.2-3.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-3.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-3.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-3.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8-3.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.4-3.59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-3.60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.10-3.57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-3.57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-3.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-6.69</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.41.rc1-1.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.12-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-3.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.5-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.5-2.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.21-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.21-6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.2.26539-13.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.4-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.3-2.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2d-3.77</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-352.84</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4-3.83</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:210-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.1b-182.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.5.1-5.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.7-3.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-12.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11-2.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.2-14.60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.2-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.08-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.0-4.59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.2-15.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.8.4-13.69</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4-3.64</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.5-27.86</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.11-6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.30.0-3.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-59.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-2.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.36.3-4.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10-3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.50-8.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.8-2.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.112-2.189</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.4-3.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.4-3.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.11-11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.11-11.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.7-2.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.1-2.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-2.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.10-3.67</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.4-3.88</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.1.2-3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.19-16.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.10-24.128</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.8-18.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.25-18.75</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.7.2.1-3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.44.2-1.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.25-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.3-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-1.265</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7-2.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3-9.78</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.3-1.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-8.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.28.2-17.83</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10-1.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.1-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.6-1.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.1-4.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.7-3.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.16-15.74</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2.umip.0.4-19.77</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.7-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.21-44.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-24.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.13.0-1.122</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-2.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.8-11.57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.1-23.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.4-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-1.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-5.191</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.14-1.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.18.2-3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.82-3.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.71-1.178</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.04-5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:804.031-3.82</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.38-7.61</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.0-6.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.7-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.22-267.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.2-3.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.7-2.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.1-2.76</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.5-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.7-21.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.14-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0-4.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-40.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-40.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-40.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-40.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.7-2.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.2-1.92</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.0-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.0-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11_git201205151338-8.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.2.4-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3-1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-1.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.83.7-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-778.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.88+-94.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.1-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.18.1-3.268</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.0-1.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2-8.84</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-4.95</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.1-1.86</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.0-16.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.3-153.145</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-3.64</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14-4.83</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.9-1.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-264.133</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.1_06-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.1_06_k3.12.28_4-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.99.914-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.15-7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.43-5.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1-14.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0-3.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6-45.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.15.2-12.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.108-1.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.11-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10-1020.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">12.1</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.4.0esr-51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:13.2+git20140911.61c1681-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.35-3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.9-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25.0-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.21.1-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4-6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.98.7-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.7-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.22-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.5-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2-58.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.11-58.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.58-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.16-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.3-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.71-8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:037-66.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.42.11-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.158-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.19-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.9-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.548-111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.5-7.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.3-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-31.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.1-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.2-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.4-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.15-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.23-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.91-21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-2.4.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.65-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.5-8.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.49-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.1-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.2-1.81</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.7-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-30.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.41.rc1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-4.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.5-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.5-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.19.2.1-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:210-83.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.5.1-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.1-170.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.8-16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-30.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:62.1.0-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.2-30.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.21-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.22-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.8-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.113-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.9-20.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.2.2-13.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.2-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.25-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.7.3-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.29-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.5-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.3-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.4-12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.18.1-4.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.8.4-242.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.6-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.4-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.5-25.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.10-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.21-49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p4-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.8-16.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.20.1-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.8-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.5-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0019-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.38-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.9-20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.0-6.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-5.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-5.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-5.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-5.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.1_rc4-16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.11.2-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.0-8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.8-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-2.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.83.8-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.27.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2-10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.00-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.0-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.7-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20140630-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.1_12-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.1_12_k3.12.49_11-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.99.914-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.15.2-36.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.155-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.18-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">12.2</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.4.0esr-81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.12-8.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:13.2+git20140911.61c1681-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.42-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.14-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6+2.3.3-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.32.1-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.0-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.66.3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.9-21.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.32-30.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3-78.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3-78.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.26.1-9.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.5-8.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.2-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-10.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.26-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.25-12.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.5-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.0-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.8-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-12.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.58-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.16-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.3-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.97.3-15.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.71-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.26-6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:044-87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:103-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.3-16.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.12-5.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.4-7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.1-5.66</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3.26-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.0-12.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0~git.1463131968.4e66df7-11.69</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.3-7.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.34.0-16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.40.15-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-52.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.15-6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.18-4.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.48.2-10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22-49.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.0-27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.4-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.1-40.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.4-70.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.24-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.02~beta2-104.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.23-20.51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.31-7.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.14-4.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-7.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-7.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.111-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.101-14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.5-8.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.15-28.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.21-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.5-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.1-11.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.1-9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-12.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28-40.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28-40.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2-29.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.9-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.21.1-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.3-7.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.5-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-353.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-6.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.28-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.4-18.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.11-23.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12.5-1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.26-10.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4-14.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.27-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.52.16-1.83</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2j-55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.0-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.40.1-9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.50-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.22-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.8-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.113-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.43.0-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.4-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.13-16.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.13-16.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.9-24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.5.2-29.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.2-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.25-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.54.1-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.31-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.7-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.10.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.3-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:228-117.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.25-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.6-26.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.10-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-6.73</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.28.2-19.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.1-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.4-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.4-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.5-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12-15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p8-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2p2-55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.8-16.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.20.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.18.2-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.0-11.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.5-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.9-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.7-7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.0.0-2.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.1-6.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.1-27.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-27.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-27.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-27.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4-6.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.3-21.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.11.2-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.0-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.0-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.2.4-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-6.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0-85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.84.0-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.88+-96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.27.1-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.1-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.18.3-5.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.4-6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.18.4-14.216</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.2-5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.3-157.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14-10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.13-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.0_12-23.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.99.917.641_ge4ef6e9-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.0-8.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.18.3-57.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.22-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.206-37.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.23-6.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.57-16.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.1-5.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.5-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:13.2+git20140911.61c1681-1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.35-1.96</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.27.2-11.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.4-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2-1.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.15-4.221</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1-4.498</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.10-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.40-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-9.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.8-8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.4-4.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.5P1-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-27.886</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.22-5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.3+r212056-6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-3.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.13-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:103-5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.158-3.82</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3.26-5.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.19-2.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.3-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.3-2.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.36-54.75</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.5.2-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.38.2-5.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.4-22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.26.9-1.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.4-1.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.14.6-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-2.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-120.238</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.6-33.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.5-7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.3-1.77</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.3-2.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.5-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-12.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.08-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.36.3-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.4-3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.4-3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-2.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-2.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7-2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-4.84</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-8.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.0-13.131</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.17-1.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.7-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.2-8.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.2_k3.12.28_4-8.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.2_k3.12.28_4-8.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4-724.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.1-23.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.18-35.71</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.22-267.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.7-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.7-21.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.22.1-3.128</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.13-1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.00-1.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5-1.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.88+-94.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.55-2.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.9-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-264.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1-14.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6-45.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.108-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.35-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.16-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.40-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.8-11.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.3-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.5.6-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.26.10-4.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.0-11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.75-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.10-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr1.10-2.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.13-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.10-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.2-4.5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.2_k3.12.49_11-4.5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.26-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.9-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.8-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.13-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.00-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5-4.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.23-1.80</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.2-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.23-14.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.14-18.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.37-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.4-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3-3.110</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.2-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.5.6-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.32.4-14.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.0-15.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.50-28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr3.0-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-1.84</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.32-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.9-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.3-15.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.1-24.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.2-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.22.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.18-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.21-23.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0-7.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.36-11.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.2-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.15-4.181</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1-4.364</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.16-15.67</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0-147.67</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.5-3.72</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.12-181.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.13-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-1.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.22.2-5.287</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.4-1.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-3.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.326-2.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6-7.209</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-6.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:s20121221-2.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-120.113</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.18-1.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-4.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.7-3.53</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.14-3.59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.2-3.60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.1-3.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-3.57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8-3.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.4-3.57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-3.59</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.10-3.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-3.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.4-3.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-3.53</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.3-1.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-3.51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.21-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2d-3.75</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4-3.76</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-6.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11-2.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.19-17.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.2-14.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.8.4-13.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.5-27.79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.30.0-3.64</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.10-3.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.8-18.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-1.218</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.3-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-4.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.7-3.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2.umip.0.4-19.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.13.0-1.107</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4-724.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.4-4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-1.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.14-1.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.82-3.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.71-1.145</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:804.031-3.76</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.7-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.7-2.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11_git201205151338-8.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.1-1.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.15-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.43-5.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0-3.57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.206-36.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10-1020.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.0-167.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.4-1.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12.6-3.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.3-4.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.3-3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.5.2-2.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.3-261.135</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.28-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.28-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-25.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.12-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.10-4.124</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-2.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.7-1.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10-1.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.148.1-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-4.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.3-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.5c-2.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.3.0esr-48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.5-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.13-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.7-3.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.13-10.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.10-4.97</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.4-3.89</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.7-1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.20100204cvs-25.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.152.0-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.3-3.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0.b5-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.9-1075.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.15-19.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.2-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.35-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.03.0-6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5.2-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.3.2-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.38-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.39-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.32-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.43-52.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.1-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.44-52.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.36-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.44-52.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.48-52.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-4.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.10-4.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.2-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.4-4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.23-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.51-52.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.1-22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.8-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.26-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.60-52.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.60-52.54.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3.2-22.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.51-52.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.51-52.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.1-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.55-52.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.15-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.3-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.1-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4-20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:210-70.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.55-52.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.51-60.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.8-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.26-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.59-60.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.59-60.45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.51-60.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.62-60.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.1-36.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.02.3-6.6.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.1.6-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:210-114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.15-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.62-60.64.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.15-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.15-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.67-60.64.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.67-60.64.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.67-60.64.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.53-60.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.57-60.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:210-104.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.69-60.64.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.69-60.64.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.7-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:15.2.1-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.21-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.21-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:228-132.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.49-92.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.38-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.15-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.425-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.5-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.2-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.12-6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.12-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.411-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.71-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.418-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.3.0esr-15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.0-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.17.2-12.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.7-9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.7-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-66.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.424-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.19-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.3_06-22.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.3_06_k3.12.48_52.27-22.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.5.0esr-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-28.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.15.2-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.1-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.02~beta2-56.9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.559-117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.5.0esr-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.3-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.6-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.6-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.00-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.451-77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.75-11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-73.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.1_10-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.1_10_k3.12.36_38-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.5.3esr-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.13-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_02-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_02_k3.12.38_44-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.6.0esr-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.457-80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.15-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.16-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.79-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.58-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.0.1-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.15.2-17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.429-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.460-83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.4-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_04-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_04_k3.12.39_47-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.2-10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.1-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.7.0esr-34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.71-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.0-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.4.0esr-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.17.3-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_06-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_06_k3.12.39_47-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.466-86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.14-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.39-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.15.2-28.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.468-89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.481-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.491-96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.8-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.8.0esr-37.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.19.2_CKBI_1.98-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.8-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.20-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_08-22.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_08_k3.12.43_52.6-22.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.85-18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.5P1-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.9-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.4-5.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.508-99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.8.0esr-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_10-22.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_10_k3.12.44_52.10-22.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.1-4.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.6-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-27.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.438-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.440-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.2.1esr-45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.0-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.19.2.0-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.98.5-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.1-166.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-48.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-48.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-48.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-48.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.7.2.1-4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.442-67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.521-102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.9-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.1_rc4-13.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.48-52.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.4-8.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.535-105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.540-108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-48.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-48.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-48.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-48.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.10-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.98.6-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-22.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-70.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.3_02-22.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.3_02_k3.12.48_52.27-22.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.8-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.1-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.2-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.3-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.1-4.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.7-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.2-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.4-3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.2-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.3-4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.18-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20150827-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.1_08-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.1_08_k3.12.28_4-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.0-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.12-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.50-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.8-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:037-51.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.8-5.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.12-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.30.6-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-27.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.554-114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.0-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.1-22.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.24-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.12-18.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.5-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.6-14.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.2.0esr-75.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.0-28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.60-52.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-22.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.54.0-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.1-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.2-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.8-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1_3335ac1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.6-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.0-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.0-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.5-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.2-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20160511-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.6-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-48.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-48.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-48.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-48.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.0-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-28.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.5-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.30.6-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.95-24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-27.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.6.0esr-57.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.0-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.2-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.569-120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-22.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.11-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.6-14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.6-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.6-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.6.1esr-60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-27.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.577-123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.7.0esr-63.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.2-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-28.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.12-18.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.0-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.99-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.616-126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.0.2-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.1-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-18.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-16.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.16-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-27.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.101-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p6-46.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.12.4-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.8.0esr-66.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.9-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.621-130.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_02-22.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_02_k3.12.55_52.42-22.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.11-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.22-20.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0-82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-48.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-48.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-48.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-48.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.4-8.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p8-46.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.626-133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.25-20.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2007e_suse-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.5-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.19.2.2-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.02~beta2-73.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.51-60.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.24-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.5-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.2_02-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.2_02_k3.12.49_11-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.59-60.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.59-60.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.632-137.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.10-7.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.18.4-11.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.3_08-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.3_08_k3.12.59_60.45-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.3.0esr-78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.1-36.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.0-9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25.35.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.0-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.26-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.635-140.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.3_10-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.3_10_k3.12.62_60.62-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.6-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.1-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009033815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009033355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.10-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.637-143.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.24-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.15-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.22-22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.5.1-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1-26.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.5-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.643-146.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.37.0-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.72-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.14-181.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.644-149.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.15-17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.2-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2-82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2-82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.111-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.27.1-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.28-17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.326-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.121-36.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2007e_suse-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.39-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-24.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-24.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-24.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-24.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.5.0esr-88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.21.3-50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.5.1esr-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.3.git20161120-160.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2d-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_02-22.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_02_k3.12.67_60.64.18-22.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.0.0.186-152.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.39-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.22-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p9-55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_04-22.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_04_k3.12.67_60.64.24-22.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.6.0esr-96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.71-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-28.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.7-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-7.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.2_06-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.2_06_k3.12.53_60.30-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.18.2-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.77-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.41.3-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p6-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.22-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.91-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p7-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.1-6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.5-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.25-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.31-13.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.36-11.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.23-19.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.23-19.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.121-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.15-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.5-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.29-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.7.0esr-99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.7-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-54.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.11-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.7-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.131-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.0.0.221-158.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.14-184.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.8.1-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_06-22.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.5_06_k3.12.69_60.64.32-22.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.8-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-54.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:037-91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.22-24.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.0-10.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.1.0-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:25.0.0.127-162.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.8.0esr-102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.24-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.7-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.0.0.194-155.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-2.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.10-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.5-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28-42.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28-42.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.1_02-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.1_04-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.3-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.3-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.3-9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.31-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.36-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.23-22.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2p2-66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2p2-66.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.22-24.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.23-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.4-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.8-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.7-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2j-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28-44.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28-44.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.1_06-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-16.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-41.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-41.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-41.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-41.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.0-14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.1.0-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-18.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1+git.1456406635.49e230d-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.13-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.35-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.15-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6-17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4-11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.18-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.7-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.3-49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.5-8.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-20160727</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-20160727</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.4+gitr565_0366d7e-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.3-81.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.31.0-11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.52.0-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.1+gitr2816_02f8fa7-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-20160308170633</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-20160304104123</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-20160307082632</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.3-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.3-66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.5+gitr569_2a5e70c-15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.6-87.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.1+gitr2819_50a19c6-15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.2-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.37-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.4-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.7-22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.3-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.15-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.37-18.13.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.41-18.13.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.30-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.35-43.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.20-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.25-34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.26-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.41-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.60-52.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.60-52.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.60-52.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.4-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.61-52.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.0-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.1-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-42.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-86.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-59.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-64.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-89.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.9.5-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.14-96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.7-28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.34-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.13-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.36-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.3-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.021-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.21-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.23-16.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.58-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.61-60.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.67-60.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.69-60.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.26-20.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.10-14.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25.16.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-27.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.14-10.14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.27-20.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-28.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.14-19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:210-70.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_04-22.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_04_k3.12.60_52.54-22.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-28.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-48.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-48.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-48.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-48.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.28-20.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-48.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-48.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-48.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-48.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.60-31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_05-22.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_05_k3.12.60_52.57-22.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p9-46.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_05-22.28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_05_k3.12.60_52.63-22.28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.98.9-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.4-8.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.29-20.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-24.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-24.10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_14-22.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_14_k3.12.61_52.66-22.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-28.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-48.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-48.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-48.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-48.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.1-34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-28.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr2.0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.19-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.151.0-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.38-44.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.39-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.39-47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.32-33.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.10-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.43-52.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.0-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.44-52.10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.5.6-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.36-38.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.36-38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.44-52.18.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.10-14.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr2.10-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.5.6-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.20-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.51-52.31.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.60-52.49.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.60-52.54.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.51-52.34.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.51-52.39.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.30-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.11-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10-18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.55-52.42.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.22.1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.22.1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.2-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.40-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.55-52.45.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr2.0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.59-60.41.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.59-60.45.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.59-60.45.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.16-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6+git20160531.fbfe336-5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.51-60.25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.62-60.62.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.62-60.64.8.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.62-60.64.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.22.1-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr3.10-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.67-60.64.18.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.67-60.64.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr3.21-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.67-60.64.24.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr2.10-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.53-60.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.57-60.35.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0_sr4.0-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.69-60.64.29.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.69-60.64.32.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.21-84.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.21-90.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.49-92.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.38-93.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.2-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.3-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.2-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.1-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.55-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.9-14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.22-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.40-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.0-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.2-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-18.27.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.68-7.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.18-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.14-20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.9-24.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.32-8.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.18-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.32-10.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0_k3.12.53_60.30-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.32-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.14-22.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.20.0-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4.dev18-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4~a0~dev78-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4~a0~dev61-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4~a0~dev103-10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4~a0~dev80-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.54-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.71-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.49-11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.1-154.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">11.2</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0-0.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1_git20090811-3.20.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1-5.22.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-83.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.14-2.23.126</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.12-23.58.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.12-23.58.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-14.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-14.39.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11-6.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-91.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-18.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-1.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.26-1.30.110</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4-40.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.8-0.19.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.23-11.19.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR5P1-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.36.0-11.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-34.253.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1-0.4.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.97.3-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0-22.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1-194.199.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.11-60.65.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.76-34.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.3.P2-0.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3-44.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.22-3.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.41.9-2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:61-1.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2-1001.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:22.3-4.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.4-152.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.26.33.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3.8.90-13.20.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.24-43.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.0-38.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.2-269.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1-7.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1-7.7.19.77</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.2-61.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.26-1.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.36-26.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.62-32.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22.5-0.2.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.23-1.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.8-1.2.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.3-0.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.35-5.15.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.30-5.8.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.21.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2-8.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.12-69.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.11.10-0.6.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.3-1.1.93</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.10-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr9.3-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14.1-16.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.8.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.10-20.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.10-23.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.13-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.48.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.1-0.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.17-77.14.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-12.18.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.18.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-73.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.4-12.22.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.4-12.22.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-11.18.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.5-5.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11-2.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.34-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.27-0.6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.17-2.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.17.1-31.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.13.1-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-0.5.76</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-307.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.0-1.2.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0-7.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0-7.24.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.6-2.131.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.5-5.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.94-0.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.29.6-6.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.26.44-101.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.52.10-1.35.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.6-5.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.23-0.7.128</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.0-8.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.18-1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.1-1.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.26.0-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.4-1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.32.2-4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.142.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.6-0.13.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.3-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11-1.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.15-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-1.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-1.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.7-10.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.3.6-65.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.02.84-3.25.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.14-9.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.2-17.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2.umip.0.4-8.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-0.7.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.24-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.24-0.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.6-1.25.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.13-1.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4p8-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2-0.22.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2_3.0.13_0.27-0.22.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16-1.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4-662.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.10.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-47.10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:184-147.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.47-13.13.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.26.2-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.8-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.102-1.37.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.56-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:804.028-50.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.816-2.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1-10.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.3.14-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.12-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.22-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.11-0.9.96</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.4-194.23.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.8b-88.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1-1.24.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.8.7-0.5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.12-8.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-13.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5final-28.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.71.47-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-27.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.5-7.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-9.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5-0.7.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.1-100.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.26-1.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.48-101.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.10-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.18-20.35.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.80.2-2.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.00-11.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.22.5-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.2-132.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.10-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-36.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.2_14-0.5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.2_14_3.0.13_0.27-0.5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-9.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.60.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:238-1.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17.119-0.5.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17.44-0.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10-911.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">11.3</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.3-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.4esr-0.10.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1_git20090811-3.28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.14-2.28.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.12-23.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-14.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11-6.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-91.25.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-20.9.53</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-16.9.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-1.38.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-0.13.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-0.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.23-11.30.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR7P4-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.36.0-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.97.7-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.24.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.24.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1-194.207.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.26.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.12-144.23.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.16.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3-44.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.41.9-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:61-1.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.29.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.24-43.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1-7.16.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.7-0.9.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.62-32.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22.5-0.8.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.3-0.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.20.4-0.14.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.12-69.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5-0.7.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.7-0.7.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.1-253.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr13.1-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr4.1-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6b-879.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2.0-879.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.12.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.76-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.1-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-12.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.25.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.25.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-11.18.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.37.1-5.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.41-0.8.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.1.9-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.17-2.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.14.3-0.11.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.0-1.9.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0-7.26.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.31-0.7.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.52.10-1.35.113</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.0-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.1-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.1-2.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.8-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.32.2-4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.4-0.12.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.152.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.10-0.9.50</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-0.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5.1-0.7.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-79.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.7-10.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.02.98-0.25.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.14-9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.27-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.6-1.25.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.16-0.11.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.3-18.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4p8-1.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1-0.11.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.76_0.11-0.11.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.2-0.9.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.38.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-47.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.47-13.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.67.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2808.01-0.67.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.72-0.67.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.3.23-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.18-0.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.22-3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.0-3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.47.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.1-0.7.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.9.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.11-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.0-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.12.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.12-8.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5final-28.23.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.54-0.9.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.17.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.71.61-0.11.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-27.34.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.5-7.45.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-9.23.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.1-100.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5-19.23.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.48-101.31.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.10-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.18-20.35.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-0.9.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-0.7.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.6-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.12-517.12.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.2_04-0.7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.2_04_3.0.76_0.11-0.7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-9.62.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.81.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-1.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.3.99-17.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.3.99-3.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17.129-0.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17.45-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">11.4</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.3-0.28.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.7.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.14-2.30.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.12-23.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-14.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.13-1326.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11-6.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-20.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-16.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-1.51.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.40-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-0.4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4-40.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-0.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-0.2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.0-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.1-4.131.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.23-11.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2-147.27.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2-147.27.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24-3.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.36.0-12.6.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.49.0-0.13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1-0.14.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.98.7-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.12-6.25.32.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9-75.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1-194.211.213.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2-1.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.71-0.14.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.41.9-2.14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.152-4.9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:22.3-4.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.95-1.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.24-43.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1-7.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.35.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.7-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22.5-0.8.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.3-0.39.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.6-25.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.30-5.12.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.20.12-0.18.70</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.11.10-0.6.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.7-0.15.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.3-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-1.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14.1-16.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.12.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.11.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.4-255.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-30.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.17-77.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-12.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-68.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.34.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.4-12.22.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-11.18.19.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19.1-6.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.41.rc1-2.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.52-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.4-0.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.5-24.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.17.3-0.8.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.3+r212056-2.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.0-1.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.1-134.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.03-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.2-3.118.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.2-3.118.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.20060920alpha-74.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.43-0.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.6.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.4-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.23-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.1-1.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.6.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.9-4.2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.4-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5-1.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.10-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-3.76</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.3-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-1.38.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11-1.25.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.15-0.17.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.24-19.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.7-10.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.3.6-65.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.02.98-0.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.0-0.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.5-1.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.7-0.3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.6-1.25.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12-24.4.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.16-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.3-18.38.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p2-2.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1-20.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_63-20.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2-0.11.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-4.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.15.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2808.01-0.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.72-0.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7-37.63.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.63.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.22-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-1.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.5.git-2.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.22-240.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.26-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.22-3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.6-168.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.6-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7-6.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.14.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1-1.24.8.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.1-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.9.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.11-0.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.14.3-50.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.318.81ee561d-0.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.12.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.12-8.16.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5final-28.23.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.71.61-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.5-7.50.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.26-1.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.9.8-1.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.41-0.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.00-11.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.1-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-10.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.7-4.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.13-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1-6.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-217.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_08-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_08_3.0.101_63-1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.14-130.133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-9.65.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.11.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-1.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-1.16.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-1.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-1.18.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-1.19.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-1.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.3.99-3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17.140-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17.46-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.0-29.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2-31.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24-3.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2.18-4.31.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2011.10.10-0.7.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:15.6-95.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.114.6-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.3.1.4-1.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.13.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.2-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-20.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.6-0.25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.22.0-294.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-3.34.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.12.4-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.7-1.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.14-401.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-2.18.53</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.46-62.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.2-1.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.1b-130.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.11a-116.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.10-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3.3.26-0.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3.3.26-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.5.5-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.5-2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2-5.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.9-9.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.3-126.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-0.1.141</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.7-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.8.4-206.27.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.14-4.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.15-23.3.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.17-481.19.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.17-481.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.3-0.10.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20-2.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.6-143.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.6-5.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.3-249.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1-2.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.6-2.7.90</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.139.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.3-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.10-120.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.1-28.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.56.2-1.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6c11-5.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.1-0.5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.5.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.7.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.0-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-0.4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.5-0.5.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.2-0.12.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.9.1-0.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.1-0.7.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.05-1.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.7-7.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.9-162.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.17-1.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.10-2.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2007-219.34.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.1-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.11.2-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-1.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.8-0.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-0.2.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.4P2-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.33.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.20.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.11.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.6-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.2-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.13.6-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.3-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.14-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.14.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.8-56.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.8-56.44.45.129</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.5-0.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.14.2-0.4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.6-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.14.3-0.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1-7.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.12.4-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.45.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4-0.7.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.46-62.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.2-170.21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2012.9.13-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.18-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr15.0-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr6.0-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.24.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.20.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.16.0-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.4.13-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.32.2-4.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.6-0.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.6-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.7-0.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20-2.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.15.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.6-1.25.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.15.3-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.15.3.1-0.4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.61.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7-37.50.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.50.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.8-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.4-0.7.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.10-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.6-0.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.9.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.17-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.17-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.2-1.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.17-0.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.14-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.14-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.0-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1-0.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.17-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.17-1.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.12-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.4_02-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.6-0.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.2_20-0.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3_02-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3_04-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.5_02-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_02-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_04-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.70.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-1.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-1.22.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.6.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.6-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.1-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.0.3-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.9esr-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.8.0esr-0.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.5.0esr-28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.5.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.6.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.8.0esr-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.8-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.19.2_CKBI_1.98-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-1.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-0.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.0-3.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2-147.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.23.1-0.23.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.23.1-0.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.52.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.41.9-2.10.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19.1-6.62.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.6-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.7esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.10esr-0.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.3.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.15.4-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.4.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.7.0esr-0.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.8.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.7-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.4-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.3.0esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.4.0esr-0.8.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.5.3esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.9-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.3.0esr-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.4.0esr-25.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.10-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.19.2.1-19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.2.0esr-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.15.3.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.2.0esr-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.17.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.2.1esr-19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.19.2.0-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.12.4-0.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.72.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.87.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.95.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.20.4-0.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.7-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0-7.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.7-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.15-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr8.0-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.10-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.20-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.12.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.71.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-0.19.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19.1-6.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.1.12-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.5-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.20060920alpha-74.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.39-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.6.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.23-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3.3.26-0.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3.3.26-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.26.0-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.20-2.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5-1.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.1-156.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.8.4-206.29.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.0-0.21.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.0-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.6.0esr-31.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.2-25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.8-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.19.2.2-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.15.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.45-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.46-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.47-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.15.3-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.62.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.152.0-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7-37.60.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.60.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.5-0.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.1.15-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.1.18-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.1.19-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-8.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-8.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-8.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.9-0.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-8.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6c8-10.19.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6c11-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.17-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.9.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.17-0.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.0-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.6-0.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.5-0.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0u-0.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.9-162.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.17-1.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.160.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.11-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.7-0.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.9-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_06-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_02-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_12-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_14-18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.2_06-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.3_02-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.3_08-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4_02-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4_04-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_04-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_08-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_18-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.8-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.1-159.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.6.1esr-34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.8.0esr-40.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.2-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.2.0esr-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.21.1-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.3.0esr-50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.4.0esr-53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.6.0esr-62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.7.0esr-65.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.8.0esr-68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.7.0esr-37.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.2-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_12-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2-31.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2-147.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2-147.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.5-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-318.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.12-56.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.114.6-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.11-60.65.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.1-88.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.0-10.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.41.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.5-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.1+r233831-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-52.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.62-32.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.62-32.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-3.34.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.12.4-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.35-5.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.5-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0-7.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0-43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-2.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.14-134.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.10-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.20-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.30-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.40-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.60-19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr4.1-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1_sr3.50-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-80.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-88.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-94.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-65.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-68.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-77.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-84.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.3-1.9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-1.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.0-10.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009033629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.03.beta1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.8-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.4.2-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1-2.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.1-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20150827-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2-5.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.9-4.2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-12.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20-2.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-91.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.6-145.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.2-0.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.5.1esr-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.21.3-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.7-0.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.49-0.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.8.10.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.52-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.53-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.54-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5-1.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.02.1-3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.102.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.5-0.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.008-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.008-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.710.08-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-79.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.6-0.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.3-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.6-0.14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.9-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.5.git-2.31.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.9-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-8.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.15-0.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.12-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.4-0.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.20-7.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.4-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.4-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.6.3-1.4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.17-1.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.163.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.168.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.11-0.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.13-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_10-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.3_02-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_02-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_07-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_08-40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_10-43.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_12-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_14-51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.3_06-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-5.11.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-1.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17.161-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.7-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.26-0.62.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.4-1.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.9esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.5.5-0.5.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.6-0.4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.2-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-174.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.97.8-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.12-6.25.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.7-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-0.6.7.80</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.9-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-0.6.7.85</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.10-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.11-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.12-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.4esr-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-0.6.9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5-1.47.51.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.5esr-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-0.6.9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.6esr-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.7esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-0.6.9.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.10esr-0.4.2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-0.6.9.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.336-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.1-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.0_b27.1.12.7-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_04_3.0.101_0.7.17-0.5.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.1-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2013.1.7-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.95-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.33.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.18-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16-50.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.5-1.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.7-5.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.4_02_3.0.58_0.6.6-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.0-3.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.10-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.2_20_3.0.38_0.5-0.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.12-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3_02_3.0.38_0.5-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3_04_3.0.42_0.7-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.5_02_3.0.74_0.6.10-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_02_3.0.93_0.5-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_04_3.0.101_0.5-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.3.99-3.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.1-28.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.166-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24-0.7.48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24-0.7.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2-147.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2-2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2-2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.98.1-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.13_3.0.101_0.31-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3-45.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.71-0.12.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:61-1.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-0.12.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24-0.7.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24-0.7.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38-15.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24-0.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.0-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.0-0.12.51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.418-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.481-0.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.491-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.508-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.521-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.535-0.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.540-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.548-0.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.554-0.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.559-0.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.2-269.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.00-0.49.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.22-7.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.71-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.85-0.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.91-0.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.95-0.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5-0.11.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4_04_3.0.101_0.40-0.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.22.34.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.21.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.1-134.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.1-16.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.34.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.37.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.5-1.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38-18.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.17-42.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.0-0.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.0-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4p8-1.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.24.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.97-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-143.40.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.28.3-0.5.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2808.01-0.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.72-0.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.18-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7-6.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.6+git20080930-6.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.11-0.25.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-1.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-174.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1-6.17.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_06_3.0.101_0.47.52-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_02_3.0.101_0.40-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_12_3.0.101_0.47.55-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_14_3.0.101_0.47.67-18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.2_06_3.0.82_0.7-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.3_02_3.0.93_0.8-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.3_08_3.0.101_0.8-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4_02_3.0.101_0.15-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4_04_3.0.101_0.40-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_04_3.0.101_0.47.52-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_08_3.0.101_0.47.55-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_18_3.0.101_0.47.71-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.07-6.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_12_3.0.101_63-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3.8.90-13.20.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.569-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.577-0.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.00-0.54.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.3-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.99-0.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p4-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-16.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.0-1.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_10_3.0.101_63-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.3_02_3.0.101_65-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_02_3.0.101_68-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.3_06_3.0.101_65-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.1-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_0.47.55-2.28.1.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_0.40-2.27.98</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_0.47.55-0.17.1.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_0.40-0.16.104</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_0.47.55-0.21.1.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_0.40-0.20.98</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_0.40-0.22.64</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0+git.1430140184.8e872c5-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.12-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.0-23.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.0-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.5-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.14-0.4.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.30-75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.35-78.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.50-55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.60-58.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr10.1-61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p9-48.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.33.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2p2-0.40.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.86-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.90-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_21_3.0.101_0.47.96-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.19_2.6.33.5_rt23_0.4-0.7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">11.1</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0.0_2.6.33.20_rt31_0.5-0.2.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_2.6.33.20_rt31_0.5-2.5.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.3.11_2.6.33.20_rt31_0.5-0.3.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.19_2.6.33.20_rt31_0.5-0.9.11.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.33.20-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_2.6.33.20_rt31_0.5-0.4.2.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2_2.6.33.20_rt31_0.5-0.9.13.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2_2.6.33.18_rt31_0.3-0.9.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_rt130_0.7.9-2.18.79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.2_3.0.101_rt130_0.7.9-0.6.6.70</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_rt130_0.7.9-0.25.25.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4_3.0.101_rt130_0.7.9-0.9.9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_rt130_0.7.9-0.11.78</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2_3.0.101_rt130_0.7.9-0.28.28.50</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_rt130_0.28-2.27.99</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_rt130_0.28-0.22.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_rt130_0.28-0.38.84</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1_3.0.101_rt130_0.28-0.11.75</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_rt130_0.28-0.20.99</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_rt130_0.28-0.13.90</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.33.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.33.44.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.33.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.13-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.98.9-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4.15-0.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.9.33-0.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.10-0.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.7-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.74-0.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.74-0.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.2-0.38.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_0.7.17-2.18.81</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_0.7.17-0.7.109</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_0.7.17-0.11.80</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">11</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.10-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5-1.1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.0-7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.3.1-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.11-2.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8-1.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.10-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.11-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.12-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.14.16-2.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0.r4359-15.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0.r1053-11.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.7-151.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.47-30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.10-2.23.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.6-50.18.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.23-11.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.5.0P2-20.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.1-1.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.7-11.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-11.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.95.1-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.3_20081022-11.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9-75.27.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1-194.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.0-11.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2-107.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10-3.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.11-60.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.22-182.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.76-34.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.1-7.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.45-12.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-1.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.1.1-11.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.24.1.1-3.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.1.1-11.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3.8.90-13.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:IIIalpha9.8-691.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15-1.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-130.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.0-7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.21-3.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-87.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.15-3.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.2-61.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.0-24.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.62-32.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.18.2-7.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9-13.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.23-1.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.0-14.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.1-6.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6-8.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-1.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.21-2.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.10-4.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0-7.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1-10.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.15-94.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.15_2.6.27.48_0.6-94.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0.13.1.2-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-124.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-124.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3-9.14.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3-9.28.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3-7.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3-18.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3-7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.10-23.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3-8.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3-8.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.5-106.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.27.23_0.1-7.1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.15_2.6.27.54_0.2-94.14.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.27.23-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.5_2.6.27.54_0.2-7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:78.0.10.6-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:78.2.6.30.1_2.6.27.37_0.1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.17-77.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.23-4.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.4-12.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-11.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-157.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.8-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-1.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.3-106.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-11.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.12-7.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.67-13.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.28.3-2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.6-5.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.1-1.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.1-1.30.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.0-8.8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.0-8.9.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.3-12.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.17-172.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.beta2-6.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:128-13.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.6-14.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-10.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.02.39-18.26.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.2-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.9-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.15-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.6-1.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4p6-1.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.870-26.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-172.10.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16-1.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.22.1-3.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.102-1.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.10.0-64.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.16-3.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7-37.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2.3-37.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.3.7-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.5-5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.4-194.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.10-17.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.14.3-50.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.7.p72-5.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8-1.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.9p17-21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1-42.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.20-23.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.0-1.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.2-128.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1.2-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-1.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5-15.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.6-14.60.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.2-8.47.85</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.3-66.42.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.3-3.57.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.27-0.1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1_18546_24-0.3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1_18546_24_2.6.27.45_0.3-0.3.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.1-238.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.02-138.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17.21-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.6.0esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24-0.4.10.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">1</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.7-5.12.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.8esr-0.4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.5.0esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24-0.4.10.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-1.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2-147.14.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2-147.14.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR7P4-0.2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-11.28.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.98.6-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.20.27.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.12-0.4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-0.6.7.103</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-0.6.9.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.10esr-0.4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-0.6.9.60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.3.0esr-0.4.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24-0.4.10.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.2_20130108-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.15.4-0.4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.2-0.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.7.0esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.8.0esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.3.0esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.4.0esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.17.3-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.5.3esr-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.2.1esr-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.2.0esr-0.11.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.0-0.5.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.17.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.37.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.0-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.59_0.13-0.3.163</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.59_0.13-7.9.130</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.59_0.13-0.18.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.59-0.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_16_2.6.32.59_0.15-0.5.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.5-1.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.5-1.30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.5-0.4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.1-6.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.8.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.2.0esr-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.0-0.5.7.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.2_20130108-0.37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.19.2.0-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4p8-1.29.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.96-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.9.15.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.2.12.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.59_0.19-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.59_0.19-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_10-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_10_2.6.32.59_0.7-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_16-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_16_2.6.32.59_0.9-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.59_0.19-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.59_0.19-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.40.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.42.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-1.18.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-1.22.5.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">2</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.8.0esr-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.3.0esr-48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.0-20.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.0-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.21.1-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12-25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.4.0esr-52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.6.0esr-66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.29-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-0.4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-12.33.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.11.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.3.0esr-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.4.0esr-25.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38-12.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.19.2.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.7.0esr-36.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.2-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.45.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-1.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.20-49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.25-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr7.0-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.30-45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.40-52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.1-0.32.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-12.24.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.44.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.5.1esr-63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.21.3-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.6.1esr-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38-15.58</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.2-17.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12-24.4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p6-41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.17.14.1-1.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p7-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p8-47.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.69.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16-1.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-48.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.36-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.18-20.35.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.23-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.37-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.37-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.40-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.44-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_06-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_06_3.0.101_0.7.17-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.29-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.29-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.37-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">3</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-12.52.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38-10.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.0-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.0-0.7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.3-1.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.2-88.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.20-51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.30-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_0.40-0.38.83</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_0.40-0.13.89</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.5_3.0.101_0.40-7.39.89</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.97.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.68.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.37-2.62.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.16-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.1-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-76.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-12.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.12.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-12.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.7-4.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_20-24.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_20_3.0.101_0.47.79-24.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.svn1043876-1.3.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.69.8-11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.12-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.71-0.16.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.26-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.30-5.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14.0.894-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-12.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.5-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.40.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.50.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.64.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p9-57.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.1.0-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-35.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2808.01-0.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.72-0.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.79-4.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.4-2.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-67.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.STABLE5-2.12.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.23-8.16.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.23-8.16.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-13.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.6p2-0.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.20-121.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.26-1.2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.9.8-1.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.45-0.53.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.41-0.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.45-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.00-11.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2-8.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.3.git20161120-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_07_3.0.101_77-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_08_3.0.101_80-40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_10_3.0.101_88-43.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_12_3.0.101_91-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_14_3.0.101_94-51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.67-13.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr7.0-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.1-1.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.22.1-3.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.8-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.18-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.8-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-1.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.0-8.8.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.0-8.9.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.22.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.18.2-7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.2-61.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.6-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.13-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.6-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.9-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.4-1.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.6-3.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.19-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.9-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.3-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.16-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.3.9-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.62-32.27.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.7-32.27.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.1-24.39.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr8.0-0.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.96-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.31-5.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.7-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.7-1.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.7-11.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-11.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.3.11-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.0.r4359-15.20.10.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.8-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.96.1-0.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.7-11.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-11.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0.0_2.6.33.7.2_rt30_0.3-0.2.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.19_2.6.33.7.2_rt30_0.3-0.7.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.33.7.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_2.6.33.7.2_rt30_0.3-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.27.54_0.2-7.1.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.27.54-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.22.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.10-17.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-25.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.12-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.11-0.1.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8h-30.22.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0.0_2.6.33.20_rt31_0.3-0.2.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_2.6.33.20_rt31_0.3-2.5.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.3.11_2.6.33.20_rt31_0.3-0.3.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.19_2.6.33.20_rt31_0.3-0.9.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.33.20-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_2.6.33.20_rt31_0.3-0.4.2.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2_2.6.33.20_rt31_0.3-0.9.13.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.74_rt98_0.6.2-2.18.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.2_3.0.74_rt98_0.6.2-0.6.6.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.74_rt98_0.6.2-0.23.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.74.rt98-0.6.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4_3.0.74_rt98_0.6.2-0.7.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.74_rt98_0.6.2-0.11.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2_3.0.74_rt98_0.6.2-0.28.28.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0.0_2.6.33.18_rt31_0.3-0.2.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_2.6.33.18_rt31_0.3-2.5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.3.11_2.6.33.18_rt31_0.3-0.3.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.19_2.6.33.18_rt31_0.3-0.7.48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.33.18-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_2.6.33.18_rt31_0.3-0.4.2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.9-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.59-0.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.59_0.19-0.9.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.10-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.26-0.7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.26_0.7-2.10.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.26_0.7-0.7.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.26_0.7-0.7.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.59_0.9-0.3.151</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.59_0.9-7.9.118</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0_2.6.32.59_0.9-0.18.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.59-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.8-0.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.11-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.8-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20-2.46.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.10-0.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-1.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.0_b24.1.11.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr2.0-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr11.0-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.58-0.6.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3_06_3.0.58_0.6.2-0.7.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.58_0.6.2-2.18.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.58_0.6.2-0.7.53</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.58_0.6.2-0.11.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.8-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.5.3-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.6-0.4.2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.0_b24.1.11.5-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.51-0.7.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.51_0.7.9-2.18.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.51_0.7.9-0.7.47</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.51_0.7.9-0.11.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR7P1-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.13-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.34-0.7.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.34_0.7-2.10.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.34_0.7-0.7.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.34_0.7-0.7.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.31-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.31_0.9-2.10.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.31_0.9-0.7.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.31_0.9-0.7.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.74-0.6.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.4_02_3.0.74_0.6.6-0.5.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.74_0.6.6-2.18.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.74_0.6.6-0.7.69</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.74_0.6.6-0.11.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.8-0.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4_02_3.0.101_0.35-0.7.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_0.35-2.27.78</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_0.35-0.16.84</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_0.35-0.20.78</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.61_rt85_0.7-2.18.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.2_3.0.61_rt85_0.7-0.6.6.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.61_rt85_0.7-0.23.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.61.rt85-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4_3.0.61_rt85_0.7-0.7.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.61_rt85_0.7-0.11.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2_3.0.61_rt85_0.7-0.26.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_rt130_0.24-2.27.79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_rt130_0.24-0.22.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_rt130_0.24-0.38.64</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1_3.0.101_rt130_0.24-0.11.57</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_rt130_0.24-0.20.79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_rt130_0.24-0.13.70</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.8-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.42-0.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.42_0.7-2.18.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.42_0.7-0.7.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.42_0.7-0.11.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.38-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.38_0.5-2.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.38_0.5-0.7.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.38_0.5-0.7.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.14-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.1-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4.P1-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR7P2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4.P2-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.15-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR7P3-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR7P3-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_02_3.0.101_0.46-0.7.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_0.42-2.27.115</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_0.42-0.16.121</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_0.42-0.20.115</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_rt130_0.32-2.27.121</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_rt130_0.32-0.22.87</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_rt130_0.32-0.38.106</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1_3.0.101_rt130_0.32-0.11.96</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_rt130_0.32-0.20.121</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_rt130_0.32-0.13.112</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.29-0.5.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_06_3.0.101_0.7.23-0.5.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.56.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-141.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.3-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.6-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR7P4-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.243-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.251-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3_06-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3_06_3.0.51_0.7.9-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.42-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.258-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-25.33.33.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.52.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-11.28.52.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-12.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.59-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.80.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.45.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.80-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.5_02_3.0.80_0.5-0.5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.82-0.7.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.2_04_3.0.82_0.7-0.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.80_0.5-2.18.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.80_0.5-0.7.76</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.80_0.5-0.11.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.82_0.7-2.25.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.82_0.7-0.16.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.82_0.7-0.18.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.80_rt108_0.5-2.18.47</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.2_3.0.80_rt108_0.5-0.6.6.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.80_rt108_0.5-0.23.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.80.rt108-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4_3.0.80_rt108_0.5-0.7.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.80_rt108_0.5-0.11.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2_3.0.80_rt108_0.5-0.28.28.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.6-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.42.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-12.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.1.8-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.0_b27.1.12.5-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr13.2-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr4.2-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.273-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.261-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.262-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.270-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.5.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.6-0.4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.275-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.3esr-0.4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.0_b27.1.12.4-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.58-0.6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.3_06_3.0.58_0.6.6-0.7.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.58_0.6.6-2.18.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.58_0.6.6-0.7.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.58_0.6.6-0.11.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.93-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.5_02_3.0.93_0.5-0.5.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.93-0.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.2_06_3.0.93_0.8-0.7.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.93_0.5-2.18.61</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.93_0.5-0.7.91</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.93_0.5-0.11.60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.93_0.8-2.27.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.93_0.8-0.16.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.93_0.8-0.20.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.93_rt117_0.5-2.18.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.2_3.0.93_rt117_0.5-0.6.6.53</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.93_rt117_0.5-0.25.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.93.rt117-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4_3.0.93_rt117_0.5-0.7.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.93_rt117_0.5-0.11.61</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2_3.0.93_rt117_0.5-0.28.28.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.93_rt117_0.9-2.27.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.3_3.0.93_rt117_0.9-0.19.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.93_rt117_0.9-0.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.93.rt117-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1_3.0.93_rt117_0.9-0.11.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.93_rt117_0.9-0.20.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.93_rt117_0.9-0.13.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.280-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.17-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0.0_b27.1.12.6-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.6-0.19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr14.0-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr5.0-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.4-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.7.30.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.8-0.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.17-1.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-1.40.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.70.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.20.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.17-1.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-8.26.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16-1.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.74-0.6.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.4_02_3.0.74_0.6.8-0.5.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.74_0.6.8-2.18.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.74_0.6.8-0.7.70</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.74_0.6.8-0.11.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.74_rt98_0.6.4-2.18.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.2_3.0.74_rt98_0.6.4-0.6.6.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.74_rt98_0.6.4-0.23.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.74.rt98-0.6.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4_3.0.74_rt98_0.6.4-0.7.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.74_rt98_0.6.4-0.11.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2_3.0.74_rt98_0.6.4-0.28.28.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.3_08_3.0.101_0.15-0.7.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_0.15-2.27.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_0.15-0.16.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_0.15-0.20.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_rt130_0.10-2.27.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_rt130_0.10-0.22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_rt130_0.10-0.38.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1_3.0.101_rt130_0.10-0.11.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_rt130_0.10-0.20.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_rt130_0.10-0.13.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.20.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_02_3.0.101_0.5-0.5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.3_02_3.0.101_0.8-0.7.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_0.5-2.18.69</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_0.5-0.7.98</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_0.5-0.11.68</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_0.8-2.27.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_0.8-0.16.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_0.8-0.20.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_rt130_0.5-2.18.71</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.2_3.0.101_rt130_0.5-0.6.6.62</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_rt130_0.5-0.25.25.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4_3.0.101_rt130_0.5-0.9.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_rt130_0.5-0.11.70</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2_3.0.101_rt130_0.5-0.28.28.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_rt130_0.8-2.27.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_rt130_0.8-0.18.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_rt130_0.8-0.38.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1_3.0.101_rt130_0.8-0.11.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_rt130_0.8-0.20.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_rt130_0.8-0.13.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.8-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.5.5-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4.6-0.4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.285-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.74-0.6.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.4_02_3.0.74_0.6.10-0.5.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.74_0.6.10-2.18.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.74_0.6.10-0.7.73</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.74_0.6.10-0.11.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.74_rt98_0.6.6-2.18.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.2_3.0.74_rt98_0.6.6-0.6.6.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.74_rt98_0.6.6-0.23.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.74.rt98-0.6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4_3.0.74_rt98_0.6.6-0.7.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.74_rt98_0.6.6-0.11.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2_3.0.74_rt98_0.6.6-0.28.28.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.17.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.291-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.297-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.310-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.59_0.15-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.18-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.6-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.7.p357-0.9.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.33.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-12.33.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-12.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.17-1.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5.6-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.37-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.6.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_04_3.0.101_0.7.15-0.5.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_0.7.15-2.18.79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_0.7.15-0.7.107</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_0.7.15-0.11.78</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.70.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.83.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4_02_3.0.101_0.21-0.7.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_0.21-2.27.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_0.21-0.16.60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_0.21-0.20.54</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_rt130_0.14-2.27.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_rt130_0.14-0.22.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_rt130_0.14-0.38.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1_3.0.101_rt130_0.14-0.11.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_rt130_0.14-0.20.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_rt130_0.14-0.13.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-12.33.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.33.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.54.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-12.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.20.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.18-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.3P2-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.9-0.2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.327-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.332-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.6-0.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr15.1-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr6.1-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr9.0-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.11-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5.8-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5.9-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.98.5-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-0.35.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.6-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.12-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.82.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.45.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.19.7-1.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.17-1.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.12-8.16.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.47.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_04_3.0.101_0.47.50-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_0.47.50-2.28.1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_0.47.50-0.17.1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_0.47.50-0.21.1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_rt130_0.33.36-2.28.1.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_rt130_0.33.36-0.23.1.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_rt130_0.33.36-0.39.1.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.33.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1_3.0.101_rt130_0.33.36-0.12.1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_rt130_0.33.36-0.21.1.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_rt130_0.33.36-0.14.1.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4_02_3.0.101_0.29-0.7.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_0.29-2.27.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2_3.0.101_0.29-0.16.69</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_0.29-0.20.63</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_rt130_0.16-2.27.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_rt130_0.16-0.22.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_rt130_0.16-0.38.50</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1_3.0.101_rt130_0.16-0.11.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_rt130_0.16-0.20.65</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_rt130_0.16-0.13.56</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.41-0.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.8-0.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-0.23.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.335-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.341-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.346-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.350-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.359-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.356-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.378-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.394-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.400-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.406-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.411-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.425-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11W1-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.3.6-7.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.24-43.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.13-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.4.2.1-8.12.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.65-0.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_06_3.0.101_0.7.21-0.5.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-3.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.62.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.75-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.17-1.31.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-0.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr7.1-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.1-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-133.49.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2-147.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2-147.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2-147.14.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2-147.14.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.10-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5_08_3.0.101_0.47.55-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4_3.0.101_rt130_0.33.38-2.28.1.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.4_3.0.101_rt130_0.33.38-0.23.1.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20_3.0.101_rt130_0.33.38-0.39.1.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101.rt130-0.33.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1_3.0.101_rt130_0.33.38-0.12.1.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6_3.0.101_rt130_0.33.38-0.21.1.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4.1_3.0.101_rt130_0.33.38-0.14.1.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.32.59-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3_21548_18_2.6.32.59_0.17-0.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.101-0.7.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.27-0.5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.00-11.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-0.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.424-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.9.8-1.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.3-0.4.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr8.10-0.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.3-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0_sr8.10-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4p8-1.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.46.54.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.4-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1g-0.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.74.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.1-0.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-17.45.55.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-12.33.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.3-0.33.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.3-1.54.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4-27.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7g-146.22.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.429-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.438-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.440-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.442-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.451-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.457-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.75-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.12-0.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.5.0esr-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.5.0esr-0.4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.22.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4p8-1.29.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.460-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.466-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.468-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.22.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6_08_3.0.101_0.7.29-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.17-0.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-0.22.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.1-0.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.14-0.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.43-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.96-0.8.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-0.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9+git.1473844105.932298f-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.3-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9+git.1443859419.95e948a-12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4~a0~dev103-16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4~a0~dev103-16.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8j-0.91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4.dev18-9.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4.dev18-9.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4.dev19-9.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4.dev19-9.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4.dev5-9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4.dev5-9.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4.dev13-9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4.dev13-9.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4.dev5-11.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4.dev5-11.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4.dev3-9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.0-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9+git.1443622531.b2b2939-9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4~a0~dev12-13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.7-11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4.juno-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4.juno-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4.juno-17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4.juno-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4~a0~dev80-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.2.4.juno-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.11-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.11-10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.11-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.0-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.20.0-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.1-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.0-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.0-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.9-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.9-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.9-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.9-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.5-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2-9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.13-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">6</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0+git.1456169766.1e60d19-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.14-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.15-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.14-1.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.2~a0~dev1-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.2~a0~dev7-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.0.2~a0~dev2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.2~a0~dev9-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.0+git.1452795102.e53f5d3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.3~a0~dev14-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.2~a0~dev8-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.4~a0~dev18-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.2~a0~dev63-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.0.2~a0~dev18-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.1~a0~dev2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.4-0.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.9-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.3-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.1-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.4-2.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.2-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.2-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.2-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11.1-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.32.2-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.32.2-1.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.32.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.32.2-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.32.2-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.16-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.4-2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.3-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3~a0~dev10-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3~a0~dev10-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.5-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.5~a0~dev3-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.1~a0~dev238-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.3~a0~dev1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.0-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.1~a0~dev19-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.4~a0~dev6-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.4~a0~dev6-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.3~a0~dev2-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.2~a0~dev34-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.0.2~a0~dev13-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.2~a0~dev93-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.2~a0~dev93-9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.1~a0~dev13-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.1~a0~dev13-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2~a0~dev11-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2~a0~dev11-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.1.2~a0~dev29-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.1.2~a0~dev1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.0.5~a0~dev2-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0+git.1467079370.4f2c49d-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.2-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1~a0~dev2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.2-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.2~a0~dev30-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.2~a0~dev34-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.2-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.0.2~a0~dev7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.22.0+git.20160103-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">13.2</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.20-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:54.0.2840.59-82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:49.0.2-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.0-167.2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.20-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.9.8-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:33.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.2.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.13-1361.1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:13.2+git20140911.61c1681-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.38-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.28-6.1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.2_r1-5.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.4-2.2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2-2.1.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.15-5.1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1-7.1.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.10-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10-16.1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.0-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.2-15.1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.8-7.2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-2.1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.18.5-2.1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-4.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.4-5.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.17-2.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.31-23.1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-2.1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2-75.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2-75.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.5P1-2.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-4.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-29.2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4-3.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.98.4-2.1.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.1-2.1.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.3-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.25-4.1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.23-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11-29.2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.28-2.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.3+r212056-2.2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2-56.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.12-56.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4-21.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.58-2.1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.5-4.1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.38.0-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.12-182.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.17-2.1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.26-7.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.8-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.102-2.1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.6-9.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3-47.80.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.97.3-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:037-17.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.158-4.2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.3-17.2.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.14.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.21-6.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.83-3.1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-14.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3.26-6.1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.19-3.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-8.1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.3-2.1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.3-4.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.36-55.1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-7.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.31.1-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.40.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.14-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.42.0-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-16.2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.0-2.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.14.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.18-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.26-2.1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-2.1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.22.2-6.1.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.4-2.1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-2.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.461.hg.6253-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6-8.1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0-7.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.14.6-2.2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.27-196.1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6-8.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-8.1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.3-264.1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:s20121221-2.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.16-3.2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-124.1.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.71-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.97-4.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.11.12-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.14.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.6-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.1-778.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-778.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-2.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.22-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-5.1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.5-17.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3-91.1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.0-17.1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-5.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.7-4.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.14-5.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-2.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.1-4.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-2.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-2.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-4.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-4.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-4.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8-4.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.4-4.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-4.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.10-4.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-4.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.3-2.1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-4.1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.4-2.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25.1-2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-2.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-2.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-2.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-2.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.12-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.5-2.1.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.21-9.1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.2.26539-14.1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.17.1-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.0-2.1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2d-4.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-353.1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4-4.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:210-25.5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.1b-183.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.6-2.1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.6-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1-2.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.19-18.1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.1-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.2-15.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.08-3.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.6-3.1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9-2.1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.4-2.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.8.5-3.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4-5.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.5-28.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.13-2.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.30.0-4.1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.52.16-2.1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2-2.1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1i-2.1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.36.8-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.11-4.1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.51-3.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.13-2.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.112-3.1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.26.5-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.11-12.1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.11-12.1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0-4.2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.9-5.1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.8-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.1-4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.10-4.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.16.0-2.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.2.2-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.3-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.7-2.1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.10-25.1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.8-19.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.25-19.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.7.3-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.48.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.25-2.1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.3-2.1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.0-3.1.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-3.1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7-2.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-4.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3-10.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.3-2.1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.18-4.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.9-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.4-3.1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.28.2-18.1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11-2.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.1-13.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.1-7.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.6-2.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.2-3.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8-2.1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-74.1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.7-6.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.8rel.2-2.1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.17-2.1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.7-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.21-44.1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.6-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.4-13.1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-25.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.6-14.1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.2-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.00-3.1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-3.2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4-725.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.148.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.8-11.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.1-24.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.4-5.1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-2.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-7.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.20.1-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.83-2.1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.71-2.1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.04-6.1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.44-2.1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.7-2.1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.22-266.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.8-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.5-2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.13.1-9.1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.1-3.1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.2-2.1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.6-2.1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.23-2.1.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2-2.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.1-2.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.4.2-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11_git201205151338-9.1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.20-2.1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.29-1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.318.81ee561d-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.2.4-2.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3-3.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.4-3.1.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10-2.4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-2.1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.83.7-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.88+-96.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.0-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.18.3-1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.0-2.1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2-10.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-4.1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.84-4.1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.2-2.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.22-2.1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.3-155.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15-4.1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.1-1.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.2-3.1.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.1_06-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.1_06_k3.16.6_2-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.99.916-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.15-7.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.43-6.1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1-15.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0-4.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6-46.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.16.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.12-1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10-1022.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.16-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.0-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20130505-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.11.0-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.8-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.10-5.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:13.2-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.9.8-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.6.9-2.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.7.8.8-4.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.2-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1j-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.3.2-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.418-2.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.9-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-2.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.18-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1j-2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.9.8-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.6.9-2.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.7.8.8-4.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.5-3.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.2-8.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.3-8.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.2-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12.1-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.19-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.11-12.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.17-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.12-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.98.5-2.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:34.0.5-5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.17.2-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.7-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.0-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009042666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.4-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:39.0.2171.65-4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009043984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.6-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.425-2.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11-29.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:62.1.0-30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.0.2-30.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0031-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.13.1-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.7-20.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.21-44.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.2.26539-14.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.1-163.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.31-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.3.0-4.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-25.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.7-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.7-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.7-7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.22-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.5-20.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.16.1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.11.3-4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.11.3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.19-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.0-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.11-2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.10-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.29-10.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.5.2-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6.2-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.6.2-37.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.9-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-2.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.0-17.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.23-8.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.20-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.20_k3.16.7_7-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.442-2.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.00-26.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.1-163.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.20-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.4-6.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.1-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.40.0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.2-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.1_08-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.1_08_k3.16.7_7-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.1-13.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.2-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.98.6-2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.16-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1-5.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.59-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.1-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.16.1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.1-6.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-16.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-16.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.17-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.25-19.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4-21.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.10-212.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:36.0-14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.17.4-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.6-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.4-8.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.10-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.2-14.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:40.0.2214.111-13.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.5.0-12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.3-10.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4-5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.9-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.64-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.0-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.8c-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.451-2.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.4-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:41.0.2272.76-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.0-17.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.14.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.2-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-9.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.2-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1k-2.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2-7.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.33-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:458-6.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.4.26-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:36.0.4-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.2-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.2-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.18-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.3-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.4-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.33.1-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-7.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.36.RC1-78.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.11-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.1-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.21.5-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.19.0-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.13-2.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:37.0.1-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.6.0-15.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.8-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.0-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.1-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:41.0.2272.118-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.9-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.429-2.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.4.27-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8-3.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8_k3.16.7_21-3.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.639-14.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.639_k3.16.7_21-14.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.8-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.8_k3.16.7_21-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.28-18.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.28_k3.16.7_21-18.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.23-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.23_k3.16.7_21-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.7-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.7-21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.7-21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.44-260.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.44_k3.16.7_21-260.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.20-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20140629-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20140629_k3.16.7_21-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.20_k3.16.7_21-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.1_08-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.1_08_k3.16.7_21-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6_k3.16.7_21-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.457-2.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.7-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.2-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.0-2.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:42.0.2311.90-23.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:37.0.2-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.6p5-25.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.79-7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.45-9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.42.0-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25.1-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25.1-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2-5.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.1-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.37-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:42.0.2311.135-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.3-2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.42.1-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.7.2-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20150422-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.71-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.3-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.3-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.98.7-2.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.460-2.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.7.0-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.0.1-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.18.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.0-3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.10-10.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.16.0-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.4-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.5-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.2-14.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.23-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-16.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-16.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20150522-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.35-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:43.0.2357.65-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.4-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.1-24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.42.12-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:35.0-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.5-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.5a-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2-5.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.466-2.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.20100204cvs-19.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4-21.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.1-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.23-2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.16.16-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3-4.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.22.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_06-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_06_k3.16.7_21-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.2-13.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.6_1.16.1-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.8.4-239.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.8d-4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.42.1-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1k-2.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:43.0.2357.130-34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.468-2.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.20.1-12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.9-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.13.3-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.1-30.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.481-2.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.25-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.4-10.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.8.4-239.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.6-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.20-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:39.0-34.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.19.2-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.438-2.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1-10.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.58-2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.1.0-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.491-2.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.31-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.10-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.14-12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.14-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.5-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.1-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.2-7.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.2-8.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.17-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.1-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.8e-4.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.85-10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.85-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.51-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:44.0.2403.89-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.3-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.37-8.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.39-8.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.60-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.11-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.1-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.15-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.18-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8-3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8_k3.16.7_24-3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.639-14.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.639_k3.16.7_24-14.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.8-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.8_k3.16.7_24-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.28-18.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.28_k3.16.7_24-18.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.23-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.23_k3.16.7_24-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.7-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.7-24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.44-260.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.44_k3.16.7_24-260.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20140629-2.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20140629_k3.16.7_24-2.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_06-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_06_k3.16.7_24-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6_k3.16.7_24-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.508-2.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:40.0-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:40-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.14-2.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.30-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.30_k3.16.7_21-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.7-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.1-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.1-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.2.0-25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:40.0.3-41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-8.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.18-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.7.3-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.4.27-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.31.6-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0121-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.4-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.4-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.4-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.8-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.158-4.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.13-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.11-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.0.2454.85-43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-8.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4-2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.521-2.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.18-2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.26-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.1-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:41.0-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.15-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.3.0-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.38-20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.2-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.0-17.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.2-3.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.22-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.10-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.34-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.0-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.0-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.0.2454.101-50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.113-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.535-2.73.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.4-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-255.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.2-262.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.1-2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.540-2.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.3-43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1k-2.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.11-3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:41.0.2-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:46.0.2490.71-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.21-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.1-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.1-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.0-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.5-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.8-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.13-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8-3.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8_k3.16.7_29-3.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.639-14.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.639_k3.16.7_29-14.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.8-13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.8_k3.16.7_29-13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.28-18.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.28_k3.16.7_29-18.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.23-13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.23_k3.16.7_29-13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.7-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.7-29.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.7-29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.44-260.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.44_k3.16.7_29-260.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20140629-2.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20140629_k3.16.7_29-2.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_06-27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2_06_k3.16.7_29-27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6_k3.16.7_29-13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.32-32.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.32_k3.16.7_29-32.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.4.0-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.91-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.65-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.7-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.3-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.26.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.20.1-5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2-5.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.10-2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25.1-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-9.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.53-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.2-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.15.1-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:42.0-3.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.1-3.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.10-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.39-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.4.0-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.4-16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.4.5-3.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.548-2.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.25-19.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.3_02-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.3_02_k3.16.7_29-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:037-17.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.66-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.440-2.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.33-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.2-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:46.0.2490.86-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.13-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.4-9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.4-9.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.4.5-3.8.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.13-2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.51-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.2-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.7-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.18-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.26-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.11-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4-5.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.554-2.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.22-2.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.4.0-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.27-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.10-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.3_04-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.3_04_k3.16.7_29-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20140922-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.16.0-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.15.4-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.51-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.13-2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1k-2.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.75-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:47.0.2526.80-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.1-2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.0-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.32-8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.2-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:47.0.2526.106-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:43.0-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-16.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-16.18.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.24-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.22-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.5-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.8-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.26-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.15-2.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.58-2.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.02~beta2-20.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.3-7.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.1-163.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.559-2.85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.5.0-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.2-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.3-7.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.5-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2014.09.22-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.0-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.1-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.20-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-7.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.6-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.9-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.12-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8-3.20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8_k3.16.7_42-3.20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.639-14.20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.639_k3.16.7_42-14.20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.8-20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.8_k3.16.7_42-20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.28-18.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.28_k3.16.7_42-18.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.23-20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.23_k3.16.7_42-20.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.7-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.7-42.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.44-260.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.44_k3.16.7_42-260.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.20-48.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20140629-2.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20140629_k3.16.7_42-2.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.20_k3.16.7_42-48.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_02-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_02_k3.16.7_42-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6_k3.16.7_42-22.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.15.8-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.40-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:48.0.1-30.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.24-26.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-7.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-8.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.42.1-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.72-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.5-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.3.0-19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.6-10.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.95-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.32.3-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.16-4.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:53.0.2785.101-120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5-39.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5-8.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.635-2.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:53.0.2785.113-123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.26-51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.26_k3.16.7_42-51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.1-75.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.5-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.6-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24.31-4.17.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:13.2-14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.20.2-18.14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:49.0-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.25-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1k-2.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.9P1-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.14-2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:53.0.2785.143-79.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-16.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-16.28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.1-78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.4.0-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_05-49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_05_k3.16.7_42-49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.5-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.0-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.0-24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.637-2.112.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:210.1475218254.1e76ce0-25.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.6-10.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.00-26.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.10.2.0-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.9-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.21.0-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.22-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.7.6-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-7.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.1-83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.23-2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.28-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.28_k3.16.7_42-54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8-3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8_k3.16.7_45-3.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.639-14.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.639_k3.16.7_45-14.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.8-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.8_k3.16.7_45-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.28-18.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.28_k3.16.7_45-18.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.23-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.23_k3.16.7_45-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.7-45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.7-45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.44-260.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.44_k3.16.7_45-260.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.28-54.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20140629-2.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20140629_k3.16.7_45-2.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.28_k3.16.7_45-54.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_05-51.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_05_k3.16.7_45-51.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6_k3.16.7_45-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.20-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.8-16.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.11-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.643-2.115.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.9.8-34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.51-3.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.40-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2-75.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2-75.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.14-163.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.4-7.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:54.0.2840.90-85.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-2.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.27-2.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.1-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.1-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:44.0-12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.21-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.11-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.34-19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.644-2.118.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:54.0.2840.100-91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.15.2-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.24-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.39-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.21-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.20-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.9.8-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.22-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.16-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.14-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:50.0-39.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.26.2-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.111-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.1-86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.20.0-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.28-2.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.25-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.10p3-2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2.1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.121-28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8_k3.16.7_32-3.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.639-14.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.639_k3.16.7_32-14.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.8-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.8_k3.16.7_32-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.28-18.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.28_k3.16.7_32-18.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.23-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.23_k3.16.7_32-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.7-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.7-32.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.44-260.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.44_k3.16.7_32-260.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.34-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20140629-2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20140629_k3.16.7_32-2.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.34_k3.16.7_32-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.3_08-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.3_08_k3.16.7_32-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6_k3.16.7_32-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.0-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.326-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:50.0.2-42.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.5.1-28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.94-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.15.9-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.9.8-42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.20-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.9-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.3-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.5-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.11-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.10-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.7-10.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.1-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8-3.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8_k3.16.7_53-3.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.639-14.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.639_k3.16.7_53-14.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.8-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.8_k3.16.7_53-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.28-18.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.28_k3.16.7_53-18.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.23-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.23_k3.16.7_53-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.7-53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.7-53.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.44-260.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.44_k3.16.7_53-260.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.30-62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20140629-2.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20140629_k3.16.7_53-2.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.30_k3.16.7_53-62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_05-55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_05_k3.16.7_53-55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6_k3.16.7_53-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.021-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.3-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:55.0.2883.75-99.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:55.0.2883.75-148.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.23-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.5-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.0.0.186-2.121.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2d-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:50.1.0-45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.8-5.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.4-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.4-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.4-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.20-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.1-89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.15.4-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-7.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.25-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.21-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.20-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.9.8-45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.7.6-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.42.1-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.6.0-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1k-2.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.17-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.17-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.17-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.28-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.22-2.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.6-10.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.1-163.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.2-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.569-2.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.8f-4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.8f-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-6.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.0-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.3.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:48.0.2564.109-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.6.0-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:44.0.2-15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-16.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-16.22.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:48.0.2564.116-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.8-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.1.git.1455712026.9c0a4a0-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.1+git20160217.7897d3f-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6+git20160218.73d6618-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.1-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.11-2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.4-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.11-3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8-3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8_k3.16.7_35-3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.639-14.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.639_k3.16.7_35-14.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.8-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.8_k3.16.7_35-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.28-18.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.28_k3.16.7_35-18.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.23-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.23_k3.16.7_35-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.7-35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.7-35.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.44-260.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.44_k3.16.7_35-260.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.36-43.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20140629-2.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20140629_k3.16.7_35-2.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.36_k3.16.7_35-43.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.3_08-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.3_08_k3.16.7_35-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6_k3.16.7_35-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.1-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.1-8.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.0-4.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.3-2.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6-2.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1.4-2.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.2-2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.4.2-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.1-2.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.1-2.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.6-9.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.54-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.1-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.1-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1k-2.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8zh-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-9.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.4-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.10-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.15.5-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.1-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.1-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.1-42.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.4-2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.577-2.91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.86.2-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.4-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:49.0.2623.75-81.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.0-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.21.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.0-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.3_08-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.3_08_k3.16.7_29-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.23-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:49.0.2623.87-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-2.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.17-3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.3-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.4-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0.b6-27.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.23-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.20.1-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2016.72-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6p1-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.3-2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.7.0-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.2-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.31.6-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.10-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:49.0.2623.110-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.2-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.1-13.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.99-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.77-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.616-2.94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_02-43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_02_k3.16.7_35-43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14.0-7.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.1-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.24.1-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.5-2.3.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.6-10.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:210.1459453449.5237776-25.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.5-4.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:50.0.2661.75-94.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.1-53.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:50.0.2661.94-97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:46.0-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.22.3-15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.101-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.91-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.11-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.0-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1k-2.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8zh-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.9.8-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.16-2.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.1-57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:50.0.2661.102-48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.621-2.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.7-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.2-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2.6-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.24.1-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.26.5-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:43.0.3-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.9-17.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.8f-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.21-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.20-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.5b-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.7-2.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.01.0-6.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.30-16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.40.15-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.1-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.79-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.1-61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.6.3-31.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1-56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p7-25.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.15.6-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.28-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.3-7.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.4-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.67-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2-7.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.26-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.20-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.20_k3.16.7_35-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.20.1-12.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:51.0.2704.79-105.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-7.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.20-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.10-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.6-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.9-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-16.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.19-16.25.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.9.8-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.1-66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:47.0-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.23-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-2.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.5-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.5-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7-2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.5-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p8-25.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.4-7.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.12-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.626-2.100.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:51.0.2704.103-108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.9-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.16.17-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.5-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.3-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.6-2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6+git20160531.fbfe336-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.25-2.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.18.2-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.9-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2-7.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.900.1-163.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.6-10.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.1-2.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.15.7-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.21.0-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.16-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.4-4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.20-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.1-13.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.9.8-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.1-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.2-16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.2.202.632-2.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.9-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.4-13.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.16-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4-40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.5-30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.5-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.26.5-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.0.2743.82-111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.12-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.6-10.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2016.74-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.37-8.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.39-8.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.33-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7a-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:104-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.6-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.9-17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:48.0-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.24-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.101-30.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.4-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3-9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.13-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.0.2743.116-64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.16-4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.111-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.8.9.8-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.1-72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3-4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:48.0.2564.82-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.9-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.5-8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.31.1-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.17-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.0-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-2.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.21.5-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.9-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:16.08.2-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:15.12.3-20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_06-58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.4_06_k3.16.7_53-58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.21-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.0.0.194-2.124.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.23-15.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.1-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.31-13.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2-139.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8zh-9.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.20-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.5.40-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13-4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.14.5-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.22-2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.1-3.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.10-13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.1-25.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.20.0-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.5-4.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.4-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2.6-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3-2.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.27-2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.94-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:46.0.2490.86-57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.30-2.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.7-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.3.1-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.7.0-40.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:42.0-50.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.1-19.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.39-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.25.1-20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.66-4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.28-2.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.8-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:47.0.2526.80-61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:47.0.2526.106-64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:43.0-53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.5.0-34.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.40-26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:44.0-59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.21-25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.11-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:43.0.3-56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.54-13.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.2-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.5-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.53-13.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.3-4.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.29-2.4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.18-2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.22-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.20-5.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.0-3.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.11.0-2.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.15.2-22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.9-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.2-7.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.26-3.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.35-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.2-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8zh-9.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:48.0-74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.24-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.1-3.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.12-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.9-2.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.11-4.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.4.461.hg.6253-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.7.6-29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.4-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.86.2-3.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:48.0.2564.82-67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:48.0.2564.109-75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:48.0.2564.116-78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:49.0.2623.87-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:49.0.2623.110-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:50.0.2661.102-100.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12-13.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.15.4-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.6.0-37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:44.0.2-62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.0-65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.21.1-28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12-15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.2-43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.24-8.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.6.34-2.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1-2.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12-13.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.4-19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.10-32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.15.5-30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.67-4.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.9.6P1-2.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:46.0-68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.22.3-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:47.0-71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.23-34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:49.0-80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.25-46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.3.0-46.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.0-8.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.1-7.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.11.0-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.2-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2016.72-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.5b-6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.8f-4.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.23-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.12-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.40.15-10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.0-3.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.13-3.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.16-3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.15.6-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:52.0.2743.116-114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:53.0.2785.143-128.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:54.0.2840.59-131.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:54.0.2840.90-134.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:54.0.2840.100-140.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:49.0.2-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:50.0-88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.26.2-49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.12-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.10-31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1-2.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.15.7-36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1-2.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.32.3-9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:48.0.1-77.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.24-43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.13-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.15.8-39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.14.5-13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.20-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.14.2-7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.2-27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.2-5.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.4-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-4.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.1-2.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.6-12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.20-2.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:50.0.2-91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.5.1-55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:50.1.0-94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.16-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.14-7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.23-15.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:45.6.0-58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.21-3.7.1</evr>
  </rpminfo_state>
</states>
</oval_definitions>
